text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
Purpose and Role of Community Health Workers
Community Health Workers (CHWs)are lay people from the community, who have been trained to function as members of the health care team; they function as a bridge between patients and the health care system. CHWs advocate, facilitate and organize access to health and social services for an identified group of patients. They serve as liaisons between high risk, high cost patients and their health care providers. They are available to visit patients in their home, and accompany them to clinical appointments. CHWs have frequent contact and conduct follow up with patients. The goal is to demonstrate improved care, improved health and lower costs.
Overview of CHW Training
Two educational institutions have joined together in partnership with Temple University Health System to develop the curriculum and offer effective training for Community Health Workers. These partners include Temple University’s Center for Social Policy and Community Development under the College of Public Health and District 1199C Training and Upgrading Fund.
The training model moves learners through a process from acquiring knowledge, to analyzing underlying constructs, to applying and synthesizing learned materials, and to being self-evaluative. While the actual functions of Community Health Workers may vary by size and type of practice, healthcare specialty, or patient needs, all Community Health Workers must possess fundamental competencies to be successful in the role of working with patients towards the overarching goal of increasing appropriate utilization of health care services, particularly among under-served populations.
The goal of Temple University’s training model is to prepare individuals with the basic skills to be effective Community Health Workers. Introducing, building and integrating concepts throughout the training, the model includes:
120 hours of in-classroom, didactic Community Health Worker Training based on 10 modular topics
20 hours of readings, self-assessments, practice reflections, and/or assignments
Weekly case reviews and skills practice sessions
Quizzes, administered weekly
Capstone simulation exercise
Six months of on-the-job training component, 4 hours per week.
Supplemental special health-related topic seminars and job readiness workshops
Opportunity to apply and acquire college undergraduate course credits
The training builds a foundation and focuses on competencies for the Community Health Worker, which includes:
Ø Advocacy Skills
Ø Capacity Building Skills
Ø Cultural Competency Skills
Ø Communication Skills
Ø Interpersonal Skills
Ø Ethical Practice.
Ø Health Promotion Skills
Ø Service Coordination Skills
Ø Organizational Skills
Community Health Workers Training requires participants to commit to 120 hours of training. | <urn:uuid:59ce2270-04ec-4e43-a053-96e0169edbc0> | CC-MAIN-2017-39 | http://cspcd.temple.edu/community-health-workers | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693363.77/warc/CC-MAIN-20170925201601-20170925221601-00228.warc.gz | en | 0.941521 | 528 | 2.6875 | 3 |
On 10 June 2016, the French Presidency of the Security Council organized a high level open debate on "Protection of Civilians in the Context of Peacekeeping Operations". It followed to other recent open debates in the Security Council on related matters: the protection of civilians in armed conflicts in January, the peacebuilding architecture in February, countering terrorism in April, and the cooperation between the UN and the African Union on peace and security in May, thus confirming the acute actuality of the topic. Civilians remain the target of unacceptable violence in situations of armed conflicts, with statistics showing that they represent 93% of victims. It is a figure deeply disturbing, placing the protection of civilian population at the core of the international efforts for peace and security, and as a moral responsibility for the UN.
The Report of the UN Secretary-General on the protection of civilians in armed conflicts, published in June 2015, revealed that prevailing disrespect for the international humanitarian law by some States and non-State actors, and the impunity of perpetrators, became a critical challenge for the international community. Deliberate targeting of civilians, of schools and hospitals are on the rise in many armed conflicts, bringing the number of refugees and internally displaced persons to alarming levels.
The primary responsibility to protect the civilian population during wars and conflicts belongs to States, but when national authorities are unable or unwilling to fulfill their responsibility, then the international community must intervene. In cases where atrocity crimes are committed, accountability is crucial. This is why Romania endorsed the French-Mexican initiative that permanent members of the UN Security Council should voluntarily agree to refrain from using their veto in situations involving mass atrocities crimes, and we joined the Code of Conduct proposed by Liechtenstein on the Security Council action against genocide, crimes against humanity or war crimes.
Protection of civilians is also a task for peacekeeping operations. It is even decisive for the success and legitimacy of the UN presence in the field. In many cases in the recent past, peacekeepers did not use force to protect population coming under attack, which resulted in the deaths of thousands of civilians. Therefore, UN missions need to be equipped with appropriate tools in order to address both the causes of crises and their consequences, including the protection of civilians, with a special attention to women, children and vulnerable persons.
Quite often, the complex reality on the ground makes difficult for peacekeepers to fully understand the action they have to perform for protecting the civilian population. In this respect, pre-deployment training is essential, as well as a zero tolerance policy to any kind of abuse. Training must be anchored in the respect for human rights and in the standards of integrity required by the United Nations. It has to include how to interact with local people and civil society organizations, especially those focused on the protection of women's and children's rights, because nothing is more damaging to the reputation and credibility of peacekeeping missions, and to the efforts to regain the trust of local populations, than Blue Helmets abusing those they have mandate to protect. Here, it is the Security Council's responsibility to ensure that the protection mandate is clearly defined, achievable and backed with adequate resources. Out of the 16 UN peacekeeping operations in place today, ten have a mandate for protection of civilians. Romania is present in six of them.
Romanian experience proves the benefits of mixed teams, where female members of peacekeeping operations interact with women and vulnerable individuals from local communities. Complementary between training courses provided both at national and international level, in a way that they can offer to peacekeepers the skills to identify early warning indicators of potential risk for atrocity crimes, is also important.
For instance, prior to their deployment in peacekeeping operations, Romanian troops attend a three months period of strict training which includes protection of civilians and respect for human rights. As a result, in 25 years of continuous presence in UN peacekeeping missions and with a total of more than ten thousands Blue Helmets all over the world, Romanians have never been involved in incidents of disrespect of the civilian population. Currently, we are present with military, police and close protection officers in ten peacekeeping operations and in two special political missions.
At the same time, we must not neglect the serious danger peacekeepers continue to face to fulfill their mandates in some of the most dangerous parts of the world. They risk so much to advance peace in profoundly hostile environments, and we pay tribute to the men and women who so admirably dedicate their lives to protect the lives of others. Unknown by the public opinion, criticized sometimes for not doing more, many of them made their ultimate sacrifice. In 2015 only, 129 Blue Helmets died in mission and, unfortunately, others followed this year.
To limit the number of victims both among civilians and peacekeepers, a renewed focus has to be on conflict prevention and mediation. From this perspective, negotiated political solutions, early warning mechanisms to anticipate risks of atrocities, accepting the norms of Responsibility to Protect, and respect of the Kigali Principles on the protection of civilians in conflicts, are part of the solution. At present, 29 countries, including Romania, have endorsed the Kigali Principles, accounting for more than 40,000 troops serving under the UN flag.
Last but not the least, effective protection of civilians in armed conflicts needs an enhanced cooperation with regional and sub-regional organizations, because of their knowledge of the cultural, social and historical regional realities. The African Union and the European Union are two good examples, both organizations being strategic partners of the UN in the peacekeeping efforts.
Finally, proper implementation of the Agenda 2030 will further contribute to tackling the root causes of conflicts, because many conflicts and crises they generate have roots in poverty, in the lack of basic resources such as water and food, denied access to education, inequality, migration due to climate change, and the absence of any hope for a better future. Therefore, the Agenda 2030 marks a paradigm shift in approaching emerging challenges and requires us to commit to eradicating extreme poverty, fighting inequality, empowering women and girls, protecting the vulnerable ones, improving governance, encouraging sustainable and inclusive economic growth, and leaving no one behind. | <urn:uuid:a5aa95bc-9ba3-4019-ac19-f618f46a04e4> | CC-MAIN-2021-43 | https://www.huffingtonpost.co.uk/dr-ion-jinga/protection-of-civilians-i_b_10430882.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585280.84/warc/CC-MAIN-20211019171139-20211019201139-00413.warc.gz | en | 0.948805 | 1,242 | 2.625 | 3 |
Throughout the 1990s, the Bolivian women’s movement was ideologically polarized between a liberal, NGO-based “gender technocracy” and the anarcha-feminism embodied in the Mujeres Creando (Women Creating) movement. Between them stood the great majority of the country’s female population—a huge contingent of women of indigenous descent living in a colonized condition. Neither the technocratic nor the anarchist tendency considered them the subject of political representation.
Today, the correlation of forces that predominated until recently is beginning to change. This is largely the result of the starring role played by women’s grassroots organizations in the social mobilizations that destabilized the neoliberal order. That upheaval launched a new period in Bolivia’s political history, one best characterized as the era of “indigenous nationalism.” Since the inauguration of Bolivia’s first indigenous president, Evo Morales, these indigenous women’s groups (both rural and urban) have come to be perceived as the legitimate representatives of large women’s majorities. At the same time, the women’s movement has significantly realigned its political stances vis-à-vis the challenges of decolonization and radical democratization represented in the platform of Morales’ party, the Movimiento al Socialismo (Movement Toward Socialism, MAS).
The NGO Movement: Gender Technocracy
The term gender technocracy was coined by autonomous Latin American feminists as a useful concept to differentiate the elite of professional women associated with NGOs working on gender-related issues from what they considered an authentic feminist movement, struggling from a fundamentally anti-patriarchal position. Bolivia’s gender technocracy was born in the mid-1980s, when international cooperation funds for development projects with a “gender approach” became available. This signaled the export of the liberal version of northern-hemisphere feminism—hegemonic since its institutionalization in the United Nations—to peripheral countries through bi- and multilateral development cooperation programs. In fact, the regulating discourse of “gender and development” was made possible thanks to the cooperation agencies’ solid institutional resources and their capacity to permeate state policies in peripheral countries. This partly explains why gender technocracy’s discourse has been unable to this day to address grassroots women’s consciousness, and even less to address the state from the “bottom up,” with demands that represent the majority of women’s interests and aspirations as women.
As NGOs arrived on the political scene, a new form of mediation developed between civil society and the state. Grassroots organizations increasingly became the “beneficiaries” of NGO projects, while NGOs began to identify themselves as “representatives” of civil society to the state and cooperation agencies. This was the case of NGOs such as Fundación San Gabriel and Caritas Bolivia, which operated food aid programs. Other NGOs, such as Fundación Tierra, Instituto Politécnico Tupak Katari and El Centro de Promoción de la Mujer Gregoria Apaza (CPMGA), also appeared in this period. (1)
Gender technocracy was organized along two axes: a state regulating body and the women’s NGOs that worked closely with it. Together they played a key role in framing the discourse of gender inequality as—solely—a matter of state management. That is why women’s NGOs increasingly took on a quasi-public-sector role, a development that took place in the context of “democratization” after the fall of the 1970s military regimes. This helped legitimize what was in fact a co-optation of the movements by the neoliberal state.
The main characteristic of the women’s NGO movement is that it builds its demands on the principles of UN conventions, rather than on a dialogue with Bolivian women about their needs. Gender technocracy thus differs from the rest of women’s organizations because its main goal has not been to confront specific relations of gender subordination in Bolivia, but rather to mitigate the poor life conditions of marginal women through short-term programs that follow UN dictates. “Influencing state policies from a gender and development perspective”—as the mission statements of practically all the gender NGOs put it—has been the real goal, yet the question of where this influence, and its legitimacy, would come from was never debated, either by the gender technocracy or by the cooperation agencies; no such debate was required as long as the technocracy was thought of as “representing” women’s interests and demands.
By accommodating the political style of each administration, the technocratic NGOs ended up endorsing the government’s social programs, beginning with the structural-adjustment package implemented in 1985. Most of them also offered near unconditional support for the popular participation project launched by President Gonzalo Sánchez de Lozada in 1995, which obliged social organizations to reorganize on a territorial basis, in close relationship with municipal-level political party structures, thus removing their autonomy and denaturalizing them. This was also the case with microenterprise policies, which decreased the value of labor power (that is, they depressed salaries), particularly that of the female workforce.
Finally, we have the problem of reducing women’s political participation to a matter of power quotas within formal political structures. Within the framework of Sánchez de Lozada’s reforms, the gender technocracy launched an aggressive campaign to require that 30% of all candidates in national and municipal elections be women. The quota worked to consolidate male leadership within the political parties’ patriarchal structures, rather than to actually promote the representation of women’s interests. Elite urban women linked to the leadership of right-wing parties mainly benefited. Indigenous women’s leadership, in contrast, emerged from social movements that have become political parties, including the MAS and the Movimiento Indígena Pachacuti. (2)
Thus, the class nature of gender technocracy reveals itself in two basic dimensions: First, as part of the NGO conglomerate, it has played an important role in legitamizing neoliberal policies. Second, it has maintained a strategic alliance with the neoliberal state and international cooperation agencies—an alliance key to its survival—obligating gender NGOs to define their roles very little in relation to civil society and women, or to women’s interests, needs and aspirations.
There is, however, a third aspect of gender technocracy’s class nature that has only lately manifested, and is now possible to name, in the current context of changing correlation of forces between mestizo and colonized society—a context that typifies the MAS era. (By “colonized society,” I refer to the population of predominantly indigenous heritage, which according to the last census of 2002, represents 62.2% of Bolivia’s population.) I will develop this point further in the last section of this article.
During the neoliberal period, the political parties gave birth to new women’s political organizations that were closely aligned with the gender technocracy, such as the Foro Político de Mujeres (Women’s Political Forum), the Asociación de Mujeres Parlamentarias (Association of Congresswomen ) and the Asociación de Concejalas de Bolivia (Association of Councilwomen of Bolivia). These groups’ aim was to promote the rights of women elected to public offices. They typically reproduced the ethnic and class divisions of traditional political parties.
The Mujeres Creando Movement and the Feminist Assembly
At the other end of the spectrum of the women’s movement, we find the anarcha-feminist movement Mujeres Creando, situated generally within the autonomous Latin American feminist camp. Autonomy here is defined in terms of the state and political parties (according to the principle of “no to co-optation”) and NGOs (“no to mediation”). Consistent with this autonomist position, the movement has followed an independent and unique path with regard to the processes of political reconfiguration and policy making. Its actions derive from a politics of the everyday-private, and they seek to make an impact both at the macro-level of structural problems, and at the level of the microphysics of power, in which collective subjectivities are structured and power and domination find a privileged space of reproduction and legitimacy. The movement is remarkable for its strategy, based on deconstructing symbols and languages of patriarchal domination in a context of internal colonialism. Its weapons range from graffiti, television shows and the press to silent theater, poetry and workshops.
The movement was key in sustaining two of the most important colonized women’s mobilizations: the women coca growers’ march of 1995 and the microcredit women debtors’ mobilization of 1999. In both cases Café Carcajada, the headquarters of Mujeres Creando, served as a space to strategize and as a lodge for women who arrived from different parts of the country. (3) Though small in membership, this movement has a far ideological reach and remains the only one in Bolivia that advances its political demands from a standpoint of gender subalternity. Mujeres Creando has contributed greatly to naming patriarchy as a specific form of domination that Bolivian society at large cannot yet recognize in its true dimensions.
Having rejected any kind of long-lasting alliances and stable structure, the movement must now work with other sectors of mobilized women. The Feminist Assembly, founded in 2004, has been working to join forces with the women of indigenous and peri-urban organizations; it proposes to be a parallel to the Constituent Assembly.
The Bartolina Sisa National Federation of Peasant Women
From nonfeminist positions and at the margin of the gender-and-development discourse, there exist important women’s organizations within the major contemporary social movements. The most salient are the Federación Nacional de Mujeres Campesinas Bartolina Sisa (the Bartolina Sisa National Federation of Bolivian Peasant Women, or FNMCB-BS by its Spanish acronym) and the neighborhood councils. Although the latter comprises both men and women, its members are mostly women; both are made up of indigenous-descended women to a greater or lesser degree.
Born in the late 1970s within the Confederación Sindical Única de Trabajadores Campesinos de Bolivia (the Sole Trade Union Confederation of Peasant Workers of Bolivia, or CSUTCB), the Bartolina Sisa Federation stands out as the only organization of indigenous women in the country. It is also the most important women’s organization, not only because as part of the indigenous and peasant movement it has made the most radical demands on the colonialist state, but also because it represents the largest section of the women’s movement, with a membership that reaches over 100,000 women and a trade-union structure that reaches from the national executive directors to community-level producer’s associations.
Since its creation, the Federation has been torn between an autonomist and an integrationist trend—in reference to the CSUTCB’s sexist ideology and patriarchal structures—a conflict that has taken its political toll and resulted in a significant loss in membership from which the group has recovered only in recent years. The Federation might well have separated from the CSUTCB, had it not been for its deliberate choice in 2004 to “stay with its brothers in the struggle for decolonization,” as some Federation executives said in a recent interview with the author.
This women’s organization is in the vanguard of the indigenous movement, being one of the nine organizations that founded the Pacto de Unidad (Covenant for Unity) in June 2006. The FNMCB-BS brings together peasant women from different sectors of agricultural production and is based on a solid organizational structure throughout Bolivia’s nine departments (national territories analogous to states in the U.S. or provinces in Canada).
Having been an anti-systemic organization under previous political regimes, the FNMCB-BS is now entering a conciliatory phase vis-à-vis the state. This partly results from government initiatives to establish a direct dialogue with social movements and their grassroots organizations. Policies in this direction are currently being developed by the Presidential Ministry and the recently created Vice Ministry of Coordination With Social Movements.
The Neighborhood Councils Movement
Besides the indigenous movement, the second outstanding movement in Bolivia’s contemporary history is that of the neighborhood councils. The councils represent that intermediary social category standing between the urban and the rural, comprising a large sector of indigenous people who are becoming urbanized. Having emerged from the territorial restructuring policies of neoliberal reforms, the councils have ironically taken a leading role in building demands for radical social change through a “politics of basic needs” that is closely connected to a powerful discourse of nationalization. This began with the Water War of 2000 and was later reasserted in the October 2003 uprising known as the Gas War. Together with the peasant and indigenous movement, the neighborhood councils in the western cities of La Paz and El Alto played a key role in the wave of mobilizations that both put an end to the neoliberal administrations of Sánchez de Lozada and Carlos Mesa and resulted in the popular demand for early elections and Morales’ victory in January 2006.
The confluence of the neighborhood movement’s basic-needs politics with the demands for indigenous sovereignty (such as refounding the state through a constituent assembly, new territorial divisions and redistributing land) has resulted in a new kind of nationalism that imagines an indigenous form of citizenship built on reappropriating natural resources for the benefit of Bolivians. It is precisely in the two key elements of nationalization and indigenous identity that the two movements, neighborhood and indigenous, find common ground for decolonization. (4) Both the women of the neighborhood councils and of the FNMCB-BS speak from the standpoint of the ethnic subaltern. Using a discourse of decolonization, they advocate an “indigenous” subject vis-à-vis a state that has reproduced colonial social relations between a mestizo society and an indigenous one. This is changing who gets to represent women’s interests and demands, with that role rapidly shifting to women’s grassroots organizations, while the NGO technocracy is losing its legitimacy.
The Impact of the MAS Government on Women’s Organizations
Morales’ rise to power has no doubt had a strong impact on Bolivian society. A realignment of forces is under way, as distinct social sectors respond differently to a process of decolonization that implies a qualitative change in relations between mestizo and colonized society. This is related not only to changes in the correlation of forces among the traditionally dominant classes, but also with nationalization, land redistribution and—for the technocratic political class—the loss of monopoly over the institutions and its concurrent loss of prestige. In this framework, the loss of symbolic and material power in some social sectors becomes evident. For the women’s movement this means a real change in the correlation of forces between mestizo women’s organizations and indigenous-based (urban and/or rural) women’s organizations. It is a critical moment for the technocratic middle class, particularly the NGOs, partly because their legitimacy is being seriously questioned, but also because they have resisted—rather than adjusted to—the new state of affairs. NGOs refuse to accept that decolonization implies at least the partial renouncement of the mediating role they have played between the state and civil society. However, their greatest fear probably lies in the possibility of finding themselves on an equal footing with their beneficiaries, with a government that favors direct dialogue with grassroots organizations.
Some NGOs are attempting to reorganize clearly counterrevolutionary projects. This is the case of We Bet for Bolivia, a project that was initially created during the transitional phase of the Mesa administration to stamp the Constituent Assembly with a “constitutional” agenda that radically differed from social movements’ “foundational” proposals. Put together by four traditional NGOs, (5) We Bet for Bolivia has now relaunched with the new aim of gaining “social control over the revenues of nationalized hydrocarbons” with the support of the Revenue Watch Institute, a U.S. organization. These programs signal that NGOs will not easily renounce their mediating role, even if they have to seek legitimacy from external circuits.
Beyond today’s potential opportunities for women’s grassroots organizations, there remains the issue of linking the national-decolonizing project advocated by these organizations with the patriarchal emancipation project proposed from relatively isolated—but not irrelevant—feminist positions, such as those of Mujeres Creando, the Feminist Assembly and, with significant differences, the author of this text herself. Women’s organizations in Bolivia are still conservative, and it is not clear up to what point they will adopt a double claim of gender and ethnic subordination, although this may well be possible within the FNMCB-BS. To a great extent this will depend on the ability of the women in these movements to think critically about the gender dimension of power and democracy. It will also depend on the efforts and initiatives of the (few) feminists who work in this milieu, and—largely—on whether grassroots organizations such as the FNMCB-BS, the neighborhood councils and new groups will gain access to real resources.
There is no doubt that women’s organizations’ autonomy within social movements is a fundamental issue. If efforts do not converge in this direction, their participation will remain critical for mobilizing, but invisible in terms of decision making and political leadership. Strategic gender needs6 will be indefinitely postponed as long debates on the topic fail to address the issue of internal colonialism and its reproduction mechanisms. There is still much work to be done in order to achieve this articulation. What is clear is that emancipation from patriarchy in Bolivia is not unrelated to emancipation from internal colonialism, since it is precisely in its fabric where gender identity and ethnic subordination are simultaneously constituted. Indeed, this topic remains largely unexplored.
1. The CPMGA and Fundación La Paz are specifically women’s NGOs, while the others include a gender component in their development projects. As a church institution, Caritas is the oldest.
2. See Karin Monasterios P. and Luis Tapia, Partidos y participación política de las mujeres de El Alto (La Paz: Centro de Promoción de la Mujer Gregoria Apaza, 2001).
3. A thorough account of Mujeres Creando’s mobilization strategies and its philosophical positions can be found in a paper I presented at the XXIV International Congress of the Latin American Studies Association (2003). The paper, titled “La tecnocracia de género y el feminismo autónomo de Mujeres Creando: Los extravíos de la representación de las mujeres en Bolivia y los desafíos de la acción directa,” represents the first attempt from academia to theorize the work of Mujeres Creando.
4. For further discussions on this topic, see Álvaro García Linera, “La crisis de estado y las sublevaciones indígena-plebeyas,” in Alvaro García Linera, Raúl Prada and Luis Tapia, eds., Memorias de Octubre (La Paz: Muela del Diablo, 2004).
5. I am referring to Fundación Tierra, CPMGA, Acción Cultural Loyola and the Centro de Investigación y Promoción del Campesinado. The last two are closely tied to the Catholic Church in Bolivia.
6. Strategic gender needs are those that allow women to challenge their subordination within the gendered division of labor and gendered structures of power more generally, and range from equal rights legislation to reproductive choice. See Maxine Molyneux, “Mobilisation Without Emancipation? Women’s Interests, State and Revolution in Nicaragua,” in David Slater, ed., New Social Movements and the State in Latin America (Amsterdam: CEDLA, 1985), 233–259.
Karin Monasterios P. is a sociologist and, until recently, a women’s studies professor at the Universidad Mayor de San Andrés, in La Paz, Bolivia. She is now an adviser on indigenous and gender issues to the Morales government. This article is an updated version of “The Women’s Movement,” which originally appeared in the October 2004 issue of Barataria, a quarterly journal based in La Paz. | <urn:uuid:4a78ad5c-c73c-451f-8316-a4a02f30b892> | CC-MAIN-2017-17 | http://nacla.org/news/bolivian-women%E2%80%99s-organizations-mas-era | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00060-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.940143 | 4,352 | 2.625 | 3 |
Everyone makes mistakes. In fact, as English learners, I imagine that you are aware that you constantly make mistakes with your English (which is okay if you learn from them).
But sometimes a mistake can be shown millions of times on Youtube. And that is exactly what happened to Russia’s goalkeeper Igor Akinfeev.
During the game against South Korea, the goalkeeper made a mistake which led to a goal. Here is the video:
Using Should Have for past expectations
What can we say about this? Well, the first thing to note is that he should have saved it. In fact, he should have easily saved it.
We expect the goalkeeper to save shots like that one. But he didn’t. And we use the construction should have + past participle to explain this. We use this construction when something that we expected to happen, didn’t happen. Here are more examples:
- I’m a little worried. My brother should have arrived over two hours ago.
- You shouldn’t have had any problems (with the computer). It worked perfectly for me.
Using Should Have for past advice
We also use should have when we’re talking about advisable actions in the past (actions that didn’t happen). For example, let’s say that you took an exam today and failed. You feel terrible, but know that you didn’t study hard enough. Your friends, if they are honest, will say:
“You should have studied harder.”
This is advice for the past. Here are more examples:
- I shouldn’t have eaten all those biscuits. I feel terrible now.
- Messi should have passed the ball, there were other players in better positions.
- He really shouldn’t have said that. I think he’ll regret it.
Over to You
Watch the following video, and then I want you to answer the question.
Question: Should the Spanish goalkeeper have done better? If so, what should he have done instead of punching the ball.
Question for those who don’t like football: Is there something that you should have done yesterday but didn’t do?
Example: I should have called my accountant, but I felt too lazy to do it.
Leave your answers below! | <urn:uuid:d685270c-9fd5-4c8a-a6c8-1c9481f8a27b> | CC-MAIN-2015-06 | http://www.jdaenglish.com/wce-should-have/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122108378.68/warc/CC-MAIN-20150124175508-00021-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.972229 | 485 | 3.390625 | 3 |
Sir Arthur Sullivan, in full Sir Arthur Seymour Sullivan (born May 13, 1842, London, England—died November 22, 1900, London), composer who, with W.S. Gilbert, established the distinctive English form of the operetta. Gilbert’s satire and verbal ingenuity were matched so well by Sullivan’s unfailing melodiousness, resourceful musicianship, and sense of parody that the works of this unique partnership won lasting international acclaim.
Sullivan was the son of an Irish musician who became bandmaster at the Royal Military College; his mother was of Italian descent. He joined the choir of the Chapel Royal and later held the Mendelssohn Scholarship at the Royal Academy of Music, London, where he studied under Sir W. Sterndale Bennett and Sir John Goss. He continued his studies at the Leipzig Conservatory.
In 1861 he became organist of St. Michael’s, London, and in the following year his music to The Tempest achieved great success at the Crystal Palace. Then followed his Kenilworth cantata (1864); a ballet, L’Île enchantée, produced at Covent Garden (where Sullivan was organist for a time); a symphony and a cello concerto; the In Memoriam and the Overtura di Ballo overtures; and numerous songs.
Sullivan’s first comic opera was his setting of Sir Francis Cowley Burnand’s Cox and Box (1867). An operetta, the Contrabandista, also on a libretto by Burnand, was produced in the same year. Thespis (1871), the first work in which Sullivan collaborated with Gilbert, met with little success when produced at the Gaiety Theatre. It was Richard D’Oyly Carte, then manager of the Royalty Theatre, who brought the two men together again in 1875; the result was Trial by Jury, which was originally put on as an afterpiece to an Offenbach operetta; it won instant popularity and ran for more than a year.
Carte thereupon formed the Comedy Opera Company, with a view to presenting full-length operettas by Gilbert and Sullivan. The first of these, The Sorcerer (1877), was followed by H.M.S. Pinafore (1878), whose eventual success was phenomenal, and The Pirates of Penzance (1879, New York City; 1880, London).
Theatrical Poster Collection/Library of Congress, Washington, D.C. (Digital file no. var 1766)During the run of Patience (1881), Carte transferred the production to his newly built Savoy Theatre, where the later operettas were presented. These were Iolanthe (1882), Princess Ida (1884), The Mikado; or, The Town of Titipu (1885), Ruddigore (1887), The Yeomen of the Guard (1888), and The Gondoliers (1889). The collective works of Gilbert and Sullivan became known as the “Savoy Operas.”
From time to time, Sullivan protested against the artificial nature of Gilbert’s plots; this led to a disagreement between them that came to a head when Sullivan supported Carte in a minor business dispute. Sullivan wrote his next opera, Haddon Hall (1892), to a libretto by Sydney Grundy. Subsequent collaboration with Gilbert, in Utopia Limited (1893) and The Grand Duke (1896), did not reach their former standard. Sullivan completed three other operettas: The Chieftain (1895), largely an adaptation of Contrabandista; The Beauty Stone (1898), with a libretto by Sir Arthur Wing Pinero and J. Comyns Carr; and The Rose of Persia (1889), with Basil Hood, who also wrote the libretto for The Emerald Isle, which was left unfinished by Sullivan and completed by Edward German.
Sullivan’s more classical compositions included The Prodigal Son (1869), The Light of the World (1873), The Martyr of Antioch (1880), The Golden Legend (1886), and the “romantic opera” Ivanhoe, written for the opening of the Royal English Opera House built by Carte in 1891. They were not maintained in the repertory, though they were acclaimed in their day. He also wrote many hymn tunes, including “Onward! Christian Soldiers,” and his song “The Lost Chord” attained great popularity.
In 1876 Sullivan accepted the principalship of the National Training School for Music (later the Royal College of Music), which he held for five years; he was active as a conductor, particularly at the Leeds Festivals from 1880 to 1898. He was knighted in 1883. | <urn:uuid:0e49f51b-8ce7-448d-85de-0b35031cc691> | CC-MAIN-2014-23 | http://www.britannica.com/print/topic/572930 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274289.5/warc/CC-MAIN-20140728011754-00094-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.971782 | 1,021 | 2.828125 | 3 |
Degree-day information indicates that alfalfa weevil larvae have hatched throughout Iowa. Proper management of this insect requires timely scouting, correct identification, determination of population levels, and if necessary, cultural or chemical control.
Fields should be scouted for alfalfa weevils because the larvae can be very destructive to first cutting alfalfa. They remove leaf tissue, beginning with the new leaves at the top of the plant, then work down the stem to other leaves. This feeding reduces forage quality and quantity.
Scouting should begin at approximately 200 degree days in fields south of I-80, and 250 degree days in fields north of this highway. The Iowa map (page 49) shows the accumulated degree days across the nine crop reporting districts. Scouting should be taking place now across all sections of Iowa. Begin by scouting on south-facing hillsides. Larvae hatch here first because these areas warm up more quickly than north hillsides.
When you first scout for alfalfa weevil larvae, save some time by using a sweep net to quickly and easily determine whether larvae have hatched in the field. If larvae are found in the net, then collect 30 stems and look for larvae in the upper leaves. When collecting stems, do not break them too hard or you will dislodge larvae still on the plant. The best way to collect the most larvae is to grab the tip of the plant with one hand and break the base of the stem with the other hand, or cut it with a knife. Place stems inside a white, 5-gallon bucket and beat them against the side. Large larvae are knocked loose and can be counted easily, but newly developing leaves must be pulled apart to find very small, newly hatched larvae hidden in the plant tip.
Alfalfa weevil larvae have a very dark head, almost black, and are pale green with a white stripe down the back. They are approximately 1/16 inch in length when they hatch and may be light yellow. After feeding for several days, they turn green. They are 5/16 inch in length when full grown.
||Alfalfa weevil are small; less than 5/16-inch long.
||Alfalfa weevil larvae skeletonize leaves at the top of the plant.
Alfalfa weevil larvae may be confused with larvae of the clover leaf weevil that are much larger, have a light brown head, and often have the white stripe edged with pink. Clover leaf weevil larvae usually hide around the base of the plant during the day and feed mostly in lower leaves at night. They rarely cause economic yield losses and should not be counted as part of the alfalfa weevil sample.
||Clover leaf weevil larvae may be common around the base of alfalfa stems but they rarely cause economic damage.
New economic thresholds have been developed and appear in ISU Extension publication IPM 58, Integrated Pest Management of Alfalfa Insects in the Upper Midwest. This publication was developed by entomologists from several universities in cooperation with the Leopold Center for Sustainable Agriculture. Measure the plant height, then determine the average number of weevil larvae per stem based upon a 30-stem count before consulting
Table 1. The economic threshold depends on crop height, estimated value of the crop, control costs, and the growing conditions stated in Table 1. Several insecticides labeled for weevils are shown in Table 2.
Table 1. Economic thresholds based on alfalfa weevil larvae per stem (calculated from a 30-stem sample).a
||Reevaluate in 4 days. If damage and larval numbers are increasing a long residual insecticide is recommended to prevent severe yield loss.
||If alfalfa is in vegetative stages, a short residual insecticide should be used.
||If >60 percent of alfalfa is in the bud stage, harvest is recommended. Evaluate stubble after harvest. If not scheduled to be cut within 7-10 days, a short residual insecticide is recommended.
a Use the smaller threshold if alfalfa is drought stressed or control costs are relatively low ($7-10 per acre). Use larger threshold if rainfall is abundant, diseased larvae are present, or control costs are relatively high ($11-14 per acre).
