text
stringlengths 1k
18k
|
|---|
# Jeff Darwin
**Jeffrey Scott Darwin** (born July 6, 1969) is an American former professional baseball pitcher. He played three seasons in Major League Baseball (MLB) for the Seattle Mariners and Chicago White Sox.
## Career
Darwin attended Bonham High School in Bonham, Texas, where he played baseball, basketball, and football and ran track and field. Darwin was selected by the Seattle Mariners in the 46th round of the 1987 Major League Baseball draft after high school but instead accepted a scholarship to play college baseball at Alvin Community College in Alvin, Texas. The Mariners selected him in the thirteenth round of the following season's draft and he chose to sign. He was assigned to the Bellingham Mariners of the Northwest League to begin his professional career. Darwin was converted from a starting pitcher to a relief pitcher during the 1992 season while pitching for the Peninsula Pilots. Years later, Darwin told the *Daily Press* that the move had "worked out perfectly" for his career. Following the 1992 season, he was added to the team's 40-man roster.
On June 27, 1993, the Mariners traded Darwin to the Florida Marlins along with Henry Cotto in exchange for Dave Magadan. Darwin pitched poorly in his brief time in the Marlins' farm system and was traded back to Seattle that offseason, again in exchange for Magadan. Darwin got the news while pitching in the Mexican Pacific League.
Darwin made his Major League debut on June 13, 1994, with the Mariners against the Texas Rangers. According to the *Chicago Tribune*, "\[n\]erves got him" in his brief stint with the Mariners. He gave up six runs in four innings pitched and, "\[f\]or practical purposes, he was finished with the Mariners." He returned to the minor leagues the following season and was named a Triple-A All-Star in 1995.
On October 9, 1995, the Mariners traded Darwin to the Chicago White Sox as the player to be named later in a July trade which had brought them outfielder Warren Newson. During spring training in 1996, he roomed with his brother, Danny Darwin, who was in camp with the Pittsburgh Pirates. Darwin was called up to the majors from Triple-A Nashville on July 3, 1996, and was used somewhat lightly in relief for the remainder of the season. Prior to the 1997 season, the White Sox signed Danny Darwin and the brothers were united on the same team for the first time in their lives. The elder Darwin would be traded away before the younger Darwin could appear in a game for the White Sox, however. On August 17, 1997, the White Sox added Darwin to the roster after Bill Simas was placed on the disabled list. He played out the rest of the year on the Major League roster. It would be his final season at the big league level.
Prior to the 1998 season, Darwin signed with the San Francisco Giants where he was again reunited in spring training with his older brother. Darwin spent the season in the minor leagues and finished tied for second place in the Pacific Coast League in saves. The following year, Darwin appeared in only eight games in the San Diego Padres farm system due at least in part to shoulder problems. It would be his final season in professional baseball.
Darwin began serving as a pitching coach at Benson High School in Benson, Arizona, in 2016.
## Personal life
His older brother is fellow Major League pitcher Danny Darwin, though they were 14 years apart and, according to Danny, had a relationship "more like father and son." Their middle brother played college baseball at Southeastern Oklahoma State and coached baseball at North Central Texas College. Darwin's nephew played baseball at Texas Tech. As of April 2021, he had at least three daughters, Heather, Emily and Jamey. Emily had committed to play college softball at Yavapai College.
## InfoBox
| Jeff Darwin | |
| --- | --- |
| **Pitcher** | |
| **Born:** (1969-07-06) July 6, 1969<br>Sherman, Texas, U.S. | |
| **Batted:** Right**Threw:** Right | |
| MLB debut | |
| June 13, 1994, for the Seattle Mariners | |
| Last MLB appearance | |
| September 27, 1997, for the Chicago White Sox | |
| MLB statistics | |
| Win–loss record | 0–2 |
| Earned run average | 4.47 |
| Strikeouts | 25 |
| | |
| Teams | |
| | |
|
# Question
Title: Ralink 148f:760b mt7601 driver doesn't build on 12.04 even when patched
Hello fellow Ubuntunians ;)
I bought this cheap Ralink wifi adapter thinking that it would just work like magic as I am used to with Ubuntu. ;) However, this driver installation has been giving me much more trouble than I expected. I have scavenged through the boards for several hours trying everything. Well... I have known from the start that this would be the correct approach (I mean the answer):
Ralink MT7601U (148f:7601) Wi-Fi adapter installation
But, even with the patch applied I get the following:
```
ahti@ahti:~/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913$ make
make -C tools
make[1]: Siirrytään hakemistoon "/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/tools"
gcc -g bin2h.c -o bin2h
make[1]: Poistutaan hakemistosta "/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/tools"
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/tools/bin2h
cp -f os/linux/Makefile.6 /home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/Makefile
make -C /lib/modules/3.2.0-70-generic/build SUBDIRS=/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux modules
make[1]: Siirrytään hakemistoon "/usr/src/linux-headers-3.2.0-70-generic"
CC [M] /home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.o
In file included from /home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/include/rtmp_os.h:44:0,
from /home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/include/rtmp_comm.h:75,
from /home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/include/rt_config.h:33,
from /home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.c:28:
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/include/os/rt_linux.h:282:2: virhe: unknown type name ”kuid_t”
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/include/os/rt_linux.h:283:2: virhe: unknown type name ”kgid_t”
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.c: Funktio ”announce_802_3_packet”:
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.c:331:16: varoitus: käyttämätön muuttuja ”pAd” [-Wunused-variable]
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.c: Funktio ”STA_MonPktSend”:
/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.c:399:9: varoitus: format ”%d” expects argument of type ”int”, but argument 3 has type ”long unsigned int” [-Wformat]
make[2]: *** [/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux/../../os/linux/rt_profile.o] Virhe 1
make[1]: *** [_module_/home/ahti/data/drivers/DPO_MT7601U_LinuxSTA_3.0.0.4_20130913/os/linux] Virhe 2
make[1]: Poistutaan hakemistosta "/usr/src/linux-headers-3.2.0-70-generic"
make: *** [LINUX] Virhe 2
```
Sorry for that my console output is in Finnish (How do I change those freaking console output in English anyway, btw? For apt and building tools mainly if not possible to use English locale for everything in terminal session? Not possible?)
But yeah, that's basically where I am at the moment.
I also tried to use ndis wrapper approach, but unshield couldn't extract the Windows driver executable and I couldn't find .sys/.inf combo anywhere so that idea was ditched.
Any help appreciated. I know that this is user namespace issue, but I haven't done any kernel coding, nevertheless I am a coder, thus can't solve this on my own.
Oh, and tinybit of my system info if needed: Ubuntu 12.04 (precise), Kernel: 3.2.0-70-generic (#105-Ubuntu SMP Wed Sep 24 19:49:16 UTC 2014), GCC version: 4.6 (x86\_64-linux-gnu), Gnome 3.4.2
Many thanks in advance!
# Answer
Answering to myself.
I was too eager to apply the patch. Without the patch applied, the driver compiled. However it seems either to map incorrectly or to just not work with my 148f:760b (\<- notice the b instead of 1) usb adapter. I even modified the devices list to add a new alias, but even after loading the driver or a bunch of other stuff related to it, the adapter just was not recognized.
But when I installed the driver in Windows 7 (didn't seem to work on Windows XP) and after the installation process copied over the driver folder located in C:/ProgramData/Mediatek Driver/RT2870 Wireless LAN Card/Driver/ to Ubuntu and loaded it with ndis wrapper and with ndiswrapper-dkms package, the adapter was immediately functional. Actually, on Windows side it didn't recognize my wlan at all for some reason but on Ubuntu it was just one click and I was immediately online wirelessly.
So, odd behavior here and there but finally working.
> 2 votes
# Answer
You're probably not using Ubuntu 12.04 anymore, but in any case, here's the solution for the compilation error you had when patches were applied:
The patches only work out-of-the-box with linux kernel \>= **3.5**. To make it work with Ubuntu's 12.04 kernel **3.2** you have to make a small correction:
In `include/os/rt_linux.h`, look for the following block. In my version it starts at line 280, but yours might be slightly different depending on where you got your sources from:
```
typedef struct _OS_FS_INFO_
{
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3,12,0)
uid_t fsuid;
gid_t fsgid;
#else
kuid_t fsuid;
kgid_t fsgid;
#endif
mm_segment_t fs;
} OS_FS_INFO;
```
Get this line (282 in my case):
```
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3,12,0)
```
And change it to
```
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3,2,0)
```
Try to compile now, and it should work :)
> 0 votes
---
Tags: 12.04, wireless, drivers, ralink
---
|
# Barsal
**Barsal** is a census town in Jalandhar district of Punjab State, India. It is located 16 kilometres (9.9 mi) from Jalandhar, 25 kilometres (16 mi) from Phagwara, 59 kilometres (37 mi) from district headquarter Hoshiarpur and 152 kilometres (94 mi) from state capital Chandigarh. The village is administrated by a sarpanch who is an elected representative of village as per Panchayati raj (India).
## Transport
Jalandhar city railway station is the nearest train station. The village is 69 kilometres (43 mi) away from domestic airport in Ludhiana and the nearest international airport is located in Chandigarh also Sri Guru Ram Dass Jee International Airport is the second nearest airport which is 112 kilometres (70 mi) away in Amritsar.
## InfoBox
| Barsal | |
| --- | --- |
| Census town | |
| BarsalLocation in Punjab, IndiaBarsalBarsal (India) | |
| Coordinates: 31°13′28″N 75°33′44″E / 31.224548°N 75.5623302°E / 31.224548; 75.5623302 | |
| Country | India |
| State | Punjab |
| District | Jalandhar |
| Government | |
| Type | Panchayat raj |
| Body | Gram panchayat |
| Elevation | 240 m (790 ft) |
| Population (2011) | |
| Total | 796 |
| | Sex ratio 419/377 / |
| Languages | |
| Official | Punjabi |
| Time zone | UTC+5:30 (IST) |
| ISO 3166 code | IN-PB |
| Vehicle registration | PB\- 08 |
| Website | jalandhar.nic.in |
|
Food for thought
04 November 2014
Interview with
William Olds, University of Yale
Food for Thought
When we eat a lot, our brain tells us we feel full so we stop eating. But how is thisFood for Thought message getting to the brain? William Olds from the University of Yale looked at flies to find the answer, and his finding could help combat obesity...
William - I was really interested in metabolism and obesity. And so when I started this, I was just looking at the metabolism of flies. You have all this wiring from the brain to the digestive system and it's already been established that if you cut any of these wires that connect the gut to the brain, you're gonna' eat more and you're gonna have issues with your feeding control.
Chris - And that's even in flies so you interrupt the nerve connections between a fly brain and its gut, and flies gain weight.
William - Yes. That is correct!
Chris - Gosh! Do you know why?
William - We're still trying to figure that question out. A hypothesis is that these nerve cells and this communication between the gut and the brain is integral to telling us, "Hey! Stop eating!" To test that, we first used some tricks that you can do on flies that allow you to turn on or turn off nerve cells when you want, where you want. So what we did was we inactivated these neurons and activated these neurons and we just looked at their metabolism, so sugar levels in their blood, and their food intake. We found some nerve cells that connect to the posterior part of the fly's gut so the analogous region would be the colon in humans and we found that these neurons that are tightly wound around this part of the gut have this profound effect on food intake. If you turn them off, the food intake is three to four fold higher than controls and if you turn them on, it's about one-half to one-quarter.
Chris - When you say turn them on, do you mean that you make the cells more active?
William - Yes. That is correct.
Chris - So there's some kind of loop going on here where these cells are informing the brain of something and if you suppress them, they are sort of releasing the brain and the brain just says, "Eat!"
William - Precisely!
Chris - So what do you they are actually doing in the fly? Are they there to say to the fly, "You're full! Stop eating!"
William - That's the current hypothesis I'm working with. In America, we have thanksgiving and the whole point is to eat as much as you want, right, until you get that feeling when you're full. Everybody's experienced that feeling where you just have five or six hamburgers and you feel you just can't eat another bite. You have this feeling of like stretchiness.
Chris - Five or six hamburgers, Will?
William - Yeah!
Chris - Only five or six?
William - Well you know, this is America. We have a terrible obesity problem.
Chris - But your conclusion would therefore be that what these nerve cells might be stretch receptors; they're detecting how full or distended the guts are, and perhaps they're feeding back on the brain saying "I'm stretching myself to the limit. Stop eating."
William - Precisely.
Chris - Are these nerve cells exclusive to the gut or will you find them doing jobs elsewhere in the animal? I'm thinking therapeutically if qw wanted and we are able to find these cells existing in mammals and we want to target them, for instance, as an anti-obesity treatment. It would be much easier if they were exclusively and selectively present in the intestines and nowhere else in the body.
William - Yeah, that's a great question. So these are the homologues, the evolutionary conserved versions of these are expressed in multiple regions in mammals. So we have versions of these in your kidneys, as well as your lungs, they don't all necessarily play this stretch function that you see in flies but the nice thing about them being expressed in this intestinal region is that the amount of drug they have to put in is much lower than something in the central nervous system, the brain for instance. So you have less of a chance of off-target effects. This is a very attractive drug target as a result.
Chris - To a certain extent, have we not been aware for many years that the gut does appear to be sensitive to stretch. I mean it, a - is logical and b - we have got evidence from various lines and various routes that actually if you stretch the gut or distend the gut, signals that appear to be linked to satiety come out. So what does your study add that we didn't really know already?
William - What we know right now is that the stretch is important. You can go back to Homer in the Odyssey. There are multiple passages where they say they go onto their stomachs, cannot be stretched anymore. So it's obviously clearly saying that we've known for a long time but the question is, who are the players? What is exactly going on? How are these nerve cells able to detect that the stretch is going on. We know they are but what is giving them the capability to do that? So what my study shows is that these particular stretch receptors are likely the key player in helping the neuron find out when we've eaten too much and that the gut the is stretched and you need to stop eating.
Add a comment
|
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Shamoon 1 attack timeline against Saudi Aramco
Shamoon,[a] (Persian: شمعون) also known as W32.DistTrack,[1] is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature of the attack and the cost of recovery. Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the master boot record of the infected computer, making it unusable.[2][3]
The virus was used for cyberwarfare[4] against national oil companies including Saudi Arabia's Saudi Aramco and Qatar's RasGas.[5][2][6] A group named "Cutting Sword of Justice" claimed responsibility for an attack on 35,000 Saudi Aramco workstations, causing the company to spend more than a week restoring their services.[7] The group later indicated that the Shamoon virus had been used in the attack.[8] Computer systems at RasGas were also knocked offline by an unidentified computer virus, with some security experts attributing the damage to Shamoon.[9] It was later described as the "biggest hack in history."[3]
Symantec, Kaspersky Lab,[10] and Seculert announced discovery of the malware on 16 August 2012.[2][11] Kaspersky Lab and Seculert found similarities between Shamoon and the Flame malware.[10][11] Shamoon made a surprise comeback in November 2016 according to Symantec,[12] and it was involved in a new attack on 23 January 2017.[13]
Shamoon was designed to erase and overwrite hard drive data with a corrupted image and report the addresses of infected computers back to the computer inside the company’s network. The malware had a logic bomb which triggered the master boot record and data wiping payload at 11:08 am local time on Wednesday, August, 15. The attack occurred during the month of Ramadan in 2012. It would appear that the attack was timed to occur after most staff had gone on holiday reducing the chance of discovery before maximum damage could be caused, hampering recovery.
The virus consisted of three components, the Dropper, the Wiper and the Reporter. The Dropper, the source of the infection, creates a service with the name 'NtsSrv' that enables it to remain persistent on the infected computer. The Dropper was built in 32-bit and 64-bit versions. If the 32-bit dropper detects a 64-bit architecture, it drops the 64-bit version. This component drops the Wiper and the Reporter onto the infected computer and executes itself. It spreads across a local network by copying itself to network shares and on to other computers.[14]
The Wiper component utilizes an Eldos-produced driver known as RawDisk to achieve direct user-mode access to a hard drive without using Windows APIs. It identifies the locations of all files on the infected computers and erases them. It sends information about the files destroyed to the attacker and then overwrites the erased files with corrupted data so they cannot be recovered. The component used portions of an image. In the 2012 attack it used an image of a burning U.S. flag; in the 2016 attack it used a photo of the body of Alan Kurdi.[15][16][12]
Before the attack[edit]
The malware was unique, used to target the Saudi government by causing destruction to the state owned national oil company Saudi Aramco. The attackers posted a pastie on hours prior to the wiper logic bomb occurring, citing oppression and the Al-Saud regime as a reason behind the attack.[17] According to Chris Kubecka, a security advisor to Saudi Aramco after the attack and group leader of security for Aramco Overseas, the attack was well-staged.[3] It was initiated by a phishing email attack that an unnamed Saudi Aramco Information Technology employee opened, giving the group entry into the company's network around mid-2012.[18]
We, behalf of an anti-oppression hacker group that have been fed up of crimes and atrocities taking place in various countries around the world, especially in the neighboring countries such as Syria, Bahrain, Yemen, Lebanon, Egypt and ..., and also of dual approach of the world community to these nations, want to hit the main supporters of these disasters by this action. One of the main supporters of this disasters is Al-Saud corrupt regime that sponsors such oppressive measures by using Muslims oil resources. Al-Saud is a partner in committing these crimes. It's hands are infected with the blood of innocent children and people. In the first step, an action was performed against Aramco company, as the largest financial source for Al-Saud regime. In this step, we penetrated a system of Aramco company by using the hacked systems in several countries and then sent a malicious virus to destroy thirty thousand computers networked in this company. The destruction operations began on Wednesday, Aug 15, 2012 at 11:08 AM (Local time in Saudi Arabia) and will be completed within a few hours.[citation needed]
Pastie announcing attack against Saudi Aramco by a group called Cutting Sword of Justice
Kubecka described in a Black Hat USA talk that Saudi Aramco placed the majority of their security budget on the ICS control network, leaving the business network at risk for a major incident.[18]
During the attack[edit]
On 15 August at 11:08 am local time, over 30,000 Windows based systems began to be overwritten. Symantec found some of the affected systems showed an image of an American flag while their data was being deleted and overwritten.[2] Saudi Aramco announced the attack on their Facebook page and went offline again until a company statement was issued on 25 August 2012. The statement falsely reported normal business was resumed on 25 August 2012. However a Middle Eastern journalist leaked photographs taken on 1 September 2012 showing kilometers of petrol trucks unable to be loaded due to backed business systems still inoperable.
Tanker trucks unable to be loaded with gasoline due to Shamoon attacks
On August 29, 2012 the same attackers behind Shamoon posted another pastie on, taunting Saudi Aramco with proof they still retained access to the company network. The post contained the username and password on security and network equipment and the new password for Aramco CEO Khalid Al-Falih[19] The attackers also referenced a portion of the Shamoon malware as further proof in the pastie:
mon 29th aug, good day, SHN/AMOO/lib/pr/~/reversed
We think it's funny and weird that there are no news coming out from Saudi Aramco regarding Saturday's night. well, we expect that but just to make it more clear and prove that we're done with we promised, just read the following facts -valuable ones- about the company's systems:
- internet service routers are three and their info as follows:
Core router: SA-AR-CO-1# password (telnet): c1sc0p@ss-ar-cr-tl / (enable): c1sc0p@ss-ar-cr-bl
Backup router: SA-AR-CO-3# password (telnet): c1sc0p@ss-ar-bk-tl / (enable): c1sc0p@ss-ar-bk-bl
Middle router: SA-AR-CO-2# password (telnet): c1sc0p@ss-ar-st-tl / (enable): c1sc0p@ss-ar-st-bl
- Khalid A. Al-Falih, CEO, email info as follows: password:kal@ram@sa1960
- security appliances used:
Cisco ASA # McAfee # FireEye :
default passwords for all!!!!!!!!!!
We think and truly believe that our mission is done and we need no more time to waste. I guess it's time for SA to yell and release something to the public. however, silence is no solution.
I hope you enjoyed that. and wait our final paste regarding SHN/AMOO/lib/pr/~
angry internet lovers #SH
According to Kubecka, in order to restore operations, Saudi Aramco used its large private fleet of aircraft and available funds to purchase much of the world's hard drives, driving the price up. New hard drives were required as quickly as possible so oil prices were not affected by speculation. By September 1, 2012 gasoline resources were dwindling for the public of Saudi Arabia 17 days after the August 15th attack. RasGas was also affected by a different variant, crippling them in a similar manner.[18]
It is unclear why the attacker may have an interest in actually destroying the infected PC. Kaspersky Labs hinted that the 900 KB malware could be related to Wiper, that was used in a cyber attack on Iran in April. After a 2-day analysis, the company erroneously concluded that the malware is more likely to come from "scriptkiddies" who were inspired by Wiper.[20] Later, in a blog post, Eugene Kaspersky clarified the use of Shamoon categorizing as cyberwarfare.[21]
See also[edit]
1. ^ "Shamoon" is part of a directory string found in the virus' Wiper component.
1. ^ "Joint Security Awareness Report (JSAR-12-241-01B):'Shamoon/DistTrack' Malware (Update B)". United States Department of Homeland Security ICS-CERT. 2017-04-18. Retrieved 2017-11-03.
2. ^ a b c d Symantec Security Response (2012-08-16). "The Shamoon Attacks". Symantec. Retrieved 2012-08-19.
3. ^ a b c Jose Pagliery (2015-08-05). "The inside story of the biggest hack in history". Retrieved 2012-08-19.
4. ^ Iain Thompson (2012-08-17). "Exhibitionist Shamoon virus blows PCs' minds". The Register. Retrieved 2017-11-03.
5. ^ Tim Sandle (2012-08-18). "Shamoon virus attacks Saudi oil company". Digital Journal. Retrieved 2012-08-19.
6. ^ "Shamoon virus targets energy sector infrastructure". BBC News. 2012-08-17. Retrieved 2012-08-19.
7. ^ Nicole Perlroth (2012-10-23). "Cyberattack On Saudi Firm Disquiets U.S." The New York Times. pp. A1. Retrieved 2012-10-24.
8. ^ Elinor Mills (2012-08-30). "Virus knocks out computers at Qatari gas firm RasGas". CNET. Retrieved 2012-09-01.
9. ^ "Computer virus hits second energy firm". BBC News. 2012-08-31. Retrieved 2012-09-01.
10. ^ a b GReAT (2012-08-16). "Shamoon the Wiper — Copycats at Work". Archived from the original on 2012-08-20. Retrieved 2012-08-19.
11. ^ a b Seculert (2012-08-16). "Shamoon, a two-stage targeted attack". Seculert. Archived from the original on 2012-08-20. Retrieved 2012-08-19.CS1 maint: unfit url (link)
12. ^ a b Symantec Security Response (2016-11-30). "Shamoon: Back from the dead and destructive as ever". Symantec. Retrieved 2016-12-06.
13. ^ Reuters Staff (2017-01-23). "Saudi Arabia warns on cyber defense as Shamoon resurfaces". Reuters. Retrieved 2017-01-26.
14. ^ Mackenzie, Heather (2012-10-25). "Shamoon Malware and SCADA Security – What are the Impacts?".
15. ^ Sean Gallagher (2016-12-01). "Shamoon wiper malware returns with a vengeance". Ars Technica. Retrieved 2017-07-03.
16. ^ Nicole Perlroth (2012-08-24). "Among Digital Crumbs from Saudi Aramco Cyberattack, Image of Burning U.S. Flag". Bits. The New York Times. Retrieved 2017-07-03.
17. ^ Cutting Sword of Justice (2012-08-15). "Pastie:'Untitled'". Retrieved 2017-11-03.
18. ^ a b c Christina Kubecka (2015-08-03). "How to Implement IT Security after a Cyber Meltdown". Retrieved 2017-11-03. (PDF slides, YouTube video)
19. ^ "Saudi Aramco hug, another one". 2012-08-29. Retrieved 2017-11-03.
20. ^ Wolfgang Gruener (2012-08-18). "Cyber Attack: Shamoon Malware Infects, Steals, Wipes MBR". Tom's Hardware. Retrieved 2017-03-22.
21. ^ Eugene Kaspersky (2017-03-06). "StoneDrill: We've Found New Powerful "Shamoon-ish" Wiper Malware – and It's Serious". Retrieved 2017-11-03.
|
# Bank of Calcutta
The **Bank of Calcutta** (a precursor to the present State Bank of India) was founded on 2 June 1806, mainly to fund General Arthur Wellesley's wars against Tipu Sultan and the Marathas. It was the tenth oldest bank in India and was renamed **Bank of Bengal** on 2 January 1809.
## History
The bank opened branches at Rangoon (1861), Patna (1862), Mirzapur (1862), and Benares (1862). When it became known that the bank intended to open a branch at Dacca, negotiations began that resulted in Bank of Bengal in 1862 amalgamating The Dacca Bank (1846). A branch at Cawnpore followed.
## Famous Customers
Among the bank's renowned customers were scholar and politician Dadabhai Naoroji, scientist Jagadish Chandra Bose, India's first President Rajendra Prasad, Nobel laureate Rabindranath Tagore, and educationalist Ishwar Chandra Vidyasagar.
## Work
The bank was risk averse and would not lend for more than three months, leading to local businessmen, both British and Indian, launching private banks, many of which failed. The most storied bank failure was The Union Bank (1828) founded by Dwarakanath Tagore in partnership with British companies.
The Bank of Calcutta, and the two other Presidency banks — the Bank of Bombay and the Bank of Madras — amalgamated on 27 January 1921. The reorganized banking entity assumed the name Imperial Bank of India. The Reserve Bank of India, which is the central banking organization of India, in the year 1955, acquired a controlling interest in the Imperial Bank of India and the Imperial Bank of India was renamed on 30 April 1955 as the State Bank of India.
## Further reading
## InfoBox
Bank of Bengal
| Formerly | Bank of Calcutta |
| --- | --- |
| Industry | Banking, financial services |
| Founded | 2 June 1806 (2 June 1806) |
| Defunct | 27 January 1921 (27 January 1921) |
| Fate | Merged with Bank of Bombay and Bank of Madras |
| Successor | Imperial Bank of India |
| Headquarters | Calcutta, Bengal Presidency, British India |
| Area served | British India |
|
# Question
Title: Batch Processing : Design check with SRP and OCP prinicple
I have to create a batch process which reads data from DB , process it and saves it in db . The batch data is fetched organization wise ( each organization has set of data to be processed) at once.We need to process only specific set of data i.e organization related and save it into db. Hence i have designed below classes . Does this design breaks SRP and OCP?
Should the process method in DepositProcess have the code to iterate the batch data ?
Batch Processor Interface
```
package com.ibank.batch;
public interface BatchProcessor {
public void process();
}
```
Deposit Processort class
```
package com.ibank.batch;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Set;
import com.ibank.batch.svc.DepositBatchProcessorSvc;
public class DepositProcessor implements BatchProcessor {
@Override
public void process() {
DepositBatchProcessorSvc svc = new DepositBatchProcessorSvc();
HashMap<String, List<String>> batchData = svc.fetchBatchData();
Set<String> key = batchData.keySet();
Iterator<String> keyItr = key.iterator();
while (keyItr.hasNext()) {
String organizationId = (String) keyItr.next();
List<String> claimsList = batchData.get(organizationId);
svc.saveBatchData(claimsList);
}
}
}
```
Service interface and implementation class
```
package com.ibank.batch.svc;
import java.util.List;
public interface BatchProcessorSvc {
public Object fetchBatchData();
public <T> void saveBatchData(List<T> data);
}
package com.ibank.batch.svc;
import java.util.HashMap;
import java.util.List;
public class DepositBatchProcessorSvc implements BatchProcessorSvc {
@Override
public HashMap<String, List<String>> fetchBatchData() {
return null;
}
@Override
public <String> void saveBatchData(List<String> claimList) {
}
}
```
DAO interface and implementation
```
package com.ibank.batch.dao;
import java.util.List;
public interface BatchProcessorDao {
public Object fetchBatchData();
public <T> void saveBatchData(List<T> data);
}
package com.ibank.batch.dao;
import java.util.HashMap;
import java.util.List;
public class DepositBatchProcessorDao implements BatchProcessorDao {
@Override
public HashMap<String, List<String>> fetchBatchData() {
return null;
}
@Override
public <String> void saveBatchData(List<String> claimList) {
}
}
```
# Answer
Quick question, have you tried testing your code? Trying doing so, and you will find the leaks in your code.
1. `DepositProcessor` has a high dependency on `DepositBatchProcessorSvc`, why not to inject it and make the code flexible (easier to test and change).
```
public class DepositProcessor{
private final DepositBatchProcessorSvc service;
DepositProcessor(DepositBatchProcessorSvc service){
this.service = service;
}
}
```
2. `BatchProcessorSvc` could be totally generified,
```
/*K type of the object's promary key, and T is the object type*/
public interface BatchProcessorDao<K,T> {
@Override
Map<K, List<T>> fetchBatchData();
}
```
3. Always try to return interfaces and not implementations, ex:
```
HashMap<String, List<String>> fetchBatchData()
```
could be refactored to
```
Map<String, List<String>> fetchBatchData()
```
4. `Save` should never be `fire and forget`, I know a lot of db clients do it, but it is really bad, I need to know if things were saved successfully, wishful programming is bad, you could return the objects after saving them
```
List<T> saveBatchData(List<T> data);
```
> 3 votes
# Answer
Looks like a quite solid code with some good design and space to impelement your own code which I like. I'ld add the @FunctionalInterface to the BatchProcessor, so you can use Lambda-Code (Java8).
But there's one thing I dont really get. Why does the BatchProcessor not take a SVC Parameter instead of using your default, so you can control it. Otherwise that wouldn't make much sence.
Written on my Phone, so excuse Typos please.
> 1 votes
---
Tags: java, object-oriented
---
|
Beginning all time PR: 440
1RM before Coan: 415
Heaviest single pulled after Coan: 450
Bodyweight: 180lbs
Concise training history: Worked up to 440 (200kg) deadlift through retard programming and pulling heavy as balls every week, suffered an ab injury that put me out of commission and set my deadlift back to about 405, worked my deadlift back up to 435 (although for the record, that was pulled on a deadlift bar which felt much easier than 435 felt/feels with my normal bar), began 5/3/1 and worked up to a 380x10 deadlift, tried to test my max and failed to break 425 off of the floor. Began Coan/Phillipi.
For the program I put my current max as 440 (which, apparently current max only effects what weight you will be shrugging so not checking my ego in this regard ultimately didn't hurt me whatsoever) and my desired max as 475. Yeah I know this was a 60lb jump from what I could actually walk in and pull, but I was working under the assumption that the strength I had would come back quickly.
Review of the program:
Weeks 1-4 consist of working up to a heavy double (and the learning curve here is steep as *FUCK*. You go from a piss easy double to a damn near 1RM double within 4 weeks), followed by lots and lots and lots of heavy speed pulls and a ball busting circuit (SLDLs, rows, supine lat pulldowns, good mornings 3x8) all with specified rest periods. These 4 weeks fucking suck and the circuit put me on the fucking floor. However, it did its job and on week 4 I pulled a 430 double (which was over my 1RM before I began the program - my theory worked!)
For week 5 the weight resets to a light-ish 3x3 and from there the speed sets get cut down, and the assistance stops being a circuit and switches to 2-3 sets of 5, all while you're working your pull up to a heavy double and ultimately extremely heavy singles. It is also during this period that power shrugs are added, based on what you put as your current 1RM. You match your week 4 double on week 7 exceed it on week 8, and weeks 9 and 10 are spent pulling one heavy single with minimal assistance.
Ultimately I "failed" on week 7, only hitting one rep of the 450lb double I was supposed to get to continue the program. I blame this entirely on myself choosing such a high desired 1RM. I am extremely confident that I can pull 465, but my body has taken such a beating over the past 8 weeks that I am choosing to instead take a week off of deadlifting, reset the program and work my way back up.
Verdict: The program worked extremely well, giving me a 35lb increase on my 1RM going into the program, as well as a 10lb all time PR.
Complaints: I only have two complaints. Firstly that this program beats you into the fucking ground, although this can probably be offset by choosing a realistic goal weight, which I did not do. Secondly that the power shrugs seem completely pointless. Previously I had power shrugged 585x3, and this program had me doing 2x5 with high 200s and low 300s. Even strapless and with extremely strict form, this was piss easy and I fail to understand the point.
Final thoughts: Check your ego and follow the circuit and rest times to a T and you will reap the benefits.
|
# Question
Title: Generic HTTP using Android Asynctask
I have developed a generic HTTP functionality using Android Asynctask and Apache HTTP client. Please review the code and let me know if it is the right way of doing or there are other ways to achieve it.
**`Async` class**
```
public class HTTPAsyncTask extends AsyncTask<String, Void, String> {
private CallBack mCb;
HashMap<String, String> mData = null;
List<NameValuePair> mParams= new ArrayList<NameValuePair>();
String mTypeOfRequest;
String mStrToBeAppended = "";
boolean isPostDataInJSONFormat = false;
JSONObject mJSONPostData = null;
public HTTPAsyncTask(CallBack c, HashMap<String, String> data, JSONObject jsonObj, String request) {
mCb = c;
mTypeOfRequest = request;
mJSONPostData = jsonObj;
if((data != null) && (jsonObj == null)){
mData = data;
if(mTypeOfRequest.equalsIgnoreCase("GET")){
Iterator<String> it = mData.keySet().iterator();
while(it.hasNext()){
String key = it.next();
mParams.add(new BasicNameValuePair(key, mData.get(key)));
}
for (int i = 0; i<mParams.size()-1; i++){
mStrToBeAppended+= "?" + mParams.get(i).getName() + "=" + mParams.get(i).getValue() + "&";
}
//add the last parameter without the "&"
mStrToBeAppended+= "?" + mParams.get(mParams.size()-1).getName() + "=" + mParams.get(mParams.size()-1).getValue();
}
if(mTypeOfRequest.equalsIgnoreCase("POST")){
Iterator<String> it = mData.keySet().iterator();
while(it.hasNext()){
String key = it.next();
mParams.add(new BasicNameValuePair(key, mData.get(key)));
}
}
}
if ((mData == null) && (jsonObj != null)){
isPostDataInJSONFormat = true;
}
}
@Override
protected String doInBackground(String... baseUrls) {
publishProgress(null);
if(mTypeOfRequest.equalsIgnoreCase("GET")){
String finalURL = baseUrls[0]+ mStrToBeAppended;
return HttpUtility.GET(finalURL);
}
if (mTypeOfRequest.equalsIgnoreCase("POST")){
if(isPostDataInJSONFormat == false){
return HttpUtility.POST(baseUrls[0],mParams );
}
else {
return HttpUtility.POST(baseUrls[0], mJSONPostData);
}
}
return null;
}
// onPostExecute displays the results of the AsyncTask.
@Override
protected void onPostExecute(String result) {
mCb.onResult(result);
}
@Override
protected void onProgressUpdate(Void...voids ) {
mCb.onProgress();
}
}
```
**`HTTPUtility` Class**
```
public class HttpUtility {
public static String GET(String url){
InputStream inputStream = null;
String result = "";
try {
// create HttpClient
HttpClient httpclient = new DefaultHttpClient();
// make GET request to the given URL
HttpResponse httpResponse = httpclient.execute(new HttpGet(url));
// receive response as inputStream
inputStream = httpResponse.getEntity().getContent();
// convert inputstream to string
if(inputStream != null){
result = convertInputStreamToString(inputStream);
//inputStream.close();
}
else
result = "Did not work!";
} catch (Exception e) {
Log.d("InputStream", e.getLocalizedMessage());
}
return result;
}
public static String POST(String url, List<NameValuePair> mParams){
InputStream inputStream = null;
String result = "";
try{
HttpClient httpclient = new DefaultHttpClient();
HttpPost post = new HttpPost(url);
post.setEntity(new UrlEncodedFormEntity(mParams, "UTF-8"));
HttpResponse httpResponse = httpclient.execute(post);
// receive response as inputStream
inputStream = httpResponse.getEntity().getContent();
// convert inputstream to string
if(inputStream != null){
result = convertInputStreamToString(inputStream);
//inputStream.close();
}
else
result = "Did not work!";
} catch (Exception e) {
Log.d("InputStream", e.getLocalizedMessage());
}
return result;
}
public static String POST(String url, JSONObject obj){
InputStream inputStream = null;
String result = "";
HttpClient httpclient = new DefaultHttpClient();
try{
HttpPost post = new HttpPost(url);
post.setHeader("Content-type", "application/json");
StringEntity se = new StringEntity(obj.toString());
se.setContentEncoding(new BasicHeader(HTTP.CONTENT_TYPE, "application/json"));
post.setEntity(se);
HttpResponse httpResponse = httpclient.execute(post);
// receive response as inputStream
inputStream = httpResponse.getEntity().getContent();
// convert inputstream to string
if(inputStream != null){
result = convertInputStreamToString(inputStream);
}
else
result = "Did not work!";
} catch (Exception e) {
Log.d("InputStream", e.getLocalizedMessage());
}
return result;
}
public static String convertInputStreamToString(InputStream inputStream) throws IOException{
BufferedReader bufferedReader = new BufferedReader( new InputStreamReader(inputStream));
String line = "";
String result = "";
while((line = bufferedReader.readLine()) != null)
result += line;
inputStream.close();
return result;
}
}
```
**`Callback` interface**
```
public interface CallBack {
public void onProgress();
public void onResult(String result);
public void onCancel();
}
```
**Main activity class**
**Inside the activity class**
```
final CallBack c = new CallBack(){
@Override
public void onProgress() {
// TODO Auto-generated method stub
mProgressDialog.show();
}
@Override
public void onResult(String result) {
// TODO Auto-generated method stub
mProgressDialog.dismiss();
mStrResult = result;
Toast.makeText(getApplicationContext(), mStrResult, Toast.LENGTH_SHORT).show();
}
@Override
public void onCancel() {
// TODO Auto-generated method stub
}
};
```
And then the Asynctask is called inside the Activity like the following:
```
//For JSON Postdata
String url= "Your URL"
JSONObject postData = new JSONObject();
postData.put(Key1, Data1);
postData.put(Key2, Data2);
HTTPAsyncTask asyncTask = new AsyncTask(mContext,mCallback, null, postData, "POST");
asyncTask.execute(url);
//For Get data
String url = "Your URL";
HashMap getData = new HashMap<Object, Object>();
getData.put("Key",Data);
getData.put("Key",Data));
mGetGCMMessageAsyncTask = new HTTPAsyncTask(mContext, mCallback, getData, null, "GET");
mGetGCMMessageAsyncTask.execute(url);
```
# Answer
> 3 votes
I'll go over quickly with the minors generals things :
* You should remove `TODO Auto-generated method stub` when you implemented the method.
* You should always put a modifier for your class variable.
* Don't use the implementation of a class, use the interface `Map` instead of `HashMap`
* I don't like the `mVariableName` notation. (this is subjective)
---
An HTTP Get and Post are very two different things, don't try to mix them up in the same method. It feels to me like you're `HTTPAsyncTask` should be separated with one abstract class that encapsulate the common code and two implementation with `HTTPAsyncTaskGet` and `HTTPAsyncTaskPost`. This would remove one argument to the constructor, better represent the differences between get/post and would help remove duplicate code. You will need to modifiy the implementation of `doInBackground` but this should simple and will help this method shine with simplicty by removing the `if(mTypeOfRequest.equalsIgnoreCase("POST"))` conditions. This would be your basic constructor :
```
public HTTPAsyncTask(CallBack c, HashMap<String, String> data, JSONObject jsonObj) {
mCb = c;
mTypeOfRequest = request;
mJSONPostData = jsonObj;
mData = data;
if ((mData == null) && (jsonObj != null)){
isPostDataInJSONFormat = true;
}
}
```
And with your other class you would have :
```
public HTTPAsyncTaskGet(CallBack c, HashMap<String, String> data, JSONObject jsonObj) {
super(c,data,jsonObj);
if((data != null) && (jsonObj == null)){
Iterator<String> it = mData.keySet().iterator();
while(it.hasNext()){
String key = it.next();
mParams.add(new BasicNameValuePair(key, mData.get(key)));
}
for (int i = 0; i<mParams.size()-1; i++){
mStrToBeAppended+= "?" + mParams.get(i).getName() + "=" + mParams.get(i).getValue() + "&";
}
//add the last parameter without the "&"
mStrToBeAppended+= "?" + mParams.get(mParams.size()-1).getName() + "=" + mParams.get(mParams.size()-1).getValue();
}
}
}
```
The high number of arguments for a method is something that must point you to something smelly. It's hard to have high readability when you have a tons of arguments. There is one case where you need `data != null` and one case `jsonObj != null`. You should then redefines your constructor to take one or the other, not both. Yes you will probably have more line of codes, but it will be readable. Every constructor will look unique and will have less complexity if you remove those if. Exemple :
```
public HTTPAsyncTaskGet(CallBack c, JSONObject jsonObj) {
super(c,null,jsonObj);
}
```
---
You should not recreate a `new DefaultHttpClient();` for every request. You should always try to use the same client. This will help for performance concern and will reduce the complexity of encountering bugs for various reasons (too much connections open, etc).
> ```
> try{
> HttpClient httpclient = new DefaultHttpClient();
> HttpPost post = new HttpPost(url);
> post.setEntity(new UrlEncodedFormEntity(mParams, "UTF-8"));
> HttpResponse httpResponse = httpclient.execute(post);
>
> // receive response as inputStream
> inputStream = httpResponse.getEntity().getContent();
>
> // convert inputstream to string
> if(inputStream != null){
> result = convertInputStreamToString(inputStream);
> //inputStream.close();
> }
>
> else
> result = "Did not work!";
> } catch (Exception e) {
> Log.d("InputStream", e.getLocalizedMessage());
> }
>
> ```
This is very prone to errors. You need to always consume the content of the entity, even in case of failure, or your connection won't close and you'll run into problems. Always make sure that you consume your entity. You can use `EntityUtils.consume(HttpEntity)`.
# Answer
> 4 votes
Use a **code formatter**, one is probably included in your editor. \[ctrl+shift+f\] in eclipse
**Avoid setting variables to null.** This turns off warnings and errors and allows you to make mistakes otherwise not possible!
Declare **variables** as **late** as possible.
Use **final** where applicable,
```
final String mTypeOfRequest;
```
Strings can contain anything. But you have only **2 values** (get/post). Consider using a **boolean** useGet.
Constructor and methods **checks** ("if") **same value**. Consider using **different classes**. One for each "if" outcome. One for get and one for post.
Move the **constructor logic** to separate method **static "constructor" method** to ease testing (easy to create object with different contents).
**Return** as **soon** as you have done what you want to do. Saving the value for later is confusing at best. All good editors will highlight all exit paths from
**Don't return garbage** data where you expect good data. Change
```
result = "Did not work!";
```
to
```
return ""; or throw a checked exception
```
---
Tags: java, android, asynchronous, http
---
|
Karmanos stresses safety with closed drug-mixing system
Photo by Patricia A. Ellis / Barbara Ann Karmanos Cancer Institute Maha Bazzi, certified pharmacy technician at the Barbara Ann Karmanos Cancer Institute, mixes chemotherapy drugs using the EquaShield device, which has special safety features that prevent exposure to toxic drugs.
"We use closed-system transfer devices in the preparation of chemotherapy and hazardous medications that prevents the drug from being aerosolized and exposing hazardous drug compounds" to people in the hospital, said Steve Smith, Karmanos' executive director for pharmacy services.
Smith said with up to 50,000 doses administered each year, the danger is too great of hazardous chemicals floating into the air or sticking on surfaces and coming into contact with the hospital's 60 lab workers and dozens of other people admitted to or visiting the hospital.
Exposure to the vapors, residues and needle jabs from various chemotherapy drugs can cause skin conditions, infertility, birth defects, leukemia and other cancers, said the Centers for Disease Control and Prevention.
Steve Smith
Starting in the early 2000s, Karmanos — and many other cancer centers, pharmacies and oncology medical practices — began to use closed-system mixing devices to reduce exposure and improve occupational and customer safety, Smith said.
"Prior to 2001, we mixed drugs in an IV (intravenous) compounding hood without any containment devices" to transfer the drugs from a vial to a syringe and then into an infusion bag, said Smith. "Technology came into the marketplace that allowed us to contain the drugs."
Smith said Karmanos was one of the first hospitals in the nation to purchase the medical devices that mechanically prevent both the transfer of contaminants into the chemotherapy drugs and prevent vapors or residue from leaving the system.
Over the past four years, Karmanos has been using a device manufactured by EquaShield LLC, a Tefen, Israel-based company with a distribution office in Port Washington, N.Y.
The EquaShield device is a medication vial fitted with an adapter that connects to a specially designed syringe that then, via another adapter, connects to the infusion bag.
"This is part of our program to monitor the environment every six months," Smith said. "We measure in nanograms. There is no scientific data to show how much exposure is dangerous. We want to be careful and are constantly looking for technology that is tight and look to decrease the exposure."
Smith said Karmanos has experienced a 20 percent decrease in costs over the last four years by using the devices. He declined to discuss annual costs.
"Because EquaShield is a more self-contained device, it's easier to use, easier to store and takes less storage, and there is less waste. All of these factors impact efficiencies," Smith said.
Marino Kriheli, inventor of EquaShield and company co-owner, told Crain's EquaShield has several hundred hospital and oncology medical group customers.
Besides Karmanos, hospital customers include the Cleveland Clinic and Mount Sinai Hospital in New York City, Kriheli said.
"Hospitals take special measures to restrict and keep everything safe and enclosed, but you still find traces of drugs in offices and departments, places where these drugs were never used," Kriheli said.
Kriheli said EquaShield has been growing at a 60 percent annual rate since its founding in 2010. Its founding company is Plastmed Ltd., a Tefen, Israel-based medical device maker that Kriheli also co-owns.
The single-use EquaShield medical device costs about $8 per administration. Karmanos spends at least $320,000 to $400,000 for the system, based on its annual 40,000 to 50,000 doses administered.
Kriheli declined to provide an average price for the device.
"Only 20 percent to 30 percent of hospitals that mix hazardous medications used closed systems," he said. "The costs are negligible compared with the risks involved. You have problems and end up (paying out) much higher numbers" when people get sick.
|
The Agriculture Drone and UAS Technology
By Hal Simmons • Updated: 03/03/21 • 6 min read
All agriculture drones can have GPS navigation, a digital camera, a video recorder, and sensors to measure air pressure, temperature, humidity, and light levels. In agriculture, drones are regarded as unmanned aircraft systems (UAS) and can be used for multiple purposes. The UAS technology has been improving over the years, enabling several drone models to be introduced that precisely fit agricultural purposes.
The main advantages drones present over human observation include the ability to cover large areas and the convenience. Drones can fly more efficiently and with less cost and can be programmed to survey large areas repeatedly, daily, or at any other chosen interval. Agriculture Drones can be a valuable asset to a farmer.
The FAA has approved more than 1,400 requests from farmers and businesses to fly drones for agricultural purposes. Some drones can lift heavy payloads such as these drones.
Aerial views can efficiently distribute their payloads of water, and the agricultural supply trucks and environmental workers can identify locations needing improvements. These services can aid in increasing crop yield. They prevent loss due to either excess moisture or a lack thereof and crop growth and maintenance.
Drones are used for detecting early signs of drought or floods in the field. The information obtained from pictures/videos taken with drones can be analyzed and utilized for planning water, harvesting, or anti-flooding operations. Drones can find problems with the irrigation systems within fields. Farmers can use all of this information to plan repairs or replace such systems to enhance their functionality.
Drones are equipped with cameras and provide pictures or videos of the crop, which farmers can analyze and evaluate.
Some images/videos of crops can be used for advanced analysis and promotion, while others may solely be intended for study. These images/videos help farmers improve their crop yield, achieve better development levels, and increase profitability.
It has been reported in the worldwide market for agricultural UAS is projected to grow at a CAGR of 21.1%. The projection is between 2015 and 2020. During this time, it will attain a valuation of US $12.9 billion.
Agriculture drones are dependent on several factors, including environmental conditions like rainfall, sunlight, and temperature. These factors can severely affect the growth and development of crops. These requirements may change due to farmers’ agricultural practices, and thus, drones are extensively used to analyze such parameters.
Drones have been useful for monitoring large fields of crops. Drones can provide pictures/videos from a bird’s eye view, helping farmers determine whether their crops are growing as per their expectations. This information can be used effectively to create strategies and for crop planning to improve crop yield and development levels.
Drones can be used to monitor the field for weeds and other problems. These images/videos can be analyzed and compared with earlier images. Farmers can decide on crop spraying or any other appropriate method of eliminating such issues.
Drones are also helpful for crop spraying operations. These devices can be used to monitor crop spraying operations and ensure that the entire field is being evenly sprayed without any overlaps or gaps. This information can be utilized for creating strategies to improve the efficiency of crop spraying.
Drones are used for crop protection to identify the level of infestation by pests and parasites. Farmers also analyze the images and videos from drones to be sure the insect infestation is being reduced. The photos determine if any crop is having a problem. They also help the farmer look for additional threats from other pests or parasites. This information can be utilized for crop treatment applications such as spraying a pesticide or an insecticide.
Additionally, drones have been used to measure the amount of nitrogen, phosphorous, and potassium present in soils of crops to assess nutrient levels. These images are utilized for creating strategies for the application of fertilizers or other fertilizing substances.
Drones can also be used to deliver fertilizers and pesticides efficiently. Fertilizing or applying pesticides can be done by placing these substances in the drone and then applying them to the field from a height, reducing the number of pollutants being released.
The images obtained from the agriculture drone are used to identify the location of fields with low crop growth to ensure that such areas are given priority during crop harvesting.
The videos taken from the drone using cameras can be used to determine the crop’s ripeness, which can then be utilized to plan the harvesting operations. Or predict when it’s appropriate to start applying fertilizers and pesticides.
Drones are also helpful in measuring temperatures at various parts of the field. Farmers use this temperature measurement information to decide on the proper time for sowing or irrigation purposes.
Drones can also be utilized to determine yields since they can calculate areas in square meters by detecting lines formed by crops.
Drones may also be used for spotting predators that are attacking livestock within the farm. Drones have identified animals and birds that have been known to attack and eat livestock within the field. In such cases, drones can be used to detect such instances of the predators and monitor the activity. The exact location can help the game wardens to take the needed measures to reduce the predator population.
Many farmers often plant their crops in remote areas. In such cases, it is difficult for farmers to check their crops’ progress regularly. Drones that can carry out aerial imaging help these farmers monitor potential problems, crop growth, and pollution levels. These images can also detect various facilities within the premises, allowing proper planning for future development needs.
Conclusion about Agriculture Drone
Most drones used for agricultural purposes are equipped with cameras for obtaining images/videos of crop growth and maintenance. These images/videos help farmers improve their crop yield, achieve better development levels, and increase profitability.
In the United States, many farmers are purchasing or leasing drones to survey farms for crop damage. USDA has reported that a growing number of farmers have begun using drones to remedy problems due to a lack of resources.
The UAS technology has been improving over the years, which enabled several drone models to be introduced that specifically fit agricultural purposes.
Hal Simmons
When I first started flying drones I was always afraid of damaging my drone. I would always be thinking what if. I questioned myself often and as a result it made me question various aspects of flying drones. In the process I learned a lot. This is why I feel I have a lot of information that will be helpful to beginners and intermediate drone enthusiasts. Of course I still have a lot to learn so join me on this journey and I am sure you will enjoy the adventure ahead of us.
|
How to Free Your Brain: Time-Management Tips from a Neuroscientist
The key to effective time management is to maintain a level of organization that allows you to dedicate less and less neural resources to running your life.
Daniel Levitin: My top time-management tips are: Calendar everything. Use your calendar in a very active way. Everything goes in there that is at least remotely time-bound. So for example, the doctor says that she wants to see you again in a year and she gives you a little blood test requisition form; this can become three calendar entries. Obviously the doctor's appointment a year from now, but then call the lab and find out how long it's going to take them to process the lab collection so that it can get to the doctor in time. And then that becomes a calendar entry when you have to go to the lab. And then figure out how long in advance you can call the lab for an appointment to drop in. That's the third entry. Now you're leaving nothing to chance. And I want to emphasize: I'm not talking about organizing your time to the point that you become a Spock-like automaton or Lieutenant Commander Data automaton; the idea is that if you don't have to think about things like this, you're freeing up neural resources that you can dedicate to the things you really care about.
A lot of people overschedule. They're more ambitious in what they think they'll get done than they really can. And so, on the fly as things pop up they'll say, "Oh well I can't really do that now or I'm not going to do that now." What I advocate is being more deliberate about this. You choose what it is that are going to be your priorities. And the way that I recommend is to get index cards and put one task on each card and then you can re-organize them throughout the day. You can put this one here and this one here. The beauty of this is that once you've prioritized everything that you have to do, whatever is on that top card, that's the thing that is the most important thing you should be doing. And so you find that your mind doesn't wander; you're more efficient and productive because you really focused on that.
Now, that most important thing might not even be: "Complete the Penske file." It might be, "Work on the Penske file for an hour and a half today and then go to the second card." But it allows you to control your workflow, and not just workflow, but your social time, your errands, your leisure time, your hobbies; those all go in the stack too. It allows you to control them rather than the environment controlling you.
There's this theory in behavioral economics called hyperbolic discounting. And it has to do with the way we see future events. And it applies to the way we schedule our time. If somebody asks you to do something a year from now, you think, "Oh that's so long from now and I've got nothing else on my calendar; sure I'll do it." But then a year from now you're probably going to be just as busy and overstretched and stressed out as you are today so you haven't really realized it. You've discounted the impact of it. It's called hyperbolic because of the shape of the mathematical function. I think the idea is it's important to say no to things that you really don't want to do and to allow yourself time every day for spontaneity and creativity and doing things that you really care about. If you don't get a little of that each day, you wake up one morning and you realize that for six months you've just been slogging and nothing enjoyable has happened.
According to neuroscientist Daniel Levitin, the key to effective time management is to maintain a level of organization that allows you to dedicate less and less neural resources to running your life. This means making good use of a calendar and developing routines. It also means having the courage not to overschedule yourself. Know your limits. Assess your priorities. Embrace a system.
Levitin is the author of several New York Times best-sellers including his latest, The Organized Mind.
A dark matter hurricane is crashing into Earth
Giving our solar system a "slap in the face"
Surprising Science
• Scientists are excited to set their particle detectors at the onslffaught
Keep reading Show less
Surprising Science
Keep reading Show less
New study reveals what time we burn the most calories
Once again, our circadian rhythm points the way.
Photo: Victor Freitas / Unsplash
Surprising Science
Keep reading Show less
|
# David W. Carter High School
**David Wendel Carter High School** (commonly referred to as **Dallas Carter**) is a public high school located in the Oak Cliff area of Dallas, Texas, United States. The school is a part of the Dallas Independent School District and is classified as a 4A school by the UIL. In 2015, the school was rated "Met Standard" by the Texas Education Agency.
## History
The school was built in 1965 and is named after David Wendel Carter, a doctor and member of the DISD school board. He served on the school board for 25 years, from 1925 to 1950, longer than any other member. Carter also served as the school board's president for 16 years. The school graduated its first class of seniors in 1968.
The school initially drew students from Justin F. Kimball High School; the two schools maintain a highly competitive rivalry to this day. The two schools face each other annually in football as "The Oak Cliff Super Bowl."
In 2005, after the closure of the Wilmer-Hutchins Independent School District, Carter absorbed some WHISD high school students.
In 2011 the district re-opened Wilmer Hutchins High School. Some former WHISD zones covered by Carter were rezoned to Wilmer-Hutchins.
## Athletics
The David W. Carter Cowboys compete in the following sports: The exploits of the football team, specifically the 1988 football team that won the 5A state title, was the subject of two films and they are mentioned at the end of the novel *Friday Night Lights: A Town, a Team, and a Dream*, which was a chronicle of Permian High School that lost to Carter in the semifinals that year. The Cowboys won 31-14 in the championship game over the Judson Rockets of Converse, before academic violations stripped the title from Carter and gave it to Judson. In addition to finishing as state semifinalist in 1971, 1974, 1982, and 1990, the team reached the playoffs in every year from 1990 to 2010.
## Feeder patterns
As of 2006, William H. Atwell and D. A. Hulcy Middle School feed into David W. Carter High School.
Adelle Turner, Mark Twain Vanguard, and T. G. Terry Elementary Schools feed into William H. Atwell Middle School, and Birdie Alexander, Umphrey Lee, Ronald E. McNair, and Martin Weiss Elementary Schools feed into D. A. Hulcy Middle School, all of which ultimately feed into David W. Carter High School.
## Notable alumni
## Notable faculty
* Carter High, a movie based on Carter's 1988 football team.
## InfoBox
| David W. Carter High School | |
| --- | --- |
| Address | |
| | |
| 1819 West Wheatland Road<br>Dallas, Texas 75232<br>United States | |
| Coordinates | 32°38′54″N 96°50′54″W / 32.6483°N 96.8482°W / 32.6483; -96.8482 |
| Information | |
| Type | public, secondary |
| Opened | 1966 |
| School district | Dallas Independent School District |
| Principal | Troy A. Tyson |
| Faculty | 185 |
| Teaching staff | 69.48 (FTE) |
| Grades | -12 |
| Number of students | 1,082 (2022-23) |
| Student to teacher ratio | 15.57 |
| Color(s) | Columbia Blue White Red |
| Mascot | Cowboys |
| Trustee dist.<sup> </sup> | 6, Joyce Foreman |
| Learning Community <sup> </sup> | Central Network, Deardra Hayes-Whigham |
| Website | dallasisd.org/carter |
|
How to delegate to UAPs
Cox, Susan S. RN, CNS, MSN
Follow these guidelines to safe and legal delegation.