Table 2. Insecticides labeled for alfalfa weevil.
||Rate per Acre (High & Low Rates)
||Harvest Interval (days)
This article originally appeared on pages 48-49 of the IC-484 (6) -- April 24, 2000 issue. | <urn:uuid:787fe03a-341d-4b2d-b849-479659032936> | CC-MAIN-2016-18 | http://www.ipm.iastate.edu/ipm/icm/2000/4-24-2000/scoutalf.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123845.65/warc/CC-MAIN-20160428161523-00179-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.889572 | 956 | 3.28125 | 3 |
The title Guard is the honor bestowed to the ships or units forthe skill and heroism demonstrated in battles. The Guard was born on September 18, 1941 when divisions ## 100, 127, 153were renamed into the First, the Second and the Third Guard Divisions respectively. The First Guard tank brigade appeared on November 11, 1941 on the base of 4th tank brigade. On November 26, 1941 first Guard cavalry units were formed, on December 6,1941 - the First Air Force unit.
In many cases the unit simultaneously received a name usually related to place of the heaviest battles for which it was honored, like Kantemirovskaja Guard Division, Tamanskaja and many others. It happened often but not necessarily. Giving a name to the unit was the lowest honor. After receiving a name the unit could be (or could be not) honored The Guard later. As a rule, the individual units were honored The Guards when the top level unit was, i.e. if a bridade was transformed into the Guard brigade, the units it comprised were re-numerated and renamed The Guards.
|Extract from the Order of the
Supreme Command and Government on the Flag of the Guard troops:
... The Guard Red Banner obliges all personnel of the Guard Armies and Corps to be an example for all other formations and units of the Red Army.
The special emblem was adopted on May 21, 1942
The original unit's number remained free and later could be assigned to a newly formed unit (Armies of the second formation, to give an example).
The units with Katjushas (reactive artillery) were also attached to the Guards. A newly formed division, brigade or corps was also named Guard if one of the units included in it was awarded the Guards before.
Being the elite troops, the Guards were used in the most important operations.
During the war, The Guard titel was awarded to 6 tank Armies, 12 tank corps, 66 tank divisions and many other units.
Back to the main index Back to the section index | <urn:uuid:36265943-4394-4c46-bd18-4402b90b9268> | CC-MAIN-2021-43 | http://pkka.narod.ru/guards.htm | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00263.warc.gz | en | 0.976509 | 424 | 3.21875 | 3 |
"We literally could not have fought this war without women."
That's what John Nagl, a retired lieutenant colonel, recently said about the contributions of female soldiers in Iraq and Afghanistan. Yet he could just as easily have been commenting on World War I -- a victory supported by over 30,000 women -- and the tipping point for women's right to vote. After decades of battling for suffrage, it was the role of women during war which President Wilson acknowledged in 1918: "We have made partners of the women in this war. Shall we admit them only to a partnership of suffering and sacrifice and toll and not to a partnership of right?"
Today, as we celebrate the 19th Amendment and Women's Equality Day, thousands of women continue to partner with men as soldiers overseas. These courageous women have sacrificed to serve their nation -- and through their participation, have proved not only the quality of women's contributions in war, but the necessity of their involvement.
As World War I ushered in a new era of equality for women because of their service, the wars in Iraq and Afghanistan present us with a similar opportunity. Indeed, we stand at the next frontier of justice for our nation's women: equal participation in leadership -- not only within the military -- but throughout our democracy and its institutions.
Twenty-first century warfare has transformed the frontlines, and military leaders have circumvented policy to bring women onto the battlefield in order to confront these challenges. Several years into war, it is clear that the gamble has paid off. Representative John McHugh, who previously supported restricting women in combat zones, recently said in the New York Times, "Women in uniform today are not just invaluable," he said, "they're irreplaceable."
Just as women have proven priceless on the war front -- their leadership is equally needed on the domestic front.
Our current situation here in the States -- from the flailing economy to the incredible loss of jobs and homes to the failure of services for those in need - threatens not only our national security, but the security of individuals and families every day. Enlisting our nation's women to serve as leaders here on the domestic front is critical to our success.
As the upcoming White House Project Report: Benchmarking Women's Leadership illustrates, women are desperately needed on the frontlines of our institutions and government, where decision-makers are determining the nature and direction of our economics, our politics, and our society as a whole. In every sector, women are woefully short of parity in the highest eschelons of leadership; they are only 17 percent of Congress, 17 percent of law firm partners, 18 percent of news publishers, and a mere 3 percent of Fortune 500 CEOs. When they do get to the top, they continue to earn far less than their male counterparts -- on average, the wage gap persists at 73 percent. Among women of color, both positions of leadership and salary are even less.
Some might say that the challenges America faces far exceeds the issue of gender parity. Yet without women's vision and voices, we can never effectively solve the crises that confront us. As we learn from the battlelfeld, diversity in our leadership - with women leading alongside men - is the only way we can succeed. And unlike women's participation in combat, there is no law prohibiting women from being at the frontlines of leadership -- from executive boards and judicial seats to the helms of our media and academic arenas. We need only the political and social will to do so.
Through women's service in war -- the most masculine of our endeavors -- our quest for equality advanced greatly a near century ago. Today, women still stand ready to serve, and in Iraq and Afghanistan, leaders placed their trust in women to lead. It is time we do the same at home.
Follow Marie Wilson on Twitter: www.twitter.com/twhp | <urn:uuid:1300b26a-e9b2-4bd0-aa68-806724bccd28> | CC-MAIN-2013-20 | http://www.huffingtonpost.com/marie-wilson/the-battlefield-to-the-do_b_269181.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708145189/warc/CC-MAIN-20130516124225-00012-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962901 | 786 | 2.921875 | 3 |
A Grin Without a Cat
“Well! I’ve often seen a cat without a grin,” thought Alice; “but a grin without a cat! It’s the most curious thing I ever saw in my life!”
(ALICE’S ADVENTURES IN WONDERLAND, LEWIS CARROLL)
Alice’s trip into Wonderland would become curioser and curioser… just like our own trip into the reality-distortion field of the psychopath, a real-life Cheshire Cat with nothing at all behind his grin.
Alice’s story was fictional and based on a wild dream. But many of the experiences we had–and the messages they hold for us–are remarkably similar to hers.
The Cheshire Cat is unique among Wonderland creatures. Threatened by no one, it maintains a cool, grinning outsider status. The Cheshire Cat has insight into the workings of Wonderland as a whole. Its calm explanation to Alice that to be in Wonderland is to be “mad” reveals a number of points that do not occur to Alice on her own. The Cheshire Cat points out that Wonderland is ruled by nonsense, and as a result, Alice’s normal behavior is inconsistent with its operating principles, so Alice herself becomes “mad” in the context of Wonderland.
(SparkNotes Editors. “SparkNote on Alice’s Adventures in Wonderland.” SparkNotes LLC. 2005)
Illustration by John Tenniel
In the crazy, nonsensical world the psychopath created for us, we were made out to be the “mad” ones. When we return to the context of normality, we see things as they actually were. We were not the crazy ones.
In Wonderland, Alice encountered many puzzling things that seemed to have no clear explanation. Like the rest of us, Alice expected that the situations she encountered would make some kind of sense, but they repeatedly frustrated her ability to figure them out. Much like Alice, we tried to make the inexplicable fit into our own reality, but it did not work and only led us farther astray.
‘You see, a dog growls when it’s angry, and wags its tail when it’s pleased. Now I growl when I’m pleased, and wag my tail when I’m angry. Therefore I’m mad.’
‘I call it purring, not growling,’ said Alice.
‘Call it what you like,’ said the Cat.
The Cheshire Cat reminds us that we often came up with explanations for the perplexing things the psychopath said and did, to try and make them fit our image of them and the relationship. But no matter how we tried to excuse it, much of it was, well, mad.
The tension of Alice’s Adventures in Wonderland emerges when Alice’s fixed perspective of the world comes into contact with the mad, illogical world of Wonderland. Alice’s fixed sense of order clashes with the madness she finds in Wonderland… Her fundamental beliefs face challenges at every turn, and as a result Alice suffers an identity crisis.
We were made to feel desperate to understand and to fit into a world that made no sense; we became desperate for approval, for some sign that we were acceptable. It’s no wonder our “looking-glass selves” gave us an identity crises.
Even though you’re back on your side of the looking glass, you may still be stuck in that crisis. As Alice said, “It’s no use going back to yesterday, because I was a different person then.” Change and growth born from trauma is never easy, but it can be more than worthwhile. You may very well end up much “muchier” than you ever were before.
‘Please would you tell me,’ said Alice, a little timidly, for she was not quite sure whether it was good manners for her to speak first, ‘why your cat grins like that?’
‘It’s a Cheshire cat,’ said the Duchess, ‘and that’s why.'”
Often we have questions that persist, sometimes even for years. Why did he _________? Why did he say _______? There is no way to make sense of it. He did and said those things because he was a psychopath “and that’s why,” as the Duchess said. Although Alice’s experiences lend themselves to meaningful observations, they resist a single, rational and comprehensible interpretation. So do ours. Instead of trying to make sense of each nonsensical detail, look at the big picture. That is where answers and meaning are found.
If you plot your course in detail, you stand a much better chance of seeing when things have taken a wrong turn… even if it happens very gradually, as these things tend to do. What do you want from a relationship? How do you want to feel? What do you want in a partner? And what don’t you want?
With your experience behind you, you will be able to answer these questions. Chances are good that the psychopath you were involved with taught you exactly what you want and don’t want in a future relationship.
‘I wish you wouldn’t keep appearing and vanishing so suddenly: you make one quite giddy.’
‘All right,’ said the Cat; and this time it vanished quite slowly,
beginning with the end of the tail,
and ending with the grin,
which remained for some time after the rest of it had gone.
When you truly understand there was nothing real or solid behind it, that grin will finally disappear.
“Excellent, excellent book! It brought me understanding and closure!”
“Invaluable. Having been in a relationship with a psychopath for many years, I desperately needed some insight into what had happened and why. I have gained a tremendous amount of strength and knowledge toward healing from years of abuse by reading this book. One of the best.”
“Five Stars. Very helpful.”
“Insightful and informative!”
“The BEST Manual on how to protect yourself from becoming a victim again…
“This small book was full of tons of useful information. I don’t usually write in my books, but my copy of Boundaries has underlining on almost every page. I was really glad I bought it.”
“My eyes have seen the light. How I wish I would have read this book years ago.”
“”Worth your time! Well written, clear, and concise. So thankful I came across this quick, but powerful read. I so appreciate the wisdom I found in this writing. I feel empowered once more! Easily rated at 5 stars.” | <urn:uuid:9aa0ac1b-8e80-4373-a802-7866d6817f00> | CC-MAIN-2017-26 | http://psychopathsandlove.com/grin-without-a-cat/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00187.warc.gz | en | 0.965858 | 1,465 | 2.8125 | 3 |
Today is Thursday, May 18, the 138th day of 2017. There are 227 days left in the year.
Today’s Highlight in History:
On May 18, 1927, in America’s deadliest school attack, part of a schoolhouse in Bath Township, Michigan, was blown up with explosives planted by local farmer Andrew Kehoe, who then set off a bomb in his truck; the attacks killed 38 children and six adults, including Kehoe, who’d earlier killed his wife. (Authorities said Kehoe, who suffered financial difficulties, was seeking revenge for losing a township clerk election.) | <urn:uuid:08c4597e-5bcd-469b-a2c8-6ad37243444c> | CC-MAIN-2018-17 | https://tylershepard1991.wordpress.com/2017/05/18/today-in-history-may-18-2017/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945484.57/warc/CC-MAIN-20180422002521-20180422022521-00187.warc.gz | en | 0.978944 | 126 | 2.53125 | 3 |
Many people experience racist behaviour.
The Challenging Racism Project has found that 20 per cent of Australians surveyed had experienced racial discrimination in the form of race hate talk, and about 5 per cent had been attacked because of their race.
According to the Scanlon Foundation’s Mapping Social Cohesion survey in 2016, 20 per cent of Australians had experienced racial or religious discrimination during the past 12 months.
Some groups experience racism at higher rates. Aboriginal and Torres Strait Islander people, and those from culturally diverse backgrounds, often have to deal with systemic forms of discrimination. Such experiences limit the access that members of these groups enjoy to the opportunities and resources offered to many people from Anglo-Australian backgrounds.
Migrants and refugees also regularly experience racism, in particular those who have recently arrived. Media reports and commentary that use negative stereotypes about refugees and migrants can fuel prejudice against these groups in the wider community.
Find our more. Visit the Racism. It Stops With Me website.
Who experiences racism? (PDF)
Who experiences racism? (Word) | <urn:uuid:02bc408a-daaf-4d1b-8541-86ddfd0bc0cc> | CC-MAIN-2023-50 | https://humanrights.gov.au/our-work/education/who-experiences-racism | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00625.warc.gz | en | 0.961169 | 218 | 3.265625 | 3 |
Any time there's a peak in the spread of a disease, some of us turn to movies about pandemics or zombies to pass some of our time. Maybe we want to watch our fears play out in a less scary place (outside of our own minds), or, perhaps we try to purposefully scare ourselves. But, in some cases, the movies we turn to may actually be educational.
Contagion is a movie that was released in 2011 with a star-studded cast, that follows as a fiercely contagious disease spreads across the world in a pandemic. While there are many things in the story that bend (or break) the truth, there are also some great moments where the film is educational. So, exactly how accurate is Contagion and can it teach us anything about real pandemics? Let's take a look at some of the different information included and how it measures up.
1. Ro - "For every person who gets sick, how many other people are they likely to infect?" This number, posed as a question by Kate Winslet's character in the movie, is what is called the "R naught," or "R-O." It is a measure of the reproductive rate of the virus, which can affect how quickly and easily it can spread. She gives a great run down of some of the factors that are at play in figuring out this number, including the incubation period, the contagious period, and the size of the susceptible population. When an Ro is below 1, it means an infection will die out. When it's above 1, an outbreak or pandemic can occur. However, human behavior can have a huge effect on this value. If people socially distance themselves during an outbreak and follow recommended guidelines to avoid infection and spreading of the disease, they can reduce the Ro.
2. The work of epidemiologists - In the movie, Kate Winslet works to try to trace the spread of the vaccine ("contact tracing"), to advise people who may have been exposed, and to work to try to figure out the risks that the disease poses at any given time. Epidemiologists are, in fact, sort of like disease detectives, and they may do some of these tasks, in addition to others; sounds like a pretty interesting biology-based career.
3. The timeline - Contagion tends to alter time the way that many movies may do, to make things more urgent or easier to show. First off, we've never experienced a virus that spread as quickly or easily as MEV-1 in the movie.
This was certainly to add a chilling, dramatic effect for viewers. Additionally, how quickly the epidemiologists were able to understand the structure and genome of the virus was pretty far-fetched; lots of these scientific developments take time. The way Gwyneth Paltrow's character was spreading the germs was also on the wrong timeline, at least partly. While she could have spread the germs on her hands to others right away, the virus needs to incubate and spread through her body over time before the germs could be passed through her breath, a sneeze, or a cough.
4. The vaccine - The vaccine development is also a bit unbelievable; while there have been cases in the past where doctors or researchers have exposed themselves (or others) to vaccines or biological organisms or agents to test the outcomes in a quicker fashion, this is a highly unsafe practice. The movie also makes it seem like the vaccine is only tested by the developer who injects it in her own body. But vaccines go through rigorous testing in many, many human subjects before they can be released to the rest of the world.
5. The jump - (Spoiler alert) At the end of the movie, the jump from non-human animal into humans is traced back to a tropical area where forest was bulldozed to clear land. A bat that had been driven out by this action ends up dropping part of a banana in the middle of a pig barn, which a pig eats. That pig is later eaten in a restaurant and the chef preparing it passes the MEV-1-causing microbes along. While this seems like a convenient "just-so" story, such a chain of events could be likely for spreading diseases normally carried by wild animals. Another common way a disease that jumps from animals to humans (called zoonotic diseases) could be introduced to humans is by humans eating wild animals.
6. Personal Protective Equipment - One last thing we will highlight. In the movie, you see a wide range of equipment that health staff and others use to protect themselves while working with patients or on the disease; some wear only a thin mask and goggles, while others have a full hazard suit on. There are often gaps or lacks in the equipment provided to health care staff during outbreaks. Any illness that can be airborne or airosolized (turned into a fine spray, such as in a sneeze) and infect others that way should inspire health care workers to wear more heavy-duty masks to protect from fine spray. However, in some outbreaks, and as we've see in the COVID-19 outbreak, that equipment isn't always as available as it should be.
All in all, Contagion could be viewed as an entertaining and somewhat educational movie to watch with students interested in the spread of disease. We also have a Contagion worksheet, to help you pay more attention to the information being offered as you or your students watch the movie. If your students need some basics on viruses in general and how our immune systems fight them off, make sure to also visit Viral Attack.
The most important take-away at this time may be that human behavior (e.g., going out when you are sick, not washing your hands enough or after handling certain items, not socially distancing yourself when it is recommended, not using safe practices when interacting with others, etc.) is often the difference between if the spread of a disease is an outbreak, or a pandemic.
For those wanting to learn more and follow along with Coronavirus developments, Ask A Biologist has found the following resources very helpful:
1. Educational video by Kurzgesagt - In a Nutshell: The Coronavirus explained & what you should do
2. One of the most up-to-date Coronavirus case maps showing the numbers of confirmed cases across the globe (and split into counties within the US), from the University of Virginia.
3. For how to respond and how to act, visit the WHO's Coronavirus advice to the public.
4. For the most up-to-date testing and case numbers, visit the COVID Tracking Project.
The Contagion worksheet was created by Mark Friedman, a Los Angeles High School Physio-anatomy teacher and member of the International Society for Evolution, Medicine and Public Health (www.EvMed.org).
Have a different answer or more to add to this one? Send it to us.
Dr. Biology. (2020, March 19). How realistic is the movie Contagion?. ASU - Ask A Biologist. Retrieved March 21, 2023 from https://askabiologist.asu.edu/questions/contagion-movie
Dr. Biology. "How realistic is the movie Contagion?". ASU - Ask A Biologist. 19 March, 2020. https://askabiologist.asu.edu/questions/contagion-movie
Dr. Biology. "How realistic is the movie Contagion?". ASU - Ask A Biologist. 19 Mar 2020. ASU - Ask A Biologist, Web. 21 Mar 2023. https://askabiologist.asu.edu/questions/contagion-movie
By volunteering, or simply sending us feedback on the site. Scientists, teachers, writers, illustrators, and translators are all important to the program. If you are interested in helping with the website we have a Volunteers page to get the process started. | <urn:uuid:caac0169-45ab-4e4b-8672-4834ffdb017f> | CC-MAIN-2023-14 | https://askabiologist.asu.edu/questions/contagion-movie | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00021.warc.gz | en | 0.96552 | 1,656 | 3.25 | 3 |
CAMP RESOLUTION. Camp Resolution was the name given to four camps occupied by the main body of the Texan Santa Fe expedition from August 30 through September 18, 1841. The first camp was near the junction of Quitaque and Los Lingos creeks in northwest Motley County, 5½ miles northwest of the site of present Flomat. This camp was used August 30 through September 3rd. Camp Resolution No. 2, used September 3 through September 5, was on the south side of Quitaque Creek, about where Ranch Road 1065 crosses the creek, in extreme northeast Floyd County. Camp No. 3, used from September 5 through 14, was a half mile above No. 2. No. 4 was three-quarters of a mile above No. 3 and was occupied from September 14 through September 18.
"Clayton Erhard's Reminiscences of the Santa Fe Expedition, 1841," Southwestern Historical Quarterly 66 (April 1963).
The following, adapted from the Chicago Manual of Style, 15th edition, is the preferred citation for this article.Art Leatherwood, "CAMP RESOLUTION," Handbook of Texas Online (http://www.tshaonline.org/handbook/online/articles/qcc55), accessed October 05, 2015. Uploaded on June 12, 2010. Published by the Texas State Historical Association. | <urn:uuid:0738081b-1ff1-45e9-a810-a222514c7fef> | CC-MAIN-2015-40 | https://www.tshaonline.org/handbook/online/articles/qcc55 | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677497.37/warc/CC-MAIN-20151001215757-00197-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.963123 | 283 | 2.953125 | 3 |
Mary Hyland, age 15, of Visalia, Calif., f'or her question;
Why does a silkworm make silk?
The silkworm does not plan to make luxury material for blouses, dresses, hose and ribbons. He spins golden thread to make a cozy blanket for himself. He is a cocoon‑building; insect and he plans to sleep through his pupa stage cuddled in his silken basket. Plenty of other insects spin silken cocoons, but their thread is too fragile to be woven into cloth. The silkworm's ancestors have been cultivated for thousands of years. He is so pampered that he could not possibly survive in the wild.
Lets follow his life story from egg to cocoon. Chances are, he lived in Japan, where most of the world's silk is cultivated. His mother was a drab, brownish moth and he was one of a brood of 400 little white eggs. A silk farmer bought an ounce of these eggs, about 40,000 of them. Out little egg was taken along with the rest to a hillside farm where a grove of mulberry trees clustered around the house.
In a few days, the little white egg hatched to find himself in the farmer’s living room. He was on a straw tray with a sheet of perforated paper above his head. He was, of course, a caterpillar and he measured. one eighth of an inch and was no fatter than a hair. But he knew just what to do. He crawled up through a hole in the paper and found a meal of minced young mulberry leaves there waiting for him. Soon he was joined by his brothers and sisters. Some were carefully separated and put into other trays racked around the walls,
For a whole month, the farmer, his wife and three children pampered those caterpillars with loving care. The room was kept warm, well aired and quiet. There were no drafts and no direct sunshine. Always there were trays to be cleaned and mulberry leaves to be served. At the end of the month, the silkworms had made 130 pounds of cocoons which were processed into twelve pounds of raw silk,
On his first day, our little silkworm ate three times his weight in mulberry leaves. He enjoyed life on his crisp, clean tray and he ate and grew and grew. He was given six meals during the day and three during the night. The farmers house was filled with a sound like pattering rain, the noise of 40,000 hungry, munching caterpillars.
Four times the hungry little fellow. grew too big for his skin. The old skin cracked and fell away leaving a larger one underneath. When he was almost four weeks old, the silkworm was a fat fellow over three inches long. He ate one last big meal and grew restless. The farmer saw him roaming around with his head stretched up in the air and knew just what to do.Caterpillar days were over and it was time now to go to sleep. The farmer put a slatted frame over the tray. The silkworm reached up and got ready to spin his blanket. The silken thread came out of spinnerets under his chin.. It was a gooey thread which dried in the air as he spun, The little fellow wove the thread into figure eights with his back arched almost double, The farmer took the cocoon along with those woven by his brothers and sisters. The thread was gently unwound and spun into silken cloth. | <urn:uuid:87e4e43b-5ddb-4b6a-9be0-28b68f25fa9f> | CC-MAIN-2017-34 | http://www.youaskandy.com/questions-answers/article-series-1950/17462-why-does-a-silkworm-make-silk.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103910.54/warc/CC-MAIN-20170817185948-20170817205948-00049.warc.gz | en | 0.991813 | 729 | 3.140625 | 3 |
In the city, plants help to make a space more liveable by making it appear more natural. Trees, for example, often serve several architectural and engineering functions. They provide privacy, emphasize views or screen out objectionable views. They reduce glare, noise and reflection. Trees direct pedestrian traffic. They provide background to and soften, complement, or enhance architecture. Also larger forested areas within a city help process carbon dioxide on top of being leisure spots.
I am interested in, is the way nature evolves in a planned, stationary environment - the unplanned in relation to the planned. Asphalt, concrete, fences and such do not develop on their own, they are static. Nature has to overcome their physical presence. In doing so, a movement is registered; of how being overcame non-being (leaning over it, going through picked fences, nesting in walls).
"When people can meet each other more easily, they are more inclined to become a community" - Judith Leober, architect / town planner.
This socialist way of thinking together with the mentality of rationalism (rations and portions being part of dystopian theory) gave way to the maximums of minimum. Berthold Lubetkin (German socialist architect) condemned the desire for Gemütlichkeit (coziness, well-being) as a lack of civic valour and aimed to create an Eldorado for the working classes by marching side by side with them.
"High density" looks in to the history of developing the modern living space.
limited edition zine | <urn:uuid:5e69c3dc-57b6-4052-b669-313c780fc98d> | CC-MAIN-2020-34 | http://mattiasmalk.com/density-existenzminimum/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735836.89/warc/CC-MAIN-20200803224907-20200804014907-00403.warc.gz | en | 0.942543 | 315 | 2.53125 | 3 |
NTP provides a distributed time synchronization service that distributes time traceable to an accurate time source. The ntpsetup script configures and runs NTP on your system. You can use ntpsetup to initially set up your NTP configuration or to change your current NTP configuration.
The ntpsetup script sets up an NTP client or a local NTP server which will use other NTP servers as its time source. You can not use ntpsetup to set up a local NTP server as a local reference clock.
Before running ntpsetup, make sure that your system is connected to a local area network, and that the network software is configured and running. Also, use the /usr/bin/ntp command to check that each system that your system specifies as an NTP server is running NTP.
The ntpsetup script prompts you for the names of the systems that your system will use as NTP servers. If a system that you specify is not in your local /etc/hosts file, you must specify the server's IP address. The ntpsetup script also prompts you for the name of the NTP daemon running on each server (xntpd or ntpd). If you are uncertain which daemon is running on a particular server, choose ntpd.
Tru64 UNIX also provides support for the timed daemon for compatibility.
Digital recommends you use NTP for time synchronization.
If you plan to run both the timed daemon and NTP, you should configure NTP first. If you configure the timed daemon before configuring NTP, ntpsetup notifies you. If you continue with the ntpsetup, it deletes the timed daemon configuration. You must then reconfigure the timed daemon.
Specifies the command pathname Specifies NTP parameters pertinent to a specific system NTP configuration file
Commands: ntp(1), ntpdate(8), ntp_intro(7), ntpq(8), xntpd(8), xntpdc(8).
Network Administration delim off | <urn:uuid:f9893ad1-18e5-4454-b724-7ef17592e0f8> | CC-MAIN-2017-43 | https://backdrift.org/man/tru64/man8/ntpsetup.8.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824471.6/warc/CC-MAIN-20171020230225-20171021010225-00705.warc.gz | en | 0.797503 | 447 | 2.90625 | 3 |
De Gaulle, Charles
De Gaulle, Charles 1890-1970
Charles de Gaulle was the leading French statesman of the twentieth century. His military career spanned both world wars and his political career, interrupted by a temporary retreat from public affairs in the 1950s, occurred during the hardships of the 1940s and then a number of serious challenges to political stability in the 1960s. As a military commander, he advocated an aggressive, tactical approach to warfare; as a politician, he was often careful in internal matters but more outspoken in international affairs.
De Gaulle was raised in a Roman Catholic family, and at an early age he showed an interest in military affairs. He entered the Military Academy of Saint-Cyr at the age of nineteen and then joined the military in 1913, commissioned as a lieutenant. He fought in World War I (1914-1918), including at the famous 1916 battle at Verdun, and he spent almost three years as a prisoner of war. After the war, he taught at his alma mater and also attended the École Supérieure de Guerre (a war college). In 1925 Marshal Philippe Pétain (1856-1951) promoted him to the staff of the Supreme Defense Council. Two years later de Gaulle began serving as a major in the occupation army for the Rhineland, an experience that illustrated the German potential for military action. Although the French prided themselves on what they saw as the impenetrable Maginot Line, in 1933 de Gaulle wrote an article arguing for a professionalized and armored French army.
When World War II (1939-1945) began, de Gaulle was commander of a tank brigade. In 1940 he was promoted to brigadier general, a position he held until his death. In the same year, he became the French undersecretary of state for defense and war, but he left the government almost immediately when Pétain became head of the government and indicated that he wanted an armistice with the Germans. De Gaulle went to England, where he began to encourage the French to continue fighting the Germans. In August 1940 he was sentenced to death by a French military court for treason. Although de Gaulle had no political base, he was deeply committed to a free France. He formed a shadow government, eventually known as the Free French Forces, although his military background was not attractive to French liberals and his condemnation of the Pétain government meant that French conservatives held little regard for him. He also had problems with the Allies, often because of his strong commitment to a free France. De Gaulle maintained contact with French resistance groups, and he broadcast radio appeals to his fellow citizens, creating increased national recognition of his leadership.
In 1943 he moved to Algiers, Algeria, where he formed the French Committee of National Liberation. He served as co-president of the committee with Henri Giraud (1879-1949), but successfully moved Giraud out of the role, signaling his political abilities. In August 1944 de Gaulle returned to Paris with the victorious Allied armed forces; he refused to meet with the envoy Pétain sent to establish peace, and de Gaulle became head of the new French government.
De Gaulle resigned, however, in 1946 because of his dissatisfaction with the power of the various political parties that formed a new Fourth French Republic. For twelve years de Gaulle argued against the republic because he saw it as too similar to the Third French Republic, which he thought had been unable to govern effectively. He organized a loose party, the Rally of the French People, which became powerful enough to win a sizable number of seats in the French National Assembly, but he left the group in 1953. His political activity ended temporarily in 1955, when he began to work on his memoirs, but in 1958 he returned to public life.
By the end of the 1950s, France was embroiled in a military and political conflict in one of its colonies, Algeria. De Gaulle presented himself as a candidate for prime minister in 1958, and the National Assembly authorized him to change the French constitution; in December 1958 de Gaulle was elected president of France. His changes to the nation’s constitution strengthened the position of the presidency, including giving the president ruling powers during emergencies. Despite that centralization of power, de Gaulle supported the democratic principles of the government; he also made sure he was a highly visible and even personable president, spending a great deal of time giving addresses and speaking with individual citizens. De Gaulle’s ministers were often friends from World War II, and they assisted him in maintaining a strong presidency.
Algeria presented a very difficult set of problems when de Gaulle became president, a situation that deeply split French liberals and conservatives. The former argued for Algerian independence, while the latter advocated that Algeria ought to remain a colony. The Algerian insurrectionists wanted only freedom, and de Gaulle recognized that he had to free the country. French military leaders in Algeria, however, moved against de Gaulle, forming the Secret Army Organization and taking control of Algeria in 1961. This organization indicated that it was ready to actually attack France, but de Gaulle used his presidential powers to thwart them; French citizens and the French military sided with de Gaulle. Although the Secret Army Organization continued to fight de Gaulle, using bombings and assassinations, de Gaulle’s broad support resulted in his ability to establish Algeria’s independence in 1962.
Once the Algerian situation was settled, de Gaulle moved to other national issues, including reinvigorating the economy, developing France’s own atomic bomb, and instituting constitutional changes to establish independence for France’s other colonies. Nevertheless, the position that he held upon his election in 1958 was no longer as secure because he had solved the Algerian problem. He again turned to constitutional changes as a means to strengthen his position. Previously, an electoral college consisting of local politicians elected the president; in 1962 French citizens chose between de Gaulle’s resignation and a constitutional amendment that allowed direct election of the president. The referendum was a decisive victory for de Gaulle, and his party gained control of the National Assembly later that year. As a result, de Gaulle was able to further his plans to develop France into an international power, focusing on independent actions. For example, the year after his reelection as president in 1965, he withdrew France from the military branch of the North Atlantic Treaty Organization (NATO), although France remained part of the Atlantic Alliance, a political association.
In international affairs, de Gaulle sought to convince nations that neutrality was preferable to aggression, but that approach meant he was seen as opposing the United States because he wanted the United States to withdraw from Vietnam. He also encouraged stronger relations with the Soviet Union, Eastern European countries under Soviet rule, and the People’s Republic of China. De Gaulle argued that Europe had the potential to disengage from the influence of the United States. Internal strife, however, resulted in a serious weakening of de Gaulle’s position; in May 1968 university students and left-wing unionists in France nearly toppled the government, and de Gaulle had to return from an international trip to initiate a state of emergency. Although the coalition of leftist resistance quickly fragmented because the French Communist Party did not view the students as genuine radicals, de Gaulle did not emerge as a victor. French citizens opposed the rebellion and supported de Gaulle, but when in 1969 he again proposed a constitutional change, this time to reorganize the Senate, the voters rejected the proposal. De Gaulle resigned from the presidency, and Georges Pompidou (1911-1974), who had served as France’s prime minister from 1962 to 1968, became president. De Gaulle retired, planning to finish his memoirs; he died of a heart attack in 1970.
Charles de Gaulle’s stature, in France and internationally, seems to be readily apparent and yet resists interpretation. He was able to form a liberation army and government during World War II, and he brought France through the bloody war for independence in Algeria. Although he was at the center of so much military and political activity, he resisted personification of his work, asking his supporters not to use his name as a party identification; nevertheless, they were indeed known as Gaullists. His attempts to create an internationally independent France attracted a great deal of attention, but did not necessarily result in political influence.
Cogan, Charles. 1996. Charles de Gaulle: A Brief Biography with Documents. Boston: Bedford.
De Gaulle, Charles. 1971. Memoirs of Hope: Renewal and Endeavor. Trans. Terence Kilmartin. New York: Simon and Schuster.
Lacouture, Jean. 1990-1992. De Gaulle. 2 vols. Trans. Patrick O’Brian and Alan Sheridan. New York: Norton.
Peyrefitte, Alain. 1994-2000. Cétait de Gaulle. 3 vols. Paris: Editions de Fallois, Fayard.
Williams, Charles. 1993. The Last Great Frenchman: A Life of General de Gaulle. London: Little, Brown.