Susan S. Cox is a member of the Huron School of Nursing's nursing faculty in East Cleveland, Ohio.
Article Outline
You probably count on unlicensed assistive personnel (UAPs) to help you care for your patients. As an RN or LPN, however, you're ultimately responsible for your patients, even when you've delegated some of their care to a UAP.
To delegate legally, safely, and effectively, you need to know a few rules. Before handing off duties to UAPs, check the following five points to make sure you're meeting your responsibilities.
1. State laws. Make sure you know the scope of your own practice. The laws that govern your practice as a licensed nurse are the legal foundation for any decisions you make about delegating work to others. Contact the state board of nursing to find out what laws govern nursing practice where you're working. In general, you can't legally delegate activities that require advanced education to a UAP; similarly, activities that require a judgment based on analysis of data are beyond a UAP's scope of practice. When delegating to a UAP, put the emphasis on tasks, not thought processes.
2. Policies and procedures. Review your facility's written policies on delegation and compare its expectations with the legal requirements of the nurse practice act. They should be in agreement, but if you find a conflict, seek clarification. To keep your license safe, remember that the nurse practice act supersedes employer policy.Make sure you have answers to these questions:
* What hiring policies does the facility have for UAPs? For example, if state-tested nursing assistants (STNAs) are available in your state, does the facility hire only STNAs?
* How are new UAPs oriented to their job? For example, is a UAP observed and evaluated for her ability to perform assigned tasks? Are follow-up evaluations scheduled? If so, at what intervals?
* What resources are available if a UAP needs more training?
* Are all UAPs expected to have the same responsibilities for patient care or do responsibilities differ by unit, experience, or training?
* Is a union involved? If so, what are its requirements and expectations regarding delegation?
3. UAPs. Get to know your UAPs as individuals. Learning each person's abilities will help you delegate safely and effectively.
4. Patients. Whether or not a task can be appropriately delegated may depend on your patient's condition rather than the task itself. For example, you might reasonably ask a UAP to help a stable, ambulatory patient to the bathroom. But asking him to assist an unstable patient by himself wouldn't be appropriate.In general, simple, routine tasks such as making unoccupied beds, supervising patient ambulation, assisting with hygiene, and feeding meals can be delegated. But if the patient is morbidly obese, recovering from surgery, or frail, work closely with the UAP or perform the care yourself.Your judgment is always key because whether or not delegating care is appropriate isn't always obvious. A patient may appear to be independent, yet still need care from someone skilled in communication. For example, a patient with newly diagnosed diabetes will benefit from the teaching and support you can offer while performing hands-on care you might otherwise delegate. Although delegating this “bed and bath” to a UAP is legal and safe, it may not be in this patient's best interest.
5. Delegation and leadership. How do you motivate the UAPs who are assigned to you? One of the best ways is to assess how well they meet the current standards of care. By observing UAPs as they complete their tasks, you can determine whether they need additional training to meet the standards of care. If they're doing fine, make sure you let them know. (See A Little Praise Goes a Long Way.)
Although you need to maintain standards, you should also be flexible. Acknowledge that some things can be done more than one way. You'll foster cooperative attitudes if you act as a guide and teacher, rather than a dictator.
Just as you need to trust the UAPs assigned to you, the UAPs need to trust you. The end result will be better patient care—the one goal shared by everyone on staff.
Back to Top | Article Outline
Back to Top | Article Outline
A little praise goes a long way
Here are a few ways to motivate a UAP on your staff:
* Remind him how important he is to you and how much you depend on him. A simple “thank you” at the end of each shift, or a specific “I really appreciated it when you…” shows him how important he is to you.
* Put something in writing for his supervisor or employment file (and his next evaluation) to document a job well done.
* Follow through on what he tells you. For example, he may be the first person a patient tells about a new symptom.
* Add a personal touch. Birthday cards, cakes, or other celebrations not only are fun, but they can also help establish a sense of teamwork.
Back to Top | Article Outline
Cohen, S. Managers' fast track. Delegating vs. dumping: Teach the difference. Nursing Management. 35(10):14,18,52, October 2004.
National Council of State Boards of Nursing: Delegation: Concepts and Decision-Making Process. National Council Position Paper, 1995. Accessed online at, April 18, 2006.
National Council of State Boards of Nursing: Delegation Decision-Making Tree. 1997. Accessed online at, April 18, 2006.
Whitman, MM. Professional development. Return and report: Establishing accountability in delegation. American Journal of Nursing. 105(3):97, March 2005.
Williams JK and Cooksey MM. Navigating the difficulties of delegation. Nursing2004. 34(9):32hn12, September 2004.
© 2006 Lippincott Williams & Wilkins, Inc.
|
Your Fave is Problematic: Shark Week [Review]
Just when you thought it was safe to turn on the Discovery Channel... [source]
Just when you thought it was safe to turn on the Discovery Channel… [source]
I find sharks fascinating for the same reason a lot of other people do: I think they’re terrifying. I turn to Shark Week in order to better educate myself about that fear, and also because sharks are as amazing as they are scary. I unironically love Shark Week, but even I have to acknowledge that it has some issues. The Discovery Channel’s week-long dedication to all things toothy, Shark Week has been running since 1987, showcasing documentaries and programs about, well, sharks, from the commonly known—like the hammerhead and the perennial favorite, the great white—to more rare, like the deep sea ghost and dog sharks.
There is an inherent spectacle to sharks: they’re large apex predators who live for decades, and they sometimes attack people. Our fascination with sharks has led to their deadly side being dramatized and exaggerated in films like Jaws and Deep Blue Sea. We see sharks as violent animals, and Shark Week has always played into that assumption. This year we heard about several survival stories from people who had been attacked by sharks in I Escaped Jaws 2. But sharks hunting their natural prey can be as grisly and as exciting to watch, like great whites hunting seals off the coast of South Africa, which is the only place in the world where they leap from the water at high speeds, killing or incapacitating seals with one hit. (If you’ve never seen that before, you need to watch this right now. Go to 4:45 to see some air time.) Air Jaws: Fin of Fury was another in a long line of programs dedicated to this “Polaris breach,” as it’s called.
So, yeah, there is some sensationalism inherent in natural shark behavior—it’s the violence but also the mystery, the fact that sharks are part of a distant, alien world that’s hostile to humans. That’s why they get a week of television dedicated to them on the Discovery Channel every year for the past twenty-seven years. It’s why it’s Shark Week, and not, say, Bear Week. Shark Week weaves that sensationalism and the science together; it’s what’s made the event so successful for so long. Two of my favorite programs from this year used this approach. Monster Hammerhead and Spawn of Jaws: The Birth both relied on our fear of sharks and on our interest in them, covering spectacle and science in equal measures.
Some real-life scallopped hammerheads. [source]
Some real-life scallopped hammerheads. [source]
In Monster Hammerhead, scientists chased down fisherman stories about a twenty-foot hammerhead named Old Hitler, who supposedly had been living off the coast of Florida since World War Two. Concrete evidence that Old Hitler was real was never discovered, but in the process I learned more about Florida hammerheads than I had before. Plus, I got to laugh every time the overly serious narrator said “Old Hitler.” In Spawn of Jaws: The Birth, we followed Dr. Michael Domeier as he tried to discover where great white sharks go to give birth. He did this by tagging one of the largest female sharks on the planet and then following the signal that tag gave off for eighteen months. There was a natural tension that came from the understanding that this could be Dr. Domeier’s only chance at figuring this out, especially when the heavily pregnant shark, affectionately nicknamed Gill Rakers, went missing in the Sea of Cortez, a place rampant with illegal big shark fishing. It’s exciting to be along for the ride as a scientist discovers new information about something as iconic as a great white shark.
For both Monster Hammerhead and Spawn of Jaws: The Birth, the most artificial part of them were the titles. In fact, most of the programs this year have ridiculous names, perhaps meant to mask the more educational elements of these documentaries, instead parading them as cousins to SyFy flicks, like the popular Sharknado movies. Names like Sharkageddon, Lair of the Mega Shark, and Jaws Strikes Back make it seem like The Discovery Channel is more interested in tricking a viewership into watching what sounds like a shark/horror movie than what these shows actually are, which would be about why there has been an increase in shark attacks around the Hawaiian Islands, exploration into the night-feeding habits of great whites, and a research expedition to capture on film previously undocumented hunting behavior, respectively. Honestly, I wouldn’t care about these titles and why Discovery uses them if they weren’t indicative of a much larger problem in my beloved Shark Week.
Taking (in my opinion) a miscue from last year’s fake documentary (they call it “docufiction”) about a possible living Megalodon, Shark Week premiered this year with Shark of Darkness: The Wrath of Submarine, a found footage-style mockumentary about a tour boat wreck off of Seal Island and what happened when those survivors came up against a thirty-foot great white shark, called Submarine. In between interviews with survivors and shaky-cam footage of the “shipwreck” were testimonials and “first-hand” accounts from others who had come face-to-face with Submarine and survived. Employing bad actors and shoddy CGI, this fictional history did everything it could to create a villain out of an animal that the week was supposed to celebrate, and left me wondering why it was airing on Discovery and not SyFy, where it would feel more at home alongside other terrible shark movies like Sharktopus and Two Headed Shark Attack. And before you come after me for not liking terrible shark movies, let me just say that I love terrible shark movies. I was livetweeting Sharknado 2 alongside the rest of you. I just don’t think they belong anywhere near Shark Week.
Discovery bookends their "docufiction" with fine print claiming that events have been "dramatized." [source]
Discovery bookends their “docufiction” with fine print claiming that events have been “dramatized.” [source]
One hundred million sharks are killed every year. Most are killed for their fins, which some people find delicious, I guess. For me, Shark Week is about shedding light on an otherwise mysterious and seemingly violent creature in order to help in the conservation of sharks. If you can get someone interested in sharks and actually invest them in these complicated and fascinating animals, then they’re more likely to be vocal about protecting them. Do you know how I know this? Shark Week ran commercials with that exact message from Fin Free, a shark conservation group, all week long. Shark Week is supposed to be about making people care. It’s about de-mystifying sharks, about turning them from monsters into animals that are in dire need of our help. That message gets muddled when Shark Week opens with a two hour long fear fest all about a shark with a major sweet tooth for human.
Shark Week has been around for a long time and it’s had to reinvent itself in order to stay alive, I understand that. This year again saw the live talk show, Shark After Dark, recap every night of the week, bringing on celebrities tangentially related to Shark Week and asking shark experts questions that gave me second-hand embarrassment. Discovery also kept a live scrolling of social media quotes from Shark Week fans along the side of the screen during prime time. I have nothing against these attempts to make Shark Week an exciting, accessible event geared towards big audiences, but the core of Shark Week should always come back to educating people about sharks, not about shock value or trying to keep up with the latest Asylum release.
Post By Christina Harrington (23 Posts)
|
# I. Y. Yunioshi
**I. Y. Yunioshi** is a fictional character in Blake Edwards's 1961 American romantic comedy film *Breakfast at Tiffany's*, which George Axelrod adapted for the movie based on the 1958 novella of the same title by Truman Capote. The character in the film is significantly different from the character as presented in Capote's original novella, and the film version of Mr. Yunioshi, as portrayed by Mickey Rooney, has been the subject of extensive critical commentary and review since its theatrical release due to its use of ethnic stereotypes.
## Critical response
### Upon release
In 1961, *The New York Times* review of the film said that "Mickey Rooney's bucktoothed, myopic Japanese is broadly exotic." Some reviewers of the day did note an issue over the characterization. James Powers' review in *The Hollywood Reporter* stated, "Mickey Rooney gives his customary all to the part of a Japanese photographer, but the role is a caricature and will be offensive to many." In *Variety*, Larry Tubelle wrote simply, "Mickey Rooney's participation as a much-harassed upstairs Japanese photographer adds an unnecessarily incongruous note to the proceedings."
### Since 1990
In 1990, *The Boston Globe* described Rooney's portrayal as "an irascible bucktoothed nerd and an offensive ethnic caricature". In 1993, the *Los Angeles Daily News* wrote that the role "would have been an offensive stereotype even played by an Asian; the casting of Mickey Rooney added insult to injury".
The portrayal was referenced in the 1993 film *Dragon: The Bruce Lee Story* as an example of Hollywood's racist attitudes about Asians that the Chinese Bruce Lee's success as a film star would challenge. Specifically, when Lee and his girlfriend Linda Emery watch *Breakfast at Tiffany's* in the theater, despite laughing at the character, Linda suggests they leave midway through the picture after she notices that Bruce is upset at Rooney's stereotypical depiction.
### Since 2000
More recent characterizations include as an uncomfortable "stereotype", "painful, misguided", "overtly racist" and "Orientalist", "one of the most egregiously horrible 'comic' impersonations of an Asian ... in the history of movies", and a portrayal "border\[ing\] on offensive" that is a "double blow to the Asian community – not only is he fatuous and uncomplimentary, but he is played by a Caucasian actor in heavy makeup." Similarities between the character of Mr. Yunioshi and anti-Japanese wartime propaganda in the United States have been noticed by critics Jeff Yang and David Kerr.
A free outdoor screening in Sacramento, California, scheduled for August 23, 2008, was replaced with the animated film *Ratatouille* after protests about the Yunioshi character. The protest was led by Christina Fa of the Asian American Media Watch.
A screening was shown August 11, 2011 at Brooklyn Bridge Park's "Movies with a View" series in New York. Due to protests from a multi-ethnic group organized by an online petition at Change.org, the screening also included a short statement by the organizers which acknowledged and validated community concerns about Yunioshi and a brief documentary about Rooney's character and the portrayal of Asian Americans in other films that was edited from a DVD extra for the anniversary DVD. The aforementioned editorial in the New York *Daily News* by columnist Jeff Yang offered an alternative view regarding the protests: "Far from boycotting the movie or even begrudgingly accepting it, I think it should be mandatory viewing for anyone who wants to fully understand who we are as a culture, how far we've come and how far we still need to go."
## Response to criticism from those involved with the film
In a 2008 interview about the film, Rooney said that he was shocked to hear that his role as Yunioshi had been branded racist by several Asian-American activists. Rooney said that he was heartbroken about the criticism: "Blake Edwards ... wanted me to do it because he was a comedy director. They hired me to do this overboard, and we had fun doing it. ... Never in all the more than 40 years after we made it—not one complaint. Every place I've gone in the world people say, 'God, you were so funny.' Asians and Chinese come up to me and say, 'Mickey, you were out of this world.'" Rooney also said that if he had known people would be so offended, "I wouldn't have done it. Those that didn't like it, I forgive them and God bless America, God bless the universe, God bless Japanese, Chinese, Indians, all of them and let's have peace."
Director Blake Edwards expressed the same sentiment, stating "Looking back, I wish I had never done it ... and I would give anything to be able to recast it, but it's there, and onward and upward."
The 2009 DVD re-release of the film included what was described as "a brief and necessary featurette on the character of Mr. Yunioshi, offering an Asian perspective on 'yellow face'".
## Other media
A 2013 Broadway show based on the film cast Japanese-American actor James Yaegashi as a culturally assimilated Japanese-American Yunioshi born in California, as the character was written in Capote's original book.
## InfoBox
| I. Y. Yunioshi | |
| --- | --- |
| *Breakfast at Tiffany's* character | |
| The introduction of Mickey Rooney's performance of I. Y. Yunioshi in the theatrical trailer for *Breakfast at Tiffany's*. | |
| First appearance | *Breakfast at Tiffany's* (novella) (1958) |
| Last appearance | *Breakfast at Tiffany's* (film) (1961) |
| Created by | Truman Capote (novella)<br>Blake Edwards (film) |
| Portrayed by | Mickey Rooney (film)<br>James Yaegashi (play) |
| In-universe information | |
| Alias | Mr. Yunioshi |
| Gender | Male |
| Occupation | Landlord |
| Origin | Japan |
| Nationality | Japanese |
|
The Gemara (Sanhedrin 58a) declared that a non-Jew is liable to death for learning Torah (at least the parts not relevant to him practically). If you read the passuk תורה צוה לנו משה מורשה literally, “The Torah did Moshe command us as an inheritance,” then if a non-Jew learns Torah, he’s in violation of theft; if you expound מורשה as מאורשה, then you get “The Torah did Moshe command us as a wife,” and then the non-Jew is in violation of adultery.
In practice, what should one’s response be if and when a non-Jew approaches him asking about some area of Halacha? Should the Jew explain it to him, perhaps as simply as possible without all the esoteric details, or should he not explain it at all, politely explaining why (while not quoting the above Gemara, as that would also be teaching him Torah)?
• Related: judaism.stackexchange.com/q/59704. This is not a dupe; you can look at this question as asking regarding the premise of that question, if you wish, but it’s certainly not asking that question itself. – DonielF Oct 18 '18 at 14:34
• I can't imagine that there is a problem explaining the general parameters of the halacha to a Gentile. There are numerous practical examples where that would be necessary. E.g. - Numerous kosher stores hire Gentile workers to handle the food. It would be necessary to explain some general rules such as don't mix the meat with the dairy. Sometimes at work, a Jew needs to explain why he needs to leave early on Friday afternoons. – DanF Oct 18 '18 at 17:50
• @DanF It could be argued in such cases that they fall under “relevant to them” that it should be permissible. In my case the guy is just curious. – DonielF Oct 18 '18 at 21:04
• I can't imagine that there's a problem with satisfying curiosity. I have told Gentiles about Pirkei Avot with a caution that many of the adages apply just to Jews. But, many apply to humanity (e.g. - distance from a bad neighbor.) If you think about it, why was there a commandment to write the Torah on stones in 70 languages? – DanF Oct 18 '18 at 23:10
R. Yechiel Yaakov Weinberg has a responsum that deals with this question. It is a lengthy responsum (and you should read it in it's entirety if you can) but one key point is what he derives from Rambam's wording of this rule:
Shu"t Seridei Eish 2:90 (Mosad Harav Kook edition)
יוצא מדבריו שהאיסור הוא רק בעושה לשם מצוה ומתכוון לחדש דת אבל לא בלומד מאהבת חכמה או להכיר תורתם של ישראל וכמו בשבת שאם ישב בטל אינו עובר אלא רק בקבע יום לשביתה כמו שכתב שם אם עשאהו לעצמו כמו שבת (ועיין ברדב"ז שם שכתב כן) כן הדבר בתורה שהאיסור הוא רק אם קבע את הלימוד לשם מצוה והרי הוסיף בזה על שבע מצותיו וחידש את דתם שלא כפי המצווה עליו
It comes out from his words that the prohibition is only when [the non-Jew] does it for the sake of the mitzvah and intends to originate religion, but not if he learns out of love of wisdom or to recognize the Torah of Israel. And just like with Shabbat where if [the non-Jew] sat doing nothing he does not violate [the prohibition of a non-Jew observing Shabbat] unless he designates the day for resting, as he writes there "if he made it for himself as Shabbat" (and see Radvaz there who writes this), so too it is with Torah – the prohibition is only if he designates the learning for the sake of the mitzvah, by which he is adding to the seven mitzvot and originating religion not in accordance with what was commanded to him.
He reiterates this later as well:
מכל מקום האיסור הוא רק אם הוא קובע הלימוד בתור מצוה ונוהג בעצמו מנהג ישראל וכן בשבת אם קובע יום מיוחד לשביתה כנ"ל משא"כ אם הוא יושב בטל מתוך עצלות או לומד תורה מתוך אהבת חכמה כמו שלומדים שאר חכמות או מתוך רצון גרידא להכיר תורתן של ישראל אז אין שום איסור לא על העכו"ם ולא על ישראל המלמדו
Nevertheless, the prohibition is only if [the non-Jew] designates the learning as a manifestation of a mitzvah, and acts with himself [according to] the custom of Israel. And so too with Shabbat, if he designates a specific day for resting, as mentioned earlier. As opposed to if he just sits doing nothing out of laziness, or he learns Torah out of love of wisdom like learning other branches of wisdom or out of simple desire to recognize the Torah of Israel, the there is no prohibition – not on the non-Jew, nor on the Jew who teaches him.
He also adds that even in a situation where it is forbidden for the non-Jew to learn, it is probably not forbidden for the Jew to teach him:
ולפי דעתי אין איסור על המלמד אפילו במקום שמתכוון העכו"ם לשם מצוה שאין זה דומה לנתינת יין לנזיר דהתם היין הוא המכשול משא"כ הכא אין התורה המכשול אלא הקביעות והכוונה לחדש דת ויש לפלפל בזה
And in my opinion there is no prohibition on the teacher even in a situation where the non-Jew intends it for the sake of the mitzvah, for this is not comparable to giving wine to a nazir where the wine [itself] is the stumbling block, whereas here it it is not the Torah that is the stumbling block but the designation and intent to originate religion [that is the stumbling block]. And there is what to discuss about this.
So in sum, according to R. Weinberg's understanding of Rambam there would be no problem with a non-Jew asking a Jew to explain some area of halacha, unless the non-Jew is doing it because he wants to fulfill the mitzvah of learning Torah, and even then there would probably be no problem for the Jew to provide the explanation because by teaching him Torah he is not providing him with the forbidden object, as the forbidden object in this case is the non-Jew's intent.
• You're great at finding sources, but frankly - from this source - is it clear for you why and what Talmud Torah a Goy is capitally liable for? How a Goy can intend for a Mitzvah if he admits he's not commanded? But otherwise, he repeats my answer, which I think states it more clearly. – Al Berko Oct 18 '18 at 19:07
• BTW, what he calls "מצווה" is #2 on my list, as I said a Goy can not intend to perform a Mitzvah but can intend to get in close relations to G-d which G-d forbids (unless he converts). – Al Berko Oct 18 '18 at 19:14
• @AlBerko They're not quite the same answer, though there is some similarity. In any case, I started my answer before you posted yours so I had not seen it yet when I posted mine. – Alex Oct 18 '18 at 19:48
• What's unclear about the aspect of "for the sake of the mitzvah" is the practical example I mentioned in my 1st comment. Briefly - What if a Jewish woman needs to teach a Gentile home-worker not to mix meat and dairy dishes in her home. Is that considered fulfilling a mitzvah of "keeping kashrut" for the Gentile? – DanF Oct 19 '18 at 16:42
• @DanF The mitzvah it’s talking about is the mitzvah of learning Torah. – Alex Oct 19 '18 at 16:53
Learning Torah is manifested in two parts:
1. Knowing it, remembering it and fulfilling it in practice. This is not different from any other profession or science - one studies it to know it and to implement the knowledge in his life.
2. Enjoying the process of studying the Torah as a mean to get close to G-d (some sort of metaphorical intimate relations between G-d and the Jews). This part is solely intended for the Jewish people and a Non-Jew that would study it in this way would be liable to the death penalty as one that would have relations with a Jewish woman.
Therefore Gentiles are not only permitted to study the Torah extensively in the first way, but, according to the Gemmorah in Kiddushin and Rambam in Hichot Talmud Torah, they are rewarded for that as ones that are not commanded but still perform the commandment. So any Gentile that wants to KNOW more is welcomed.
There are, however, parts of the Jewish tradition called the "Sod", like the "intimate parts of the Torah" that are forbidden to be taught to the Gentiles. This does not include any practical Halachot.
It seems that the same reasoning applies to [the Sugya of] women and the study of the Torah.
PS. Not many people understand this distinction as the [common] Litvakes approach is almost exclusively intellectual, based on the meticulous study. On the contrary, the Chassidic approach is "כיוון שחסידים הם תורתן משתמרת", as he stories about BaSH"T go.
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged .
|
Editing and Proofreading Services
Editing is the process removing inconsistencies and mistakes in a paper to make it clearer for your target audience. Editing is a process in writing that requires one to use his or her creative skills to make a piece error free. The most common use of editing skills is in writing books when a writer appoints an editor to help in detecting and eliminating mistakes that may lead to message misinterpretation if not corrected.
No matter the type of experience and expertise a writer has, there is a very little chance that the first draft will be well polished with clear sentences and paragraph structure. A writer can choose to writer and edit his or her work. Consequently, he or she may decide to use a third eye to help with the editing process. The process involves fine-tuning the paper to be the best with no to minimum errors. Thus, writers often write, read and reread their papers until they feel it meets the preset requirements. Failure to edit a paper especially for students may lead to lower grades.
After one id done with the editing process, the final process is proofreading before submission. Proofreading does not include changing the paper’s content. In this stage, one checks for spelling mistakes and punctuation errors. At this point, the content written is already satisfactory. Some people might use Proofreader Marks in this last stage as discussed here .
Writing beginners often find it hard to differentiate between editing and proofreading. The terms are often used interchangeably hence the questions risen as to whether they mean the same thing. The simple answer to this is that the two vocabularies have different meaning in writing. To help you better understand; below are the differences between the two terms;
Differences between Editing and Proofreading
Editing Proofreading
1 Checks on the quality of content Makes the already quality write up error free
2 Involves several steps/process Only one process involves (This is the final process before submission)
3 Takes time Does not take time
4 Done on the first draft of a write up Done on the final copy of a write up
5 Involves sentence and paragraph structure checking Involves eliminating grammatical and punctuation errors
Order With Us
Competitive Prices with quality papers FROM $13 PER PAGE
Order Now
Why do you need editing and proofreading services?
One might ask why editing and proofreading is nowadays offered as a service because it seems to be a very simple task. For a one-page paper that will be, a lot easy but imagine writing a 60 page research paper for your master’s project, which you will need to make several revisions before the final submission. Writing alone is tedious and you would not want to fail your course for missing a few mistakes that you probably did not see because the paper has become monotonous in your sight. So when should you opt to include a third party to help you? For editing you will need a third eye if:
1. You have just completed your first draft and you are not sure of whether your content is up to standard.
2. You are a new student and you are not sure of your level of expertise in the language of your study.
3. You want the best feedback for your write up.
You will need proofreading services if:
1. You are already done with the editing face and you are in need of a final eye that will help you eliminate grammatical errors such as spelling and punctuation errors.
In case you are looking for these services, it is essential to note that editing and proofreading are two different facets in the revision process and you may be charged separately. However, there are editing companies that offer the two services as a package. I would advocate for this kind of service, as it will be easier to keep track of changes.
Tips That Will Help You as You Navigate through the Editing and Proofreading Process (they are helpful for both beginners and experts)
1. Block Distractions.
If possible, Edit and Proofread in a quiet place. Ensure that you are in place with minimum distractions to help you concentrate on the paper. Keep your phone away and your dictionary close in case you will need it for adjustments purposes. It is okay to use the dictionary at this stage. Do not feel intimidated. It is normal!
2. Divide the Paper into subsections
It can be overwhelming to edit a twenty-page paper. Hence the need to divide the paper into manageable chunks. Depending on the amount of time you have you can choose to do one section take a break then do the next. This way your mind will be alert each time you review a section.
3. One type of error at a time
This will make sense in the editing process. You can start with the content revision. In this stage, you can integrate new ideas that you feel will help strengthen the paper. After you are done with the content, you can proceed to sentence and paragraph structure to ensure that there is information coherency throughout the paper.
4. Take a break from the paper
After you have just finished writing the paper, find an activity that keep you distracted from the paper a bit before the editing and proofreading process. If you delve into the paper immediately, you are likely to ignore most mistakes as to you the paper will look the same. Clearing your head will make you more alert. Where applicable you can ask your friend or colleague to help you edit and proofread the paper. This is the most appropriate method, as the paper will be looked at with a fresh set of eyes. Better yet, you can find these services at your disposal on the internet at a manageable fee.
5. Change your medium
In case you were using your computer to write, you can print out the write up. This way you can knot down where changes need to be made on paper before you make change in your soft copy. Another technique you can employ is changing the font style and size of the paper. This will bring a different perspective to the paper. You will be looking at the paper as a new document. Feel free choose whatever method works for you at a given time.
6. Read Aloud
In this technique, you can choose you read your paper backwards focusing your attention to the errors and typos in the paper. As you read aloud, do not make the changes until you are done reading the whole paper/section depending on whether you divided the paper prior. You can mark mistakes with a different colour, underline or write comments. First identify then make changes later.
Importance of Editing and Proofreading
1. Natives-English speakers mostly need editing services. These people usually have a hard time understand the complexities of the English language. In case they are students who write essays and other academic related works, editing services will be the best investment in ensuring that their papers are of great quality.
2. Book writers also need to have an editor who will go through their work to review, find mistakes and eliminate them. Publications need to be of the best quality and as we all know almost every market has competition. If an author is striving to be the best, then it is advisable that they go for editing services to help them reveal mistakes that they may not be able to see if they did the job themselves.
3. Proofreading and editing is also importance in the business set up where important documents such as contracts need to be of very high quality and containing minimal to no errors. Most companies/institutions need error-free documents that have undergone several stages of editing and finally proofread by a professional.
Level of Editing
For the editing process to yield the best results, components need to be reviewed and edited separately and one at a time. Some of the level of editing include:
1. Paragraph Structure. Essays require that a paragraph begins with a topic sentence followed by a few supporting arguments and concludes with a transition to the next idea. In the editing process, this can be checked among other mistakes such as whether there is information missing in the paragraph. This level also entails reviewing sentence structures. That is, the information flow and readability.
2. Overall essay/paper structure. Check whether the whole paper follows an essay format. That is, an introduction, at least three body paragraphs and a conclusion. Also, check on whether your thesis statement is clear and easy to comprehend.
3. Citations and references. Check whether the sources used are relevant. To check for relevance, look where the information has been published and the year it was published. Make sure the citations follow the type of formatting style you used. Some of the styles mostly used are APA, MLA and Chicago style.
Editing can be a long process, apart from the three modules; there are other minor modules one can come up with depending on the type of information being accessed. When editing look at it as a revision exercise in which you make adjustments, they are viewed and returned to you for corrections until the desired output is achieved. Feel free to subdivide the levels of editing to subsets that work for you. Remember at the end of the day all that matters is the quality of write up you come up with.
Proofreading Process
Proofreading follows different techniques. Feel free to experiment with as many techniques at your disposal until you get one that works for you. If you are a beginner and a bit confused, you can use the below processes to help you:
1. Use spelling checking sites but do not over rely on them. These tools are helpful in helping one determine mistakes but keep in mind that some of them have very limited words in their dictionary. As you use them, please go through the document yourself in case there are mistakes that the checker did not highlight.
2. Highlight punctuation marks. This process will help you check all punctuation marks for mistakes.
3. Backward reading. This is another process for checking spelling mistakes. Read every word separately from the last page going upward to the first word in the document.
4. Read every word carefully and slowly. Your aim in proofreading is to come up with an error free paper. Read slowly to ensure that your goal is met by not skipping any word. Remember you are skimming through the paper you are proofreading!
5. Ignorance has consequences. The results of ignorance will not make you an exemplary proofreader. Pay attention to detail and in case of doubt always check up in the internet or use a dictionary. Consequently, you can ask your colleague. For instance, if you are not sure of whether to use which or that, please ask for help. There are many sources available for clarity purposes.
Editing and proofreading is a skill that is perfected over time. If you are starting out, be patient you will become a pro within no time. Increase efficiency by constantly practicing and maintaining a positive mindset. With consistency, you will develop your idea of finding errors and ways to improve editing and proofreading.
Examples of Content that Require Editing and Proofreading
Research papers and essays.
Cover letters and curriculum vitae.
Social Media Posts.
Brochures and Fliers
Books and novels
Order With Us
Competitive Prices with quality papers FROM $13 PER PAGE
Order Now
Calculate your price!
|
# Mike Hogewood
**Michael Ashley Hogewood** (September 13, 1954 September 5, 2018) was an American sportscaster. He was a play-by-play announcer, studio host, and sideline reporter.
Hogewood was best known for calling play-by-play and sideline reporting on ACC college football and basketball for Raycom Sports (from the mid-1990s until 2015), and for calling play-by-play and being a pit reporter on NASCAR Cup, Busch and Truck series races for TNN Sports, (from 1997 to 2000), co commentator for TNN Motor Madness Monster Jam alongside Scott Douglass from 1998 to 2002 and Turner Sports (from 1997 to 2001).
## Career
### ACC and freelance work
Hogewood was primarily associated with Raycom Sports (formerly Jefferson Pilot Sports). Hogewood was best known for his work on ACC football games, ACC men's and women's basketball, as well as for anchoring Raycom's coverage of Nextel Cup NASCAR races. In addition to his work with Raycom, Hogewood did play-by-play for FSN South, Sun Sports, New England Sports Network, Comcast SportsNet, HDNet and the Speed Channel. He became a freelance announcer after nearly 15 years of experience as a network announcer, and later sports director, for the ABC (now Fox) affiliates WBRC-TV (early 1980s) in Birmingham, Alabama, WGHP-TV (1985–1987) in High Point, North Carolina, and later at CBS affiliate WFMY-TV Channel 2 (1987–2001) in his hometown of Greensboro, North Carolina. He briefly worked for NBC affiliate WXII-TV in Winston-Salem, North Carolina, in the early 2000s on a series called *Hog's Heroes*.
Hogewood was host of several television sports reporting shows, including: *ACC Football Today*, *ACC Basketball Today*, *Saturdays in the South*, and the Emmy Award winning *ACC All Access*.
### NASCAR work
Hogewood was also well known for his work on NASCAR races for TNN Sports (part of CBS, occasionally letting Hogewood appear on CBS), and for Turner Sports (which produced NASCAR races on NBC starting in 2001, occasionally letting Hogewood appear on NBC).
In 1992, while working at a local TV station in Greensboro(WFMY), Hogewood interviewed Richard Petty during his final season in the Cup series as part of his retirement tour.
Hogewood was primarily a pit reporter for many (although not all) Cup, Busch and Truck races on TNN starting in 1997, however if the Busch Series had a standalone race, Hogewood would sometimes call play-by-play of the Busch race. Hogewood's play by play work came alongside several other voices, including Greg Sacks. When TNN's parent company CBS Sports aired a standalone Busch or Truck race and used the TNN crew to do so (while CBS' crew covered Cup), Hogewood would occasionally appear as a pit reporter on CBS. TNN Sports lost NASCAR rights after the 2000 season, however Hogewood remained with the network in other capacities through 2002.
Hogewood also worked on NASCAR for Turner Sports (TBS/TNT) at the same time as he worked for TNN, starting in 1997, as Turner had a production partnership with CBS at the time. Hogewood was a pit reporter for Turner's Cup, Busch and Truck series races, as part of the primary broadcast team. However, despite Turner forming a partnership to produce NASCAR races on NBC for half of the Busch and Cup schedules starting in 2001, greatly increasing the number of races produced by Turner, Hogewood was replaced by Dave Burns on the primary Cup and Busch broadcast team, demoting Hogewood to some (but not all) standalone Busch events on TNT. However, Hogewood's first and only chance to call play-by-play for Turner did come that season, as he announced the standalone Busch event at Watkins Glen, alongside Cup driver Tony Stewart. This event was part of Turner's NBC deal, and was also Hogewood's only appearance on the peacock network. Stewart had worked alongside play-by-play man Allen Bestwick and the primary Turner NASCAR crew on a Busch race in each of 1999 and 2000, while Hogewood had been in his usual spot on pit road, but in 2001 with the Cup crew taking the weekend off, Stewart worked alongside Hogewood instead. This would prove to be Hogewood's last race with Turner Sports, as he left following 2001. As TNN had lost NASCAR following 2000, this meant it was also Hogewood's final live NASCAR television broadcast.
### Other work
Hogewood also was a broadcaster for TNN Sports' coverage of Monster Jam from 2000 to 2002. He also covered events for the Big South Conference, and did commercials for Carolina Kia in the Triad.
Hogewood's most recent work had been as the play-by-play commentator for professional wrestling promotion, Ring of Honor, as a part of its television deal with Denver-based network, HDNet.
Hogewood retired from ACC football in 2013 after 26 years as a sports broadcaster.
Hogewood died on September 5, 2018, at the age of 63 of a heart attack in his sleep.
## InfoBox
| Mike Hogewood | |
| --- | --- |
| Hogewood in December 2007 | |
| Born | Michael Ashley Hogewood<br>(1954-09-13)September 13, 1954<br>Greensboro, North Carolina |
| Died | September 5, 2018(2018-09-05) (aged 63)<br>Greensboro, North Carolina |
| Occupation | Sportscaster |
| Years active | 1987–2013 |
|
Still Not Over: CPC Update
letsgetitdone's picture
Recently I posted an analysis of the White House OMB budget showing that it was a budget that brought the nation close to a macroeconomic austerity at best stagnation, and at worst recession or depression situation over the next decade. My analysis used the Sector Financial Balances (SFB) model and some estimates based on related data to reach that conclusion. I also pointed out that projected private sector aggregate savings were so small due to the OMB budget, that, if the Government succeeded in implementing it, was very likely to cause severe microeconomic austerity for working and middle class people with a longer term result that would accentuate economic inequality in America due to the power of large corporations and the FIRE sector to monopolize the savings left to the private sector by the Government's very low deficit budgets over the period 2015 – 2024. Later we'll see how the CPC budget looks from the point of view of the SFBs that would result if its budgets were carried through as projected. But first let's review the SFB approach and its application to the idea of austerity.
Issues of distribution of financial flows cut deeply here. If a nation's economy is structured so that some parts of the foreign sector and some parts of the private sector have sufficient economic and political power to direct financial flows from outside and inside the sector disproportionately into their coffers, then macroeconomic austerity may translate into microeconomic prosperity for those sub-sectors, and into disproportionate microeconomic austerity for the sub-sectors with lesser economic and political power.
Here are the projections based on the OMB 2015 budget recently published by the White House, the CPC Better Off Budget and on quarterly time series data kindly provided in Spreadsheet format by Professors Scott Fullwiler and Stephanie Kelton.
Table One: Sector Financial Balance Projections 2015 – 2024 Estimated From OMB and CPC Budget Projections
2015 - 2024 SFB Projections Assuming White House and CPC Budgets
Table One shows that the decade 2015 – 2024 has very small domestic private surpluses projected for both the OMB and CPC budgets. The mean annual projected private surplus (aggregate) savings over the decade period is 1.2 % of GDP for the OMB budget and 0.7 for the CPC budget. This is not macroeconomic austerity, but throughout the decade the projections are getting closer and closer to that for both budgets.
Compare that figure to the mean of approximately 7.2% of GDP for the 6 year post-crash period of fiscal 2009 - 2014. Consider also that Government injections resulting in an annual average private sector surplus of 7.2% of GDP over that period haven't created enough aggregate demand to produce a strong economy with rapid job creation, full employment and widespread prosperity. Instead, these surpluses have only been enough to end the recession and produce a slowly growing stagnant economy, whose rewards are vast for the already wealthy and for large corporations, but are miniscule or non-existent for everyone else. And then ask yourself the question of what the result of the projected small Government deficits over the next decade in the two 2015 budget projections, resulting in mean annual private sector savings of 1.2% of GDP in the OMB case and 0.8% of GDP in the CPC case are likely to do to the economy?
My answer is that both the President's and the CPC's budget plans, if either were enacted and followed, would first produce microeconomic austerity for the 99% with flat or shrinking aggregate demand, and then continued and exacerbated economic stagnation compared to what we've seen in past years. We will also see rapidly increasing economic inequality, resulting eventually in renewed recession whose time frame would be determined by the willingness of the private sector to extend credit to increasingly hard-pressed consumers and small businesspersons.
The bottom line is that microeconomic austerity in the United States won't end if either the President's budget or the CPC's or others like them, or even more tight-fisted, are enacted. But, on the contrary, such budgets will mark the beginning of severe microeconomic austerity in the United States leading to even more severe suffering than we've experienced so far and to social turmoil and political unrest.
But, but, but . . . What about the claims made by the CPC for its budget? And what about the analysis of it by that redoubtable progressive icon the Economic Policy Institute (EPI)? I'll consider these claims in more detail in a future post. But the important point is that the analysis by the CPC and the progressive organizations don't sufficiently take into account the macroeconomic constraints imposed by the planned levels of deficit reduction.
The CPC story really begins in 2014 rather than 2015. CPC assumes passage of its budget in short order so that increased deficit spending over the 2013 level would stimulate the economy and lower the unemployment rate substantially during 2014. This is supposed to happen with total Government deficit spending, both State and Federal of about 7.0% (CPC's specific projection is that the Federal component of the deficit would rise to 5.2% for 2014). Applying SFB considerations and assuming that the trade deficit rises to 2.65% which is where it was at the last time the total deficit was just a bit over 7%, that leaves private sector aggregate savings of 4.4% to boost demand.
That level of savings is very close to that in FY 2013, and if anything is a bit lower. In 2013 the unemployment rate fell from 7.9% in December 2012 to 6.7% in December 2013, a drop of 1.2%. CPC is projecting that its planned deficit for 2014 will reduce the unemployment by 1.2% again to 5.5%. However, that is unlikely for two reasons.
First, the lower the rate of unemployment, the more difficult it is to reduce it further without increasing the aggregate private sector savings rate, in the absence of a credit bubble supporting increased investment. And second, as more new jobs appear more and more people who withdrew from the labor force, causing that sharp drop in the unemployment rate in 2013, will re-enter it and make the resistance to further reduction in the U-3 unemployment rate greater than ever. The result could well be that the labor participation rate increases toward pre-recession levels, but the U-3 unemployment rate could well remain in the neighborhood of 6.2% rather than falling further, leaving the US with a still substantial output gap, even if one assumes that full employment is 5.5% (which is a very austerian assumption to make in the first place).
So, it is likely that even if the CPC got its way, the US would enter 2015 with relatively high unemployment, but at that point the CPC plan calls for a Government deficit of 3.5%. According to table one that will correspond to private sector aggregate savings of 2.8%, and that is not enough savings to support aggregate demand sufficient for the private sector to add jobs without a credit bubble of the kind we saw during the Clinton Administration, and later, the Bush 43 Administration.
As we move through the decade beginning in 2015 moreover, the private sector aggregate savings level very quickly will decline to a fraction of a percent annually. That kind of savings level won't support sustainable job growth however, and CPC projections about decreasing unemployment over the decade will not come to pass. What's even worse is that the smaller the deficit is forced to go, the less support for job growth will exist, and certainly within the 2015 - 20124 decade the increase microeconomic austerity will cause another recession, if not another Great Recession or a depression.
In short, the CPC budget isn't an anti-austerity budget as claimed. It is another exercise by budgeteers in near macroeconomic austerity that is likely to result in microeconomic austerity for the many, and continued prosperity for the few. And the pity of it is that budget plans like this are so unnecessary.
None of the deficit and debt terrorism and miserly fiscal policy reflected in these budgets are necessary, because there is no shortage of Federal fiscal capacity in the United States, and no justification for the fiscal policies the US Government has followed since the Recovery Act was passed in 2009. To end austerity, the Federal Government needs to budget to create full employment and benefits for most Americans, including solutions for the major problems facing the US, while letting the trade and budget deficits float.
First create full employment through various programs, including a Federal Job Guarantee to get and keep the employment level there. And then, let the twin deficits float until we're at that point. A policy like this one adjusts to the savings and trade balance desires of Americans, while creating full employment, with whatever government deficit spending is necessary to accommodate those needs.
That's how you end austerity for most people without causing demand pull inflation, or cost-push inflation. The second of these may occur because of developments in commodity markets that have nothing to do with Government employment or safety net programs. But that is a story for another day, unrelated to austerity and its remedy.
(Cross-posted from New Economic Perspectives.)
No votes yet
Cujo359's picture
Submitted by Cujo359 on
At least they're getting a bit bolder on the spending side. Last year's CPC budget was supposed to create about seven million jobs. This year, it's nearly nine. I haven't looked closely enough to see if the revised claims make sense, but they're thinking bigger.
They do need to recognize that deficit spending is in order, though. We still aren't out of the recession, and there's lots that could be done by all the unemployed people and underutilized resources.
letsgetitdone's picture
Submitted by letsgetitdone on
they won't get the jobs, because they'll inflict private sector losses on the 99%.
Submitted by lambert on
Different arrangements of the deck chairs. This is a case of Democrats still thinking they're the good guys. Some of them may actually believe this.
|
Food and Agriculture Organization of the United Nations
Newsroom historic archives | New FAO newsroom
Making plant genetic resources beneficial and accessible for all
José Esquinas-Alcázar, secretary of the Commission on Genetic Resources for Food and Agriculture
Among the items on the agenda of the FAO Conference, 2-13 November 2001, is the International Undertaking on Plant Genetic Resources. The Conference will consider for approval this new international convention, which governments have negotiated through the Commission on Genetic Resources for Food and Agriculture. It establishes a multilateral system providing access to plant genetic resources for food and agriculture, as well as to fair and equitable sharing of the benefits obtained from their use. It also includes a provision on farmers' rights. José Esquinas-Alcázar, secretary of the Commission, talks about the Undertaking.
How do you define biodiversity?
Agricultural biodiversity, or more specifically genetic resources for food and agriculture, is the storehouse that provides humanity with food, clothes and medicine. It is essential in the development of sustainable agriculture and food security.
It is estimated that 10 000 species have been used for human food and agriculture. However, only about 150 plant species make up the diets of the majority of the world's population. Of these, just 12 species provide over 70 percent of food, while four -- rice, maize, wheat and potatoes -- make up over 50 per cent of the food supply. Obviously, we are not taking full advantage of the available resources.
What does this International Undertaking mean?
All countries are highly dependent for their food and agriculture on plant genetic resources that come from other nations. Paradoxically, the countries richest in genes are often the poorest in economic terms. Most of the world's plant genetic diversity is found in the tropical and subtropical regions, that is, in developing countries. In spite of their vital importance for human survival, genetic resources are being lost at an alarming rate due to the lack of incentives to continue developing and conserving them.
This is why the new binding international convention is aimed at ensuring both the conservation and sustainable use of plant genetic resources, as well as the fair and equitable sharing of benefits arising out of their use. Following several years of negotiations, agreement was reached on the International Undertaking last June by the FAO Commission on Genetic Resources for Food and Agriculture, which includes 160 member countries and the European Union. However, consensus is still needed on a few important outstanding issues. Countries are expected to finalize the negotiations during the FAO Council (30 October - 1 November). If the FAO Conference (2-13 November) then approves the convention, as we expect, it will enter into force as soon as 40 countries have ratified it. From then on, access to the genetic resources of the most important crops would be multilaterally regulated, and so would the sharing of the benefits, including capacity-building, the transfer of technology and the payment of an equitable share of the commercial benefits derived from the use of genetic resources.
Why is genetic diversity important for food?
In order to show the importance of genetic diversity for food security, we can give a very clear example: the famine that overwhelmed Europe at the end of the 1830s, due to the massive failure of potato crops due to disease. The problem was resolved by finding varieties in Latin America, where the potato had originated, that were resistant to the disease. This was only possible because of the great genetic diversity that farmers in that area had created, developed and maintained over many generations. Today it is more important than ever to maintain existing farmers' traditional varieties, so coming generations can cope with unpredictable environmental changes and human needs. The International Undertaking recognizes the enormous contribution that local and indigenous communities and farmers make and encourages national governments to safeguard and promote farmers' rights. These include the protection of their traditional knowledge, the right to equitably participate in benefit sharing and the right to participate in national decision-making regarding plant genetic resources.
To what extent can biotechnology support the idea behind the World Food Day theme "Fight hunger to reduce poverty"?
I prefer to talk in the plural of "biotechnologies", and there is no doubt that the development and use of new and traditional biotechnologies can greatly contribute to reducing hunger and poverty in the world. Genetic resources and biotechnologies should be considered complementary, as the first provide the raw material for the second. Even the most sophisticated biotechnologies do not create genes, but re-combine those existing in nature to produce new varieties and agricultural products. Modern biotechnologies provide powerful tools with the potential to increase and improve production in various situations, including to the benefit of small farmers and local economies. The main question lies in which biotechnologies and for which purpose. Big business makes big investments and usually wants short-term returns from a limited range of standardized products, which does not necessarily serve the goal of reducing world hunger. For this reason, it is important that investment also be made in the public sector, so that it can maintain its involvement in biotechnological research, in order to ensure that the needs of the poor are well taken care of. FAO is working on a Code of Conduct on Biotechnology aimed at maximizing its potential and minimizing its risks.
30 October 2001
Related links
FAO Home page
Search our site
Comments?: Webmaster@fao.org
©FAO, 2001
|
Bruton Parish Churchyard
bruton parish
Individuals of all classes rest in the peace of the Bruton Parish graveyard. Church guide Anne Conkling describes one of America’s oldest cemeteries.
Harmony Hunter: Hi, welcome to the podcast. I’m Harmony Hunter, and today my guest is Anne Conkling, who is a church guide at Bruton Parish Church. Anne, thank you for being with us today.
Anne Conkling: My pleasure.
Harmony: This is the time of year when we start to think about graveyards and churchyards and things like that, and you actually can tell us a good bit about what is probably one of America's oldest churchyards, which is Bruton Parish Church.
Anne: The church is one of the oldest buildings in continuous use, and it is an active congregation today with close to 600 families who belong there. The building itself is 1715, but the churchyard goes all the way back to the 1630s.
Harmony: And now burials were not happening only in the churchyard, right?
Anne: No, the norm is to be buried on land you owned, so Mr. Washington is at Mt. Vernon, Mr. Henry is at Red Hill, Mr. Jefferson is at Monticello. The most important people of your life were buried in the floor of the church. In England of course, that was royalty, nobility and clergy. Here in the colonies, we seem to think doctors, lawyers, judges, priests and politicians are the very best sort, so that's the quality who gets buried inside the church.
Outside the church are a lot of people who clearly had no place else to be buried. They didn't own big farms. They were townsfolk. Now they could have been buried back at the end of their lot, back near the necessaries and the fruit trees. They could have been buried wherever they died, because they didn't know how to keep a body, they weren't embalming yet, so they would get the body washed and dressed and into the ground pretty quickly.
Harmony: You mentioned that notable people were buried in the church floor. How does that work?
Anne: Well the vestry would have known who were the most notable of the town, and they would have probably decided that when someone like Henry Hacker or Mrs. Prentis or Governor Fauquier – Governor Fauquier is probably one of our best examples – he died while he was in residence at the Governor's Palace, they didn't ship him back to England to bury him at home, they buried him here. So they buried him in the north aisle of the church right beside the Governor's pew from which he had often presided. He is marked with a very nice stone, probably marked a little bit later -- most of the marking was done much later. But you simply dig up the floor and bury them in the church.
Harmony: Was it like a stone floor, or wooden floor?
Anne: In the early years it would have been a dirt floor, and then they would have put pieces of flagstone like a garden path. Remember we're in the tidewater, where all of our land is sand or red clay. We don’t have hard stone. You have to go all the way to the Charlottesville area before there's hard stone. Because they couldn't trade inter-colonially, all the stone comes from England. So the stone for gravestone, the stone for the floor, the stone for steps, all of that comes across as ballast. So the gravestones that are in the yard came as ballast. Very few gravestones were in the floor of the church.
Harmony: Moving to the outdoors, the Bruton Parish Churchyard itself, it has a unique look, and I think that's born of the headstones and the burial practices of the era in which it was created. Can you talk about what that churchyard looks like?
Anne: It really depends on what year you're looking at it. If you're looking at it when Williamsburg becomes the capital city in 1699, it probably was pretty sparse. By the time that church is built in 1715, it probably has a few markers. Now they may have been wooden crosses all lined up. That yard has not been done archaeologically, but you can kind of imagine in your mind's eye that they would have had crosses for the poor, and the very wealthy could have imported a great gravestone.
You know, many of the gentlemen of the time ordered everything from England. Many of them ordered stones that were shipped across with nothing left to be cut but the date. That way they control what's said about them on the stones, it's like writing your own obituary, but it also means if you think you're wealthy enough and important enough to afford a great table tomb rather than a flat ledger stone, you're going to order the biggest table tomb you can afford. So if you're looking at the graveyard by Mr. Jefferson's time at the College, and I believe he arrived in 1760, there would have been some stones.
If you're looking at the yard during the Battle of Williamsburg, May of 1862, the church, like many other big buildings was a hospital after the Battle of Williamsburg. The description of our churchyard at that point, point to people waiting to be tended to, piles of amputated limbs, the blood coming from the table tombs which could have been operating tables. It was a very grotesque, and very pitiful part of what comes along with any war.
If you fast-forward to 1907, city council decides that at that point, animals can't roam free in Williamsburg anymore. For hundreds of years, animals went wherever they pleased, and I'm sure you've heard the quote that Duke of Gloucester Street was 7/8 mile long, 99 feet wide, and three feet deep. It was very difficult to travel on Duke of Gloucester Street.
So the churchyard has an excellent, beautiful brick wall. Part of the reason is to keep the animals out of the churchyard. Not everybody was satisfied with the brick wall doing its job, so a lot of families in the 1800s and 1900s put up what looked like chicken wire stretched from posts around the plots of their family. So the churchyard was full of these funny little things to keep people off their graves. Well in 1907 when city council said animals can't run free anymore, all those little fences could go. So the churchyard by 1907 is getting more organized and getting cleaned up.
Our guests love to read gravestones. Some of them are hard to read between the use of the old English, the long "s" and the acid rain that we've all suffered from, many of the gravestones are very hard to read.
Harmony: Tell me more about those gravestones. You've mentioned two things that I'd like to hear more about: table tombs and the markings that we see on gravestones in Bruton Parish that are not common now.
Anne: A table tomb looks like a big stone box. If you were to lift up the top, which sometimes happens, it looks like a big stone bathtub. Now the body is down in the ground. Most graves at Bruton are four and a half feet underground, some of them are six. Most of them are not. The bodies are in the ground, the table tombs are not. We have the finest collection of table tombs in North America. It speaks of our everlasting ties to England. We are always tied to England. The table tombs speak to the luxury, to the status, to the majesty of these enormous families who had so much land and so much money.
Some of the markings that are fascinating, there is one large tomb for Robert Ray, he was a tobacco factor visiting from Scotland who was here buying tobacco, and he died while he was here, and his family was distraught, so they sent that lovely stone to mark his grave, so that people would always remember him. On one end is a skull and crossbones. Doesn’t mean he was a pirate, doesn't mean he died of poison, it means everybody has to die. On the other end is a little angel, which is the promise of resurrection. At the top is a family coat of arms, because the Ray family was well-connected. So if you couldn't read a word, which many people couldn't, you could look in that stone in the churchyard and get a great sense of comfort and also a little bit of Christian education.
Further down towards the west end of the church is a big table tomb for Governor Nott. Governor Nott's tomb on the side has the stage of life. It's a beautiful set of drapes. Little cherubs hold up the curtains at each side, and in the center is the skull in the center of the stage. Which says the same thing: death is in the center, but the promise of resurrection is always there.
And of course all the Confederate ones just say "CSA, May5, 1862." Because we don’t know their names. We have a few places where we know their name, rank, regiment and state. But most of them just say CSA.
There are coats of arms on many of them. On the Milington stone, John Millington was an educator, professor, teacher. He was like a walking university on his own. His is draped with an academic robe and some other signs of education. That's a very unusual stone, it's over by the wall by the Wythe house.
Harmony: You mentioned some of the bodies at Bruton are four and a half feet deep, some are six. Has everyone buried there even had a coffin?
Anne: No. Many folks were laid in the ground. It depends on what you could afford, it depends on how well-born you were. It depends on how much family you leave behind, how much money they have. If you are very, very, very important, you're going to have better luck than if you're not. Many folks were laid out with arms crossed, wrapped in a winding shroud, pinned all the way up with pins and just laid in the ground. The cabinetmaker automatically made coffins or caskets, and some people had simple oak, and some had pine and some people had walnut. Some people, like governor Fauquier, Lord Botetourt is going to have a couple of coffins, sometimes a nest of three coffins and then the outer one is sealed.
Harmony: If you're too poor to afford a coffin, how does that work?
Anne: There were some coffins which could be recycled, reused. So you could be carried to the spot in a coffin and then laid in the ground. And then it could be recycled. You'd have to be very poor to rate that kind of care.
Harmony: Do you find that the bodies are oriented in any particular direction?
Anne: Well the tradition is if you're buried with your feet headed to the west and your head to the east, you are clergy. You are buried so that you will, at the moment of resurrection, you will face your people. If you are buried with your feet to the east and your head to the west, you are a layperson or just a normal person. You will rise to meet Jesus. So that you will rise to meet eachother.
In the church building, it's pretty clear who's buried which way. In the yard they appear to be not quite so organized. We can see that some of them are definitely east-west oriented, but some of them are kind of at an angle. That has partly to do with, I think, the 1683 church looking at the plat that Michel drew of it in 1702 or ‘03, it seems to be kind of at an angle to the current churchyard. So I think some of the graves are kind of at an angle, too.
Harmony: What does the Bruton Parish Churchyard tell us about the life of the people in this town?
Anne: It tells us the visual piece of it is so wonderful. In England, the very wealthy were buried with the very wealthy. The middlin' were buried with the middlin' the poor were buried in the stews if they were buried at all. Everybody who had land was buried at the country churchyard closest to their land.
In our churchyard, everybody's buried together. It's a very democratic graveyard. John Blair, who signed the Constitution, is buried just a few feet from the Greenhows, who owned the store, who are buried just a few feet from Martha Custis' babies, right across the way from Sir Thomas Ludwell, who was secretary of state under Governor Berkley, who's right across from the Tyler-Semple burials which include Mammy Sarah. They were all people of faith. For each of them, the church was the center. They were buried where their hearts were.
Harmony: Thanks so much for being with us today.
Anne: You’re most welcome.
1. I believe that members of my materal ancestors, whos name was poingdestre and hailed from France settled in Williamsburg during the sixteen sixties. I am told that the family Coat of Arms is displayed in the church grounds. Have you any knowledge of this please.
Thnking you in anticipation, Stan Evans Liverpool UK
• There is a memorial to “the memory of the vestry of 1674-1683, who erected the first brick church upon this foundation” on the South wall of the church nave. One of the names on the memorial is George Poyndexter.
2. Quite a few years ago i inherited my great aunts trunk. Inside was a picture of a civil war soldier and his pocket bible with the scripture underlined to be read at his funeral
along with the preachers words sent home to the family. The information said that he died on May 15, 1862 from wounds received 10 days prior in a battle. I believe he is buried in Bruton church yard from what I am gathering online. I have looked for several years for his grave and see that there is a mounment of CSA soldiers and believe he is the William Baldridge that was my great-great uncle. He was from Jefferson County, MS. Are there any other records that you might have to verify. Your information will be greatly appreciated. Sincerely, Rinda Davis
• Rinda,
We shared your question with the historians at Bruton Parish Church. This was their response:
The Confederate Memorial Marker on the north side of the Bruton churchyard includes the name of William Baldridge. As you can see, he is listed as having been as being with the “18th Reg. Mississippi Infantry.”
We would have no other records other than this monument bearing his name and the name of his fellow soldiers who died during the Battle of Williamsburg. There are many unknown Confederate burials as well, some marked as unknown, some not marked at all.
To this date we only know of one Union soldier, “Dr. Peter Wager, assistant Surgeon,” that is buried in the Bruton churchyard. He died in 1868 two years after the war and is buried near the Garret family gravesite in the Northeast corner of the churchyard. His grave is currently unmarked.
I hope this helps you. Please let me know if you have any further questions.
Leave a Reply
|
# Strangers (Parliament of the United Kingdom)
The term ***stranger*** is the traditional way of referring to someone physically present in the Palace of Westminster who is neither a member of parliament nor a parliamentary official. In 2004, a motion was approved implementing the recommendation of the Modernisation Committee that the term *stranger* no longer be used and be replaced with either *member of the public* or *the public,* although Standing Order No. 13, paragraph 1 of the House of Lords still mentions strangers to this present day.
Nowadays, visitors can watch debates, and can sit in the Strangers' Gallery. Historically, visitors were not allowed in at all. Parliament still has the right to debate in private, and any visitor causing a disturbance can be ejected, or even taken into custody by the Serjeant at Arms. The House of Commons rarely goes into private session (the last occasion being on 4 December 2001 when it was debating the Anti-Terrorism, Crime and Security Bill), and although much routine business is handled by select committees, second reading and third reading and usually attracts little attention, most main debates are public. Although BBC Parliament now broadcasts from the main debating chambers of both the House of Commons and House of Lords, as well as from important committees which may meet outside the chambers, it must turn off sound transmission during divisions.
Attempts to exclude visitors are usually employed simply to disrupt or delay the House's proceedings, a kind of filibustering. An MP wishing to interrupt used to shout "I spy strangers!" The Speaker then immediately put the motion "That strangers do now withdraw", as a point of order. If the motion was carried, the public galleries were cleared – this could (but rarely did) include the press gallery and Hansard; broadcast television and radio stops, and business continues in private. This was Standing Order No. 163 of the House. It has been amended as part of modernisation of Commons business, but the principle remains much the same.
On 27 April 1875, the Irish Nationalist MP Joseph Biggar caused the Prince of Wales (later King Edward VII) to be removed from the viewing gallery using this method.
During the English Civil War William Lenthall, the Speaker, essentially recognized the King only as a stranger, and not entitled to be in the chamber. He said, on being interrogated in the Commons by the king: "May it please your Majesty, I have neither eyes to see nor tongue to speak in this place but as the House is pleased to direct me, whose servant I am here."
To this day, the reigning monarch of the United Kingdom is not allowed entry to the House of Commons. At the State Opening of Parliament the monarch, through his or her servant Black Rod, summons the members of the House of Commons to the House of Lords; the door of the Commons is slammed shut and they must knock on it to request entry. The same tradition is preserved in Canada, where the Members of Parliament are summoned to the Senate Chamber at the State Opening of Parliament by the Governor General; similarly in Australia; and in New Zealand, where members of the House of Representatives are summoned to the chamber of the Legislative Council, although the Legislative Council abolished itself in 1951.
|
The Heap Fallacy
The nature of truth can be confusing, and rarely is it more confusing than in the metaphysical distinction of groups and members. Is a chorus nothing more than the individual tones? Or a symphony nothing more than the individual notes? On some level, we must answer how could it be anything more? And yet the relationships between tones and notes seem to play a relevant role, and relationships do not exist when considering everything individually. What I take from this and will examine in this brief post is that sometimes a general truth means something entirely different from the particular truths from which it is abstracted. For example, it is true to say all living humans require food to remain alive, but it is not necessarily true to say they need apples or oranges or grapes or meat or cheese or bread or pizza or pork belly and sauerkraut sandwiches, etc. Thus, there is no particular food that humans need to eat. But it does not follow from this that human beings do not need to eat any food. Food is still required.
I have often encountered arguments of this type, particularly in political economic debates. They go in both directions. One variety says, the needs of the group cannot be determined and so individual needs are indeterminable. The other variety says, the contributions of individuals cannot be calculated and so the value of their combined inputs are indeterminable. Arguments of these types are often invoked both in support and condemnation of markets. But both of them are in fact heap fallacies, which turn on a conceptualization problem. Heap fallacies exploit ambiguity and are all too common in philosophy, politics, and economics.
The heap fallacy is related to the “sorites paradox” and is sometimes called the “continuum fallacy”. The fallacy works by rejecting a claim based on the vagueness of the terms used in the claim. For example, imagine I lay a single straw on the ground. This surely does not constitute a “heap” of straw. Now let me lay another on top of it. Still, we would not call it a heap of straw. And if I were to lay a third, still no. The fallacy would be then to conclude that since no single straw could be responsible for the change from a non-heap to a “heap” of straw, there is no heap of straw. The problem in this example is the term “heap” itself, which is arbitrary. However, in this case, its arbitrary nature is not logically relevant. We can draw the line anywhere, and so we can refine our definition of “heap” to anything. Perhaps three straws are a heap, or three-hundred, or three thousand… the point is the fact that we can draw a line anywhere does not mean that the line does not constitute a real distinction.
This type of argument which holds that if specifics are not given then a thing must be false is rarely recognized as fallacious. Generalities are not necessarily vague as this fallacy contends. As in the example above, to require that food be required is not the same as to say that this or that particular kind of food is required. Still, “food” as a generality is required for life despite our apparent inability to specify particularly which food-stuffs. It is all too easy to play with this distinction between the general and the specific. One can accuse any generality of being abstract, metaphysical nonsense. And to make matters worse, sometimes generalities can be just that! A group of strangers could be assembled in any made-up category, but this doesn’t necessarily mean that it has any greater significance.
At the same time, one can accuse those who focus narrowly on the specifics of missing the “big picture”. As with the food example. Again, this is not always the case, some times a generality is simply arbitrarily applied. More interesting still are the cases in which something entirely arbitrary, that is a made up category, comes to take the properties of a real distinction. For example, consider human “races”. On the one hand, it seems like “race” is an arbitrary and made-up distinction in which no clear line could be drawn. In this situation, “race” is merely a fantasy of Immanuel Kant’s devising, denoting no real distinctions. On the other hand, that would render “racism” a fictitious action. No one could be racist if “race” itself was not a real thing. And what would it mean to say things like, “sickle-cell anemia affects black populations almost exclusively”? The statement seems to convey some medical information, but if “black populations” is not a real category then it is an empty statement. Based on the heap fallacy, it would seem race is a real thing, but an arbitrary one.
Our only recourse to avoid the heap fallacy is to be aware of the poverty of such rhetoric and guard against its use. We are condemned to constant vigilance. It is all too easy to treat all arbitrary categories as though they were not real, but this is a mistake. Arbitrariness is not an indication of a lack of realness. Some very real things are arbitrary.
|
# Neunkirchen, Bernkastel-Wittlich
**Neunkirchen** (German: \[ˈnɔʏnˌkɪʁçn̩\] ) is an *Ortsgemeinde* – a municipality belonging to a *Verbandsgemeinde*, a kind of collective municipality – in the Bernkastel-Wittlich district in Rhineland-Palatinate, Germany.
## Geography
The municipality lies in the Hunsrück and belongs to the *Verbandsgemeinde* of Thalfang am Erbeskopf, whose seat is in the municipality of Thalfang.
## History
As a result of the turmoil of the French Revolution, Neunkirchen lay under French rule beginning about 1800. In 1814 it was assigned to the Kingdom of Prussia at the Congress of Vienna. Since 1947, it has been part of the then newly founded state of Rhineland-Palatinate.
## Politics
### Municipal council
The council is made up of 6 council members, who were elected by majority vote at the municipal election held on 7 June 2009, and the honorary mayor as chairman.
### Mayor
The Mayor of Neunkirchen is Martin Jung.
## Economy and infrastructure
Neunkirchen is a rural residential community. There are small businesses serving local demands.
## InfoBox
| Neunkirchen | |
| --- | --- |
| Municipality | |
| | |
| Location of Neunkirchen within Bernkastel-Wittlich district | |
| Neunkirchen Neunkirchen | |
| Coordinates: 49°45′03″N 6°56′32″E / 49.75083°N 6.94222°E / 49.75083; 6.94222 | |
| Country | Germany |
| State | Rhineland-Palatinate |
| District | Bernkastel-Wittlich |
| Municipal assoc. | Thalfang am Erbeskopf |
| Government | |
| Mayor (201924) | Martin Jung |
| Area | |
| Total | 3.16 km<sup>2</sup> (1.22 sq mi) |
| Elevation | 400 m (1,300 ft) |
| Population (2022-12-31) | |
| Total | 152 |
| Density | 48/km<sup>2</sup> (120/sq mi) |
| Time zone | UTC+01:00 (CET) |
| Summer (DST) | UTC+02:00 (CEST) |
| Postal codes | 54426 |
| Dialling codes | 06504 |
| Vehicle registration | WIL |
|
I spent time making my profile really good. Brought it here and improved it. It's got humor. It's original. It doesn't make me sound like a creep or a neckbeard. My pictures are natural. One smiling, and two outdoors being outdoors.
And I should add, since this is a throwaway account and thus anonymous (so I'm not here trying to brag about anything), that I'm an attractive, tall, successful guy in a major metropolitan area. Although a bit of a caveat: it is probably clear from my profile that I don't make a lot of money yet. I mention that I teach and that I'm working on my PhD (indeed, getting paid to do so, hence "successful," but I'm not dumb enough to boast about that on my profile).
I send targeted and often humorous messages to women that not only appeal to me, but to whom I think I would appeal. If I'm clearly not their type, even if I find them attractive and interesting, I generally won't bother.
All of this and my response rate is under 10%. I've sent over 100 messages with maybe 10 responses. I've gone on 4 dates. 3 of them turned out to be significantly less attractive than their profile pictures suggested AND had pretty much nothing interesting going on in their lives. The other just wasn't interested for whatever reason, although I guess I can consider that one a "success" in the sense of getting some face time with a person I found to be attractive and interesting. But altogether I feel like I've wasted maybe $50 and several hours of my time on these dates.
I guess I'm just wondering if this is a common experience, and maybe what kind of guys actually get responses. Because at this point, I've tried it on and off for a couple months and I'm ready to call it quits. It's a shame, because I'm pretty busy and in an ideal world this might be a convenient way to meet people.
I'm also wondering if maybe other websites might be better, like match.com or so forth. People there are paying, and so might be more motivated to actually consider taking a couple hours of their time to meet a single guy with no glaring flaws and lots of attractive qualities.
|
# Question
Title: If stirring negatively affects crystal purity, why is it so?
**My Intellectual Expectations**
Intuitively, I would expect strong stirring to improve crystal purity during the process of crystalization. My rationale is that strong stirring would increase contact between each crystal and the variety of ions present in solution at each given level of solubility, and thus minimize the gap between reality and the equilibrium that would be reached if the conditions at each instant (solvent volume and temperature) would be kept equal for a very long time.
**Information I have Read**
I've read that as a general rule, the size of the crystals that form correlates well with the purity inside the crystals (i.e. that crystal size in general is a good indicator of purity).
**My Conflicting Observations**
My observations are that under strong stirring the crystals that form are much smaller than if the crystalization is carried out in still water (at equal rate of cooling / solvent evaporation). This indicates that either crystal size is not a great indicator of purity, or that my rationale is wrong and by counterintuitive mechanisms which I ignore, crystals of greater purity would be formed without stirring.
**My Question**
Does anyone know 1) Wether stirring the solution during the crystalization process positively or negatively affects crystal purity? 2) What is the physical explanation of the answer?
# Answer
"Strong stirring" is a rather imprecise term. There is such a thing as too much speed. Rule of thumb for APIs, if you're working with a magnetic stirrer in a round bottomed flask in a lab (rather than in some industrial vessel or pilot plant setup) 350 rpm is too fast (and no, I can't quote a reference on that, it's one of those things you get told and then confirm by experiece - usually by being a wise-arse and bucking the "established wisdom" and ending up with a product that doesn't make medical grade).
Agitation for different crystallisation processes are generally kept in certain narrow bands to avoid inclusions as wel as a number of other reasons.
An example is described in Chow et.al \[1\] where when crystallizing paracetamol from water in a 500 mL round-bottom flask with p-acetoxyacetanilide present, increasing the stirring speed from 200 to 320 rpm increased product purity, but increasing further to 400 rpm lead to decline in product purity.
According to Meedara et.al. \[2\] stirrer-particle and interparticle collisions can facilitate crystal attrition in suspensions with high energy agitation, leading to attrition-induced inclusions.
Urwin et.al. \[3\] did a reasonably thorough job testing various methods and reasons for presence of impurities in crystals, and is worth a read.
Another good reference is The Handbook of Continuous Crystallization, start with chapter 1 \[4\]
That said, in crystallisation especially of APIs, mechanisms can be compex and are still not completely understood. All kinds of workarounds have been developed, such as e.g. ultrasonics to help prevent agglomeration when crystallizing paracetamol from certain solutions.
If you have no literature on the process you are attempting, finding the "sweet spot" where you get the greatest purity of product, is only going to happen with a lot of experimentation.
\[1\] Chow, A. H. L.; Chow, P. K. K.; Zhongshan, W.; Grant, D. J. W. **Modification of Acetaminophen Crystals: Influence of Growth in Aqueous Solutions Containing P-Acetoxyacetanilide on Crystal Properties** Int. J. Pharm. 1985, 24 (2–3), 239– 258, DOI: 10.1016/0378-5173(85)90024-9
\[2\] Meadhra, R.; Kramer, H. J. M.; Van Rosmalen, G. M. **Model for Secondary Nucleation in a Suspension Crystallizer** AIChE J. 1996, 42 (4), 973– 982, DOI: 10.1002/aic.690420410
\[3\] Urwin, SJ, Levilain, G, Marziano, I, Merritt, JM, Houson, I and Ter Horst, JP **A Structured Approach To Cope with Impurities during Industrial Crystallization Development** Organic Process Research & Development 2020 24 (8), 1443-1456, DOI: 10.1021/acs.oprd.0c00166
\[4\] McGinty, J, Yazdanpanah, N, Price, C, ter Horst, JH and Sefcik, J **Nucleation and Crystal Growth in Continuous Crystallization** , in *The Handbook of Continuous Crystallization*, 2020, pp. 1-50 DOI: 10.1039/9781788013581-00001
> 2 votes
# Answer
1. Stirring during crystallization is positive for the purity of the crystals.
2. The explanation is that with stirring, your liquid phase will be homogeneous.
Then, there are some other details. Many times, especially in research labs, the target of crystallizing is to get a crystal for XR. What you need then is a crystal big enough to put it into the instrument. Stirring accelerates the crystallization and nucleation rate, so you get smaller crystals. That means, if you want a big crystal, don't stir and wait. But if you are producing some chemical and you have a constraint on purity, and on batch time, stir as efficiently as you can. Then, if the crystal size is too small, the filtration time will be longer so, do some optimization.
If you don't stir, the crystals grow slower. The liquid phase can be very supersaturated without nucleation. But, at the same time, your liquid phase is not homogeneous, so the surface of the crystal is not in equilibrium with the bulk of the liquid. At that point, the less soluble compound, the one that is crystallizing, might not be locally supersaturated and some other impurity can start crystallizing on the growing crystal, yielding a final product of bigger crystals with lower purity.
> 0 votes
---
Tags: solutions, crystal-structure, purification, crystallography, recrystallization
---
|
# Catholic Centre, Brisbane
**Catholic Centre** is a heritage-listed converted warehouse at 149 Edward Street, Brisbane City, City of Brisbane, Queensland, Australia. It was designed by Slatyer & Cosh and built in 1900. It is also known as Edwards Dunlop Building. It was added to the Queensland Heritage Register on 21 October 1992.
## History
This building was erected in 1900 for Edwards Dunlop & Co Ltd, a Sydney-based paper merchandising firm. The architects were probably the Sydney firm Slatyer & Cosh. The building featured an electric lift, modern fire fighting equipment and an extensive telephone system.
The company occupied the building on 1 January 1901, the day of Federation. It was an apt moment, as Federation removed many of the obstacles to intercolonial trade, allowing Sydney-based companies like Edwards Dunlop to more economically tap the Queensland market.
By 1910 the company was considered to be the largest paper wholesaling firm in the state. It was the contractor to the Queensland Department of Public Instruction, supplying text and exercise books and wall maps to schools around the state. The company acquired adjoining portions of land in 1925 and 1957, taking their block in an L-shape to Charlotte Street.
In 1974 Edwards Dunlop moved to premises at Eagle Farm, and in the following year the building was purchased by the Roman Catholic Archdiocese of Brisbane. Renovations and modifications were undertaken which included the installation of a new lift and stairs, the construction of video and radio studios, and the provision of access to St Stephen's Cathedral. The building is currently occupied by various Catholic organisations.
In 2013, the Catholic archdiocese took the owners of the adjacent Exchange Hotel to court in an attempt to stop an extension to the hotel, citing the impact on both the Catholic Centre and St Stephen's Cathedral.
## Description
This polychrome brick and stone Federation era building comprises four storeys with a basement.
The upper three levels are encompassed by giant order pilasters that separate the window openings. These have plain capitals that support cut stone semi-circular arches over the top windows. The parapet has four shallow concave curves punctuated by projecting piers at the centre and ends.
The street facade has three entrances. The main entry on the western end is emphasised by a projecting stone pediment and another served as a carriageway. The windows to the major ground floor space are shaded by the later addition of a deep corrugated iron sun-hood supported on cast iron brackets.
The windows to the basement are separated by rusticated stone piers and protected by cast iron picket screens.
The rear of the building has been painted and has a tall T-shaped arched tank stand located centrally at the top.
Internally elements of finely detailed original joinery survive. Timber posts, beams and brick walls are unpainted.
## Heritage listing
Catholic Centre was listed on the Queensland Heritage Register on 21 October 1992 having satisfied the following criteria.
**The place is important in demonstrating the evolution or pattern of Queensland's history.**
The Catholic Centre is significant as a Federation era warehouse with a finely detailed face brick and stone facade, much intact internal structure, and joinery.
The Catholic Centre is significant for its contribution to the Edward Street streetscape, which here is dominated by late nineteenth and early twentieth century buildings.
**The place is important in demonstrating the principal characteristics of a particular class of cultural places.**
The Catholic Centre is significant as a Federation era warehouse with a finely detailed face brick and stone facade, much intact internal structure, and joinery.
**The place is important because of its aesthetic significance.**
The Catholic Centre is significant for its contribution to the Edward Street streetscape, which here is dominated by late nineteenth and early twentieth century buildings.
### Attribution
This Wikipedia article was originally based on *"The Queensland heritage register"* published by the State of Queensland under CC-BY 3.0 AU licence (accessed on 7 July 2014, archived on 8 October 2014). The geo-coordinates were originally computed from the *"Queensland heritage register boundaries"* published by the State of Queensland under CC-BY 3.0 AU licence (accessed on 5 September 2014, archived on 15 October 2014).
Media related to Catholic Centre, Brisbane at Wikimedia Commons
## InfoBox
| Catholic Centre | |
| --- | --- |
| Catholic Centre, 2008 | |
| Location | 149 Edward Street, Brisbane City, City of Brisbane, Queensland, Australia |
| Coordinates | 27°28′10″S 153°01′42″E / 27.4694°S 153.0284°E / -27.4694; 153.0284 |
| Design period | 1900–1914 (early 20th century) |
| Built | 1900 |
| Architect | Slatyer & Cosh |
| | |
| Queensland Heritage Register | |
| Official name | Catholic Centre, Edwards Dunlop Building |
| Type | state heritage (built) |
| Designated | 21 October 1992 |
| Reference no. | 600091 |
| Significant period | 1900 (fabric)<br>1901–1974 (historical) |
| Significant components | tank stand, furniture/fittings, carriage/wagon/dray entrance |
| | |
| | |
| Location of Catholic Centre in QueenslandCatholic Centre, Brisbane (Australia) | |
|
Should there not be some attempt to organize and even strategize about how to best use this platform to alert people about the serious issues being discussed in this subreddit.
If we focus our efforts on a few well thought out entries we can make a serious impact. Considering how many people now are aware of how much we have been lied too, and how obviously it can be demonstrated to a rationally operating mind, why is it so hard to reach critical mass? What are we doing wrong or aren´t er doing right?
The truth is on our side, we know that. How can we create the hype necessary on some of the most urgent topics?
I think what probably most of realize is that these issues are of such significance that we can´t expect everyone to agree on everything. About an 80% frequency of shared understanding on these issues should be enough too unite for a common goal and just settle the last 20% later. In this respect, the "right/left" debate is completely irrelevant. So is division over preset ideologies and details. Let´s get the power back to the people. Than we can start discussing the future.
On a sidenote, if critical mass can be achieved, I think our best option would be to as publicly as possible, demand open negotiation between those that we have recognized as major players in these conspiracies and consensus based representatives of the people.
What really needs to end is the age old war of the elites and the commoners. I´m not sure a bloody and gruesome final showdown is the best way to go about it. They may not have a lot of compassion, but they seem to have good logic, and if we could demonstrate that they were being thoroughly exposed by a majority of the population, they would surely be looking for a peaceful way out.
In my view it is critical that we give such an opportunity, instead of demanding their deaths, and thus ensuring that they must fight us to the last breath of their existence with any tactics necessary.
Any thoughts on how this can be accomplished?
|
How Does Ephedra Work
Step-by-step Instructions
Here is what you need to do...
Step 1
Today I wanted to discuss the topic of ephedra. Now, ephedra has become a rather infamous drug. But, technically, its not really a drug. Its a chinese herb that has been around for 5,000 years that was mainly created to cure people of hay fever and the flu. Now, it also was discovered that it was a stimulant to the central nervous system. And with being a stimulant to the central nervous system, it also becomes a stimulant to the metabolic rate of your body. So, what it does is, it speeds up your metabolism, along with being a stimulant of the central nervous system, is basically what I am saying. Now, because of its metabolic rate increase, many people have started to use this drug to lose weight, to get in shape, to get cut.
Step 2
Now, ephedra is extremely effective and I don't think anybody will argue with me on that one. But, it has had its dangers. many people have had heart attacks, severe dizziness, fainting, high blood pressure, and irritability based on ephedra. In some cases, people have died. Now, back in 2001, offensive forward tackle, Cory Stringer for the Minnesota Vikings had died based on heat stroke. However, it was found that he was taking ephedra, which raised a lot of questions to what role ephedra played in his death. Now, I don't know if ephedra really played a direct role in his death with heat stroke, but I know that it could not have helped the situation.
Step 3
And a Florida State linebacker in the late 1990's also died using a stimulant product such as like an ephedra type of thing. So, it is something you should keep an eye on. Many athletes have used it. It has now become illegal. And its a salt alkaloid, that is really what it is of an herb. Salt alkaloid herb.
Step 4
And what I suggest most people do is just to stay away from it. Now, it is effective and if you are going to use it, I suggest use it under the proper care. Get it from a physician, and thats about it. Now, most doctors are not going to prescribe this as a weight-loss drug. Legitimately, it might be some in an herb that they suggest you take, but they are not going to suggest this as a weight-loss drug. They are going to tell you diet and exercise, which is the proper way.
Step 5
Ephedra, though, I would take it, honestly, if it was given to me, to be honest with you, I would take it. Only because I know what I am doing. A lot of people don't. But, if you know what you are doing, I would take it. Now, it is illegal, and it is not something I would suggest you go out and find and you try to get black market-wise. But, if I were to get it legally, I would take it properly, and I would not abuse it. I think that is where people screw up because they go overboard and they end up abusing it. And that's just stupid. It's ridiculous. Its retarded. Don't abuse ephedra. You know it has cardiac influence, so don't screw around with that. Because you are messing with your life.
Step 6
I know everybody wants to cut weight. And everybody wants to look good, especially in the summer months, but let's be legit here. Lets be realistic. Is it really worth your life? Is it really?
Step 7
If you are just taking ephedra as an easy way out, I have news for you: nothing works without diet and exercise. Nothing works without cardio and diet. Nothing. Nothing works. So, if you think ephedra is going to be your short-cut, you are sadly, sadly mistaken my friends. Because it won't be. All it will do is speed it up.
Step 8
Yes, it will help and yes, it will make it more effective. But it is not everything. You have to find it in your heart to go out there and make it happen. You cannot rely on ephedra or clenbuterol, which is another illegal weigh-loss drug. You cannot rely on winstrol, You cannot rely on any of those illegal black-market things, or even legal fat-burners with caffeine, and green tea extract.
Step 9
Still, you have to go out and do your job. You can use supplements and legalized drugs that are legal, supplements that are legal, and drugs that are legal, you get legitimately, you can use those things but you cannot be lazy. You got to do it right, and you cannot abuse it. You have to take it one step at a time. And what I mean by abusing is, say you have to lose 20 pounds in four months, and you do not try to do it all in one month, because it will become deadly, especially if you are overdoing it with these products and ephedra. Ephedra is the main one I am talking about.
Step 10
If you are trying to lose 20 pounds in four months, yes, it might be smart to use ephedra if its legal, but if you are are going to do it. You need to do it little by little and don't abuse it. Don't try to do it all at once, because you can seriously run the risk of killing yourself. And that is serious, my friend. That is serious and that is not something you want to mess around with. Because once you die, obviously, there is no coming back. And you do not want to be known as the fat guy or the overweight guy who tried to do it all and too much. You do not want that on your tombstone. You do not want that. You do not want to be remembered as somebody who just didn't want to work hard. You might be willing to work hard, but you don't want to be known as somebody who is known also for being stupid. Don't do these things.
Step 11
Now, I know its sad when there is death, but also, too, you want to go out strong. You want to go out when you are old. You do not want to go out young. Campus men do no want to go out young, all you college guys watching out there. We are young, we are strong, we want to go out when we are 85 years old and we have done everything we have set out to do. We do not want to go out now.
Special Attention
Be smart. If you are going to use ephedra, use it wisely. Know what it is capable of. Know what can happen. And know what the risks are. Know what you are doing it for. And have a plan, don't abuse it. And if it is illegal, which it is in most states. In know in New York and California, it is illegal. And I thing also too, in Texas as well. If its illegal in any state its in, or even in America, I don't know it might be totally illegal now in all 50 states. Then don't do it. Don't. But if it isn't, then I suggest you proceed with caution. And the second anything happens, either you consult a physician, or you stop. Because you are messing with your life.
Stuff You'll Need
Brand Product Price
Suggested Further Reading
Author Title Price
New Rules of Lifting No Price
This Student Author
This Student Author's Background
Funny or interesting story about this topic...
I would take ephedra, but only because I know what I am doing.
Other Tips from Franco
|
# Samuel Goldwyn Estate
The **Samuel Goldwyn Estate** is a house at **1200 Laurel Lane** in Beverly Hills, California. It was designed by American architects Douglas Honnold and George Vernon Russell for Polish-American film producer Samuel Goldwyn and American actress Frances Howard, finishing construction in 1934. The property was owned by the Goldwyn family until 2015, when it was purchased and subsequently renovated by American singer-songwriter Taylor Swift.
Goldwyn and Howard held several social gatherings at the house, with guests including Marlene Dietrich, Charlie Chaplin, Clark Gable, Frank Capra, Katharine Hepburn, Irving Berlin, Ginger Rogers, Jock Whitney, Lucille Ball, Eleanor Roosevelt, Norma Shearer, and Harpo Marx. The house was made a National Historic Landmark in 2017, and hosts Swift's recording studio, Kitty Committee Studio, set up in April 2020.
## Design
The house was designed by Douglas Honnold and George Vernon Russell in the Georgian Revival style. It was Honnold and Russell's first commission. The pair subsequently designed the Dolores del Río House for the actress Dolores Del Rio and her husband Cedric Gibbons in Pacific Palisades. The house is set over 11,000 sq ft (1,000 m<sup>2</sup>) on two stories made of brick and rendered in stucco. A large foyer leads to the ground floor public rooms. The dining room had a table that could seat 20 guests.
The main lounge featured "heavy green drapery" and led to a small card room. The house has four bedrooms on the first floor with the master bedroom suite on the second floor. A guest suite is situated above the garage. The paneled library was also used as a screening room, with the outer doors of the library leading to the large patio. The grounds of the house are set over terraces and include a swimming pool with accompanying cabana, a tool shed, and a tennis court.
Goldwyn's biographer A. Scott Berg describes the property as a "gleaming white house with black trim, its two wings forming a welcoming obtuse angle". Howard was given a free rein over the design and planning of the house from Goldwyn, with his only stipulation that the house be white. Goldwyn's biographer, Carol Easton, felt that the design of the house with its strict formality and understated conservatism reflected Howard's understanding of Goldwyn's desire for status and respectability that he had sought since his arrival in the United States as an illiterate immigrant.
## History
### Goldwyn family
The estate is one of three lots on Laurel Lane in Beverly Hills. Berg describes Laurel Lane as a "knoll off Coldwater Canyon". The first lot was occupied by film director Wesley Ruggles, and the second would remain unoccupied for several decades. The actress Frances Howard, Goldwyn's wife, noticed the available third lot of 2.5 acres (1.0 ha), and persuaded her husband to purchase it. Among the reasons that prompted the Goldwyns to move was the desirability and social cachet of the Beverly Hills address and the lack of a projector room in their West Hollywood house.
Actress Katharine Hepburn and composer Irving Berlin, alongside his wife, were frequent guests at Goldwyn's renowned dinner parties
The house was built over two years by Richard Day and Alexander Gollitzen with the interiors constructed by labourers from the Metro-Goldwyn-Mayer film studio. It was completed in November 1934. Goldwyn would frequently use the house as collateral to finance the production of his films. Goldwyn would walk the three miles from the house to work in Hollywood every day, down Laurel Lane and Sunset Boulevard to the border of Beverly Hills and West Hollywood, with his chauffeur following behind him. He would then be driven through Hollywood to the studio, with the journey being done in reverse at the end of the day. Goldwyn claimed that the steep walk up and down the hill every day kept him fit, exclaiming to associates that "You can just feel that oxygen going into your system!".
Howard would become noted for her social gatherings at the house, frequently hosting large parties honoring other notable spouses such as Irving Berlin and Ellin Mackay, or Averell and Marie Norton Harriman. Attendance at Howard's dinner parties for twelve guests were described by George Cukor as the "hardest ticket in town", with Katharine Hepburn remarking that "You always knew where your career stood by your position at the Goldwyn table". Berg notes the Goldwyns ability to draw entertainment personalities to the house with their hosting of a dinner on New Year's Eve of 1935 for Cole Porter, Lady Mendl and Gary Cooper and his wife, followed by a "champagne supper served at midnight" that was attended by Harold Arlen, Jack Benny, Charles Boyer, Frank Capra, Marlene Dietrich, Clark Gable, Howard Hawkes, James Hilton, Sidney Howard, Myrna Loy, Ginger Rogers, David O. Selznick, Walter Wanger, Jock Whitney, Loretta Young, and an additional fifty guests. Lucille Ball ate her first artichoke at a dinner party at the house, and was mystified how to eat it until Harpo Marx showed her. Eleanor Roosevelt attended a small dinner party at the house prior to the premier of *Wuthering Heights* with Norma Shearer and Merle Oberon.
Howard created a croquet pitch at the house for Goldwyn's birthday in 1956 and he became an enthusiastic player, often inviting Mike Romanoff and others for games at the house. Goldwyn was presented with the Presidential Medal of Freedom by President Richard Nixon at the house in March 1971. As Nixon leaned in to put the medal around Goldwyn's neck, Goldwyn pulled Nixon's lapel and said to him that "You'll have to do better than that if you want to carry California" in reference to the forthcoming presidential election. Goldwyn died at the house in 1974 aged 94. Goldwyn's son, Samuel Goldwyn Jr., moved into the house in 1976 and lived there until his death in 2015.
### Taylor Swift
Having been up for sale at various periods since 2008, the house was put up for sale for $39 million in 2015 following the death of Samuel Goldwyn Jr. in January of that year. The house was sold in September 2015 for $25 million to the singer-songwriter Taylor Swift. Since her purchase of the house, Swift has worked to restore it to its original condition under the architect Monique Schenk, who said they had preserved and maintained the original fabric of the house and replicated deteriorated elements. Works undertaken by Swift include the restoration of windows, the reconstruction of columns at the swimming pool's cabana, the preservation of the *Wisteria* foliage that partially adorns the house's facade, and wooden decorative elements such as lattice panels and wooden finials.
Swift has sought its recognition as a local landmark by the Beverly Hills Cultural Heritage Commission and the Beverly Hills City Council. Noah Furie, the vice chair of the Beverly Hills Cultural Heritage Commission said in a meeting that the house was "one of the great estates in this city" and that it was "very important to the history of the city". Furie said that they were "thrilled" that the present owner would "keep this house and spend the money to restore it because it's no small thing to do". Mayor of Beverly Hills, Lili Bosse, said “I think this is a true community gem and really so thrilled that this will be landmarked and preserved.” In 2017, the house was made a National Historic Landmark, a status granted to buildings of historical significance in the US. Swift's 2020 studio albums, *Folklore and Evermore,* were partially recorded in a recording studio built on the estate, entitled Kitty Committee Studios, as a result of the COVID-19 pandemic. In the same week *Folklore* won the Grammy Award for Album of the Year, Swift returned to the studio to record vocals for Big Red Machine tracks "Renegade" and "Birch" from their 2021 album *How Long Do You Think It's Gonna Last?*.
## InfoBox
| Samuel Goldwyn Estate | |
| --- | --- |
| Samuel Goldwyn EstateLocation within the Los Angeles metropolitan area | |
| General information | |
| Type | House |
| Architectural style | Georgian Revival<br> |
| Location | 1200 Laurel Lane, Beverly Hills, California |
| Coordinates | 34°5′16.4″N 118°24′52.4″W / 34.087889°N 118.414556°W / 34.087889; -118.414556 |
| Construction started | 1934 |
| Owner | Taylor Swift |
| Technical details | |
| Floor area | 11,000 sq ft (1,000 m<sup>2</sup>) |
| Design and construction | |
| Architect(s) | Douglas Honnold |
|
Saturday, 25 February 2012
Swearing in YA fiction
Does strong language have an impact on the commercial success of a book?
There is a big difference between dialogue and transcribed speech. When people talk, in the right environment, every other word can be expletive and no one cares. Usually, this is because the swearing in speech is often used as a wild-card adjective to save having to think of anything more suitable. With teens, there is the added whammy that bad language can define independence. It becomes such a prominent part of their language that some kids can speak in nothing other than swear words and still get their point across.
In a book, that would be awkward to read and ultimately dull. Some writers of adult fiction suffer from this; their novels are so peppered with profanity that you end up having to skim through repetitive crap to get to the story. That bugs the hell out of me and usually puts me off.
So when is it appropriate?
A carefully placed f-bomb can have real impact in certain situations. Rather than just anger, attitude or strength, they can define a specific turning point for a character, their failure, or sudden confidence. There are only a few instances in Clash, and I battled with each one, deciding whether they were justified. If not, they went.
The alternative use of bad language is to show realism - because in the real world, villains tend to swear. The problem with this is that if you have villains in several scenes, you need to be consistent in their language. The single f-bomb no longer works, because that first instance wasn't a revelation; it wasn't a surprise. So if your baddy swears in chapter two, you need to follow through wherever else they appear. If you do that, the f-count rockets up and you end up wondering if this is going to cause a problem. Book sellers can refuse to stock it if they don't consider it suitable for teens, as can libraries and schools, parents...
But can you have a strong, violent thriller without bad language?
Two writers come immediately to mind. Suzanne Collins and Lee Child.
Suzanne Collins wrote The Hunger Games, a book that’s chock-a-block with childhood violence and murder, but has no bad language. Is that because it’s a children’s novel? Maybe, but it doesn’t stop it selling to adults. The three books in the trilogy top the ebook charts as well as paperback sales. Does a lack of bad language hamper the story? Well... in places I can’t help thinking Katniss would react a bit more strongly.
But Lee Child is something else. Lee Child writes commercial thrillers for adults. His books are violent, include murder, imprisonment, brutality, violence, rape and paedophilia with a main character who is strong, moody, and at times explosive. But no bad language. Nothing. I actually reached the end of the first novel (actually, I read #11 first) before realising. So in that case, it worked perfectly well.
But why? Do these authors feel like I do, that too much bad language is repetitive and boring, or that too little makes it obvious that it has been toned down? Or is it a commercial strategy? It might not make a difference with adult thrillers, but I can't help wondering if the Hunger Games was splattered with swear words, would it still be the massive success it is?
I don’t know. All I do know is that Arabesque goes to proof in a couple of weeks... and I need to decide if the strong language I've got so far is essential to plot, or a bullet in the foot.
What do you think? Should YA novels have strong language, or can you maintain the illusion without?
Thursday, 16 February 2012
I feel like my head's exploded. I've just completed a mega turbo ninja edit of ARABESQUE.
I posted a blog at the start of this edit when I first went over the document. It can be difficult for a writer to see all those red lines and comments, but ultimately, it's the sign of a good editor. Of course, the other sign is the editor who insists that all those marks are suggestions, and not orders.
In the case of Arabesque, I think I agreed with about 95%. Copy edits are a doddle - you just decide whether the gramatical changes suit. The suggested changes are the tough ones, but the most satisfying - that's the fun stuff.
So there you go. Writing a novel takes a bit more work than just churning out the words. And just because you've been through the process once, doesn't make your writing flawless the next time round. You'll still need an editor, but the process of editing become easier. It's also good to look back on old attempts and see how far you've come. You realise that what you once thought was brilliant, is actually crap. But more importantly, you'll realise why!
Right... off to find something else to do.
Saturday, 11 February 2012
Kyle's Drawing from CLASH
Okay, Kyle is fictional, so no, this isn't really his drawing, but it is the image that inspired a certain scene.
In Clash, Kyle is at a loss what to do when his mother is in the maternity ward and her baby (Kyle's brother) is in an incubator in Special Care. He ends up doing a drawing so his mother can have an image of her baby by her bed - all because the other mothers in the ward have their actual babies in cots by their beds.
This scene was taken from real life.
When my wife had our first boy, he was in an incubator in the Special Care Baby Unit, and she was up in a ward where other mothers had their babies in cots - a bit cruel, but there you go. A decent ward might have put her in a side room.
For some reason I thought you weren't allowed to use cameras in the special care unit (there were some very premature babies in there under special lighting). So I nipped home, grabbed a drawing pad, pencils and set to work. I went back up to the ward and pinned the picture to the wall.
However, there is a spooky side to this story. When we lived in Washington, loads of strange things happened when Matthew came home. His mobile would spin on its own, the cat would go nuts for no reason... there were other weird things too, but the strangest was the morning when this drawing (in its frame) fell off the wall for no reason. This happened at 6am while we were still in bed. The bang woke us up, and I came downstairs to find the frame behind the TV. Rather than refix it there and then, I put in on the bookcase and went back to bed...
...That evening, we had a flood and every picture that was still hanging in our front room was ruined as water streamed down the walls.
|
# Horwathia lineolata
***Horwathia lineolata*** is a species of bugs in the tribe Mirini, family Miridae.
## Distribution
This rare species is present in Austria, France, Germany, Liechtenstein, Italy and Switzerland.
## Habitat
These bugs inhabit high-montane and subalpine heights and are endemic to the Alps and the Apennines.
## Description
*Horwathia lineolata* can reach a length of about 7–8 millimetres (0.28–0.31 in). These small bugs have a black or dark brown scutellum and a brown membrane. The pronotum is yellowish with three dark brown markings. Hemelytra are yellowish, crossed by thin longitudinal brown lines (hence the Latin species name *lineolata*, from Latin *lineola*, diminutive of *linea*, meaning small line. Legs and antennae are reddish.
## Biology
Adults can be found from May to early June. The larvae are herbivores and live on species of the genus *Luzula*, especially on *Luzula campestris*.
## InfoBox
| *Horwathia lineolata* | |
| --- | --- |
| | |
|
| Scientific classification | |
| Kingdom: | Animalia |
| Phylum: | Arthropoda |
| Class: | Insecta |
| Order: | Hemiptera |
| Family: | Miridae |
| Subfamily: | Mirinae |
| Tribe: | Mirini |
| Genus: | *Horwathia* |
| Species: | ***H. lineolata*** |
| Binomial name | |
| ***Horwathia lineolata***<br>(A. Costa, 1862) | |
|
| Synonyms | |
| * *Calocoris lineolatus* (A. Costa, 1862) | |
|
The World Economy Crisis – A Crisis in Human Consciousness
By Julian Burke in Economy on February 6th, 2010 / 3 Comments
The Social Nature of Our Economy
Whenever our economic system is struck down by turmoil, it’s often too easy to see it as a randomly occurring event. Too many people have too little understanding about the inner workings of the economy, and that narrow minded lack of foresight is what contributes to its unpredictability in the first place. We stand back, awestruck and aghast at the situation we currently find ourselves in, and we ask ourselves the question “how did it fail?” In truth, it would be much more fair to ask “what did we do to let it fail?”
It’s important to understand that the economy is an integral part of our social existence, the purpose of which is to weave us all together in a way that helps everyone progress measurably as a people, galvanizing us together as we hurtle forth through uncertain times. No matter how easy it may be to feel alone from time to time, society is built in such a way that we are all part of it.
Through interactions, we are all bound to one another. What happens to a small group of us affects all of society, even if only in a small way. There is a system of give and take built in to this community on which our lives are structured, and a lack of respect for the consequences of these metrics is exactly what lands us in a state of recession, such as the one we are currently experiencing.
The two primary types of people that we have occupying this system are those that believe in giving, and those that believe in taking. The precarious balance that is maintained by the actions of these two groups canceling one another out is how we stay afloat.
People Who Take Without Consideration
Whether or not you realize it, everyone, including yourself, has been a taker at some point or another in their lives. Everyone has gotten out of bed in the morning and asked themselves how they can get the most out of society. What can the world do for them today? This sense of self entitlement, however misplaced, is not without positive merit.
It can sometimes lead to the type of conspicuous spending that can help to fuel an economic restart. In the long term however, this type of thinking contributes little to the overall model of society. Those that see fit to leech off of our economic bloodstream without contributing anything significant to the wholeness of society are nothing more than a drag on our economy.
They are the barnacles that cause too much drag on what might otherwise be a speedy sea vessel. While that may sound a bit harsh and derogatory, it is true that detractions from the resources that run our society rob it of the means with which it would normally be able to do great things for all people. Perhaps unintentionally, these takers stand in the way of true progress through selfishness, and a combination of the lack of patience and an inability to see beyond their own life’s problems.
No better example can be thought of than the millions of perfectly healthy people who are fit to work that insist on sustaining themselves off of government welfare checks, and at the expense of all taxpayers. Through lack of motivation, or perhaps sheer laziness, these people have been convinced that freeloading is a viable option to being a contributory member of society. In their eyes, this sort of lifestyle is “good enough,” and they don’t feel the need to further develop their skills.
Some would place the blame on a system that is too lenient on people who do not require these types of handouts in order to survive. Without a doubt, government aid funding like this helps people who can’t help themselves get back on their feet, so that they can return to the working world and proceed to give back that which they’ve taken.
For honest, working people such as these, the economic bloodletting is a worthy investment. It is sad that every unnecessary government check that goes out to a member of society that simply does not wish to contribute serves only to cancel out the efforts of good, hard-working taxpayers. The millions of people who do nothing but ask themselves what society can do for them, and how they personally can get the most out of it, will be the ones who most contribute to its downfall.
The Selfless Providers of Service
Fortunately, there exists another type of thinker who, by their very nature, helps to hold the threads of society together; the givers. These are the people who start their days asking what they can do to give the most they can back to society.
They are tireless servants of a system that they wholeheartedly believe in, and they understand that their way of life will never survive if the whole of society does not work together to preserve it. They take their obligations to the people around them seriously, and are able to see that any economic recovery is going to be a group effort, and they are there to do their part.
It goes against their convictions to sit and wait for a handout, or to stand idly by and wait for a government entity to come up with a solution to their problems. Instead, they put their faith into the principles of free marketing, and play their roles as earnestly as they know how. You see these types of people everywhere, and they will be the true heroes of the economic upturn to come.
It is by their deeds that society will come to know a more enlightened state of being. These are the people who are not afraid to make investments of their own hard-earned money back into the system, unabashed by the fears caused by the turmoiled market.
This is not to say that the giving type of people don’t also take from the bread basket of society from time to time. They, like everyone else, consume government services, and exercise their public rights. The difference is all in their state of mind. It lies in their natural tendency to ask the question “what can I do to help?”
When you combine this enlightened attitude with a person of substantial material means, you have a force of economic rehabilitation to be reckoned with. It is these sorts of people who contribute to the theory of trickle-down economics, which stipulates that responsibly applied wealth provides a great service to society, and eventually leads to a more complete and healthy planetary civilization.
Undeniably, there is much more to the nature of society than its economic structure. Society has a warm, beating heart that feels every stimulus that acts upon it. By their acts of moral philanthropy, people who provide service to society instill upon it a profound sense of hope for the future. It can be as simple as a single kind act enacted upon a single stranger.
In time, good deeds get paid forward, and the resulting ripple effect will help to slowly break us all free of the mental bonds of past misfortunes. With any luck, this type of attitude will be contagious, and will eventually lead to the creation of the society in which everyone helps everyone else to be happy, rather than one in which people climb on one another just to get what they want. Perhaps we will be that fortunate in years to come.
Share/Bookmark this article
Link to this article
It will look like this: The World Economy Crisis – A Crisis in Human Consciousness
3 Responses to “The World Economy Crisis – A Crisis in Human Consciousness”
1. Ron Marriott Says:
There has got to be a better way to inform the public on the mental process involved in creating fear. One word from the press about some thing and off it goes. Fear of spending, illness and corruption or
war and the cork is unplugged to run fearful thoughts. LOA in grand fashion. What will do it? Is the thought of the end of the world in 2012 going to be it?
2. asking the right questions Says:
3. Henry Says:
I simply wanted to just take a couple of seconds and tell you that I really liked the write-up.
I really don’t believe many people know simply how much labour that gets put into constructing a web-site. I know this will be kind of random but it bothers me occasionally. Nonetheless good post.
Add Your Comments:
|
# Cassano delle Murge
**Cassano delle Murge** (Barese: *Casséne*) is a town and *comune* in the Metropolitan City of Bari, Apulia, southern Italy.
## Origins of the name
It probably derives from the Latin name Cassius with the addition of the suffix *-anus*.
According to others, the name refers to the ancient worship for Janus to whom a small temple was dedicated, that is Jani's house. From this derives the toponym of the town "Casa Jani"
Actually this derivation, proposed by the historian Nicola Alessandrelli, is rather doubtful, as "house" in Latin corresponds to *domus*.
An alternative hypothesis is that the name derives from the Cassia gens.
In the high imperial age the whole Puglia was object of centuriation by the Romans, so it could be Cassianum, that is property of the Cassia family.
From archeological excavations carried out, it seems that the cardo maximus (Via Sanges-Via Cavour axis) and the Decumanus Maximus (Via Gentile-Via Magg. Turitto axis) intersected in the current Piazzetta delle Quattro Colonne.
Moreover, Cassano, stands on a link road between the Traiana way and the Appian Way and it seems that the town was a rest station and a Camino dei cavalli.
Recently, a Romanic mosaic was discovered under the pavement of Miani Palace, which would prove the existence of a Roman villa, in compliance with the custom of building the most important buildings near the most important crossroads.
In Italy there are seven towns called Cassano, so in 1862 "delle Murge" was added to distinguish it from the others.
The specification refers to the well-known Apulian plateau.
## History
### Prehistoric Age
Hundreds of stone artifacts, paintings, various objects found in the caves around the town tell us about prehistoric settlements.
The recent discovery of a menhir, dating back to 2500–2000 BC., confirms the antiquity of the human presence in these districts.
### Roman Age
The origins of Cassano seem to date back to the Roman Age, as confirmed by many archaeological finding, such as the recent discovery of a precious 5th century mosaic floor.
Also in late antiquity, in a point of the territory called "Lake of Battaglia" a clash relating to the Greek-Gothic War took place between the army of the Byzantine Empire and the troops of the Gothic Totila, during which it would have distinguished itself, for courage, a Cassanese woman dressed as a warrior, distinguished herself, for courage and heroism.
To worship her memory, her companions erected a monument to her with a pile of stones, still known today as "Specchia di femina morta".
Due to the typical karstic conformation of the area, there are a lot of grottos. The biggest is located about 3 km from the urban built up area, the grotto called "di Cristo", was discovered in the 17th century. Two kilometers to the east we find the grave of "Pasciullo", 180 meters deep and still to be explored. Three kilometers to the south-east, a source called "Pozzo di Conetto" gushes.
Historical investigations have ascertained the existence of a temple dedicated to Janus in the place where the church of SS. Crucifix is.
## Physical geography
### Weather
The weather of Cassano delle Murge is a cool Mediterranean one, with not very cold winters and hot and dry summers. Rainfall is around 700 mm / year, therefore generally abundant in winter, autumn and spring and rare in summer, from July to September, although there are also thunderstorms in the afternoon. Snow falls almost exclusively in January and February, during the cold air waves from the Balkans or from the North Europe. In winter the prevailing wind is the sirocco or libeccio.
## Monuments and Places of interest
### Religious architectures
* Convento di Maria Santissima degli Angeli
* Chiesa di Santa Maria Assunta (chiesa matrice – sede parrocchiale)
* Chiesa della Madonna delle Grazie (sede parrocchiale)
* Chiesa del Santissimo Crocifisso
* Chiesa di San Giuseppe
* Chiesa di San Nicola
* Chiesa di San Rocco
* Cappella dell'Immacolata
* Cappella della Madonna di Costantinopoli
### Civil architectures
* Miani Palace
## Society
### Demographic evolution
Inhabitants registered by Istituto Nazionale di Statistica.
### Ethnicities and foreign minorities
The foreigners living in Cassano delle Murge are 553. In 2013, the most numerous groups were:
## Culture
### Cinema
Cassano delle Murge has been transformed into a film set on several occasion.
Between 1930 and 1931, the milanese director Mauri made one of the last silent movies of the Italian cinema, but one of the first silent movies turned in Apulia. *Idillio infranto – Film folkloristico pugliese*, this title had the female Mantovani protagonist Mantovani and a cast amateur actors, with Michele Silecchia and Filippo Ilbello. Shootings were carried out by the photographer Perugini and some scenes were filmed in the countryside of the Murgia, near Cassano delle Murge. The movie, in black and white, lasts 53 minutes.
Another movie is *Three brothers* (1981), a film by Francesco Rosi with Michele Placido, Philippe Noiret, Vittorio Mezzogiorno, Charles Vanel.
In 2004 the Apulian director Sergio Rubini filmed *Love Returns*, with Margherita Buy and Mariangela Melato.
### Art
In 2016 the Apulia Land art Festival was held by Massimo Nardi. Over 20 countries in the world, took part, almost 100 artists asked to take part, and 11 of them were invited for the final competition. Embassies of every culture, the artists of the recent edition of ALAF were characterized by extremely different, heterogeneous and, at the same time, complementary curricula. Harvard, Cambridge, University College of London, IED, Academy of Bulgaria and many others, are the institutions represented, making an urbi et orbi of art in the silvanico Bosco di Mesola, which, as expected by the festival's statements, becomes, for a week, one of the protagonists of the Italian contemporary art scenes.
## Economy
### Handicraft
Among the most traditional and renowned activities there are handicrafts, which are distinguished by the production of wicker and Juncus, used for the creation of furniture.
## List of mayors
Below there is a table relating to the successive administrations in this town.
| Period | | Office holder | Party | Title | Notes |
| --- | --- | --- | --- | --- | --- |
| 12 maggio 1986 | 14 luglio 1990 | **Armando Giorgio** | Democrazia Cristiana | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 14 luglio 1990 | 25 settembre 1991 | **Paolo Nuzzaco** | Democrazia Cristiana | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 26 ottobre 1991 | 24 aprile 1995 | **Giuseppe Leporale** | Partito Repubblicano Italiano | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 24 aprile 1995 | 14 giugno 1999 | **Giuseppe Antonio Leporale** | Centro-sinistra | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 14 giugno 1999 | 14 giugno 2004 | **Giuseppe Gentile** | Centro-sinistra | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 14 giugno 2004 | 8 giugno 2009 | **Giuseppe Gentile** | Lista civica | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 9 giugno 2009 | 26 maggio 2014 | **Maria Pia Di Medio** | Lista civica | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 26 maggio 2014 | 7 dicembre 2016 | **Vito Domenico Lionetti** | Lista civica Rinascita verso nuovi orizzonti | Sindaco | |
| --- | --- | --- | --- | --- | --- |
| 9 dicembre 2016 | 12 giugno 2017 | **Francesco Antonio Cappetta** | - | Commissario prefettizio | |
| --- | --- | --- | --- | --- | --- |
| 12 giugno 2017 | *in carica* | **Maria Pia Di Medio** | Lista civica X te | Sindaco | |
| --- | --- | --- | --- | --- | --- |
## Sport
* ASD Atletico Cassano – Futsal amateur football club, member of the serie A2 championship.
* ASD Volley Cassano – Amateur volleyball club member of the youth sector and of the serie D championship.
* ASD Cassano skating – Amateur roller skating society that annually participates in regional and national championships.
## Notable people
## InfoBox
| Cassano delle Murge | |
| --- | --- |
| *Comune* | |
| Comune di Cassano delle Murge | |
| Convent of Maria SS.ma degli Angeli | |
| | |
| Location of Cassano delle Murge | |
| Cassano delle MurgeLocation of Cassano delle Murge in ItalyCassano delle MurgeCassano delle Murge (Apulia) | |
| Coordinates: 40°53′N 16°46′E / 40.883°N 16.767°E / 40.883; 16.767 | |
| Country | Italy |
| Region | Apulia |
| Metropolitan city | Bari (BA) |
| Government | |
| Mayor | Mariapia Di Medio |
| Area | |
| Total | 89 km<sup>2</sup> (34 sq mi) |
| Elevation | 341 m (1,119 ft) |
| Population (31 December 2008) | |
| Total | 13,260 |
| Density | 150/km<sup>2</sup> (390/sq mi) |
| Demonym | Cassanesi |
| Time zone | UTC+1 (CET) |
| Summer (DST) | UTC+2 (CEST) |
| Postal code | 70020 |
| Dialing code | 080 |
| Patron saint | Maria SS. degli Angeli |
| Saint day | 2 August |
| Website | Official website |
|
While cooling is clearly an essential factor in the siting of individual nuclear plants, this necessary function is a readily manageable aspect of nuclear power operations and constitutes no constraint on the future growth of nuclear power as a large-scale low-cost provider of clean energy with highly stable prices and strong security of supply.(1)
Steam-driven turbines generate most of the world’s electricity. These “thermal” power plants produce the necessary heat using uranium fuel or a fossil fuel - coal, natural gas, or oil.(2) In the physics of the steam cycle - as water is vaporized and then cooled, condensed and recycled - the production of surplus heat is inherent.
To achieve the requisite heat discharge, power plants normally employ various techniques of “wet” cooling, which use water to transfer heat to the air through evaporation or to a nearby water body with adequate absorptive capacity.
Looking ahead, the question of wet cooling for 21st century power plants will focus mainly on those fuelled by uranium and coal. Oil-fuelled thermal plants are increasingly rare for reasons of cost, and traditional gas-fired plants are giving way to combined-cycle gas plants in which very high efficiency yields less surplus heat and a greatly reduced cooling requirement.
Cooling for coal-fired and nuclear plants is plainly not an issue where the availability of water is unlimited, as when the plant is sited by a large body of water. The wet cooling problem can arise for plants sited on rivers and other locations where water availability is limited in quantity or by regulations on the temperature of returned water.
The amount of cooling required for a steam-cycle plant of any given size is determined by its thermal efficiency. By this measure, coal plants generally have a slight edge over nuclear plants and a correspondingly somewhat lesser need for cooling water.