Philo A. Hutcheson
"De Gaulle, Charles." International Encyclopedia of the Social Sciences. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/social-sciences/applied-and-social-sciences-magazines/de-gaulle-charles
"De Gaulle, Charles." International Encyclopedia of the Social Sciences. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/social-sciences/applied-and-social-sciences-magazines/de-gaulle-charles
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Charles André Joseph Marie De Gaulle
Charles André Joseph Marie De Gaulle
The French general and statesman Charles André Joseph Marie De Gaulle (1890-1970) led the Free French forces during World War II. A talented writer and eloquent orator, he served as president of France from 1958 to 1969.
Charles De Gaulle was born on Nov. 23, 1890, in the northern industrial city of Lille. His father, Henri, was a teacher of philosophy and mathematics and a veteran of the Franco-Prussian War of 1870, in which the Prussians humiliatingly defeated what the French thought was the greatest army in the world. This loss colored the life of the elder De Gaulle, a patriot who vowed he would live to avenge the defeat and win back the provinces of Alsace and Lorraine. His attitude deeply influenced the lives of his sons, whom he raised to be the instruments of his revenge and of the restoration of France as the greatest European power.
From his earliest years Charles De Gaulle was immersed in French history by both his father and mother. For many centuries De Gaulle's forebears had played a role in French history, almost always as patriots defending France from invaders. In the 14th century a Chevalier de Gaulle defeated an invading English army in defense of the city of Vire, and Jean de Gaulle is cited in the Battle of Agincourt (1415).
Charles's great-great-grandfather, Jean Baptiste de Gaulle, was a king's counselor. His grandfather, Julien Philippe de Gaulle, wrote a popular history of Paris; Charles received this book on his tenth birthday and, as a young boy, read and reread it. He was also devoted to the literary works of his gifted grandmother, Julien Philippe's wife, Josephine Marie, whose name gave him two of his baptismal names. One of her greatest influences upon him was her impassioned, romantic history, The Liberator of Ireland, or the Life of Daniel O'Connell. It always remained for him an illustration of man's resistance to persecution, religious or political, and an inspiring example he emulated in his own life.
Perhaps the major influence on De Gaulle's formation came from his uncle, also named Charles de Gaulle, who wrote a book about the Celts which called for union of the Breton, Scots, Irish, and Welsh peoples. The young De Gaulle wrote in his copybook a sentence from his uncle's book, which proved to be a prophecy of his own life: "In a camp, surprised by enemy attack under cover of night, where each man is fighting alone, in dark confusion, no one asks for the grade or rank of the man who lifts up the standard and makes the first call to rally for resistance."
De Gaulle's career as defender of France began in the summer of 1909, when he was admitted to the elite military academy of Saint-Cyr. Among his classmates was the future marshal of France Alphonse Juin, who later recalled De Gaulle's nicknames in school—"The Grand Constable," "The Fighting Cock," and "The Big Asparagus."
After graduation Second Lieutenant De Gaulle reported in October 1912 to Henri Philippe Pétain, who first became his idol and then his most hated enemy. (In World War I Pétain was the hero of Verdun, but during World War II he capitulated to Hitler and collaborated with the Germans while De Gaulle was leading the French forces of liberation.) De Gaulle led a frontline company as captain in World War I and was cited three times for valor. Severely wounded, he was left for dead on the battlefield of Verdun and then imprisoned by the Germans when he revived in a graveyard cart. After he had escaped and been recaptured several times, the Germans put him in a maximum security prison-fortress.
After the war De Gaulle went to general-staff school, where he hurt his career by constant criticism of his superiors. He denounced the static concept of trench warfare and wrote a series of essays calling for a strategy of movement with armored tanks and planes. The French hierarchy ignored his works, but the Germans read him and adapted his theories to develop their triumphant strategy of blitzkrieg, or lightning war, with which they defeated the French in 1940.
When France fell, De Gaulle, then an obscure brigadier general, refused to capitulate. He fled to London, convinced that the British would never surrender and that American power, once committed, would win the war. On June 18, 1940, on BBC radio, he insisted that France had only lost a battle, not the war, and called upon patriotic Frenchmen to resist the Germans. This inspiring broadcast won him worldwide acclaim.
Early Political Activity
When the Germans were driven back, De Gaulle had no rivals for leadership in France. Therefore in the fall of 1944 the French Parliament unanimously elected him premier. De Gaulle had fiercely opposed the German enemy, and now he vigorously defended France against the influence of his powerful allies Joseph Stalin, Winston Churchill, and Franklin Roosevelt. De Gaulle once stated that he never feared Adolf Hitler, who, he knew, was doomed to defeat, but did fear that his allies would dominate France and Europe in the postwar period.
By the fall of 1945, only a year after assuming power, De Gaulle was quarreling with all the political leaders of France. He saw himself as the unique savior of France, the only disinterested champion of French honor, grandeur, and independence. He despised all politicians as petty, corrupt, and self-interested muddlers, and, chafing under his autocratic rule, they banded against him. In January 1946, disgusted by politics, he resigned and retreated into a sulking silence to brood upon the future of France.
In 1947 De Gaulle reemerged as leader of the opposition. He headed what he termed "The Rally of the French People," which he insisted was not a political party but a national movement. The Rally became the largest single political force in France but never achieved majority status. Although De Gaulle continued to despise the political system, he refused to lead a coup d'etat, as some of his followers urged, and again retired in 1955.
Years as President
In May 1958 a combination of French colonials and militarists seized power in Algeria and threatened to invade France. The weakened Fourth Republic collapsed, and the victorious rebels called De Gaulle back to power as president of the Fifth Republic of France. From June 1958 to April 1969 he reigned as the dominant force in France. But he was not a dictator, as many have charged; he was elected first by Parliament and then in a direct election by the people.
As president, De Gaulle fought every plan to involve France deeply in alliances. He opposed the formation of a United States of Europe and British entry into the Common Market. He stopped paying part of France's dues to the United Nations, forced the NATO headquarters to leave France, and pulled French forces out of the Atlantic Alliance integrated armies. Denouncing Soviet oppression of Eastern Europe, he also warned of the Chinese threat to the world. He liberated France's colonies, supported the Vietnamese "liberation movement" against the United States, and called for a "free Quebec" in Canada.
De Gaulle had an early success in stimulating pride in Frenchmen and in increasing French gold reserves and strengthening the economy. By the end of his reign, however, France was almost friendless, and his economic gains had been all but wiped out by the student and workers protest movement in spring 1968.
De Gaulle ruled supreme for 11 years, but his firm hand began to choke and then to infuriate many citizens. In April 1969 the French voted against his program for reorganizing the Senate and the regions of France. He had threatened to resign if his plan was rejected and, true to his word, he promptly renounced all power. Thereafter De Gaulle remained silent on political issues. Georges Pompidou, one of his favorite lieutenants, was elected to succeed him as president. Charles De Gaulle died at Colombey-les-Deux-Églises on Nov. 9, 1970.
De Gaulle's War Memoirs (3 vols., 1954-1959; trans. 1955-1960) is available in a single volume as The Complete War Memoirs of Charles de Gaulle (1964). The first volume of his postwar memoirs is Memoirs of Hope (trans. 1971). His The Edge of the Sword (1959; trans. 1960) is a personal credo on the qualities of leadership. Jean Lacouture, De Gaulle (1964; trans. 1966), is one of the best biographies, written by an astute French observer. Jean R. Tournoux, Pétain and De Gaulle (1964; trans. 1966), is a study of the relationship of the two men from World War I. A biography in three parts, examining De Gaulle's roles as soldier, savior of his nation, and statesman, is David Schoenbrun, The Three Lives of Charles de Gaulle (1966). Other more specialized studies include Jacques de Launay, De Gaulle and His France: A Psychopolitical and Historical Portrait (trans. 1968); Anton W. DePorte, De Gaulle's Foreign Policy, 1944-46 (1968); and Raymond Aron, De Gaulle, Israel, and the Jews (1968; trans. 1969). □
"Charles André Joseph Marie De Gaulle." Encyclopedia of World Biography. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/charles-andre-joseph-marie-de-gaulle
"Charles André Joseph Marie De Gaulle." Encyclopedia of World Biography. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/charles-andre-joseph-marie-de-gaulle
Modern Language Association
The Chicago Manual of Style
American Psychological Association
de Gaulle, Charles
The French general and statesman Charles de Gaulle led the Free French forces in their resistance of Germany during World War II (1939–45). A talented writer and spirited public speaker, he served as president of France from 1958 to 1969.
Early life and inspirations
Charles André Joseph Marie de Gaulle was born on November 23, 1890, in the northern industrial city of Lille, France. His father, Henri, was a teacher of philosophy and mathematics and a veteran of the Franco-Prussian War (1870–71), in which Prussia (today known as Germany) humiliatingly defeated the French. This loss colored the life of de Gaulle's father, a patriot who vowed he would live to avenge the defeat and win back the provinces of Alsace and Lorraine. His attitude deeply influenced the lives of his sons, whom he groomed to aid in France's restoration to the greatest European power.
From his earliest years, both his father and mother immersed de Gaulle in French history. For many centuries de Gaulle's ancestors had played a role in French history, almost always as patriots defending France from invaders. In the fourteenth century, a Chevalier de Gaulle defeated an invading English army in defense of the city of Vire. Jean de Gaulle is cited in the Battle of Agincourt (1415).
Perhaps the major influence on de Gaulle's formation came from his uncle, also named Charles de Gaulle, who wrote a book about the Celts, the ancient people of western Europe. The book called for union of the Breton, Scots, Irish, and Welsh peoples. The young de Gaulle wrote in his copybook a sentence from his uncle's book, which proved to be a prediction of his future life: "In a camp, surprised by enemy attack under cover of night, where each man is fighting alone, in dark confusion, no one asks for the grade or rank of the man who lifts up the standard and makes the first call to rally for resistance."
De Gaulle's career as defender of France began in the summer of 1909, when he was admitted to the elite military academy of Saint-Cyr. Among his classmates was the future marshal of France, Alphonse Juin (1888–1967), who later recalled de Gaulle's nicknames in school—"The Grand Constable" and "The Big Asparagus" (because of his height).
After graduation, in October 1912, Second Lieutenant de Gaulle reported to Henri Philippe Pétain, who first became his idol and later his most hated enemy. (In World War I [1914–18] Pétain was the hero of Verdun. During World War II [1941–45] he surrendered to German leader Adolf Hitler [1889–1945] and collaborated with the Germans while de Gaulle was leading the French forces of liberation.)
De Gaulle led a frontline company as captain in World War I and was cited three times for valor, or courage. Severely wounded, he was left for dead on the battlefield of Verdun and was later imprisoned by the Germans when he revived in a graveyard cart. After he had escaped and been recaptured several times, the Germans put him in a maximum security prison-fortress.
After the war de Gaulle went to general-staff school, where he damaged his career by constantly criticizing his superiors. He criticized the concept of trench warfare and wrote a series of essays calling for a strategy of movement with armored tanks and planes. His superiors ignored his works. The Germans, however, did read him and adapted his theories to develop their triumphant strategy of blitzkrieg, or lightning war, with which they defeated the French in 1940.
When France fell, de Gaulle, then an unknown brigadier general (a military officer above a colonel), refused to surrender. He fled to London, convinced that the British would never surrender and that American power, once committed, would win the war. On June 18, 1940, on British Broadcasting Company (BBC), he insisted that France had only lost a battle, not the war, and called upon patriotic Frenchmen to resist the Germans. This inspiring broadcast won him worldwide honor.
Early political activity
When the Germans were driven back at Normandy in 1944, de Gaulle had no rivals for leadership in France. Therefore, in the fall of that year, all of the members of the French Parliament agreed in their vote and elected him premier. De Gaulle had fiercely opposed the German enemy, and now he vigorously defended France against the influence of his powerful allies Joseph Stalin (1879–1953) of Russia, Winston Churchill (1874–1965) of Great Britain, and Franklin Roosevelt (1882–1945) of the United States. De Gaulle once stated that he never feared Hitler, who he knew was doomed to defeat. He did, however, fear that his allies would dominate France and Europe in the postwar period.
By the fall of 1945, only a year after assuming power, de Gaulle was at odds with all of the political leaders of France. He saw himself as the unique savior of France, the only champion of French honor, grandeur, and independence. He despised all politicians as corrupt and only out for their self-interests. The politicians then banded against him. In January 1946, disgusted by politics, he resigned and retreated into a silence to ponder the future of France.
In 1947 de Gaulle reemerged as leader of the opposition. He headed what he termed "The Rally of the French People," which he insisted was not a political party but a national movement. The Rally became the largest single political force in France but never achieved majority status. Although de Gaulle continued to disagree with the political system, he refused to lead a coup d'etat, or a sudden overthrow of the government. He retired again in 1955.
Years as president
In May 1958, a combination of French colonials and militarists seized power in Algeria and threatened to invade France. The weakened Fourth Republic collapsed, and the victorious rebels called de Gaulle back to power as president of the Fifth Republic of France. From June 1958 to April 1969 he reigned as the dominant force in France.
As president de Gaulle fought every plan to involve France deeply in alliances. He opposed the formation of a United States of Europe and British entry into the Common Market. He stopped paying part of France's dues to the United Nations, forced the North Atlantic Treaty Organization (NATO) headquarters to leave France, and pulled French forces out of the Atlantic Alliance integrated armies.
De Gaulle had an early success in stimulating (to make excitable) pride in Frenchmen and in increasing French gold reserves and strengthening the economy. By the end of his reign, however, France was almost friendless, and his economic gains had been all but wiped out by the student and workers protest movement in spring 1968.
De Gaulle ruled supreme for eleven years, but his firm hand began to anger many citizens. In April 1969 the French voted against his program for reorganizing the Senate and the regions of France. Immediately afterwards de Gaulle resigned and remained silent on political issues. Charles de Gaulle died at Colombey-les-Deux-Églises on November 9, 1970.
For More Information
Whitelaw, Nancy. A Biography of General Charles de Gaulle: "I Am France." New York: Dillon Press, 1991.
Williams, Charles. The Last Great Frenchman. New York: J. Wiley & Sons, 1993.
"de Gaulle, Charles." UXL Encyclopedia of World Biography. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/de-gaulle-charles
"de Gaulle, Charles." UXL Encyclopedia of World Biography. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/de-gaulle-charles
Modern Language Association
The Chicago Manual of Style
American Psychological Association
de Gaulle, Charles
Charles de Gaulle (shärl də gōl), 1890–1970, French general and statesman, first president (1959–69) of the Fifth Republic.
The World Wars
During World War I de Gaulle served with distinction until his capture in 1916. In The Army of the Future (1934, tr. 1941) he foresaw and futilely advocated for France the mechanized warfare by which Germany was to conquer France in 1940. In World War II he was promoted to brigadier general (1940) and became undersecretary of war in the cabinet of Premier Paul Reynaud.
De Gaulle opposed the Franco-German armistice and fled (June, 1940) to London, where he organized the Free French forces and rallied several French colonies to his movement. He was sentenced to death in absentia by a French military court. The Free French forces were successful in Syria, Madagascar, and N Africa. In June, 1943, de Gaulle became copresident, with Gen. Henri Honoré Giraud, of the newly formed French Committee of National Liberation at Algiers. He succeeded in forcing Giraud out of the committee, and in June, 1944, it was proclaimed the provisional government of France.
The Postwar Period
De Gaulle's government returned to Paris on Aug. 26 and was recognized by the principal Allies. He was unanimously elected provisional president of France in Nov., 1945, but he resigned in Jan., 1946, when it became obvious that his views favoring a strong executive would not be incorporated into the new constitution. Many of the rightist elements had gathered under the Gaullist banner, and he became (1947) head of a new party—Rassemblement du Peuple Français [Rally of the French People]—which claimed to speak for all Frenchmen and to be above factional strife but which, nevertheless, took part in subsequent elections. The party had some temporary electoral success, but in 1953 de Gaulle dissolved it and went into retirement.
Algeria and Internal Affairs
In 1958, after the military and civilian revolt in Algeria had created a political crisis in France, he was considered the only leader of sufficient strength and stature to deal with the situation. He became premier with power to rule by decree for six months. During this time a new constitution, which strengthened the presidency, was drawn up (1958). The constitution also provided for the French Community, the first step toward resolving imperial problems. De Gaulle was inaugurated as president of the new Fifth Republic in Jan., 1959. He decided to allow Algeria self-determination. This decision led to several revolts in Algeria by French colonists who opposed independence. Finally in 1962 an agreement was reached that provided for Algerian independence.
In domestic affairs de Gaulle attempted to restore French national finances by devaluing the franc and creating a new franc worth 100 old francs. Much of de Gaulle's program consisted of an attempt to raise France to its former world stature. He argued for French parity with the United States in NATO decisions and promoted French development of atomic weapons. In 1966, he withdrew French troops from NATO and ordered the withdrawal of NATO military installations from France by Apr., 1967.
The Final Presidency
De Gaulle was reelected to a second seven-year term in 1965. Although he rejected limitations on French sovereignty, he supported participation in the Common Market but strongly opposed British membership in it. He fostered ties with West Germany and established diplomatic relations with the People's Republic of China. In May, 1968, student demonstrations protesting French political and educational systems were followed by huge workers' strikes that nearly toppled the Gaullist government. Nevertheless, in elections held in June, the Gaullists were returned to power. In 1969, after being defeated in a referendum on constitutional reform, de Gaulle resigned as president.
See De Gaulle's War Memoirs (tr., 3 vol., 1955–60; repr. 1984) and Memoirs of Hope (tr. 1972); biographies by P. Masson (1971), B. Crozier (1973), D. Cook (1984), J. Lacouture (2 vol., 1990–92), C. Williams (1995), and J. Fenby (2012); A. Werth, The De Gaulle Revolution (1960), P. M. Williams and M. Harrison, De Gaulle's Republic (1960), R. Aron, An Explanation of De Gaulle (1965), J. Hess, The Case for De Gaulle (1968), A. Hartley, Gaullism (1971), P. Alexandre, The Duel: De Gaulle and Pompidou (1972).
"de Gaulle, Charles." The Columbia Encyclopedia, 6th ed.. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/reference/encyclopedias-almanacs-transcripts-and-maps/de-gaulle-charles
"de Gaulle, Charles." The Columbia Encyclopedia, 6th ed.. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/reference/encyclopedias-almanacs-transcripts-and-maps/de-gaulle-charles
Modern Language Association
The Chicago Manual of Style
American Psychological Association
De Gaulle, Charles André Joseph Marie
"De Gaulle, Charles André Joseph Marie." World Encyclopedia. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/environment/encyclopedias-almanacs-transcripts-and-maps/de-gaulle-charles-andre-joseph-marie
"De Gaulle, Charles André Joseph Marie." World Encyclopedia. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/environment/encyclopedias-almanacs-transcripts-and-maps/de-gaulle-charles-andre-joseph-marie
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Gaulle, Charles de
"Gaulle, Charles de." The Columbia Encyclopedia, 6th ed.. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/reference/encyclopedias-almanacs-transcripts-and-maps/gaulle-charles-de
"Gaulle, Charles de." The Columbia Encyclopedia, 6th ed.. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/reference/encyclopedias-almanacs-transcripts-and-maps/gaulle-charles-de
Modern Language Association
The Chicago Manual of Style
American Psychological Association
de Gaulle, Charles
Born November 22, 1890
Died November 9, 1970
French general, political leader, and
president of the Fifth Republic
After Adolf Hitler's forces invaded France in 1940, many French people worked to free their country from the Nazis. The head of the resistance movement working from outside France during the World War II, Charles de Gaulle proved a bold and courageous leader. He also led the first French government established after the war, and helped to define France's postwar identity. His critics said that he was arrogant and never willing to compromise, but not even they could deny that he loved his country deeply. In fact, de Gaulle's personal ambitions and his desire for a strong, independent France were closely intertwined; at one point he even said, "Je suis la France" (I am France).
An early dedication to France
De Gaulle was born in the northern town of Lille, located near France's border with Belgium. His father was a teacher and headmaster of a Jesuit school. Although Charles was not an excellent student, he had a very good memory and did well in the subjects that interested him, especially history. As a boy, he liked to pretend he was a soldier, and even when he was very young he imagined himself growing up to serve his country in some way.
It's not surprising that the young de Gaulle decided to pursue a career in the army, a choice that required him to spend his first year after graduating from preparatory (high) school serving as a soldier. When his year in the army was over, de Gaulle entered a military academy called Saint-Cyr, graduating in 1912.
Fighting in World War I
De Gaulle enlisted in the 33rd Infantry Regiment. His commanding officer, Colonel Philippe Petain (1856-1951), was so impressed by the young man's performance that he quickly promoted him from sublieutenant to lieutenant. When World War I (1914-1918) began, de Gaulle fought in Belgium. He was wounded twice, in 1914 and 1915, before taking part in the Battle of Verdun, in which he was again wounded and finally captured by the Germans. During his thirty-two months as a prisoner of war, de Gaulle made five escape attempts.
His army career advances
After the war, Poland and Russia got into a dispute over their borders. Poland was fighting Russia's Bolshevik army (the Bolsheviks were the party, led by Vladimir Lenin, that took control of Russia after its 1917 revolution). De Gaulle joined a Polish cavalry unit to gain valuable military experience and move ahead in his military career. While on leave, he married a girl named Yvonne, the daughter of a Paris biscuit manufacturer.
When Poland and the Soviet Union finally made peace, de Gaulle returned to France and lectured on military history at his old school, Saint-Cyr. He also attended the Ecole Superieure de Guerre (Higher Military School) in order to qualify for a higher rank. There he was known as a brilliant but arrogant student who didn't like to be criticized. His instructors were ready to give him a failing grade, but his old friend Petain—who was now a field marshal—made sure he received the high grade that would allow him to earn a promotion.
While rising through the ranks of the army, de Gaulle published a number of articles and books on military topics. In one of these, The Army of the Future (1934), de Gaulle recommended that the French army be reformed through the use of mechanized, mobile warfare and especially armored tanks. Few of his superiors, however, were ready to listen. They still believed in using a system of fixed fortifications to defend their country. Only a few years later de Gaulle was proved correct when the German army successfully invaded France.
The Germans invade France
In the fall of 1939, Germany invaded Poland. France and Great Britain responded to Hitler's aggression by declaring war on Germany. Fighting didn't start between the countries until May 10, 1940, when the Germans attacked France. The German army, which had made the change to mechanized, mobile warfare, rolled its tanks easily over France's fixed fortifications. On the same day, Germany also invaded Holland, Belgium, and Luxembourg in order to extend its European empire.
Before the invasion de Gaulle had been assigned to a tank unit in Alsace, France. On May 11, de Gaulle was to lead an armored division that had been very quickly assembled and that was not very well prepared to fight against the Germans. Nevertheless, his forces made a good showing in several battles, and he was promoted to the rank of brigadier general. On June 5, de Gaulle was called to Paris, where French premier Paul Reynaud named him undersecretary of state for national defense.
Making the call to resistance
At this time, the prospects for a French victory looked bleak, and many French leaders wanted to make peace with Germany. De Gaulle was among the few who thought France should keep fighting, even if the government had to move to a safe spot in North Africa, where France had control of the colonies of Morocco, Algeria, Tunisia, and Equatorial West Africa.
On June 16, the government of France was taken over by the Nazis, who established a new French government headed by Petain, de Gaulle's old patron. Petain's government agreed to move to the southern city of Vichy and to cooperate with the Nazis, who would have control of northern France, including Paris. Throughout the war, the French leaders who were working with the Nazis would be known as the "Vichy Government."
Meanwhile, de Gaulle had flown to London aboard a British aircraft. He had made a good impression on Britain's prime minister, Winston Churchill (1874-1965; see entry), who allowed de Gaulle to use the BBC (British Broadcasting System) to make a four-minute "Call to Honor," in which he urged all French people to resist the Nazis. "Believe me!" de Gaulle exclaimed. "Nothing is lost for France! The same methods which have defeated us may one day bring us victory."
The Free French movement grows
Unfortunately, de Gaulle was not very well known, and at first it didn't seem that his radio messages were having any effect. Gradually, though, he gathered some supporters from among his fellow refugees. De Gaulle called his movement the Provisional French National Committee, but it came to be known as the Free French movement.
With the help of the British Navy, de Gaulle's forces gained enough strength to attack the pro-Vichy forces at Dakar, French West Africa (now Senegal). Although de Gaulle and his followers lost this battle, they continued to gain popular support, and by November 1940 they had about 35,000 troops and twenty warships. De Gaulle moved his headquarters to Brazzaville in French Equatorial Africa (now Congo), and from there he declared that since no true French government now existed, "it is necessary that a new authority should assume the task of directing the French effort in the war. Events impose this sacred duty upon me. I shall not fail to carry it out."
Another turning point came in the spring of 1941, when the British and Free French overpowered the Vichy forces in Syria and Lebanon. After a small power struggle with the British over what should be done with the captured Vichy troops, de Gaulle convinced the British to allow him to try to persuade the soldiers to join the Free French. About 6,000 of the 25,000 Vichy soldiers did join de Gaulle. In June, the Free French won their first victory against the Germans at Bir Hakeim, Libya.
De Gaulle's power increases
Things did not always go smoothly between de Gaulle and the British, but his relationship with the United States was even stormier. The United States had maintained ties with the Vichy government, which was still the official government of France, and President Franklin D. Roosevelt distrusted de Gaulle, fearing that he had the potential to become a dictator. When the United States and Britain launched their invasion of North Africa—called "Operation Torch"—they did not invite the Free French forces to participate.
This made de Gaulle mad, but he was even angrier when the Allies (the countries fighting against Germany, Italy, and Japan) made an agreement with a Vichy commander, Admiral Francois Darlan, allowing him to administer all of France's colonies in North Africa except Morocco and Algeria, which the Allies would occupy. After Darlan's assassination in December 1942, de Gaulle worked out a power-sharing arrangement with General Henri Giraud (who had strong links to the Vichy government) and established the French Committee of National Liberation. Soon, however, de Gaulle edged out Giraud, who faded into obscurity.
By 1944, de Gaulle had been recognized by nearly everyone as the leader of the Resistance Movement (now known as the France Combatante or Fighting French) both inside and outside of France. In Nazi-occupied France, the Gestapo (Hitler's secret state police) responded by rounding up and imprisoning members of de Gaulle's family who were still in the country.
A triumphant return to France
When the Allies were planning the massive troop landing on northern French beaches that came to be known as the Normandy Invasion or D-Day, de Gaulle and his forces were not included. But de Gaulle did land in France on June 14, 1944, eight days after the initial Allied invasion. On August 25 he made a triumphant return to Paris, whose citizens greeted him with joy and gratitude.
By September, de Gaulle had announced the formation of a temporary government with himself as president. He immediately started working on the economic reforms France needed so badly at this time of transition. In October, both the United States and Britain officially recognized de Gaulle's government as legitimate.
Criticizing the Fourth Republic
Over the next few months, French leaders began planning their new, reorganized government, which they calledthe "Fourth Republic" and which would feature a strong legislative body and a weaker president. De Gaulle didn't like thisplan. He believed the president should have more power.Claiming that he did not want to "preside, powerless, over the powerless state," de Gaulle resigned the presidency on January 10, 1946, and returned to his country home.
De Gaulle started writing his war memoirs, but heremained interested and active in politics and particularly incriticizing the Fourth Republic. In the late 1940s he formed anorganization called the Rally of the French People, which advocated a strong chief executive and which expressed itsideas through Nazi-style rallies. This group gained a fair degreeof popularity for a short time but eventually collapsed, and deGaulle officially dissolved it in the early 1950s.
Back into the political ring
Several circumstances brought de Gaulle back to the forefront of French government. A dull economy and politicalsquabbling weakened the Fourth Republic in the mid-1950s.And in Algeria, which was still a French colony, tension wasincreasing between those who sought independence and thosewho wanted to maintain Algeria's colonial status, includingarmy leaders.
Members of the National Assembly were afraid there might be a coup (illegal government takeover, sometimesthrough physical force, by an unelected person or party), so in1958 they called on de Gaulle to return to his leadership role. He was considered the only figure strong enough to lead the nation at such a dangerous time.
Once again installed as France's president and the head of a new government called the "Fifth Republic," de Gaulle soon resolved the Algerian crisis by granting Algeria its independence. He spent the next decade improving France's position in the world, constantly asserting its independence from the United States, Britain, and the Soviet Union. He established ties with West Germany and diplomatic relations with the People's Republic of China, and he took steps to promote economic growth and modernization of industry.
Student and worker unrest
By the late 1960s France's economy had grown quite strong, but other problems were brewing. In 1968, French students revolted against their country's traditional political and educational systems and began demanding reforms as well as a voice in decision-making. Fighting broke out in the streets of Paris. Next a huge workers' strike threatened the survival of de Gaulle's government. Nevertheless, de Gaulle was reelected, partly because he had successfully convinced the voters that if he didn't win, the Communists (those who believe in a political system in which all property is owned by the community as a whole, rather than by individuals) might.
In 1969, de Gaulle proposed a number of reforms that would, he claimed, allow groups like students and workers to "share" power with government. When a referendum (public vote to express approval or rejection) on these reforms was defeated, De Gaulle resigned the presidency.
A quiet finale
De Gaulle again retired to Colombey and continued working on his memoirs, which he completed just before his death on November 9, 1970. At de Gaulle's request, no public ceremony was held to honor a man who had always been equally convinced of his country's greatness and his own fitness to lead it.
Where to Learn More
Cook, Don. Charles de Gaulle. New York: Putnam, 1983.
Weinberg, Gerhard L. A World at Arms. Cambridge: Cambridge University Press, 1994.
Colton, Joel. "Charles de Gaulle." [Online] Available http://www.grolier.com/wwii/wwii_degaulle.html (November 18, 1998).
Leader of the Free French resistance movement from outside France, Charles de Gaulle had such a deep love for his country he once proclaimed, "Je suis la France" (I am France).
The Women of the French Resistance
When the German army marched into France and took control of the country, many French citizens vowed to do whatever they could to resist. While de Gaulle led the Free French movement outside France, many secret resistance movements formed inside the country. They carried on a variety of activities, from attacks on German officials by fighting groups called the Maquis, sabotage (destroying buildings and equipment used by the Germans), and spying, to printing propaganda (material intended to persuade the reader to adopt a certain viewpoint) against the Germans.
In the decades following World War II, the deeds performed by the French Resistance were well known, but it has only been in recent years that the important role played by French women in the movement has come to light. Like women in the United States, French women found their options expanded by the war: since so many men had been called away to fight, their contributions were crucial. And within the resistance movement, they found a measure of equality with men that had not existed in their prewar world.
The tasks performed by French Resistance women were many and varied. In the first few years of the German occupation, they resisted openly through protests and demonstrations against the shortages of food from which the French people suffered. They also called for the return of prisoners of war (POWs, French men who had been arrested and imprisoned by the Nazis) and for the rightto send packages to POWs. But as the occupation continued, they took on even more dangerous and secret responsibilities, all of which could lead to arrest, torture, imprisonment, or even death if they were discovered.
Some women assisted the resistance movement in traditional ways, by performing office work or nursing those injured in clashes with the Germans. They opened their homes to those who were being chased by the Gestapo, whether they were Jews, Allied pilots whose planes had crashed in France, or resistance fighters. Farm women hid weapons, and documents were stashed in the apartments of city women. Before the war, fathers had been in charge of families; now, with men away from home, mothers took that responsibility.
A number of French women worked for the resistance in untraditional ways, especially those who served as "liaison agents." They traveled around the country at great risk to their own safety, carrying messages and money and looking for good hiding spots for weapons and fighters and good sites for parachute drops. A few women also participated as Maquis fighters, though this was not common. Women proved to be flexible, adaptable members of the resistance who showed initiative and had good ideas about what could be done. After the war, they said that they had learned through their resistance work how much they could do, even though peacetime brought with it a return to traditional women's roles.
Women Who Served in the French Resistance
Before the war, she had been a pacifist (someone who does not believe in killing or violence for any reason) who fought for working women's rights. With a man named Henri Frenay, she helped found Combat, one of the most active resistance movements. Albrecht had the idea of publishing a secret newsletter, which was widely read. She was captured and tortured three times by the Germans, and it is thought that she finally committed suicide.
A literature student, she was recruited into the resistance because she spoke English and could help with the hiding of Allied pilots. While in hiding herself, she wrote a novel, and after the war she published many books.
She went to London after the Germans arrived in France, but she used her knowledge of chemistry and her experience working in an arms factory to help the Free French. Bohec parachuted into France's Brittany region and taught young men how to use weapons.
Sister Edwige Dumas:
She helped care for the wounded of both sides after the Allies bombed the city of Calais, and she sheltered resistance fighters wanted by the Germans.
Genevieve de Gaulle-Anthonioz:
General de Gaulle's niece, she followed the family tradition by becoming a member of the resistance, working with a movement of young people called Defense de la France. She was captured by the Germans and sent to the Ravensbruck concentration camp.
Marie-Louise Le Duc:
Known as "Madame X" to the British, she helped those who wanted to escape from France (especially Allied airmen) by assisting with secret, nighttime pickups by British boats. She was arrested three times but always escaped.
She was an opthalmologist (doctor specializing in diseases of the eye) who fled to London but managed to be sent on active duty to North Africa. Later she accompanied Allied troops in their invasion of France.
She served as a liaison agent in Lyon, an unfamiliar city, which required her to memorize messages and addresses and to have few contacts with others. Vernay was caught by the Gestapo and deported (sent out of the country).