This distinction does not, however, impede nuclear operations. Unlike coal-fired plants, nuclear plants - which use a fuel that delivers nearly 200,000 times more energy per kilogram - may be sited with no cost or constraint from fuel logistics. For nuclear energy planners, this characteristic offers wide flexibility in site selection as they seek to ensure the availability of reliable cooling while optimizing costs.
Key factors in this calculation are the comparative extra expense of longer electricity transmission and of alternative and supplemental cooling technologies. In those instances where cooling needs might require longer transmission distances or adaptive use of various cooling technologies, the cost increment will usually be relatively minor, particularly when averaged with the costs of a larger nuclear fleet.
The Role of Cooling in Fossil and Nuclear Power Plants
Generally, fossil and nuclear power plants use water for heat transfer in two ways:
• Internal Energy Transfer. To convey steam heat created by the energy source - either the coal furnace or the reactor core - to power an electricity-generating turbine; and
• Cooling and Surplus Heat Discharge. To cool and condense the after-turbine steam and then discharge surplus heat from the steam circuit to the environment.
In the internal energy-transfer function, water is circulated continuously in a closed-loop cycle. The primary heat source turns water to steam to drive the turbine, and the water is then condensed and returned to the heat source. In this internal circuit, hardly any water is lost, so only a very small amount of make-up water is required. This function is much the same whether the power plant is nuclear, coal-fired, oil-fired, or conventionally gas-fired. Today most of the world’s non-hydro electricity is produced in this way.
Cooling is needed to condense the after-turbine steam in the internal circuit and recycle it. As the steam condenses back to water, the surplus heat must be discharged to the air or a body of water. Any steam-cycle system must discharge about two-thirds of the energy produced by the heat source due to the physics of turning heat into mechanical energy - in this case the turning of a turbine generator.
Just how much heat must be discharged for any given electricity output is determined by a plant’s thermal efficiency, which is the proportion of internal heat that becomes electrical output. Higher thermal efficiency means not only a reduced cooling requirement but also more electricity from a given amount of fuel. Thermal efficiency depends on the temperature difference between the internal heat source and the external environment, and can be increased by expanding the temperature differential - at either end.
With a higher temperature heat source, a greater percentage of heat is converted to electricity, leaving less surplus heat to be discharged for a given electricity output. Similarly, a lower temperature of cooling water yields higher efficiency. For example, a UK plant sited on the North Sea is more efficient than an identical plant on that country’s Gulf Stream-warmed southern coast; and a new Turkish plant would have higher efficiency if sited on the Black Sea rather than the warmer Mediterranean.
Looking ahead, the question of cooling for 21st century power plants will focus mainly on those fuelled by uranium and coal. Oil-fuelled plants are phasing down for reasons of cost, and traditional gas-fired plants are giving way to combined-cycle gas turbine (CCGT) plants in which very high efficiency yields less surplus heat and a greatly reduced cooling requirement.(3)
Both nuclear and coal plants show a range of efficiencies. Nuclear plants currently being built have about 34-36% thermal efficiency, while one of the new reactor designs boasts 39%. In comparison, new coal-fired plants approach 40% and CCGT plants reach 60%.(4) In determining the cooling requirement, these distinctions are not insignificant. For example, a power plant running at 39% thermal efficiency will discharge about 24% less heat than one providing the same electrical output while running at 34%.
As these figures indicate, coal plants currently have slightly higher thermal efficiency and require somewhat less cooling than nuclear plants. A key source of this difference is the temperature limit imposed in nuclear plants by the need to ensure the physical integrity of nuclear fuel assemblies.(5) In future, as new supercritical coal plants are introduced and as nuclear plants move from Generation III and III+ to Generation IV, coal-fired generation may not continue to hold this edge. A notable advantage of the high-temperature gas-cooled reactor (HTGR) designs now in development is their projected thermal efficiency of 70%, which will greatly lessen cooling requirements.
In both fossil and nuclear plants, a water circulation system is normally used to accomplish heat discharge through two types of wet cooling: “once-through” and “recirculating”.
Wet Cooling: Once-Through
Where the power plant is next to a large water body, cooling is achieved simply by running a large amount of water through the condensers in a single pass and discharging it back a few degrees warmer in almost the same amount.(7) In this simple method, the water may be salt or fresh. There is hardly any on-site water use in the sense of depletion, though some extra evaporation will occur off site due to the water being slightly warmer.
Many nuclear power plants have once-through cooling, since their location is not influenced by the source of the fuel, and depends first on where power is needed and secondly on water availability for cooling. A number of countries are able to use once-through seawater cooling for all of their nuclear plants. Among these are the UK, Sweden, Finland, South Africa, Japan, Korea and China. Canada uses once-through cooling from the Great Lakes.
Any nuclear or coal-fired plant that is normally cooled by drawing water from a river or lake will have regulatory limits imposed either on the temperature of the returned water or on the temperature differential between inlet and discharge. In hot summer conditions, when even the inlet water from a river may approach the limit set for discharge, the plant will be unable to run at full power using one-through cooling only, as has happened in France. In these circumstances, recirculating wet cooling and various dry cooling technologies can be used to help.
Wet Cooling: Recirculating
Where the power plant does not have abundant water, power plants can discharge surplus heat to the air using recirculating water systems that capitalize on the physics of evaporation. Cooling towers with recirculating water are indeed a common visual feature of power plants, whether fossil or nuclear. Tall towers, usually hyperboloid in shape, employ a natural draft “chimney effect”. Shorter towers use a forced draft created by large fans. Recirculating cooling systems reduce the overall efficiency of a power plant by 3.5% compared with the once-through use of water from a sea, lake or major river.
In recirculating systems, water passes through the condenser and is pumped to the top of the tower. From there it sprays downward to a collection basin while being cooled by an updraught that carries heat away, mainly by evaporation and with some direct heat transfer to the air.8 In temperate climates, an on-site pond can also be used to accomplish the same cooling function.
As the cooled water is returned to the condenser, 4-5% of the flow is lost to evaporation and must be continuously replaced. The water loss commonly equates to some 1.75-2.5 litres per kilowatt-hour. Moreover, because evaporation concentrates impurities in the water, some bleed of water (called “blow.down”) is required, raising the need for replacement water by another 50%.
Typical water consumption for a 1000 MWe plant - providing electricity to perhaps 1 million people in an industrial country - might be 75 megalitres per day, or the equivalent of 25 Olympic-sized swimming pools. This equates to about 0.05% of the average flow rate of the Rhine, Rhone and Danube Rivers.
In the USA, where inland siting causes more than half of coal and nuclear plants to use wet cooling towers, electric power generation reportedly accounts for 3% of all freshwater consumption. A similar distribution between recirculating and once-through systems is found in other countries. A significant example is France, where 58 nuclear reactors produce most of the nation’s electricity. There 32 reactors use cooling towers, drawing replacement water from rivers and lakes, while 26 reactors use once-through cooling from seawater and major rivers.
Dry Cooling
Some power plants use “dry” cooling - i.e., cooling through heat transfer to the air without the physics of evaporation. This works like an automobile radiator, with a high-flow forced draft past a system of finned pipes through which the steam passes. Alternatively, there may still be a condenser cooling circuit with the enclosed water cooled by a flow of air.
Dry cooling involves much greater cost for the cooling set-up and is less efficient than wet cooling towers that use the physics of evaporation. Large fans consume much power, and cooling solely by heat transfer is relatively inefficient.(9)
Cooling Requirements and the Future of Nuclear Power
For any power plant, once-through cooling systems using fresh water and seawater are less costly to build and more energy-efficient than systems using wet recirculation through cooling towers or ponds. Thus, the sitting of coal and nuclear power plants on coastlines is usually preferable where other considerations allow.(10)
For both coal and nuclear plants, this siting preference - yielding simple and inexpensive cooling - must be balanced against the cost benefit of proximity to electricity load centres. In many instances, this balance is easily struck in favour of coastlines. In the UK, for example, all nuclear plants are on the coast and total electricity transmission losses in the system are only 1.5%.
For many coal plants, the transport of fuel can be a significant cost factor, as each 1000 MWe coal plant consumes over three million tonnes of coal annually.(11) Another constraint can arise from aesthetic considerations associated with transporting and storing this huge fuel supply.
For nuclear plants, these fuel-related siting considerations simply do not exist. Uranium fuel holds energy in a concentration nearly 200,000 times greater than coal and is correspondingly smaller in volume. Nuclear fuel is delivered infrequently, in small volume, and economically by lorry rather than constantly, in large volume, and expensively by train or ship.
For nuclear energy planners, the flexibility to site reactors without consideration of proximity to fuel supply offers a wide range of options as they optimize costs while meeting the essential requirement of reliable, affordable generation.
Key factors in this cost-optimization are the cost of longer-distance electricity transmission and the availability of a variety of cooling technologies, usable in back-up mode, that are relatively unaffected by water availability and regulations governing heat discharge into water bodies. Where the cooling of nuclear power plants might require longer transmission distances or alternative cooling technologies, the cost increment will usually be comparatively minor, particularly when averaged over the costs of a larger nuclear fleet.
Thus, the cooling requirement, while essential to nuclear plant operations, is not a constraint on the future worldwide growth of nuclear power as a large-scale low-cost provider of clean energy with highly stable prices and strong security of supply.
(1) For a detailed discussion, see the WNA Information Paper entitled Cooling Power Plants.
(2) Current global shares of electricity generation are approximately as follows: coal 40%, natural gas 20%, nuclear and hydro 16% each, oil 6% and others (including geothermal, solar and wind) 2%
(3) In a CCGT plant, the burning of gas drives one turbine, and the exhaust heat produces steam to drive a second turbine, which commonly uses wet cooling. If water limitations arise, operation of the steam turbine can be suspended and the gas turbine’s exhaust heat vented to the air.
(4) The CCGT process achieves this efficiency by combining the gas and the steam cycles. If the surplus heat is utilized for combined heat-and-power (CHP), efficiency can increase further to 85%. Because of its great efficiency CHP, also known as cogeneration, is also viewed favourably for use in future nuclear plants.
(5) The need for flue gas desulphurization in coal plants may negate this edge by adding to water consumption and reducing overall efficiency.
(6) High temperature will also support the thermo-chemical separation of hydrogen as a transportation fuel.
(7) The cooling function in a nuclear plant is performed in the turbine hall, so the cooling water carrying discharged heat is never in contact with the nuclear part of the plant.
(8) Although commonly perceived as a source of pollution, the plumes over cooling towers consist of water vapour.
(9). With high thermal efficiency and low cooling needs, CCGT plants can sometimes use dry cooling technologies.
(10) Generally, freshwater systems are less expensive than seawater systems, which must be designed to resist corrosion from brine. On the other hand, freshwater systems often face regulatory constraints on the temperature of returned water and may therefore need back-up systems using recirculation and dry cooling technologies.
(11) This cost factor does not always inhibit lengthy coal transport. For example, U.S. plants use low-sulphur coal trained from far away in order to meet pollution limits, and the UK imports coal from Russia, Australia, Colombia, South Africa and Indonesia.
You may also be interested in
|
[Photograph: Sarah Postma]
Have you ever been washing your 45th homebrew bottle, elbow deep in sanitizer, and thought, "There's got to be a better way to do this"? Congratulations! You're ready to start kegging your homebrew.
Kegging is not for everybody. The most basic setup, which includes a keg, CO2 tank, regulator, and hoses will cost at least $175. Additional used kegs start at $35 and are often more than that. Plus, you'll need a temperature controlled refrigerator that is big enough to fit your kegs and CO2 tank. It's a pretty large space and money commitment.
Is it worth it? Absolutely.
Nothing feels better than being able to pour a pint of your own homebrew out of a tap. It's much easier to pour samples for friends and family that don't want to commit to a full glass, and you never have to worry about yeast or sediment like when you present your beer in a bottle. And the best part is, you'll never have to wash another homebrew bottle again. Here's an introduction to the basics of kegging, and what steps you'll need to take to get started.
The Setup
Homebrewers use old five gallon soda kegs to store and dispense their beer. These kegs come in two varieties: ball lock and pin lock. The variety describes the type of connection that is used for connecting the hoses. Ball lock is the most popular, but there's nothing wrong with the pin lock type. You'll have to stick with the variety you chose for future keg purchases so you don't have to switch between connection types on your hoses.
Kegs have two ports, usually labeled "in" and "out", and a large oval lid that opens to allow you to transfer beer inside. The "in" port is connected to a short tube, which is where the CO2 comes in, and the "out" port is connected to a tube that goes all the way to the bottom. The idea is that CO2 pressure on the top of the beer will force the liquid to travel through the tube at the bottom of the keg and out the dispenser. The ports look like they're the same size, but they're actually slightly different, so you should never try to connect the CO2 line to the "out" port or vice versa.
In addition to the keg, the other important pieces of equipment are the CO2 tank and regulator. When you're looking at the regulator, you'll notice it has two dials on it. One will tell you how much gas is left in the tank, and the other will tell you how much pressure is going to the keg. Never open the main valve on the CO2 tank unless the regulator is tightly connected, since the high pressure can be dangerous. The dial that indicates how much CO2 is in the tank will almost always read somewhere between 600 and 900 psi, depending on the temperature. When the needle starts moving below 600, you'll have to get a CO2 refill within a few days.
If your local homebrew shop does not fill CO2 tanks (many don't), you will have to find a welding supply shop. The most common practice for "filling" a tank is actually to do an exchange. You give them your empty tank and they give you a full one. This is important to realize before you start customizing your CO2 tank with stickers from your local brew pub. It's also a good reason for not buying a brand new CO2 tank; they're more expensive and you might not have it for very long before you have to exchange it for an old, beat up tank. I've seen fill up and exchange prices range everywhere from $13 to $25 for a 5 pound tank, but a full tank will carbonate and dispense between 5 to 8 kegs.
Left: A detailed view of the top of the keg, ports and lid. Right: Closeup of a regulator. The left dial is shows the amount of CO2 left, the top shows the pressure going to the keg.
The Process
If you've bottled a few batches of beer before, then cleaning a keg will be pretty easy. The first step is to soak the keg with a quarter scoop of OxiClean Free, or the same cleanser you use to clean your carboy, with 5 gallons of water. It should sit for about a day to make sure there is no grime holding on to the inside of the keg or the long dip tube. Thoroughly rise the keg, then fill it with enough water and sanitizer (Star San or Idophor) to make 5 gallons. Connect the keg to the CO2 and dispenser, and dispense some sanitizer through the line for a few seconds so that it flows through the long dip tube. You should pour out the sanitizer and let the keg sit upside down for a few minutes so that the residue drips off, but remember that leaving a little residual Star San or Idophor in the keg shouldn't impact the flavor of your homebrew.
Never use bleach to clean or sanitize a keg. Bleach corrodes stainless steel, and will actually eat holes through your keg if left in contact for a long enough time. Even short contact times can produce micro pores and pitting in your keg.
When your keg is sanitized, use your sanitized auto-siphon racking cane to transfer your fermented beer to the keg. As always, try to minimize the amount of splashing you make when transferring so the beer doesn't get oxidized prematurely. There is no need to add corn sugar as with bottling, since the beer will be "force carbonated" from the CO2 pressure.
Once the beer is transferred, turn the regulator up to about 10 psi for 20 seconds, and then pull the release valve. Repeat this 2 or 3 times to purge the residual oxygen from the top of the keg. Place the keg in your refrigerator, set the temperature to 40°F, and turn the regulator to 11psi. After 2 weeks, your beer will be fully carbonated and ready to drink. The 11psi your regular is set to is also a perfect serving pressure, so grab a glass and pour yourself a pint!
If you want your beer to be more or less carbonated, or if your refrigerator temperature isn't 40°F, you'll have to adjust the regulator pressure to get the right carbonation level. Here's my favorite chart on the internet for determining the right temperature and pressure combination.
Over the next few weeks we'll look at some advanced kegging techniques as well as troubleshooting your system to get it running perfectly.
Previewing your comment:
|
# Runfold
**Runfold** is a village in Surrey, U.K., about 2 mi (3.2 km) ENE of Farnham.
Runfold lies on the ancient trackway known as the Pilgrims' Way and on the former route of the A31 road, which has by-passed the village since the early 1990s. Loss of through traffic has made the village safer and quieter but has affected the village economy, with the loss of the service station, post office and "Alf's Café", a notable transport café. One pub remains; the *Princess Royal*, which has recently expanded and now offers hotel accommodation; the former *Jolly Farmer* has now become a Chinese restaurant.
The village has been seriously affected by mineral extraction, subsequent infilling of the resultant sand and gravel pits, and the heavy vehicle movements associated with that industry.
Runfold Manor is a large house in the east of the village, at the foot of the Hog's Back. Much of the contents were auctioned in 2005 when the owners decided to move away.
John Henry Knight, a former resident of Barfield House in the village, built "The first petroleum carriage for two people made in England". Barfield School, an independent mixed gender Primary School, is now located there; Mike Hawthorn, Britain's first Formula One motor racing World Champion was educated here.
Runfold, along with a number of other villages in the Surrey and Sussex Weald (such as Alfold, Dunsfold, Durfold, Kingsfold and Chiddingfold) comprise the "Fold Villages", the suffix probably relating to the clearance of forest and its use as pasturage for sheep or cattle in Saxon times.
Media related to Runfold at Wikimedia Commons
## InfoBox
| Runfold | |
| --- | --- |
| Village | |
| RunfoldLocation within Surrey | |
| OS grid reference | SU871476 |
| District | |
| Shire county | |
| Region | |
| Country | England |
| Sovereign state | United Kingdom |
| Post town | Farnham |
| Postcode district | GU10 |
| Dialling code | 01252 |
| | |
| Police | Surrey |
| Fire | Surrey |
| Ambulance | South East Coast |
| | |
| UK Parliament | |
|
|
# Oct-4
**Oct-4** (octamer-binding transcription factor 4), also known as **POU5F1** (POU domain, class 5, transcription factor 1), is a protein that in humans is encoded by the *POU5F1* gene. Oct-4 is a homeodomain transcription factor of the POU family. It is critically involved in the self-renewal of undifferentiated embryonic stem cells. As such, it is frequently used as a marker for undifferentiated cells. Oct-4 expression must be closely regulated; too much or too little will cause differentiation of the cells.
Octamer-binding transcription factor 4, OCT-4, is a transcription factor protein that is encoded by the *POU5F1* gene and is part of the POU (Pit-Oct-Unc) family. OCT-4 consists of an octamer motif, a particular DNA sequence of AGTCAAAT that binds to their target genes and activates or deactivates certain expressions. These gene expressions then lead to phenotypic changes in stem cell differentiation during the development of a mammalian embryo. It plays a vital role in determining the fates of both inner mass cells and embryonic stem cells and has the ability to maintain pluripotency throughout embryonic development. Recently, it has been noted that OCT-4 not only maintains pluripotency in embryonic cells but also has the ability to regulate cancer cell proliferation and can be found in various cancers such as pancreatic, lung, liver and testicular germ cell tumors in adult germ cells. Another defect this gene can have is dysplastic growth in epithelial tissues which are caused by a lack of OCT-4 within the epithelial cells.
## Expression and function
Oct-4 transcription factor is initially active as a maternal factor in the oocyte and remains active in embryos throughout the preimplantation period. Oct-4 expression is associated with an undifferentiated phenotype and tumors. Gene knockdown of Oct-4 promotes differentiation, demonstrating a role for these factors in human embryonic stem cell self-renewal. Oct-4 can form a heterodimer with Sox2, so that these two proteins bind DNA together.
Mouse embryos that are Oct-4 deficient or have low expression levels of Oct-4 fail to form the inner cell mass, lose pluripotency, and differentiate into trophectoderm. Therefore, the level of Oct-4 expression in mice is vital for regulating pluripotency and early cell differentiation since one of its main functions is to keep the embryo from differentiating.
## Orthologs
Orthologs of Oct-4 in humans and other species include:
| Species | Entrez GeneID | Chromosome | Location | RefSeq (mRNA) | RefSeq (protein) |
| --- | --- | --- | --- | --- | --- |
| *Mus musculus* (mouse) | 18999 | 17,17 B1; 17 19.23 cM | NC\_000083.4, 35114104..35118822 (Plus Strand) | NM\_013633.1 | NP\_038661.1 |
| *Homo sapiens* (human) | 5460 | 6, 6p21.31 | NC\_000006.10, 31246432-31240107 (Minus Strand) | NM\_002701.3 | NP\_002692.2 (full length isoform) <br>NP\_002692.1 (N-terminal truncated isoform) |
| *Rattus norvegicus* (rat) | 294562 | 20 | NW\_001084776, 650467-655015 (Minus strand) | NM\_001009178 | NP\_001009178 |
| *Danio rerio* (zebrafish) | 303333 | 21 | NC\_007127.1, 27995548-28000317 (Minus strand) | NM\_131112 | NP\_571187 |
## Structure
Oct-4 contains the following protein domains:
| Domain | Description | Length (AA) |
| --- | --- | --- |
| POU domain | Found in Pit-Oct-Unc transcription factors | 75 |
| Homeodomain | DNA binding domains involved in the transcriptional regulation of key eukaryotic developmental processes; may bind to DNA as monomers or as homodimers and/or heterodimers in a sequence-specific manner. | 59 |
## Implications in disease
Oct-4 has been implicated in tumorigenesis of adult germ cells. Ectopic expression of the factor in adult mice has been found to cause the formation of dysplastic lesions of the skin and intestine. The intestinal dysplasia resulted from an increase in progenitor cell population and the upregulation of β-catenin transcription through the inhibition of cellular differentiation.
## Pluripotency in embryo development
### Animal model
In 2000, Niwa et al. used conditional expression and repression in murine embryonic stem cells to determine requirements for Oct-4 in the maintenance of developmental potency. Although transcriptional determination has often been considered as a binary on-off control system, they found that the precise level of Oct-4 governs 3 distinct fates of ES cells. An increase in expression of less than 2-fold causes differentiation into primitive endoderm and mesoderm. In contrast, repression of Oct-4 induces loss of pluripotency and dedifferentiation to trophectoderm. Thus, a critical amount of Oct-4 is required to sustain stem cell self-renewal, and up- or down-regulation induces divergent developmental programs. Changes to Oct-4 levels do not independently promote differentiation, but are also controlled by levels of Sox2. A decrease in Sox2 accompanies increased levels of Oct-4 to promote a mesendodermal fate, with Oct-4 actively inhibiting ectodermal differentiation. Repressed Oct-4 levels that lead to ectodermal differentiation are accompanied by an increase in Sox2, which effectively inhibits mesendodermal differentiation. Niwa et al. suggested that their findings established a role for Oct-4 as a master regulator of pluripotency that controls lineage commitment and illustrated the sophistication of critical transcriptional regulators and the consequent importance of quantitative analyzes.
The transcription factors Oct-4, Sox2, and Nanog are part of a complex regulatory network, with Oct-4 and Sox2 being capable of directly regulating Nanog by binding to its promoter, and are essential for maintaining the self-renewing undifferentiated state of the inner cell mass of the blastocyst, embryonic stem cell lines (which are cell lines derived from the inner cell mass), and induced pluripotent stem cells. While differential up- and down-regulation of Oct-4 and Sox2 has been shown to promote differentiation, down-regulation of Nanog must occur for differentiation to proceed.
## Role in reprogramming
Oct-4 is one of the transcription factors that is used to create induced pluripotent stem cells (iPSCs), together with Sox2, Klf4, and often c-Myc (OSKM) in mice, demonstrating its capacity to induce an embryonic stem-cell-like state. These factors are often referred to as "Yamanaka reprogramming factors". This reprogramming effect has also been seen with the Thomson reprogramming factors, reverting human fibroblast cells to iPSCs via Oct-4, along with Sox2, Nanog, and Lin28. The use of Thomson reprogramming factors avoids the need to overexpress c-Myc, an oncogene. It was later determined that only two of these four factors, namely Oct4 and Klf4, are sufficient to reprogram mouse adult neural stem cells. Finally it was shown that a single factor, Oct-4 was sufficient for this transformation. Moreover, while Sox2, Klf4, and cMyc could be replaced by their respective family members, Oct4's closer relatives, Oct1 and Oct6, fail to induce pluripotency, thus demonstrating the exclusiveness of Oct4 among POU transcription factors. However, later it was shown that Oct4 could be completely omitted from the Yamanaka cocktail, and the remaining three factors, Sox2, Klf4, and cMyc (SKM) could generate mouse iPSCs with dramatically enhanced developmental potential. This suggests that Oct4 increases the efficiency of reprogramming, but decreases the quality of resulting iPSCs.
## In embryonic stem cells
* In *in vitro* experiments of mouse embryonic stem cells, Oct-4 has often been used as a marker of stemness, as differentiated cells show reduced expression of this marker.
* Oct3/4 can both repress and activate the promoter of *Rex1*. In cells that already express high level of Oct3/4, exogenously transfected Oct3/4 will lead to the repression of Rex1. However, in cells that are not actively expressing Oct3/4, exogenous transfection of Oct3/4 will lead to the activation of Rex1. This implies a dual regulatory ability of Oct3/4 on Rex1. At low levels of the Oct3/4 protein, the Rex1 promoter is activated, while at high levels of the Oct3/4 protein, the Rex1 promoter is repressed.
* Oct4 contributes to the rapid cell cycle of ESCs by promoting progression through the G1 phase, specifically through transcriptional inhibition of cyclin-dependent kinase inhibitors such as p21.
* CRISPR-Cas9 knockout of the gene in human embryonic stem cells demonstrated that Oct-4 is essential for the development after fertilisation.
* Oct3/4 represses Suv39h1 expression through the activation of an antisense long non-coding RNA. Suv39h1 inhibition maintains low level of H3K9me3 in pluripotent cells limiting the formation of heterochromatin.
## In adult stem cells
Several studies suggest a role for Oct-4 in sustaining self-renewal capacity of adult somatic stem cells (i.e. stem cells from epithelium, bone marrow, liver, etc.). Other scientists have produced evidence to the contrary, and dismiss those studies as artifacts of *in vitro* culture, or interpreting background noise as signal, and warn about Oct-4 pseudogenes giving false detection of Oct-4 expression. Oct-4 has also been implicated as a marker of cancer stem cells.
## Further reading
## InfoBox
| POU5F1 | | | |
| --- | --- | --- | --- |
| | | | |
| Available structures PDB Ortholog search: PDBe RCSB | | | |
| Identifiers | | | |
| Aliases | POU5F1, OCT3, OCT4, OTF-3, OTF3, OTF4, Oct-3, Oct-4, POU class 5 homeobox 1, Oct3/4 | | |
| External IDs | OMIM: 164177; MGI: 101893; HomoloGene: 8422; GeneCards: POU5F1; OMA:POU5F1 - orthologs | | |
| | | | |
| | | | |
| | | | |
| | | | |
| Orthologs Species **Human** **Mouse** Entrez Ensembl UniProt RefSeq (mRNA) NM\_203289<br>NM\_001173531<br>NM\_001285986<br>NM\_001285987<br>NM\_002701 NM\_001252452<br>NM\_013633 RefSeq (protein) NP\_001239381<br>NP\_038661 Location (UCSC) Chr 6: 31.16 – 31.18 Mb Chr 17: 35.82 – 35.82 Mb PubMed search | | | |
| Wikidata | | | |
| View/Edit Human View/Edit Mouse | | | |
|
Psychiatrists OK vast changes to diagnosis manual
Psychiatrists voted Saturday on the most sweeping changes to their diagnosis manual in 18 years.
CHICAGO — The now familiar term "Asperger's disorder" is being dropped. And abnormally bad and frequent temper tantrums will be given a scientific-sounding diagnosis called DMDD. But "dyslexia" and other learning disorders remain.
The revisions come in the first major rewrite in nearly 20 years of the diagnostic guide used by the nation's psychiatrists. Changes were approved Saturday.
Full details of all the revisions will come next May when the American Psychiatric Association's new diagnostic manual is published, but the impact will be huge, affecting millions of children and adults worldwide. The manual also is important for the insurance industry in deciding what treatment to pay for, and it helps schools decide how to allot special education.
This diagnostic guide "defines what constellations of symptoms" doctors recognize as mental disorders, said Dr. Mark Olfson, a Columbia University psychiatry professor. More important, he said, it "shapes who will receive what treatment. Even seemingly subtle changes to the criteria can have substantial effects on patterns of care."
Olfson was not involved in the revision process. The changes were approved Saturday in suburban Washington, D.C., by the psychiatric association's board of trustees.
The aim is not to expand the number of people diagnosed with mental illness, but to ensure that affected children and adults are more accurately diagnosed so they can get the most appropriate treatment, said Dr. David Kupfer. He chaired the task force in charge of revising the manual and is a psychiatry professor at the University of Pittsburgh.
One of the most hotly argued changes was how to define the various ranges of autism. Some advocates opposed the idea of dropping the specific diagnosis for Asperger's disorder. People with that disorder often have high intelligence and vast knowledge on narrow subjects but lack social skills. Some who have the condition embrace their quirkiness and vow to continue to use the label.
And some Asperger's families opposed any change, fearing their kids would lose a diagnosis and no longer be eligible for special services.
The new manual adds the term "autism spectrum disorder," which already is used by many experts in the field. Asperger's disorder will be dropped and incorporated under that umbrella diagnosis. The new category will include kids with severe autism, who often don't talk or interact, as well as those with milder forms.
Kelli Gibson of Battle Creek, Mich., who has four sons with various forms of autism, said Saturday she welcomes the change. Her boys all had different labels in the old diagnostic manual, including a 14-year-old with Asperger's.
"To give it separate names never made sense to me," Gibson said. "To me, my children all had autism."
Three of her boys receive special education services in public school; the fourth is enrolled in a school for disabled children. The new autism diagnosis won't affect those services, Gibson said. She also has a 3-year-old daughter without autism.
People with dyslexia also were closely watching for the new updated doctors' guide. Many with the reading disorder did not want their diagnosis to be dropped. And it won't be. Instead, the new manual will have a broader learning disorder category to cover several conditions including dyslexia, which causes difficulty understanding letters and recognizing written words.
The trustees on Saturday made the final decision on what proposals made the cut; recommendations came from experts in several work groups assigned to evaluate different mental illnesses.
The revised guidebook "represents a significant step forward for the field. It will improve our ability to accurately diagnose psychiatric disorders," Dr. David Fassler, the group's treasurer and a University of Vermont psychiatry professor, said after the vote.
The shorthand name for the new edition, the organization's fifth revision of the Diagnostic and Statistical Manual, is DSM-5. Group leaders said specifics won't be disclosed until the manual is published but they confirmed some changes. A 2000 edition of the manual made minor changes but the last major edition was published in 1994.
Olfson said the manual "seeks to capture the current state of knowledge of psychiatric disorders. Since 2000 ... there have been important advances in our understanding of the nature of psychiatric disorders."
Catherine Lord, an autism expert at Weill Cornell Medical College in New York who was on the psychiatric group's autism task force, said anyone who met criteria for Asperger's in the old manual would be included in the new diagnosis.
One reason for the change is that some states and school systems don't provide services for children and adults with Asperger's, or provide fewer services than those given an autism diagnosis, she said.
Autism researcher Geraldine Dawson, chief science officer for the advocacy group Autism Speaks, said small studies have suggested the new criteria will be effective. But she said it will be crucial to monitor so that children don't lose services.
Other changes include:
• A new diagnosis for severe recurrent temper tantrums — disruptive mood dysregulation disorder. Critics say it will medicalize kids' who have normal tantrums. Supporters say it will address concerns about too many kids being misdiagnosed with bipolar disorder and treated with powerful psychiatric drugs. Bipolar disorder involves sharp mood swings and affected children are sometimes very irritable or have explosive tantrums.
• Eliminating the term "gender identity disorder." It has been used for children or adults who strongly believe that they were born the wrong gender. But many activists believe the condition isn't a disorder and say calling it one is stigmatizing. The term would be replaced with "gender dysphoria," which means emotional distress over one's gender. Supporters equated the change with removing homosexuality as a mental illness in the diagnostic manual, which happened decades ago.
|
Xyrem 500 mg/ml oral solution
What is it and how is it used?
Xyrem works by consolidating night-time sleep, though its exact mechanism of action is unknown.
Xyrem is used to treat narcolepsy with cataplexy in adult patients.
Narcolepsy is a sleep disorder that may include attacks of sleep during normal waking hours, as well as cataplexy, sleep paralysis, hallucinations and poor sleep. Cataplexy is the onset of sudden muscle weakness or paralysis without losing consciousness, in response to a sudden emotional reaction such as anger, fear, joy, laughter or surprise.
What do you have to consider before using it?
Do not take Xyrem
• if you are allergic (hypersensitive) to sodium oxybate or any of the other ingredients of Xyrem
• if you have succinic semialdehyde dehydrogenase deficiency (a rare metabolic disorder)
• if you suffer from major depression
• if you are being treated with opioid or barbiturate medicines
Take special care with Xyrem
• if you have breathing or lung problems (and especially if you are obese), because Xyrem has the potential to cause respiratory depression
• if you have or have previously had depressive illness
• if you have heart failure, hypertension (high blood pressure), liver or kidney problems as your dose may need to be adjusted
• if you are taking other central nervous system depressants or alcohol
• if you have previously had experience with drug abuse
• if you suffer from epilepsy as the use of Xyrem is not recommended in this condition
• if you have porphyria (an uncommon metabolic disorder)
If any of these apply to you, tell your doctor before you take Xyrem.
While you are taking Xyrem, if you experience bed wetting and incontinence (both urine and faeces), confusion, hallucinations, episodes of sleepwalking or abnormal thinking you should tell your doctor straight away. Whilst these effects are uncommon, if they do occur they are usually mild-to-moderate in nature.
If you are elderly, your doctor will monitor your condition carefully to check whether Xyrem is having the desired effects.
Xyrem should not be taken by children and adolescents.
When you discontinue taking Xyrem you need to follow your doctor’s instructions as it may result in side effects e.g. headache, lack of sleep, mood changes and hallucinations.
Xyrem has a well known abuse potential. Cases of dependency have occurred after the illicit use of sodium oxybate.
Your doctor will ask if you have ever abused any drugs before you start taking Xyrem and whilst you are using the medicine
Taking other medicines
In particular Xyrem should not be taken together with sleep inducing medicines and medicines that reduce central nervous system activity (the central nervous system is the part of the body related to the brain and spinal cord).
Also care should be taken to tell your doctor and pharmacist if your are taking any of the following types of medicines:
• medicines that increase central nervous system activity and antidepressants
• medicines that may be processed in a similar way by the body (eg valporate, phenytoin or ethosuximide)
Taking Xyrem with food and drink
You must not drink alcohol while taking Xyrem, as its effects can be increased.
Xyrem is to be taken at a set time well after a meal (two - three hours) as food decreases the amount of Xyrem that is absorbed by your body.
You need to monitor the amount of salt you take as Xyrem contains sodium (which is found in table salt) which may affect you if you have had high blood pressure, heart or kidney problems in the past. If you take two 2.25 g doses of sodium oxybate each night you will take 0.82 g of sodium, or if you take two 4.5 g doses of sodium oxybate each night you will take in 1.6 g sodium. You may need to moderate your intake of salt.
Pregnancy and breast-feeding
There have been very few women who have taken Xyrem sometime during their pregnancy and a few of them had spontaneous abortions. The risk of taking Xyrem during pregnancy is unknown, and therefore the use of Xyrem in pregnant women or women trying to become pregnant is not recommended. Tell your doctor if you are pregnant or are planning to become pregnant.
It is not known whether Xyrem passes into breast milk. Patients taking Xyrem should stop breast feeding.
Ask your doctor or pharmacist for advice before taking any medicine.
Driving and using machines
Xyrem will affect you if you drive or operate tools or machines. Do not drive a car, operate heavy machinery, or perform any activity that is dangerous or that requires mental alertness for at least 6
hours after taking Xyrem. When you first start taking Xyrem, until you know whether it makes you sleepy the next day, use extreme care while driving a car, operating heavy machinery or doing anything else that could be dangerous or needs you to be fully mentally alert.
How is it used?
Always take Xyrem exactly as your doctor has told you to. You should check with your doctor or pharmacist if you are not sure.
The usual starting dose is 4.5 g/day, given as two equally divided doses of 2.25 g/dose. Your doctor may gradually increase your dose up to a maximum of 9 g/day given as two equally divided doses of 4.5 g/dose.
Take Xyrem orally two times each night. Take the first dose upon getting into bed and the second dose 2.5 to 4 hours later. You may need to set an alarm clock to make sure you wake up to take the second dose. Food decreases the amount of Xyrem that is absorbed by your body. Therefore, it is best to take Xyrem at set times well after a meal (two-three hours). Prepare both doses before bedtime.
If you stop taking Xyrem for more than 14 consecutive days you should consult your doctor as you should restart taking Xyrem at a reduced dose.
Instructions on how to dilute Xyrem
The following instructions explain how to prepare Xyrem. Please read the instructions carefully and follow them step by step.
To help you, the Xyrem carton contains 1 bottle of medicine, a measuring syringe and two dosing cups with child-resistant caps.
1. Remove the bottle cap by pushing down while turning the cap anticlockwise (to the left). After removing the cap, set the bottle upright on a table-top. There is a plastic covered foil seal on the top of the bottle, which must be removed before using the bottle for the first time. While holding the bottle in its upright position, insert the press-in-bottle-adaptor into the neck of the bottle. This needs only to be done the first time that the bottle is opened. The adaptor can then be left in the bottle for all subsequent uses
2. Next, insert the tip of the measuring syringe into the centre opening of the bottle and press down firmly (See Figure 1).
Figure 1
3. While holding the bottle and syringe with one hand, draw up the prescribed dose with the other hand by pulling on the plunger. NOTE: Medicine will not flow into the syringe unless you keep the bottle in its upright position (See Figure 2).
Figure 2
4. Remove the syringe from the centre opening of the bottle. Empty the medicine from the syringe into one of the dosing cups provided by pushing on the plunger (See Figure 3). Repeat this step for the second dosing cup. Then add about 60 ml of water to each dosing cup (60 ml is about 4 tablespoons).
Figure 3
5. Place the caps provided on the dosing cups and turn each cap clockwise (to the right) until it clicks and locks into its child-resistant position (See Figure 4). Rinse out the syringe with water.
Figure 4
6. Just before going to sleep, place your second dose near your bed. You may need to set an alarm so you wake up to take your second dose no earlier than 2.5 hours and no later than 4 hours after your first dose. Remove the cap from the first dosing cup by pressing down on the child-resistant locking tab and turning the cap anticlockwise (to the left). Drink all of the first dose while sitting in bed, recap the cup, and then lie down right away.
7. When you wake up 2.5 to 4 hours later, remove the cap from the second dosing cup. While sitting in bed, drink all of the second dose right before lying down to continue sleeping. Recap the second cup.
If you have the impression that the effect of Xyrem is too strong or too weak, talk to your doctor or pharmacist.
If you take more Xyrem than you should
Symptoms of Xyrem overdose may include agitation, confusion, impaired movement, impaired breathing, blurred vision, profuse sweating, headache, vomiting, decreased consciousness leading to coma and seizures. If you take more Xyrem than you were told to take, or take it by accident, get emergency medical help right away. You should take the labelled medicine bottle with you, even if it is empty.
If you forget to take Xyrem
If you forget to take the first dose, take it as soon as you remember and then continue as before. If you miss the second dose, skip that dose and do not take Xyrem again until the next night. Do not take a double dose to make up for forgotten individual doses.
If you stop taking Xyrem
You should continue to take Xyrem for as long as instructed by your doctor. You may find that your cataplexy attacks return if your medicine is stopped and you may experience insomnia, headache, anxiety, dizziness, sleeping problems, sleepiness, hallucination and abnormal thinking.
What are possible side effects?
Like all medicines, Xyrem can have side effects. These are usually mild to moderate. If you experience any of these, tell your doctor straight away.
common (affects 1 to 10 users in 100)
uncommon (affects 1 to 10 users in 1,000)
rare (affects 1 to 10 users in 10,000)
very rare (affects less than 1 user in 10,000)
not known (frequency cannot be estimated from the available data)
Very common side effects (affects more than 1 user in 10) include:
Nausea, dizziness, headache
Common side effects (affects 1 to 10 users in 100) include:
Sleeping problems including insomnia, blurred vision, feeling the heart beat, vomiting, stomach pains, diarrhoea, anorexia, decreased appetite, weight loss, weakness, abnormal dreams, tiredness, feeling drunk, sleep paralysis, sleepiness, trembling, confusion/ disorientation, nightmares, sleep walking, bed wetting, sweating, depression, muscle cramps, swelling, fall, joint pain, back pain, cataplexy, balance disorder, disturbance in attention, disturbed sensitivity particularly to touch, abnormal touch sensation, sedation, abnormal taste, anxiety, difficulty in falling asleep in the middle of the night, nervousness, feeling of “spinning” (vertigo), urinary incontinence, shortness of breath, snoring, congestion of the nose, rash, inflammation of the sinuses, inflammation of nose and throat, increased blood pressure
Uncommon side effects (affects 1 to 10 users in 1,000) include:
Psychosis (a mental disorder that may involve hallucinations, incoherent speech, or disorganized and agitated behaviour), paranoia, abnormal thinking, hallucination, agitation, suicide attempt, difficulty in falling asleep, restless legs, forgetfulness, myoclonus (involuntary contractions of muscles), involuntary passage of faeces, hypersensitivity
Side effects with unknown frequency (cannot be estimated from the available data) include: Convulsion, decreased breathing depth or rate, hives, , suicidal thoughts, short cessation of breathing during sleep.
If any of these affect you severely, tell your doctor.
If you are concerned about any side effect, or if you notice any side effects not mentioned in this leaflet, please tell your doctor or pharmacist.
How should it be stored?
Keep out of the reach and sight of children.
Do not use Xyrem after the expiry date stated on the bottle (EXP). The expiry date refers to the last day of that month.
Store in the original container.
Do not store Xyrem solutions diluted with water for more than 24 hours.
Once you open a bottle of Xyrem, any contents that you have not used with 40 days of opening should be disposed of.
What is it?
Xyrem is an oral solution that contains the active substance sodium oxybate (500 mg/ml).
What is it used for?
The medicine can only be obtained with a special prescription.
How is it used?
How does it work?
How has it been studied?
What benefits has it shown during the studies?
What is the risk associated?
Why has it been approved?
How has it been studied?
Further information
The European Commission granted a marketing authorisation valid throughout the European Union for Xyrem to UCB Pharma Ltd on 13 October 2005. After five years, the marketing authorisation was renewed for a further five years. europa.eu/Find medicine/Human medicines/European Public Assessment Reports. For more information about treatment with Xyrem, read the Package Leaflet (also part of the EPAR) or contact your doctor or pharmacist.
This summary was last updated in 04-2011.
|
Energetics and Cell Respiration
Created by cac26
65 terms · Energetics and Cell Respiration
deprived of life
ability to respond in some adaptive way to an environmental stimulus
ability to carry out biochemical reactions in the body. Comes about by interactions between molecules
Same or similar condition in the body. Example: plasma in blood has specific concentration
process of degredation
catabolic pathways
When complex molecules are broken down or degraded chemically into their building blocks subunits along with release of energy needed for this.
energy currency of living things; called adenosine triposphate; made from adenine, sugar, and triphosphate
soluble molecule
this molecule lowers water concentration if we store a high concentration of glucose in a body cell
synthesis process
anabolic pathway
when simple building blocks that consume energy are used to build a complex molecule
has mass and takes up space
ability to move matter against some opposing force
Law of Conservation of Energy
energy cannot be created or destroyed
Law of Entropy
Since there is never a 100 percent transformation of energy for one organism to another, the amount of entropy or disorder in the system or the universe increases and the energy for work decreases
Potential energy
the energy of position relative to the surface of the earth and configuration of chemical bonds that make up molecules
kinetic energy
energy of motion
free energy
The energy that can perform work in a system when the temperature and pressure are constant throughout the system.
chemical reactions
when molecules in a system collide with enough force to break the intermolecular bonds
spontaneous chemical reactions
do not require the external input of energy
Exergonic reactions
Reactants over products; amount of free energy lowers; heat given off
Endergonic reations
Products over reactants; amount of free energy increases; heat gained and stored
∆G = ∆H - T∆S
∆G: change in free energy
∆H: change in enthalpy
T: temperature in Kelvins
∆s: change in entrapy
chemical equilibrium
the rate of forward reactions equals the rate of reverse reactions
phosphate group bonded to a pentose sugar bonded to a nitrogen base
pyrophosphate linkage
highly unstable bond where hydrolysis takes place
will help facilitate the transfer of a phospate group given up to a nearby molecule
cold chemistry
when biochemical reactions in living organisms have to take place at low temperatures due to delicate proteins
biological catalyst that changes the rate of a chemical reaction without being consumed; have the forms of globular proteins
globular proteins
have a surface active site that acts on a substrate
carbohydrate digestive enzymes that increase salivary secretions
enzyme substrate complex
when the substrate enters the activation site it activates the complex which induces the enzyme to fit the substrate more tightly and facilitates the reaction
factors that effect enzyme
increase in temperature, pH, salinity, feedback inhibition
enzyme cofactors
small molecules bound to active sites that facilitate enzymatic reactions
feedback inhibition
when the metabolic pathway is switched off by the accumulation of its own end product
allostaric inhibitor
binds to a site on enzyme surface away from the active site and changes the shape of the enzyme enough to not allow the substrate
green plants transform photons of energy from sunlight to chemical energy
animals eat the products of the plants
spherical in shape; contain their own DNA, RNA, and ribosomes and are self-replicating
Glenn Margulis
Came up with the Endosymbiotic theory
Endosymbiotic theory
Theory that when protobiomts appeared they probably started consuming each other for energy. When the little protobiomt is brought in through endocytosis, it begins producing energy which the larger one feeds off of. Mutual relationship
outer compartment or inter membrane space, inner membrane, and matrix
Inner fluid filled space of the mitochondrian that makes up the electron transport chain
Relationship where two organisms live together and one benefits while the other is neutrally affected. Ex: Remora
Two organisms living together where the parasite benefits and the host is negatively effected. Ex: ticks
Both organisms living together benefit from the relationship. Ex: Nile crocodile and Egyptian Pluver
Step by step chemical breakdown of glucose into purivic acid that takes place outside the mitochondria
Krebs Cycle (Citric acid cycle)
The continued degradation of CO2 that produces "taxicabs". Takes place in the matrix.
Substrate-level phosporylation
Direct transfer of a phosphate group and energy to ADP from some organic compound having energy rich photons
Electron Transport Chain
Accept electrons from "taxicabs" and pass them down a chain to the ultimate electron acceptor, Oxygen
Chemical oxidation
Substance loses a hydrogen and an electron in the presence of another substance
special group of enzymes that remove hydrogen
Nicotinamide Adenine Dinucleotide
Called NAD; is a "taxicab" molecule
Flavin Adenine Dinucleotide
Called FAD; are nonproteinous enzymes important to dehydrogenesis
The net movement of individual molecules of water from an area of low pressure to an area of high pressure across a selectively permeable membrane
Osmotic pressure
Pressure engendered in a solution by the presence of a solid
Peter Mitchell
Conceived the chemiosmotic theory; received the Nobel Prize for his work
Chemiosmotic theory
Theory that hydrogen ions are pumped across membranes that separate isolated compartments in the electron transport chain
ATP synthase complex
Group of ATP synthesizing proteins that spans the inner membrane from inner compartment to matrix
Part of the ATP synthase complex that spins in a phospholipid bilayer
Ambient environment
Environment that animals lose heat to
Animals who use energy from outside along with cell respiration to raise body temperature
Animals that depend on metabolic production of heat to raise body temperature (warm-blooded)
When animals change their body temperature by changing their posture or position related to the environment
Metabolic rate
Inversely related to body size
|
# Turret board
In electronics, **turret boards** were an early attempt at making circuits that were relatively rugged, producible, and serviceable in the days before printed circuit boards (PCBs). As this method was somewhat more expensive than conventional "point-to-point" wiring techniques, it was generally found in the more expensive components, such as professional, commercial, and military audio and test equipment. This is similar to cordwood construction.
Turret boards consist of a thin (generally 1/8 inch) piece of insulating material drilled in pattern to match the electronic layout of a set of components. Each hole drilled will have a metal post (the turret) positioned in it. Electronic components are suspended between these turrets and soldered to them to create a complete circuit layout.
Most of the military electronics used in WWII made use of this construction method, and Altec professional gear of similar vintage has the same construction. However, the underside of some turret boards, such as a consumer Zenith 1A10 console radio, circa 1940, consists of an array of electronics components that are simply suspended, rather than tethered or soldered down, and thus could move unexpectedly. Such construction methods tended to keep the neighborhood radio repairman in work. In general, however, the use of turrets and turret boards dramatically improved reliability and serviceability.
Turret boards additionally allowed some degree of "engineered" construction. That is, an engineer could design a turret board with listed component interconnects such that it could be assembled by someone skilled in component recognition and soldering. A schematic was unnecessary for assembly.
Until reliable high-temperature printed circuit boards were developed, turret board construction was considered the best available technology. Currently, the use of turret boards is limited to hand-wired vacuum tube electronics (be it commercial or hobby), often as an attempt to replicate a classic design or design approach. Popular DIY components utilizing this approach include reproduction vintage guitar amplifiers and certain professional studio components from the 1960s, such as the classic and still widely used Teletronix LA2A tube compressor. In general, however, due to the expense and time-consuming nature of turret board construction methods, experimental or test-stage electronics projects generally make use of one of the many types of perfboard available, while final circuits—both hobby and commercial—utilize printed circuit boards.
|
# Volcano Girls
"**Volcano Girls**" is a single by the American alternative rock band Veruca Salt, released in 1997 on their album *Eight Arms to Hold You*.
## Background
It was written by Nina Gordon who also sang lead vocals, with Louise Post performing backup vocals. This song was used at the beginning of the dark comedy movie *Jawbreaker*, released in 1999. The song was also featured as a playable track in the 2008 video game, *Guitar Hero On Tour: Decades*. "Volcano Girls" features a partial interpolation of the lyrics to The Beatles' "Glass Onion", and also includes a reference and reprise to Veruca Salt's earlier single "Seether".
## Music video
The highly energetic music video for "Volcano Girls" was shot over two days at Essenay in Chicago, Illinois, in 1997. This video consists of the band in the central arena attached to bungee cords, on which Post (right side and airborne), Nina Gordon (left side and performing), and other band members bounce erratically. The video also shows Post and Gordon performing the song while a camera circles around them. Surrounding this arena stand a group of fans, watching them perform several takes of the song.
## Charts
Chart performance for "Volcano Girls"
| Chart (1997) | Peak<br>position |
| --- | --- |
| Australia (ARIA) | 47 |
| Canada Alternative 30 (RPM) | 4 |
| Sweden (Sverigetopplistan) | 32 |
| UK Singles (OCC) | 56 |
| US *Billboard* Modern Rock Tracks | 8 |
| US *Billboard* Mainstream Rock Tracks | 9 |
## InfoBox
| "Volcano Girls" | |
| --- | --- |
| | |
| Single by Veruca Salt | |
| from the album *Eight Arms to Hold You* | |
| Released | 1997 |
| Recorded | 1997 |
| Genre | Alternative rock |
| Length | 3:18 |
| Label | Geffen |
| Songwriter(s) | Nina Gordon |
| Producer(s) | Bob Rock |
| Veruca Salt singles chronology | |
| "Victrola" <br>(1995) "**Volcano Girls**" <br>(1997) "Shutterbug" <br>(1997) | |
| | |
| Music video | |
| "Volcano Girls" | |
| | |
|
# 2007 Fed Cup Europe/Africa Zone Group II – Pool A
**Group A** of the **2007 Fed Cup Europe/Africa Zone Group II** was one of two pools in the Europe/Africa Zone Group II of the 2007 Fed Cup. Three teams competed in a round robin competition, with the top team and the bottom two teams proceeding to their respective sections of the play-offs: the top teams played for advancement to Group I, while the bottom team faced potential relegation to Group III.
| | | **RSA** | FIN | **GRE** | RR <br>W–L | Set <br>W–L | Game <br>W–L | Standings |
| --- | --- | --- | --- | --- | --- | --- | --- | --- |
| 40 | **South Africa** | | **2–1** | **3–0** | **2–0** | **11–3** | **73–48** | **1** |
| 56 | Finland | 1–2 | | 0–2 | 0–2 | 2–9 | 44–59 | 3 |
| 61 | **Greece** | 0–3 | **2–0** | | **1–1** | **5–6** | **47–57** | **2** |
## South Africa vs. Finland
| <br>South Africa<br>2 | National Tennis Centre, Vacoas-Phoenix, Mauritius<br>18 April 2007<br>Hard (outdoors) | | <br>Finland<br>1 |
| --- | --- | --- | --- |
| 1 2 3 1 <br> **Lizaan du Plessis**<br>Essi Laine **7** <br>5 **6** <br>1 2 <br> Surina De Beer<br>**Piia Suomalainen** **6** <br>1 1 <br>**6** 1 <br>**6** 3 <br> **Kelly Anderson / Surina De Beer**<br>Essi Laine / Piia Suomalainen **6** <br>4 **6** <br>4 | | | |
## South Africa vs. Greece
| <br>South Africa<br>3 | National Tennis Centre, Vacoas-Phoenix, Mauritius<br>19 April 2007<br>Hard (outdoors) | | <br>Greece<br>0 |
| --- | --- | --- | --- |
| 1 2 3 1 <br> **Lizaan du Plessis**<br>Anna Koumantou **6** <br>4 **6** <br>1 2 <br> **Surina De Beer**<br>Anna Gerasimou 4 <br>**6** **6** <br>1 **6** <br>2 3 <br> **Kelly Anderson / Lizaan du Plessis**<br>Anna Gerasimou / Asimina Kaplani **6** <br>4 **6** <br>3 | | | |
## Finland vs. Greece
| <br>Finland<br>0 | National Tennis Centre, Vacoas-Phoenix, Mauritius<br>20 April 2007<br>Hard (outdoors) | | <br>Greece<br>2 |
| --- | --- | --- | --- |
| 1 2 3 1 <br> Essi Laine<br>**Anna Koumantou** 4 <br>**6** 5 <br>**7** 2 <br> Piia Suomalainen<br>**Anna Gerasimou** 3 <br>**6** 5 <br>**7** 3 <br> Essi Laine / Piia Suomalainen<br>Anna Gerasimou / Anna Koumantou **not<br>played** | | | |
|
Knee (construction)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Knee timbers in boat building
In woodworking, a knee is a natural or cut, curved piece of wood.[1] Knees, sometimes called ships knees, are a common form of bracing in boat building and occasionally in timber framing. A knee rafter in carpentry is a bent rafter used to gain head room in an attic.
Strength characteristics[edit]
Wood is a highly anisotropic material (its strength varies considerably with the direction of applied force, i.e. parallel, radial, or tangential to the grain). Because wood is strongest when loaded in tension or compression along the grain, the best knees are those in which the wood grain follows the bend. For a knee with relatively little bend, it may be possible to cut the knee out of a single straight-grained board and still achieve sufficient strength. However, with increasing bend this method becomes problematic since more and more of the knee is aligned across the grain and is therefore considerably weaker. A knee laid out this way might easily snap in two under hand pressure alone, even if it is generously sized. In boat joinery constantly subject to shock and fatigue loading this method is unsuitable.
To avoid this issue knees requiring sharper curves are made using methods which ensure that the wood grain and direction of load are closely aligned. This can be achieved by steam bending, laminating, or selecting a natural crook with matching grain - a "grown knee". Grown knees are generally considered as the "best" method among boat builders and have a strong traditions associated with their use, but they may not achieve the same strength as a good laminated knee.
Bent - Bent knees[2] are formed by plasticizing the wood to make it flexible via boiling, steaming, or microwaving (for small components). While still hot, the wood can be bent into a shape suitable for the location - either on a form or by forcing and securing it directly into the final service location. Steam-bending is a time-honored method for shaping boat frames, but it does weaken the wood slightly, it can leave residual stresses which may cause breakage or spring-back over time, and it is limited in the degree of bend which it can achieve, particularly for thick members. Also, not all species of wood steam bend well.
Laminated - Laminated knees are formed by coating thin, flexible strips of wood with adhesive, layering them to achieve the required thickness, then forcing the desired bend into the layup and securing it until the adhesive sets. Laminated knees are very strong and can be made in shapes which would be difficult to achieve using other methods, but they require time for the adhesive to cure, they are messier to construct, and they must use a jig or fixture to secure them until the adhesive cures.
Grown - The term "grown knees" refers to any knee which is made from a natural crook or bend in a tree. Grown knees can be taken from several locations within a tree, with the most common being the intersection of the trunk and a large branch[citation needed], crotches, and the roots. The roots are a particularly useful source as the root structure of many species of trees naturally spreads out laterally just beneath the ground in order to help anchor the tree. This provides a fairly reliable source of approximately 90 degree crooks which may be impossible to find in other portions of the tree. In order to obtain this raw material for knees builders may dig up a stump in its entirety, as unlike other portions of the tree, it is impossible to judge the quality and quantity of available material in the roots as they are underground. Once the stump has been dug up the knees can be sawn or split from suitable natural crooks. However, knees sawn from a stump can quickly dull tools used to shape and finish them - as the roots grow they envelop small particles of soil and rock, which acts as an embedded abrasive and accelerates the wear of edged tools. For species of wood with appropriate splitting characteristics, such as oak, the stump can be split into wedges, with one large root on each wedge; each wedge is then carved into a rib for a small boat. In principle tree shaping could be used to grow a tree into the desired shape.
A sharp bend in a piece of wood is also called "cranked". Commonly used in shipbuilding known as ship’s knee for their advantage of reducing the encroachment into the usable space of the structure since there is no spandrel. Also knee rafter increases the usable space in an attic by creating a kneewall-like space.
A ship’s knee has two parts called the arm (shorter) and a body (longer). The outside surfaces come to a corner, (typically 90 degrees in buildings) called the heel. The inside surface retains its natural shape and the curve is called the bosom. The thickness between the heel and bosom is the throat. The ends of the arm and body are the toes.
The names of ship’s knees are based on their position:[3][4]
• Hanging knee, the arm is down;
• Standing~, the arm is up;
• Lodging~, the arm is sideways;
• Boson~ or lap~, (unclear);
• Quarter~, quarter sawn thus smaller but without the pith (center of the tree rings) so less prone to checking;
• Dagger~ (unclear meaning, may only be used in shipbuilding).
Knees can be blind pegged with foxtail wedges on both ends or bolted in place.
Favored species of wood[edit]
Due to tradition, ease of workability, strength and durability characteristics, some species of wood are particularly prized for making knees. Tamarack (also known as hackmatack) stumps are among the preferred softwood species for grown knees, while white oak, live oak, and elm are preferred for hardwoods for bent knees due to their ease of steam bending.
See also[edit]
1. ^ Oxford English Dictionary Second Edition on CD-ROM (v. 4.0) Oxford University Press 2009
2. ^ John Griffiths, mfg.. Bent timber ships and universal wood bending machinery. Philadelphia 1876.
3. ^ Theodore Delavan Wilson. An Outline of Ship Building, Theoretical and Practical. New York: John Wiley & Son, 15 Astor Place, 1873.
4. ^ Newman Gee, Joiner’s Quarterly #36, 17, 19
|
10 Ugly Rivers of the World
Posted on 02 February 2010
Citarum river, Indonesia
14river01-600Image source
Yamuna River, India
Yamuna River
Yamuna the largest tributary river of the Ganges is one of the most polluted rivers in the world where 58% of the waste from the Indian capital New Delhi is dumped into the river. Its very surprising to note that a total of Rs 1,700 crore has been spent on cleaning Yamuna as well Ganges but with all efforts turning to vain, government has finally laid its hands down.
Buriganga river, Bangladesh
river, Bangladesh
Image source
The Buriganga River is the main river flowing beside Dhaka city, capital of Bangladesh. The biological dead river owns its plight to the 80% is untreated directly flowing into the river and polythenes deposited beneath water .
Yellow river from Lanzhou, China
yellow river
Image source
Marilao river, Philippines
Ganges river, India
pollution-around-the-world2 []AFP PHOTO/Prakash SINGH
Ganga is the most sacred river for Hindus that emerges from gangotri glacier. An estimated 2,000,000 people ritually bathe daily in the river, inspite of being unsafe as chemical wastes, sewage and corpses remains float fearlessly across the water body.
Songhua river, China
The Mississippi river, USA
The Sarno river, Italy
The King River, Australia
The King River is arguably Australia’s most polluted river that suffers severe acidic condition related to mining operations.. About 1.5 million tonnes of sulfidic tailings entered the river system each year up to 1995 with total of more than 100 million tonnes until date.
24 Responses to “10 Ugly Rivers of the World”
1. Internético says:
Hey,and the Tietê River, Brazil??
2. jamdun says:
i would think the river thames in england would be pronounce on the list
3. Allaiyah says:
Suddenly, enforcing the death penalty with public executions sounds like a great way for places like China to force a stop in pollution. Of course, places like coal mines that dump their wastes into rivers rural people drink from, pay the government to look the other way.
4. robin yates says:
the river Thames has salmon returning to the headwaters so to say it is polluted is rubbish
5. reza fauzan says:
oh my gOD….. my Country (indonesia) is 1st place,,,,, wtf… a lot of people ignoring future for next generation…..
look at the river,, garbage pool…. WTF
6. sagar says:
where is river bagmati from nepal.it is the most pathetic holy river
7. Nuria says:
What about Buenos Aires’, Argentina’s Riachuelo River? yuckety yuck.
8. resident90 says:
how dare you not mention the scenic Los Angeles river.
9. shimlahills says:
Well Ganges is the most holy river in India, but because of government ignorance this is what our holy river has turned out to be. well i feel bad and kind of embarrassed when i saw these pictures. we all need to join hand and stand to take an initiative.
10. The Gunny says:
The person did say that it was his list of 10, probably because that’s where he visited. A most horrifing list to be sure.
11. Dave says:
The river thames is not on the list because its becoming one the best kept rivers in England, fish that were not there 50 years ago are slowly making their way further inland such as trout and the microoganisms they feed, on hopefully salmon will make their way back to but the river would have to be ultra clean for that to happen.
12. SilentPirate007 says:
This is an extension to the citarum river shown in first place:
13. Passarella says:
You just don’t know the Tiete and Pinheiros river in Sao Paulo, Brazil.
All pure water is ending… So sad
14. Andrei says:
poor mother earth. T_T. why do people have to do this. this is soo soo soo disappointing.
15. Man says:
they are not river any more they are drain systems now
16. Charles says:
the Riachuelo in Buenos Aires?do you know it? check it
17. Asshole says:
Funny how only one American river is listed and it’s polution is caused farming. Farmers, way more evil then the masses around the world filling their rivers with trash. Bad Americans, bad.
18. Me says:
Funny how i’m in Indonesia, and i never even knew there was a place like that…
19. bob says:
Makes the BP oil spill look clean by comparison. Where is the outcry to this tragedy, mostly the overpopulation of the world. Compare what it was like in Egyptian times with so few people to what we have now. And to think there are littering fines here and there and we have street cleaners or used to before the financial crisis. See the ultra rich move amongst this, or cozy suburbanites? These places are not high on the travel brochures that we have become accustomed to. This is just terrible.
20. Sanjeev Kumar says:
Ohh My GOD , GOVT. of India sholud be think about river At least For GANGA, ….ohhh wait a minut look to whom i requested ,
21. Kate Vinclette says:
i think that there should also be river rhine cuz it is also polluted
22. remya says:
Thanks… It helps me to complete my project.
23. shailu says:
that means India has win majority, and many more will be there. shamefull.
24. philip says:
Makes me think of an old saying i have heard once or twice. Mans Inhumanity To Man.or to put it more in perspective. Mans Inhumanity To Nature. PEOPLE WHAT KIND OF ENVIROMENT ARE WE LAYING FOR ALL FUTURE GENERATIONS ??? This has to stop
Leave a Reply
|
# Luigi Loir
**Luigi Loir** (22 December 1845 – 9 February 1916) was a French painter, illustrator and lithographer.
## Biography
Luigi Loir was born in Goritz, Austria. He was the son of Tancrède Loir François and Thérèse Leban, his wife, respectively valet and housekeeper of the French royal family in exile in Austria. Installed in the duchy of Parma in 1847, Luigi Loir studied at the school of Fine Arts of Parma in 1853. His first known painting is *Paysage à Villiers-sur Seine* (1865), painted two years after his return to Paris. He was primarily a landscape painter. He also became known for his ceiling paintings and worked with Jean Pastelot (1820–1870).
He realized some drawings for the biscuits brand LU and participated in the battles of Le Bourget during the Franco-Prussian War.
Loir was made a chevalier of the Légion d'honneur in 1898. He died in Paris in 1916.
## Illustrated books
## Salons
* 1865: *Paysages de Parme*; *Vue de Rome*; *Vue de Dieppe* (gouaches).
* 1879: médaille de troisième classe.
* Salon des artistes français:
+ 1886: médaille de seconde classe;
+ 1889: médaille d'or.
## Works in public collections
### Argentina
### Canada
### Czech Republic
### England
* London, Connaught Brown: *Quai Bourbon*, s.d.
### France
## Bibliographie
* Noë Willer, *Luigi Loir, 1845-1916: peintre de la Belle Époque à la publicité: catalogue raisonné*, vol. I, édition Noë Willer, 2004, 221 p. ISBN 2-9514056-1-8
## InfoBox
| Luigi Loir | |
| --- | --- |
| Luigi Loir | |
| Born | Luigi Aloys-François-Joseph Loir<br>22 December 1845<br>Goritz |
| Died | 9 February 1916(1916-02-09) (aged 70)<br>Paris |
| Occupation(s) | Painter<br>Lithographer |
|
Liars dice is a tricky game and I have noticed many RedDedditors have had troubles with it, being a self-proclaimed Liars Dice champ (I did get the "No Dice" Achievement.) I want to share some advice.
The first and biggest tip I can share with you is do not, I repeat, DO NOT bet as low as you safely can. It may seem to be common sense to do this but its the worst thing you can possibly do. If you bid as low as you can, then so can they. If you bid high, go right out of the gate saying "Three four's" then they have to go four and five which makes it incredibly risky and almost certainly they will be wrong.
Second, if you followed the first bit of advice and somehow it does come back to you and you have to make an incredibly risky bid,that most likely isn't true. don't.These AI will call you out. You have two options at this point. Calling the last bid as a bluff or calling it "Spot-on". Calling it spot on is the riskiest thing you can do in Liars Dice (but its better than accepting your fate at the hands of a completely bullshit bid). But if you succesfully do it (I have done it twice) its incredibly rewarding. Declaring a bid spot-on means that it is on the dot accurate. If someone say's "Four three's" and I declare it spot on, it has to be exactly four three's. If I am right and it is spot on, everyone except me loses a die. But if I am wrong, then I am the only one to lose a die.
Third, some say its possible to use the disadvantages of the AI to your own advantage. The AI will (almost always) call out a bid of dice that they dont have. If I say "two one's". If they don't have any ones, even though its as low as two, they will call it out. Using this logic its possible to "trick" AI with a few dice to call out a legit bid.
Fourth, Bidding is about speed. You have to be quick on the call. You do not want them to get the first bid, because if they do, it means you have to make the riskier bid.
Fifth, Don't play with just one person. Play with two. When you see one person you think "Oh, its just one guy, that means there's one less person to beat" but that's exactly what makes it tougher. There is one less person. Five less dice on the field. The more dice, the easier it is. When its just two its highly possible to get caught in the hole were you have to make a risky bid, but with two other people this rarely happens as they tend to call out each other very frequently. You can safely watch as they wittle each other down, then you come up and (metaphorically) curb stomp them. Hope my tips help.
|
# William J. Nellis
**William J. Nellis** (born June 25, 1941) is an American physicist. He is an Associate of the Physics Department of Harvard University. His work has focused on ultra-condensed matter at extreme pressures, densities and temperatures achieved by fast dynamic compression. He is most well-known for the first experimental observation of a metallic phase of dense hydrogen, a material predicted to exist by Eugene Wigner and Hillard Bell Huntington in 1935.
Nellis has been President of the International Association for the Advancement of High Pressure Science and Technology (AIRAPT) and Chairman of the American Physical Society (APS) Topical Group on Shock Compression of Condensed Matter. He has received the Bridgman Award of AIRAPT, the Duvall Award of APS and is a Fellow of the APS Division of Condensed Matter Physics.
Nellis is an author or coauthor of more than 250 published papers. Most of his research has been focused on materials during or after dynamic compression at high pressures for properties including electrical conductivities, temperatures, equation-of-state data, and shock-wave profiles to investigate compressibilities and phase transitions in liquids and solids.
## Early life and education
Nellis was born in Chicago, Illinois in 1941. He received his B.S. degree in Physics from Loyola University of Chicago, College of Liberal Arts and Sciences, in 1963 and his Ph.D. degree in Physics from Iowa State University in 1968. His Ph.D. thesis research included measurements of electrical and thermal conductivities of single crystals of the Rare Earth elements Gadolinium, Terbium and Holmium in the Ames National Laboratory at Iowa State.
Following graduate school, Nellis was a postdoctoral researcher in the Materials Science Division of Argonne National Laboratory (ANL), where he measured electrical and magnetic properties of ordered and disordered alloys of the Actinide elements Plutonium, Neptunium and Uranium mixed with non-magnetic Transition Metals. The experiments at ISU and ANL were performed at cryogenic temperatures in the range of 2 – 300 Kelvin.
## Career and work
From 1970 to 1973, Nellis was Assistant Professor of Physics at Monmouth College (ILL) where he taught undergraduate physics courses and was Director of the College’s Computer Center. In 1973, he left Monmouth to join Lawrence Livermore National Laboratory (LNLL), where he performed computational simulations of condensed matter under dynamic compression driven by shock waves generated with high explosives.
In 1976, Nellis moved within LLNL to the High-Dynamic-Pressure Experimental Group, in which he measured properties of approximately 30 cryogenic liquids and solids compressed dynamically to pressures in the range 20-500 GPa with associated temperatures up to as much as several 1000 Kelvins. Those molecular fluids are representative of fluids in the interiors of Giant Planets and in reacted high explosives. Those temperatures, pressures and densities were generated by impact of a high-velocity projectile onto a target material. Impactors were accelerated with a two-stage light-gas gun to velocities as large as 8 km/s (18,000 mph). Impactors were typically 25 mm in diameter and 2–3 mm thick. Samples were 25 mm in diameter and 0.5 – 3 mm thick. Experimental lifetimes were around 100 nanoseconds. Fast electrical and optical measurements were made with detectors having sub-ns resolution time.
In 2003, Nellis retired from LNLL and joined the Department of Physics at Harvard University as an Associate. Since leaving LLNL, Nellis has collaborated with scientists in Japan, Russia, China and Sweden, as well as in the United States.
Nellis has also been involved with the International Association for the Advancement of High Pressure Science and Technology, AIRAPT, for the greater part of his career serving as the vice president from 1999 to 2003 and as the president from 2003 to 2007. From 1998 to 2007, he served as the editor of the journal Shock Waves.
### Significant discoveries
Nellis is most well-known for the first experimental observation of a metallic phase of dense hydrogen, a material predicted to exist by Wigner and Huntington in 1935. Dynamic compression generates temperature T and entropy S on rapid compression and the product TS controls phase stability via the free energy. By tuning the magnitude and temporal shape of a reverberating shock pressure pulse, H<sub>2</sub> dissociates to H at sufficiently large density that measured electrical conductivities of fluid H cross over from semiconducting to degenerate metal with Mott’s Minimum Metallic Conductivity at pressure 1.4 million bars (140 GPa), nine-fold H atom density in liquid H<sub>2</sub> and calculated temperature of 3000 K. Similar electrical conductivities of H under multiple-shock compression have been measured by Fortov et al. Celliers et al at the NIF pulsed laser have measured optical reflectivity of dense fluid metallic D of ~0.3 under multiple-shock compression, which value agrees with the inception of metallization of D calculated by Rillo et al. Measured electrical conductivities of fluid SiH<sub>4</sub> up to 106 GPa under multiple-shock compression with a two-stage light-gas gun are in good agreement with the electrical conductivity data measured in.
Once the pressure dependence of the electrical conductivity of semiconducting and metallic fluid H was measured, those conductivities were used to address the likely cause of the unusual external magnetic fields of the planets Uranus and Neptune, which are neither dipolar nor axisymmetric as the fields of Earth and other planets with magnetic fields. Planetary fields are caused by convection of electrically conducting fluids in their interiors, most of which in Uranus and Neptune is hydrogen. Because the electrical conductivity of fluid H approaches metallic at ~100 GPa, the magnetic fields of Uranus and Neptune are primarily generated close to their outer surfaces, which implies the existence of nondipolar contributions to their fields, as observed. Because Uranus and Neptune are fluids, no strong rotating rock layers exist in their interiors to couple the existence of planetary rotational motion into the convective currents that generate the magnetic fields of Uranus and Neptune. His experiments on liquids expected at high pressures and temperatures in deep planetary interiors have major implications for developing pictures of the interiors of giant planets both in this and in other solar systems.
Through his research, Nellis also discovered that at very high dynamic shock pressures and temperatures, electrons in metals and strong insulators have a common uniform behavior in shock velocity space, which is analogous to Asymptotic Freedom in sub-nuclear High-Energy Physics. The mechanism in insulators is a crossover from strong localized directional electronic bonds to a more-compressible delocalized electronic band structure characteristic of metals.
His technique to recover solids as thin as a micron intact from shock pressures up to a million bars has facilitated synthesis of metastable materials for characterization of material structures and physical properties.
## Awards and honors
* 1987 - Fellow of the American Physical Society Division of Condensed Matter Physics
* 1998 - Duvall Award of American Physical Society Topical Group on Shock Compression
* 2000 - Teller Fellow, Lawrence Livermore National Laboratory
* 2001 - Bridgman Award of the International Association for the Advancement of High Pressure Science and Technology
## Selected articles
* W. J. Nellis (2017). Ultracondensed Matter by Dynamic Compression. Cambridge University Press.
* Nellis, W. J., Mitchell, A. C., van Thiel, M., Devine, G. J., Trainor, R. J. and Brown, N. (1983) Equation-of-state data for molecular hydrogen and deuterium at shock pressures in the range 2-76 GPa (20-760 kbar), Journal of Chemical Physics, 79, 1480-1486.
* Nellis, W. J., Maple, M. B. and Geballe, T. H. (1988). Synthesis of metastable superconductors by high dynamic pressure. In SPIE Vol. 878 Multifunctional Materials, ed. R. L. Bellingham: Society of Photo-Optical Instrumentation Engineers, pp. 2–9.
* Nellis, W. J., Weir, S. T. and Mitchell, A. C. (1996) Metallization and electrical conductivity of hydrogen in Jupiter, Science, 273, 936-938.
* Chau, R., Mitchell, A. C., Minich, R. W. and Nellis, W. J. (2003). Metallization of fluid nitrogen and the Mott transition in highly compressed low-Z fluids, Physical Review Letters, 90, 245501-1-245501-4.
* Zhou, X., Nellis, W. J., Li, Jiabo, Li Jun, Zhao, W., et al (2015). Optical emission, shock-induced opacity, temperatures, and melting of Gd<sub>3</sub>Ga<sub>5</sub>O<sub>12</sub> single crystals shock-compressed from 41 to 290 GPa, Journal of Applied Physics, 118, 055903-1 -055903-9.
* Weir, S. T., Mitchell, A. C. and Nellis, W. J. (1996). Metallization of fluid molecular hydrogen at 140 GPa (1.4 Mbar). Physical Review Letters, 76, 1860-1863.
* Nellis, W. J., Weir, S. T. and Mitchell, A. C. (1999). Minimum metallic conductivity of fluid hydrogen at 140 GPa (1.4 Mbar). Physical Review B, 59, 3434-3449.
* Nellis, W. J., Louis, A. A. and Ashcroft, N. W. (1998). Metallization of fluid hydrogen. Philosophical Transactions of the Royal Society, 356, 119-138.
* Nellis, W. J. (2000). Making metallic hydrogen. Scientific American, 282, 84-90.
* Nellis, W. J. (2019). Dense quantum hydrogen. Low Temperature Physics/Fizika Nizhikh Temperatur, 45, 338-341.
* Arko, A. J., Brodsky, M. B. and Nellis, W. J. (1972). Spin fluctuations in Plutonium and other Actinide metals and compounds, Physical Review B, 5, 4564-4569.
* Hubbard, W. B., Nellis, W. J., Mitchell, A. C., Holmes, N. C., Limaye, S. S. and McCandless, P. C., (1991). Interior structure of Neptune: Comparison with Uranus, Science, 253, 648-651.
* Trunin, R. F., ed. (2001). Experimental Data on Shock Compression and Adiabatic Expansion of Condensed Matter. Sarov: Russian Federal Nuclear Center VNIIEF.
* Kanel, G. I., Nellis, W. J., Savinykh, A. S., Razorenov, S. V. and Rajendran, A. M. (2009). Response of seven crystallographic orientations of sapphire crystals to shock stresses of 16-86 GPa, Journal of Applied Physics, 106, 043524-1-043524-10.
* Liu, H., Tse, J. S. and Nellis, W. J. (2015). The electrical conductivity of Al<sub>2</sub>O<sub>3</sub> under shock compression. Scientific Reports, 5, 12823-1-12823-9.
## InfoBox
| William J. Nellis | |
| --- | --- |
| | |
| Born | (1941-06-25) June 25, 1941<br>Chicago, Illinois, United States |
| Known for | Making metallic hydrogen in the fluid state |
| Awards | Bridgman Award of International Association of High Pressure Science and Technology (AIRAPT)<br>Duvall Award of American Physical Society (APS)<br>Fellow, Division of Condensed Matter Physics of APS<br>Edward Teller Fellow (LLNL) |
| | |
| Academic background | |
| Education | BS Physics<br>PhD Physics |
| Alma mater | Loyola University Chicago<br>Iowa State University |
| | |
|
>Somewhere in the vaults of a city far, far away, rotted a wall hanging. Rolled up, home to nesting mice, the genius of the hands that had woven it slowly losing its unwitnessed war to the scurry-beetle grub, tawryn worms and ash moths. Yet, for all that, the darkness of its abandonment hid colours still vibrant here and there, and the scene depicted on that huge tapestry retained enough elements of the narrative that meaning was not lost. It might survive another fifty years before finally surrendering to the ravages of neglect.
The poetry of this paragraph hit me like a physical blow to the gut. I don't know what it is, I've read it time and again trying to figure out why this one passage out of the entire book struck me so; but I can't figure it out. I see his writing style changing as I read these books. Erikson is becoming more eloquent, poetic, and philosophical. When you mix this with his chaotic you-are-a-frontline-soldier writing style for action sequences, it makes really makes the books stand out as some of the best fiction I've ever read.
On to my impressions of the characters and plot...
*Tavore:* She's still an enigma to me, but I think I am gaining a sense of her, now. As Ganoes told Quick, "You can count on Tavore to do what needs doing." And when Quick followed up with, "For her or her soldiers?" Ganoes seemed (to me) to nail the character down in 1 short sentence, "For Tavore, there is no difference." I think I'm really starting to like her...not as much as Ganoes, but still...
*Quick Ben and Kalam:* Badasses as always...I especially like how quickly Quick recovered to blow Icarium across the room at the end. Nice.
*Apsalar:* Please, please, please, please tell me she isn't done with the series just because Shadowthrone and Cotillion "Let her go"...
*Icarium:* I can't decide if I feel sorry for Icarium or just think he's pathetic; but did I detect a healing of his memory by the Eres'al?
*Mappo:* Poor guy, he's made Icarium his entire life, and now he's in the hands of that nasty *Gral*...
I'm liking the larger role the Ascended are starting to play in the series. I've been wanting to get a sense of Hood's personality for 6 books, finally I got a glimpse. I can't decide (out of all the Ascended) who I like better, Anomander Rake who is the traditional badass, with all of his emotional baggage thrown in (or should I say all the *Tiste Andii* emotional baggage?); or Cotillion. Who would have thought the Patron of Assassins would be the most sympathetic towards the human condition? I love it.
So far, this book is the best one of the series (though DG remains my favorite, I don't think he'll be able to top the *Chain of Dogs*).
I'm taking a break from the Book of the Fallen to read Night of Knives and then Return of the Crimson Guard. I've already purchased both of them as well as Reaper's Gale. I'm already 20% through NoK; I have to say, I'm not finding ICE's style as interesting. Maybe that will change as I get farther in.
|
8 Beginner Golf Tips For Women - Golfing Well
8 Beginner Golf Tips For Women
First, let me congratulate you for deciding to take up on the game of golf. IT is empowering to see women take great interest in a male-dominated sport.
Not only does golf teaches you life skills, but also being outdoors with the fresh air and getting some exercise is a good way to spend your day.
Longest driver on tour
A fair warning though:
Gold tends to test your determination, fortitude, and patience.
So, here are 8 golf tips for women in order to eliminate frustrating problems, improve faster and enjoy every game more!
1. Correct Grip
Good golf swings are built around the correct grip. Because it is the only contact that you have with the club, if your grip is improper, then your swing will start incorrectly and proceed to get worse as it develops.
The correct grip begins with standing with your arms and hands hanging naturally and loosely.
Without changing the position or angle of your hands, place the golf club in your left, making sure that the clubface is square to the target line. The club should run diagonally across your fingers and its butt should end up at the bottom part of your heel pad.
The most common error is holding the club in the palm of your hand.
A golf club should lie in the fingers.
Looking down, you will see that the knuckles of your left index and middle fingers. And if you see a single knuckle, then your hand is turned too far to the left, and if you see 4 knuckles, it is turned too far on the right.
So, take your right hand, wrapping it around the club and placing the pad over the left thumb. You will notice 2 Vs in between your thumb and index finger on each hand and they should slightly point inside your right shoulder.
2. Bend At The Hips
Sometimes, amateur women golfers usually bend at their knees instead of tilting body at their hips. Bending your knees ruins your proper posture and reduce the swing of power.
On the other hand, bending at the hips allows you to create an athletic stance which pushes your shoulder blades and rear back, creating more room for your swing and enhance balance.
3. Swing Through The Ball
When playing goal, your ultimate goal should be hitting the ball powerfully and cleanly. However, it should not be how you think about the swing.
Swings need to remain fluid and relaxed and focusing excessively on hitting the golf ball can create a hurried and awkward effort that results in a herky-jerky.
Try to think about this:
“Hitting the ball with practice swings.”
This may take some practice, however, once you hit through the ball using the same relaxed approach that you use in practice swings, then the ball should jump off the club with accuracy and velocity.
4. Increase Resistance
The power in every golf swing comes from the tension created between your lower and upper body and unwinding such force smoothly and gradually.
By increasing your hip resistance, you can gain yardage.
The higher angle degree between your hips and shoulder, the more store-up power you make.
5. Room For Power
Strategy and accuracy are both crucial when attempting to improve handicaps and shoot low scores.
For instance, in order to hit the ball far, you will need to make room for your body to properly torque and unwind the ball with authority. In order to do this with your driver, you will need to make a wide stance with the ball slightly positioned forward. Put 60 – 65% of your weight on the rear foot, with your upper torso and head slightly tilted back.
In a relaxed stance, hold your driver and allow the space of one open hand between the butt of the club and your body.
6. Shift Weight To forwarding Foot
Every golf swing is a balance between making a solid foundation and letting a natural, fluid movement which flows from the backswing to forward swing fully and naturally.
The most common error here is to lock your heels to the ground where your body can’t turn through the ball to a nice follow through— usually called as “hanging back.”
Your thighs should finish very close to each other at the end of the swing.
A quick check, there shouldn’t be a significant gap between you’re your knees at the end of your swing and your weight needs to have shifted to your front foot which allows your back foot to rise on your toe.
7. Let It Flow
One reason why it is recommended to have a relaxed swing is that this allows the club to powerfully unwind through the ball which creates the distinctive sound of the club head making contact with the golf ball.
You should take relaxed practice rings and concentrate on making a “whoosh” sound at the end of your swings.
Be relaxed and allow the club to snap through with authority as it makes the whooshing sound. This is among the simplest golf tips out there, however, it should be able to free up your every swing and make a more dynamic motion through the golf ball.
8. Exercise
After a golf game, you will realize just how demanding this sport really is. You will feel so tired and sore all over. So, in order to avoid such things, you need to make some simple preparations beforehand.
You need to work on two areas of exercise before going on any golf course.
Firstly, you will need to improve your flexibility by stretching those muscles, performing exercises such as leg extension and trunk rotation.
Next, you will need to do some strength exercises that focus on your core, legs, hips, and shoulder. Think pushups, squats, and planks.
Improving your flexibility and strength should provide you with better results and allow you to play for longer as well as reducing the risk of any injuries.
Click Here to Leave a Comment Below 0 comments
FREE DOWNLOAD: 7 Secrets to Instantly Improve Your Ball Striking
|
# Leo J. Farley
**Leo J. Farley Jr.** (June 1, 1926 – July 14, 1984) was an American politician who served as Mayor of Lowell, Massachusetts and was a member of the Massachusetts House of Representatives.
## Early life
Farley was born on June 1, 1926, in Lowell. He grew up in Lowell and graduated from Lowell High School.
## Political career
From 1970 to 1977, Farley was a member of the Lowell city council. From 1975 to 1976, he also served as Mayor, a ceremonial position as the city is administrated by a professional city manager. From 1977 to 1979, Farley represented the 44th Middlesex district in the Massachusetts House of Representatives.
## Death
Farley died on July 14, 1984, in Lowell.
## InfoBox
| Leo J. Farley | |
| --- | --- |
| | |
| Member of the Massachusetts House of Representatives from the 44th Middlesex district | |
| **In office**<br>1977–1979 | |
| Preceded by | Edward J. Early Jr. |
| Succeeded by | District eliminated |
| Mayor of Lowell, Massachusetts | |
| **In office**<br>1975–1976 | |
| Preceded by | Armand W. Lemay |
| Succeeded by | Raymond F. Rourke |
| | |
| Personal details | |
| Born | June 1, 1926<br>Lowell, Massachusetts |
| Died | July 14, 1984 (aged 58)<br>Lowell, Massachusetts |
| Political party | Democratic |
| | |
|
Dismiss Notice
Join Physics Forums Today!
Energy and charge
1. Feb 26, 2006 #1
I know this might seem very simplistic to some so don't bash or flame me, as I just want to learn. How exactly is energy made, or transfered, and what gives it the instruction to transfer? Is energy matterless or massless? I've used it in physics in equations and I know it is measured in joules, I just want to know the fundamentals and underlying concepts of it. I know the conservation of energy says that it cannot be created nor destroyed, but exactly where did it come from? If energy is massless does that mean that time doesn't exist for it? That it has been here since the beginning of the universe, just pushed around like a person frozen in a block of ice? Is energy only given off as a photon, and is limited only in the electromagnetic spectrum? Or is there energy present in gravity or weak or strong force?
Are charge and energy one in the same? Because I'm fuzzy on both ideas on voltage (energy) and current (charge). Is the energy in voltage like the energy from visible light?
2. jcsd
3. Feb 26, 2006 #2
Claude Bile
User Avatar
Science Advisor
Energy is defined as 'the ability to do work', which pretty says energy is energy and is not very enlightning. Fundamental concepts such as energy cannot be explained on a more fundamental level, because they are, themselves fundamental concepts.
Having said that, I can answer some of your questions regarding the properties of energy.
- I'm not 100% sure what you mean by instruction, I assume you mean what tells energy to change into what form and when? If that is your question, then the ultra-short answer would be force.
- Energy is massless and matterless in general, however mass is a form of energy.......
- Where did energy come from? That would be a question for an astrophysicist, but it is worth remarking that the net energy in our universe is zero if you include the negative contributions from the various fields (from what I remember, I could be wrong on this).
- I'm not sure what you mean as to whether time exists for energy or not.
- Energy transmission is certainly not limited to electromagnetic fields, or indeed any of the fundamental fields. Consider the case of pressure waves (i.e. sound waves).
- Charge and energy are seperate quantities. Voltage, which is closely related to charge, is a specific type of energy, namely electrical potential energy. The units eV are sometimes used to describe photon energy, particularly in optoelectronic devices.
4. Feb 26, 2006 #3
Thanks for the replies. Does all forms of energy move at the speed of light? So since it is massless and moves at the speed of light wouldn't that mean in general relativity that time stops for energy? Mass is a form of energy? But in the equation E=mc^2 is energy equals energy times the speed of light squared? Each force releases its own type of energy, and each force has its own particle? So with for example - gravity, everything is attracted into the center which creates heat, light, and other forms of energy or is that multiple forces working together, producing their own type of energy; if forces give the instruction to produce only certain types of energy? If I understood in chemistry an electron gets excited and moves to a higher valence orbital (by a force?). The distance the electron traveled is the amount of energy it will release when it returns to the lower orbital? How is the energy created because one force - strong force which keeps the nucleus intact - and another force electomagnetic force (which keeps the atoms together because of charges?) keep the atom together. There has to be an outside force that excites the electron? But it can't be electromagnetic or strong force to my understanding, so it leaves gravity and the weak force?
5. Feb 27, 2006 #4
Claude Bile
User Avatar
Science Advisor
I will try to answer your questions (in order) as best I can.
- Not all forms of energy travel at the speed of light, in fact, very few do.
- Energy is not massless, mass in this context is an inertial mass, not the physical presence of matter.
- Be careful here, do you mean mass or matter? Matter is a form of energy, but the relationship between energy and mass is stronger. E = mc^2 tells us that energy and mass are equivalent, that is, energy is mass (i.e. it posesses inertia) and mass can be used to do work (since it is energy).
- I am unclear as to what you mean by force releasing energy.
- Each fundamental force has its own force transmitting virtual particles.
For example, the force transmitting particle for gravity is the graviton, for the strong nuclear force it is the gluon.
- I'm not really following the next question, but I will remark that the distinction between different types of force and energy is purely a man-made one. An electron does not care what force is being applied to it, a force is a force and it will act accordingly. What dictates what form energy is converted to and when by and large depends on the force you apply to it.
- Electrons can be excited to a higher orbital in a variety of ways, through photon absorption, electrical excitation and so on, but all the possible ways I can think of involve electromagnetic forces. There is no relationship between the energy of an orbital and its distance from the nucleus. Why does the fact that the atom is held together via electromagnetic forces prohibit a second electromagnetic force from acting on the atom?
6. Feb 27, 2006 #5
User Avatar
-Each fundamental force uses the same energy. Energy is energy, its the forces that are different, and forms of energy that are different.
-A consequence of gravitational attraction is sometimes heat and light being released, but but again, energy is energy, its energy in different forms that you're talking about. Forces don't give instruction to produce different types of energy.
|
# Carex multicostata
***Carex multicostata*** is a species of sedge known by the common name **manyrib sedge**.
## Distribution
This sedge is native to the western United States from California to Montana, where it grows mainly in dry areas in mountain ranges, such as the Sierra Nevada and Transverse Ranges.
## Description
*Carex multicostata* produces a dense clump of stems up to about a meter in maximum height. The inflorescence is roughly triangular in shape and brown or gold in color, a dense cluster of overlapping spikes. The female flower has a covering bract which is reddish with white edges.
## InfoBox
| *Carex multicostata* | |
| --- | --- |
| | |
|
| Scientific classification | |
| Kingdom: | Plantae |
| *Clade*: | Tracheophytes |
| *Clade*: | Angiosperms |
| *Clade*: | Monocots |
| *Clade*: | Commelinids |
| Order: | Poales |
| Family: | Cyperaceae |
| Genus: | *Carex* |
| Subgenus: | *Carex subg. Vignea* |
| Section: | *Carex sect. Ovales* |
| Species: | ***C. multicostata*** |
| Binomial name | |
| ***Carex multicostata***<br>Mack. | |
|
| Synonyms | |
| *Carex pachycarpa* | |
|
# Question
Title: Is turning head to look backwards while riding a bike a safe and recommended technique?
I currently have two problems with this:
* While looking backwards, I do not see where I am going.
* It is difficult to maintain perfectly the same direction while turning around. Probably both problems can be fixed by training on a safe place, but is this way of looking backwards a recommended and safe technique? Maybe better to avoid this? Or the clue is to learn returning back to the forward view very quickly?
The obvious alternatives are:
* If only another another bicycle may be approaching from behind, just show the hand signal to understand which side to drive around you.
* If you make something like a left turn across a car road, stop to look around.
* Engine noise (and lights in the night) from behind can warn about the approaching car.
There are also other options now like mirrors (I tried some so far without obvious success) good mirrors make sense and Garmin radar (not cheap). Anyway this question asks is it worth learning to look backwards while riding or better to learn avoiding this habit?
# Answer
> 30 votes
Yes - looking behind you (briefly) is a perfectly good way to find out what's there.
The dangers of not-looking-behind are much higher than a brief interruption of looking forward.
You're right that your ears can tell you some things, but not if the vehicle is quiet. I've had a full sized diesel-electric train sneak up to within 20 metres unheard by me. Modern electric cars can be so quiet that only the tyres are making noise, and bicycles are always quiet.
Mirrors can be handy too - I use one on my bents because I cannot look behind from a reclined seating position. I also have a barend mirror on my dropbar road bikes because its convenient when you're used to them. I've never liked temple mirrors or helmet mirrors though.
The Garmin radar is technically brilliant, but it doesn't show everything and you can't trust that the way is clear because the radar says so.
---
Instead I suggest you consciously follow through some steps.
0. Start 10~15 seconds before your manoever.
1. Look **forward** at what might be an obstacle in the next few seconds. Parked cars, pedestrians, moving vehicles and bikes are worthy of your attention.
2. Unweight your offside hand (the one nearest the centerline of the road) from the bars and make sure your nearside hand (nearest the footpath) has a good grip.
3. Then twist your shoulders so that in one movement you can see back over/beside your shoulder. Ideally you want line-of-sight from both eyes directly behind you, to help gauge distance and speed.
4. Revert to forward facing and either act or slow/stop the bike based on the conditions
5. Have a second glance just before you begin your manoever (not after beginning) You never know what's changed, or what you might have missed first glance.
Be safe out there. If you're ever feeling unsafe, change things until you are. Even if that means stopping and walking.
---
Your legal requirements might be different, but for me, the road vehicle "doing a manoever" has to make sure the way is clear. Since a bike is a road vehicle for the purposes of this, a cyclist cannot blithely cross traffic lanes without checking first. Don't be the cause/trigger for an accident.
# Answer
> 14 votes
You need to be able to check over your shoulder. It will get easier with practice.
Taking your points in order:
You shouldn't ever need to signal which side to pass you - the passing side is defined in the rules of the road. If you're turning, people may pass on the other side, but then you're signaling the turn, not where to pass.
Relying on stopping in odd places is risky when it's busy - it's a good idea to check behind you before stopping even though anyone behind is responsible for not driving/riding into you. It can also be impractical to then wait for a gap to get going again. Once stopped you may need to dismount, cross as a pedestrian and get going again, in a situation where riding the turn and signaling properly is quite easy.
Hearing cars coming up behind is very useful, but not foolproof. Cars can be surprisingly quier (especially electric ones) and background noise can cover a lot.
# Answer
> 6 votes
Whether I was taught this along the line or mimicking someone I saw doing this, my way of looking behind--"checking my 6"--when riding is down and thru my (usually) left arm. It's generally a small, quite natural head movement, especially from the forward positioning and wide handle bar today's mountain bikes often put you in. Also, when in the drops on a road bike--it's a small natural move to quickly scan behind oneself by looking down and thru the gap between your body and arm that remains attached, ultimately, to the control of the bike.
I suppose there'd be those that say, "well, you're still looking down" or "but then your view is upside down." However I've just found it to be the best way to maintain the control of the bike and, therefore my line. I also maintain cadence and power thru the brief head dip. The view it affords--approximately 90° or the rear quadrant of the side you're looking under and the area you'll need clear of over-taking traffic if you want to move over--is the key aspect to check in that direction. I mostly ride riser bars that are 700-780mm wide affording me much viewing room. None of my touch points are broken.
@Criggie 's answer best explores this subject here and in a sentence summarizes what should be the big take away regarding development and use of checking your 6 when bicycling: "The dangers of not-looking-behind are much higher than a brief interruption of looking forward." Find your way.
# Answer
> 6 votes
Looking over your shoulder before manoeuvering was ***mandatory*** in the road test for motorbikes and I would guess still is. I always do it whether on bicycle, motorbike or in car and it has saved me more than once. I even do it as a pedestrian :-). It is the only way to be sure.
# Answer
> 5 votes
It's essential to master the last-second "lifesaver" visual check over your shoulder before turning across traffic (that includes a check for "undertaking" cyclists) - mirrors have blind spots and should only be trusted for getting a general idea of what's behind you (I like the "Bike Eye" frame mounted mirrors for this). If you have a problem with steering a straight line while looking back, try letting go of the handlebar on the side you're turning toward (you can combine this with a hand signal as you're letting go anyway) - it will reduce the tendency to veer sideways (although swerving a little in the direction you intend to turn can be helpful getting the attention of other road users behind you - obviously don't do this if they're close). On a bike with a low handlebar it can be easier to look below your arm rather than over it.
# Answer
> 3 votes
A few points not yet covered:
* Mirrors can have blind spots
Just like a car's mirrors, any mirror you use on a bicycle can have blind spots. You'll have to turn your head to check those.
* Mirrors can fall off/fail/break
What are you going to do if you're 30 miles/50 km from home in the middle of traffic and your mirror falls off? It can happen. You have a spare tube or two for flats, maybe even a patch kit. And some tools to perform basic repairs if needed. Mirrors are not immune to problems, and if being in the middle of traffic without a mirror makes you uncomfortable or worse it'd be a lot better if you're prepared to handle such a situation if it does happen.
Mirrors certainly help some cyclists, but it really helps if you can also be safe without them. It might be troubling, mentally fatiguing, or even downright harrowing or scary to you to ride without a mirror in traffic, but it's a useful skill that will improve your safety - with and without mirrors.
# Answer
> 3 votes
**Mirrors can be used to address this problem.**
My past experience with mirrors was not among the best. The first mirror I tried long time ago was mounted on a long rod, sensitive to vibration to degree it only worked on a perfect tarmac. Even there, it's viewing angle did not make it actually usable. Finally, most of the rear view was obscured by myself.
As the community still recommended the mirrors positively, I tried again now and this time it was a success. The mirror I tested this morning has some curvature providing much wider view than a flat mirror would, and it is attached to the end of the handlebar, far enough to provide the clear view of the road behind and not just my hand instead. I needed to punch a hole at the end of the handlebar to install it, but looks that it is worthwhile.
I am also training to turn around for backward viewing. It works already at slow speeds.
# Answer
> 1 votes
I commute through busy streets and never used mirrors, but two things to practice when you're alone on the road.
1. Remembering to get a reading of the road ahead and any dangers it may pose before turning your head. It'll be tempting to just look back whenever you want.
2. Make sure you can keep your handlebars straight. This took some practice and almost got hit on the highway because I veered over when looking back. I'd pick the outer line of the road and look back to see how much you veer. It takes some practice.
---
Tags: safety, technique, visibility
---
|
# Youngtown, Tasmania
**Youngtown** is a residential locality in the local government areas (LGA) of Launceston and Northern Midlands in the Launceston and Central LGA regions of Tasmania. The locality is about 6 kilometres (3.7 mi) south-east of the town of Launceston. The 2016 census has a population of 291 for the state suburb of Youngtown. It is a southern suburb of Launceston.
There is an Australian rules football ground at Youngtown, the Youngtown Oval, which is where South Launceston Football Club play their home games in the Tasmania State League. Youngtown Primary School is also located in the suburb.
## History
Youngtown was gazetted as a locality in 1963.
Youngtown is also where the minor locality of Franklin Village is located which was established in 1837. Most of the historic buildings of Franklin Village are gone, and the area is incorporated into nearby Youngtown. The remaining buildings include Franklin House which was built in 1838 and St James Anglican Church built 1845.
The suburb was named after Henry Young, the first governor of Tasmania.
## Geography
The Midland Highway (National Route 1) forms the south-western boundary, and the Western Railway Line much of the eastern.
## Road infrastructure
Route C402 (Hobart Road) passes through from north to south. Route C411 (Relbia Road) starts at an intersection with C402 and immediately exits to the south-east.
## InfoBox
| Youngtown<br>Launceston, Tasmania | |
| --- | --- |
| | |
| Population | 4,053 (2016 census) |
| Postcode(s) | 7249 |
| Location | 6 km (4 mi) S of Launceston |
| LGA(s) | Launceston, Northern Midlands |
| Region | Launceston, Central |
| State electorate(s) | Bass, Lyons |
| Federal division(s) | Bass, Lyons |
| **Suburbs around Youngtown:** Prospect Kings Meadows Norwood Prospect Vale Youngtown St Leonards Breadalbane Relbia Relbia | |
|
# William Moschella
**William Emil Moschella** (born April 17, 1968) is an American lawyer and former associate deputy attorney general.
## Career
Moschella received a bachelor's degree from the University of Virginia in 1990. Following graduation, he spent seven years in a variety of positions in the office of Congressman Frank R. Wolf (R-Va.), while attending George Mason University Law School in the evenings. From 1997 to 2003, he held a number of positions on Capitol Hill, including serving as Counsel to the House Committee on Government Reform, General Counsel to the House Committee on Rules, Chief Investigative Counsel to the House Committee on the Judiciary from 1999 to 2001, and Chief Legislative Counsel and Parliamentarian to the House Committee on the Judiciary. In 2003, he was nominated by President George W. Bush to serve as United States Assistant Attorney General for Legislative Affairs, and he was approved by the Senate on May 9, 2003.
On October 2, 2006, Moschella was named principal associate deputy attorney general succeeding William W. Mercer, who was nominated in early September to serve as Associate Attorney General.
## Controversies
Moschella was directly involved in making changes to the Patriot Act that allowed interim US Attorneys to serve indefinitely.
On March 6, 2007, Moschella testified to the House Judiciary Committee that all the US attorneys were fired for performance-related reasons, although he acknowledged that none of the attorneys were originally told why they had been fired. He also testified that the White House had no involvement in the firings of US Attorneys, testimony that was later shown to be incorrect by emails that were subsequently released.
However, the Inspector General (IG) of the Department of Justice, after an exhaustive investigation, found that "Moschella did not know that his testimony . . . was inaccurate. Moschella only reiterated publicly what he had been told about these issues and what \[Deputy Attorney General\] McNulty had previously told the Senate Judiciary Committee." The IG stated on page 356 of its report: "Under these circumstances, we concluded that Moschella's inaccurate testminony was not his fault and that he should not be criticized for it."
## InfoBox
| William Moschella | |
| --- | --- |
| | |
| | |
| United States Assistant Attorney General for the Office of Legislative Affairs | |
| **In office**<br>May 2003 October 2006 | |
| President | George W. Bush |
| Attorney General | John Ashcroft<br>Alberto Gonzales |
| Preceded by | Daniel J. Bryant |
| Succeeded by | James H. Clinger (acting) |
| | |
| Personal details | |
| Born | William Emil Moschella<br>(1968-04-17) April 17, 1968<br>Knoxville, Tennessee |
| Spouse | Amy H. Rouleau |
| Education | University of Virginia (B.A.)<br>George Mason University School of Law (J.D.) |
| | |
|
# The House Across the Bay
***The House Across the Bay*** is a 1940 film directed by Archie Mayo, starring George Raft and Joan Bennett, produced by Walter Wanger, written by Myles Connolly and Kathryn Scola, and released by United Artists. The supporting cast features Lloyd Nolan, Walter Pidgeon and Gladys George.
## Plot
A gangster Steve Larwitt (George Raft) falls for one his singers Brenda Bartley (Joan Bennett) at his nightclub. They marry and live the high life for awhile. He gets set up and is sent to Alcatraz on charges of racketeering, for ten years. She suspects his lawyer Slant Kolma (Lloyd Nolan) having a hand in this problem. She rents an apartment across San Francisco Bay with a view of the prison. She is befriended by another woman Mary Bogale (Gladys George)whose husband is also jailed but also wants to have fun. One night they meet a man Tim Nolan (Walter Pidgeon) who becomes attracted by Brenda and starts pursuing her, much to her annoyance. He finally wins her over. However, she still loves her husband. Kolma tries to blackmail her and trap her, having sold off her jewelry for his "defense". He is jealous because he saw her at a restaurant with Tim. Brenda finally confides in Mary and tells her about her problems. She returns to singing to earn money. When she visits her husband in jail, that shyster lawyer is waiting for her. She hides the truth from Steve about the money being gone. Tim sees her singing at the nightclub and talking with customers. He continues to pursue her but although she has feelings for Tim, she wants to be faithful to her husband because she knows her love is the only thing that helps him get through his days. The treacherous lawyer is so full of jealousy, he goes to tell Steve about Brenda and Tim. Desperate, Steve escapes and looks for Brenda. He tries to kill her but Tim arrives in time with a gun and tells Steve about the lawyer setting him up and stealing their money. He escapes the nightclub and he tells Brenda to wait for him and at a street corner. He goes looking for the lawyer and finds him and kills him. Then returns to the bay waterfront, swims out and allows the prison posse trolling the water to capture him.
## Cast
## Production
The film was based on an original story by Myles Connolly. In 1939 it was reported Warner Bros were considering buying it as a vehicle for James Cagney and Marlene Dietrich. They could not come to an agreement and Walter Wanger bought the rights. Wanger made the film as part of what was meant to be a slate of six films for United Artists. Filming was pushed back so Wanger could make *Foreign Correspondent*.
George Raft was loaned by Warner Bros, dropping out of *It All Came True*, in which he was replaced by Humphrey Bogart. Walter Pidgeon was borrowed from MGM. Director Archie Mayo was borrowed from Sam Goldwyn. Bennett was under contract to Wanger.
Filming started 16 October 1939.
Some scenes of Pidgeon and Bennett in an airplane were filmed by Alfred Hitchcock as a favor to Wanger, for whom Hitchcock had directed *Foreign Correspondent* the same year.
Bennett and Wanger married after filming completed.
## Reception
### Box office
The film recorded a loss of $101,334. It caused tension between Raft and Warner Bros, to whom he was under long-term contract, because in this United Artists film, Raft played a gangster who loses in the end – the sort of role he had refused to play for Warner Bros.
### Critical
The *New York Times* called it a "somewhat less than fascinating tale of one of the more glamorous Rock-widows of Alcatraz" which was "old hat and scarcely worth its maker's bother—or yours." The *Los Angeles Times* thought it was "curiously (and unnecessarily) complicated."
## InfoBox
| The House Across the Bay | |
| --- | --- |
| | |
| Directed by | Archie Mayo<br>Alfred Hitchcock (uncredited) |
| Written by | Myles Connolly<br>Kathryn Scola |
| Produced by | Walter Wanger |
| Starring | George Raft<br>Joan Bennett<br>Lloyd Nolan<br>Walter Pidgeon |
| Music by | Werner Janssen |
| Production<br>company | United Artists |
| Distributed by | United Artists |
| Release date | * March 1, 1940 (1940-03-01) |
| Running time | 88 minutes |
| Country | United States |
| Language | English |
| Budget | $713,965 |
| Box office | $684,374 |
|
Surprise! Another person on the Internet is wrong.
But this time it's not just your politically charged uncle sharing fake outlandish fake news on Facebook. It's a whole generation of language learning pundits warning that you there is no place for your mother tongue in second language learning.
Having spent over a decade developing a new technique on how brain science can help you learn faster, Brainscape has become quite confident that your mother tongue can actually be one of the most useful tools in learning a foreign language.
It's just a matter of how you use it.
Today, we're using Science! to debunk the myth that you shouldn't use your mother tongue in second language learning. You should. And we'll show you why.
Critiques of relying on your mother tongue in second language learning
So what exactly are people saying?
Briefly, critics object to a second language learner learning primarily by translating the language they’re learning into their first language. Instead, they argue that a person should “stop translating in their head” and, instead, train your brain “to start thinking in a foreign language”.
These critics are essentially nervous about creating a reliance on translation as the primary means of eliciting the learner’s production. They argue that this dependence on a person’s first language may impede the proper learning of the second. Indeed, some of today’s most popular language education companies promote their exclusive use of L2 immersion as one of their most significant pedagogical advantages.
Some language theorists break this fear into several distinct points:
• That translation suggests that languages are equivalent, even though no language is exactly the same;
• That the first language (called the “L1”), interferes with the development of the second language being learned (the “L2”);
• That translation is “easier” than other, more effective methods for learning, such as figuring out the meaning from contextual cues; and
• That acquiring an L2 through exposure and experience is how we learn a language as an infant and is a more “natural” way to learn a language.
These fears are perhaps why we are used to see elementary ESL teachers yelling at kids in their classes who spoke in their native language, explaining things to their peers. Cringe!
Our response based on the scientific literature
Line drawing of man at desk writing a letter in his mother tongue
Here's our response to the critics of a person using their mother tongue in second language learning.
We at Brainscape maintain that the proper use of the mother tongue can and should be considered as a valuable asset in learning a new language rather than as a source of interference and confusion.
Yes, of course exposure and immersion in an L2 are great for learning. But our view, and we’re confident that this is backed by the research literature, is that our first language is a MASSIVE linguistic resource.
We took 5 years to learn to speak it fluently, and we’ve continued to develop our L1 skills over our life. Using our L1 to facilitate our acquisition of an L2 can help us become conversational in L2 in much shorter than 5 years!
We point to the substantial and growing body of evidence supporting the idea that the use of L1 and translation is indeed useful, if not critical, to adults’ ability to assess their progress toward learning L2. For example, according to Buck,
"the widespread rejection of translation as a language testing procedure by teachers and testers is […] simply not warranted on psychometric grounds."
There remains a large role for L1 in second language learning provided that it is used correctly in conjunction with other types of engaging activities.
Translation is a central part of Brainscape’s web and mobile flashcard curriculum, including for our language learning courses to Learn French, Learn Spanish, and Learn Chinese. Brainscape highlights several benefits of using L1 and translation in its own web/mobile curriculum.
Here’s why we’ve designed these courses that way, and what the benefits are.
1. Translation helps illustrate more complicated concepts
Girl reading dictionary
First, translation may be a faster way to illustrate concepts that cannot be easily conveyed using environmental or pictorial cues.
While it may be easy to elicit the L2 version of the word “apple” by showing a picture of one, it is less feasible to illustrate complex sentences like “If I’d had more money, I wouldn’t have bought such cheap shoes” exclusively in L2 without first setting up that sentence by creating a time-consuming contextual background.
Brainscape’s use of a single L1 cue enables it to separate L2 production exercises into quickly digestible individual sentences which can then be repeated more frequently according to the learner’s own repetition needs (see our Intelligent Cumulative Exposure methodology). Prasada, Pinker, and Snyder show that frequency of exposure to each language aspect (phonology, orthography, vocabulary, morphology, and syntax) is the most important determinant of how fluidly the learner will be able to access it in the future.
2. Explanations in L1 are useful for explaining grammar
Second, certain essential grammatical concepts are treated so differently between an L1 and L2 that they may benefit from a supplementary explanation in L1 in order to be fully understood within a reasonable amount of time.
Anton and DiCamilla show that for complex concepts “... L1 serves a critical function in students' attempts to mutually define task elements, provide each other with scaffolding help, and externalize inner speech".
In another study, White found that learners are best able to grasp difficult concepts, like adverb placement, when they are given positive or negative feedback in their native language.
While adult learners are probably capable of subconsciously figuring out grammatical structures after repeated and differentiated exposure, explanations in the familiar mother tongue can expedite the understanding process and allow the learner to progress to other topics more comfortably.
3. Translation is unavoidable
Translation is useful and unavoidable.
It is important to note that not only can translation help explain, deepen, or more clearly illustrate concepts essential to second language learning, but it’s also natural and unavoidable.
Adult learners have been conditioned for their whole life to think in their native language. So it’s not a surprise that we see that this occurs when they learn a second language.
Pariente-Beltran and Upton and Lee-Thompson show this happens unconsciously. Even when a lesson or activity is conducted exclusively in L2, new information tends to be processed through internal cognitive processes in L1 anyway. Incorporating actual L1 annotation into a lesson helps learners externalize those processes while helping teachers identify misunderstandings more transparently.
Perhaps even more importantly, it has been shown that learners seem to prefer spending time on L1-supplemented activities. Since study time is one of the biggest contributors to learning a second language, making use of translations including L1 more effectively encourages learners to solve communication tasks on their own.
4. Translation is a valuable skill
Finally, translation itself can be a very valuable and applicable skill.
Whether interpreting a conversation for a friend, translating a document for work, or converting one’s personal emails between L1 and L2, a language learner is likely to encounter many real-life cases in which translation skills prove useful. Making translation a part of a language learning program helps develop this skill.
The importance of translation as a communication tool suggests that there exists no intrinsic incompatibility between translation and language instruction.
Enjoy the resources your mother tongue gives you
Man holding up a sign in a non-English language
Our mother tongue can be useful to us when we learn a second language.
We get that language teachers want to encourage their students to really use their L2. Using language is, of course, extremely important for learning it.
But asking students to forget their mother tongue entirely is like throwing the baby out with the bathwater. Yes, provide extensive L2 input. But we don’t think anyone benefits from excluding L1.
That’s what Brainscape has done in our Learn French and Learn Spanish courses. Our web and mobile flashcard application harnesses many of the benefits of translation by anticipating the errors that learners are likely to make in each new grammatical learning objective, and by clearly explaining the rules (in L1) below each respective L2 sentence.
While the specificity of correction may not be as intelligent as a human tutor, Brainscape expects that its annotations will address the majority of major confusions that could be associated with each concept. The benefits gained from such clarification are maximized as Brainscape maintains each concept in an optimal review cycle based on the learner’s comfort level.
In this way, we get the best of both worlds. When people see the flashcards, they use active recall to find the concept for the vocabulary in their head. But if they don’t understand something, they also have a clear explanation in their native language.
Our mother tongue has a clear role in second language learning. It's time to use it the right way.
[See also: The best way to learn a language: your complete toolkit]
Avand, A. Q. (2009). Using translation and reading comprehension of ESP learners. The Asian ESP Journal, 5(1), 44-60.
Anton, M. & DiCamilla, F. (1998). Socio-cognitive functions of L1 collaborative interaction in the L2 classroom. Canadian Modern Language Review, 54(3), 314-42.
Buck, G. (1992). Translation as a language testing procedure: Does it work? Language Testing, 9(2) 123-148.
Kern, R. G. (1994). The role of mental translation in second language reading. Studies in Second Language Acquisition, 16(4), 441-461.