"de Gaulle, Charles." World War II Reference Library. . Encyclopedia.com. (September 10, 2018). http://www.encyclopedia.com/history/educational-magazines/de-gaulle-charles
"de Gaulle, Charles." World War II Reference Library. . Retrieved September 10, 2018 from Encyclopedia.com: http://www.encyclopedia.com/history/educational-magazines/de-gaulle-charles | <urn:uuid:01e8cf13-66fd-4af1-84f5-e54f20402b9e> | CC-MAIN-2018-39 | https://www.encyclopedia.com/people/history/french-history-biographies/charles-de-gaulle | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267164469.99/warc/CC-MAIN-20180926081614-20180926102014-00153.warc.gz | en | 0.971962 | 11,320 | 3.65625 | 4 |
Aerospace engineering is the branch of engineering that concerns aircraft, spacecraft, and related topics. It is often called aeronautical engineering, particularly when referring solely to aircraft, and astronautical engineering, when referring to spacecraft.
Aerospace engineers design, develop, and test aircraft, spacecraft, satellites and missiles and or supervise the manufacture of these products. Those who work with aircraft are called aeronautical engineers, and those working specifically with spacecraft are astronautical engineers. Aerospace engineers develop new technologies for use in aviation, defense systems, and space exploration, often specializing in areas such as structural design, guidance, navigation and control, instrumentation and communication, or production methods. They also may specialize in a particular type of aerospace product, such as commercial aircraft, military fighter jets, helicopters, spacecraft, or missiles and rockets, and may become experts in aerodynamics, thermodynamics, celestial mechanics, propulsion, acoustics, or guidance and control systems.
Some of the elements of aerospace engineering are:
- Fluid mechanics - the study of fluid flow around objects. Specifically aerodynamics concerning the flow of air over bodies such as wings or through objects such as wind tunnels (see also lift and aeronautics).
- Dynamics and engineering mechanics - the study of movement, forces, moments in mechanical systems.
- Mathematics - as most subjects within aerospace engineering involve equations and mathematical manipulation and derivations, a solid and comprehensive study of mathematics is required to enable effective learning in the other modules.
- Electrotechnology - the study of electronics within engineering.
- Propulsion - the energy to move a vehicle through the air (or in outer space) is provided by internal combustion engines, jet engines and turbomachinery, or rockets (see also propeller and spacecraft propulsion).
- Control engineering - the study of mathematical modelling of systems and designing them in order that they behave in the desired way. As aircraft flight control systems are becoming increasingly complex, they can be studied as a separate module.
- Aircraft structures - design of the physical configuration of the craft to withstand the forces encountered during flight. Aerospace engineering aims very much at keeping structures lightweight.
- Materials science - related to structures, aerospace engineering also studies the materials of which the aerospace structures are to be built. New materials with very specific properties are invented, or existing ones are modified to improve their performance.
- Aeroelasticity - the interaction of aerodynamic forces and structural flexibility, potentially causing flutter, divergence, etc.
- Avionics - specifically concerning the design and programming of any computer systems on board an aircraft or spacecraft and the simulation of systems. Navigation equipment may be the focus of this study.
- Risk and reliability - the study of risk and reliability assessment techniques and the mathematics involved in the quantitative methods.
- Noise control - the study of the mechanics of sound transfer. Required as noise levels are a massive consideration in the current aerospace industry.
- Flight test - the discipline of designing and executing flight test programs in order to gather and analyze performance and handling qualities data in order to determine if an aircraft meets its design and performance goals and certification requirements.
The basis of most of these elements lies in theoretical mathematics, such as fluid dynamics for aerodynamics or the equations of motion for flight dynamics. However, there is also a large empirical component. Historically, this empirical component was derived from testing of scale models and prototypes, either in wind tunnels or in the free atmosphere. More recently, advances in computing have enabled the use of computational fluid dynamics to simulate the behavior of fluid, reducing time and expense spent on wind-tunnel testing.
Additionally, aerospace engineering addresses the integration of all components that constitute an aerospace vehicle (subsystems including power, communications, thermal control, life support, etc.) and its life cycle (design, temperature, pressure, radiation, velocity, life time), leading to extraordinary challenges and solutions specific to the domain of aerospace systems engineering.
Popular culture has not been unaffected by this branch of engineering. The term "rocket scientist" is at times used to describe a person of remarkable or in the considered context higher than average intelligence. Aerospace engineering has also been represented as the more "glittery" pinnacle of engineering. The movie Apollo 13 depicts the ground team as a group of heroes in a Hollywood fashion glorifying the intelligence and competence of white shirt and tie professionals as a sharp contrast to pop culture trends. This was later extended in more detail in the spin-off series From the Earth to the Moon.
Aerospace engineering degrees
Aerospace (or aeronautical) engineering can be studied at the bachelors, masters, and Ph.D. levels in aerospace engineering departments at many universities, and in mechanical engineering departments at others. | <urn:uuid:f118899c-8651-437a-8e13-3acf1dee498e> | CC-MAIN-2018-34 | http://en.citizendium.org/wiki/Aerospace_engineering | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213794.40/warc/CC-MAIN-20180818213032-20180818233032-00418.warc.gz | en | 0.940909 | 965 | 3.40625 | 3 |
- Project plans
- Project activities
- Legislation and standards
- Industry context
Last edited 06 Jun 2017
Industry Foundation Classes IFC
Building Information Modelling (BIM) is a very broad term that describes the process of creating and managing a digital model of a building or other facility (such as a bridge, highway, tunnel and so on).
In the UK, the Government Construction Strategy published in May 2011, stated that the '...Government will require fully collaborative 3D BIM (with all project and asset information, documentation and data being electronic) as a minimum by 2016'.
As construction projects typically involve teams coming together from different organisations, they will inevitably use different hardware and software. To facilitate collaboration between team members in creating building information models whilst enabling them to continue to use software that they have invested in and are familiar with, a standard has been developed for the exchange of data.
The Industry Foundation Classes (IFC) specification is a neutral, non-proprietary data format used to describe, exchange and share information. It is the international standard for building information modelling used for sharing and exchanging construction and facility management data across different software applications. It has been registered with the International Standardisation Organisation since 2013 as ISO16739 'Industry Foundation Classes (IFC) for data sharing in the construction and facility management industries.'
IFC was first developed in 1994 by the Industry Alliance for Interoperability, a consortium formed by Autodesk. To allow the continued development of IFC as a non-proprietary data format, the consortium became the International Alliance for Interoperability in 1997 and has now become buildingSMART, a not-for-profit organisation.
IFC 1.0 first went into use in 2000. IFC4 was released on 12 March 2013
IFC was developed to facilitate interoperability, but it does not itself guarantee interoperability. This is dependent on the software that interfaces with it. buildingSMART offers a software certification process, and currently IFC is supported by approximately 150 software applications worldwide.
IFC data files are exchanged between applications using the .ifc, .ifcXML and .ifcZIP file formats.
Find out more
Related articles on Designing Buildings Wiki
- BIM articles.
- BIM collaboration format.
- BIM Task Group.
- BS ISO 16739:2013 Industry Foundation Classes (IFC) for data sharing in the construction and facility management industries.
- Construction Operations Building Information Exchange (COBie).
- CIC BIM Protocol.
- Collaborative practices.
- File formats for BIM.
- Government Construction Strategy.
- Information Delivery Manual (IDM).
- Native file.
- Open BIM.
- Open data.
- Open data - how can it aid the development of the construction industry?
- PAS 1192-2:2013.
- Soft landings.
External references
Featured articles and news
Timo Hartmann of TU Berlin introduces a themed issue of the ICE Smart Infrastructure and Construction journal.
Freedom of Information request reveals that taxpayers are footing the bill for Carillion's collapse.
Driven piles are used to support buildings, walls and bridges, and can be the most cost-effective deep foundation solution.
Australian landmark celebrates achievement of carbon neutral status five years ahead of schedule.
Non-material amendments can sometimes be necessary after planning permission has been granted. Find out more here.
Six things civil engineers could do to ensure the success of projects.
Dublin housing crisis restricts employers' ability to recruit, according to new U+I research.
Intricate inlays and beautiful patterns can be created with waterjet cutting.
Two historic quarries in environmentally sensitive areas were reopened to repair Exeter Cathedral.
The phrase ‘time at large’ describes the situation where there is no date for completion, or it has become invalid. | <urn:uuid:742ef0dd-31c3-4553-a5f2-94abf3046b2b> | CC-MAIN-2018-39 | https://www.designingbuildings.co.uk/wiki/Industry_Foundation_Classes_IFC | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267164925.98/warc/CC-MAIN-20180926121205-20180926141605-00070.warc.gz | en | 0.897991 | 809 | 2.515625 | 3 |
Humans have yet to travel to Mars, but students from MIT and other universities announced Monday that they hope to put tens of millions of people from across the globe on the red planet within the next three years.
How? By sending three small satellites, called CubeSats, to the surface with slivers of life from the year 2014 in the form of messages, photos, audio clips, and videos.
This digital, global diary of sorts, a mission called Time Capsule to Mars, is the first crowd-funded, student-led, interplanetary mission, its leaders said at a press conference in Washington.
The project will test several new technologies and may require new inventions along the way, said Paulo Lozano, director of the Space Propulsion Laboratory at the Massachusetts Institute of Technology. If successful, the effort will advance relatively inexpensive methods of exploring Mars, said Lozano, who is overseeing the 11 MIT students participating in the mission.
“This is not different from any other benefits technology brings to society,” he said. “These endeavors require a high technical skill, and it’s very important for young people to be a part of that.”
For the design, launch, flight communications, and vehicle controls — all of which students from MIT, Duke University, Stanford University, and the University of Connecticut will lead — the project is expected to cost $25 million. The students are working with Explore Mars, a Boston-area nonprofit that promotes Mars exploration, and are getting additional support from NASA, Lockheed Martin, and Boeing.
Astronauts Edwin “Buzz” Aldrin, Kent Rominger, and Charlie Precourt are serving as some of the project’s advisers.
The students will test a new propulsion method to get the 26½-pound satellites to Mars, one of a wave of technological advancements for exploring other planets that could emerge from the mission, said Emily Briere, a Duke senior who is the mission director. Organizers hope to launch the satellites by 2017.
President Obama has said NASA would launch a manned Mars mission by around 2030. In the meantime, said Chris Carberry, executive director of Explore Mars, the time capsule project will help spur widespread interest in space and inspire further exploration of Mars.
“This is looking at various options that will help us get to Mars faster than we currently can,” Carberry said. “There’s an awful lot of excitement about Mars these days.”
The idea for the mission stemmed from last year’s Humans 2 Mars summit in Washington, hosted by Explore Mars. Briere and other students noticed that many of the summit’s attendees seemed to be more motivated by the fame they would get from being the first to land on Mars, rather than using a mission for technological advancements and a better understanding of the universe.
During the conference, Briere, students, and space industry leaders gathered around a table at a TGI Fridays. How can we get more people excited about space, they asked one another, while engaging a larger audience in space exploration?
Enter Time Capsule to Mars.
“We wanted to remind people we go to space to push forward humanity,” Briere said. “A lot of technology came from the Apollo era,” she said, such as wireless headsets.
“We think space exploration is a natural avenue to explore that has endless rewards to people on Earth.”
The greatest challenge lies in getting the CubeSats to Mars, Lozano said. Most of the technology needed is new and untested, he added, elevating the risk that parts of the mission could go awry.
“You’re very far from home, so getting there is very hard,” he said. “The actual propulsion, the communication, and health of the spacecraft are the biggest concerns.”
Despite the project’s complexities and many unknowns, students and industry leaders said they are confident in its success. If the time capsule does land on Mars, then millions of people can say they were a part of it.
The group has a website, timecapsuletomars.com, where people can make donations and will soon be able to upload materials for the time capsule.
“A group of students having the motivation to put together a viable mission like this and raise the funds themselves, that in itself is inspiring,” Carberry said. “Every member of this team wants to send humans to Mars one day, and this is one way to inspire the public.”Yasmeen Abutaleb can be reached at yasmeen.abutaleb@ | <urn:uuid:757f08a5-9772-4365-8ec6-3481244fcca6> | CC-MAIN-2015-40 | http://www.bostonglobe.com/news/science/2014/06/23/students-plan-launch-time-capsules-mars/lF0WfkS8glMuCn0MS1wVnN/story.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737833893.68/warc/CC-MAIN-20151001221713-00074-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.94656 | 969 | 3.015625 | 3 |
You are not currently logged in.
Access JSTOR through your library or other institution:
If You Use a Screen ReaderThis content is available through Read Online (Free) program, which relies on page scans. Since scans are not currently available to screen readers, please contact JSTOR User Support for access. We'll provide a PDF copy for your screen reader.
The Southern Brook Lamprey (Ichthyomyzon gagei) in the St. Croix River Drainage of Wisconsin and Minnesota
Philip A. Cochran
Vol. 1987, No. 2 (May 13, 1987), pp. 443-446
Stable URL: http://www.jstor.org/stable/1445782
Page Count: 4
You can always find the topics here!Topics: Rivers, Freshwater fishes, Creeks, Tributaries, Dams, Boulders, Artificial satellites, Biological taxonomies, Population distributions, Groundwater
Were these topics helpful?See something inaccurate? Let us know!
Select the topics that are inaccurate.
Since scans are not currently available to screen readers, please contact JSTOR User Support for access. We'll provide a PDF copy for your screen reader.
Preview not available
Adult brook lampreys from tributaries to the St. Croix River in Wisconsin and Minnesota are morphologically indistinguishable from Ichthyomyzon gagei and most probably represent a relict population separated by 900 km from the nearest previously reported population in southern Missouri. An alternate hypothesis is that the St. Croix specimens represent an independently evolved satellite species of I. castaneus. Regardless of their taxonomic identity, the St. Croix populations are unique and should be afforded special status by appropriate natural resource agencies until their distribution and abundance can be ascertained. | <urn:uuid:12a06010-9b1f-4597-9528-e1ccd2089807> | CC-MAIN-2017-30 | http://www.jstor.org/stable/1445782 | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426234.82/warc/CC-MAIN-20170726162158-20170726182158-00652.warc.gz | en | 0.851389 | 372 | 2.921875 | 3 |
A new, joint U.S. – Japan aerial survey shows levels of surface radiation around the Fukushima nuclear power plant. As expected the map shows a band of fall-out north west of the site, but it also reveals high levels of radioactive substances (in red) outside the mandatory 20km exclusion zone.
From Japanese news website Asahi:
After the 1986 Chernobyl disaster, those living in areas with more than 555,000 becquerels of cesium-137 per square meter were forced to relocate. However, the latest map shows that accumulated radioactivity exceeded this level at some locations outside the official evacuation zones, including the village of Iitate and the town of Namie.
According to Japan Probe, villagers in Iitate are now in the process of being evacuated.
The U.S. Department of Energy has published this (Flash) slideshare presentation. Details of the new survey start on page 4. | <urn:uuid:1f7a9e5c-2399-4b8a-a215-fe13c4a9f2d2> | CC-MAIN-2016-07 | http://maptd.com/new-fukushima-contamination-map/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701155060.45/warc/CC-MAIN-20160205193915-00202-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.926954 | 189 | 2.859375 | 3 |
Infections That Can Lead to Cancer
Here you can get an overview of how infections with some viruses, bacteria, and other germs may increase a person's risk for certain types of cancer. Click on the topics below to get started.
- Can infections cause cancer?
- Viruses that can lead to cancer
- Bacteria that can lead to cancer
- Parasites that can lead to cancer
- To learn more | <urn:uuid:0e17a28a-f35b-47f7-8512-2c37d6931f9b> | CC-MAIN-2016-22 | http://www.cancer.org/cancer/cancercauses/othercarcinogens/infectiousagents/infectiousagentsandcancer/index?sitearea=PED | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049272823.52/warc/CC-MAIN-20160524002112-00237-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.918582 | 88 | 2.5625 | 3 |
Rockaby and Not I
Not I and Rockaby are later work by Beckett, written and staged some considerable time after Waiting for Godot. However, many of the latter’s themes including the absurd tragedy of human life in the modern era are reworked with ever greater condensation and minimalism. In Not I, a speaking mouth seeks to recompose itself as a subject – an ‘I’ – after some sort of collapse. Rockaby is a monologue spoken by a prematurely aged woman sitting in a rocking chair. Shannon Jackson describes watching and waiting for something to happen, for something ‘to unfold in time’, which is what theatre does. The spectator is out of sync with the rocking and the pre-recorded speaking performer. Temporality becomes content, the old woman approaches the end, and the experience evoked is the theatrical event
• What particular challenges do Not I and Rockaby pose for the actor and the audience?
• Describe the interplay between speaking and moving, hearing and seeing in the plays.
• What does the female voice have to say in these plays?
• How do Jackson and Shalson differ in their responses to Rockaby? | <urn:uuid:68250c2d-ee7e-467e-99ec-8a140bd3bc8e> | CC-MAIN-2020-10 | https://usaonlineessays.com/modern-and-contemporary-drama/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144111.17/warc/CC-MAIN-20200219092153-20200219122153-00354.warc.gz | en | 0.961064 | 246 | 3.0625 | 3 |
About This Chapter
Ethical Considerations in Psychology Research - Chapter Summary
In this chapter, our instructors review all aspects of the process of conducting psychological research, It focuses primarily on issues in human research but also addresses the unique issues presented by using animal subjects. You will learn about informed consent and find out about risks presented by research, specifically, physical harm, psychological abuse, and legal jeopardy.
You'll be introduced to issues of privacy, anonymity and confidentiality, and to the special considerations that need to be in place when doing research with special populations. As you go through the chapter you'll discover the mandated and federal regulations in place. After completing this chapter, you should be able to:
- Define informed consent
- Discuss the risks of research
- Describe what contributes to ethical research
- Identify issues with informed consent in research with special populations
- Enumerate mandated and federal regulations in place to protect research participants
- Address issues and considerations when using animal subjects in research
Our approach involves brief, engaging video lessons that streamline your learning. In addition, we give you self-assessment quizzes and lesson transcripts with each video, to deepen your understanding. The important points are highlighted with key terms that are often linked to text lessons for more detail. And if you want to see a segment of a video you have already watched, you can use our video tags to take you quickly and easily to the exact spot you wish to access. All these materials have been prepared by instructors who are expert in their field.
1. Conducting Research on People: General Guidelines
There are specific guidelines that must be followed when performing research. These guidelines are there to protect the subject from harm. What do you, as a researcher, have to watch out for when conducting research on people? Why do you need to be so careful?
2. What Is Informed Consent in Research? - Definition & Purpose
After you have figured out what you are going to research and have approval to do it, you need informed consent from the participants in your experiment. What is informed consent, and how is it different than regular consent?
3. Risks of Research: Physical Harm, Psychological Abuse & Legal Jeopardy
There are many ways a researcher can harm a participant. This lesson explores the possible harmful actions of researchers, as well as ways to avoid these harmful actions.
4. Ethical Research: Maintaining Privacy, Anonymity & Confidentiality
When performing research, there are certain expectations that a researcher must follow to protect their subjects. We will explore a few of the different ways that a subject's responses are kept from being used against them.
5. Informed Consent in Research with Special Populations
There are people who need a little bit of extra protection because they are in a vulnerable state. These are people who need additional information because they are at some risk or because they cannot make decisions on their own. We will explore some of these special populations.
6. Protecting Research Participants: Mandated & Federal Regulations
How are laws and federal regulations protecting research participants? This lesson explores some of the ways people are protected from each other, themselves, and researchers when they are participants in a study.
7. Using Animal Subjects in Research: Issues & Considerations
Using animals in research is not something that is undertaken lightly. We will look at ethical and federal laws put into place to ensure animals used in research are not abused despite the experimentation.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the OSAT Psychology/Sociology (CEOE) (032): Practice & Study Guide course
- History of Psychology
- Psychology Research Methods
- Setting Up Research Studies in Psychology
- Biology & Behavior in Psychology
- Senses & Perception
- Dealing with Stress
- Sleep & Other States of Consciousness
- Cognition in Psychology
- Learning & Psychology
- Stages of Development in Psychology
- Motivation & Emotion in Psychology
- Psychological Testing and Assessment
- Personality Components & Assessment
- Psychological Health & Disorders
- Methods of Psychological Treatment
- Social Psychology Concepts
- Introduction to Sociology
- Influential Sociological Theorists
- Research Methods in Sociology
- Culture, Socialization & Social Interaction
- Personality Psychology and the Self
- Values, Beliefs and Attitudes
- Social Groups & Interactions
- Studying Social Institutions
- Stratification and Aging in Society
- Prejudice and Discrimination in Society
- Deviance and Social Control
- Overpopulation and Population Trends
- Social Movements
- Urbanization, Industrialization, Modernization and Globalization
- OSAT Psychology/Sociology (CEOE) (032) Flashcards | <urn:uuid:ba659786-d66f-442a-b9dc-873c88f19052> | CC-MAIN-2019-47 | https://study.com/academy/topic/ethical-considerations-in-psychology-research.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668539.45/warc/CC-MAIN-20191114205415-20191114233415-00305.warc.gz | en | 0.921843 | 1,096 | 3.5625 | 4 |
Multiple sclerosis (MS) is a neurodegenerative condition that affects the nerves in the brain and the spinal cord, causing problems with movement, balance and vision. In the UK around 100,000 people are affected and nearly twice as many women as men have MS. The condition affects more than 2 million people worldwide.
MS is an autoimmune disease, which means that the immune system is responsible for attacking healthy tissues in the body, in this case the brain and central nervous system. The cause of MS is not known but it is likely to be a combination of genetics and environmental factors. There is currently no cure for MS. In the past a number of drugs have been used to alleviate the symptoms of MS, but the effectiveness of many are disputable, and they often give rise to negative side effects. For this reason patients and doctors are still looking for a breakthrough in MS treatment.
Some recent clinical studies have suggested that a condition called chronic cerebrospinal venous insufficiency (CCSVI), may contribute to the nervous system damage that is a feature of MS. CCSVI is an abnormality in the way in which blood drains from the brain and spinal cord back to the heart. The initial research into this condition was carried out by a team in Italy headed by Dr Paolo Zamboni, a vascular surgeon and the results were published in 2008. The team of scientists discovered that in patients with MS the veins in the neck and chest responsible for draining blood back from the brain to the heart were narrowed or sometimes blocked. This causes the blood to flow back towards the brain as a new route around the blocked vein is sought. Dr Zamboni suggested that this slow, circuitous blood flow leads to iron deposits and autoimmune activity, which could account for the lesions that are found in the brains and spinal cords of people with MS. He further proposed that an endovascular procedure called balloon angioplasty could be used to remove the blockages. This topic was inevitably of huge interest to the sufferers of MS but is the subject of considerable scientific debate.
Associated with the nervous system and the brain.Full medical glossary | <urn:uuid:063c48b0-8dee-4c0f-8a79-94bc096d3ac5> | CC-MAIN-2020-50 | https://www.totalhealth.co.uk/clinical-experts/dr-maciej-kielar/multiple-sclerosis-and-ccsvi | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188947.19/warc/CC-MAIN-20201126200910-20201126230910-00051.warc.gz | en | 0.972054 | 431 | 3.515625 | 4 |
Methionine is in its natural form, the L-form, a sulfur-containing α-amino acid.
The human body can not produce methionine itself. For this reason it is one of the essential amino acids: man must therefore ingested in the diet or through supplements.
The non-essential amino acid L-cysteine can only be created by a shortage of methionine will therefore also a cysteine amino acid ash rently be. From L-methionine
A degradation product of methionine and homocysteine supplementation of L-methionine can increase the homocysteine level in the blood. Hyperhomocysteinemia is a risk factor for atherosclerosis and thrombosis. This risk is mainly hereditary, but also determined hormonal. Vitamin B6 is required for the conversion of methionine to cysteine. Vitamin B6 in combination with folic acid is very effective to decrease. Homocysteine levels | <urn:uuid:a0114c57-dc88-4bf4-9ee8-5cfd73f8bceb> | CC-MAIN-2016-40 | https://www.vitaminedesk.eu/en/category-l+methionine-78 | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661953.95/warc/CC-MAIN-20160924173741-00206-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.906365 | 204 | 3.09375 | 3 |
This report from The Brookings Institution’s Artificial Intelligence and Emerging Technology (AIET) Initiative is part of “AI Governance,” a series that identifies key governance and norm issues related to AI and proposes policy remedies to address the complex challenges associated with emerging technologies.
Artificial intelligence (AI) is “summoning the demon,” Elon Musk warned, continuing a great tradition of fearful warnings about new technology. In the 16th century, the Vicar of Croyden warned how Gutenberg’s demonic press would destroy the faith: “’We must root out printing or printing will root us out,’ the Vicar told his flock.”1 Preceding Musk’s invocation of the devil by a couple of centuries, an Ohio school board declared the new steam railroad technology to be “a device of Satan to lead immortal souls to hell.”2 Others warned of secular effects: The passing of a steam locomotive would stop cows from grazing, hens from laying, and precipitate economic havoc as horses became extinct and hay and oats farmers went bankrupt.3 Only a few years later, demonic fears appeared once again when Samuel Morse’s assistant telegraphed from Baltimore suggesting suspension of the trial of the first telegraph line. Why? Because the city’s clergy were preaching that messages by sparks could only be the work of the devil. Morse’s assistant feared these invocations would incite riots to destroy the equipment.4
We chuckle at these stories now, but they were once the manifestation of very real fears about the dangers of new technologies. They echo today in our discussions regarding the dangers of artificial intelligence. As evidenced by Musk’s concerns as well as those of other prominent individuals, there are many fears that AI will, among other things, impoverish people, invade their privacy, lead to all-out surveillance, and eventually control humanity.
“As we consider artificial intelligence, we would be wise to remember the lessons of earlier technology revolutions—to focus on the technology’s effects rather than chase broad-based fears about the technology itself.”
In assessing the reality of these claims, it is instructive to look to the lessons of history. Experience with new technologies teaches us that most inventions generated both good and bad results. They were classic “dual-impact” products that helped people at the same time they created harms. As I argue in this paper, a crucial variable in mitigating possible harms was the policy and regulatory response to counteract negative ramifications of the new technology. As we consider artificial intelligence, we would be wise to remember the lessons of earlier technology revolutions—to focus on the technology’s effects rather than chase broad-based fears about the technology itself.
Fear as a substitute for thinking
In the mid-19th century, British mathematician Charles Babbage conceptualized the first computer. The idea that God-given human reason could be replaced by a machine was fearfully received by Victorian England in a manner similar to today’s concern about machines being able to think like humans. In both instances, the angst, while intellectually interesting, proved to be overwrought. Babbage’s computer, detailed in hundreds of pages of precise schematics, was never fully constructed. Similarly, research to create human-like AI is not progressing with the feared apocalyptic pace. “We’ve pretty much stopped trying to mirror human thinking out of the box,” explains Andrew Moore, former dean of computer science at Carnegie-Mellon University.
At the forefront of history’s lessons for today’s technology challenges is the imperative to avoid substituting fear in place of solution-oriented thinking that asks questions, identifies issues, and seeks solutions. If thinking machines are not on the horizon to pose an existential threat, then how do we move beyond hysteria to focus on the practical effects of machine intelligence?
“At the forefront of history’s lessons for today’s technology challenges is the imperative to avoid substituting fear in place of solution-oriented thinking that asks questions, identifies issues, and seeks solutions.”
While the idea of artificial intelligence can be intimidating, in practical effect, machine learning is effectively coming to describe all of computer science. It is difficult to discover activity in the field of computer science that is outside of machine learning’s manipulation of data. Over a relatively condensed period, intelligent machines have moved from science fiction into our everyday lives. Importing the fears that confronted Babbage in the Victorian era does little to advance consideration of 21st-century policy decisions.
Elon Musk calls for “[r]egulatory oversight, maybe at the national and international level, just to make sure that we don’t do something foolish.” It is an idea validated by history. As the Industrial Revolution transformed the Western world’s economy and the lives of its citizens, it became apparent that the marketplace rules that had worked for agrarian mercantilism were no longer adequate for industrial capitalism. When the interests of the industrialists clashed with the broader public interest, the result was a new set of rules and regulations designed to mitigate the adverse effects resulting from the exploitation of the new technologies.
The call to similarly come to grips with AI is a legitimate effort. But it is a simple goal with complex components. The first response to such a suggestion is: “What AI are you talking about?” Is the suggestion to regulate AI weaponry? Or its impact on jobs? Is it AI’s impact on privacy? Or its ability to manipulate the competitive marketplace? Is it a suggestion to regulate the machines that drive AI? Or is it to control the activities of the people who create the AI algorithms?
The first step in any such oversight, therefore, is a clear delineation of the problems to be addressed. Regulating the technology itself is like regulating the wind: It blows to bend everything it touches but cannot be captured. Rather than the regulation of the amorphous mashup of technologies we refer to as artificial intelligence, we should focus on how to stormproof our dwellings and deal with the effects of the new technology.
Look past the specific technology to its effects
A key lesson of history is that effective regulation focuses on prioritizing the effects of the new technology, rather than the ephemeral technology itself. The transformational nature of a new technology is not per se the primary technology itself, but rather the secondary effects enabled by that development. We didn’t regulate the railroad tracks and switches; we regulated the effects of their usage, such as rates and worker safety. We didn’t regulate the telegraph (and later telephone) wires and switches, but whether access to them was just and reasonable. History’s road map is clear: If there is to be meaningful regulation of AI, it should focus on the tangible effects of the technology.
Two factors make such regulation particularly challenging. One is the vast breadth of AI’s reach. The ability to rapidly access and process vast quantities of data will drive our cars, fly our planes, cook in our kitchens, conduct research without laboratories and test tubes, and manage everything from our homes to how we conduct war. Here is where the industrial regulatory model runs into difficulty. Previously, effect-based regulation could be centralized in a purpose-built agency or department. The applications of AI will be so pervasive, however, that its oversight must be equally pervasive throughout all the activities of government at all levels—with an agility not normally associated with the public sector.
The other challenge to regulating AI is the speed of its advancement. Until recently, the slow evolution of technology afforded a time buffer in which to come to grips with its changes. The spindle, for instance, was a hallmark of the first Industrial Revolution, yet it took almost 120 years to spread outside Europe. At such a pace, society, economic activity–and regulation–had time to catch up. In place of history’s linear technological progress, however, AI’s expansion has been described as “exponential.” Previously, time allowed the development of accountability and regulatory systems to identify and correct the mistakes humans make. But under the pressure of the exponential expansion of machine learning, we are now confronted with dealing with mistakes that machines make, whether it is flying a 737 or prejudicing analytical analysis.
Our history is clear: In a time of technological change, it is the innovators who make the rules. This should not be surprising, since it is they who see the future while everyone else is struggling to catch up. But history is also clear that such a situation exists only until the innovators’ rules begin to infringe on the public interest, at which time governmental oversight becomes important. Regulation is about targeting the effects of the new technology, determining acceptable behavior, and identifying who oversees those effects.
“Our history is clear: In a time of technological change, it is the innovators who make the rules.”
Effective regulation in a time of technological change is also about seeking new solutions to protect old principles. Our challenge in response to AI is the identification of the target effects, development of possible remedies, and structuring of a response that moves beyond industrial remedies to the data-driven AI challenge itself. The metamorphosis into an AI-based economy will be a challenge as great as the challenge 150 years ago of adapting an agrarian economy to industrial technologies.
While the list of AI-driven effects is seemingly boundless, there are at least two effects that reprise issues of the Industrial Revolution: the exploitation of new technology to gain monopoly power, and automation’s effect on jobs.
The capital asset of the 21st century
The Industrial Revolution was built on physical capital assets, such as coal or iron, that could be manufactured into new assets from building girders to sewing machines. The AI revolution, in contrast, is built on a non-physical asset: digital information. Pulling such information from various databases and feeding it into an AI algorithm produces as its product a new piece of data.
“Like the industrial barons of the 19th and 20th centuries, the information barons of today seek to monopolize their assets. This time, however, the monopoly has more far-reaching effects.”
By one estimate, about half of this new capital asset is personal information. The internet has created a new digital alchemy that transforms an individual’s personal information into a corporate asset. Like the industrial barons of the 19th and 20th centuries, the information barons of today seek to monopolize their assets. This time, however, the monopoly has more far-reaching effects. The consequence of a Rockefeller monopoly of oil or a Carnegie monopoly of steel was control over a major sector of the economy. The consequence of monopoly on the collection and processing of data not only puts the information barons in control of today’s online market, but also in control of the AI future by controlling the essential data inputs required by AI.
As mystical as artificial intelligence may sound, it is nothing more than algorithmic analysis of enormous amounts of data to find patterns from which to make a high percentage prediction. Control of those input assets, therefore, can lead to control of the AI future. Of course, monopolistic control of capital assets is nothing new. Historically, bringing the application of those assets into accord with the public interest has been a pitched battle. The results of previous such battles have been not only the protection of competitive markets, consumers, and workers, but also the preservation of capitalism through the establishment of behavioral expectations. Reaching an equivalent equilibrium when a handful of companies control the capital asset of the 21st century will be similarly hard fought.
AI and human capital
Another import from history is concern about the effect of automation on human capital. In the 19th century, when automation eliminated many of the farm jobs that had been the backbone of local economies, the former farm workers simply moved to the city and learned the rote jobs of factory workers. Such mobility was less available in the 20th century. The so-called “Automation Depression” of the late 1950s was attributed to “the improved machinery [that] requires fewer man-hours per unit of output,” but without the safety net of the worker’s ability to move to a new endeavor. Responding to effects such as this, President John F. Kennedy described machine displacement of workers as “the major domestic challenge of the ‘60s.”