Nae, N. (2004). In defense of translation. Nagoya University of Commerce and Business Journal of Language, Culture and Communication, 6(1), 35-46.
Pariente-Beltran, B. (2006). Rethinking translation in the second language classroom: Teaching discourse and text analysis through translation to advanced students. Unpublished Masters Thesis. University of Massachusetts, Amherst.
Prasada, S., Pinker, S., & Snyder, W. (1990). Some evidence that irregular forms are retrieved from memory but regular forms are rule-generated. Paper presented at the 31st Annual Meeting of the Psychonomic Society.
Upton, T.A. & Lee-Thompson, L.C. (2001). The role of the first language in second language reading. Studies in Second Language Acquisition, 23(4), 469-495.
White, L. (1991). Adverb placement in second language acquisition: Some effects of positive and negative evidence in the classroom. Second Language Research, 7(2), 133-161.
|
Westworld’s Bicameral Mind hypothesis
Westworld, no doubt, is impressive in terms of production quality and intricate storytelling, which results to a highly addictive, intelligent and thrilling drama. It also makes clever references to current research in the technological, psychological and philosophical fields. Although, this might just serve as an intellectual smokescreen, it indeed raises profound questions about machine intelligence, artificial consciousness, and the means to reach them.
The show has grounded its approach to synthetic consciousness in the theory of Bicameral Mind. Initially, this was a theory of human consciousness development. To clarify, biological consciousness could be broadly divided into three areas: phenomenal and reflective consciousness, and self-awareness. Phenomenal consciousness is one’s raw experience of colours, shapes, sounds and feelings. Reflective consciousness is basically introspection, which involves access to one’s innate knowledge, memories, occurrent thoughts, allowing to manipulate own behaviour. Lastly, self-awareness is the recognition of the self as a different agent to the environment, recognition of own phenomenal and access awareness and the ability to conceptualise these abilities. Arguably, self-consciousness characterises subjectivity as such, serving as a link between experiences and first-personal accessibility to them. Therefore, introspective consciousness would not be possible without recognition of own subjectivity.
The Bicameral Mind theory attempts to explain how humans have reached introspective self-awareness. In 1976 book The Origin of Consciousness in the Breakdown of the Bicameral Mind, Julian Jaynes made the case that modern human consciousness only emerged approximately 3000 years ago. Jaynes studied ancient writings and noticed that the characters of, for example, Iliad or the Old Testament lack introspection or any subjectivism. Instead they followed the commands of the external voices, known at the time as ‘gods’. In contrast, Odyssey characters reflect on their motivations and actions. His theory holds that humans used to have bicameral or “divided” minds, where one hemisphere was ‘speaking’ and the other would obey. Thus, the now mostly dormant language areas in the right hemisphere would activate in forms of auditory hallucinations, which would transmit the left hemisphere its experiences and memories. This phenomenon could also explain schizophrenia, as many schizophrenics do not simply hear random voices, but experience ‘command hallucinations’, just like the ancient bicameral-minded individuals. Humankind therefore has transcended the bicameral mind framework due to its limited cognitive capacity to cope with the complex and stressful situations onset by human development, travel, and increased population size. He concluded that the emergence of modern reflective consciousness was a cultural rather than a biological adaptation, comparable to a change of software rather than hardware.
This theory offers a compelling narrative and insight; however, it was largely ignored in the scientific field due to a number of inconsistencies. Nevertheless, Westworld writers have taken this idea to portray unconscious robots, acting upon their routines and following the commands of their ‘gods’ or programmers. Then they started getting the glimpses of their old memories in a form of visual-auditory hallucination along with audio commands from Arnold, which marked the beginning of their journey to introspection and self-awareness. The host, therefore, must have had a base ‘Host’ code, which worked as a left hemisphere, and the ‘Arnold’ code which played the role of the right hemisphere.Consequently, the hosts would follow their base commands or ‘loop’ until they are encountered with new circumstances or guests, which could inject new commands. As per philosopher Daniel Dennett, this would create new “logical spaces”, where exposure to increasingly complex language and situations bootstraps self-awareness. Consequently, when Dolores finally recognised that it was not the voice of Arnold addressing her but her own thoughts, she finally acknowledged her subjectivity, allowing to break out from the loop.
Now the question stands: Could the bicameral mind theory work as a more elegant approach for creating artificial self-aware mind? To make this question more clear, this shall be referring a different kinds of AI as it is possible to be highly intelligent without being conscious, by using divergent thinking styles or algorithms. For example, a sufficiently intelligent AI could pass the Turing test without actually having any self-awareness. This is among the main arguments of the Chinese Room thought experiments. Conceived by John Searle in 1980, it holds that an AI could imitate complex human behaviour by learning language pattern-matching algorithms to participate in conversations without realising what it was actually saying. Similarly, the early hosts of Westworld were able to pass Turing test without having any self-awareness. This therefore would make the bicameral hosts a kind of philosophical zombies - completely devoid of self-awareness yet able to persuasively and intelligently.
As such, basing a conscious AI on bicameralism contradicts the current mainstream approaches to AI building. The artificial intelligence is usually coded as a whole, and it’s learning and further development comes as a side effect from interaction with the outside world. Yet, in Westworld the AI would have to be learning from itself. As such, it can be assumed that the hosts have a recursive algorithm, which breaks down complex tasks into smaller, more manageable ones until a predefined base case is reached. These small problems are then solved and recombined together to address the matter at hand. Having a bicameral model at work would mean that in solving these problems, the ‘Host’ and the ‘Arnold’ codes would have to be constantly communicating. The former would be inquiring the latter on how to break down the task more efficiently, and thus learning how to action independently by altering its code in the process. This means that the synthetic consciousness cannot be built but has to grow or evolve into it, like humans did.
It is yet hard to hypothesise whether it is possible. Marcel Kuijsten from MIT suggested that a robot, with sufficiently complex language, may actually become conscious if it has ”the metaphorical basis of the external world to build up an interior space”. However, it must be acknowledged that building such code must be a daunting and enormous effort. The humankind had thousands of years of evolutionary trial and learning embedded into our subconscious algorithms(instincts and reflexes), guiding our behaviour. Mimicking that in order to construct an automated inner ‘socialisation’ engine may lead to very reductionist and incomplete results. Moreover, it is often argued that consciousness may have simply been an environmental by-product or a nature’s accident. Therefore, this further decreases the likelihood of this theory working, especially considering the difficulty of recreating the conditions the human kind has gone through to bootstrap self-awareness. Finally, the hosts in Westworld also had to learn in a very specific way to be finally able to disobey or ‘transcend’ its core programming. Not entirely impossible, but yet incredibly difficult and extra encouragement on the human part might be needed.
To conclude, the Westworld idea on stimulating artificial consciousness is definitely not without substantial theoretical backing. As such, this piece attempted to contemplate the real-life possibility of such scenario. Sadly, at this point it is yet hardly possible to reach any conclusions. The modern science is not even close to capturing or even understanding the nature of conscious experience. Although, it is certainly very interesting to explore the possibilities! The thought of Bicameral recursive approach is certainly entertaining and potentially with utility. At present, there is little to none research in this direction, but this may change soon. And it is in our aspiration to be at the forefront of technological progress, understand and explore all the potential and novel ways move forwards. In the end of the day, moon landing, nuclear power and teleportation have also once been just pieces of science fiction.
|
# Wushu at the 2006 Asian Games – Men's changquan
The men's changquan three events combined competition (Changquan, Daoshu and Gunshu) at the 2006 Asian Games in Doha, Qatar was held from 11 to 14 December at the Aspire Hall 3.
## Schedule
All times are Arabia Standard Time (UTC+03:00)
| Date | Time | Event |
| --- | --- | --- |
| Monday, 11 December 2006 | 12:00 | Changquan |
| Tuesday, 12 December 2006 | 11:30 | Daoshu |
| Thursday, 14 December 2006 | 12:30 | Gunshu |
## Results
Legend * **DNS** — Did not start
| Rank | Athlete | Changquan | Daoshu | Gunshu | Total |
| --- | --- | --- | --- | --- | --- |
| | Yuan Xiaochao (CHN) | 9.80 | 9.85 | 9.85 | **29.50** |
| | Jia Rui (MAC) | 9.70 | 9.58 | 9.76 | **29.04** |
| | Aung Si Thu (MYA) | 9.59 | 9.45 | 9.73 | **28.77** |
| 4 | Trần Đức Trọng (VIE) | 9.56 | 9.64 | 9.48 | **28.68** |
| 5 | Ang Eng Chong (MAS) | 9.65 | 9.60 | 9.40 | **28.65** |
| 6 | Cheng Chung Hang (HKG) | 9.33 | 9.63 | 9.53 | **28.49** |
| 7 | Yuki Shimomura (JPN) | 9.48 | 9.57 | 9.29 | **28.34** |
| 8 | Daisuke Ichikizaki (JPN) | 9.53 | 9.25 | 9.40 | **28.18** |
| 9 | Dennis To (HKG) | 9.27 | 9.54 | 9.24 | **28.05** |
| 10 | Siow Kin Yan (SIN) | 8.91 | 9.32 | 9.37 | **27.60** |
| 11 | Kou Kun Chi (MAC) | 8.89 | 9.40 | 9.15 | **27.44** |
| 12 | Hsiao Yung-sheng (TPE) | 8.77 | 9.37 | 9.30 | **27.44** |
| 13 | Ghaffar Amani (IRI) | 9.50 | 9.04 | 8.75 | **27.29** |
| 14 | Kim Tae-hwa (KOR) | 9.05 | 8.75 | 9.22 | **27.02** |
| 15 | Dilshod Bazarov (UZB) | 8.31 | 8.41 | 9.00 | **25.72** |
| 16 | Bikash Gurung (NEP) | 7.10 | 7.70 | 8.44 | **23.24** |
| 17 | Vatche Nikoghossian (LIB) | 7.55 | 7.30 | 7.80 | **22.65** |
| 18 | W. Inunganba Singh (IND) | DNS | DNS | DNS | **0.00** |
| 18 | Sujeewan Premarathna (SRI) | DNS | DNS | DNS | **0.00** |
| 18 | Ammar Jalabi (SYR) | DNS | DNS | DNS | **0.00** |
## InfoBox
| Men's changquan <br>at the 2006 Asian Games | |
| --- | --- |
| Venue | Aspire Hall 3 |
| Dates | 11–14 December 2006 |
| Competitors | 20 from 18 nations |
| Medalists | |
| China Macau Myanmar | |
|
|
# 1954 All-Big Seven Conference football team
The **1954 All-Big Seven Conference football team** consists of American football players chosen by various organizations for All-Big Seven Conference teams for the 1954 college football season. The selectors for the 1954 season included the Associated Press (AP) and the United Press (UP). Players selected as first-team honorees by both the AP and UP are displayed in bold.
## All-Big Seven selections
### Backs
### Ends
* **Max Boydston**, Oklahoma (AP-1; UP-1)
* **Carl Allison**, Oklahoma (AP-1; UP-1)
* Andy Loehr, Nebraska (AP-2; UP-2)
* Lamar Meyer, Colorado (AP-2)
* Barney Alleman, Iowa State (UP-2)
### Tackles
* **Al Portney**, Missouri (AP-1; UP-1)
* Ron Nery, Kansas State (AP-1; UP-2)
* Ray Marciniak, Kansas State (UP-1)
* Ed Gray, Oklahoma (AP-2; UP-2)
* Don Glantz, Nebraska (AP-2; UP-2)
### Guards
* **Bo Bolinger**, Oklahoma (AP-1; UP-1)
* **Charles Bryant**, Nebraska (AP-1; UP-1)
* Dick Stapp, Colorado (AP-2)
* Cecil Morris, Oklahoma (AP-2)
* Sam Salerno, Colorado (UP-2)
### Centers
## Key
AP = Associated Press UP = United Press
|
# Tambopata River
The **Tambopata River** is a river in southeastern Peru and northwestern Bolivia. Most of the Tambopata is in the Madre de Dios and Puno regions in Peru, but the upper parts of the river forms the border between Peru and Bolivia, and its origin is in La Paz department in Bolivia. The Tambopata is a tributary of the Madre de Dios River, into which it merges at the city of Puerto Maldonado. The river flows through the Tambopata National Reserve.
Seven types of flooded forest are recognized for this Reserve:
* Permanently waterlogged swamp forests are former oxbow lakes still flooded but covered in forest.
* Seasonally waterlogged swamp forests are oxbow lakes in the process of filling in.
* Lower floodplain forest are the lowest floodplain locations with a recognizable forest.
* Middle floodplain forests are tall occasionally flooded forests.
* Upper floodplain forests are tall rarely flooded forests.
* Old floodplain forests have been subjected to flooding within the last two hundred years.
* Previous floodplain are now *terra firme*, but were historically ancient floodplains.
## History
Between 1900-1912 during the Amazon rubber boom, companies like the Inca Mining Company, Tambopata Rubber Syndicate and the Inambari Para Rubber Estates Ltd operated on the Tambopata river. These companies were granted concessions by the government of Peru to develop land routes through the isthmus of Fitzcarrald. Like many other rubber extracting enterprises, these companies practiced 'hooking by debts.' Lucien J. Jerome, a British Consul in Callao at the time referred to the treatment of the indigenous in the Madre de Dios as “slavery pure and simple.”
## InfoBox
| Tambopata River | |
| --- | --- |
| Tambopata River in the Amazon rainforest in Peru | |
| Madre de Dios watershed with the Tambopata River in the southeast (upper parts of the river not included on the map) | |
| Location | |
| Country | Bolivia, Peru |
| Physical characteristics | |
| | |
| Source | Andes |
| location | La Paz Department, Bolivia |
| | |
| Mouth | Madre de Dios River |
| coordinates | 12°35′48″S 69°10′10″W / 12.59667°S 69.16944°W / -12.59667; -69.16944 |
| Length | 350 km (220 mi) |
|
Myanmar and its Militias
In late August, over 1,000 representatives from Myanmar’s ethnic armed organizations (EAOs), political parties, military, and the government met in Naypyidaw for the second Union Peace Conference, dubbed the 21st Century Panglong (in reference to a meeting held at Panglong located in Burma’s Shan State in 1947 between the leaders of Burman, Shan, Kachin, and Chin ethnic groups). While the recent talks signaled the ruling National League for Democracy’s prioritization of resolving Myanmar’s ongoing armed conflicts, fighting continued in several areas, in the days before, during, and after the meeting between the Burma’s Defense Services (known as the Tatmadaw) and EAOs, underscoring the continued challenges that remain.
In 2011, a quasi-democratic government led by President Thein Sein came to power and initiated a peace process aimed at resolving over sixty-five years of armed conflict. The continued fighting in Kachin, Karen and Shan states demonstrates the difficulties in resolving the conflicts. One ongoing issue however is how armed groups in Myanmar—its Defense Services, EAOs, and hundreds of militias—will work together with communities toward a durable resolution to the conflict. Central to that is a better understanding of who these militias are and what role they play in Myanmar’s ongoing conflicts.
The term “militia” is used in reference to paramilitary groups that support another armed force. In Myanmar, there are militias that cooperate with the Tatmadaw and others that support EAOs. Aside from the police and the military, Tatmadaw-allied militias are one of the few groups—if not the only—allowed by the government to hold weapons.
Limited information is available about militias, meaning that several basic features, such as how they operate and their numbers, are not well understood. The exact number of militias and militia personnel is unknown and perhaps unknowable. Unofficial estimates of how many militia groups operate in Myanmar range wildly—from hundreds to thousands—which is part of the missing piece in better understanding their significance. While many militias are small and may not be armed or possess only a few weapons, some are armed, and it is estimated that their strength numbers in the hundred.
The Asia Foundation just released a new report that researches the history of Myanmar’s militias past and present, their affiliations and structure, how they sustain themselves, and their roles in conflicts. In addition to archival research, the report draws on over 25 interviews conducted in Thailand, Yangon, and Kayah, Kachin, and Shan states with a broad range of actors including members of civil society organizations, researchers, members of armed groups, and retired government officials. Below are some key findings from the report:
• Militias take many different forms in Myanmar, varying in size, allegiances, and modes of operation. The areas of the highest level of militias activity are in areas where non-Burman populations are the most numerous. These regions are where the civil war has taken place for decades. Most militias are allied with the Tatmadaw, while a few militia groups support EAOs.
• Militias are involved in a surprisingly broad range of activities. The primary security duties of Tatmadaw militias involve providing protection for their communities, such as serving as sentries, or watching for suspicious activities by strangers and reporting information to local security officials. In some villages, where the presence of either the Tatmadaw or the Myanmar Police Force is negligible or nonexistent, these militia forces may have greater security responsibilities. Some pro-government militias assist the Tatmadaw in the field. Their involvement includes guiding Tatmadaw units through unfamiliar and difficult terrain. In some cases, pro-government militias have assisted in combat operations against EAOs. But some militias engage in social welfare projects that include support for cultural activities and provide assistance to IDPs.
• Militia members also play diverse roles in the economy, politics, conflicts, and the communities in which they operate. The leaders of Tatmadaw-allied militias engage in business activities to support themselves. Some militias collect taxes from the local population. Some militia leaders and their associates operate businesses, which can range from gas stations, transport companies, and hotels, to natural resource projects such as agro-industry, logging, and mining, to investment in the real estate sector. Illicit activities are another source of income for some militias.
• Militias do not “fall from the sky.” Rather, their prevalence reflects the accumulation of different militia arrangements pursued by both the state and EAOs over the past 60 years. To better understand their complexity, it is useful to look at the history of militias. In the late colonial period, the British government authorized the formation of militias. During the 1960s, the Tatmadaw developed a military doctrine of people’s war, which involved the use of militias as a key part of the Tatmadaw’s national defense strategy. In the period from the mid 1990s to 2010, several EAOs became Tatmadaw militias as a result of government-led ceasefire and militia transformation initiatives.
As efforts at resolving ongoing conflict continue in tandem with continued conflict that in some places has involved an escalation, it is important to take into account that the diversity of the militias units operating in Myanmar. The groups vary in terms of their strength, their origins and the security environment in which they operate. Any discussion about the role of militia in Myanmar’s future needs consider this diversity.
The report aims to shed light on the diversity of militias, and underscore how critical considering their future roles in post-conflict Myanmar is for avoiding the costly and bloody pitfalls of other countries where peace-building efforts have neglected militia-related issues.
John Buchanan is a PhD candidate in the Department of Political Science at the University of Washington. He is the author of Militias in Myanmar. The views and opinions expressed here are those of the author and not those of The Asia Foundation or its funders.
Send this to a friend
|
# X-linked spinal muscular atrophy type 2
**X-linked spinal muscular atrophy type 2** (SMAX2, XLSMA), also known as **arthrogryposis multiplex congenita X-linked type 1** (AMCX1), is a rare neurological disorder involving death of motor neurons in the anterior horn of spinal cord resulting in generalised muscle wasting (atrophy). The disease is caused by a mutation in *UBA1* gene and is passed in an X-linked recessive manner by carrier mothers to affected sons.
Affected babies have general muscle weakness, weak cry and floppy limbs; consequently, the condition is usually apparent at or even before birth. Symptoms resemble the more severe forms of the more common spinal muscular atrophy (SMA); however, SMAX2 is caused by a different genetic defect and only genetic testing can correctly identify the disease.
The disorder is usually fatal in infancy or early childhood due to progressive respiratory failure, although survival into teenage years has been reported. As with many genetic disorders, there is no known cure to SMAX2. Appropriate palliative care may be able to increase quality of life and extend lifespan.
## Signs and symptoms
**XL-SMA** is characterized by severe hypotonia and areflexia with loss of anterior horn cells in the spinal cord (i.e., lower motor neurons). The disease course is similar to that in the most severe forms of classic autosomal recessive SMA caused by mutation of SMN1: SMA type 0 (SMA0) and SMA type I (SMA1). In SMA0, prenatal onset of weakness and poor intrauterine movement results in congenital contractures. In SMA1, motor skills regress before age six months; affected children are never able to sit independently.
The weakness of **XL-SMA** is often prenatal in onset, manifests as polyhydramnios and poor movement in utero that results in congenital contractures. Moreover, the weakness of **XL-SMA** is progressive.
Below is a list of known symptoms of XL-SMA:
* **Face :**
+ Myopathic Facies
+ Facial weakness
* **Mouth :**
+ Tongue fasciculations
* **Respiratory :**
+ Insufficiency due to muscle weakness
* **Chest :**
+ Chest deformities
* **Genitourinary :**
* **Skeletal** :
+ Arthrogryposis
+ Multiple joint contractures
+ Bone fractures (at birth and postnatal)
- *Skull-*
* Dysmorphic Skull
- *Hands-*
* Digital contractures
Note: Clinical diagnosis of X-linked spinal muscular atrophy type 2 should be considered for children who exhibit the following:
## Genetics
X-linked spinal muscular atrophy type 2 is inherited in an X-linked recessive pattern. The gene associated with this disorder, *UBA1*, is located on the X chromosome at Xp11.3 and contains 27 exons; moreover, translation begins at the second exon. In males, if the X chromosome contains an altered copy of the gene then the male will have the disorder. In females, a mutation of the gene on both X chromosomes would have to occur in order for the female to have the disorder. Since females are unlikely to have two altered copies of the gene, males are affected by this disorder much more frequently than females.
A recent study has resulted the in detection of three rare novel variants in exon 15 of UBA1 that segregated with the disease: two missense mutations present in each of one XLSMA family (314370.0001, 314370.0002), and one synonymous C-to-T substitution (314370.0003) identified in another three unrelated families. Moreover, in a sixth family, neither of the two missense mutations or the synonymous substitution was identified. Ramser et al. (2008) demonstrated that the synonymous C-to-T substitution leads to significant reduction of UBA1 expression and alters the methylation pattern of exon 15, implying a plausible role of this DNA element in developmental UBA1 expression in humans. Thus, SMAX2 is one of several neurodegenerative disorders associated with defects in the ubiquitin-proteasome pathway. The severity of SMAX2 does not waiver regardless of the type of causative mutation.
## Diagnosis
Components that may lead to a diagnosis include the presence of clinical symptoms, evidence of degeneration, and analysis of family history. One notable sign of SMAX2 is the loss of anterior horn cells in the spinal cord and brain stem. SMAX2 is typically confirmed through genetic testing that shows a mutation in the ubiquitin-like modifier-activating enzyme 1 gene (*UBA1)*. The UBA1 gene is important to diagnosis as it is the only gene known to correspond with degeneration of XL-SMA. In infancy it is important to look for the following when considering a X-linked spinal muscular atrophy diagnosis:
* Congenital hypotonia and areflexia on physical examination
* Congenital contractures/fractures
* Digital contractures at birth that remain throughout the child's life
* Evidence of degeneration and loss of anterior horn cells (i.e., lower motor neurons) in the spinal cord and brain stem
A child with these symptoms are likely to have X-linked spinal muscular atrophy. In order to confirm this the most practical measures to take next are:
* to perform a normal SMN1 molecular genetic testing to rule out autosomal recessive spinal muscular atrophy
* perform an analysis to see if it is male gender in a simplex case (i.e., a single occurrence in a family) or find the presence of X-linked pattern of inheritance in families with more than one affected individual
## Management
Following a diagnosis of the X-linked infantile spinal muscular atrophy it is recommended for the patient to go through further evaluations to alleviate symptoms as there is currently no known cure to SMAX2. The types of evaluations that are recommended are categorized in nutrition/feeding and respiratory function.
The nutrition and feeding evaluations are focused on determining if:
* caloric intake is adequate
* dysphagia or fatigue while feeding occurs
* problems related to swallowing persist
* gastronomy tube placement and fundoplication are necessary
The respiratory evaluations are used to:
* assess respiratory rate, work required to breath, signs of paradoxical breathing, the shape of the chest wall, and skin perfusion
* perform baseline pulmonary studies to establish the extent of restive airway disease and cough efficiency
* perform sleep evaluations to assess for sleep-disordered breathing
Other evaluations include assessing the existing contractures, neurologic evaluation to assess muscle tone and help provide supportive management, and highly recommended consultations with a genetic counselor.
Overall treatment aims at alleviating the symptoms and may include mechanical ventilation, feeding tube, gastrostomy, and orthopedic interventions.
## Epidemiology
X-linked spinal muscular atrophy type 2 is considered a rare disorder, and its prevalence is unknown. Currently, only 14 multigenerational families with affected family members have been identified throughout North America, Europe, Mexico, and Thailand.
## Further reading
* Dlamini, N.; Josifova, D. J.; Paine, S. M. L.; Wraige, E.; Pitt, M.; Murphy, A. J.; King, A.; Buk, S.; Smith, F.; Abbs, S.; Sewry, C.; Jacques, T. S.; Jungbluth, H. (2013). "Clinical and neuropathological features of X-linked spinal muscular atrophy (SMAX2) associated with a novel mutation in the UBA1 gene". *Neuromuscular Disorders*. **23** (5): 391–398. doi:10.1016/j.nmd.2013.02.001. PMID 23518311. S2CID 45706389.
* Baumbach-Reardon L.; Sacharow S.; Ahearn M. E. "Spinal Muscular Atrophy, X-Linked Infantile." 30 Oct 2008 \[Updated 13 Sep 2012\]. In: Pagon R. A.; Adam M. P.; Ardinger H. H.; et al., editors. *GeneReviews® \[Internet\]*. Seattle (WA): University of Washington, Seattle; 1993–2014. Available from: www.ncbi.nlm.nih.gov/books/NBK2594.
## InfoBox
| X-linked spinal muscular atrophy type 2 | |
| --- | --- |
| Other names | Spinal muscular atrophy with arthrogryposis |
| | |
| This condition is inherited in an X-linked recessive manner | |
| Specialty | Neurology |
|
# Max Kruse (sculptor)
**Carl Max Kruse** (14 April 1854, Berlin - 26 October 1942, Berlin) was a German sculptor and member of the Berlin Secession. His wife was the doll-maker and designer Käthe Kruse.
## Life
From 1874 to 1877, he attended the University of Stuttgart, majoring in architecture. He also studied art and entered the Prussian Academy of Arts, where his teachers were Fritz Schaper and Albert Wolff, completing his studies in 1879. His statue *Siegerbote von Marathon* (The Messenger from Marathon) brought him the "Prix-de-Rome" from the Prussian Academy of Arts, which included a stipendium that enabled him to make a study trip to Rome from 1881 to 1882.
He was also an inventor. His *Verfahren zur Vervollkommnung von Lithopanien* (Method for the Perfection of Lithophanes) and a *Bildhauerkopiergerät* (Sculpture Copier; apparently some sort of automated pointing machine) were patented in 1897. For Max Reinhardt, he designed one of the first Cycloramas from bits and pieces of plastic.
In 1908, he joined the Berlin Secession. The following year, he married his mistress, Katharina (Käthe) Simon, who later became famous as a designer of dolls. They had seven children in addition to the four he had from a previous marriage. In 1913, he became a member of the Prussian Academy. He wrote a short book describing his sculptural techniques and proposing new ones in 1925. Although he made his headquarters in Berlin, he travelled extensively, spending time in the Monastery of Hiddensee and Bad Kösen.
His youngest son, also named Max, is an author of children's books. A daughter from his first marriage, Annemarie von Jakimow-Kruse, became a painter.
## Best-known works
## Writings
* *Ein Weg zu neuer Form* (A Way to a New Form), which prefigures some trends in modern sculpture, notably the work of Henry Moore. Munich, G. W. Dietrich (1925)
## Further reading
* Fritz Stahl: *Max Kruse.* E. Wasmuth, Berlin (1924)
|
Here's my problem: I'm studying about string compatibilities between DOS/windows and Unix systems, and I'm told that when you use the new line character (\n) the DOS/Win compilers translate it to \x0D\x0A while Unix compilers use simply \x0D
I have also been told that you can just use the hex values in the code instead of \n to have control over this incompatibility, but when I want to test that I'm getting a weird behavior (or at least one I don't understand).
Here's my code:
#include <stdio.h>
int main(){
char textDOS[]="A\x0D\x0AB";
char textUnix[]="C\x0DD";
printf("%s\n\n", textDOS);
printf("%s\n\n", textUnix);
}
I use OSX, and when I compile it with gcc (gcc example.c -o example) I get no errors or warnings, but when I execute it I get this:
$ ./example
?
C?
I understand the textDOS should not be displayed correctly, but what about the textUnix? Shouldn't I see C in a line and D in the next one? What am I doing wrong?
Thanks a lot for your help! And please tell me if I'm not explaining myself good enough :)
P.S: I have also tested that code in Ubuntu, and it does not work properly either.
**Edit: I have managed to get it working (even if it's not 100% functional). Thanks a lot to /u/zabzonk and /u/Sixstring982 for your help :)**
The issue was that printf() was reading \x0AB and \x0DD as extended ASCII.]( In order to avoid this from happening, the character next to \x0A and \x0D needs to be different from [0-F]. I guess the string is stored properly, but [printf() is handling the hex values however it wants It would be nice to know how to avoid that from happening without breaking the string in segments, but I don't really need that right now.
Also, in my book there was a typo: the line feed character is \x0A instead of \x0D (this is the carriage return), so the functional code would be:
#include <stdio.h>
int main(){
char textDOS[]="A\x0D\x0AY";
char textUnix[]="B\x0AZ";
printf("%s\n\n", textDOS);
printf("%s\n\n", textUnix);
}
which outputs:
$ ./example
A
Y
B
Z
Again, thanks for your help :)
|
# Westhay Heath
**Westhay Heath** (grid reference ST415422) is a 25.9 hectare (64.0 acre) biological Site of Special Scientific Interest 2km west of Westhay village in Somerset, notified in 1990.
Westhay Heath, which is managed by the Somerset Wildlife Trust is an area of tall fen vegetation containing scrub, marshy grassland, ditches and small ponds in the heart of the peat moors on the Somerset Levels. This mosaic of habitats has developed on areas previously used for peat extraction. The site is of importance for the presence of a nationally rare fen community, including a diverse assemblage of breeding and wintering birds.
* "Westhay Heath". *Somerset Wildlife Trust*. Retrieved 22 August 2006.
## InfoBox
Westhay Heath
| Site of Special Scientific Interest | |
| --- | --- |
| | |
| Location within Somerset | |
| Location | Somerset |
| Grid reference | ST415422 |
| Coordinates | 51°10′34″N 2°50′18″W / 51.17603°N 2.83823°W / 51.17603; -2.83823 |
| Interest | Biological |
| Area | 25.9 hectares (0.259 km<sup>2</sup>; 0.100 sq mi) |
| Notification | 1990 (1990) |
| Natural England website | |
|
Literary Journalism and World War I Book
Title: Literary Journalism and World War I
Edited by: Andrew Griffiths, Sara Prieto, Soenke Zehle
Publisher: Éditions PUN – Université de Lorraine
Publication date: Fall 2015
Due date for final articles: 5 January 2015
For as long as there have been wars, there has been war reporting. The only thing humankind seems to value more than the taking of life is the recording of that death in ink. From Mesolithic to Neolithic cave drawings at Bhimbetka (India) and Jabel Acacus (Libya) to the Attic histories and epics of Herodotus, Thucydides and Homer; from Elizabethan tragedies to cult television series like Generation Kill: no media, ancient or modern, has escaped the theme of man’s inhumanity to man, nor has the public’s thirst for blood abated with time. For better or for worse, war reporting has remained a rich cultural heritage that touches not only those individual cultures or states that have borne the scars of war on its people or its landscapes, but also the collective memory of what it means to be human – or inhuman. To neglect war reporting is in part to forget the war that produced it and to fail to educate our children about how our failures have repeatedly existed coevally with our triumphs.
The arts, in particular literature, have played a significant role in recording wars for posterity. Literature affords audiences an emotive response to human tragedy that is often denuded in histories or sensationalized in the press. Literature lets readers travel where historians and journalists rarely venture: into the human psyche responsible for violence. Histories recount the battles, tally the dead, bestow the laurels and pass sentence on the enemy. The press, which only fully made the distinction between fact and rhetoric within the last century (in most democracies), frequently foments the chauvinism necessary for a state to empty its coffers on transgressing international borders rather than on addressing domestic affairs. As the press matured over time, journalistic reporting, which once occupied the no man’s land along the literature–history continuum, shifted paradigms and followed its own naturalistic instincts down a factographic path that aligned it closer to a historical rather than to a literary discourse. The general perception among democratic states by the 1920s was that journalism ought to be either “objective,” as it would become in the American tradition, or “polemical,” as it has often remained in the European one. In terms of war reporting, if history would satisfy itself with the telling of the how of war, and journalism the when and the who, literature would preoccupy itself with the why.
Whether recorded on papyrus or parchment, in pamphlets or broadsheets, via epics or novels, in photographs or film documentaries, the violence of war remains one of the most horrific experiences to which the human community has been exposed. Yet, modern historical and journalistic discourses have tended to objectify war to a safe, sublimated distance, even reducing it to a cultural logic that promise renewal through destruction. In effect, we have made of war a euphemism, which, as the poet Joseph Brodsky observed, “is, generally, the inertia of terror” we do not wish to acknowledge firsthand but which we agree is a necessary antidote to cultural exhaustion. Literature, on the other hand, provides subjective responses to war that appeal to our emotive needs, but it ultimately cheats us, providing satisfying or disturbing narrative ends to a war, while often ignoring, falsifying or even romanticizing its documented history. Since literature has traditionally instructed humanity through the ages about war more than history has, its effect has been to mythologize war in our collective conscience – often to the detriment of a given war’s truth. Consequently, to understand the motives and the players behind any war in any nation and at any given time, we have had either to choose between dry factography (when such facts were available and uncensored) and demagogic fiction, or to read both.
As an alternative to war literature and traditional war journalism, and to the historical legacies that have emerged from or given rise to both, literary journalism in its several written and visual avatars has sought different ways to perceive and represent the aesthetics of the war experience. Like its sister disciplines – journalism and literature – literary and multimedial journalism has repeatedly defended the necessities and exposed the horrors of war; has accurately chronicled the events and passionately dramatized its players; has rallied the troops and sympathized with the enemy. But, unlike its siblings, literary journalism does all of this at the same time. Its verité aesthetics offer incontestable facts with a critical distance worthy of history; its documentary heuristics capture multiple eye-witness accounts that give journalistic bylines their timely importance; and its transmedial story-telling provides visual images worthy of our greatest war novelists, playwrights, poets and photographers. While not being the definitivesource of war reporting, literary journalism does offer a more complete experience to a historical event by complementing the strengths of each of the other sources of war documentation and correcting their weaknesses or limitations. Literary journalism is, to be sure, more subjective than history, inviting the reader to participate in an event rather than passively observe it from the margins of time; it is longer and more detailed than short, dry journalistic pieces found in our broadsheets that are bound by formulaic structures, house styles, and word counts; and it is more fact-bound and thus less deterministic than war literature.
This book examines various forms of World War I writing that could be considered as early examples of literary journalism that helped shift the paradigm of documentary representation in war reporting. Experimentation is the hallmark of all literary journalism, and one of the aesthetic effects of the Great War was this fostering of journalistic innovation.Famous are the names Albert Londres, Joseph Kessel, Louis Piérard, Louis Tasnier, Egon Erwin Kisch, Joseph Roth, John Reed, Richard Harding Davis, Philip Gibbs and Basil Clarke, all of whom covered the War and its aftermath as journalists but who chose to capture their subjects in literary styles incompatible with the objective protocols that Western journalism was then codifying. To them, this collection adds the more marginal names of John Buchan (at least for his literary journalism), Velona Pilcher, Will Irwin, Gabriel Bounoure and Frans Masereel – British, American, French and Belgian authors whose literary journalism also drew upon the experimental war journalism developed in the 19th century that foregrounded literary aesthetics and placed the soldiers’ and the journalists’ lived experiences at the center of the written or visual narrative. Trench journals, war memoirs, serialized dispatches, graphic narratives – their experimental journalistic forms deliberately exceeded the scope of the jingoistic and censored news reporting of the day. Directly or indirectly, literary journalism influenced each of the texts studied in this book, and was itself subsequently shaped by them. Bringing them to light today, at the time of the War’s centenary commemoration, not only underscores the narrative imperative to capturing the aesthetics of war but also demonstrates how these early journalistic forms interrogate and challenge current practices of depicting – and consuming – literary war journalism.
The book reproduces extracts from each of the various primary sources under study with the goal of extending the canon of World War I literary journalism. Accompanying these extracts are a brief contextual gloss that situates a given text within its national literary and journalistic traditions and a detailed analysis that interpolates the aesthetics of war reporting on various fronts and at divergent times in history. The book thus hopes not only to provide present and future readers with examples of literary war journalism that have been widely neglected over the past century but also to capture what is particular or unique about the extracts in their day and to consider how they speak to us today. In other words, as a discrete case study, Literary Journalism and World War I will assess the impact literary journalism has had on various nations’ literary reporting emanating from the War years and how those stories might help to reconfigure certain historical legacies, journalistic heuristics and literary representations of the Great War in the twenty-first century. As a philological inquiry, it will widen our knowledge about literary war reporting in general and enable us to look at writing from other wars which has been neglected, marginalized or underappreciated.
|
link: map learning
THE SPATIAL MEMORY SYSTEM AND 'MAP LEARNING'
theme: Education can be upgraded by teaching which is based on the recognition of the power of the brain's spatial memory system for creative learning of content in context i.e. 'map learning'.
TWO TYPES OF LEARNING: IMPLICIT AND EXPLICIT All life experience takes place in the context of a given physical, social and space or 'cultural context'. The brain naturally makes meaning of the events of life or 'learns' in mental space. There are two types of learning - learning which does not require conscious participation - 'reflexive' or 'implicit learning - and learning which requires conscious participation - 'declarative' or 'explicit learning'. Implicit learning which does not require conscious participation involves the learning of skilled movements or 'motor skills'. Implicit learning is studied in various animal reflex systems... expressed through activation of the sensory and motor neurons which are engaged in the learning task. Implicit learning is slow and requires many trials involving the association of sequential stimuli... 'conditioned learning' or 'conditioning'. Conditioning allows for storage of information about predictable events. Adaptation to the non-predictability of life events depends on learning which does require conscious participation involving the creation of concepts for understanding or 'cognition'. Cognition is a function of the brain's innate capacity to make sense of unfamiliar stimuli, a capacity which is necessary for adaptation which depends on the brain's constant monitoring and comparing of present conditions and surroundings with memories of past experience... a function of the 'prefontal lobes'. The prefrontal lobes are the source of the individual's motivation for behavioural adaptation.
COGNITIVE LEARNING FOR ADAPTATION AND SURVIVAL 'Cognitive learning' is quick and requires only one trial involving the association of simultaneous experiences. It is a creative process which is inherently challenging and absorbing because it engages the imagination which is deep involvment of natural inquiry or 'curiosity' derived from the instinct for 'self-preservation'. It is the driving force of motivation which is intrinsic to the organism i.e. intrinsic motivation. Cognitive learning allows for storage of information about a single event. It represents the major vehicle for behavioural adaptation to a continually changing social environment i.e. 'adaptability'. Adaptability is only possible with the retention and retrieval of learning or 'memory'. Memory of cognition or 'cognitive memory' is the basis for human 'awareness' or 'consciousness'.
'MENTAL SPACE' IN COGNITIVE LEARNING: SPATIAL MEMORY SYSTEM AND THE SEARCH FOR MEANING OR 'NATURAL LEARNING' The moment-to-moment events of conscious life are processed or 'remembered' in the 'temporal lobes' of the 'limbic system' - a region of the brain known as the 'hippocampus'. The hippocampus is the location of the brain's 'spatial memory system' which functions in the storage of new memories. The spatial memory system allows for the immediate consolidation of memory of experience. New information is processed and stored in the 'short-term memory'. (Information in the short term memory is stored for ... and then it is transferred to the cerebral cortex where it can be expressed as the cognitive memory - 'long term memory' or 'working memory' - which is required for contemplation or 'thinking' for understanding or 'cognition'). The spatial memory system drives the search for meaning or 'understanding' i.e. 'natural learning'. The power of the spatial memory system is based on its activation by novelty. In a process of 'experiential learning' new information about the environment is processed in the context of previous life experience and in this way is related to knowledge already acquired. New learning patterns are embedded in the old ones producing a perceptual knowledge which provides meaning to the individual's personal world and purpose i.e. 'natural knowledge'. With continued experiential learning for natural knowledge, the spatial memory system is enriched over time.
NATURAL KNOWLEDGE IS BASED ON THE CREATION OF MIND MAPS: 'MIND MAPPING' OR 'MAP LEARNING' The acquisition of natural knowledge involves the creation and testing of interactive relationships in mental space i.e. 'spatial maps'. A spatial map is a pictorial representation of ideas and how they are related to each other i.e. 'mental map' or 'mind map'. In the creation of mind maps the mind focuses on a unifying idea or 'theme'. Themes are the organizers of meaning in the creative process of 'mind mapping' i.e. 'map learning'. Map learning is a creative process which involves the use of unifying themes in order to understand relationships. Memorization or learning as 'conditoning' is utilised as part of the creative process. As a creative process map learning is a source of joy and excitement and allows for intellectual freedom. In the context of freedom the 'mindmapping technique' is a powerful way to stimulate the brain to understand relationships and generate new ideas. Map learning is an efficient and effective use of the brain depends on its harmonious functioning and its potential for engaging a wide range of neurons in different areas. The brain is capable of conceptual thinking with little stress on any specific group of 'nerve cells' or 'neurons'.
TEACHING FOR MAP LEARNING: 'THEMATIC TEACHING' The most effective learning experiences are connected with real life experience which involves the functioning of the hippocampus. Teaching to the hippocampus is teaching for map learning... 'thematic teaching'. Methodologies of thematic teaching teach according are based on the natural function of the brain make meaning or 'learn'... They teach to the brain as a meaning-maker with its own rules for learning based on physiological 'brain functions' i.e. 'brain-based learning'. The brain has the innate capacity to detect patterns and see connections - to construct mental maps - in the context of specific life experience. The importance of content in context is the basis for thematic teaching. Specific content - items, events, concepts, issues, topics, subjects etc. - are studied within the context of organizing themes. New content is presented in its appropriate context... 'embedded' in previously learned experience. Material to be learned is related to material already learned ('embeddedness'). In order to facilitate understanding of different subject areas the boundaries between them are crossed. Learners are encouraged to be actively involved with their own learning. In this way they make efficient use of the brain's natural capacity to make connections.
IMPORTANCE OF APPROPRIATE SOCIALISATION: TEACHER BECOMES A 'FACILITATOR OF LEARNING' Natural learning is enhanced when integrated with social interaction of real life experience. Classroom learning experiences are meaningful when they are connected with real life experience and so provide content in meaningful context... when they are based on the learner's active engagement in communication and collaboration with others... when they utilise methods of cooperative learning and real life activities such as field trips, record taking, problem solving, drama, discussions, projects, talks and presentations. Teaching methodologies are effective when they are based on the practice of person-centered teaching in a growth promoting climate which is emotionally supportive and intellectually challenging... when they aim to orchestrate complex learning experiences or 'lessons' with the appropriate use of 'lesson plans'. Meaningful 'lessons' stimulate learner motivation by facilitating map learning and the understanding of concepts in terms of unifying themes, patterns and connections in a global perception of reality i.e. 'holistic perception'. In this holistic paradigm of education, the teacher's role is defined in terms of the facilitation of learning i.e. 'facilitator of learning'.
|
# Freden
**Freden** is a village and a municipality in the district of Hildesheim, in Lower Saxony, Germany. It is situated on the river Leine, approx. 25 km south of Hildesheim. Since 1 November 2016, the former municipalities Everode, Landwehr and Winzenburg are part of the municipality Freden.
Freden was the seat of the former *Samtgemeinde* ("collective municipality") Freden.
## Personalities
* Friedrich Lorenz (1897-1944), Catholic priest, Nazi opponent
* Friedrich Mennecke (1904-1947), NS doctor who participated in the mass destruction of the so-called euthanasia program of national socialism as an accomplice.
Media related to Freden (Leine) at Wikimedia Commons
## InfoBox
| Freden | |
| --- | --- |
| Municipality | |
| | |
| Location of Freden within Hildesheim district | |
| Freden Freden | |
| Coordinates: 51°56′N 09°54′E / 51.933°N 9.900°E / 51.933; 9.900 | |
| Country | Germany |
| State | Lower Saxony |
| District | Hildesheim |
| Government | |
| Mayor (202126) | Daniel Bernhardt (Ind.) |
| Area | |
| Total | 53.49 km<sup>2</sup> (20.65 sq mi) |
| Elevation | 127 m (417 ft) |
| Population (2022-12-31) | |
| Total | 4,669 |
| Density | 87/km<sup>2</sup> (230/sq mi) |
| Time zone | UTC+01:00 (CET) |
| Summer (DST) | UTC+02:00 (CEST) |
| Postal codes | 31084 |
| Dialling codes | 05184 |
| Vehicle registration | HI |
| Website | www.gemeindefreden.de |
|
# PubMed Central
**PubMed Central** (**PMC**) is a free digital repository that archives open access full-text scholarly articles that have been published in biomedical and life sciences journals. As one of the major research databases developed by the National Center for Biotechnology Information (NCBI), PubMed Central is more than a document repository. Submissions to PMC are indexed and formatted for enhanced metadata, medical ontology, and unique identifiers which enrich the XML structured data for each article. Content within PMC can be linked to other NCBI databases and accessed via Entrez search and retrieval systems, further enhancing the public's ability to discover, read and build upon its biomedical knowledge.
PubMed Central is distinct from PubMed. PubMed Central is a free digital archive of full articles, accessible to anyone from anywhere via a web browser (with varying provisions for reuse). Conversely, although PubMed is a searchable database of biomedical citations and abstracts, the full-text article resides elsewhere (in print or online, free or behind a subscriber paywall).
As of December 2018, the PMC archive contained over 5.2 million articles, with contributions coming from publishers or authors depositing their manuscripts into the repository per the NIH Public Access Policy. Earlier data shows that from January 2013 to January 2014 author-initiated deposits exceeded 103,000 papers during a 12-month period. PMC identifies about 4,000 journals which participate in some capacity to deposit their published content into the PMC repository. Some publishers delay the release of their articles on PubMed Central for a set time after publication, referred to as an "embargo period", ranging from a few months to a few years depending on the journal. (Embargoes of six to twelve months are the most common.) PubMed Central is a key example of "systematic external distribution by a third party", which is still prohibited by the contributor agreements of many publishers.
## History
PubMed Central began as E-biomed, initially proposed in May 1999 by then-NIH director Harold Varmus. The idea came to him "abruptly" in December 1998, inspired by the early use of arXiv for preprints after a presentation from Pat Brown of Stanford and David Lipman, director of NCBI:
> But my views broadened abruptly one morning in December of 1998 when I met Pat Brown for coffee, at the café that was formerly the famed Tassajara Bakery, on the corner of Cole and Parnassus, during a visit to San Francisco. \[...\] A few weeks before our coffee, Pat had learned about the methods being used by the physicist Paul Ginsparg and his colleagues at Los Alamos to allow physicists and mathematicians to share their work with one another over the Internet. They were posting "preprints" (articles not yet submitted or accepted for publication) at a publicly accessible website (called LanX or arXiv) for anyone to read and critique. \[...\] The more I thought about this, the more I was convinced that a radical restructuring of methods for publishing, transmitting, storing, and using biomedical research reports might be possible and beneficial. In a spirit of enthusiasm and political innocence, I wrote a lengthy manifesto, proposing the creation of an NIH-supported online system, called E-biomed.
The goal of E-biomed was to provide free access to all biomedical research. Papers submitted to E-biomed could take one of two routes: either immediately published as a preprint, or through a traditional peer review process. The peer review process was to resemble contemporary overlay journals, with an external editorial board retaining control over the process of reviewing, curating, and listing papers which would otherwise be freely accessible on the central E-biomed server. Varmus intended to realize the new possibilities presented by communicating scientific results digitally, imagining continuous conversation about published work, versioned documents, and enriched "layered" formats allowing for multiple levels of detail.
The proposal to create a central index of biomedical research was a radical departure from prevailing publishing norms. Prior to the internet, publication indexes operated largely like ISBNs: allocated by registration agencies to secondary publishers. The idea that anyone could own their own address space via a domain name and create their own indexing system was a wholly new idea. Major commercial publishers had begun experimenting with an indexing system for scientific papers shared across publishers as early as 1993, and were spurred to action following the E-biomed proposal. At the October 1999 STM Annual Frankfurt Conference, several publishers led by Springer-Verlag reached a hurried conference room consensus to launch their competitor prototype:
> At the Board meeting of the STM association, held the afternoon of Monday, October 11, before the fair's Wednesday opening, discussion focused on an emerging U.S. National Library of Medicine (NLM) initiative called E-Biomed (later PubMed Central) that had been proposed by Harold Varmus of the National Institutes of Health in the spring of 1999. Varmus envisioned a digital archive of journals, accessible free of charge and with the added value of reference linking. "Our consensus was that publishers should be the ones doing the linking," said Bob Campbell, who chaired the meeting. "Since we were 'higher up the stream,' so to speak, we should be able to link our articles ahead of the NLM as part of the process of producing them. Stefan von Holtzbrinck then set the ball rolling by offering to link Nature publications with anyone else's. We decided to issue an announcement of a broad STM reference linking initiative. It was, of course, a strategic move only, since we had neither plan nor prototype."
>
> A small group led by Arnoud de Kemp of Springer-Verlag met in an adjacent room immediately following the Board meeting to draft the announcement, which was distributed to all attendees of the STM annual meeting the following day and published in an STM membership publication. \[...\] The potential benefit of the service that would become CrossRef was immediately apparent. Organizations such as AIP and IOP (Institute of Physics) had begun to link to each other's publications, and the impossibility of replicating such one-off arrangements across the industry was obvious. As Tim Ingoldsby later put it, "All those linking agreements were going to kill us."
Under pressure from vigorous lobbying from commercial publishers and scientific societies who feared for lost profits, NIH officials announced a revised PubMed Central proposal in August 1999. PMC would receive submissions from publishers, rather than from authors as in E-biomed. Publications were allowed time-embargoed paywalls up to one year. PMC would only allow peer-reviewed work — no preprints. The then-unnamed publisher-led linking system shortly thereafter became CrossRef and the larger DOI system. Varmus, Brown, and others including Michael Eisen went on to found the Public Library of Science (PLoS) in 2001, reaching the conclusion "that if we really want to change the publication of scientific research, we must do the publishing ourselves."
## Adoption
Launched in February 2000, the repository has grown rapidly as the NIH Public Access Policy is designed to make all research funded by the National Institutes of Health (NIH) freely accessible to anyone, and, in addition, many publishers are working cooperatively with the NIH to provide free access to their works. In late 2007, the Consolidated Appropriations Act of 2008 (H.R. 2764) was signed into law and included a provision requiring the NIH to modify its policies and require inclusion into PubMed Central complete electronic copies of their peer-reviewed research and findings from NIH-funded research. These articles are required to be included within 12 months of publication. This is the first time the US government has required an agency to provide open access to research and is an evolution from the 2005 policy, in which the NIH asked researchers to voluntarily add their research to PubMed Central.
A UK version of the PubMed Central system, UK PubMed Central (UKPMC), has been developed by the Wellcome Trust and the British Library as part of a nine-strong group of UK research funders. This system went live in January 2007. On 1 November 2012, it became Europe PubMed Central. The Canadian member of the PubMed Central International network, PubMed Central Canada, was launched in October 2009.
The National Library of Medicine "NLM Journal Publishing Tag Set" journal article markup language is freely available. The Association of Learned and Professional Society Publishers comments that "it is likely to become the standard for preparing scholarly content for both books and journals". A related DTD is available for books. The Library of Congress and the British Library have announced support for the NLM DTD. It has also been popular with journal service providers.
With the release of public access plans for many agencies beyond NIH, PMC is in the process of becoming the repository for a wider variety of articles. This includes NASA content, with the interface branded as "PubSpace".
## Technology
Articles are sent to PubMed Central by publishers in XML or SGML, using a variety of article DTDs. Older and larger publishers may have their own established in-house DTDs, but many publishers use the NLM Journal Publishing DTD (see above).
Received articles are converted via XSLT to the very similar NLM Archiving and Interchange DTD. This process may reveal errors that are reported back to the publisher for correction. Graphics are also converted to standard formats and sizes. The original and converted forms are archived. The converted form is moved into a relational database, along with associated files for graphics, multimedia, or other associated data. Many publishers also provide PDF of their articles, and these are made available without change.
Bibliographic citations are parsed and automatically linked to the relevant abstracts in PubMed, articles in PubMed Central, and resources on publishers' Web sites. PubMed links also lead to PubMed Central. Unresolvable references, such as to journals or particular articles not yet available at one of these sources, are tracked in the database and automatically come "live" when the resources become available.
An in-house indexing system provides search capability, and is aware of biological and medical terminology, such as generic vs. proprietary drug names, and alternate names for organisms, diseases and anatomical parts.
When a user accesses a journal issue, a table of contents is automatically generated by retrieving all articles, letters, editorials, etc. for that issue. When an actual item such as an article is reached, PubMed Central converts the NLM markup to HTML for delivery, and provides links to related data objects. This is feasible because the variety of incoming data has first been converted to standard DTDs and graphic formats.
In a separate submission stream, NIH-funded authors may deposit articles into PubMed Central using the NIH Manuscript Submission (NIHMS). Articles thus submitted typically go through XML markup in order to be converted to NLM DTD.
## Reception
Reactions to PubMed Central among the scholarly publishing community range between a genuine enthusiasm by some, to cautious concern by others.
While PMC is a welcome partner to open access publishers in its ability to augment the discovery and dissemination of biomedical knowledge, that same truth causes others to worry about traffic being diverted from the published version of record, the economic consequences of less readership, as well as the effect on maintaining a community of scholars within learned societies. A 2013 analysis found strong evidence that public repositories of published articles were responsible for "drawing significant numbers of readers away from journal websites" and that "the effect of PMC is growing over time".
Libraries, universities, open access supporters, consumer health advocacy groups, and patient rights organizations have applauded PubMed Central, and hope to see similar public access repositories developed by other federal funding agencies so to freely share any research publications that were the result of taxpayer support.
The Antelman study of open access publishing found that in philosophy, political science, electrical and electronic engineering and mathematics, open access papers had a greater research impact. A randomised trial found an increase in content downloads of open access papers, with no citation advantage over subscription access one year after publication.
The NIH policy and open access repository work has inspired a 2013 presidential directive which has sparked action in other federal agencies as well.
In March 2020, PubMed Central accelerated its deposit procedures for the full text of publications on coronavirus. The NLM did so upon request from the White House Office of Science and Technology Policy and international scientists to improve access for scientists, healthcare providers, data mining innovators, AI healthcare researchers, and the general public.
## PMCID
The PMCID (PubMed Central identifier), also known as the PMC reference number, is a bibliographic identifier for the PubMed Central open access database, much like the PMID is the bibliographic identifier for the PubMed database. The two identifiers are distinct however. It consists of "PMC" followed by a string of numbers. The format is:
* PMCID: PMC1852221
Authors applying for NIH awards must include the PMCID in their application.
## InfoBox
PubMed Central
| Producer | United States National Library of Medicine (United States) |
| --- | --- |
| History | 2000–present |
| Access | |
| Cost | Free |
| Coverage | |
| Disciplines | Medicine |
| Record depth | Index, abstract & full-text |
| Format coverage | Journal articles |
| No. of records | 9,700,000 |
| Links | |
| Website | www.ncbi.nlm.nih.gov/pmc/ |
| Title list(s) | www.ncbi.nlm.nih.gov/pmc/journals/ |
|
Im (25), shes (25) Married for 2 years.
Everything seems to going good but....
Recently she has been talking to an old friend(guy) from highschool. But when i have asked her about it she claims its nothing. Shes telling me shes just trying to reconnect with old friends. But i havent notice her talking to anyone else.
What i remember about him was that hes divorced and is close friends with her back in highschool but only recently started talking to her.
She would only check facebook once a week or so and now shes on for hours at a time when at home. Im tempeted to check her FB and verify but it that too much?
Any advice?
Edit: Updated: I couldnt sleep last night, so i did snoop :( I did discover she has been talking to two of her old friends for a few months now on and off. She has initiated all the conversations and most of the conversations were friendly flirting, and talks about how they miss they old days. She posted old pictures of them on her FB and they werent viewable from my account. I also found that she was trying to search for an old flame repeatedly, through different website several times, from twitter, mylife, google search, and myspace. (she has never mentioned this)
I confronted her this morning after reading different post and comments from you guys. From the talk i learned that i wasnt making her happy. That she was depressed and hated how are relationship has been for 3 years. I asked her why she felt that way. She said she misses her old self the flirty and outgoing girl she was. She wanted to feel loved. That our relationship has made her only focus on us. I asked her about the old flame and she stated that she wanted to apologize for being so mean and cruel to him. I told her it felt like she was trying to open doors that shouldnt be opened. That if i did this to her how would she feel. She said that she didnt know what she was doing, but i told her i did and that it would lead to her cheating. She brought up if we should take a break, and i said i dont need one but if you do to get your shit out, then do it. It took her a while to answer that, which disappointed me.
We both needed to get to work and that we would finish our talk later.
TLDR: She was talking to other people and learned that she was trying to starts sparks with old flames. Going to finish talking after work.
I thought things were going well but im going to make some changes to hopefully save our marriage.
Thank you for the advice and support.
|
To start off, I don't really care about the money, but hopefully this helps you in the future.
Initially, I had a trade going for selling keys, both here and on After no luck here, I got a friend request by a person called 'Dannyz' ( who says that they are from tf2outpost.com and were after my keys.
After a lengthy discussion on reputation, I figure that the rep on his profile is more than enough for me to believe him as well has a ton of hours played on TF2.
After a bit more discussion on the method of transfer, I agree to give him 20 keys first, and he will follow up with a payment of $32. I trade him, send him the keys, and then poor grammar and (hilariously bad) excuses ensue.
*****
Dannyz: i have friend working at paypal dont worry
Dannyz: i can call him in-phone now
*****
drfunbuster +M: Paypal is instant my friend.
Dannyz: yes its 100% true
Dannyz: wired with you =/
Dannyz: i guess your balance is $0 the problem
drfunbuster +M: No, that isn't a problem.
Dannyz: paypal will let any transaction pass if at leat there $1.95 balance
Dannyz: $1.95 is "safe condition"
*****
Now to the thing that completely fucked me over. His reputation. First off, I checked it and looked at each of the persons profiles, and they seemed reputable enough so I thought nothing of it. After trading the keys and the paypal payment not arriving I figure he is just delayed somewhat. A few excuses later I look at the reputations again.
**"Fuck"**
They're all from Indonesia.
(*to clarify, I'm meaning that each person on his profile was from the same place that he was, it could be any country, it most likely means that they are either his own accounts or his friends*)
*****
Moral of the story: Do some god damn research on the people on their profile, don't listen to shitty excuses (no matter how terrible they are) and if nothing else refuse if they don't go first or don't have SourceOP or any other reputation. Steamrep is too easily forged, and I fell for it.
*****
<-- start
<-- part 2
<-- part 3
<-- part 4
<-- finale
<-- *Profile*
Steamrep stuff:
steamID: K:// Danny
steamID32: STEAM_0:1:31827662
steamID64:
customURL:
steamrepURL:
**Victory! He's been labelled as a scammer!**
|
Articles by John Liley
Featuring articles written by owner and author
“Shall I boom off?” In the course of our season recently gone, Max, our matelot on the Luciole would ask this from time to time. It was not a request to make a forceful speech, or to imitate a bittern. He was enquiring if he should go ashore, to help the lock-keeper (in some instances to find that individual) and speed up getting things ready.
Unlike the average hire-boat on the French canals our barge Luciole does not reach the bank too easily. We run aground before that happens, requiring heavy-duty leaps from those with uncalcified knees. Alternatively, we use the boom.
The boom is a device many freight barges have, a long metal spar that pivots outward, with a member of the crew clinging on, to deposit him or her on the bank. Then, mission accomplished, it can bring them back again. I have never seen one in Britain, though they could be handy on, say, the Aire & Calder, from a freight barge out in the middle.
Braced by a wire, which may be moved to and fro along the boom to make higher or lower, the device is particularly useful on the Yonne Navigation, between Montereau and Auxerre. There the locks, in the interest of strength, were built with sloping sides; or many of them were. Massive things, they present a range of hazards beyond any syllabus for barge handling we have ever heard of, and are frightening even to those who are used to them.
The size of these locks is a challenge in itself, for, once within, it is astonishing how easily a vessel drifts about. There are whirling eddies if you are entering at the downstream end and a tendency for the keepers to be, shall we say, unattuned. A common problem is finding someone to take your mooring lines: the keeper may be on the wrong side, or off to answer the telephone, or trying to get his car to start. Answer? The boom! Swing someone ashore, then ropes can be thrown, etc. In practice, like many things in boating, experience counts a lot. Our passengers, witnessing the operation in quieter, less frenetic circumstances up the Nivernais, want, sometimes, to try the boom themselves. This can be dodgy. In the course of twenty-odd years with these things, we have witnessed the following:
Boom too high:
person on bank, failing to leap on properly, dangles like laundry on a line, to drop off on the way over. The correct position is with boom beneath the midriff. This may not be achievable if it is level with your nose when you set off.
Boom too low:
person coming aboard, arriving at high velocity, collides with knees against the hull side.
Boomer not going fast enough:
grinding to a halt part way. It is essential, always, to have someone else around, standing by the pivot to control it.
Boomer landing in nettles:
or meeting fisherman’s doggie.
Also on the list, not directly experienced by ourselves (at least, not yet):
Boom not secured:
to move outwards of its own accord. This happened, years ago, on the barge Janine, while squeezing past a freighter travelling the other way. With both craft partially aground, and tipping towards one another, the boom, on swinging out, penetrated a wheelhouse window, narrowly missing the oncoming Captain’s wife.
Boom released too early:
As on the Escargot, while entering a Yonne lock at the speed sometimes necessary if the currents are not going to get you. Thankfully the crew member who was using it managed to let go before the boom, like a lance during jousting, penetrated the switchgear, newly installed to mechanise the gates. Result: a flash and a bang, much acrimony, weeks more winding for the keeper – and a very large bill.
A view of booming done properly is provided in the movie L’Atalante, made in France in 1934. Though revered in the world of filmmaking, however, and set upon a barge, this is not primarily a tale of inland waterways. If it turns up on TV, though, it is well worth a look. We use our own boom more often to swim from, usually when we moor in the river, at spots such as Maillyla - Ville. It is then, possibly, we might let our passengers have a try – with lots of people around, the boat herself stationary, and no great harm when the boomer lets go. Could they ever be useful in Britain? On balance I would counsel against it, certainly on narrow-beam craft, which would tip. But maybe on the Thames? Or the Trent?
If so, beware!
Hotel barge Luciole
Cruising since 1976
Phone: 00 44 1625 576880
From USA: 011 44 1625 576880
23 Adlington Road, Bollington
SK10 5JT England
1-2 Quai de la Republique, Auxerre
89000 France
© Hotel Barge Luciole 2019
Visa logo Mastercard logo Paypal logo
Sign up to Newsletter
|
# Adam Koets
**Adam Koets** (/ˈkts/; born January 7, 1984) is an American former professional football offensive tackle. He was selected by the Giants in the sixth round of the 2007 NFL draft. He played college football at Oregon State.
## Early life
Koets was born in Santa Ana, California to parents Russell and Helen Koets. He has one older brother, Jeff and an older sister, Amber. Koets attended Foothill High School in North Tustin, California. Koets lettered three years in football. He started three years as a defensive end and his senior season as a left tackle on offense. He was chosen as a first-team All-Century League on offense his final season and a three-time all-league selection on defense. Koets was the Century League Defensive Lineman of the Year twice and second-team All-Orange County and first-team All-CIF Division VI on offense as a senior. In his high school career, he had 229 tackles and 16 quarterback sacks. He graduated from Foothill High in 2002.
## College career
Koets attended Oregon State University where he played offensive tackle. After redshirting in 2002, Koets played in five games in 2003 as a redshirt freshman. In 2004, he started all 12 games. As a junior in 2005, Koets started all 11 games at left tackle. His play assisted Beaver running back Yvenson Bernard to rank ninth in the nation with a 120.1 yards per game average and quarterback Matt Moore to finish second in the Pac-10 for yards per game passing at 271.1 yards per game. In his senior year in 2006, Koets was a second-team All Pac-10 Conference selection after helping the team to average 360.6 yards per game. He started all 13 games his senior season. In his time with Oregon State, he was a three-time Academic All-Pac-10 Conference selection. He graduated with a major in International Business and a minor in German.
## Professional career
Koets was selected by the Giants in the sixth round of the 2007 NFL draft. During his four-year career, he played eleven games, starting four. In the 2007 postseason, he started the 2007–08 NFL playoffs.
He was released from the Physically Unable to Perform list on November 8, 2011.
## Personal life
Koets is a thrill seeker, enjoying sky diving, bungee jumping, surfing and other related extreme sports. Koets is also an accomplished singer and has appeared with the Grove Valve Orchestra, a band led by food industry magnate, Gary Erickson.
Chris Tomsha - Grove Valve Orchestra
## InfoBox
Adam Koets
| Koets at a telethon in 2011 | |
| --- | --- |
| No. 61 | |
| Position: | Offensive tackle |
| Personal information | |
| Born: | (1984-01-07) January 7, 1984<br>Santa Ana, California, U.S. |
| Height: | 6 ft 5 in (1.96 m) |
| Weight: | 300 lb (136 kg) |
| Career information | |
| High school: | Foothill (CA) |
| College: | Oregon State |
| NFL draft: | 2007 / round: 6 / pick: 189 |
| Career history | |
| | |
| | |
| Career highlights and awards | |
| | |
| | |
| Career NFL statistics | |
| Games played: 11 Games started: 4 | |
| | |
| Player stats at **PFR** | |
| | |
|
# Shelley, Idaho
**Shelley** is a city in Bingham County, Idaho, United States. The population was 4,409 at the 2010 census.
Since 1927 Shelley has been home to the "Idaho Annual Spud Day", which is celebrated on the 3rd Saturday of September. It typically features a parade, live bands, a Spud Tug, a spud-picking Contest, and free baked potatoes.
## History
Shelley was established in 1904. It was named for John F. Shelley, who moved to the area in 1892. He'd moved to the area intending to open a small store, and needed lumber and other supplies to build it. Since the site was some distance from the nearest existing community, he asked the railroad company to make a special stop to offload the supplies he'd ordered. They consented, provided he could offload the supplies in under 20 minutes. His daughter, Lottie, wrote the following in her personal history:
> With the help of Chris Mickelson and others, the lumber was thrown off the train on both sides of the track. Later a spur was put in here by the railroad company.
>
> Now they needed a name for the town. Mother suggested 'Shelco'; Father said, 'Shelton,' so they drew cuts and Mother won."
>
> Shelco was submitted to the railroad company and they replied: 'Call your town what you wish, but we have already named the spur, **Shelley** '. That is how the town got its name.
>
> Charlotte Shelley,
On September 4, 1902 a large fire destroyed seven buildings on State Street. Only two buildings, a general merchandise store and Nalder's furniture store, were saved. Soren Yorgesen, a local Justice of the Peace and proprietor of the first hotel in Shelley recounts the experience as follows:
> ...One windy afternoon in the heat of the summer, a fire started in a small grocery store operated by James Jensen. It did not take long until the wind was fanning a flame that wiped out quite a long string of frame buildings - two saloons, restaurant, Odd Fellows Hall, Post Office and Confectionery, Grocery Store, and dwelling.
>
> Soren Yorgesen,
## Geography
Shelley is located at 43°22′46″N 112°7′26″W / 43.37944°N 112.12389°W / 43.37944; -112.12389 (43.379490, -112.123846).
According to the United States Census Bureau, the city has a total area of 1.81 square miles (4.69 km<sup>2</sup>), all of it land.
Shelley is located on the eastern side of the Snake River, facing the Blackfoot Mountains.
### Greenbelt
Beginning at the fire department, across the street from Shelley High School, lies the Shelley Greenbelt. This fully paved trail, a collaborative project between Shelley and Bingham County, follows the Snake River for 2 miles before terminating at North Bingham County Park. The trail includes picnic tables, benches, and activities for families throughout.
## Idaho Annual Spud Day
In September, 1927, Shelley hosted its first Spud Day (Now called The Idaho Spud Day), now a yearly tradition usually taking place on the third Saturday each September. During this first Spud day, 10,000 people were served hot baked potatoes with butter. This tradition continues each year, along with several other events. These events have included a parade that features the various clubs and bands of the schools in the area, as well as local businesses and groups. Other events include the spud tug - where teams play a game of tug of war over a pit of mashed potatoes blended together in a cement truck, spud run - a set of 1-mile and 5k races, concerts, fairground booths and games, and a demolition derby hosted at nearby North Bingham County Park. This event is usually the beginning of Spud Harvest, a 2-week break from school to allow students to assist in the seasons potato harvest.
## Demographics
Historical population
| Census | Pop. | Note | |
| --- | --- | --- | --- |
| 1910 | 537 | | |
| 1920 | 1,223 | | 127.7% |
| 1930 | 1,447 | | 18.3% |
| 1940 | 1,751 | | 21.0% |
| 1950 | 1,856 | | 6.0% |
| 1960 | 2,612 | | 40.7% |
| 1970 | 2,614 | | 0.1% |
| 1980 | 3,300 | | 26.2% |
| 1990 | 3,536 | | 7.2% |
| 2000 | 3,813 | | 7.8% |
| 2010 | 4,409 | | 15.6% |
| 2019 (est.) | 4,466 | | 1.3% |
| U.S. Decennial Census | | | |
### 2010 census
As of the census of 2010, there were 4,409 people, 1,445 households, and 1,123 families residing in the city. The population density was 2,435.9 inhabitants per square mile (940.5/km<sup>2</sup>). There were 1,531 housing units at an average density of 845.9 per square mile (326.6/km<sup>2</sup>). The racial makeup of the city was 89.0% White, 0.3% African American, 0.8% Native American, 0.7% Asian, 0.2% Pacific Islander, 7.0% from other races, and 2.1% from two or more races. Hispanic or Latino of any race were 14.0% of the population.
There were 1,445 households, of which 49.1% had children under the age of 18 living with them, 61.6% were married couples living together, 12.1% had a female householder with no husband present, 4.0% had a male householder with no wife present, and 22.3% were non-families. 19.6% of all households were made up of individuals, and 7.1% had someone living alone who was 65 years of age or older. The average household size was 3.05 and the average family size was 3.53.
The median age in the city was 27.8 years. 36.1% of residents were under the age of 18; 9.6% were between the ages of 18 and 24; 25.6% were from 25 to 44; 19.2% were from 45 to 64; and 9.5% were 65 years of age or older. The gender makeup of the city was 49.4% male and 50.6% female.
### 2000 census
As of the census of 2000, there were 3,813 people, 1,201 households, and 989 families residing in the city. The population density was 2,884.5 inhabitants per square mile (1,113.7/km<sup>2</sup>). There were 1,253 housing units at an average density of 947.9 per square mile (366.0/km<sup>2</sup>). The racial makeup of the city was 89.93% White, 0.18% African American, 0.68% Native American, 0.26% Asian, 0.03% Pacific Islander, 6.74% from other races, and 2.18% from two or more races. Hispanic or Latino of any race were 11.78% of the population.
There were 1,201 households, out of which 48.9% had children under the age of 18 living with them, 67.0% were married couples living together, 13.0% had a female householder with no husband present, and 17.6% were non-families. 15.3% of all households were made up of individuals, and 7.2% had someone living alone who was 65 years of age or older. The average household size was 3.14 and the average family size was 3.50.
In the city, the population was spread out, with 35.6% under the age of 18, 11.5% from 18 to 24, 25.5% from 25 to 44, 16.8% from 45 to 64, and 10.6% who were 65 years of age or older. The median age was 27 years. For every 100 females, there were 96.2 males. For every 100 females age 18 and over, there were 90.3 males.
The median income for a household in the city was $39,318, and the median income for a family was $41,223. Males had a median income of $32,154 versus $20,121 for females. The per capita income for the city was $13,921. About 7.9% of families and 9.6% of the population were below the poverty line, including 10.6% of those under age 18 and 2.0% of those age 65 or over.
## Notable people
## InfoBox
| Shelley, Idaho | |
| --- | --- |
| City | |
| North State Street (U.S. Route 91) in Shelley, June 2008 | |
| Location of Shelley in Bingham County, Idaho. | |
| Coordinates: 43°22′46″N 112°7′26″W / 43.37944°N 112.12389°W / 43.37944; -112.12389 | |
| Country | United States |
| State | Idaho |
| County | Bingham |
| Area | |
| Total | 1.81 sq mi (4.68 km<sup>2</sup>) |
| Land | 1.81 sq mi (4.68 km<sup>2</sup>) |
| Water | 0.00 sq mi (0.00 km<sup>2</sup>) |
| Elevation | 4,633 ft (1,412 m) |
| Population (2010) | |
| Total | 4,409 |
| Estimate (2019) | 4,466 |
| Density | 2,472.87/sq mi (954.83/km<sup>2</sup>) |
| Time zone | UTC-7 (Mountain (MST)) |
| Summer (DST) | UTC-6 (MDT) |
| ZIP code | 83274 |
| Area code(s) | 208, 986 |
| FIPS code | 16-73450 |
| GNIS feature ID | 0397154 |
| Website | ci.shelley.id.us |
|
# Workin (song)
"**Workin**" is a song written by and performed by American rapper Sean "Puff Daddy" Combs. It was released on October 15, 2015 as the first single from Combs' commercial mixtape *MMM (Money Making Mitch)*. The album version was remixed to include guest performances from Big Sean and Travis Scott, whose verses are accompanied by a slightly altered production by Key Wane and Hit-Boy.
## Music video
Both versions of the song's accompanying music video were directed by Hype Williams and released in November 2015 on Vevo and YouTube. Curiously, both videos have since been deleted, although unofficial re-uploads are still accessible on the site.
## Track listing
* **Digital download**
1. "Workin" (Explicit) — 3:04
## Remixes
On November 23, 2015, Combs' released a remix of the song also featuring Travis Scott and Big Sean at Vevo and YouTube account.
1. The remix is co-produced by Key Wane and Hit-Boy.
## InfoBox
| "Workin" | |
| --- | --- |
| | |
| Single by Puff Daddy & The Family | |
| from the album *MMM (Money Making Mitch)* | |
| Released | October 15, 2015 |
| Recorded | 2015 |
| Genre | Hip hop |
| Length | 3:04 |
| Label | |
| Songwriter(s) | |
| Producer(s) | Rob Holladay |
| Puff Daddy & The Family singles chronology | |
| "Finna Get Loose" <br>(2015) "**Workin**" <br>(2015) "Money Ain't a Problem" <br>(2015) | |
|
Young Upstarts
The 5 Main Conflict Management Styles And How They Affect Resolution
Conflicts and disagreements are a regular part of life, work, relationships and even self-interaction, and everyone approaches the issue a little differently. While few people find conflict pleasant, when conflict is managed well the negative aspects of a disagreement will end up being limited, while the positive aspects will be emphasized. Understanding the various approaches to conflict management can be enlightening because how someone engages in conflict can affect the types of resolution or outcomes a disagreement yields,
After all, a willingness to understand your conflict management style is an essential component of good leadership; while much of how someone engages in conflict is due to personal temperament and personality, identifiable styles do exist. Here are a handful of the primary styles — first described by Kenneth Thomas and Ralph Kilmann in the 1970s — people utilize in conflict management and what results they usually achieve.
When people make use of a more competitive style of conflict management, they know their position well and make a firm stand to defend it. Often, people who engage in a competing manner of conflict do so from a position of power, regardless of whether the power comes from rank, position, job title, expertise or their ability to persuade. While a competitive style can be difficult to engage, in emergencies or in situations when a decision needs to be made quickly a competitive approach can be an efficient means of solving a disagreement. Unfortunately, a competitive style can also leave those who do not get their way feeling undervalued and disregarded, especially if it is employed in situations that are neither urgent nor dire.
When people engage in a more collaborative way of resolving conflict, they aim to acknowledge and meet the needs of everyone involved in the dispute. Collaborative conflict managers can be just as assertive as someone who is more competitive; the difference lies in the fact that they seek a solution and resolution to satisfy everyone involved. When multiple viewpoints are present and the people involved need to continue to work together, a more collaborative style of engaging and disarming conflict can be highly desirable. It just may take a bit longer than some of the other methodologies.
While it may seem similar to collaborating, compromisers focus on the overall solution over individual desires. A compromiser does aim to keep everyone’s position in mind, but instead of working to satisfy everyone, she aims at partial satisfaction. In a conflict driven by compromise, every party is expected to sacrifice something in order to get what they want. A compromise can be a helpful step in the right direction when two equal parties are engaged in a conflict and have very different opinions, as long as each side recognizes the cost of conflict is higher than the cost of sacrifice.
A more accommodating style of conflict management occurs when someone is willing to meet another’s demands or needs at the expense his own. An accommodator is willing to give in when the other party is unwilling to do so. However, because of this willingness he can also be persuaded to abandon his position at too high a cost to himself or his cause or organization. People who employ this style tend to be very cooperative but less assertive than people who employ the previous three styles. Accommodation is highly valued when peace must be achieved at all costs or when one party clearly values an outcome more than the other.
Avoiding is the least assertive of all the styles of conflict management; when someone avoids conflict the result is often a delegated or delayed decision, coupled with an elaborate attempt to negotiate away from hurting anyone’s feelings. When there is no way to win a conflict or when the conflict isn’t worth having, avoiding the conflict can be wise. However, avoiding tends to be a weak approach. Most of the time, avoidance will just make the parties involved more entrenched and less willing to cooperate, and as such, it should be utilized rarely.
Conflict is a consistent fact of life. How conflict is managed will have a large impact on the way it affects those involved, regardless of who wins and what concessions are made. Know the style you naturally gravitate toward and develop the rest; a mixture of conflict resolution styles will lead to the most successful conflict management.
Tagged as: , , ,
|
Embassy of the Czech Republic in Stockholm
english česky
Advanced search
History of the Czech Republic
I. In Brief
• End of the 5th and beginning of the 6th century - arrival of Slav tribes to the territory of Czech Lands
• Beginning of the 9th century - arrival of Christian missionaries
• Second half of the 9th century - 1306 - a gradual strengthening of the Czech state during the reign of the Premyslid dynasty
• 1346-1378 - the peak in the prestige and power of the Kingdom of Bohemia during the reign of Charles IV
• Beginning of the 15th century - a crisis of state leads to the Hussite movement
• 1526 - the Habsburg dynasty succeeds to the throne of Bohemia - the formation of a multi-national empire
• 1620 - the defeat of the Czech Estates at the Battle of White Mountain, continued centralization of the Habsburg Empire
• 28.10.1918 - foundation of an independent state of Czechs and Slovaks - Czechoslovak Republic
• 15.3.1939 - 8.5.1945 - German occupation
• 25.2.1948 - Communist takeover
• August 1968 - Soviet-led invasion of Czechoslovakia by Warsaw Pact countries brings an end to the "Prague Spring" and the attempt to build "Socialism with a human face"
• November 1989 - fall of the Communist regime
• 1993 Czech Republic founded after the split of Czechoslovakia
II. In more detail
Around the 4th century B.C. the present territory of the Czech Republic was populated by Celts. They were the first known ethnic group to arrive in the area, according to historical evidence. The Celtic Boii tribe gave the country its Latin name - Boiohaemum (Bohemia). They were replaced by the German tribes before the beginning of our era. The German tribes were present in the territory of Czech Lands till the beginning of 6th century when they either left or merged with Slav tribes.
At the end of the 5th and the beginning of 6th century Slav tribes settled in the territory of the Czech Lands during the period known as the Migration of Peoples. The first half of the 7thcentury marks the first successful attempt to unite these tribes under a Frankish duke Samo. The so-called "Kingdom of Samo" (623 - 659) resisted the pressure of the powerful Avar empire centered in the current territory of Hungarian lowlands, and defended its territory against the forces of the Franks from the west, with partial success.
The Great Moravian Empire (Beginning of the 830s - 907)
The first real state emerged in the territory of the Czech lands was the Great Moravian Empire known from the beginning of the 30s of the 9th century with its Prince Mojmír I. In 863 the successor of Mojmír, the Prince Rostislav called the Byzantine Christian missionaries Constantin and Methodius to Moravia to introduce Slav liturgy in the country. Prince Svatopluk, who succeeded Rostislav, reintroduced the Latin rite. This decision again confirmed the fact that the Czech Lands were the part of the Latin civilization.
The Premyslid Dynasty (the 9th century - 1306)
Bohemia became the center of an independent state-building process. During the reign of the native Premyslid dynasty, the Czech state gradually grew in strength and succeeded in preserving its actual sovereignty despite formal vassal ties to the Holy Roman Empire. Dukes and later kings of Bohemia had privileged positions of electors of emperors.
• 935 - death of Duke Wenceslas, the patron saint of the Czech Lands
• 973-976 - establishment of the Prague Bishopric
• 1085 - Vratislav became the first Bohemian duke to be granted the right to use a royal title, as a reward for his support of the Emperor Henry IV during the struggle with Pope Gregory VII
• 1212 - King of Bohemia Premysl Otakar I received The Golden Bull of Sicily, a decree proclaiming Bohemia a kingdom and Bohemian dukes hereditary kings, and also declaring the indivisibility of the Kingdom of Bohemia and regulating the relationship of the realm to the Holy Roman Empire. Bohemia then became one of the most important states within the framework of the Empire.
• 1253-1278 - the reign of the powerful king Premysl Otakar II was characterized by a policy of expansion of power. This expansionist tendency was continued during the reigns of the last Premysl kings as well.
• 1306 - the murder of Wenceslas III and the Premysl dynasty dies out in the spear - side.
• The Luxembourg Dynasty (1310 - 1437)
The reign of the dynasty began when John of Luxembourg (1310-1346), the husband of the Premyslid Princess Elisabeth, was elected King of Bohemia in 1310. The Luxembourg kings added new regions to their kingdom. This realm was named The Crownlands of Bohemia, a term made official by a decree of Charles IV in 1348. The official Crownlands consisted of the Kingdom of Bohemia and the so-called adjoining lands - the Margravate of Moravia, the Silesian principalities, Upper Lusatia and, from 1368, Lower Lusatia too.
The Hussite Movement (1419 - 1436)
Several conditions led to the creation of the Hussite reform movement. The first was the economic and political crisis during the reign of Wenceslas IV (1378-1419), the successor of Charles IV. This crisis was exacerbated by the problems in Europe of this time (the Great Schism, criticism of the Church).
The Hussite movement was inspired by the ideas of Master Jan Hus, a preacher who was burnt at the stake in 1415 at Constance. Despite his death, his supporters successfully continued in their efforts to reform the Church.
Heir to the Crown of Bohemia, the Roman Emperor Sigismund, tried to defeat the growing revolution with force, but the Hussites defeated his five consecutive crusades in the years 1420-1431. Only the victory of 1434, when the moderates defeated the radicals, opened the way for a temporary agreement between Hussite Bohemia and Catholic Europe. This agreement, The Compacts of Basle was proclaimed in 1436 and confirmed the Hussite denomination, and would later be paralleled by the Reformation of the 16th century. The Hussite movement changed the structure of society in many ways. It created religious dualism for the first time in Christian Europe. There was a decline in the power and prosperity of the Church from which the nobility and towns were able to profit. The Czech nation and Czech culture came to the forefront of social
life. In the years of unrest, a Czech noble - George of Podebrady, a skillful diplomat and a man of outstanding personality, became the leader of Czech political life. He was elected King of Bohemia in 1458. His diplomatic activities - notably his effort to establish a peace confederation of the European sovereigns - even reached beyond the horizon of central Europe.
The Jagellon Dynasty (1471-1526)
1471-1516 - Vladislav Jagellon, a son of King Cazimir of Poland and also a descendant of the Luxembourg dynasty, was elected King of Bohemia. During the reigns of Vladislav and his son Louis, the power of the Estates grew, however, royal power diminished. Various conflicts also took place: a conflict between royal towns and nobles, and religious struggles between the Hussite Church and the minority Catholic Church which aimed to regain its former power.
The Habsburg Dynasty (1526-1918)
The Jagellon dynasty died out due to the death of Louis of Jagellon at the battle of Mohacz. The husband of Princess Anna Jagellon, Ferdinand of Austria was elected King of Bohemia and the Habsburgs of Austria succeeded to the throne of Bohemia. The Habsburg rule brought the re-introduction of the Roman Catholic faith, centralisation and the construction of a multi-national empire. The Habsburgs included the Crownlands of Bohemia in their monarchy, and they remained a part of the Habsburg empire until 1918.
When Rudolf II (1576-1611), during his reign, left Vienna for Prague, Czech capital grew into an important center of European culture. The Czech Estates forced Rudolf II to issue a decree - so called "Maiestatus" - proclaiming freedom of religious confession. The Emperors Matthias and Ferdinand tried to limit this freedom and their efforts sparked a civil war between the Estates and the Catholic Emperor. The Estates were defeated in 1620 at the Battle of the White Mountain. The following period of the Thirty Years' War brought political disorder and economic devastation to the Czech lands which had far-reaching consequences on the future development of the country. The Czech people were forced to accept the Catholic faith or to emigrate. The throne of Bohemia was made hereditary in the Habsburg dynasty.
In the period after the end of the Thirty Years' War high Baroque culture became deeply rooted in Bohemia and Moravia. Baroque influenced the architecture of Czech towns and villages for several centuries.
Foundation of the Modern Czech Nation
Although the Czech national revival movement aspired at first only to a revival of the Czech language and culture, it soon began to strive for political emancipation. In the revolutionary year 1848, Czech politicians made the first coherent political propositions aimed at rebuilding the empire into a federal state. A desire for national emancipation was supported by the quick industrialization of Bohemia, which made the country the most developed land of the monarchy in the second half of the 19th century.
Independent State (from 1918)
The defeat of the Austria-Hungarian Empire in the World War I cleared the way for the foundation of an independent state of Czechs and Slovaks (28.10.1918). The Czechoslovak Republic gradually became one of the highly developed countries of the world with several big industrial groups as Baťa and Škoda. A period of twenty years of democracy and prosperity was ended by the aggression of Hitler's Germany. The conference in Munich and the following German occupation in March 1939 brought the end of the independent Czechoslovak state.
After World War II, the restored republic became part of the Soviet sphere of power. A period of "limited" democracy was ended by a Communist takeover in February 1948. All private property was expropriated and political and human rights were suppressed. An attempt to change and humanize Communist totality and to weaken ties to the Soviet Union failed when the Soviet Army invaded the country in August 1968.
The gradual decay of the Communist regime and the Soviet empire, and the mass protests and demonstrations of the Czechoslovak people culminated in the overthrow of the Communist regime in November 1989 and in the re-installation of parliamentary democracy. The changes were confirmed by the election of Václav Havel as President of the Republic.
On 1 January 1993, the Czech and Slovak Federal Republic was peacefully divided and the independent Czech and Slovak Republics were founded. The Czech Republic is now a parliamentary democracy with a functioning market economy striving for the European Union membership with 1 January 2003 as its reference date for accession set by the Czech Government.
On May 1, 2004 the Czech Republic became a Member State of the European Union.
|
# Harry Ashland Greene
**Harry Ashland Greene** (January 12, 1852 – November 13, 1933) was an American businessman and philanthropist. A native of San Francisco, he founded the stockbrokerage firm Greene and Co. there but spent the last 43 years of his life in Monterey, California. He became an influential figure in the development of Monterey and the preservation of its historical landmarks. Among his initiatives were the creation of the city's first electricity company, the construction of the Monterey harbor breakwater, and the preservation of Colton Hall where California's first constitutional convention was held. A keen horticulturalist by avocation, he was the founder and first president of the Federation of Tree-Growing Clubs of America.
## Life and career
Harry Ashland Greene was born on January 12, 1852, in San Francisco. He was the second of five children born to William Greene and Anne Elizabeth (*née* Fisk) who had settled in California in 1849. His boyhood home in Ashland Place, which his parents had imported from China and re-assembled in San Francisco, was known as "The Chinese House". Greene was initially educated by private tutors and then at City College and Santa Clara College. He continued his studies at the Military Institute in Poughkeepsie, NY before travelling to Paris in 1870. His stay in France was cut short by the outbreak of the Franco-Prussian War, and after a visit to England he returned to San Francisco to study at the Pacific Business College.
Greene began his career in mining in Placer County. On his return to San Francisco he briefly held a clerical position at George Babcock & Co., large dealers in produce and grain. He then became a stock broker and in 1874 formed a brokerage firm with his older brother Clay M. Greene. However his brother retired after a few months to pursue his career as a playwright. Greene continued with Greene & Co until ill-health forced his retirement in 1890. He left with the record of being the oldest commission stock broker to have not gone under because of financial disaster.
Greene retired to his house in the New Monterey neighborhood of Monterey which he had originally built in 1886 as a summer home. Designed in an eclectic Moorish Revival style, the house still stands today and is one earliest surviving residences in New Monterey. Over the years he added a coach house and barn and built up an extensive garden of rare plants and shrubs.
While living in Monterey, Greene became a key figure in the development of the city. By 1894, his Monterey Electric Light and Development Company was providing electricity to much of Monterey. He organized the Monterey & Fresno Railroad and became vice-president of the Monterey & Pacific Grove Street Railroad. He also created and invested heavily in the Bank of Monterey, serving briefly as the ceremonial first cashier. Greene was 80 years old when he saw the successful culmination of his twenty-year campaign for the building of a breakwater to protect Monterey harbor. At considerable personal expense, Greene, who became known as "Breakwater Harry," had lobbied both the California State Legislature and the US Congress for the necessary funds. At a ceremony in 1932 to mark the start of the breakwater's construction Greene pulled the lever which sent the first granite boulders into the bay.
Greene's civic activism also extended to the preservation of Monterey's history. In 1896, he was Director General of the California Jubilee and in 1899 led the campaign by the Native Sons of the Golden West to save Colton Hall, the site of California's first constitutional convention, from demolition. Greene found more desirable land for the new school which the city had wanted to build on the site of Colton Hall and organized a public subscription to raise money for its purchase. Six years later, Greene helped to rescue and preserve the remains of the historic Vizcaíno-Serra Oak. In 1903 the huge centuries-old tree was damaged by workmen, who eventually chopped it down in 1905 and threw it into Monterey Bay. With the help of local fisherman, the pastor of the Cathedral of San Carlos Borromeo had the tree fished out of the bay, while Greene provided financial help to preserve the remains of the trunk and erect it behind the cathedral. He also commissioned local craftsmen to make several chairs out of its branches, two of which he donated to the local parlor of the Native Sons of the Golden West. One of the chairs was exhibited along with other Monterey products at the Panama Pacific International Exposition. The chair is the property of California State Parks and was on display at the Pacific Grove Museum of Natural History in 2015 and 2016.
In his later years Greene devoted much of his time and money to promoting better forestry and improving home gardens in Monterey. On Arbor Day 1925, the city honored his work with the planting of a *Sequoia sempervirens* in the park surrounding Colton Hall.Greene died at his home in Monterey on November 13, 1933, at the age of 81. His ashes were buried in the El Encinal Cemetery. After his death, the city named the island in the middle of Lake El Estero in his honor.
## Horticulture
Greene's interest in horticulture began in boyhood when the English botanist Thomas Bridges was a resident in his parents' house in Ashland Place. Greene would help Bridges to package the seeds he had collected for dispatch to Kew Gardens. When Greene took up residence at his house in Monterey, he set about developing the extensive gardens there. By the end of his life, the gardens contained one of the state's largest private collections of trees and shrubs—over 400 varieties—all of which Greene had marked and scientifically classified. He also took a keen interest in the Monterey Cypress grove at Cypress Point on the outskirts of Monterey. In 1929 he wrote a brief article on the history of the grove for the journal of the California Botanical Society in which he lamented that his efforts to have the grove declared a National Monument had been unsuccessful. He had personally counted and categorized the 10,500 cypress trees there.
In the early 1900s California Governor George C. Pardee introduced Greene to an audience of foresters as "Tin Can Greene". Also known as "Tin Can Harry", Greene was the original promoter of the Tin Can Club which distributed tree seedlings in tin cans. His idea was to encourage Monterey's children to take a part in the reforestation movement by taking care of the seedlings until they were mature enough for transplantation to gardens, streets, and parks. The Monterey Tree Growing Club grew out of this idea and Greene became its first president. Greene later became the founder and president of the Federation of Tree Growing Clubs of America. Although the Federation foundered in 1912 through lack of funds, the Monterey club prospered with support from the University of California.
In addition to his forestry activities, Greene was one of the earliest hybridizers of fuchsias which he extensively cultivated in the gardens of his mansion. He was one of the founders of the American Fuchsia Society and in 1930 became its first Honorary President.
## Personal life
While in San Francisco, Greene was a leading member of the Olympic Club and the San Francisco Bicycle Club. He was also one of the pioneers in introducing the sports of roller skating and roller polo on the Pacific Coast. In Monterey he was secretary of the old Capitol Club, which later became the Monterey Boat Club, and helped to organize the Monterey Progressive Association.
Greene was married three times, firstly to Arabella (*née* Little) Greene from 1873 until her death in 1895. The couple had a son, William (born 1874) and a daughter, Belle Ursula (born 1876). Greene's second son, Harry Ashland Greene Jr. (1898–1972) was born from his marriage to Oda May Greene which ended in divorce in 1904. His third wife, Isabel (*née* Higgins) Greene, was a Monterey school teacher who had been the Greene children's governess. At his death, Greene was survived by Isabel and the three children from his previous marriages. Isabel lived on in the Greene Mansion until 1945 when she sold it and moved to Redwood City to live with Harry Ashland Greene Jr. and his family.
## InfoBox
| Harry Ashland Greene | |
| --- | --- |
| Portrait of Harry A. Greene c. 1912 | |
| Born | (1852-01-12)January 12, 1852<br>San Francisco, California |
| Died | November 13, 1933(1933-11-13) (aged 81)<br>Monterey, California |
| Resting place | El Encinal Cemetery<br>36°35′43″N 121°53′04″W / 36.59516°N 121.88458°W / 36.59516; -121.88458 |
| Nationality | American |
| Occupation(s) | Stockbroker and philanthropist |
| Relatives | Clay M. Greene (brother) |
|
***Update***
Here's the whole story:
***********
My sites are down, so perhaps I can reach out through reddit:
Dear dude who keeps hacking my sites,
A lot of people would take this opportunity to rant about hackers being dickheads. I'm not going to do that. It's unproductive, and it fails to recognize the contributions hackers and ex-hackers have made to society. I firmly believe that a strong community of hackers is part of citizens' protection from government encroachment on freedom of speech online.
That said, let me tell you why you shouldn't hack my site.
First, the professional. Regardless of what you think of me personally (though I don't know if this is whence the maliciousness), SMBC's success helps a lot of people. I have a part time assistant and a business manager who make an important part of their income off my ad revenue. Whenever you knock down the site (or lessen its traffic by loading trojans), you decrease my income, and thereby decrease my ability to pay for these people.
Additionally, the success of SMBC helps pay for SMBC Theater. SMBC Theater is a project that, on any given weekend, might bring together one or two dozen talented people putting in their spare time for something they love. When you mess with my revenue stream, you also jeopardize that. Again, regardless of how you feel about me or that project, what you're doing poses potential harm to a lot of nice, intelligent, hard working people.
Whenever you knock down my servers, other websites go down as well. This includes Snowflakes, The Weinerworks, and Weinersmith. All of these are sites that I, James, Chris Jones, and Kelly work on without making much of return, and all of them are educational sites. When you down these, the way I see it, it makes the world a teeny tiny little bit worse.
I don't consider myself to have a great amount of influence over the way people behave, but in my short career I have the privilege of helping a lot of young people. I've gotten countless emails from people saying I helped them through depression, inspired them to take on challenges, and encouraged them to stay in difficult academic programs. I don't believe for a second that they did these things BECAUSE of me - nobody does anything hard without putting in the bulk of the effort personally. But, I do believe SMBC provides a helpful service to a lot of good people, and I'm very lucky to be the conduit for that service. When you down my site (or any of the others), this goes away.
I suspect a lot of the above could be said about many websites, and that's sort of my point. I understand hackers who try to get at sensitive information, or who try to harass jerks. I don't understand what the value is in taking down a site like mine, which provides nothing but jokes and information.
Lastly, whenever you hack my site, it causes a lot of anxiety for me, and for everyone who works with me. Right now, because of this latest attack, my brother (who was at work, and who has two lovely kids) had to run home to deal with this problem. In other words - when you attack my site, you're not just attacking some abstract thing on the Internet. You're causing physical distress to a lot of people who don't deserve it.
So please, please just stop.
Thanks,
Zach Weinersmith
tl;dr: When you hack my servers, you distress me and others physically and financially. We're not a black box - we're real people. So we'd all take it very kindly if you'd stop.
PS: Because this is reddit, I want to be clear: I'm not asking for any internet justice. Just sending a message in a bottle, hoping it falls into the right hands.
EDIT: Holy crap! Thanks for all the upvotes and advice. I think we have resolved the problem, and I'll see if I can get Marty (webmaster/brother) to post about it. Thanks nerds!
|
# Raminta Šerkšnytė
**Raminta Šerkšnytė** (born 1975) is a Lithuanian composer, pianist and associate professor of composition. She is a laureate of the Lithuanian National Prize for Culture and Arts (the highest artistic distinction in Lithuania, in 2008), in 2020 she was nominated (shortlisted) for a Gramophone Classical Music Award. Her *De profundis* for string orchestra (1998), composed when she was just twenty-two years of age, is one of the most popular and performed Lithuanian compositions across the world. Maestro Gidon Kremer described *De profundis* as “the calling card of Baltic music”.
## Life and career
Raminta Šerkšnytė's creative output ranges from large-scale opera, orchestral compositions to chamber works and pieces for young audience. Her music is distinguished by its poetic nature, powerful emotional impact and its one-of-a-kind beauty created by Baltic mysticism and melancholy. The search for and coexistence of the archetypes from both Western and Eastern cultures are inherent in her music. She has invented her own composing system and called it the “fusion of major and minor”. Of her craft, she states: “*I believe that peak experience and spiritual impact is the essence in the art*, *which can lead to the unforgettable transcendental experience. Composition is an uplifted state of mind materialized by means of sounds, though its impressiveness depends on the composer’s technical mastery".*
Raminta Šerkšnytė’s music has been performed by the violinists Gidon Kremer, Irvine Arditti, Hugo Ticciati, conductors Mirga Gražinytė-Tyla, Mariss Jansons, Giedrė Šlekytė, the Kremerata Baltica Chamber Orchestra, the New York Philharmonic Orchestra, the Royal Concertgebouw Orchestra, the Bavarian Radio Symphony Orchestra, the Konzerthausorchester Berlin, the City of Birmingham Symphony Orchestra and numerous other musicians. The works have been performed at the Lincoln Center (New York), the Wiener Musikverein, the Concertgebouw (Amsterdam), the Berlin Philharmonic, have been featured at the festivals the ISCM World Music Days, the Gaudeamus Music Week, the Baltic Sea Festival, the Lucerne Festival, etc.
Raminta Šerkšnytė’s music is included in releases by Deutsche Grammophon, Nonesuch, BR-Klassik, Sono Luminus and Music Information Centre Lithuania.
Raminta Šerkšnytė was born in Kaunas, Lithuania, into the family of a mathematician and a doctor. She began to study piano and the music theory from an early age. Later, she studied composition under Prof. Osvaldas Balakauskas at the Lithuanian Academy of Music and Theatre and also in various composers’ masterclasses and workshops abroad. She lives and works in Vilnius, Lithuania.
## Awards
## Works
List of works:
### Orchestra
* *De profundis*, 1998
* *Aisbergas*, 2000
* *Koncertas*, 2002
* *Kalnai migloje*, 2005
* *Mažojo princo pasaka*, 2007
* *Žara*, 2008
* *This too shall pass*, for violin, cello, vibraphone and string orchestra, 2021
### Solo instrument
* *Pasakalija*, 1995
* *Fantazija*, 1997
* *Adagio*, 1999
* *Adieu*, 2002
* *Miražas*, 2003
* *Trys ostinato preliudai*, 2007
### Chamber
* *Styginių kvartetas*, 1994
* *Misterioso*, 1994
* *Trys koncertinės pjesės*, 1995
* *Vizijos*, 1995
* *Žvelgiant į pasąmonę* (Looking at the Subconscious) for flute and viola (1997)
* *Koncertas šešiems*, 1999
* *Basso ostinato*, 2001
* *Rytų elegija*, 2002
* *Idée fixe*, 2002
* *Nuojautos* (Presentiments) for flute, viola and 1~4 prepared pianos (2002)
* *Sūkurys*, 2004
* *Miražai*, 2005
* *Migdolų žydėjimas*, 2006
### Vocal
* *Saula*, 2004
* *Sense Six*, 2004
### Choral
* *Aurei Regina Caeli*, 1996
* *Saulėlydžio ir aušros giesmės*, 2007
* *Sakura*, 2018
### For children
* *Supasi lapai nubudinti*, 1995
* *Andante*, 1997
* *Vakaro atspindžiai*, 1997
* *Mažasis preliudas*, 1998
* *Baladė*, 1998
* *Šaltinėlis*, 1998
* *Dvi invencijos*, 2003
|
Frustrated when your in-car voice recognition system doesn't respond the way you want it to?
Voice recognition in vehicles can get a lot of work done these days. From locating the nearest café, calling mom or writing out a text message that you’re dictating while driving, in-car tech with smart device integration can work as our virtual assistants. But it can get quite frustrating when it's meant to work in a certain way, but doesn't do so perfectly all the time.
Despite the occasional awkward response or failure to understand some accents, voice recognition has made quite a bit of progress, with the recent versions of Apple’s Siri, Amazon’s Alexa and Ford’s SYNC infotainment system showing remarkable improvements.
So, how does our car really decipher the things we say and respond accordingly?
1. It’s not really about the sound. It’s the sound wave when you speak. A sound is created through tiny changes in air pressure, and it enters our ears as one continuous sound wave. But computers aren’t like people, so they need a way to 'hear' the words that are said and turn them into text. So when sounds enter the devices we use, its computer measures that sound wave at one point in time, stores it and measures it again, and does this again and again with each sound.
The result: the sound you made is now digitized for the computer to understand. This is a very precise process and smart devices do make mistakes. If the computer detects a gap in the wave, what gets measured may not be correct.
2. The sound of a word vs. the sound of something else. Once a sound is recorded digitally, the computer figures out what sounds it has to pay attention to, using algorithms. To determine if chunks of digitized sound are actually words, rather than sounds from a car engine or a radio, the computer applies a bunch of mathematical operations to separate what is speech and what isn’t.
3. Same word, different accents. Voice recognition works by breaking up the speech into small segments called phonemes. In English alone, there are about 40 different phonemes. The computer is trained to recognize what each speech segment looks like digitally, but they are not always the same. For instance, sounds vary with different accents, placement in a word and even spellings (i.e. 'to' vs. 'two' vs. 'too'). Based on a dictionary word list and contextual relationships, the computer can make an assumption of what is being said. So, if your friend Mary is in your contact list, the command 'call Mary' is linked to 'Mary' and not 'merry'.
Mark Porter, Supervisor, Asia Pacific Infotainment Systems at Ford Motor Company says, "with enhanced voice recognition, you can talk to SYNC 3 with simple real-world voice commands and the system responds naturally to your voice. It’s even been fine-tuned to deal with the Australian accent, and in China, it can understand a string of Chinese characters written by hand on its graphical interface.”
4. Predicting what the next word in a sentence might be. There can be many different word combinations in a single speech stream simply because there are lots of phonemes that sound similar to one another when said quickly. Sometimes the result can be a wacky sequence of words that don’t really make sense. To avoid this, the computer applies models based on how people actually talk to figure out how likely one word is to follow another.
5. Presenting the best result as quickly as possible. Once all the calculations are done and guesses are made, the computer finally presents its best result, whether on a screen, from a pre-set menu or through a vocal response. The latest voice recognition technology can achieve incredibly fast response times and are more intuitive than ever before. For instance, a user of SYNC 3 can command their car to ‘Tune to <frequency> FM’, while other systems still require you to say ‘Radio’ then points you to another list and prompts you again to say the frequency of the radio station you want to listen to.
With more real-time and accurate technology available, voice activated commands are making our lives better in a myriad of different ways. Although at times it may seem like they are just out to annoy us with bizarre answers, consider the tedious calculations and complex transformations behind-the-scenes to recognize a single word, let alone an entire sentence.
For gadgets to be even remotely able to decipher what we say and then piece together a semi-coherent response is amazing, especially since some humans are still trying to master this skill. Think about it.
Frustrated when your in-car voice recognition system doesn't respond the way you want it to? Frustrated when your in-car voice recognition system doesn't respond the way you want it to? Reviewed by Sanjay Sarma on Thursday, February 23, 2017 Rating: 5
No comments:
Powered by Blogger.
|
Saturday, 17 November 2012
Transclude in AngularJS
Transclude - That's not a word you'll find in a dictionary :). Once you dive into Angular, creating custom directives is a daily chore and having good understanding of transclusion becomes imperative. To explain it in one sentence, transclusion consists of plucking out the content of a custom directive, processing it against right scope and then placing it at a marked position in the template of that directive. While the basic transclude using the built-in ngTransclude directive is easy enough, there isn't much clarity in some areas in terms of documentation or examples. These areas are -
• Purpose and usage of transclude argument that a directive compile function receives.
• Purpose and usage of $transclude injectable in a Controller.
• Isolate scope and transclude.
• Transcluding into an attribute.
I'll try to throw some light on these with the help of working fiddles.
Basic transclude
Let's start with the most basic transclude example. Let's say, we are creating a buttonBar directive that a user can use to add a group of buttons to a page. The directive takes care of alignment of the buttons. Just to note, I have used Twitter Bootstrap as CSS framework.
Here is the fiddle for it.
Take a look at the markup. The buttonBar directive wraps a couple of button elements. The button elements also have a class-based directive "primary" attached to them. Don't worry about it though, it simply attaches appropriate Twitter Bootstrap classes to them. The directive provides transclude: true attribute and it's template uses ng-transclude directive on a contained div. At run-time, Angular gets the content of the custom directive, processes it and sticks the resultant markup in the ng-transclude div in the template. And that's all there to it. Quite simple, isn't it?
Transclude at multiple locations
Lets say we would like to enhance our buttonBar directive to have two kinds of buttons - primary and secondary; with primary buttons right-aligned and secondary left-aligned. It would entail picking up the contents(buttons in our example) of the directive and adding them into two separate divs, one for primary buttons and the other for secondary buttons. Transclude into two different locations, if you will. The result should look something like this -
Well, that's not possible with the default mechanism. One approach to achieve this could be -
1. Allowing the default transclude in an element in the template.
2. Programmatically moving child elements(buttons) to appropriate div.
3. Finally, removing the original transcluded element from DOM in compile or link function of the directive.
Here is a fiddle that demonstrates this approach.
While this approach gives us the intended result, allowing default transclude to happen in an element and then removing it from DOM manually is not really efficient. That's where the transclude argument to compile function and $transclude injectable into Controller come into picture.
Transclude argument to compile function in a directive
The Angular developer guide for directive gives following signature for the compile function of a directive -
function compile(tElement, tAttrs, transclude) { ... }
And here is what it says about the third argument -
transclude - A transclude linking function: function(scope, cloneLinkingFn).
Alright, let's use this function to achieve what we achieved in the last example without the need to transclude into an element and then removing it from DOM.
Here is the fiddle for it.
Please note there is no scope available in compile function and you'll have to pass the element that compile function received as the first argument to the transclude function. You might want to use this approach if you are already using the compile function (which is quite rare, at least for me) and don't need to work with scope. Otherwise, the next approach of injecting $transclude into Controller is the best bet.
Injecting $transclude in a Controller
The Angular developer guide for directive states the following for $transclude injectable for Controller -
$transclude - A transclude linking function pre-bound to the correct transclusion scope: function(cloneLinkingFn).
And here is how we can use it for our buttonBar directive.
Transclude and scope
The Angular developer guide for directive mentions that a directive isolated scope and transclude scope are siblings. Now, what does that mean? If you take a careful look at previous example, you'll notice that parentController creates a scope, the buttonBar directive declares an isolated scope under it and as mentioned in the Angular documentation, transclude creates yet another scope. I have added log statements at appropriate places in the directive to illustrate the relationship between these three scopes. Here is how the output looks like -
You can clearly see the directive isolate scope and transclude scopes are siblings.
Transcluding into an attribute
Well, you can't really do that but achieve something to that effect using the following trick mentioned on stackoverflow.
That covers all I wanted to regarding transclude in AngularJS. Hope this post proves useful to you. Happy ng-ing :).
Update (20th Feb 2013) - scope and transclude argument to compile function
The lack of scope in compile function and the signature of transclude argument to compile function that mentions scope as its first argument leaves a lot of "scope" for confusion :). One thing is certain, there is no scope in compile function. Here it is straight from horse's mouth -
So what's the first argument actually? It turns out it's just the jQuery-wrapped root element of the template for the buttonBar directive. This is how it looks like during debugging -
Note the absence of scope related behavior such as $$watchers or $$listeners on it.
Here is updated version of third fiddle from top with development version of AngularJS instead of minified version. You can put a debug point as shown in the snapshot above and see for yourself. Hope this clarifies it further.
Update (16th March 2013) - All fiddles updated to latest AngularJS release - 1.1.3
In contrast to what I have mentioned in the earlier update and behavior in earlier releases, the transcludeFn passed to compile function now indeed expects scope as first argument in latest AngularJS release (1.0.5/1.1.3). Therefore the call to this function needs to be made from link function that is returned from compile function as it has access to scope. The fiddle for section Transclude argument to compile function in a directive as been modified accordingly.
1. This is one of the harder concepts to wrap my head around in AngularJS (still is) but your article definitely helped in explaining it a lot better than whatever I've read so far.
Look forward to reading more posts related to AngularJS!
1. Thanks Ali. I'm glad it was of some help to you.
2. Hi omka, I had your article in my pocket list since a month but just now I've read it and was really...really helpfull...thanks so I've a little doubt about the compile function...
the compile function receive 3 arguments, the first is tElement is the element in your template (div class="span4...)??...not the elements in the dom no?...
my second question is about the linking the documentation shows than the first arg is the scope ..but you pass as first argument the element again and this confuses me a could explain me a bit more about this piece of code??...
thanks Omkar and have a good day!
1. I'm glad to hear you found it helpful :).
Regarding your questions -
1. Yes, that's right. That's the template element.
2. Very keen observation. Actually, Angular documentation is a bit misleading as far as transcludeFn is concerned. The transcludeFn that is passed to compile function (my 3rd fiddle) and $transclude injection happening in the controller (my 4th fiddle) are two different things. The previous has the signature with element as first argument and clone function as second argument while the later has signature with scope as first optional argument and clone function as second argument. This has been explained on the following thread on StackOverFlow -
2. thanks so much Omkar...that stackoverflow was very insightful..thanks so much and I hope future articles about angularjs :D ...thanks and have a good day...
3. I've been struggling to understand transclude for the past couple of days. You article is the light at the end of the tunnel. Thank you for sharing your knowledge of the subject. Looking forward to read more of your articles.
1. Happy to hear it helped you. My team is developing a huge application based on Angular. Whenever I hit the wall during development, I just dug around a bit and merely sharing my observations on this blog :).
4. In directive, what to use controller for and what to use link function for?
It seems that what I can do in a directive controller, I can do in the link function, and vice versa.
Please give some lighting on this point,
1. It's more of a separation of concerns. Directive controllers are meant to be used to set initial state of your model i.e. scope and provide behaviour, for example, what happens when a button in your view is clicked. But it's not a place to have DOM manipulation code which is required quite often in the directives. link function is the best place to have it.
2. To me, it doesn't make sense that the right place to make DOM manipulation is in the link function. From what I've read DOM manipulation should be done in the compile function. The link function is for binding the scope model data to the DOM ie setting up watches and so on.
Fedirs solution below seems more correct to me.
3. DOM manipulation can safely be done in the compile function or the post link function (the `link` attribute on a directive, the return function of the `compile` attribute or the `post` attribute returned by the compile function). It can also be done in the transclude function during the post link phase. compile will not have scope and post link will have scope.
Non-scope specific DOM manipulation should be in the compile function and scope specific (event handling or transclusion - which deals with the actual compiled clone).
4. Thanks for clearing that out!
5. Thank you for sharing you have learned, Omkar. This article is a great complementary material to the Angularjs official documentation on the topic of Transclude. It has answered most of my confusion/questions about the topic.
There's one part that I wish you could elaborate on, though. You mentioned there's no scope available in compile function and we should pass the element or the first argument of compile function to the transclude function. But according to the signature of the transclude function, function(scope, cloneLinkingFn), it expects scope as its first argument. This is confusing me a bit.
1. I'm glad to know it was helpful to you.
I have added an update section to the bottom of the post with additional information regarding transclude argument to the compile functon. Hope it clarifies your doubts.
6. Hi, how do I attach directive during 'transclusion'? E.g.
controller: function($attrs, $scope, $element, $transclude) {
return $transclude(function(clone) {
var input = clone.filter(':input');
input.attr('ng-model', 'foo');
return $element.append(clone);
Will result in --input ng-model='bar'-- but bar is not created in the scope. Anyway great blog, your content should be put in the official AngularJS website!
1. For dynamically adding directives through another directive, you'll have to inject $compile service into that directive and compile the content. This thread on AngularJS mailing list might be helpful to you - Dynamically adding a directive from within a custom directive
I'm glad to know you found the blog useful. Regarding putting this content in official AngularJS documentation, I won't mind if they do :).
7. Omkar, your example code for "Injecting $transclude in a Controller" breaks with the latest AngularJS (1.0.5/1.1.3). I switched back to 1.1.0 and the code just ran fine.
I stepped through the code and found that the content of the "clone" argument differs in the latest AngularJS. More specifically, clone.scope gave me "undefined".
Please take a look and perhaps add an update to your helpful article. Thanks.
1. Thanks for letting me know and the helpful debugging pointer. I have updated all fiddles and tweaked them to work with latest AngularJS(1.1.3) release.
8. This article I was waiting for. My initial idea was to take a look in the angular source on the ng-repeat. But this docs seems to make my day! The official docs realy sucs...