In the information era, artificial intelligence and machine learning have similarly eliminated jobs, but they have also created jobs. ATMs eliminated the jobs of bank tellers, for instance, but bank employment is up because the savings was used to open new branches that required more trained customer service representatives. “The big challenge we’re looking at in the next few years is not mass unemployment but mass redeployment,” Michael Chui of the McKinsey Global Institute has observed. The AI-driven challenge, therefore, is to equip individuals with the skills necessary for information era redeployment: technical competence to interface with smart machines and the critical thinking and judgment capabilities those machines lack.
The Industrial Revolution’s demand for an educated workforce fostered a revolution in public education. Using factory-like methods, young raw material was fed into an educational process that 12 years later produced an employable individual with the math and reading skills necessary to understand the shop floor manuals. Such a basic level of knowledge allowed mobility among basic-skills jobs. If you lost your job making buggy whips, for example, your basic skills still worked at the automobile factory. The difficulty today is that those kinds of repetitive jobs are being turned over to AI. We run the risk of “preparing young people for jobs that won’t exist,” according to Russlynn Ali, CEO of the education nonprofit XQ Institute.
When Randall Stevenson, CEO of AT&T, told his workforce that those who don’t spend five to 10 hours a week learning online “will obsolete themselves with technology,” he identified a new educational paradigm for the information economy. “There is a need to retool yourselves, and you should not expect it to stop,” was his prescription. When it comes to human capital, oversight of AI’s effects extends to an education system that is geared to the skills necessary to exist and prosper in a smart world.
The right to a future
Defining the new technology in terms of its effects, and structuring policies to deal with those effects, allows us to move beyond the kind of demonic fear that historically characterized new technology. But it does not dispose of citizens’ concerns of adverse consequences to their future—especially their economic future.
Today’s politically explosive angst about immigration is not only an expression of fear about intelligent technology, but also about whether leaders care enough to do something about it. In historical perspective, it echoes the last time automation made people worry about their future employability. As industrial technology displaced workers in the 19th century, anti-immigrant sentiment was fueled by fear: “They’re coming to take our jobs.” In the 21st century the fear is now, “They’re automating to take our jobs.” Harvard Professor Jill Lepore has observed, “Fear of a robot invasion is the obverse fear of an immigrant invasion. … Heads, you’re worried about robots; tails, you’re worried about immigrants.”
“Societies impose government oversight for the protection of old principles in a time of new technology. Foremost among those principles is each individual’s right to a future.”
Societies impose government oversight for the protection of old principles in a time of new technology. Foremost among those principles is each individual’s right to a future; and it comes in multiple manifestations. In the educational realm, it means adequate training to be meaningfully employed. Economically, it means maintaining the benefits of capitalism through checks on its inherent incentive to excess.
Most importantly, the right to a future begins with the belief that there is a future, and that national leaders care about whether individuals affected by new technologies participate in that future.
The new technology lessons of history are grounded in two messages: Don’t panic and don’t stand still. The experiences with technological innovations of the past have taught us that we can be in control if we will assert ourselves to be in control.
The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions. Its mission is to conduct high-quality, independent research and, based on that research, to provide innovative, practical recommendations for policymakers and the public. The conclusions and recommendations of any Brookings publication are solely those of its author(s), and do not reflect the views of the Institution, its management, or its other scholars.
Microsoft provides support to The Brookings Institution’s Artificial Intelligence and Emerging Technology (AIET) Initiative, and AT&T provides general, unrestricted support to the Institution. The findings, interpretations, and conclusions in this report are not influenced by any donation. Brookings recognizes that the value it provides is in its absolute commitment to quality, independence, and impact. Activities supported by its donors reflect this commitment.
Report Produced by Center for Technology Innovation
- Tom Wheeler, From Gutenberg to Google: The History of Our Future (Washington, D.C.: Brookings Institution Press, 2019), 4.
- Christian Wolmar, Blood, Iron, and Gold: How the Railroads Transformed the World, First edition (New York: PublicAffairs, 2010), 78.
- John F. Stover, The Routledge Historical Atlas of the American Railroads, Routledge Atlases of American History (New York: Routledge, 1999), 44.
- Tom Standage, The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s on-Line Pioneers (New York: Walker, 2007), 52. | <urn:uuid:10712320-53cc-4efb-870c-82df18175c4d> | CC-MAIN-2019-51 | https://www.brookings.edu/research/historys-message-about-regulating-ai/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540486979.4/warc/CC-MAIN-20191206073120-20191206101120-00397.warc.gz | en | 0.943386 | 3,728 | 2.78125 | 3 |
Today is World Water Day! It is also the United Nations Year of International Recognition of Water Cooperation. The object is to raise awareness of water cooperation's initiatives and the challenges faced in many countries around the world.
World Water Day began in 1993 to promote the importance of fresh water to those who live without it around the world. They focus on issues such as cultural, religious, scientific, social, political and education to be able to best execute water cooperation. A common understanding of the needs and challengers regarding water are addressed.
Beginning in 2003 the UN-Water has been responsible for selecting a yearly theme for World Water Day. In the past, some topics have been addressed such as Water for Cities, Clean Water for a Healthy World, Sanitation, Coping with Water Scarcity, and Water & Culture.
Take a moment today to see how you can get involved in World Water Day. Many communities hold events but even if your town is not, you can work with charities such as Charitywater.org, Givewell.org and Waterforpeople.org.
Wishing you a world-class day! | <urn:uuid:658defeb-cf5f-41b0-a1bb-5fe73aee3886> | CC-MAIN-2019-39 | https://www.mrrooter.com/about/blog/2013/march/world-water-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575844.94/warc/CC-MAIN-20190923002147-20190923024147-00101.warc.gz | en | 0.959314 | 226 | 2.9375 | 3 |
#100DaysOfCode in Python Transcripts
Chapter: Days 79-81: Basic Database Access with SQLite3
Lecture: Analysing the DB with SQLite DB Browser
0:00 So we'll bring up the program here.
0:03 I've got mine open already.
0:04 Control + O will actually open up our open dialogue,
0:09 and there is our address book database.
0:12 So let's open that up.
0:15 You can get a bit of information here,
0:17 although this isn't the most detailed view,
0:19 but straight away, you can see
0:21 there's one table within this database,
0:23 with the name of details,
0:25 and it's got these three columns.
0:28 So let's actually go to browse data.
0:31 This looks more like what you sort of want to see
0:33 when you visualize your database.
0:36 There's the table name, there's our name column,
0:39 address column, and our phone number column.
0:42 In the next video, I'm going to show you
0:45 how to set this up automatically. | <urn:uuid:87698d76-3bbd-4781-87b3-16f3caaf365f> | CC-MAIN-2018-51 | https://training.talkpython.fm/courses/transcript/100-days-of-code-in-python/lecture/162805 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824115.18/warc/CC-MAIN-20181212181507-20181212203007-00468.warc.gz | en | 0.890189 | 265 | 2.859375 | 3 |
Recovering from an addiction is a very difficult experience and many people find it hard to quit cold turkey. As a result, some people find that replacing their addictive behavior with something similar, but less harmful, can help them recover from their addiction. Keep reading to find out why addictions are so hard to quit, and how changing addictions may be an effective form of treatment.
How Addiction Grabs Hold of the Brain
When someone is addicted to a substance or behavior, they are unable to stop their compulsions regardless of the potential and real consequences and risks of their addiction. The brain of an addict stores environmental cues that are associated with the addiction (such as a bar, or being around other addicts) in the hippocampus and amygdala.
These memories create a conditioned response—an intense craving for the drug or behavior—whenever an environmental cue is encountered. This conditioning causes many addicts to need therapy or treatment to quit their addiction, since their brain doesn’t know how to function normally if the craving is not satisfied.
How Switching Behaviors Can Help
Image Credit: Pexels
One of the things that makes quitting addiction so difficult is the new void that exists where the addiction used to be. An addiction is a coping mechanism, and without it, addicts can suddenly find they have no way to cope with challenging circumstances. This is where switching behaviors or changing addictions comes in.
Changing addictions involves replacing the addictive action, such as drugs or gambling, with a less damaging action, such as exercise or even just chewing a piece of gum. This works for some as an effective form of treatment. It hijacks the brain’s cue and reward system and inserts a different routine in the addiction’s place.
In order to effectively switch behaviors when going through a craving, one must first identify the environmental cue that is triggering them (such as being around friends who are using drugs, or walking past a casino) and the reward (the substance or action one is craving). Then, one must consciously choose to do a different action when the environmental cue occurs, such as chew a piece of gum or leave to get some exercise. Eventually the old addiction will be replaced with a new, less harmful (or even beneficial) habit.
Changing Addictions – A Holistic Approach
Image Credit: Ali Naqi
Many recovering addicts find switching behaviors to be a very helpful method of treatment, as they are able to engage in a new coping skill when they are craving their addiction rather than ignoring the craving and hoping it goes away.
Changing addictions isn’t about treating the chemicals in your brain, and it doesn’t require any medication. This makes it a great holistic treatment option for people who are struggling with addiction. In fact, if you switch your behavior with something healthy, such as exercise, you may even find that changing addictions benefits you physically as well.
Switching behaviors can be an effective holistic treatment option for someone who is struggling with addiction. If you are worried that you or a loved one is struggling with addiction, don’t hesitate to reach out for help from a professional to learn more about treatment options.
Feature Image: Larisa Birta | <urn:uuid:ed88c2b9-27bf-457b-895c-634bf90b1738> | CC-MAIN-2017-43 | https://www.teenrehab.org/resources/about-addiction/switching-behaviors-explaining-changing-addictions/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823255.12/warc/CC-MAIN-20171019065335-20171019085335-00112.warc.gz | en | 0.944897 | 655 | 2.828125 | 3 |
By systematically refining standard processing techniques, A*STAR researchers have developed a low-cost method for manufacturing an electrically conductive aluminum oxide ceramic composite — a hard-wearing material used in many industrial applications1.
Aluminum oxide (Al2O3) is one of the most commonly used raw materials. It can withstand temperatures of over 2,000 degrees Celsius, and its crystalline form, known as corundum, is one of the world's hardest naturally occurring materials, second only to diamond. It is also very cheap, and can be produced in vast quantities, so it is little wonder that it has found its way into a multitude of industrial applications, from fillers in paints, sunscreen and cosmetics, to abrasives, gas purification, catalysis, advanced filtration, ceramics and composite materials.
Aluminum oxide is an excellent electrical insulator. In some applications, however, such as catalysis and advanced filtration, the ability to electrify the material could provide significant benefits. For instance, in water filtration, aluminum oxide has great promise as a long-lasting filtration membrane that outperforms conventional polymer membranes — but only if the membrane can be electrified to prevent fouling.
Mixing aluminum oxide with conductive titanium nitride (TiN) is known to give a conductive ceramic composite, but has previously involved expensive or complex processing techniques. Wei Zhai and colleagues from the Singapore Institute of Manufacturing Technology have now adapted standard industrial processing methods to achieve a much more cost-effective result.
“We developed a novel processing method to fabricate electrically conductive Al2O3–TiN composites by combining ball-milling and reactive sintering, which are both typical methods for powder processing,” explains Wei.
The secret to their success was ball-milling together powders of Al2O3 and Ti, not TiN, and then heating (sintering) the formed shape under nitrogen to give the final conductive composite.
“Ti powder is much more ductile than TiN, which allows the powder particles to be stretched in the milling process,” says Wei. Her team found that the shape of Ti particles, and not their starting size, was the principal factor determining the amount of TiN needed to achieve conductivity. “This reduces the amount of Ti needed to achieve electrical conductivity, which we predicted theoretically.”
The team was able to produce a conductive composite with as little as 15 per cent TiN, and by using the smallest Ti particles, was able to prevent appreciable degradation of the material’s desired mechanical properties.
The A*STAR-affiliated researchers contributing to this research are from the Singapore Institute of Manufacturing Technology.
- Zhai, W., Song, X., Li, T., Yu, B., Lu, W. & Zeng, K. Ti reactive sintering of electrically conductive Al2O3–TiN composite: Influence of Ti particle size and morphology on electrical and mechanical properties. Materials 10, 1348 (2017).| Article | <urn:uuid:b43e7271-f210-4866-8e31-47f1c1ffc1e9> | CC-MAIN-2018-51 | https://research.a-star.edu.sg/research/7929/a-tougher-conductive-ceramic-at-lower-cost | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825098.68/warc/CC-MAIN-20181213193633-20181213215133-00508.warc.gz | en | 0.93884 | 638 | 3.578125 | 4 |
Phase 1 (2019-2020)
Assessing MHH Measurement Priorities
In March 2019, our core group of MHH experts, supported by the Water Supply and Sanitation Collaborative Council (WSSCC) co-convened a multi-sectoral group of researchers, practitioners, monitoring and evaluation specialists, and national governments to assess priority indicators across key sectors (education, gender, health [psychosocial, sexual and reproductive], and WASH) within global health and development. The group sought to assess the alignment of the identified priority indicators with menstruation in relation to adolescent girls in and out of school. For more information, please see the Green Paper which includes recommendations on next steps and priority actions.
- Sommer, M., Torondel, B., Hennegan, J., Phillips-Howard, P.A., Mahon, T., Motivans, A., Zulaika, G., Gruer, C., Haver, J., Caruso, B., & Monitoring Menstrual Health and Hygiene Group (2021). How addressing menstrual health and hygiene may enable progress across the Sustainable Development Goals, Global Health Action, 14:1.
- Sommer, M., Zulaika, G., Schmitt, M., Gruer, C. (Eds.) (2019). Monitoring Menstrual Health and Hygiene: Measuring Progress for Girls on Menstruation; Meeting Report. New York & Geneva: Columbia University and WSSCC.
These five one-pagers provide snapshots of the key insights per priority area:
- Overview: Education & MHH
- Overview: Gender & MHH
- Overview: Psychosocial Health & MHH
- Overview: Sexual and Reproductive Health & MHH
- Overview: Water, Sanitation and Hygiene (WASH) & MHH | <urn:uuid:ef9a5f20-ab25-4504-ab65-603d92e3b133> | CC-MAIN-2023-23 | https://www.publichealth.columbia.edu/research/programs/gate/monitor-mhh/phase-1-2019-2020 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00139.warc.gz | en | 0.760038 | 390 | 2.609375 | 3 |
How to relieve muscle pain
If you start a new fitness programme or activity, it’s likely that you will experience muscle soreness. Don’t be deterred. Although it can be uncomfortable, muscle stiffness or achiness is normal. Delayed onset muscle soreness (DOMS) is actually a sign that your body is adapting to the workout. It’s how you get fitter and stronger.
The stiffness or soreness occurs because exercise causes microscopic damage to the muscles. The pain tends to happen within a day or two after exercising, and can affect anyone from beginners to elite athletes.
The level of soreness depends on the type of workout, the intensity and on the individual’s fitness background. If you start a new exercise programme, change your existing routine, or increase the intensity of your sessions, you are likely to experience DOMS.
The good thing is that it doesn’t last for long. You’ll feel better within a few days, and the next time you do the same workout, your body will be better able to cope with the physical demands placed on it. There are also ways to reduce the risk and severity of the muscle stiffness. If you’re struggling with sore muscles, here’s what you can do.
A good warm up is essential before any exercise session. Warming up gets your mind and body ready for exercise. If your body is prepared, the muscles will be able to cope with the demands of the sport or activity. Warming up reduces your chances of injury, and allows you to train harder, thereby improving your performance.
If you are starting a new sport or activity the best thing is to start sensibly. A gentle and gradual approach with light training will allow your body the time it needs to adapt to the new exercise, which should minimise any soreness or stiffness.
Dehydration can make the muscle soreness worse, so it’s important to stay hydrated before, during and after exercise. Make sure you replace the fluid you use during a workout, before your next session. As well as keeping you hydrated, water can also help flush out toxins. You can monitor hydration levels by checking the colour of your urine. If it’s darker, you need to drink more. Recovery-boosting protein supplements can also help as they kick start the muscle recovery process.
Drinking cherry juice can also help prevent and reduce muscle damage. Tart cherries are rich in antioxidants and are also anti-inflammatory. According to a study published in the Journal of the International Society of Sports Nutrition, drinking tart cherry juice seven days before, and during a strenuous running event can minimize post-run muscle pain.
A study by the University of Georgia suggests that drinking caffeine can help reduce post-workout muscle soreness. The researchers found that the equivalent caffeine of drinking around two cups of coffee cut post-workout muscle pain by almost 50 per cent in a small sample of volunteers.
Rest and recovery
Getting plenty of rest and sleeping well is the most effective treatment. Doing some light exercise, such as a steady jog, can help as it circulates blood flow to the muscles. Ice packs and massage might also help alleviate the pain.
When it comes to DOMS the important thing to remember is that it is a type of muscle conditioning. The next time you do the exercise, the muscle tissue damage will be minimal. Not only will your recovery be quicker, but you’ll also be getting fitter. Don’t let the muscle pain put you off exercise.
Did you know?
The NHS states ‘not drinking enough water can have a major effect on your performance.’† When we are hydrated we feel at our best: our muscles, heart and the brain work at their optimum. That's why we supply sports water at PureGym. It's chilled, filtered, sugar-free and contains essential vitamins and only five calories per serving. There are six tasty and fruity flavours to choose from and you can get four servings for FREE! Everybody’s welcome to try our sports water, there is no commitment at all. Then, for just £4 a month, you can enjoy 500ml every time you visit the gym. To find out more ask a member of the team or visit puregym.com/hydrate
*Available in the following gyms: Banbury, Spinningfields, Liverpool Central, Southampton Bitterne, Aldgate and Hammersmith. | <urn:uuid:d1b7d8c2-ad76-4154-8e4b-adef295db8e2> | CC-MAIN-2023-06 | https://www.puregym.com/blog/how-to-relieve-muscle-pain/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500628.77/warc/CC-MAIN-20230207170138-20230207200138-00558.warc.gz | en | 0.929957 | 978 | 2.546875 | 3 |
Turmeric is a rhizomatous herb, a perennial plant, belongs to the ginger family. Turmeric has been used in India for thousands of years as a spice and for it’s medicinal values. The Curcumin present in Turmeric is known for it’s anti-inflammatory, anti-oxidant and antiseptic properties.1)https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3633300/.
We present you the 8 incredible health benefits of turmeric, with references to scientific studies.
Turmeric Boosts Cognitive function
Curcumin protects brain cells, though how curcumin exerts it’s effect is not certain, is seems to reduce brain inflammation, the major reason for Alzheimer’s disease.
Studies show that due to various effects of curcumin, and it’s anti-inflammatory properties and decreased microglia2)https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3277080/ formation, the overall memory of patients with Alzheimer’s have improved.3)https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2781139/
Turmeric Fights Inflammation
Curcumin is a natural anti-inflammatory compound, that has been proven to significantly lower the levels of inflammatory markers4)https://www.ncbi.nlm.nih.gov/pubmed/19594223.
Research shows that chronic(long-term) inflammation is the reason behind major health problems like heart disease, cancer and metabolic syndrome. 5)https://www.ncbi.nlm.nih.gov/pubmed/12490960,6)https://www.ncbi.nlm.nih.gov/pubmed/12490959.
Curcumin prevents inflammation at the molecular level, it prevents NF-kB a molecule that binds with DNA and causes gene related inflammation. 7)http://www.jbc.org/content/270/42/24995.full.
Turmeric Supports Cardiovascular Functions
The main reason for the development of heart disease is metabolic syndrome, which includes abdominal obesity, hypertension and glucose intolerance. Curcumin acts through multiple pathways, acts as a multi targeted supplement, reducing the cardiovascular disease risks.8)https://www.ncbi.nlm.nih.gov/pubmed/28192240,9)https://www.ncbi.nlm.nih.gov/pubmed/28012169.
Human studies have shown that Curcumin reduces chronic inflammation caused by obesity and metabolic syndrome.
Turmeric Gives You a Radiant Skin
Curcumin promotes soft, smooth, glowing skin and fights fine lines and wrinkles10)https://www.ncbi.nlm.nih.gov/pubmed/27213821, the anti-inflammatory properties of Turmeric revives your skin and brings out the natural glow.
It can help in healing wounds, by decreasing inflammation and oxidation, and studies show that curcumin enhances tissue formation and collagen deposition11)https://www.sciencedirect.com/science/article/pii/S0024320514007036.
Turmeric Supports Joint and Muscle Health
Curcumin promotes a healthy inflammatory response and eases aches and pains. Studies show that Curcumin relieves from pain for those who are suffering with arthritis and osteoarthritis, reduces morning stiffness and joint swelling12)https://www.ncbi.nlm.nih.gov/pubmed/22407780.
Studies show that 500mg of curcumin extract every day had reduced the WOMAC13)Western Ontario and McMasterUniversities Arthritis Index score by 58%.14)https://www.ncbi.nlm.nih.gov/pubmed/20657536.
Turmeric Detoxifies Liver and Organs
Turmeric accelerates the cleansing and optimizes the function of your Liver, Gut and colon. Curcumin stimulates the production of bile, which is used by the liver to eliminate toxins. Turmeric removes cholesterol from liver and saves you from fatty liver disease15)https://link.springer.com/article/10.1007/BF01088486.
Turmeric helps to prevent liver cirrhosis, studies have shown that curcumin reduces oxidative stress and control liver damage16)https://www.ncbi.nlm.nih.gov/pubmed/17355460.
Turmeric Promotes Healthy Mood Balances
Curcumin has been shown to be an extremely effective natural mood enhancer. Studies show that turmeric is effective against depression and anxiety. Curcumin relieves you from acute anxiety and enhances the effect of antidepressants17)https://www.ncbi.nlm.nih.gov/pubmed/26066335.
Curcumin helps in balancing the serotonin and dopamine levels, enhances the production of glutathione an essential anti-oxidant for brain health.
Turmeric Promotes Weight Loss Naturally
Curcumin can enhance wright loss when combined with healthy diet and exercise. Turmeric is rich in vitamins B and C, α-linolenic acid, omega-3 fatty acids, sodium, potassium and natural fibers.
Curcumin prevents the accumulation of fat in adipose tissues and triggers fat loss18)https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3144156/,19)https://www.ncbi.nlm.nih.gov/pubmed/19297423.
Turmeric is a natural Antibiotic, Anti-inflammatory and Antiseptic, helps in detoxification of liver and promotes healthy immune response to allergens, helps in digestion and helps in detoxification of lungs. Contains a flavonoid called “CURCUMIN” which boosts the immunity of the body naturally.
You can read more on the preparation of Golden Milk or Turmeric Milk Latte, to increase the vitality of your body and boost your immunity.
Subscribe to Blog via Email
References [ + ]
|13.||↑||Western Ontario and McMasterUniversities Arthritis Index| | <urn:uuid:c6830288-3c04-40f6-bb7e-f1e0e8d974c6> | CC-MAIN-2019-39 | http://askdrtanu.com/food-and-diet/8-incredible-health-benefits-of-turmeric/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514570740.10/warc/CC-MAIN-20190915052433-20190915074433-00289.warc.gz | en | 0.765976 | 1,311 | 3 | 3 |
For many Swallow-tailed Kites, reaching the tip of the Yucatan Peninsula in Mexico means they have entered the home stretch of their northbound migration. One last 500-mile-plus push across the dazzling teal waters of the Gulf of Mexico and they’re back over land, reaching their nesting locations with plenty of juicy, nutritious food available along the way.
But the weather can make or break the trip. Northerly winds pushing down the Gulf of Mexico make the risky, direct route home even more challenging. Instead of riding southerly tailwinds, the kites must struggle upwind. Some end up stalled over open ocean, exhausted.
Luckily, failure was not in the cards for Bogue Falaya, Lacombe, Palmetto, and Sarasota. They all made it safely across the Gulf of Mexico, albeit in unexpected ways.
Bogue Falaya was the first of the four to start crossing the Gulf of Mexico, on 9 March. Strong northerly winds forced him to double back and linger off Mexico’s coast until the evening of 10 March, when he was finally able to resume northward travel. At 4 am on 12 March, Bogue Falaya made landfall in the panhandle of Florida near Carrabelle. He was still in the area as of 20 March.
The last two years, Lacombe was able to fly almost due north from the Yucatan Peninsula to his nesting grounds in Louisiana. But not this year. He left the Yucatan Peninsula on 11 March and was immediately pushed eastward, reaching land near Sarasota, Florida, on 12 March. Ever since, he’s been working his way westward, over land, towards Louisiana.
Palmetto waited until the winds quieted to cross. Leaving on 15 March, she was able to fly due north across the Gulf and reach Panama City, Florida, on 17 March. She cut east to the Florida Panhandle, then turned towards South Carolina just north of Jacksonville, Florida. By 20 March, she had reached her nesting grounds. This seems to be her favored flight path, as she took a very similar route in 2017. Who could quibble with her methods? Since being tagged, Palmetto has survived 7 yearly round-trip migrations – that’s over 70,000 miles. What an amazing feat.
Sarasota left the Yucatan Peninsula on 17 March. Instead of flying the short, direct route back to Sarasota County, Florida, Sarasota slowly drifted northeast for two days and reached Steinhatchee, Florida, on the morning of 19 March. Returning to last year’s nest site will be the next priority. | <urn:uuid:6f4bb406-5e70-4cbb-acf5-8edbf944667e> | CC-MAIN-2019-13 | http://www.swallow-tailedkites.org/2018/03/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202199.51/warc/CC-MAIN-20190320024206-20190320050206-00102.warc.gz | en | 0.967479 | 557 | 2.625 | 3 |
In March 2016, two hikers on a trail east of Seattle, WA, found a little brown bat lying on the ground in obviously poor condition. The bat was taken to an animal shelter where it died two days later from White-Nose Syndrome (WNS).
This bat was the first case of WNS found west of the Rocky Mountains. It represented a jump in the spread of WNS, and a troubling one. WNS was first detected in a cave in Albany, New York, and since then it has been moving slowly westward at a rate of about 200 miles per year, according to David Blehert of the United States Geological Survey, the laboratory that confirmed the WNS diagnosis for the Washington bat. Before this year’s discovery outside of Seattle, the westward-most case detected was in eastern Nebraska.
WNS, caused by a cold-loving fungus, Psuedogymnoascus destructans (Pd), can kill 100% of the hibernating bats in a colony, and in the ten years since it has been detected and monitored has killed over 6 million bats in the United States and Canada. As of July 2016, bats infected with the fungus have been found in 29 states and 5 Canadian provinces.
According to Blehert, this is probably the “most significant epizootic of wildlife” ever observed; never before have we seen hibernating mammals specifically affected by a skin fungus. What does that mean? Are we looking at extinction for some bat species? What are the ecological consequences of rapidly losing so many individuals to disease so quickly? And, what, if anything, can be done to combat the disease and help bat populations recover?
Contributions of Bats
Bats are significant contributors to many ecosystems—making up almost one-fifth of all mammalian species on Earth and living in almost every habitat, from cave to desert to riparian forest. They also contribute significantly to our agricultural economy. Guano is the primary nutrient of the cave ecosystem—containing bacteria and other microorganisms—that the other animals of caves depend on for survival.
As pest controllers, bats have huge economic importance to commercial agriculture, and are estimated to save farmers in the U.S. alone estimated 3.7 billion dollars annually by preventing pest damage and reducing pesticide use. In a 2015 study, Maine and Boyles looked at crop protection against the corn earworm provided by bats found that not only did bats protect the crops from pest damage, but the protective effects extended indirectly to suppressing two opportunistic plant pathogenic fungi (Aspergillus flavus and Fusarium graminear) that produce toxic products (alflatoxin and fumonisin), which reduce the value of corn. A different study by Reiskind and Wund from 2009 reported a significant decrease in egg-laying activity of female mosquitos that were subjected to predation by the northern long-eared bat.
Bats that are not insectivores typically eat fruits and nectar, and as such are important seed dispersers and pollinators, particularly for night blooming plants and desert plants like the Agave plant and Seguaro cactus. Fermented juices from the agave plant are used to make tequila and drive a multi-million dollar industry. In the absence of bats, agave propagation is estimated to fall to 1/3,000 of normal.
Bats also can have indirect effects in other ecosystems, for instance a study by Miller and Chernoff from Wesleyan University showed a correlation in increase of fish abundance with decreases in the call abundance of two bat species. They suggest that decreased bat predation of insect species in the river may be responsible for the increase in fish abundance through a “predator release” mechanism. This work is evidence of aquatic-terrestrial linkage in the river ecosystems that they studied.
What we know about WNS and Its Effects
One of the interesting observations of this epizootic is that bats in North America are being killed by this fungus, but bats in Europe and Asia appear to be tolerant to it; infection with the fungus is less severe in Europe and Asia. Scientists working on understanding WNS are attempting to identify any differences among fungus isolated from bats in Asia, Europe and North America and the bat responses to it. The bat species in Asia and Europe tend to be larger, and perhaps that gives them more reserves to use to survive the disease.
Meanwhile, much work has been done to understand progress of the disease in affected bats in North America. Verant et al. published work in 2014 that described WNS as a disease that progresses through multiple stages. Early stage disease involves Pd colonizing the wing of the bat. Once the fungus is established, it damages the epidermis. During this early stage, carbon dioxide levels in the blood also increase, leading to acidosis and increased potassium levels (hyperkalemia).
As the carbon dioxide levels continue to rise, chemoreceptors are triggered that stimulate hyperventilation, causing arousals from torpor in an attempt to remove the excess carbon dioxide. The energy required for these arousals depletes hibernation fat reserves. Additionally the arousals would increase body temperature, causing more evaporative water loss and dehydration of the animal.
As the disease becomes more severe and the damage to the epidermis worse, water loss may increase through the lesions, causing more arousals from hibernation to drink. The increased arousals use more fat stores and energy, feeding back and causing a vicious cycle, leading to death of the animal. Even if the bat survives to emerge in spring, according to Blehert, it may mount an overly vigorous immune response that actually exacerbates the disease.
So now that we are developing an understanding of the disease physiology and the organism that causes it, what is next in the fight against WNS?
Researchers want to look closely at the individual strains of the fungus that are found in Europe, Asia and North America to see how they are related to each other genetically. Do the North American fungal strains represent some kind of recently emerged super pathogen? Or, are they really similar to the strains found in other areas and the differences lie strictly in the response of the bats?
What can we learn from the environment? If we look at the soil in the caves with and without WNS, is there something about them that either promotes or prevents the development of environmental reservoirs of Pd. Are there naturally occurring microorganisms in cave ecosystems that could provide some protection to bat communities? Is there another fungus that is non-pathogenic that can compete with Pd in the cave ecosystem and prevent it from becoming established in large amounts?
And even, is it possible to develop an oral vaccine that could be given to bats to lessen or prevent the pathology associated with the presence of the fungus?
All of these are ongoing areas of research as we seek to understand and hopefully control this devastating epizootic. | <urn:uuid:ed0ae86c-b897-46d2-b6aa-cc35cbe6303b> | CC-MAIN-2022-27 | https://www.promegaconnections.com/an-epizootic-for-the-ages-revisiting-the-white-nose-syndrome-story/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103334753.21/warc/CC-MAIN-20220627134424-20220627164424-00002.warc.gz | en | 0.951453 | 1,426 | 3.90625 | 4 |
What we see in life is not necessarily reality, What’s scary is when our lives are at stake. When you are accused of a serious crime, and you have a witness is testifying, and your verdict depends on his words. How accurate is what he saw? Were not questioning his truthfulness, we are questioning if his brains recaps as what happened, did it actually happen?
A college professor showed a video of a robbery to his class, and asked the class afterwards to write a description of the video. Most described the robber as African-American, when he actually was Caucasian! Why is that? because the brain always tries to define what they see with the knowledge it has. In this case since a big part of the robbers are african americans, the brain automatically associated the robber as an african american.
Here a professional speak on this matter:
Try it on yourself by watching this video. Enter, the Ames Room;
What do you think? | <urn:uuid:7a240797-ba92-428a-82c8-5ad6e3890dfb> | CC-MAIN-2018-30 | https://firedlion.wordpress.com/2014/10/20/what-you-see-is-what-you-get/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593302.74/warc/CC-MAIN-20180722135607-20180722155607-00550.warc.gz | en | 0.980307 | 201 | 2.625 | 3 |
In 1776, Henrico representatives Richard Adams and Nathaniel Wilkenson participated in the Fifth Virginia Convention, which voted to send delegates to the Continental Congress to propose separation from the British. That proposal led to the Declaration of Independence.
During the Revolutionary War, when Benedict Arnold’s invading army occupied Richmond in January 1781, the Henrico militia was called to active duty. During the brief British occupation of Richmond, many Henrico court records were destroyed.
Three months later when Arnold’s men, now part of British forces led by General William Phillips, approached Richmond for a second time, the British were stopped by the sight of local militiamen and American Continental troops led by a young Frenchman, the Marquis de Lafayette. Outnumbered, Lafayette abandoned Richmond when General Charles Cornwallis occupied the town in June 1781. Cornwallis then retired to Williamsburg and later to Yorktown. After being surrounded there by General George Washington and his French allies, Cornwallis surrendered, effectively ending the American Revolution.
The Virginia Convention Of 1788
In 1788, the General Assembly called a special convention to consider the ratification of the proposed United States Constitution. Henrico sent Governor Edmund Randolph, who presided over the convention, and John Marshall, future chief justice, as delegates. After 25 days of heated debate, Virginia voted 89-79 in favor of ratification. Counted among the aye votes were Randolph and Marshall. | <urn:uuid:c94209df-0e48-4ef4-8d5e-924edfcd3b73> | CC-MAIN-2016-44 | http://henrico.us/history/ourhistory/henricos-beginning/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721606.94/warc/CC-MAIN-20161020183841-00021-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.94816 | 292 | 4.25 | 4 |
India’s decision to vote against the resolution on the death penalty at the September Session of the Human Rights Council further dents its reputation as the world’s largest democracy. The actions of India internationally do not seem to reflect the values that have animated the vibrant, constitutional democracy for over six decades.