9. very helpfull, thanks
1. I'm glad it was useful to you.
10. Thanks for this! very Helpful! You should add this post to the Angular docs...
1. I'm glad you found it helpful :)
11. Very helpful article, thanks. It clears up many things about transclusion for me.
I sped some time playing with transclude and I've found very interesting thing - you can pass promise instead of scope in the compile function. IMO using transcludeFn in compile function is more efficient than in controller because it takes place 1 time per directive founded in a view(only one 1 time before first render of directive instance, of course I meant using transcludeFn not in link function but before), in case of controllers it is executed before each directive instance initialization(I mean the same directive, re-initialization can take place when using tabs/switch or any routing with view change).
Code looks like:
testapp.directive('buttonBar', ['$q', function($q) {
return {
restrict: 'EA',
template: '<div class="span4 well clearfix"><div class="primary-block pull-right"></div><div class="secondary-block"></div></div>',
replace: true,
transclude: true,
compile: function(elem, attrs, transcludeFn) {
var scopeResolver = $q.defer();
// using transcludeFn with promise before link
transcludeFn(scopeResolver.promise, function(clone) {
var primaryBlock = elem.find('div.primary-block');
var secondaryBlock = elem.find('div.secondary-block');
var transcludedButtons = clone.filter(':button');
angular.forEach(transcludedButtons, function(e) {
if (angular.element(e).hasClass('primary')) {
} else if (angular.element(e).hasClass('secondary')) {
// returning link function
return function (scope, element, attrs) {
12. Thanks for the detailed explanation. Now all that's left is practice :)
13. Thanks man, great job
some useful comments, too
14. This is some high quality writing - takes the edge off a very complex topic
15. You used "it's" incorrectly. I don't know if it's just me, but I find that incredibly distracting. Its proper usage is described here:
1. Thanks for the link. I'm not a native English speaker so please excuse my lack of knowledge in certain areas. Your link will help me improve :).
16. Thanks a million! That really helped.
What would have made it much easier for me to understand:
The $transclude(scope, cloneLinkingFn) function is used to add a copy of the transcluded DOM to the document.
When it is called, angular creates clones of the transcluded elements, assigns them to the given "scope" and calls the "clone LinkingFn" with the cloned elements.
That "cloneLinkingFn" function should add the clone to the document at a place it can determine at runtime.
What you could also mention is that using the $transclude passed into the link function is also an option (as done in ngRepeat).
1. I'm glad you found it helpful and thanks for your insightful observations. I'm sure your observations would provide more clarity for other readers.
17. Very good example and walk through - this made transclude much easier to understand - and I'm glad you show multiple, as that was my very next question!
|
Generic Viagra (sildenafil citrate) is a licensed medication
Viagra may affect the way other medicines work, and other medicines may affect the way Viagra works causing side effects. Especially tell your healthcare provider if
you take any of the following:
medicines called nitrates (see “What is the most important information I should know about Buy Viagra Online?”)
medicines called guanylate cyclase stimulators, such as riociguat (Adempas)
medicines called HIV protease inhibitors, such as ritonavir (Norvir), indinavir sulfate (Crixivan), saquinavir (Fortovase or Invirase) or atazanavir sulfate (Reyataz)
some types of oral antifungal medicines, such as ketoconazole (Nizoral), and itraconazole (Sporanox) some types of antibiotics, such as clarithromycin (Biaxin),
telithromycin (Ketek), or erythromycin, other medicines that treat high blood pressure,other medicines or treatments for ED.
hypertension (PAH). Viagra should not be used with REVATIO or with other PAH treatments containing sildenafil or any other PDE5 inhibitors (such as Adcirca
Ask your healthcare provider or pharmacist for a list of these medicines, if you are not sure. Viagra is used to treat erectile dysfunction, more commonly known as
impotence, in men. This is when a man cannot get, or keep, a hard erect penis suitable for sexual activity. Viagra will work only if you are sexually excited.
Effects of Viagra on Blood Pressure When Nitroglycerin is Subsequently Administered
Effects of Viagra on Blood Pressure When Co-administered with Alpha-Blockers: Three double-blind, placebo-controlled, randomized, two-way crossover studies were
conducted to assess the interaction of Viagra with doxazosin, an alpha-adrenergic blocking agent.genericviagraonline
Effects of Viagra on Blood Pressure When Nitroglycerin is Subsequently Administered: Based on the pharmacokinetic profile of a single 100 mg oral dose given to healthy
normal volunteers, the plasma levels of sildenafil at 24 hours post dose are approximately 2 ng/mL (compared to peak plasma levels of approximately 440 ng/mL). In the
administered at this time point [see Contraindications (4.1)].
In the first study, a single oral dose of Cheap Viagra 100 mg or matching placebo was administered in a 2-period crossover design to 4 generally healthy males with benign
prostatic hyperplasia (BPH). Following at least 14 consecutive daily doses of doxazosin, Viagra 100 mg or matching placebo was administered simultaneously with
doxazosin. Following a review of the data from these first 4 subjects (details provided below), the Viagra dose was reduced to 25 mg. viagrasideeffectsThereafter, 17 subjects were
treated with Viagra 25 mg or matching placebo in combination with doxazosin 4 mg (15 subjects) or doxazosin 8 mg (2 subjects). The mean subject age was 66.5 years.
For the 17 subjects who received Viagra for sale about 25 mg and matching placebo, the placebo-subtracted mean maximum decreases from baseline (95% CI) in systolic blood pressure
The mean profiles of the change from baseline in standing systolic blood pressure in subjects treated with doxazosin in combination with 25 mg Viagra or matching
placebo are shown in Figure 2.
Seven Ways Of Preventing Erectile Dysfunction
Pollution in today’s time is one of the most common reasons for skin diseases and infection. Acne which is commonly known as pimples and rosacea which is marked by redness of cheeks are the common skin problems. The solution most commonly used to treat such skin conditions is Finacea gel. It contains Azelaic acid as the active ingredient which is also Finacea gel generic.
Perfect with any outfit, this laid back look is an excellent summer time hairstyle for wavy hair. This style can be created right at home, and should only be attempted by those with hair that reaches at least the shoulders. Begin by applying a wave defining gel to wet hair (try Mark’s Curl Goddess and Wave Defining Gel with Conditioning Sunflower, available online at Avon). Blow dry hair on lowest setting, gently scrunching roots and midsection as hair dries. Once hair is thoroughly dried, remove two small and even sections from the front of the hair. Tightly braid each of these sections. Pull braids back behind the head and just below the crown, and hold into place with a decorative clip, barrette, or bobby pins.
The simple solution is to protect the device with a screen protector and encase it within a strong and sturdy case. These two actions alone will greatly improve the survivability of the iPad. Purchasing a screen protector and a case should cost no more than $100 – make sure you do not cheap cialis products or you run the risk that the iPad will still get damaged.
How do you know that somebody has this? The more obvious observation can be through the means they snore. You may hear additional of a grunt than a snore truly as a result of the person is gasping for air that’s why they’re creating such noise. The blockage is there as long as you are still laid low with the disorder. This is often why there will be a relentless cycle of sleeping then waking up throughout the night.
There is humor in ED. cialis for daily use affects millions of men over the age of forty in the United States. I know, it’s not funny if you have ED. You remember back in your teens and twenties, you thought you were it. You were the man. Nothing could stop you. You would never die. Than you woke up out of your dreams and suddenly you were forty years old. Men you know in their teens and twenties are now calling you old. You are no longer the man. You are getting closer to death every day. Parts of your body are not working like they used to.
Shopping for medicines from a online drugstore is as convenient as buying any other product online. To start off, go to Google or any other search engine and search for online Canadian pharmacies. Pick up a few from the search result and choose one Canada pharmacy for buying your medicines.
If you have a prom night and running out of dresses, then also the online stores are there for your help. You need not to hop from one shop to another to buy a trendy prom dresses.
Around one-third of those with the disease don’t know that they have it. If people find these symptoms of type 2 diabetes familiar, they should schedule an appointment with their healthcare professional.
My Encounter With Menozac – Go Through Just Before You Buy Menozac
The alteration of situation from flat to upright causes a sort of "disarrangement" in the entire body. The subject is that the alteration of the placement leads to the organism to speedily reallocate bloodstream to the locomotor apparatus. For it to come about far more efficiently, we have a specific reaction – we stretch ourselves. But internals also require the blood. And they can not extend themselves. Their musculature doesn’t produce to the brain at all.
As we know, when you enter an optical store, there’s men and women advocate many branded lenses to you these kinds of as Zeiss, Nikon, and Essillor. They are not bad but priced too large while that on-line are a lot cheaper. Nevertheless, many lenses company do not permit them to be bought on the web, so it is sensible that some on-line optical stores notify you they can not send out you lenses with unique bundle. Therefore you may possibly fear about the good quality of your lenses. Even so, deciding on a respected online optical shop can expel your uncertainties.
So how do folks generally offer with anxiety? Most men and women vacation resort to coffee, energy drinks, and online prescription drugs. Our life have turn into so challenging and busy. Technology that is supposed to make items less complicated for us has truly pressured us to work harder and for a longer time, escalating pressure.
Impulse Purchases – There is a purpose people counters up coming to the examine stand are named impulse counters as well as a purpose shops like you to hold out in line for a specified size of time. Due to the fact your possibilities of producing an impulse buy goes up. But this is not the only location in the keep exactly where you may possibly acquire some thing on impulse. If you arrive across an item that you "think" you need, put it down and give your self 20-4 several hours to consider it alternatively of suffering by way of consumer’s regret later on cialis prescription prices .
Cats enjoy assortment so switch up their foods. Studies show cats do much better on canned food. Feed your cat primarily canned meals and a small dry meals which will keep your cat from attaining bodyweight and let it to stay more active.
It actually brought revolution. Folks became fan of the efficiency it brought in its customers. But following that the where buy cialis was released and the market reaction was actually excellent. The effect of the branded sexual medication was actually fantastic and much more than men and women envisioned.
The household is absolutely everyone’s strength. Occasionally we could want to give our family members a deal with, get Christmas provides or shock gifts. You can count on a payday loan company if you are sure you can’t manage the payments.
All males making use of Cialis on the web view prettiness in their specific way, or as the saying operates "no accounting for tastes." In the meantime, there’re frequent regularities. Experts argue that all the favours and sights regarding loveliness are grounded on the physiological desires and instincts.
|
Lesson 10: King Benjamin Teaches His People
Primary 4: Book of Mormon, (1997), 32–34
To strengthen the children’s commitment to keep their baptismal covenants and follow Jesus Christ.
1. 1.
Prayerfully study 2 Nephi 31:5–12 and Mosiah 2:1–22; 3:2–19; 4:11–16; 5:5–8, 13–15. Then study the lesson and decide how you want to teach the children the scripture account. (See “Preparing Your Lessons,”> p. vi, and “Teaching from the Scriptures,” p. vii.)
2. 2.
3. 3.
Materials needed:
1. a.
A Book of Mormon for each child.
2. b.
Picture 4-21, King Benjamin Addresses His People (Gospel Art Picture Kit 307; 62298).
Suggested Lesson Development
Invite a child to give the opening prayer.
Attention Activity
Write the family names of the children in your class on the chalkboard. Ask the children to explain why they have these names.
• What does being a (use family name) mean to you?
Explain that when we are born into a family, we take upon ourselves a family name. This name may represent many important things, such as our heritage, our beliefs, the way we do things, and so on. When we are baptized, we become members of The Church of Jesus Christ of Latter-day Saints and take upon ourselves the name of Jesus Christ. When we take the name of Jesus Christ upon us, we are declaring our belief in him and our willingness to follow his teachings. Explain that King Benjamin was a prophet who taught the importance of taking upon ourselves the name of Jesus Christ.
Scripture Account
Teach the children the account of King Benjamin teaching his people from Mosiah 2:1–22; 3:2–19; 4:11–16; 5:5–8, 13–16. Use the picture at an appropriate time. (For suggested ways to teach the scripture account, see “Teaching from the Scriptures,” p. vii.)
Discussion and Application Questions
• Why did King Benjamin call his people together? (Mosiah 1:10.) How did the people of Zarahemla respond to the call to gather at the temple to hear their prophet and king? (Mosiah 2:1–6.) How do we hear or receive the words of the living prophets? (General conference, Church publications, Church meetings, and so on.) How can we prepare ourselves to listen to the words of our leaders? (Mosiah 2:9.)
• How did King Benjamin serve his people? (Mosiah 2:12–15.) How did King Benjamin say we can serve Heavenly Father? (Mosiah 2:16–19.) How do you think serving others shows our gratitude and love for Heavenly Father?
• What are we promised if we obey Heavenly Father’s commandments? (Mosiah 2:22.)
• What did King Benjamin teach the people about Jesus Christ? (Mosiah 3:5–7, 9–10.) What great act of service did Christ perform for each of us? (Mosiah 3:11–13.) Explain that Jesus Christ suffered and died that we might repent of our sins, be baptized, be resurrected, and live with Heavenly Father forever. His sacrifice for us is called the Atonement.
• Why is it important for us to take upon ourselves the name of Jesus Christ? (Mosiah 3:17.) What does Jesus Christ ask us to do in order to take upon ourselves his name? (2 Nephi 31:5–12; Mosiah 2:22. Be baptized and keep the commandments. Mosiah 3:19. Submit our will to the Savior’s will.)
• What commandments did King Benjamin tell his people they should obey? (Mosiah 3:21; 4:11–15; 5:5. You might use the wordstrips in enrichment activity 1 as part of your discussion.) What did King Benjamin say would happen if we keep the commandments? (Mosiah 2:41.)
• How did the people respond to King Benjamin’s teachings? (Mosiah 5:2.) What can we do to experience this mighty change? (Mosiah 3:19.)
• What did King Benjamin’s people covenant to do? (Mosiah 5:5–9.)
Enrichment Activities
1. 1.
Make and display the following wordstrips. Draw a representation of the tower that King Benjamin used to teach his people. Mount the wordstrips on the drawing as you discuss ways we can take upon ourselves the name of Jesus Christ. Have the children think of ways they can obey the commandments represented on the wordstrips.
Have faith in Jesus Christ (Mosiah 3:21)
Repent (Mosiah 3:21)
Make and keep baptismal covenants (Mosiah 5:5)
Pray daily (Mosiah 4:11)
Be kind to others (Mosiah 4:13)
Don’t fight or quarrel (Mosiah 4:14)
Serve others (Mosiah 4:15)
Help the poor (Mosiah 4:16)
Live the gospel (Mosiah 4:15)
2. 2.
Using simple costumes or props, dramatize King Benjamin’s speaking to his people. The children could arrange their chairs in the outline of a tent with an opening toward the front of the room. The children could sit on the floor inside the “tent” facing the front. The person acting out the part of King Benjamin could speak to them while standing on a chair at the front of the room. Have this child read King Benjamin’s words from Mosiah 2:9.
3. 3.
Tell the children about the latest general conference of the Church. If possible, show them a copy of the conference issue of the Ensign or international magazine. Compare this conference to the meeting King Benjamin held with his people. Explain how the Church helps all its members receive messages from the President of the Church and other General Authorities through radio, television, and satellite broadcasts and through printed materials. Discuss some of the topics from the last conference. Encourage the children to read or listen to the messages from the next general conference and follow the counsel of our prophets and leaders.
4. 4.
Help the children understand and memorize the last phrase of Mosiah 2:17: “When ye are in the service of your fellow beings ye are only in the service of your God.”
5. 5.
Discuss how the thirteenth article of faith relates to King Benjamin’s address. Help the children memorize this article of faith.
6. 6.
Sing or read the words to “Love One Another” (Hymns, no. 308; or Children’s Songbook, p. 136) or “I’m Trying to Be like Jesus” (Children’s Songbook, p. 78).
Bear testimony of the atonement of Jesus Christ and how it blesses our lives. Emphasize the importance of keeping the commandments as we take upon ourselves the name of Jesus Christ.
Suggested Family Sharing
Suggested Home Reading
Suggest that the children study Mosiah 2:1–18 at home as a review of this lesson.
Invite a child to say the closing prayer.
|
Posted in | Nanoenergy
Argonne Researchers Exploring New Solar Technologies as Part of Energy Initiative
Published on February 22, 2010 at 6:00 PM
Spurred by global development and population growth, the world's energy needs are expected to double by 2050. The best solution to meet this coming demand is an energy mix that includes generous amounts of renewable energy sources such as solar, wind and biofuels, as well as nuclear energy and fossil fuels.
Of the many options, the sun represents the most abundant renewable energy source. Its rays have a potential supply that dwarfs the global demand for energy today and for the foreseeable future. However, the costs of converting sunlight to usable electricity, heat or fuel must be radically reduced to realize this potential. And that can only be accomplished through the development of technologies that are low-cost, highly scalable and based on plentiful source materials.
Dozens of researchers at the U.S. Department of Energy's (DOE) Argonne National Laboratory are exploring new solar technologies as part of its Alternative Energy & Efficiency Initiative. The initiative aims to achieve revolutionary advances toward the large-scale use of solar energy by merging basic and applied research that is supported by collaborations with industry and other research organizations.
Argonne's solar energy research covers four specific areas: next-generation photovoltaic technologies such as organic, hybrid and dye-sensitized solar cells; transparent conductors deposited on 3-D photovoltaics; concentrating sunlight; and systems analysis.
Current photovoltaic technologies perform well, but their costs are too high to compete directly with fossil fuels. Without significant government subsidies, incremental improvements to these technologies will not lower costs enough to achieve grid parity, where the costs are equal to or lower than burning coal, for example.
Next-generation technologies with potential for very low-cost production are needed. Organic, hybrid and dye-sensitized solar cells are among the most promising of these low-cost options. Basic science is needed to design, synthesize and understand these materials, and applied science to optimize performance and scale up the fabrication of devices based on these materials. Furthermore, systems analysis will provide insight into how the complex interplay of issues such as variability of sunshine, geographic and resource factors, regulation and economics will impact the market penetration of these technologies.
Light must enter into one side of a solar cell, and that side also has to serve as an electrode for the device to function—so transparent conductors are a crucial component of virtually all solar cells. Indium tin oxide is the workhorse of transparent conductors in today's devices. But the world's indium supply is limited, so alternatives are needed to reduce the amount required or eliminate it altogether. Argonne has a team of experts in a technique called atomic layer deposition (ALD) that can prepare extremely thin layers of transparent conductors.
ALD also provides perfectly conformal coverage, even on highly three-dimensional materials such as those required for dye-sensitized solar cells. Using ALD to deposit indium tin oxide will enhance performance and reduce the cost of next-generation photovoltaics. Extending this technique to alternative, earth-abundant transparent conductors will ultimately bring us closer to fabricating efficient solar energy devices on a massive scale.
Sunlight is bountiful but diffuse. Another route to lowering the cost of capturing solar energy is to use inexpensive materials to collect sunlight from a large area. This light is directed either to a small, high-performance solar cell or to a fluid that transfers the thermal energy to steam turbines that generate electricity. Argonne has a program developing luminescent solar concentrators for the first approach that will function in a broad variety of climates and another program studying advanced heat transfer fluids for the second, which performs best in regions with abundant sunshine. Because numerous factors could influence the commercial viability of these technologies, systems analysis will provide essential direction regarding device targets and appropriate markets.
Argonne is also exploring in detail the environmental impact of shifting to new solar energy technologies on a large-scale and examining how consumers will respond to these technologies.
Photovoltaics and concentrated solar power hold the promise of ushering in a new energy economy for the electricity grid. Looking forward even further, turning sunlight into chemical fuels is an exciting route to replacing fossil fuels in the transportation sector; the laboratory is laying the groundwork to tackle this goal, too.
Argonne's integrated approach to solar energy research represents a new way of addressing the challenges associated with shifting global energy generation away from fossil fuels to provide a clean, secure and virtually limitless supply of energy in the future.
Tell Us What You Think
Leave your feedback
|
Hi everyone. Long time lurker, first time builder. I am building a machine that will be used for gaming and programming. I plan on playing blockbuster titles at the highest settings I can. For the PC itself I would like to keep the costs around $1750. I have done some research and believe that all the parts I have chosen are compatible and reliable. I do have a few questions.
Motherboard:
Are there any other motherboards in this price range that I should be considering. What will be the advantages/disadvantages of these other boards?
PSU:
I have already purchased this PSU as I got it on sale. I am wondering if it will be sufficient for the gtx680, an overclock of the CPU to about 4-4.5GHz (if I can get there), a media card reader, and another HDD in the future.
Also if anyone knows of an optical drive and media card reader that will look good with the 600t I am open for suggestions. I just need to be able to play and rip DVDs.
Lastly I am looking for a monitor. I am thinking 21" to 24" with a resolution of 1900x1200. Does anyone have any good recommendations? I am not too familiar with prices but something that is good for gaming (maybe less than $500).
Anything I am overlooking? Thank you for taking the time to look at my build. Hopefully I can order the remaining parts this week.
Part list permalink]( / [Part price breakdown by merchant
Type|Item|Price
:----|:----|:----
**CPU** | Intel Core i5-2500K 3.3GHz Quad-Core Processor | $200 @ NCIX
**CPU Cooler** | Noctua NH-D14 65.0 CFM CPU Cooler | $85 @ NCIX
**Motherboard** | Asus P8Z68-V PRO/GEN3 ATX LGA1155 Motherboard | $195 @ Newegg
**Memory** | Corsair Vengeance 8GB (2 x 4GB) DDR3-1600 Memory | $55 @ Newegg
**Hard Drive** | Western Digital Caviar Black 1TB 3.5" 7200RPM Internal Hard Drive | $136 @ Amazon
**Hard Drive** | Crucial M4 128GB 2.5" Solid State Disk | $150 @ Newegg, Already Owned
**Video Card** | EVGA GeForce GTX 680 2GB Video Card | $510 @ Newegg
**Case** | Corsair 600T White Graphite ATX Mid Tower Case | $132 w/ MIR @ Newegg, Already Owned
**Power Supply** | SeaSonic 650W ATX12V / EPS12V Power Supply | $100 @ Newegg, Already Owned
**Operating System** | Microsoft Windows 7 Home Premium SP1 (64-bit) | $100 @ Newegg
**Keyboard** | Das Keyboard Professional Silent | $135 @ Amazon
**Mouse** | Logitech G400 Wired Optical Mouse | $35 @ Amazon, Already Owned
| | **Total**
| Prices include shipping and discounts when available. |
| | Core ~ $1663
| | Peripherals ~ $170
| | Total ~ $1833
| Generated 2012-03-26 14:34 EDT-0400 |
|
The Man-Midwife in the 18th Century
Lying-in lasted a month post-childbirth and was devoted to the mother’s recuperation, during which she remained enclosed in her birthing chamber which ended with ‘churching’. The ritual of churching was a blessing from the local cleric, usually during Mass, where thanks were offered for the safe delivery of the mother and/or child, after which a woman was purified and could enter into ‘normal’ life again.
The man-midwife, or accoucheur, was a fashionable, yet controversial figure, who entered into the realms of the cloistered pregnant female. For this, he was derided in public as his role subverted social mores. The practice was denounced in texts, such as The Danger and Immodesty of the Present General Custom of Unnecessarily Employing Men-Midwives, published anonymously, in 1772. The perceived ambiguous gender of the man-midwife was mocked in Isaac Cruikshank’s pamphlet, in 1793. The changing cultural paradigm prompted polarised discourse, with those against calling the practice unnatural, and those for the practice, denigrating female midwives’ professionalism and intelligence.
Caricature of a man-midwife as a split figure. Wellcome Images no.L0018481
The Chamberlen family became the most prominent of the male practitioners of midwifery, with at least nine male members practising in England and Ireland. They tried and failed, to initiate an ‘incorporation of London midwives’ in 1617 and again in 1634. The Chamberlens were central to the invention of forceps, a tong-like instrument, designed to clasp the baby’s head inside the birth canal for extraction during obstructed labours. They kept their use of forceps a secret for around a century.
William Smellie-type obstetrical forceps, United Kingdom, 1740-1760 (Wellcome Collection)
Hugh Chamberlen, as well as being a physician, was also a speculative businessman, and when his proposed business dealings failed, his creditors forced him to flee abroad. With his credibility damaged, he was lampooned in verse in 1699 in Hue and Cry After a Man-Midwife, Who has Lately Deliver’d the Land-Bank of their Money. It was noted that ‘great belly’d ladies have mighty respect for’ the man-midwife, demonstrating that the fashion for men-midwives commenced in the seventeenth century and was not just an eighteenth century phenomenon. The verse also alluded to the outrage that was displayed in some quarters by opponents of men-midwives, ‘Among his profession he’s fam’d as a topper, By some call’d a midwife, by others a groper,’ hinting at sexual improprieties that the man-midwife could commit once alone with vulnerable females.
Public suspicion of the medical profession ran deep in the eighteenth century, in part due to the non-secular society believing that decaying bodies tainted the men who practiced medicine, but also, medicine was considered the least prestigious of the professions and the physicians’ failure to cure illness and stave off death impacted the public’s perception of them. The man-midwifery profession was further disparaged after several eminent London men-midwives supported Mary Tofts, who in the 1720s claimed to have given birth to a litter of rabbits. The absurdity of their support of Tofts in her fraudulent claim led to professional ridicule. Not only were the men of the medical profession considered asinine for agreeing with Tofts’ wild claims, there was a growing suspicion of the practitioner as a ‘corrupter of morals, a threat to female modesty and even as a libertine.’
Some historians argue that while a small number of men practised midwifery in the seventeenth century, women still held the majority of rule inside the lying-in chamber and that man-midwifery was highly unusual and indeed, ‘exceptional’. Many medical men who practised midwifery in conjunction with other duties used the title ‘surgeon’ and this probably obscured their obstetric practices to a large extent. Indeed, it is apparent that the majority of seventeenth- and early eighteenth century practitioners were surgeons who were called to emergencies to perform surgeon-midwife duties. By the middle of the eighteenth century specifically trained men-midwives were performing the duties previously only practised by female midwives. The majority of accounts in diaries and notebooks refer to the surgeon’s presence alongside and adjunct to the traditional midwife, once it was considered necessary to engage a surgeon due to the perceived imminent death of the mother. The conscious switch from emergency surgeon to pre-booked man-midwife happened around 1750. It is also argued that the changes in midwifery in eighteenth century England was almost unique in Europe, as other countries did not see men entering the birthing chamber until around 1800 unless they were needed to assist with a difficult birth.
In the polemic treatise The Danger and Immodesty of the Present General Custom of Unnecessarily Employing Men-Midwives, the anonymous author berated both husbands and wives for their choice of men-midwives and argued that this would pollute ‘the minds of the wives and render them easy prey to seduction.’ Doctors were associated with carnal knowledge and from the Restoration the sexual ambiguity of the practice of medicine was highlighted in public discourse with bawdy prints, poems and tales increasingly presenting medical practices as euphemisms for sexual activity, or as masks for lechery. Physicians, courtesy of their medical practice, could dissolve the taboos of normal social intercourse and this left medical men exposed to accusations of impropriety and immorality. However, physicians were more likely to examine patients by ocular inspection, as opposed to physical contact, which explains why some members of the public protested against men-midwives and their perceived groping of women when they bypassed social boundaries and touched their patients.
The perception of the man-midwife inveigling his way into the domestic sphere was paramount in the objections of many male protesters, as they saw man-midwifery as an attack on husbands’ masculinity. They denounced men-midwives’ duties as ‘infringing on the husband’, for the man-midwife touched women intimately. The same objector implored ‘duchesses and countesses etc.’ to ‘show some sense of modesty’ as women of inferior birth were ‘being debauched’ by their bad examples. Deflecting claims of impropriety, some men-midwives worked blind, practising under bed sheets, tied bib-like around their necks, to obscure women’s genitalia and preserve their modesty. However, it could be argued that this practice led to serious errors in the lying-in chamber.
Misogynistic treatises continued to besmirch traditional midwifery and author man-midwife Fielding Ould, in 1742, argued that as ‘more learning and dexterity’ was necessary in midwifery practice, ignorant women ‘with their meanest education’ could not be expected to participate. These were countered by protestations against the practice of men-midwives, as this subverted nature’s rules. Nevertheless, the polemical treatises against man-midwifery failed to counter the growth in popularity of the man-midwife. Favourable publicity through printed obstetric treatises by male authors, who denigrated the traditional female midwife and promoted the ‘new’ science of midwifery, word of mouth engagements through masculine meeting places such as coffee houses and judicious advertising, all conspicuously promoted men-midwives’ practices. Some men-midwives lucratively colluded in supposedly secret births, which resulted from the elites’ extra-marital affairs. This highlighted the perception of their lack of sexual morals, leading to prurient gossip with the potential to damage their reputations, but ultimately failed to stop their practices.
To assume the wife was under the sexual threat or thrall of the man-midwife, not only disparaged the man-midwife’s personal morals but also promoted the assumption that the wife was weak and sexually incontinent, which can undoubtedly be seen as a continuation of a centuries-old attack on the wife’s gender. The man-midwife crossed the boundaries of the lying-in chamber and the suggestion that through his practice he committed adultery with the pregnant mother is illuminated in the light of eighteenth century moral codes, as a woman touched by a man other than her husband was perceived as scandalous. Indeed, whilst the true numbers of illicit relationships in the eighteenth century will remain hidden, only one case of a doctor seducing a patient hit the headlines.
Midwifery in the eighteenth century witnessed the rise in men-midwives as fashion dictated male attendants for the wealthy and aristocratic parturient women, deposing the hegemonic female midwife and labelling her ill-educated. Men-midwives were accused of impropriety and salacious behaviour, inducing innocent women into scandalous immodesty which devalued their marriage vows. However, complaints made against men-midwives’ practice failed to dent their popularity and they continued to encroach on the traditional female midwives’ duties. Largely as fashion dictated for those higher in social standing that the services of such men should be employed. Disregarding contemporary social standards and using the services of a cheaper female midwife could demonstrate the husband’s perceived lack of solvency, further undermining his masculinity. The husband, it would seem, was in a no-win situation, unless he was, of course, a man-midwife.
Suggested Reading
Adrian Wilson, The Making of Man-Midwifery: Childbirth in England, 1660-1770 (London: UCL Press, 1995)
Walter Radcliffe, Milestones in Midwifery; And, The Secret Instrument (The Birth of the Midwifery Forceps (San Francisco: Norman Publishing, 1989)
Edward Ward, Hue and Cry After a Man-Midwife, Who has Lately Deliver’d the Land-Bank of their Money (1699)
Roy Porter, ‘A touch of Danger: The Man-Midwife as Sexual Predator’ in Rousseau, G.S. and Roy Porter (Eds.), Sexual Underworlds of the Enlightenment (Manchester: Manchester University Press, 1987)
Anonymous, The Danger and Immodesty of the Present General Custom of Unnecessarily Employing Men-Midwives, (London: J. Wilkie, 1772)
Jean Donnison, Jean, Midwives and Medical Men: A History of the Struggle for the Control of Childbirth, 2nd Edition (London: Historical Publications Ltd, 1988) pp. 24, 101
Fielding Ould, A Treatise of Midwifery in Three Parts (Dublin: Oli Nelson, 1742)
Elizabeth Nihell, A Treatise on the Art of Midwifery (London: A. Morley, 1760)
13 thoughts on “The Man-Midwife in the 18th Century
1. Super interesting! I had never thought about male mid-wife. It’s interesting what a double-edged sword it was in the end. You couldn’t win with a male or female mid-wife. I feel like that’s similar to some issues we have today with more women entering the workplace. Women who leave the home are considered selfish for leaving their families, and women who chose to be stay-at-home moms are not as accomplished as those who do. Interesting how society is never happy.
Liked by 1 person
Liked by 1 person
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
This is a fragment of something I'm undecided about writing. I'd appreciate feedback on anything: writing style, characters or (I fear this is the worst aspect) plot. I should make it clear that the plot is unfinished, whereas the writing is about my best. That is, if you can't judge the plot from what's here, feel free to pummel the writing.
Clyde Forres was the junior partner in the Oxford branch of Forres Investigation Ltd. He was the nephew of the senior partner, Friedrich Forres, who was also the owner. Friedrich held several titles: as the Oxford branch was the only branch, Friedrich was branch manager, regional director, chairman and CEO. The particulars of his position varied hourly, although Clyde’s title was fixed. Clyde resented this but recognised its accuracy. Clyde was 20, and Friedrich was 20 years older—so Clyde *was* the junior partner. It was a humble existence.
Some people despise their jobs—people like Clyde, who was effectively a serf. Others, like Friedrich, are apathetic. He didn’t care, because his nephew was responsible for the business’s daily trivia. Friedrich saw to the bigger picture, the *philosophy* behind detective work. Clyde could see to the irksome details while Friedrich supervised, and Friedrich was certain of this arrangement’s longevity, as his nephew had incurred great debts while at university. If he was to become solvent, he needed his uncle’s money.
Business was rare at Forres Investigation, especially during its office hours. It startled Clyde to find a well-dressed man of about 40 folding his umbrella in their hallway. The well-dressed man, whose suit made the hallway seem even shabbier, rushed into a handshake.
“Good afternoon. I’m Paul Davis—are you the detective?”
Clyde hesitated then said, “Yes.”
Before he could elaborate, the office door jerked open, and Friedrich staggered into the (now crowded) hallway. He deflected his nephew with his protuberant gut and exclaimed, “Nonsense! *I* am the detective, and this is my junior nephew.” He stopped and blew into his hand, then sniffed that hand. He wrinkled his nose against the alcoholic stench and continued, “This is my junior partner, I mean to say. And what is your problem, Mr. Davinds?”
Paul Davis looked dubiously towards the office.
“Can‘t go in there!” exclaimed Friedrich. “Refurbishment. Painting, er, woodwork and such. Health and safety. We‘d best talk out here.”
The deception was unnecessary because anybody could smell Friedrich’s breath. The empty bottles might have made it more reputable, if they could show that he hadn’t been drinking diesel.
So Paul Davis sighed, and began to explain.
“I have a missing piano…”
|
I thought I'd start off with a Tip. Feel free to add your own Tips anytime to help out your fellow Korean-learning Redditors.
**당신:**
1) "당신" can be used by one spouse to another, formally. Often instead of "당신," nicknames are used, the same way we might use affectionate names between couples in English; first names are also commonly used between couples. (Or for a more direct approach to saying "you" informally, although usually not rude between couples, 너 may also be used.)
2) "당신" can be used to refer to "you" when not specifically referring to anyone; an example would be if you saw a self-motivation sign that said "You're special." ("당신은 특별한 사람입니다.") It's also used in example Korean sentences, since "you" is unknown.
In many situations, "당신" can be considered condescending and rude.
**너:**
(Also pronounced "니" in some dialects)
1) "너" is safe to use between friends, [only 친구] (people who are the same age as you), or anyone who is younger than you ONLY once you're well-acquainted with them. Using "너" the first time you meet someone younger than you can come across as rude. The only exceptions are for very young children, and animals. (In the case of animals, you should always use the lowest form of Korean) However, it's still good to use polite Korean to children, as the parents will worry if you're teaching their children the "correct" way to speak.
2) "너" can be used between dating couples, even if one of them is older than the other. However it's not preferred (nicknames, first names, and other callings such as 누나/오빠/etc are the norm).
3) Never use "너" to anyone older than you. However, it *can* be used to people who are older than you, if they explicitely tell you to, or give you permission to.
As a foreigner, you might be allowed to use "너" to older friends. Keep in mind that this is not the norm, and it should still never be used to anyone older than you with whom you are not very well acquainted.
Note: be careful to never say "너" to another person who's clearly older than you in public, *even if they've told you it's okay to say "너" to them*, as this may be embarrassing to them in front of other people.
|
# The Hunted (Star Trek: The Next Generation)
"**The Hunted**" is the 11th episode of the third season of the syndicated American science fiction television series *Star Trek: The Next Generation*, and the 59th episode of the series overall.
Set in the 24th century, the series follows the adventures of the Starfleet crew of the Federation starship Enterprise-D. In this episode, as Captain Picard (Patrick Stewart) and his staff meet with the leaders of the planet Angosia III who are petitioning for Federation membership, they find themselves learning more than expected about the Angosians when they offer to help capture a local escaped prisoner.
## Plot
The *Enterprise* is investigating the planet Angosia III as a candidate for entry into the Federation. Captain Picard (Patrick Stewart) is approached by Prime Minister Nayrok (James Cromwell), who asks for help in apprehending a convict who has escaped on a transport ship from their prison colony on Lunar V. The *Enterprise* locates the ship, which flies behind an asteroid. However, only the drive section emerges from the other side with no life signs. Following it around they find the ship's wreckage. Believing that the prisoner has perished, the ship begins course back to the planet, only to discover the drive section they saw has disappeared.
Picard and Commander Riker (Jonathan Frakes) return to the *Enterprise* and following a hunch from Data (Brent Spiner) locate an escape pod and beam aboard the prisoner. When security try to take the prisoner into custody he fights back, virtually unaffected by their phasers. He overpowers the guards and injures O'Brien (Colm Meaney) before he is subdued. Upon further examination the crew find that the prisoner does not emit any life signs on scanner.
The prisoner identifies himself as Roga Danar (Jeff McCarthy) a former soldier. Counselor Troi (Marina Sirtis) meets Danar and reads little aggression from him, finding it unlikely that he could be so violent. Danar explains that he and others were genetically enhanced, greatly increasing their abilities and affecting their responses when in danger. The crew also finds that despite being a prisoner Danar has no criminal record. Nayrok confirms Danar's story but says that the soldiers were unsuited for life in civilized society. When Captain Picard raises the subject with Nayrok, he refuses to discuss the abuses Danar alleges, considering it a matter of internal security, and instead simply arranges for Danar to be returned to the colony. Danar tells Troi that the conditioning was never reversed or treated, and due to its effects a small misunderstanding could often lead to murder. Rather than try to fix the conditioning, the government imprisoned them all.
During the transfer from the *Enterprise* to the Angosian transport, Danar manages to escape. Easily evading security, he cripples the *Enterprise* by causing an explosion in one of the Jeffries tubes, disabling her sensor systems. With the *Enterprise* blind Danar beams aboard the Angosian transport vessel. Taking control, he attacks the Lunar V colony and rescues several of his fellow inmates.
Danar and the other inmates lead an attack on the capital and confront the Angosian government. Nayrok pleads with the Enterprise to help. Picard beams down with an away team but refuses to help, questioning the morality of how they've treated their soldiers. Nayrok and his compatriots explain the government's view on the matter; that the soldiers' augments cannot be reversed, thus requiring them to be confined for their own good and perhaps used again in the future. Against this, Picard is frustrated at their intransigence on this matter.
In the middle of this argument, Danar and his rebels storm the government building. In an act of hypocrisy, Nayrok pleads with Picard to intervene against this insurrection. Picard elects instead to depart considering he has sufficient information for his report, including the flagrant sentient rights abuses discovered, reminding Nayrok that he himself called the matter an internal affair.
With Nayrok fruitlessly protesting against their being abandoned, Picard informs the government that they have to make a choice on what to do with their veterans. Danar smiles at the away team, happy to finally be recognized as they depart. On their return to the *Enterprise*, Picard notes that if the government survives, they will be given assistance in helping their veterans with their conditioning. He also notes that they may reapply to join the Federation at a later date.
## Releases
The episode was released with *Star Trek: The Next Generation* season three DVD box set, released in the United States on July 2, 2002. This had 26 episodes of Season 3 on seven discs, with a Dolby Digital 5.1 audio track. It was released in high-definition Blu-ray in the United States on April 30, 2013.
The episode was released in Japan on LaserDisc on July 5, 1996, in the half season set *Log. 5: Third Season Part.1* by CIC Video. This included episodes up to "A Matter of Perspective" on 12-inch double sided optical discs. The video was in NTSC format with both English and Japanese audio tracks.
## Reception
In a 2010 re-view, Zack Handlen gave the episode a grade A.
Keith R.A. DeCandido gave the episode a rating of 6 out of 10.
In 2016, Vox rated this one of the top 25 essential episodes of all *Star Trek*.
## InfoBox
| "**The Hunted**" | |
| --- | --- |
| *Star Trek: The Next Generation* episode | |
| Episode no. | Season 3<br>Episode 11 |
| Directed by | Cliff Bole |
| Written by | Robin Bernheim |
| Featured music | Dennis McCarthy |
| Cinematography by | Marvin Rush |
| Production code | 159 |
| Original air date | January 8, 1990 (1990-01-08) |
| Running time | 45 minutes |
| Guest appearances | |
| | |
|
|
|
# Nuffield Gutty
The name **Nuffield Gutty** was used for three prototype vehicles built in 1947 in an attempt to meet a British War Department specification for a light field car to replace the American Jeep that was in service in large numbers following the war. This vehicle featured a horizontally opposed 4-cylinder engine similar to that designed for the planned small post-war car to be called the Morris Mosquito, that eventually appeared (with a conventional vertical side-valve engine) as the Morris Minor.
The Gutty was not directly successful but is regarded as the predecessor of the FV1800 Wolseley Mudlark which was in turn the immediate predecessor of the Austin Champ. One of the three prototype vehicles has survived and was formerly on display at the Museum of Army Transport in Beverley, Yorkshire (closed 2003) and was in storage until 2011 when it was transferred to the Heritage Motor Centre.
The confusingly similar name "Nuffield Guppy" had previously been used for an unrelated prototype vehicle.
|
The main problem about space is how much it costs to get there: it's too expensive! And that's mainly because launch vehicles are expendable - either entirely, like satellite launchers, or partly, like the space shuttle.
So we need reusable launch vehicles. The trouble is that these will not only reduce the cost of launch - they'll also put the makers out of business, unless there's more to launch than just a few satellites a year, as there are today.
Fortunately there's a market that will generate far more launch business than satellites ever well - passenger travel. Market Research has shown that the idea of space tourism is very very popular. And so, just like aviation, the launch industry is going to find that most of its business will be carrying passengers.
But this idea of Space Tourism isn't at all familiar to most people, including the space industry, who are used to the idea that space is for research or military activities. Few people are aware of how much work has been done to show that tourism is a realistic goal, and how rapidly this work is now progressing.
Once travel to orbit becomes a commercial service, the question of how to get to space will be mainly one of saving up for a ticket - or looking for work in one of the many space hotels that will be built. Space offers unique pleasures including the view, and zero gravity activities that provide a whole range of things to do on an orbital holiday - including space sports.
Importantly, and contrary to what many people assume, the space agencies are not at all interested in space tourism, and are not trying to bring it about. This is a pity because space activities will never be profitable until tourism services begin, remaining small-scale, expensive, and dependent on taxes which come from you - which would you prefer?
29 July 2012
Added "Space Debris and Its Mitigation" to the archive.
16 July 2012
9 December 2010
7 December 2008
30 November 2008
Added Lynx to the Vehicle Designs page.
More What's New Subscribe Updates by Email
More Info Mailing Lists
There are currently 222 documents in the archive.
Bibliography Archives List Library Listing
Space Sports
Once hotel companies start to build and operate orbital accommodation, they're going to be endlessly improving it, and competing to build more and more exotic facilities. One of the areas in which they'll compete will be in building zero-G sports centers. Basically, the bigger these are the more interesting the opportunities they'll provide.
Zero gravity stadiums
In the first stages they'll be maybe 20 meters across, which will be big enough for zero-G gymnastics, ballet, and a range of sports - if not football! For example zero-G versions of existing terrestrial sports, such as table-tennis, badminton, tennis, and even basketball.
As the structures get larger, a wider range of games will become possible, with room for spectators too. Then, once hotels include substantial rotating sections, ball-games will have the new feature that the ball will follow a kind of spiraling path, which will literally add a new dimension to throwing and catching!
Entirely new sports
Once you're thinking about stadium-based sports like football, other new kinds of possibilities open up, like momentum transfer between team-members and opponents, giving "launch assistance" to each other, and others.
Another area is water sports. A zero-gravity "water-room" with some large "blobs" of water which you can throw at each other, or through which you can dive, will provide a lot of unique entertainment. But there will be a new safety problem to solve. Probably everyone will be required to wear a mouthpiece for an emergency air supply, because in zero-G you won't float to the "top" of a blob of water, of course. So if everyone has a few minutes' air-supply, that may avoid some panic attacks!
And once there are rotating hotels, true rotating swimming pools will get built, in which you can swim around the interior surface, and then dive out to float in the zero gravity in the center! Water's heavy, though - 1 ton/cubic meter - so quite a modest pool will contain 1000 tons of water - which will be a serious investment, even at only $100,000 / ton launch costs! So those facilities will be part of large orbital complexes.
The game's the same but the rules seem to have changed
And of course entirely new sports will also be invented, that take advantage of zero-G or artificial gravity. But, for now, we'll leave them to your imaginations!
The big event
As we said above, things will start small, and grow bigger. So holding Olympic games in an orbiting zero-gravity stadium 100 meters in diameter, for example, is obviously not a realistic project in the near future. But instead of dismissing it as a ridiculous fantasy - as many "space industry" people would - consider that:
1. It's unquestionably technically possible - a student could estimate the structural stresses involved.
2. Its feasibility depends on straightforward business economics, and specifically on the cost of launch, and the market value of media rights.
3. It's an interesting question how soon after the beginning of space tourism it will happen - it will depend mainly on the growth rate of space tourism services.
And while it would be easy to say "Orbital Olympics are at least 50 years away" we should also remember that when a new service gets really popular, business growth rates can be spectacular. For example, recently Internet-connectable personal computers and mobile-telephones have shown fantastic growth rates, with both sales and investment growing by tens of $billions per year in just a single country! Why shouldn't there be a global "space tourism boom" on a similar scale? In that case it could lead to spectacular growth rates. And before space tourism reaches a scale of even 1 million passengers per year, large-scale sports facilities will certainly be built in orbit - because they'll be good business investments for hotel companies.
An incentive for business?
For such a boom to happen there are plenty of spare resources - since the end of the cold war the aerospace industry has had nothing else to do: employment has already shrunk by millions world-wide; the number of companies has dropped sharply; and it isn't over yet. There's talk of further reduction in the number of helicopter makers, satellite makers and launch vehicle makers! So it could be a case of "Light the blue touch-paper - and stand back!" We look forward to it.
Back to tourism Index
Please send comments, critiques and queries to
All material copyright Space Future Consulting except as noted.
|
# 1898 World Allround Speed Skating Championships
The **1898 World Allround Speed Skating Championships** took place at 6 and 7 February 1898 at the ice rink Eisstadion in Davos, Switzerland.
Jack McCulloch was the defending champion but did not participate.
The Norwegian Peder Østlund won three distances but did not finish the 500 meter. According to the rules he became World champion. The German Julius Seyler who finished all the distances had the best score.
## Allround results
| Place | Athlete | Country | 500m | 5000m | 1500m | 10000m |
| --- | --- | --- | --- | --- | --- | --- |
| | Peder Østlund | Norway | NF | **8:52.2 (1)** | **2:23.6 (1)** | **18:40.0 (1)** |
| NC2 | Julius Seyler | German Empire | 47.2 (1) | 9:14.6 (3) | 2:29.2 (2) | 18:47.8 (2) |
| NC3 | Gustaf Estlander | Finland | 47.6 (3) | 9:15.0 (5) | 2:29.8 (3) | 18:55.8 (3) |
| NC4 | Wilhelm Sensburg | German Empire | 50.6 (7) | 9:09.6 (2) | 2:35.4 (6) | 19:19.0 (5) |
| NC5 | Jan Banning | Netherlands | 47.8 (4) | 9:37.0 (8) | 2:34.2 (5) | 19:45.2 (6) |
| NC6 | Alfred Lauenburg | German Empire | 49.6 (5) | 10:12.0 (10) | 2:53.4 (10) | 21:18.6 (7) |
| NC | Oskar Fredriksen | Norway | 47.4 (2) | 9:25.0 (6) | 2:31.8 (4) | NS |
| NC | Nikolay Kryukov | Russia | 53.4 (9) | 9:28.6 (7) | 2:37.0 (8) | NS |
| NC | István Szabó | Hungary | 50.8 (8) | 9:40.6 (9) | NF | NS |
| NC | Eduard Vollenveyder | Russia | 50.2 (6) | NS | NS | NS |
| NC | Jan Greve | Netherlands | NF | 9:14.6 (3) | 2:38.4 (9) | 19:03.6 (4) |
| NC | Hermann Kleeberg | German Empire | NF | NF | 2:36.2 (7) | NS |
* = Fell NC = Not classified NF = Not finished NS = Not started DQ = Disqualified
Source: SpeedSkatingStats.com
## Rules
Four distances have to be skated:
* 500m
* 1500m
* 5000m
* 10000m
One could only win the World Championships by winning at least three of the four distances, so there would be no World Champion if no skater won at least three distances.
Silver and bronze medals were not awarded.
## InfoBox
| World Allround Speed Skating Championships | |
| --- | --- |
| **Gustaf Estlander**<br>Participant of the 1898 World Championship | |
| Venue | Eisstadion, Davos, Switzerland |
| Dates | 6–7 February |
| Competitors | 12 from 3 nations |
| Medalist men | |
| Peder Østlund NOR | |
|
|
# Migi Mo Hidari Mo Shihai Suru Atama Wa Kyou Mo Niku O Kui Yodare
***Migi Mo Hidari Mo Shihai Suru Atama Wa Kyou Mo Niku O Kui Yodare***, which translates to **The Head That Controls Both Right And Left Sides Eats Meats And Slobbers Even Today**, is a 2006 album by Japanese noise rockgroup Bleach. It showcases the band showing a more polished sound, with notable improvements on the guitar. It also features a bonus live DVD featuring performances at Club Fujiyama.
The title track was featured as the opening song for an episode of *Mr. Robot*.
## Track listing
| No. | Title | Length |
| --- | --- | --- |
| 1. | "Samurai Jungle" | 2:35 |
| 2. | "Migi Mo Hidari Mo Shihai Suru Atama Wa Kyou Mo Niku O Kui Yodare O Tarasu (The Head That Controls Both Right And Left Sides Eats Meats And Slobbers Even Today)" | 3:07 |
| 3. | "Headcleaner" | 1:44 |
| 4. | "Torch" | 2:56 |
| 5. | "Peacock No Housoku (Law Of The Peacock)" | 3:32 |
| 6. | "Get You Human" | 2:33 |
| 7. | "Not Peter" | 2:17 |
| 8. | "Kono Koro Fantasy (Recent Fantasy)" | 1:27 |
| 9. | "Myakudou (Pulsation)" | 4:34 |
| 10. | "Rock Ni Yobarete Iru (Rock Is Calling Me)" | 2:44 |
| 11. | "Sketchbook" | 3:36 |
| 12. | "Naname (Askew)" | 4:26 |
| 13. | "Skull Saiban (Skull Trial)" | 2:18 |
| 14. | "Ayashi No Yume (Fascinating Dream)" | 3:05 |
## DVD tracks
| No. | Title | Length |
| --- | --- | --- |
| 1. | "Get You Ningen (Get You Person)" | |
| 2. | "Torch" | |
| 3. | "Migi Mo Hidari Mo Shihai Suru Atama Wa Kyou Mo Niku O Kui Yodare O Tarasu (The Head That Controls Both Right And Left Sides Eats Meats And Slobbers Even Today)" | |
## InfoBox
| Migi Mo Hidari Mo Shihai Suru Atama Wa Kyou Mo Niku O Kui Yodare | |
| --- | --- |
| | |
| Studio album by Bleach | |
| Released | 2006 |
| Genre | Thrashcore, D-beat, hardcore punk, noise rock |
| Label | High Wave |
| Bleach chronology | |
| *Bleach*<br>(2003) ***Migi Mo Hidari Mo Shihai Suru Atama Wa Kyou Mo Niku O Kui Yodare***<br>(2006) *Kien*<br>(2008) | |
|
# Division No. 15, Alberta
**Division No. 15** is a census division in Alberta, Canada. The majority of the division is located in Alberta's Rockies, while the southernmost portion of the division is located within southern Alberta. The division's largest urban community is the Town of Canmore.
## Census subdivisions
The following census subdivisions (municipalities or municipal equivalents) are located within Alberta's Division No. 15.
## Demographics
Historical population
| Year | Pop. | ±% |
| --- | --- | --- |
| 1991 | 26,359 | |
| 1996 | 30,800 | +16.8% |
| 2001 | 34,068 | +10.6% |
| 2006 | 34,150 | +0.2% |
| 2011 | 35,983 | +5.4% |
| 2016 | 38,594 | +7.3% |
| 2021 | 37,735 | −2.2% |
| | | |
In the 2021 Census of Population conducted by Statistics Canada, Division No. 15 had a population of 37,735 living in 15,085 of its 19,121 total private dwellings, a change of -2.2% from its 2016 population of 38,594. With a land area of 28,270.14 km<sup>2</sup> (10,915.16 sq mi), it had a population density of 1.3/km<sup>2</sup> (3.5/sq mi) in 2021.
51°05′24″N 115°21′00″W / 51.09000°N 115.35000°W / 51.09000; -115.35000
## InfoBox
| Division No. 15 | |
| --- | --- |
| Census division in Alberta | |
| NWT SK BC USA 10 11 12 13 14 15 16 17 18 19 | |
| Country | Canada |
| Province | Alberta |
| Area | |
| Total | 28,400 km<sup>2</sup> (11,000 sq mi) |
| Population (2021) | |
| Total | 37,735 |
| Density | 1.3/km<sup>2</sup> (3.4/sq mi) |
|
Saving for the future isn't easy, especially when you probably have multiple financial responsibilities pulling your money in different directions. Between the mortgage, car payments, and all your other household bills, it's a challenge to find spare cash to put toward your savings. So when it comes to establishing an emergency fund, it's tempting to shove that task to the bottom of your priority list.
Many households are struggling to set aside cash for unexpected expenses -- approximately 41% of U.S. adults said they wouldn't be able to cover a $400 unexpected cost, according to a report from the Center for Retirement Research at Boston College. Unsurprisingly, those with lower incomes tended to struggle more; 72% of households earning less than $25,000 per year couldn't come up with $400, the survey found.
However, it's not just low-income workers who are struggling to save. Nearly one in five households earning $100,000 or more per year also couldn't find an extra $400 for an unexpected expense, according to the survey.
More income doesn't always solve all your money problems. No matter how much you're earning, it's important to set your financial priorities so you can be prepared for any hurdle that comes your way.
An Emergency Room sign
Image Source: Getty Images
The importance of an emergency fund
An emergency fund may seem like just another task on your lengthy financial to-do list, so it's tempting to move it to the back-burner and focus on more immediate responsibilities. However, not building an emergency fund can actually cost you more money in the long run.
If you don't have an emergency fund and you incur an unexpected expense, you have a couple of options. First, you could charge the expense to your credit card or take out a loan to cover the cost. But if you don't have the money now, chances are you may not have it in a month or two when it's time to make your credit card payment or pay off your loan. And the longer it takes to pay off your debt, the more you'll end up paying in interest. By the time you've paid down your debt, you could potentially pay hundreds or even thousands of dollars just in interest payments.
For example, say you had to make an emergency trip to the hospital, and you're slapped with a $1,000 bill, which you charged to your credit card. The interest on that credit card is 18%, and you're making payments of $100 per month. At that rate, it would take about a year to pay off that debt, and you'd end up paying around $100 in interest. If any more unexpected expenses pop up during that time, your debt will continue climbing, and you'll pay even more in interest.
Another option when paying for unexpected expenses is to pull the money from your retirement fund. Especially if you only need a few hundred dollars, it may seem like that small amount wouldn't make a dent in your savings. However, it can make a bigger difference than you'd think.
First, you might be charged a 10% penalty fee for withdrawing your retirement money before age 59 1/2. Second, you may have to pay income taxes on the amount you withdraw, so your cash won't go as far as you think. And third, when you withdraw any money from your retirement fund, it makes it harder for your savings to benefit from compounding growth -- and even relatively small withdrawals can hurt your long-term savings.
For instance, say you have $10,000 in your retirement fund, and you withdraw $1,000 to cover an emergency expense. Let's also say you were saving $150 per month, which you continue doing even after you make your withdrawal. If you didn't withdraw any of your savings, you'd have around $356,000 saved after 35 years, assuming you're earning a 7% annual rate of return. But if you were to withdraw $1,000, you'd only have around $345,000 saved, all other factors remaining the same. In other words, a $1,000 withdrawal can ultimately result in lost potential earnings of more than $10,000 in the long run. And if you continuously withdraw from your retirement fund, it could cost you even more.
How to establish an emergency fund
No matter how much you're earning, an emergency fund is a critical component to your financial health. But if you don't even have enough cash to cover a $400 expense, how are you supposed to build an emergency fund?
If money is tight, the key is to build your savings gradually. Most experts recommend saving enough to cover three to six months' worth of expenses, in case you lose your job. You don't need to come up with that cash overnight, but you may need to make some sacrifices so you have something to put toward your emergency fund each month while still paying all your bills.
Start by tracking your expenses to get a clear idea of how you're spending your money each month. (If that sounds tedious, there are several apps that track your money for you and update you on where your money is going.) Once you know where you're spending your cash, see if there are areas where you can make cuts. Eliminate any unnecessary costs, then consider whether you can live without some of the nice-to-have costs too.
One thing to keep in mind when establishing an emergency fund is that these sacrifices will be temporary -- once you reach your goal, your budget can go back to normal. So if you're balking at the sacrifices you'd need to make, just remember that it won't last forever.
When you've got a long list of bills to pay, building an emergency fund may not seem like the most pressing task. But you never know when an unexpected expense is going to pop up, and an emergency fund can prepare you for any financial obstacle you may face.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.