The resolution on the death penalty, among other things, condemned the “imposition of the death penalty as a sanction for specific forms of conduct such as apostasy, adultery and consensual same sex relations” and urged all states to “protect the rights of persons facing the death penalty”. The resolution sought to limit the application of the death penalty to the “rarest of the rare” cases, ensure non-discriminatory application of the death penalty as well as to identify the “underlying factors that contribute to the substantial racial and ethnic bias in the application of the death penalty”.
Prior to the final vote India, India voted for amendments (moved by Russia and Egypt) that sought to dilute the resolution by subjecting action under it to “decision based on domestic debates at the national level” and reaffirming “sovereign right of all countries”. However India’s joint efforts (along with Saudi Arabia, Russia, China and Egypt) to water down the resolution did not succeed. All the amendments failed.
In the final vote on the resolution, India voted along with 12 other countries against the resolution, while 27 countries voted for the resolution and seven countries abstained. Keeping company with India in the “no” vote camp were China, Egypt, the US and Saudi Arabia. The countries that voted for the resolution included Ghana, Brazil, South Africa and several Latin American and European countries. In effect, India choose to ally with repressive regimes and choose not to align itself with those countries that would be considered democracies.
A poor reputation
Over the years, India has generally voted “no” on the moratorium on death penalty resolutions both at the General Assembly and at the Human Rights Council. This position has not varied under either the Congress-led United Progressive Alliance government or the current Bharatiya Janata Party-led administration. India, on the international stage, is developing a reputation as a wilful obstructer to development of human rights norms rather than as a human rights leader (as behoves the world’s largest democracy) .
The only burnishing of Indian democracy on the international stage really comes from the actions of the judiciary. The United Nations Secretary General in his reports on the moratorium on the death penalty has repeatedly cited the decisions of India’s Supreme Court, which has sought to limit the application of the death penalty and protect the rights of those who have been sentenced to death. But nothing that the Indian government has done has elicited any positive response in any of the Secretary General’s Reports on the moratoriums on the death penalty.
India’s vote on the death penalty showed a lack of support for the proposition that death penalty should not be imposed for “apostasy, adultery and consensual same sex relations”. Since the Constitutional position is that death penalty can be imposed only “in the rarest of the rare cases”, that rules out any future fanciful possibility of imposing the death penalty for “apostasy, adultery and consensual same sex relations”. Such act would fall foul of the Indian Constitution as it has been interpreted by the Supreme Court. Since it is an incontrovertible position in Indian jurisprudence that India would not impose the death penalty for these crimes, why won’t India take a leadership role and support such propositions internationally? To state that the death penalty should not be applied on these grounds is to strongly affirm the fundamental norm of both the Indian Constitution as well as the international law – the right to life.
The obligation that flows from being a constitutional democracy requires that positions India takes at the international level are not mere coinage in realpolitik but rather derive from and reflect constitutional values. Till such time as those crafting India’s internationally policy positions see fidelity to the Constitution as a virtue, we are likely to witness contradictions such as that of a democracy voting to preserve the death penalty in all its manifestations.
Human rights lawyer Arvind Narrain is the Geneva director of ARC International, an organisation that aims to advance recognition of human rights based on sexual orientation and gender identity at the international level.
Respond to this article with a post
Share your perspective on this article with a post on ScrollStack, and send it to your followers. | <urn:uuid:51551aec-38d5-4b2c-8b4e-e6d1d4db31a6> | CC-MAIN-2021-43 | https://scroll.in/article/852859/contradicting-the-constitution-what-indias-vote-against-un-resolution-on-death-penalty-means | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587877.85/warc/CC-MAIN-20211026103840-20211026133840-00361.warc.gz | en | 0.946123 | 948 | 2.53125 | 3 |
The Animal Mind by James Gould and Carol Grant Gould, Scientific American Library, pp 236, $32.95
Beavers know more about hydrodynamics than many a human plumber or engineer, it seems. When their dams are seriously damaged and they are forced to make emergency repairs, they show 'far more presence of mind than do some humans in analogous situations, discarding familiar techniques as they prove futile and trying what seem to be novel strategies' James Gould and Carol Grant Gould tell us in The Animal Mind.
Biologists who have observed beavers in action find it impossible to conceive how they could do all that they do without at least some notion of what they are intending to create. As the Goulds put it in this excellent book, if beavers aren't thinking at some level about how best to achieve their ends, 'then the power of innate programming extends far, far beyond ...
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content. | <urn:uuid:ed919134-23a8-49b0-9b32-304c8f9ca756> | CC-MAIN-2014-23 | http://www.newscientist.com/article/mg14319384.300-review-the-case-for-presence-of-mind.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997869778.45/warc/CC-MAIN-20140722025749-00205-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.957842 | 209 | 3.125 | 3 |
Last week, the House Finance Committee’s Subcommittee on Domestic and International Monetary Policy, Trade, and Technology (the HFCSDIMPTT for short) held a hearing about whether the United States should invest in a multilateral fund to support the deployment of clean energy technology in the developing world. There’s been talk of World Bank investment in clean tech for years; now they’re asking G8 nations to pony up.
The hearing stemmed from a Bush administration proposal to put $2 billion over three years toward a “Clean Technology Fund” administered by the World Bank; other nations would contribute a total of $8 billion to the fund. As the names suggests, these funds are supposed to be used to help developing countries green their energy sources. But according to the testimony of several international nongovernmental organizations, the programs that would get funded aren’t all clean. Among the potential recipients of funding are, for instance, coal-fired power plants.
David McCormick, undersecretary for International Affairs in the U.S. Department of Treasury, testified to the subcommittee in support of the fund, on behalf of the Bush administration. “Each time they invest in dirty technology, the more difficult it will be to mitigate climate change in the future,” said McCormick.
He also stressed the valuable roll the fund could play in helping bring countries like China and India on board for a new global climate pact. “The Clean Technology Fund will do more make an impact on the growth of greenhouse gas emissions in the developing world,” said McCormick. “It will develop trust, which is critical for a world climate agreement.”
Of course, most environmental organizations would love to see investment in international projects to encourage green technology in the developing world, where the use of dirty technology is rapidly expanding. But where that money goes — and whether the World Bank is the best vehicle to deploy those funds — is a concern. As we’ve noted here several times over, the World Bank ain’t all that green.
Under the proposed clean technology fund, money could go toward minor environmental improvements to things like new coal-fired power plants, rather than technologies that are actually clean and renewable. Enviros would like to see the funding be directed more specifically to making green energies more available in these countries.
Brent Blackwelder, president of Friends of the Earth, testified to the subcommittee on why they should proceed with caution in allocating funds to this program. He suggested to the subcommittee that they consider requesting that the Bank outline a definition of “clean technology” before funds are allocated, and that they reconsider whether these funds might be better invested through other mechanisms.
“Coal is dirty from start to finish,” said Blackwelder. “It is not acceptable if we want to go in another direction that does not have further fossil fuel lending.”
David Wheeler, a senior fellow with the Center for Global Development and a former top economist in the World Bank’s Development Research Group, echoed Blackwelder’s concerns. “The only credible argument for a technology fund is to use it for renewable technologies,” said Wheeler.
That could be achieved, he said, by putting conditions on their allocation of funds — like a focus on clean technologies, a push for the most cost-effective solutions, and a system of “carbon accounting” for all projects. Jacob Werksman, program director of the institutions and governance program at the World Resources Institute, added that U.S. leadership in funding green tech in the developing world would be integral to ensuring that other countries can adopt more climate-friendly energy sources. That investment, or the next decades, would need to be in the trillions of dollars, he said.
But the Bush administration’s representative at the hearing didn’t think the fund should be given specific guidelines. “We don’t think the government should be in the business of picking technologies,” said McCormick.
Friends of the Earth and a group of 120 other NGOs has put out a statement opposing the World Bank’s proposal. | <urn:uuid:d56ed5ba-ccc2-48d6-9690-a6ea5ed9ac98> | CC-MAIN-2022-33 | https://grist.org/article/should-the-world-bank-get-the-coal-shoulder/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00559.warc.gz | en | 0.935018 | 860 | 2.875 | 3 |
The vast majority of us get chickenpox as little ones, as well as some individuals are continue to remaining which has a notify-tale memento using the practical knowledge: a modest scar on the facial area or neck specifically where we scraped the moment as well usually. But most of us are leftover with yet another legacy of that typically undamaging childhood contamination: shingles.
Shingles is definitely an excruciatingly distressing rash which takes place in persons who've got chickenpox. The malware that creates chickenpox, scientifically recognized as the varicella-zoster computer virus, could be the exact one particular which induces shingles (a kind using the herpes virus). What occurs is that just following you've skilled the pox, it is situated inactive in your general entire body. Then, almost certainly several years afterwards, it re-emerges - during the assortment of the stressful and anxiously agonizing and unsightly allergy.
- Some scientists state that shingles is just not just a skin pores and skin.
- Shingles can imitate other microbe microbe infections, but.
- Temperature and chills.
- Recognizing You've Shingles.
Unfortunately, shingles is really a ton nastier than chickenpox for that overwhelming majority of people that get there straight down by using it. The most severe little bit, even though it is rather unheard of, is basically that you is usually remaining with postherpetic neuralgia. One of the better ways to clarify it could be the skin area "maintains" a memory together with the allergy, that makes it unbelievably painful to touch for many years to come back, even as soon as the distinctive an infection is over.
Is rather unheard
About just one in 5 people today who create shingles get postherpetic neuralgia, plus the the huge bulk of them start to see the discomfort disappear completely in approximately 1 to some few several weeks. For individuals who already have it pretty inadequately there are plenty of medications on offer you, like kinds manufactured use of to cope with despair and seizures (now there's a benefit!). However, it usually requires some several weeks to them to function.
Postherpetic neuralgia plus the the
Some experts claim that shingles is not really only a epidermis sickness necessitating a pay a visit to in the skin medical professional, but a nerve problem. It's received been revealed as feelings comparable to a very hot curling steel is currently being used about the skin pores and skin area. The reason: the main with all the nerves is just where the chickenpox infection has actually been hiding at any time seeing that you obtained it, in every probability to be a newborn. Now it is actually growing over again - but this period which has a vengeance.
Recognizing You've Shingles
Recognizing You've Shingles
Shingles can mimic other microbe infections, but it is actually actually fairly uncomplicated to spot (no pun meant). For a couple bizarre rationale it transpires on an individual facet from your general physique or face only, and is also described with a chickenpox-variety rash total of fluid-stuffed bruises. Some endowed folk just see that their shingles itch, many others receive them way too annoying to feel.
Based on the Mayo Center, right here are definitely the signals that you just could have shingles:
Are definitely the signals that you just
Pain, getting rid of, tingling, tingling or extraordinary sensitivity within a specific component of your complete body
A crimson allergy that begins a couple of time after the ache
Substance-loaded sore spots that split start and crust about
Fever and chills
Annoyed belly or belly pain
Make sure you discover that for many who in no way experienced chickenpox but have been inoculated vs . it, you happen to be continue to a first-level choice for contracting shingles. Sorry!
Guarding towards Shingles
The Zostavax vaccine will lower the chance of experiencing shingles - and definately will lower the span of your respective disease just in case you catch it. Initially the vaccine was for men and women old 60 and previously mentioned only. In trials, it piece the amount of disease in 50 Per cent. Handling a primary strike with antiviral medications could also lower the severity inside the an infection.
Curiously, elderly people with shingles can relocate the infection to many others, normally a youngster, and he / she will get chickenpox. You can't transfer true shingles on to other people, and men and women with chickenpox are struggling to move on shingles to other people.
Below is exactly what a person identified only as Q published spanning a sports activities website about his knowledge with shingles:
"Had it inside the facet of my go all around to my eye lid about about three ages back. Painful mind for about per week, then got worse and at some point sensed like someone was crushing my go in a vice for about every week. Was on antiviral medicine to obtain a few of days and also two types of pain relievers. Also eyesight falls to halt happen onto eyeball which could produce loss of sight. I however get irritation for the reason that facet of my go once in awhile, apparently this is often really widespread and may final for some time."
Like its small brother chickenpox, shingles will likely be somewhat safe. Nevertheless it definitely might cause difficulties in certain people. In the event you are HIV-optimistic, possessed possessed a new organ transplant or use a suppressed defense for other brings about, continue to keep substantially out - ditto if you are pregnant or an grownup having by no means experienced chickenpox. During these folks, shingles could result in intensive problems.
There is out there commonly the unusual side effect of Ramsay Hunt issue, which happens when shingles affects the ear canal. This may bring about don't just earache and in addition vertigo, face paralysis and uncertainty. Particularly almost never shingles could impact the thoughts and vision.
Effect of Ramsay Hunt
Keep in mind the infection may be reactivated, even though normally this occurs with older consumers who've an weakened defense issue. Getting chemo or radiotherapy, extra liquor intake, receiving steroids long term and tension can all embark on an activity in activating shingles. In reality, medical experts have discussed that stress and anxiety can conduct a critical functionality inside our obtaining the virus.
In case you get shingles keep aside from susceptible folks and take it basic. It will almost certainly generally really clear up alone within several a few months. It is possible to consider oat meal baths and use lotions in order to alleviate the signs, a whole lot if you would do with chickenpox, as well as select antiviral medications - the previous the bigger. They might reduce the length from the an infection and permit make sure it can be considerably more endurable.
A whole lot if you
- "Got it on the side of my mind about to my eye lid about three yrs back. Tender.
- As defined by the Mayo Medical clinic, in this article is the impulses you probably.
- Listed below is really what someone accepted only as. | <urn:uuid:543051ee-5c45-4bbb-be8e-6a3502d72c6a> | CC-MAIN-2017-30 | http://mopapy.com/shingles-virus-get-rid-of-and-avoidance8648/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423808.34/warc/CC-MAIN-20170721182450-20170721202450-00509.warc.gz | en | 0.958407 | 1,515 | 2.53125 | 3 |
Mérida is the capital and largest city in Yucatan, Mexico, as well as the largest city of the Yucatán Peninsula.
Mérida was founded January 6, 1542 by Francisco de Montejo y León (“el Mozo”) and named after the town of Mérida, Spain. The Mayan city was once known as T’hó or Ichkanzihóo meaning “The City of Five Hills” as reference to the five pyramids found inside the city.
T’ho had been a center of the Mayan culture and activity for centuries, and quickly became an important city for both Maya and Spanish.
Conquistadors found a major Maya settlement of lime-mortared stone which reminded them of the Roman architecture in Mérida Spain. The city was renamed and Montejo´s men proceeded to convert it into the regions capital. Mayan structures were dismantled and the existing materials were used to construct the cathedral and other majestic buildings. Mérida took its colonial orders directly from Spain instead of Mexico City, giving the state of Yucatán a distinct cultural and political identity.
For centuries, Mérida has been known for its outstanding gastronomy, its magical music, its gorgeous architecture as well as its tropical temperatures and the warmth and kindness of its people. It has been named one of the best places to live in Mexico, and the world, due to its outstanding infrastructure and safety.
Today, Mérida is the Peninsula’s commercial, medical, and educational center, a bustling city that has benefited greatly from both its growth and the increase of the tourism industry over the past decade.
On the night of January 5th, 2019, thousands of citizens gathered at the Historic Center of Mérida to celebrate the 477th anniversary of the founding of the Yucatecan capital. The serenade left the park of Santa Lucia where a concert also took place, and then the group composed of singers and thousands of citizens and tourists, headed to the Plaza Grande.
Mérida mayor Renán Barrera Concha; the municipal Director of Culture Irving Berlin Villafaña, and the representative of the culture commission, Nora Pérez Pech, led the caravan dressed in regional clothing and holding candles.
With candles, balloons and flowers, the musicians walked and sang boleros to the city as they roamed the streets of Centro. And at twelve midnight, the crowd gathered in the Plaza Grande, and began to sing “Las Mañanitas” to the city of Mérida in an emotional event. | <urn:uuid:5b60bdb9-299b-4d92-83f6-49508dcf9beb> | CC-MAIN-2020-45 | https://www.theyucatantimes.com/2019/01/merida-celebrates-its-477th-anniversary-today-happy-birthday/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876136.24/warc/CC-MAIN-20201021064154-20201021094154-00666.warc.gz | en | 0.965406 | 542 | 2.6875 | 3 |
Today’s HDR is an autumn capture of the Church of Catherine taken from the cemetary where several famous Swedes are buried, e.g. the assassinated Foreign Minister Anna Lindh and the popular Dutch-Swedish singer Cornelis Vreeswijk. Below the picture you can read a short summary of the church’s history.
In 1954 King Charles X Gustav granted a request from the growing population in Södermalm to found a new parish in the eastern part. The building of the new church, which is named after his mother the Princess Catherine, started in 1656. Charles X wild plans of relocating the Royal Castle from the Old Town to Södermalm needed a first class church there. For this project the most capable Swedish architect of that time, Jean de la Vallée, where hired. But the construction went on slowly due to lack of funds and it was not until 1695 before the church were completed. The Church of Catherine was built as a central church in the shape of a Greek cross which was the first of its kind in Sweden.
On the first of May 1723 the Church of Catherine was badly damaged in “Katarinabranden” a large fire at Södermalm which also destroyed about 500 houses. However the rebuilding of the church started almost immediately and was supervised by the city architect Göran Josua Adelcrantz. The new tower was larger was larger than the previous one and had an octagonal shape.
Since the Church of Catherine was built on the hill where the bodies from the Stockholm Bloodbath were burned it was said that she had a curse over her. Two times should her church tower collapse. This prophecy was fulfilled on the night of 17th of May 1990 when the church once again was badly damaged by a fire. Immediately the foundation “Rädda Katarina”, Save Catherine, was started and collected money to rebuild the church. The rebuilding, supervised by the architect Ove Hidemark, was made using only original building materials and in 1995 the Church of Catherine was again inaugurated. | <urn:uuid:138b89fb-4cb4-42f0-8f0e-e867c68f93d4> | CC-MAIN-2017-09 | https://foje64photoblog.wordpress.com/2011/07/22/the-church-of-catherine/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00007-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.987114 | 434 | 3.078125 | 3 |
Censorship in the United States
|Part of a series on|
|Censorship by country|
In general, censorship in the United States, which involves the suppression of speech or other public communication, raises issues of freedom of speech, which is constitutionally protected by the First Amendment to the United States Constitution.
This freedom, though fundamental, has also been accompanied since its enshrinement with contest and controversy. For instance, restraints increased during periods of widespread anti-communist sentiment, as exemplified by the hearings of the House Committee on Un-American Activities. According to Miller v. California (1973), the U. S. Supreme Court found that the First Amendment's freedom of speech does not apply to obscenity, which can, therefore, legally be censored. While it is legal to express certain forms of hate speech so long as one does not engage in the acts being discussed, or urge others to commit illegal acts, more severe forms have led to people or groups (such as the Ku Klux Klan) being denied certain marching permits or the Westboro Baptist Church being sued, though the initially adverse ruling against the latter was later overturned on appeal in the US Supreme Court.
The First Amendment protects against censorship imposed by laws, but does not give protection against corporate censorship, the sanctioning of speech by spokespersons, employees, and business associates by threat of monetary loss, loss of employment, or loss of access to the marketplace. Legal expenses can sometimes be a significant unseen restraint where there may be fear of suit for libel. Many people in the United States are in favor of restrictions of corporate censorship, citing a slippery slope that if corporations do not follow the Bill of Rights the government will be influenced.
Analysts from Reporters Without Borders rank the United States 46th in the world in terms in their Press Freedom Index, updated for 2014. Certain forms of speech, such as obscenity and defamation, are restricted in major media outlets by the government or by the industry on its own.
- 1 History
- 2 Film censorship
- 3 Weapons proliferation
- 4 Political censorship
- 5 Export of sensitive software
- 6 Broadcast censorship
- 7 Censorship of pornography
- 8 Ban on material support for foreign boycotts
- 9 Libel
- 10 Judicial orders
- 11 Copyright
- 12 War on Terrorism
- 13 Free speech zone
- 14 Corporate censorship
- 15 Internet & Internet-related censorship
- 16 See also
- 17 References
- 18 External links
A celebrated legal case in 1734-1735 involved John Peter Zenger, a New York newspaper printer who regularly published material critical of corrupt then-Governor of New York, William Cosby. He was jailed eight months before being tried for seditious libel. Andrew Hamilton defended him and was made famous for his speech, ending in, "...nature and the laws of our country have given us a right to liberty of both exposing and opposing arbitrary power [...] by speaking and writing truth." While the judge ruled against his arguments, Hamilton invoked the concept of jury nullification in the cause of liberty and won a not guilty verdict. The Zenger case paved the way for freedom of the press in the United States to be adopted in the constitution; as Founding Father Gouverneur Morris stated, "The trial of Zenger in 1735 was the germ of American freedom, the morning star of that liberty which subsequently revolutionized America."
There have been a number of attempts in the United States to forbid speech that has been deemed "seditious". In 1798, President John Adams signed into law the Alien and Sedition Acts, the fourth of which, the Sedition Act or "An Act for the Punishment of Certain Crimes against the United States" set out punishments of up to two years' imprisonment for "opposing or resisting any law of the United States" or writing or publishing "false, scandalous, and malicious writing" about the President or Congress (but specifically not the Vice-President). The act was allowed to expire in 1801 after the election of Thomas Jefferson, Vice President at the time of the Act's passage.
The Sedition Act of 1918, an extension of the Espionage Act of 1917 which had passed in connection with the United States joining the Allied Powers in the First World War, was a controversial law that led to imprisonment of many prominent individuals for opposing the war or the draft. State laws prohibiting "sedition" were also passed and used to prosecute and persecute alleged "seditionists" during this period, including many people guilty only of being "Wobblies", or members of the Industrial Workers of the World. In Schenck v. United States, the Supreme Court upheld the Espionage Act and banned speaking against the draft during World War I. This case led to the "clear and present danger" test. In 1969, Brandenburg v. Ohio established the "imminent lawless action" test. State sedition acts, if in place, are likely unconstitutional under the Brandenburg doctrine of "imminent lawless action" or the older doctrine of "clear and present danger."
Until Gitlow v. New York in the early 20th century, the First Amendment was not held to apply to states and municipalities. Entities without any prohibition in their own charters were free to censor newspapers, magazines, books, plays, movies, comedy shows, and so on, as exemplified by the phrase "banned in Boston."
In New York, litigation on a local ban upon the book Ulysses by James Joyce in 1933 played a pivotal role in an eventual set of rules determining what is and is not obscene. The standard of the effect upon "l'homme moyen sensuel" (the reasonable person), when reading or viewing of material, became the standard to look towards. The ruling instructed the Court to not consider the impression of the "little old lady" or most "pious member of the community" rather to the general community as a whole. The book's publisher, despite only receiving a ruling in New York, took the risk of publishing the book nationally despite local bans still being in place. The publisher reasoned the ruling in New York would be seen by local efforts to ban books as protection.
The free speech decisions of the United States Supreme Court under Chief Justice Earl Warren, which served from 1953 to 1969, extended the protections of the First Amendment to local government, and brought much stricter standards of review for what government actions were acceptable.
The state of Maryland retained its movie ratings board an unusually long time, abandoning it in the 1980s in favor of the private MPAA's voluntary ratings scheme.
Near v. Minnesota and prior restraint
The 1931 Near v. Minnesota case was the first to establish the doctrine that prior restraint was in most cases unconstitutional. Prior restraint is censorship which prevents material from being published in the first place. The alternative form of censorship occurs as punishment for unlawful or harmful material already published, usually after having the opportunity to dispute the charge in court.
"knowingly or willfully advocate, abet, advise or teach the duty, necessity, desirability or propriety of overthrowing the Government of the United States or of any State by force or violence, or for anyone to organize any association which teaches, advises or encourages such an overthrow, or for anyone to become a member of or to affiliate with any such association."
It also required all non-citizen adult residents to register with the government; within four months, 4,741,971 aliens had registered under the Act's provisions.
The Act is best known for its use against political organizations and figures, mostly on the left. From 1941 to 1957, hundreds of socialists were prosecuted under the Smith Act. The first trial, in 1941, focused on Trotskyists, the second trial in 1944 prosecuted alleged fascists and, beginning in 1949, leaders and members of the Communist Party USA were targeted. Prosecutions continued until a series of Supreme Court decisions in 1957 threw out numerous convictions under the Smith Act as unconstitutional. The statute itself, often amended, has not been repealed.
During World War I, and to a greater extent during World War II, war correspondents accompanied military forces, and their reports were subject to advance censorship to preserve military secrets. The extent of such censorship was not generally challenged, and no major court case arose from this issue, and even the Supreme Court found it constitutional on the grounds that it "protected free speech from tyranny".
The Office of Censorship, an emergency wartime agency, heavily censored reporting during World War II. On December 19, 1941 President Franklin Roosevelt signed Executive Order 8985, which established the Office of Censorship and conferred on its director the power to censor international communications in "his absolute discretion." Byron Price was selected as the Director of Censorship. However, censorship was not limited to reporting; postal censorship also took place. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."
In later conflicts the degree to which war reporting was subject to censorship varied, and in some cases it has been alleged that the censorship was as much political as military in purpose. This was particularly true during the Vietnam War and the invasion of Grenada. The executive branch of the federal government attempted to prevent the New York Times from publishing the top-secret Pentagon Papers during the Vietnam War, warning that doing so would be considered an act of treason under the Espionage Act of 1917. The newspaper prevailed in the famous New York Times Co. v. United States case.
Such issues arose again during the 2003 Invasion of Iraq, when many embedded reporters accompanied soldiers as they made their way into the country. These reports were subject to censorship in that they were not allowed to reveal a unit's exact location.
Wartime censorship often involves forms of mass surveillance. For international communications, like those done by Western Union and ITT, this mass surveillance continued after the wars were over. The Black Chamber received the information after WWI. After WWII NSA's Project SHAMROCK performed a similar function.
Journalism in warzones
Reporters are often obliged to "embed" themselves with a squad or unit of soldiers before being granted official access to fields of battle. Reporters are limited in what they may report by means of contracts, punishment or forced relocation, and the inherent nature of being tied to and reliant upon a military unit for protection and presence.
Wilhelm Reich was an Austrian psychoanalyst. He moved to New York in 1939, in part to escape the Nazis, and shortly after arriving there coined the term "orgone" – derived from "orgasm" and "organism" – for a cosmic energy he said he had discovered, which he said others referred to as God. In 1940 he started building orgone accumulators, devices that his patients sat inside to harness the reputed health benefits, leading to newspaper stories about sex boxes that cured cancer.
Following two critical articles about him in The New Republic and Harper's, the U.S. Food and Drug Administration obtained an injunction against the interstate shipment of orgone accumulators and associated literature, believing they were dealing with a "fraud of the first magnitude." Charged with contempt in 1956 for having violated the injunction, Reich was sentenced to two years in prison, and that summer over six tons of his publications were burned by order of the court. He died in jail of heart failure just over a year later, days before he was due to apply for parole.
Second Red Scare
McCarthyism is the term describing a period of intense anti-Communist suspicion in the United States that lasted roughly from the late 1940s to the late 1950s.
The Alien Registration Act or Smith Act of 1940 made it a criminal offense for anyone to "knowingly or willfully advocate, abet, advise or teach the […] desirability or propriety of overthrowing the Government of the United States or of any State by force or violence, or for anyone to organize any association which teaches, advises or encourages such an overthrow, or for anyone to become a member of or to affiliate with any such association." Hundreds of Communists were prosecuted under this law between 1941 and 1957. Eleven leaders of the Communist Party were charged and convicted under the Smith Act in 1949. Ten defendants were given sentences of five years and the eleventh was sentenced to three years. All of the defense attorneys were cited for contempt of court and were also given prison sentences. In 1951, twenty-three other leaders of the party were indicted including Elizabeth Gurley Flynn, a founding member of the American Civil Liberties Union, who was removed from the board of the ACLU in 1940 for membership in a totalitarian political party. By 1957 over 140 leaders and members of the Communist Party had been charged under the law.
In 1952, the Immigration and Nationality, or McCarran-Walter, Act was passed. This law allowed the government to deport immigrants or naturalized citizens engaged in subversive activities and also to bar suspected subversives from entering the country.
The Communist Control Act of 1954 was passed with overwhelming support in both houses of Congress after very little debate. Jointly drafted by Republican John Marshall Butler and Democrat Hubert Humphrey, the law was an extension of the Internal Security Act of 1950, and sought to outlaw the Communist Party by declaring that the party, as well as "Communist-Infiltrated Organizations" were "not entitled to any of the rights, privileges, and immunities attendant upon legal bodies."
The first act of movie censorship in the United States was an 1897 statute of the State of Maine that prohibited the exhibition of prizefight films. Maine enacted the statute to prevent the exhibition of the 1897 heavyweight championship between James J. Corbett and Robert Fitzsimmons. Some other states followed Maine.
In 1915, the US Supreme Court decided the case Mutual Film Corporation v. Industrial Commission of Ohio in which the court determined that motion pictures were purely commerce and not an art, and thus not covered by the First Amendment. This decision was not overturned until the Supreme Court case, Joseph Burstyn, Inc. v. Wilson in 1952. Popularly referred to as the "Miracle Decision", the ruling involved the short film "The Miracle", part of Roberto Rossellini's anthology film L'Amore (1948).
Between the Mutual Film and the Joseph Burstyn decisions local, state, and city censorship boards had the power to edit or ban films. City and state censorship ordinances are nearly as old as the movies themselves, and such ordinances banning the public exhibition of "immoral" films proliferated.
Public outcry over perceived immorality in Hollywood and the movies, as well as the growing number of city and state censorship boards, led the movie studios to fear that federal regulations were not far off; so they created, in 1922, the Motion Pictures Producers and Distributors Association (which became the Motion Picture Association of America in 1945), an industry trade and lobby organization. The association was headed by Will H. Hays, a well-connected Republican lawyer who had previously been United States Postmaster General; and he derailed attempts to institute federal censorship over the movies.
In 1927 Hays compiled a list of subjects, culled from his experience with the various US censorship boards, which he felt Hollywood studios would be wise to avoid. He called this list "the formula" but it was popularly known as the "don'ts and be carefuls" list. In 1930, Hays created the Studio Relations Committee (SRC) to implement his censorship code, but the SRC lacked any real enforcement capability.
The advent of talking pictures in 1927 led to a perceived need for further enforcement. Martin Quigley, the publisher of a Chicago-based motion picture trade newspaper, began lobbying for a more extensive code that not only listed material that was inappropriate for the movies, but also contained a moral system that the movies could help to promote - specifically a system based on Catholic theology. He recruited Father Daniel Lord, a Jesuit priest and instructor at the Catholic St. Louis University, to write such a code and on March 31, 1930 the board of directors of the Motion Picture Producers and Distributors Association adopted it formally. This original version especially was once popularly known as the Hays Code, but it and its later revisions are now commonly called the Production Code.
However, Depression economics and changing social mores resulted in the studios producing racier fare that the Code, lacking an aggressive enforcement body, was unable to redress. This era is known as Pre-Code Hollywood.
An amendment to the Code, adopted on June 13, 1934, established the Production Code Administration (PCA), and required all films released on or after July 1, 1934 to obtain a certificate of approval before being released. For more than thirty years following, virtually all motion pictures produced in the United States and released by major studios adhered to the code. The Production Code was not created or enforced by federal, state, or city government. In fact, the Hollywood studios adopted the code in large part in the hopes of avoiding government censorship, preferring self-regulation to government regulation.
The enforcement of the Production Code led to the dissolution of many local censorship boards. Meanwhile, the US Customs Department prohibited the importation of the Czech film Ecstasy (1933), starring an actress soon to be known as Hedy Lamarr, an action which was upheld on appeal.
In 1934, Joseph I. Breen (1888–1965) was appointed head of the new Production Code Administration (PCA). Under Breen's leadership of the PCA, which lasted until his retirement in 1954, enforcement of the Production Code became rigid and notorious. Breen's power to change scripts and scenes angered many writers, directors, and Hollywood moguls. The PCA had two offices, one in Hollywood, and the other in New York City. Films approved by the New York PCA office were issued certificate numbers that began with a zero.
The first major instance of censorship under the Production Code involved the 1934 film Tarzan and His Mate, in which brief nude scenes involving a body double for actress Maureen O'Sullivan were edited out of the master negative of the film. Another famous case of enforcement involved the 1943 western The Outlaw, produced by Howard Hughes. The Outlaw was denied a certificate of approval and kept out of theaters for years because the film's advertising focused particular attention on Jane Russell's breasts. Hughes eventually persuaded Breen that the breasts did not violate the code and the film could be shown.
Some films produced outside the mainstream studio system during this time did flout the conventions of the code, such as Child Bride (1938), which featured a nude scene involving 12-year-old actress Shirley Mills. Even cartoon sex symbol Betty Boop had to change from being a flapper, and began to wear an old-fashioned housewife skirt.
In 1952, in the case of Joseph Burstyn, Inc. v. Wilson, the U.S. Supreme Court unanimously overruled its 1915 decision and held that motion pictures were entitled to First Amendment protection, so that the New York State Board of Regents could not ban "The Miracle", a short film that was one half of L'Amore (1948), an anthology film directed by Roberto Rossellini. Film distributor Joseph Burstyn released the film in the U.S. in 1950, and the case became known as the "Miracle Decision" due to its connection to Rossellini's film. That in turn reduced the threat of government regulation that justified the Production Code, and the PCA's powers over the Hollywood industry were greatly reduced.
At the forefront of challenges to the code was director Otto Preminger, whose films violated the code repeatedly in the 1950s. His 1953 film The Moon is Blue, about a young woman who tries to play two suitors off against each other by claiming that she plans to keep her virginity until marriage, was the first film to use the words "virgin," "seduce," and "mistress," and it was released without a certificate of approval. He later made The Man with the Golden Arm (1955), which portrayed the prohibited subject of drug abuse, and Anatomy of a Murder (1959) which dealt with rape. Preminger's films were direct assaults on the authority of the Production Code and, since they were successful, hastened its abandonment.
Billy Wilder's Some Like It Hot (1959) and Alfred Hitchcock's Psycho (1960) were also released without a certificate of approval due to their themes and became box office hits, and as a result further weakened the authority of the code.
President Barack Obama said on December 19, 2014 that Sony “made a mistake” in pulling its film The Interview from distribution following a cyber-attack that American officials may have linked to North Korea. “We cannot have a society where some dictator someplace can start imposing censorship here in the United States,” Obama said. The film has since been released in limited distribution at select theaters.
The Pawnbroker and the end of the Code
In the early 1960s, British films such as Victim (1961), A Taste of Honey (1961), and The Leather Boys (1963) offered a daring social commentary about gender roles and homophobia that violated the Hollywood Production Code, yet the films were still released in America. The American gay rights, civil rights, and youth movements prompted a reevaluation of the depiction of themes of race, class, gender, and sexuality that had been restricted by the Code.
In 1964 The Pawnbroker, directed by Sidney Lumet and starring Rod Steiger, was initially rejected because of two scenes in which the actresses Linda Geiser and Thelma Oliver fully expose their breasts; and a sex scene between Oliver and Jaime Sánchez, which it described as "unacceptably sex suggestive and lustful." Despite the rejection, the film's producers arranged for Allied Artists to release the film without the Production Code seal and the New York censors licensed The Pawnbroker without the cuts demanded by Code administrators. The producers also appealed the rejection to the Motion Picture Association of America.
On a 6-3 vote, the MPAA granted the film an "exception" conditional on "reduction in the length of the scenes which the Production Code Administration found unapprovable." The exception to the code was granted as a "special and unique case," and was described by The New York Times at the time as "an unprecedented move that will not, however, set a precedent." The requested reductions of nudity were minimal, and the outcome was viewed in the media as a victory for the film's producers. The Pawnbroker was the first film featuring bare breasts to receive Production Code approval. In his 2008 study of films during that era, Pictures at a Revolution, author Mark Harris wrote that the MPAA's action was "the first of a series of injuries to the Production Code that would prove fatal within three years."
When Jack Valenti became President of the MPAA in 1966, he was immediately faced with a problem regarding language in the film version of Edward Albee's play Who's Afraid of Virginia Woolf? (1966). Valenti negotiated a compromise: The word "screw" was removed, but other language, including the phrase "hump the hostess", remained. The film received Production Code approval despite having language that was clearly prohibited. The British-produced, but American-financed film Blowup (1966) presented a different problem. After the film was denied Production Code approval, MGM released it anyway, the first instance of an MPAA member company distributing a film that didn't have an approval certificate. There was little the MPAA could do about it.
Enforcement had become impossible, and the Production Code was abandoned entirely.
On March 15, 1950, Scientific American published an article by Hans Bethe about thermonuclear fusion, but the United States Atomic Energy Commission successfully ordered printed copies of the magazine destroyed, and a redacted version was published. The censorship was not disputed by Bethe.
In 1979, the magazine The Progressive was sued by the U.S. government (United States v. The Progressive) and temporarily blocked from publishing an article that purported to reveal the "secret" of the hydrogen bomb. The article was eventually published after Fusion magazine, published by the Fusion Energy Foundation, published similar information and the government dropped the charges.
In 1997, Congress voted unanimously to add an amendment to a Department of Defense spending bill (known as the Feinstien amendment) forbidding the distribution of instructions that teach "the making or use of an explosive, a destructive device, or a weapon of mass destruction" if those instructions are intended to assist in the actual building and use of such a device.
In 1987, an article appeared in The Scientist which alleged that the U.S. government improperly suppressed two science magazines put out by the Fusion Energy Foundation. The article quotes scientists Winston Bostick, who said that "the Department of Justice wants to crush the magazines before they publish information which could send quite a few officials of the department to jail," and former Department of Energy official Stephen Dean, who said that the government's actions were "a gross abuse of the legal system—a violation of due process."
Export of sensitive software
The export of cryptography software is regulated as a munition under the International Traffic in Arms Regulations, although in recent years the regulations have relaxed, due in part to industry lobbying.
In 1995, Daniel J. Bernstein challenged the regulations (see Bernstein v. United States) on First Amendment grounds. The Ninth Circuit Court of Appeals ruled that software source code was speech protected by the First Amendment and that the government's regulations preventing its publication were unconstitutional. However, some regulations remain.
|This section does not cite any references (sources). (November 2010)|
The Federal Communications Commission (FCC) regulates "indecent" free-to-air broadcasting (both television and radio). Satellite, cable television, and Internet outlets are not subject to content-based FCC regulation. It can issue fines if, for example, the broadcaster employs certain profane words. The Supreme Court in 1978 in FCC v. Pacifica Foundation upheld the commission’s determination that George Carlin's classic “seven dirty words” monologue, with its deliberate, repetitive and creative use of vulgarities, was indecent. But the court at that time left open the question of whether the use of “an occasional expletive” could be punished. Radio personality Howard Stern has been a frequent target of fines. This led to his leaving broadcast radio and signing on with Sirius Satellite Radio in 2006. The Super Bowl XXXVIII halftime show controversy increased the political pressure on the FCC to vigorously police the airwaves. In addition, Congress increased the maximum fine the FCC may levy from US $268,500 to US $375,000 per incident.
The Supreme Court, in its 5-4 decision in FCC v. Fox Television Stations, Inc. (2009), said it did not find the FCC's policy on so-called fleeting expletives either "arbitrary or capricious", thus dealing a blow to the networks in their efforts to scuttle the policy. But the case brought by Fox to the high court was a narrow challenge on procedural grounds to the manner in which the FCC handled its decision to toughen up its policy on fleeting expletives. Fox, with the support of ABC, CBS and NBC, argued that the commission did not give enough notice of nor properly explain the reasons for clamping down on fleeting expletives after declining to issue penalties for them in decades past. The issue first arose in 2004, when the FCC sanctioned, but did not fine, NBC for Bono's use of the phrase "fucking brilliant" during the Golden Globes telecast. The present case arose from two appearances by celebrities on the Billboard Music Awards. The first involved Cher, who reflected on her career in accepting an award in 2002: “I’ve also had critics for the last forty years saying I was on my way out every year. Right. So fuck 'em.” The second passage came in an exchange between Paris Hilton and Nicole Richie in 2003 in which Ms. Richie discussed the difficulties involved in removing cow feces from a Prada purse with the quotation "Have you ever tried cleaning cow shit off a Prada purse? It's not so fucking simple." The majority decision, written by Justice Antonin Scalia, reversed the lower appellate court's decision that the FCC's move was "arbitrary and capricious." “The commission could reasonably conclude” he wrote “that the pervasiveness of foul language, and the coarsening of public entertainment in other media such as cable, justify more stringent regulation of broadcast programs so as to give conscientious parents a relatively safe haven for their children.” Justice Ruth Bader Ginsburg, dissenting, wrote that “there is no way to hide the long shadow the First Amendment casts over what the commission has done. Today’s decision does nothing to diminish that shadow.” Justice John Paul Stevens, dissenting, wrote that not every use of a swear word connoted the same thing: “As any golfer who has watched his partner shank a short approach knows,” Justice Stevens wrote, “it would be absurd to accept the suggestion that the resultant four-letter word uttered on the golf course describes sex or excrement and is therefore indecent... It is ironic, to say the least, that while the FCC patrols the airwaves for words that have a tenuous relationship with sex or excrement, commercials broadcast during prime-time hours frequently ask viewers whether they are battling erectile dysfunction or are having trouble going to the bathroom... The FCC’s shifting and impermissibly vague indecency policy only imperils these broadcasters and muddles the regulatory landscape.” For 30 years, the FCC has had the power to keep “indecent” material off the airwaves from 6 a.m. to 10 p.m., and those rules “have not proved unworkable” Stevens added. Justice Breyer, dissenting, wrote that the law “grants those in charge of independent administrative agencies broad authority to determine relevant policy,” he observed. “But it does not permit them to make policy choices for purely political reasons nor to rest them primarily upon unexplained policy preferences.” Scalia’s majority opinion was joined by Chief Justice John G. Roberts and Justices Thomas and Samuel A. Alito Jr. and (for the most part) by Justice Anthony M. Kennedy. Justices Stevens, Ginsburg, Souter, and Breyer dissented. Four justices wrote concurrences or dissents speaking only for themselves.
But the decision was limited to a narrow procedural issue and also sent the case back to the 2nd Court of Appeals in New York to directly address the constitutionality of the FCC's policy. The 2nd Court of Appeals is already on record in its 2007 ruling that it was "skeptical" that the policy could "pass constitutional muster." Scalia said that the looming First Amendment question “will be determined soon enough, perhaps in this very case.” The decision provided hints that the court might approach the constitutional question differently. Some dissenting justices and Justice Clarence Thomas, who was in the majority, indicated that they might be receptive to a First Amendment challenge. Thomas, in a concurrence, said he was “open to reconsideration” of the two cases that gave television broadcasters far less First Amendment protection than books, newspapers, cable programs and Web sites have.
The FCC is also responsible for permitting transmitters, to prevent interference between stations from obscuring each other's signals. Denial of the right to transmit could be considered censorship. Restrictions on low-power broadcasting stations have been particularly controversial, and the subject of legislation in the 1990s and 2000s (decade).
The Guardian reported U.S. censorship of U.S. media regarding a CIA employee implicated in murder in that "A number of US media outlets learned about Davis's CIA role but have kept it under wraps at the request of the Obama administration." Colorado station KUSA censored an online report indicating Davis worked for the CIA when the station "removed the CIA reference from its website at the request of the US government."
Censorship of pornography
U.S. courts have ruled that the First Amendment protects "indecent" pornography from regulation, but not "obscene" pornography. People convicted of distributing obscene pornography face long prison terms and asset forfeiture. However, in State v. Henry (1987), the Oregon Supreme Court ruled that obscenity was an unconstitutional restriction of free speech under the free speech provision of the Oregon Constitution and abolished the offense of obscenity in that state, although it remains an offense on the federal level.
A widely publicized case of prosecuting alleged obscenity occurred in 1990, when the Cincinnati arts center agreed to hold an art show featuring the work of photographer Robert Mapplethorpe. His work included several artistic nude photographs of males and was deemed offensive by some people for this reason. This resulted in the prosecution of the center and its director, who were later acquitted.
In the early 1990s, Mike Diana became the first American artist to receive a conviction for obscenity for drawing cartoons that were judged legally obscene.
Child pornography is illegal in the United States. The U.S. Supreme Court has held that it is not protected by the First Amendment. And even if not obscene, it is not considered protected speech, according to New York v. Ferber.
Ban on material support for foreign boycotts
A law passed by the U.S. Congress in 1977 prohibits all U.S. persons, defined to include individuals and companies located in the United States and their foreign affiliates, from supporting the boycott of Israel and provides penalties for those who willingly comply with the boycott. The B.I.S. website states:
Conduct that may be penalized under the TRA and/or prohibited under the EAR includes:
- Agreements to refuse or actual refusal to do business with or in Israel or with blacklisted companies.
- Agreements to discriminate or actual discrimination against other persons based on race, religion, sex, national origin or nationality.
- Agreements to furnish or actual furnishing of information about business relationships with or in Israel or with blacklisted companies.
- Agreements to furnish or actual furnishing of information about the race, religion, sex, or national origin of another person.
Implementing letters of credit containing prohibited boycott terms or conditions.
The TRA does not "prohibit" conduct, but denies tax benefits ("penalizes") for certain types of boycott-related agreements.
Some pro-Israeli activists have construed the law as forbidding speech and expression that supports any boycott of Israel (as opposed to actions taken to comply with the requests of foreign entities to boycott Israel) whether foreign in origin or domestic, and asked the US Anti-Boycott Office to prosecute divestment campaigners against Israel.
However, the law only forbids material participation in or material support of a boycott originated by a foreign nation or organization, not with a domestic boycott campaign, nor can the law be construed as forbidding speech that politically or morally (as opposed to materially) supports any boycott, whether foreign, or domestic. The law only prevents US organizations from being used by alien entities as agents of their foreign policy, when that foreign policy includes the pursuit of boycotting arrangements; it does not prevent US organizations or individuals from choosing how to spend or invest their money based on business or ethical considerations; it only forbids doing so as the result of a foreign entity's request. Material attempts to suppress speech through induction of state action under false pretenses, such as by claiming a domestic boycott campaign is foreign in origin may be unlawful, and may constitute conspiracy against civil rights, a federal crime, punishable by fine and imprisonment. (Such speech is considered to be core political speech under the US Constitution, and any state actions interfering with core political speech are subject to the strictest Constitutional scrutiny.)
Libel and slander are generally considered civil wrongs which can constitute the basis of a private lawsuit. Although some states still carry criminal libel laws on the books, these are very infrequently used.
Since the 1964 decision in New York Times Co. v. Sullivan, public figures like entertainers and politicians must prove actual malice was intended as opposed to simple negligence to win a libel or slander suit. For instance, public officials cannot file a lawsuit if someone makes a caricature of them or insults them.
Although it is difficult to win a libel case in the United States, it can still be an effective means of intimidation and deterrence, since defending oneself against a lawsuit is expensive and time consuming.
Persons engaged in legislative debate in Congress are granted complete immunity from libel and slander suits so long as they are speaking from the floor of the Senate or House of Representatives.
Individual judges have the power to order parties in their jurisdictions not to disclose certain information. A gag order might be issued to prevent someone from disclosing information that would interfere with an ongoing court case. Though court documents are generally public information, record sealing is sometimes used to prevent sensitive information (such as personal information, information about minors, or classified information) exposed by a court case from becoming public.
The 1971 case Nebraska Press Assn. v. Stuart established a high standard that must be met for courts to prevent media organizations from publishing information about an ongoing trial to preserve the defendant's right to a fair trial.
On January 4, 2007, US District Court Judge Jack B. Weinstein issued a temporary restraining order forbidding a number of activists and their organizations in the psychiatric survivors movement, including MindFreedom International and the Alliance for Human Research Protection from disseminating ostensibly leaked documents purporting to show that Eli Lilly and Company knowingly concealed information on potentially lethal side-effects of Zyprexa for years. The "Zyprexa documents" had been sealed by an earlier court order in a mass tort case; they were widely disseminated after Alaska attorney James Gottstein issued a subpoena for them in an unrelated case. The Electronic Frontier Foundation came to the defense of one of the parties silenced by the restraining order to defend the First Amendment right of Internet journalists to post links to relevant documents on wikis, blogs, and other web pages. While Eli Lilly maintains that the documents were obtained unlawfully and should not be part of the public domain, critics cite the leaked Pentagon Papers as precedent for the right of individuals to report on the existence and contents of such documents, and in this particular case, maintain that court sealing of documents should never be allowed to protect individuals or corporations from criminal liability.
The United States has strong copyright laws, which result in the inability to republish copyrighted material without permission from the copyright owner, subject to criminal and civil penalties.
Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is an extension to United States copyright law passed unanimously on May 14, 1998, which criminalizes the production and dissemination of technology that allows users to circumvent technical copy-restriction methods. Under the Act, circumvention of a technological measure that effectively controls access to a work is illegal if done with the primary intent of violating the rights of copyright holders.
Although the Act contains an exception for research, the DMCA has had an impact on the worldwide cryptography research community, because many fear that their cryptanalytic research violates, or might be construed to violate the law. The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use to prevent or penalize development of anti-digital rights management measures. Sklyarov was arrested in the United States after a presentation at DEF CON, and subsequently spent several months in jail. The DMCA has also been cited as chilling to non-criminal inclined users, such as students of cryptanalysis (including, in a well-known instance, Professor Felten and students at Princeton), and security consultants such as the Netherlands-based Niels Ferguson, who has declined to publish information about vulnerabilities he discovered in an Intel secure-computing scheme because of his concern about being arrested under the DMCA when he travels to the United States.
Free speech lawsuits have resulted surrounding the publication of DeCSS and the AACS encryption key, both dealing with the "cracking" of copy-protected movies (on DVD and Blu-ray Disc/HD DVD, respectively).
War on Terrorism
The NSA electronic surveillance program and DARPA's Total Information Awareness were two examples of post–September 11 government monitoring programs. Though intended to target terrorist behavior, critics worried fears about government monitoring might lead people to self-censorship.
A controversy also erupted concerning National Security Letters, issued by the federal government and not subject to prior judicial review. These letters demanded information the government asserted was relevant to a terrorism investigation, but also contained a gag order preventing recipients from revealing the existence of the letter. Critics contend this prevents public oversight of government investigations, and allows unreasonable search and seizure to go unchecked. The American Civil Liberties Union complained that Section 505 of the USA PATRIOT Act removed the need for the government to connect recipients to a terrorism investigation, widening the possibility for abuse. On November 7, 2005 the American Civil Liberty Union reported:
[...] According to the Washington Post, universities and casinos have received these letters and been forced to comply with the demands to turn over private student and customer information. Anyone who receives an NSL is gagged - forever - from telling anyone that the FBI demanded records, even if their identity has already been made public.
In New York and Connecticut, the ACLU has challenged the NSL provision that was dramatically expanded by Section 505 of the Patriot Act. The legislation amended the existing NSL power by permitting the FBI to demand records of people who are not connected to terrorism and who are not suspected of any wrongdoing. [...]
in this war, some of the most critical battles may not be fought in the mountains of Afghanistan or the streets of Iraq, but in the newsrooms in places like New York and London and Cairo and elsewhere. [...] While the enemy is increasingly skillful at manipulating the media and using the tools of communications to their advantage, it should be noted that we have an advantage as well, and that is, quite simply, that the truth is on our side, and ultimately, in my view, truth wins out. I believe with every bone in my body that free people, exposed to sufficient information, will, over time, find their way to right decisions.
The war on terrorism also affects US policy towards journalists in other states. In 2011, US president Barack Obama asked Yemeni President Ali Abdullah Saleh to stop the release of journalist Abdulelah Haider Shaye, who reported US involvement in the bombings.
Free speech zone
Free speech zones (also known as First Amendment Zones, Free speech cages, and Protest zones) are areas set aside in public places for citizens of the United States engaged in political activism to exercise their right of free speech. The First Amendment to the United States Constitution states that "Congress shall make no law... abridging... the right of the people peaceably to assemble, and to petition the Government for a redress of grievances." The existence of free speech zones is based on court decisions that stipulate the government may regulate the time, place, and manner—but not content—of expression. TPM restrictions, as these are known, are only lawful when:
- they treat all speech equally - for example, persons on all sides of an issue must be treated the same;
- they are justified by a substantial, bona-fide public interest, such as crowd control;
- they do not substantively impede or dilute the speech at hand;
- there is no bad faith; there is no overt or ulterior motive by the authorities imposing a TPM restriction to suppress speech in general, or speech that they disagree with, in particular.
All TPM restrictions are subject to judicial review. Unreasonable and unconstitutional TPM restrictions are and have been repeatedly vacated by various courts, and/or subjected to injunction, restraining order, and consent decree. Unconstitutional TPM restrictions allow citizens whose freedom of speech has been violated to personally sue state agents acting under color of law responsible for the violations at hand in their individual capacity, e.g. as private citizens, stripping them of any official capacity defense or defenses of sovereign immunity. TPM restrictions related to core political speech are subject to the highest possible level of Constitutional scrutiny.
Free speech zones have been used at a variety of political gatherings. The stated purpose of free speech zones is to allegedly protect the safety of those attending the political gathering, or allegedly for the safety of the protesters themselves. Critics, however, suggest that such zones are "Orwellian", and that authorities use them in a heavy-handed manner to censor protesters by putting them literally out of sight of the mass media, hence the public, as well as visiting dignitaries. Though authorities generally deny specifically targeting protesters, on a number of occasions, these denials have been contradicted by subsequent court testimony. The American Civil Liberties Union (ACLU) has filed a number of lawsuits on the issue.
The most prominent examples are those created by the United States Secret Service for President George W. Bush and other members of his administration. While free speech zones existed in limited forms prior to the Presidency of George W. Bush, it has been during Bush's presidency that their scope has been greatly expanded. Free speech zones are and have been used in the past and in the present by institutions of higher education in the United States, which has led to organizations like the ACLU and the Foundation for Individual Rights in Education to object to these as infringements of freedom of speech, and of academic freedom.
In 1969 Nicholas Johnson, United States Federal Communications Commission (FCC) commissioner, put forward in an article in TV Guide entitled The Silent Screen that "Censorship is a serious problem" in the United States, and that he agreed with the statements by various network officials that television was subject to it, but disputed "just who is doing most of the censoring". He stated that most television censorship is corporate censorship, not government censorship.
Croteau and Hoynes discuss corporate censorship in the news publishing business, observing that it can occur as self-censorship. They note that it is "virtually impossible to document", because it is covert. Jonathan Alter states that "In a tight job market, the tendency is to avoid getting yourself or your boss in trouble. So an adjective gets dropped, a story skipped, a punch pulled … It's like that Sherlock Holmes story — the dog that didn't bark. Those clues are hard to find." The head of the Media Access Project notes that such self-censorship is not misreporting or false reporting, but simply not reporting at all. The self-censorship is not the product of "dramatic conspiracies", according to Croteau and Hoynes, but simply the interaction of many small daily decisions. Journalists want to keep their jobs. Editors support the interests of the company. These many small actions and inactions accumulate to produce (in their words) "homogenized, corporate-friendly media". Croteau and Hoynes report that such corporate censorship in journalism is commonplace, reporting the results of studies revealing that more than 40% of journalists and news executives stating that they had deliberately engaged in such censorship by avoiding newsworthy stories or softening the tones of stories.
Nichols and McChesney opine that "the maniacal media baron as portrayed in James Bond films or profiles of Rupert Murdoch is far less a danger than the cautious and compromised editor who seeks to 'balance' a responsibility to readers or viewers with a duty to serve his boss and the advertisers". They state that "even among journalists who entered the field for the noblest of reasons" there is a tendency to avoid any controversial journalism that might embroil the news company in a battle with a powerful corporation or a government agency.
Self-censorship is not the only form of corporate censorship in the news and entertainment businesses. Croteau and Hoynes also describe examples of managers censoring their employees, subdivisions of conglomerates applying pressure upon one another, and pressure applied upon corporations by external entities such as advertisers.
One of the incidents of corporate censorship that Croteau and Hoynes find to be "the most disturbing" in their view is the news reporting in the U.S. of the Telecommunications Act of 1996, which made fundamental changes to the limitations on ownership of media conglomerates within the U.S. and which was heavily lobbied for by media interests, and yet which was subject to, in Croteau and Hoynes words, "remarkably little coverage" by U.S. news media.
Private Internet connections in the United States are not overtly subject to censorship imposed by the government, but there is evidence of search related restrictions being imposed through certain predominant search engines, along other intentionally narrowed parameters related to censorship as "blocked access" that seems to indicate intentional governmental restrictions where search providers seem complicit with "open internet searches."
However, private businesses, schools, libraries, and government offices may use filtering software at their discretion, and in such cases courts have ruled the use of such software does not violate the First Amendment.
Amazon.com removed WikiLeaks from its servers on 1 December 2010 at 19:30 GMT. U.S. Senator Joe Lieberman, among the members of the U.S. Senate Homeland Security and Governmental Affairs Committee who had questioned Amazon in private communication on the company's hosting of WikiLeaks and the illegally obtained documents, commended Amazon for the action; WikiLeaks, however, responded by stating on its official Twitter page that "WikiLeaks servers at Amazon ousted. Free speech the land of the free—fine our $ are now spent to employ people in Europe", and later that "If Amazon is so uncomfortable with the first amendment, they should get out of the business of selling books".
Official efforts by the U.S. government to limit access to, conversation about, and general spread of the cables leaked by WikiLeaks were revealed by leading media organizations. A 4 December 2010 article by MSNBC, reported that the Obama administration has warned federal government employees and students in educational institutions studying towards careers in public service that they must refrain from downloading or linking to any WikiLeaks documents. However, State Department spokesman P.J. Crowley denied ordering students, stating, "We do not control private networks. We have issued no authoritative instructions to people who are not employees of the Department of State." He said the warning was from an "overzealous employee." According to a 3 December 2010 article in The Guardian, access to WikiLeaks has been blocked for federal workers. The U.S. Library of Congress, the U.S. Commerce Department and other government agencies have confirmed that the ban is already in place. Some Department of Homeland Security staff say the ban is hampering their work: "More damage will be done by keeping the federal workforce largely in the dark about what other interested parties worldwide are going to be reading and analyzing." One official says that the ban apparently covers personal computers as well.
A spokesman for Columbia University confirmed on 4 December that its Office of Career Services sent an e-mail warning students at Columbia's School of International and Public Affairs to refrain from accessing WikiLeaks cables and discussing this subject on the grounds that "discourse about the documents would call into question your ability to deal with confidential information". However, this was quickly retracted on the following day. SIPA Dean John Henry Coatsworth wrote that "Freedom of information and expression is a core value of our institution, [...] thus, SIPA’s position is that students have a right to discuss and debate any information in the public arena that they deem relevant to their studies or to their roles as global citizens, and to do so without fear of adverse consequences."
The New York Times reported on 14 December that the U.S. Air Force bars its personnel from access to news sites (such as those of The New York Times and The Guardian, Le Monde, El País, and Der Spiegel) that publish leaked cables.
On 18 December, the Bank of America stopped handling payments for WikiLeaks. Bank of America is also blocking access to WikiLeaks from its internal network preventing employees from accessing WikiLeaks.
PRISM and Edward Snowden's revelations about NSA activity
The Monterey Herald reported on June 27, 2013, that the United States Army bars its personnel from access to parts of the website of The Guardian after their revelations of whistleblower Edward Snowden's information about global surveillance. The entire Guardian website is blocked for personnel stationed throughout Afghanistan, the Middle East, and South Asia.
- Civil liberties in the United States
- First Amendment to the United States Constitution
- Freedom of speech in the United States
- Press freedom in the United States
- List of cases argued by Floyd Abrams
- List of most commonly challenged books in the United States
- Mass surveillance in the United States
- Media coverage of climate change
- Media bias in the United States
- Political correctness
- Prior restraint
- United States defamation law
- United States obscenity law
- Westmoreland v. CBS
- This Film Is Not Yet Rated (2006)
Censorship in the past
Rating systems and industry self-regulation
- Comics Code Authority
- Entertainment Software Rating Board (ESRB)
- MPAA film rating system
- Parental Advisory (music)
- TV Parental Guidelines
Related techniques of suppression
Free speech advocates
- American Civil Liberties Union
- American Library Association
- Center for Democracy and Technology
- Electronic Frontier Foundation
- Fans of X-Rated Entertainment
- Index on Censorship
- International Freedom of Expression Exchange
- National Coalition Against Censorship
Organizations advocating censorship
Surveillance by the United States government
- 2013 mass surveillance disclosures, reports about NSA and its international partners' mass surveillance of foreign nationals and U.S. citizens
- Carnivore, a U.S. Federal Bureau of Investigation system to monitor email and electronic communications
- Computer and Internet Protocol Address Verifier (CIPAV), a data gathering tool used by the U.S. Federal Bureau of Investigation (FBI)
- Dropmire, a secret surveillance program by the NSA aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies
- Magic Lantern, keystroke logging software developed by the U.S. Federal Bureau of Investigation
- NSA call database, a database containing metadata for hundreds of billions of telephone calls made in the U.S.
- NSA warrantless surveillance (2001–07)
- NSA whistleblowers: William Binney, Thomas Andrews Drake, Mark Klein, Thomas Tamm, Russ Tice
- Spying on United Nations leaders by United States diplomats
- Stellar Wind, code name for information collected under the President's Surveillance Program
- Terrorist Surveillance Program, an NSA electronic surveillance program
- Total Information Awareness, a project of the Defense Advanced Research Projects Agency (DARPA)
- Timothy Jay (2000). Why We Curse: A Neuro-psycho-social Theory of Speech. John Benjamins Publishing Company. pp. 208–209. ISBN 1-55619-758-6.
- David Goldberg, Stefaan G. Verhulst, Tony Prosser (1998). Regulating the Changing Media: A Comparative Study. Oxford University Press. p. 207. ISBN 0-19-826781-9.
- David Goldberg, Stefaan G. Verhulst, Tony Prosser (1998). Regulating the Changing Media: A Comparative Study. Oxford University Press. p. 207. ISBN 0-19-826781-9.
- Linder, Doug. "The Trial of John Peter Zenger: An Account". University of Missouri-Kansas City School of Law. Retrieved 2008-04-15.
- Schlesinger Age of Jackson, p.190
- Hand, Augustus N. (August 7, 1934). "United States v. One Book Entitled Ulysses". 72 Federal Reporter, Second Series 705. Circuit Court of Appeals, Second Circuit.
- Gillers, Stephen, "A tendency to deprave and corrupt," Washington Law Review, Vol. 85, No. 2, 2007
- "Free Speech", Electronic Privacy Information Center (EPIC). Retrieved 26 October 2013.
- Fiset, Louis. Return to Sender: U.S. Censorship of Enemy Alien Mail in World War II, Prologue Magazine Spring 2001, Vol. 33, No. 1. Retrieved from U.S. Government National Archives.
- The Press: It Was a Public Relations Rout Too, Time, 11 March 1991
- James Bamford, The Shadow Factory, 2008, Doubleday, Chapter 'Shamrock', especially p. 163
- Fried, Albert (1997). McCarthyism, The Great American Red Scare: A Documentary History. Oxford University Press. ISBN 0-19-509701-7.
- Orbach, Barak. "Prizefighting and the Birth of Movie Censorship". SSRN 1351542.
- Sperling, Millner, and Warner (1998), Hollywood Be Thy Name, Prima Publishing, ISN:559858346 p. 325.
- Leff, Leonard J. (1996). "Hollywood and the Holocaust: Remembering The Pawnbroker" (PDF). American Jewish History 84 (4): 353–376. doi:10.1353/ajh.1996.0045. Retrieved 2009-03-09.
- Harris, Mark (2008). Pictures at a Revolution: Five Movies and the Birth of the New Hollywood. Penguin Group. pp. 173–176. ISBN 978-1-59420-152-3.
- Bruce Gellerman, "LaRouche Crackdown Shuts Two Magazines", The Scientist, July 13 1987
- Bernstein v. USDOJ (9th Cir. May 6, 1999)
- Walsh, Declan; Ewen MacAskill (20 February 2011). "American who sparked diplomatic crisis over Lahore shooting was CIA spy". The Guardian. Retrieved 21 February 2011.
- Hudson, David (1998-10-28). "Wisconsin high court could strike down obscenity law". First Amendment Center. Retrieved 2011-01-13.
- "Why should ‘virtual’ child pornography be thought of any differently than child pornography?", First Amendment Center, November 21, 2002. Retrieved October 25, 2013.
- "Excerpts From Opinions in Ruling on the Child Pornography Prevention Act". The New York Times. April 17, 2002. Retrieved April 28, 2010.
- What do the Laws Prohibit? Office of Antiboycott Compliance, Bureau of Industry and Security, U.S. Department of Commerce.
- U. S. Bureau of Industry and Security
- Unknown News
- Boycott Watch - Divest-from-Israel Campaigns May Violate the Federal Antiboycott Law
- "Leaked Documents Spur First-Amendment Debate", Snigdha Prakash, National Public Radio (NPR), January 17, 2007.
- 17 U.S.C. Sec. 1201(g)
- RIAA challenges SDMI attack 2002-01-07, Retrieved on 2007-02-26
- "30,000 National Security Letters Issued Annually Demanding Information about Americans: Patriot Act Removed Need for FBI to Connect Records to Suspected Terrorists", American Civil Liberty Union, November 7, 2005.
- "New Realities in the Media Age: A Conversation with Donald Rumsfeld", Kenneth I. Chenault (Presider), Council on Foreign Relations, Federal News Service, Inc., February 17, 2006.
- White House Stands By Obama Push for Yemeni Journalist to Remain Behind Bars, ABC News, Retrieved 2012-05-04.
- "Readout of President's Call with President Saleh of Yemen". The White House. Retrieved 2012-03-16.
- "Why Is President Obama Keeping a Journalist in Prison in Yemen?". thenation.com. Retrieved 2012-03-15.
- (US courts have held that it is impossible for government officials to act in their official capacity or within the scope of their offices when violating the Constitution; hence, government officials are personally liable for unconstitutional acts that they have performed; see Ex parte Young (1909) and Bivens v. Six Unknown Named Agents (1971). Analogous concepts applied to different areas of law, such as corporate law, or the law of nations, include the doctrine of corporate veil piercing, the Yamashita standard, or the Nuremberg Defense.)
- Bailey, Ronald. Orwellian "Free Speech Zones" violate the constitution. Reason, February 4, 2004. Retrieved on January 3, 2007.
- McNulty, Rebecca. Fla. College Student Successfully Fights Campus 'Free Speech Zone'. Foundation for Individual Rights in Education Student Press Law Center, June 28, 2005. Retrieved January 3, 2007.
- Hightower, Jim. Bush Zones Go National. The Nation, July 29, 2004. Retrieved on December 20, 2006.
- Freedom Under Fire: Dissent in Post-9/11 America. March 28, 2003.
- Nicholas Johnson (1969-07-05). "The Silent Screen". TV Guide. — reprinted and augmented in Nicholas Johnson (1970). How to Talk Back to Your Television Set. New York: Bantam Books. pp. 71–88.
- David Croteau and William Hoynes (2006). The Business of Media: Corporate Media and the Public Interest. Pine Forge Press. pp. 169–184. ISBN 1-4129-1315-2.
- Self Censorship: How Often and Why
- John Nichols and Robert Waterman McChesney (2002). Our Media, Not Theirs: The Democratic Struggle Against Corporate Media. Seven Stories Press. p. 59. ISBN 1-58322-549-8.
- "US v. ALA 539 U.S. 194, 2003". FindLaw. Retrieved 2007-03-21.
- Staff writer (1 December 2010). "Internet Company Had Hosted Wikileaks Website". Office of U.S. Senator Joe Lieberman. Retrieved 4 December 2010.
- Staff writer (1 December 2010). "WikiLeaks servers at Amazon ousted. Free speech the land of the free--fine our $ are now spent to employ people in Europe.". WikiLeaks (via Twitter). Retrieved 10 December 2010.
- Staff writer (1 December 2010). "If Amazon are so uncomfortable with the first amendment, they should get out of the business of selling books.". WikiLeaks (via Twitter). Retrieved 10 December 2010.
- Staff writer (4 December 2010). "Fed Workers Told: Stay Away from Those Leaked Cables – Directive Notes the Content 'Remains Classified'; Columbia U. Also Warns Future Diplomats". MSNBC. Retrieved 5 December 2010.
- Staff writer (7 December 2010). "State Dept Denies Warning Students about WikiLeaks". Associated Press (via The Wall Street Journal). Retrieved 9 December 2010.
- MacAskill, Ewen (3 December 2010). "US Blocks Access to WikiLeaks for Federal Workers – Employees Unable To Call Up WikiLeaks on Government Computers as Material Is Still Formally Classified, Says US". The Guardian. Retrieved 5 December 2010.
- MacAskill, Ewen (December 10, 2010). "Ban on federal staff reading WikiLeaks hampering work, says US official". The Guardian (London).
- Staff writer (4 December 2010). "Fed Workers Told: Stay Away from Those Leaked Cables". MSNBC. Retrieved 6 December 2010.
- Gustin, Sam (6 December 2010). "Columbia University Reverses Anti-WikiLeaks Guidance". Wired. Retrieved 10 December 2010.
- "Air Force Blocks Sites That Posted Secret Cables", Eric Schmitt, New York Times, December 14, 2010. Retrieved 26 October 2013.
- Staff writer (18 December 2010). "Bank of America Stops Handling Wikileaks Payments". BBC News. Retrieved 20 December 2010.
- "Restricted Web access to the Guardian is Armywide, say officials", Philipp Molnar, Monterey Herald, June 27, 2013. Retrieved 15 October 2014.
- "Zensur: US-Armee sperrt Zugang zu "Guardian"-Artikeln", Jörg Breithut, Spiegel Online, June 28, 2013. Retrieved 15 October, 2014.
- Ackerman, Spencer (July 1, 2013). "US military blocks entire Guardian website for troops stationed abroad". The Guardian. | <urn:uuid:96000d6e-0208-4e47-941a-41775d20f0a7> | CC-MAIN-2015-48 | https://en.wikipedia.org/wiki/Censorship_in_the_United_States | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446250.47/warc/CC-MAIN-20151124205406-00110-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.951286 | 13,382 | 3.53125 | 4 |
• Other common names, “Downy forestiera,” “Spring-herald,” and “Stretchberry.”
• A small tree that can grow up to 15 feet tall, but is usually a straggling, irregular-shaped shrub.
• Flowers April to May, with the fruit forming June to October.
• Prefers mostly rich, moist soils along streams and creeks.
• The fruit is eaten by many species of birds. The shrubby growth form provides good cover for wildlife. This plant is palatable and is susceptible to heavy browsing by some livestock. | <urn:uuid:1efd15d9-ba57-475b-a1fa-6a6be679d45c> | CC-MAIN-2020-16 | https://bamertseed.com/product/elbowbush/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371618784.58/warc/CC-MAIN-20200406035448-20200406065948-00070.warc.gz | en | 0.935084 | 128 | 2.625 | 3 |
||This article or section uncritically uses the texts and opinions from within a religion, without referring to primary or secondary sources that critically analyse them. (May 2014)|
|Born||Sarada Prasanna Mitra
30 January 1865
Naora, 24 Parganas, Bengal, British India
|Died||10 January 1915
San Francisco, California, United States
|Quotation||"Work hard. Discipline yourself. Build your character. Endure to the end. Realize your Self. And be free."|
Trigunatitananda (30 January 1865 – 10 January 1915), premonastic name Sarada Prasanna Mitra, was a direct disciple of Ramakrishna, the 19th-century Indian Hindu mystic and sant. He established the monthly Bengali magazine Udbodhan of Ramakrishna Math and later, at the behest of Vivekananda, went to America in 1902 and took charge of the San Francisco centre. One of his contributions was the construction of a new building in San Francisco which came to be known as the Hindu Temple. He was mortally injured by a bomb thrown at him by a former student, and died in January 1915.
Trigunatitananda was born as Sarada Prasanna Mitra, on 30 January 1865. He was born to an aristocratic family in the village of Naora in 24 Paraganas near Calcutta. For education Sarada was sent to Calcutta and was enrolled in Metropolitan Institution in Shyampukur, which was a school of Iswar Chandra Vidyasagar, a social reformer, educator and scholar of 19th century India. In this school the headmaster was Mahendranath Gupta, better known as M, the author of The Gospel of Sri Ramakrishna or "Sri Ramakrishna Kathamrita" in Bengali. Sarada did not do well in the Entrance (school leaving) examination. "M" took young Sarada to Dakshineswar temple to meet Sri Ramakrishna Paramhansa on 27 December 1884. At a very young age Sarada showed religious disposition and this was reinforced with his coming in contact with Sri Ramakrishna, whom he visited very frequently after he joined the Metropolitan college. When his parents decided to arrange a marriage for him according to Indian customs, he left his house for Puri in January 1886, but was brought back by his parents. He appeared for and passed his First Arts examination. He dedicated himself to the service of Sri Ramakrishna when the latter was terminally ill in Cossipore Garden House. After Ramakrishna died, Sarada began to stay with Narendranath Dutta (later Vivekananda) and a group of dedicated direct disciples of Ramakrishna, who renounced worldly life, in "Baranagar Math".
In January 1887 Sarada took the vows of complete renunciation or Sannyas along with his brother disciples, and came to be known as Trigunatitananda (one who has surpassed the three Gunas or attributes and have attained supreme bliss, an enlightened one. Triguna: the three Gunas or attributes of Sattva (contemplation), Rajas (activity) and Tamas (darkness or passivity)). In 1891 Trigunatita started on pilgrimage for Vrindaban, Mathura, Jaipur, Ajmere, Kathiawar. At Porbandar he met Swami Vivekananda. After that he returned to Baranagar Math. In 1895 he set out on foot for Kailas Manas Saravar. He came back to Calcutta and stayed in the house of a devotee and led a contemplative life for some time. He underwent surgery without anaesthetic. After some time he went to stay in the newly formed Alambazar Math of the Ramakrishna order. He was also greatly influenced by Vivekananda's ideal of service and philanthropic activities. In 1897 when the district of Dinajpur in Bengal was in the grip of a terrible famine, the Swami went there and organised relief work. Vivekananda had planned a magazine to spread the message of Vedanta. For this purpose a press was bought and Trigunatita was put in charge of publishing the magazine, 'Udbodhan'. He also helped the sick. After Yogananda's death, ?Tigunatitananda became a personal attendant to Sarada Devi for a time. His brother Ashutosh Mitra, later a monk of the Ramakrishna Order, also served the her for a considerable time.
Work in America
In 1902 when Turiyananda returned from America prematurely due to ill health, Trigunatitananda was sent to replace him. On 2 January 1903, he reached San Francisco and was taken to the house of T.H. Logan, president of the San Francisco Vedanta society. A few weeks later he went to the home of Mr. and Mrs C.F. Peterson where he was to make his headquarters. Classes and lectures were held regularly. Before long the flat became too small for the Society's operations, and they moved to another flat at 40 Steiner Street. In 1904, because of the work involved, Trigunatitananda felt that a new building for Vedanta Society of San Francisco was needed. Funds were raised, and in January 1906 the building in Webster Street, which came to be known as the first Hindu Temple in the western world, was established and opened to the public. The Swami published a pamphlet explaining each tower and detail of the structure. "This temple," the pamphlet began, "may be considered as a combination of a Hindu temple, a Christian church, a Mohammedan mosque, a Hindu math or monastery, and an American residence." Then it goes on to explain the symbolism built into the temple.
About this temple Trigunatitananda had said, Believe me, believe me, if there is last tinge of selfishness in building this temple, it will fall, but if it is the Master's work, it will stand. It survived unscathed the major 1906 San Francisco earthquake. Soon after this a monastery was set up with about ten monks, and a convent. In 1909 the Swami started a monthly magazine called the Voice of Freedom, which was produced for seven years, based on the ideals of Vedanta.
Every year the Swami led a selected group of students to Shanti Ashrama, in the San Antone valley in California, a spiritual retreat which was established by Turiyananda, his predecessor and a brother disciple. The inmates spent their time in meditation and prayer.
Trigunatita suffered from chronic rheumatism and Bright's disease, but continued his work. In December 1914, three days after Christmas, he was holding a Sunday service when a live bomb was thrown onto the pulpit by a former student. The student died and the Swami suffered serious injuries. On his way to the hospital he was only concerned about the student. A nurse who had attended on him made a comment: “I have never seen such a calm, uncomplaining, and enduring patient in my life.” He died on 10 January 1915. In 1916 his relics were installed on the top of the highest hill, Siddha Giri, the "Hill of Realization" at Shanti Ashrama.
Character and legacy
- Keep on praying to God with your whole heart; if the need arises for you to have a Guru, God will send somebody for you who will be just the man you want
- People talk of finding out the proper kind of guru. But that is not a reasonable position in all cases. Whoever the guru may be, everything will progress nicely if the disciple is earnest and sincere.
- People of all castes can be initiated by a good guru who has attained perfection. What caste can a true devotee or the perfect soul have? When the individual soul merges in God (like rivers in the sea), they can no more have any individuality. So how can there be then, the distinction of caste, as Brahmin, Shudra etc., belonging to the body and never to the soul?
- Trigunatitananda established the first Hindu Temple of the West in San Francisco.
- He started the monthly Bengali magazine and publishing house Udbodhan which was later shifted to a new house by Saradananda
- He established the first nunnery in the West for Ramakrishna Order and Vedanta Society
- Responding to Vivekananda's call for philanthropic activities he started relief operations in Dinajpur in 1897
- He was one of the earliest and longest serving teachers of Vedanta philosophy in the West
||Constructs such as ibid., loc. cit. and idem are discouraged by Wikipedia's style guide for footnotes, as they are easily broken. Please improve this article by replacing them with named references (quick guide), or an abbreviated title. (February 2013)|
- Swami Trigunatita
- The Disciples of Sri Ramakrishna, published by Advaita Ashrama, Mayawati, 1943, page 172
- Ibid. page 175
- Ibid. page 176
- Trigunatita RKM Fiji
- The Disciples of Sri Ramakrishna, Advaita Ashrama, Mayawati, 1943, page 178
- Ibid. page 180
- Vedanta Society History
- Vedanta Society History
- The Disciples of Sri Ramakrishna, published by Advaita Ashrama, Mayawati, 1943, page 182
- RKM Fij
- The Disciples of Sri Ramakrishna, published by Advaita Ashrama, Mayawati, page 193
- RKM Nagpur
- Vedanta Society Chicago
- Swami Trigunatitananda visits Southern California on YouTube
- Swami Trigunatitananda, RK Mission Fiji
- Chennai Math
- Buddhist Library
- God Lived with Them, by Swami Chetanananda, Udbodhan publishers
- Swami Trigunatitananda by Marie Louis Burke | <urn:uuid:64dc3eac-5229-40fa-8734-5e15403481ba> | CC-MAIN-2014-52 | http://en.wikipedia.org/wiki/Swami_Trigunatitananda | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447552276.136/warc/CC-MAIN-20141224185912-00049-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.96682 | 2,111 | 2.6875 | 3 |
There is no bigger stage for climate change than this week’s global-warming gathering in Denmark. Let’s hope when the time comes to discuss the world’s energy and environmental future, global leaders – including President Barack Obama – focus on the practical as well as the promising.
Without question, the most significant opportunity to save energy and the environment stretches high into the sky along the streets and avenues of our cities. Commercial and industrial buildings consume the most energy around the world, bar none.
Admittedly, building efficiency is not sexy like renewable energy sources wind and solar, which are certain to be the darlings of the climate conference. But better-run skyscrapers and factories hold the cheapest, cleanest means of extending world energy supplies. And, by controlling our energy usage, we individually and collectively control our emissions, our energy security and our economic future.
The benefits of using less energy correlate directly to a sustainable environment and a sustainable economy. More efficient buildings produce four times the environmental impact of renewable energy, which seems to have all the momentum toward becoming the future of global energy supply. Every dollar an executive or building owner saves in overhead, such as energy expense, is equivalent to three dollars of revenue.
Yet, less than 1 percent of all commercial and industrial companies use advanced technology to measure and manage energy spending. Nearly all companies, however, use advanced technology to measure and manage telecommunications spending. In other words, companies will scrutinize employee cell phone bills while completely ignoring wasted energy at 100 times the cost.
What’s most compelling are the actual savings that can be realized through energy efficiency solutions for buildings. The reduction in energy use, depending on the source, could save the United States an estimated $1.2 trillion by 2020 with an annual investment of $50 billion in energy efficiency technologies.
The biggest barrier, however, seems to be lack of understanding by many of those who own the buildings and the companies – especially small to mid-sized businesses – with the most opportunity to benefit. One survey of hundreds of business executives, for example, found: 87 percent have room to improve on energy management, 74 percent do not have a handle on energy cost and 59 percent are not well-positioned in house to control energy.
More than likely, U.S. politicians, policymakers and scientists at this week’s climate conference will take time to reflect and to look for new ways of doing things. This is paramount to improving what The Financial Times recently described as necessary to creating the next great stride in the standard of living.
In their special report on the future of energy, Financial Times’ writers accurately stated every great change in living standards throughout history has had a revolution in energy at its heart. The revolution we need as a country – and as an economy – is one that focuses on what’s right before us.
Coming out of the Denmark climate conference, my hope is that the United States realizes we already hold the keys to our economic and environmental futures. Those keys open the front doors to our nation’s buildings and unlock numerous opportunities to save energy, cut emissions and improve profitability.
Paul Oswald is president of Environmental Systems Inc., which has offices in Milwaukee and Chicago. | <urn:uuid:f1ed04d1-cb52-4274-8c92-ef0e6159c12f> | CC-MAIN-2023-40 | https://biztimes.com/climate-change-needs-a-corporate-revolution/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00870.warc.gz | en | 0.954256 | 659 | 2.96875 | 3 |
Invisalign is what?
As implied by the name, Invisalign stands for “invisible aligners.” Simply put, Invisalign is an orthodontic procedure that helps straighten teeth without the use of obtrusive, uncomfortable metal braces.
It stands in for the patients’ lips being jammed with wires, prongs, metal brackets, and other items. Invisalign orthodontics involves patients wearing a pair of transparent plastic aligners (trays), which are especially designed to help the teeth shift and glide into the proper position. If you use the word “Invisalign meaning” to refer to a medical process, you should be aware of this.
How Does the Invisalign Process Work? What Is It?
Because they use a revolutionary technique to successfully realign your teeth while staying almost undetectable, Invisalign treatments are the solution if you want to straighten your teeth without experiencing the discomfort of wearing conventional metal braces.
Dentists in London who specialize in Invisalign employ clear aligners:
to treat orthodontic issues, most of which are sanitary. Invisalign’s Smart Force Technology also allows for customizing the removable, transparent aligners to fit your teeth. Your teeth can be gradually moved and straightened with the help of these nearly invisible plastic aligners without significantly changing your way of life. You won’t even be noticed wearing such aligners by the majority of people.
Amazing advantages of Invisalign: Convenience, ease of maintenance, fewer dental appointments, and many more advantages are provided by Invisalign.
- Simple to Clean:
Conventional braces are notoriously difficult to keep clean. No matter if you’re eating with family or at a restaurant, maintaining clean brackets and teeth is a bother. When utilizing Invisalign, the aligner trays are easy to remove.
- Fewer visits to the office:
A trip to the dentist is required in order to tighten the wires or rubber bands on metal braces. While wearing Invisalign, you can participate in activities without being concerned that your teeth will move or align.
- No food alterations:
You may eat and drink whatever you want with Invisalign thanks to the removable nature of the aligners. You’ll spend less time brushing your teeth the next time around as a result. Remind yourself to brush your teeth and rinse your mouth out before re-putting in the aligners, though.
No cleaning whatsoever Wires and Supports:
Even more challenging than diet restrictions may be the challenges of cleaning teeth while wearing braces. It might be particularly difficult to clean in the areas surrounding the brackets and cables.
- Take out the aligners as necessary:
You can actually remove your aligners whenever you like. Remove them for cleaning and eating, of course, but you can also choose to remove them if there is a circumstance in which doing so would be advantageous.
- You’ll Never Have a Dental Emergency:
Orthodontic emergencies are common when wearing braces. For example, a bracket de-bonding or a wire coming loose and poking their cheeks, most people may anticipate needing to schedule an emergency appointment with their orthodontist to remedy a problem.
Particularly adult orthodontic patients prefer to remain unnoticed. Invisalign’s transparent aligner trays make it simpler to hide dental treatment. Simply inform them that you are wearing aligners if you don’t want others to know.
- Enhanced Comfort:
Even if you have never worn braces, discomfort issues are still present. Traditional braces employ tension produced by the brackets and wires to reposition the teeth. When the brackets are tightened and then loosened again, it leads to a vicious cycle of discomfort.
- It can be used fearlessly by children, teenagers, and adults.
Invisalign is risk-free for people of all ages, including children, teenagers, and adults. Even while children between the ages of 8 and 12 are watched for tooth loss and the potential use of teeth straightening, many dentists recommend waiting for Invisalign treatment until your child is 13 or 14.
- Fixes dental issues: Everyone has distinct dental issues. Braces or Invisalign are necessary for the alignment concerns listed below:
London-based provider of Invisalign:
Clear aligners are becoming more used as orthodontic tools. But you should know that every orthodontic method, whether it be Invisalign Provider in London, clear aligners, or invisible braces, has risks that you should consider before beginning treatment. The evaluation of each patient and the discussion of their treatment options should involve an orthodontist if successful orthodontic therapy is to be achieved.
Invisalign treatments, notably for straightening teeth, are a critical development in dental care. In many cases, the removable, transparent aligners outperform traditional metal braces. However, conventional braces may still be used in some exceptional situations.
The best course of action is to consult with a knowledgeable Invisalign dentist to ensure that you select the greatest decision for straightening your teeth and creating the most attractive smile. | <urn:uuid:cf145e19-8c67-4c0f-9d78-7b6056aee0a8> | CC-MAIN-2023-50 | https://sunsolve.uk/2023/01/12/the-greatest-advantage-of-invisalign/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00667.warc.gz | en | 0.911974 | 1,078 | 2.5625 | 3 |
[an error occurred while processing this directive]
Call us at:
Or email us at:
Linux has many, many advantages as an operating system over competing
systems such as Microsoft Windows. Below is a short list:
- Free - Linux source code is freely distributed (gratis)
and freely modifiable (libre). Tens of thousands of programmers
have reviewed the source code to improve performance, eliminate
bugs, and strengthen security. No other operating system has ever
undergone this level of review. This open
source design has created most of the advantages listed below.
This also means that customers or users can locate past versions
of software. Anyone who has an old Netware network knows how hard
it can be to find the old installation disks should something
go wrong, and one certainly can't get them from the vendor anymore.
In the Linux/open-source world, each and every version of a package
is available for download, forever.
- Best Technical Support - Linux has the best technical
support available. Linux is supported by commercial distributors,
consultants, and by a very active community of users and developers.
In 1997, the Linux community was awarded InfoWorld's Product of
the Year Award for Best Technical Support over all commercial
software vendors. Farious Net Solutions provides around-the-clock
support for Linux with highly-trained, expert technicians.
- No Vendor Lock-In - The availability of source code
means that every user and support provider is empowered to get
to the root of technical problems quickly and effectively. This
contrasts sharply with proprietary operating systems, where even
top-tier support providers must rely on the OS vendor for technical
information and bug fixes. It also means that your data is your
data - you will not find that you cannot access your data because
of upgrades to the system have prevented you from doing so, as
customers sometimes find in the commercial OS world.
- Runs On A Wide Range Of Hardware - While most Linux
systems are based on standard PC hardware, Linux supports a very
wide range of computational devices, including Alpha, Power PC,
680x0, SPARC, and Strong Arm processors, and system sizes ranging
from PDAs (such as the PalmPilot) to supercomputers constructed
from clusters of systems (Beowulf clusters).
- Exceptionally Stable - Properly configured, Linux systems
will generally run until the hardware fails or the system is shut
down. Continuous up-times of hundreds of days (up to a year or
more) are not uncommon. FNS has found that the only limits to
the uptimes of our Linux systems are hardware failures and the
- Tools and Applications - Programs ranging from the
market-dominating Apache web server to the powerful GIMP graphics
editor are included in most Linux distributions. Free and commercial
applications meet are available to meet most application needs,
especially in the server arena, where the Linux star shines most
- Interoperability - Linux interoperates with many other
types of computer systems. Linux communicates using the native
networking protocols of UNIX, Microsoft Windows 95/NT, IBM OS/2,
Netware, and Macintosh systems and can also read and write disks
and partitions from these and other operating systems. FNS has
used this ability to tie vintage computing networks such as ARCnet
or Coax-based Ethernet to newer 100base–T or 1000base–T
- Low Total Cost of Ownership - Although the Linux learning
curve can be significant to the uninitiated, the stability, design,
and breadth of tools available for Linux result in very low ongoing
- "One For All and All For One" - All changes
one makes in open source software (especially open-source software
released under the GNU license, like Linux) will benefit each
and everyone, all over the world, without exceptions or constraints.
- Security - Linux is one of the most secure operating
systems, largely immune to harmful viruses that can cause expensive
and distracting system interruptions. A Linux system has internal
'walls' built up so that unwanted visitors and viruses do not
have broad access to the entire system. All files and directories
have read, write, and execute privileges for the owner, the owner's
workgroup, and all others. The Linux community aggressively maintains
these 'walls' and all other aspects of Linux security.
- Network friendliness - People today are becoming more
and more enamored with the Internet and what it can do for them.
Because a team of programmers developed Linux over the Internet,
its networking features were given a high priority. Linux is capable
of acting as client and/or server to any of the popular operating
systems in use today, and is quite capable of being used to run
Internet service providers. Many Internet service providers and
telephone companies base their technical infrastructure on Linux.
Strong enough to support Internet backbone, it is well tested
for home and office use.
- Speed - Linux servers typically can handle several
times as many users as other proprietary ones using the same hardware.
Linux can take advantage of the latest processors and even use
several of them at the same time for incredible speed. Furthermore,
Linux supports true multi-tasking, which is the ability to run
more than one program at the same time. It is therefore much more
natural for the system to be doing many things at the same time
without the 'flaking out' that one finds with the Microsoft operating
- Efficiency - Unlike other environments where industry
players create "planned obsolescence", Linux is very
efficient and can have high performance on older hardware. The
benefit is that users do not have to continually repurchase hardware
as often, which results in large cost savings. In fact, the first
Linux server that FNS installs in its customers' location is usually
an old workstation which is no longer useful for any other purpose. | <urn:uuid:ba257a0d-3822-4e34-b70e-80bb692a5668> | CC-MAIN-2017-51 | http://farious.com/linux/advantages/index.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513784.2/warc/CC-MAIN-20171211164220-20171211184220-00552.warc.gz | en | 0.909438 | 1,257 | 3.015625 | 3 |
Definitions of revenge
v. t. - To inflict harm in return for, as an injury, insult, etc.; to exact satisfaction for, under a sense of injury; to avenge; -- followed either by the wrong received, or by the person or thing wronged, as the object, or by the reciprocal pronoun as direct object, and a preposition before the wrong done or the wrongdoer. 2
v. t. - To inflict injury for, in a spiteful, wrong, or malignant spirit; to wreak vengeance for maliciously. 2
v. i. - To take vengeance; -- with 2
n. - The act of revenging; vengeance; retaliation; a returning of evil for evil. 2
n. - The disposition to revenge; a malignant wishing of evil to one who has done us an injury. 2
The word "revenge" uses 7 letters: E E E G N R V.
No direct anagrams for revenge found in this word list.
Shorter words found within revenge:
eger en eng er ere erg ern erne eve even evener ever gee gen gene genre gree green ne nee nerve neve never re ree reeve reg renege rev vee veer veg veneer venge verge
List shorter words within revenge, sorted by length
All words formed from revenge by changing one letter
Browse words starting with revenge by next letter | <urn:uuid:39e3955b-abdd-49f2-9935-a78729313c9a> | CC-MAIN-2017-09 | http://www.morewords.com/word/revenge/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171066.47/warc/CC-MAIN-20170219104611-00418-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.854938 | 302 | 2.640625 | 3 |
By BBC News
The Falcon 9 rocket reached its intended 300 km-high orbit
A private US capsule that could soon be hauling cargo and even astronauts to the space station has splashed down after its maiden flight.
The Dragon ship launched from Florida on a Falcon 9 rocket at 1543GMT (1043 EST) on Wednesday.
The capsule separated about 10 minutes after launch, reaching its 300km-high orbit shortly after.
After completing several manoeuvres some 300km above Earth, the capsule splashed down in the Pacific.
Dragon and Falcon 9 are both products of California’s SpaceX company.
The firm has a $1.6bn (£1bn) contract with the US space agency (Nasa) to provide 12 spacecraft with cargo capacity of at least 20 tonnes to resupply the International Space Station (ISS) through to 2016.
The initiative is part of a much wider American policy to place the carriage of freight and crew transport to the ISS in the hands of the private sector.
This was the first of three test outings intended to prove SpaceX’s systems worked as designed. Dragon will not be allowed near the space station until it can be shown the capsule is safe.
Company and Nasa officials tried to play down expectations ahead of the mission, reminding the media that the complexity of space ventures often results in early mishaps as engineers get to grips with the new technologies.
Although the Falcon 9 rocket has flown successfully once before, SpaceX president Gwynne Shotwell said she was all too aware that difficulties could yet lie ahead for the programme.
“History would say that we’re going to have a substantial issue in one of the first three flights. That’s just empirical; it’s nothing to do with our process or our hopes,” she told reporters.
The vessel completed almost two orbits of the Earth while demonstrating its onboard systems.
A de-orbit burn brought Dragon back down through the atmosphere and a controlled splashdown via the assistance of three parachutes in ocean waters roughly 800km west of the coast of Mexico.
US President Barack Obama hopes the private sector can help fill the gap left by the retirement next year of the space shuttle fleet.
He envisages commercial ships ferrying astronauts and supplies to low-Earth orbit destinations like the ISS, while Nasa concentrates on developing a much more capable rocket and spaceship to venture out into the Solar System.
Dragon’s demonstration flight has been organised under the Commercial Orbital Transportation Services (Cots) programme, which sees Nasa seed SpaceX with funds to help it deliver a serviceable system. | <urn:uuid:a33c14a0-6615-452c-a6b6-c071add5d227> | CC-MAIN-2014-41 | http://djournal.com/news/private-space-capsules-maiden-voyage-ends-with-splash/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137948.80/warc/CC-MAIN-20140914011217-00198-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.938384 | 534 | 2.703125 | 3 |
The magnificent Angkor Wat stands right in the heart of an ancient land now known as Cambodia. Angkor means city and Wat means temple. During the 12th century, blocks of stones were mined from faraway mountains and manually transported for its perfectly timed execution.
Thousands of Khmer workers miraculously finished this megastructure in one lifetime, only 35 years. Covering an area of 500 acres, it is larger than any European Cathedral and clearly visible from outer space. Built on water, it still stands after centuries of drought and monsoon periods every single year due to its intricate hydraulic system.
The city has survived modern wars and foreign invasions for thousands of years. Once a hindu temple for the God Vishnu, now a stunning monument to Cambodia’s golden age.
About the Author | <urn:uuid:b67fc12d-d1cf-415f-91f1-eecce0a0ed08> | CC-MAIN-2020-10 | https://www.blueosa.com/21-photos-cambodia-travel/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146066.89/warc/CC-MAIN-20200225110721-20200225140721-00550.warc.gz | en | 0.940319 | 165 | 2.796875 | 3 |
Does Social Isolation Aggravate Psychiatric Problem - Popular Perception In Covid -19 Lockdown
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 1, Pages 2438-2450
AbstractCOVID -19 is an infectious disease caused by the newly discovered coronavirus. As there is no vaccine discovered, the only way to prevent the spread is through following the practice of social isolation.
Objectives:Prolonged isolation may also lead to psychological stress and problems. Hence the scenario is to measure the level of awareness among the people about psychiatric problems created due to prolonged social isolation.The aim of the survey is to measure the level of awareness among the participants on the psychological stress created due to social isolation through the imposed lockdown.
Materials And Methods: A questionnaire was prepared and administered to a hundred participants through google form an online platform. The study participants included people belonging to the general population of Tamilnadu. The answers obtained from the participants are recorded and analysed and the answers given by each participant to each question were represented in the form of flow charts.
Results: Around 70% of people said that social isolation affects mental health and 72% of people said that social isolation creates stress. 60% of people were aware that prolonged social isolation can create psychiatric problems.
Conclusion: The level of awareness among the participants is moderate and hence a complete awareness on social isolation and its consequences must be created among the study population.
- Article View: 79
- PDF Download: 139 | <urn:uuid:6768d95c-f525-41c5-a22c-36fc13b83bd5> | CC-MAIN-2021-39 | https://ejmcm.com/article_3265.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057018.8/warc/CC-MAIN-20210920040604-20210920070604-00008.warc.gz | en | 0.934993 | 306 | 2.890625 | 3 |
Global Epidemiology of Plasmodium vivax.
Howes RE., Battle KE., Mendis KN., Smith DL., Cibulskis RE., Baird JK., Hay SI.
Plasmodium vivax is the most widespread human malaria, putting 2.5 billion people at risk of infection. Its unique biological and epidemiological characteristics pose challenges to control strategies that have been principally targeted against Plasmodium falciparum Unlike P. falciparum, P. vivax infections have typically low blood-stage parasitemia with gametocytes emerging before illness manifests, and dormant liver stages causing relapses. These traits affect both its geographic distribution and transmission patterns. Asymptomatic infections, high-risk groups, and resulting case burdens are described in this review. Despite relatively low prevalence measurements and parasitemia levels, along with high proportions of asymptomatic cases, this parasite is not benign. Plasmodium vivax can be associated with severe and even fatal illness. Spreading resistance to chloroquine against the acute attack, and the operational inadequacy of primaquine against the multiple attacks of relapse, exacerbates the risk of poor outcomes among the tens of millions suffering from infection each year. Without strategies accounting for these P. vivax-specific characteristics, progress toward elimination of endemic malaria transmission will be substantially impeded. | <urn:uuid:64b4a838-09b1-4705-922b-03d84f1ead84> | CC-MAIN-2022-40 | https://www.neuroscience.ox.ac.uk/publications/617738 | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00116.warc.gz | en | 0.876882 | 285 | 3.046875 | 3 |
Provided by: lmbench_3.0-a9-1.1_amd64
lmbench - system benchmarks
lmbench is a series of micro benchmarks intended to measure basic operating system and hardware system metrics. The benchmarks fall into three general classes: bandwidth, latency, and ``other''. Most of the lmbench benchmarks use a standard timing harness described in timing(3) and have a few standard options: parallelism, warmup, and repetitions. Parallelism specifies the number of benchmark processes to run in parallel. This is primarily useful when measuring the performance of SMP or distributed computers and can be used to evaluate the system's performance scalability. Warmup is the number of minimum number of microseconds the benchmark should execute the benchmarked capability before it begins measuring performance. Again this is primarily useful for SMP or distributed systems and it is intended to give the process scheduler time to "settle" and migrate processes to other processors. By measuring performance over various warmup periods, users may evaulate the scheduler's responsiveness. Repetitions is the number of measurements that the benchmark should take. This allows lmbench to provide greater or lesser statistical strength to the results it reports. The default number of repetitions is 11.
Data movement is fundamental to the performance on most computer systems. The bandwidth measurements are intended to show how the system can move data. The results of the bandwidth metrics can be compared but care must be taken to understand what it is that is being compared. The bandwidth benchmarks can be reduced to two main components: operating system overhead and memory speeds. The bandwidth benchmarks report their results as megabytes moved per second but please note that the data moved is not necessarily the same as the memory bandwidth used to move the data. Consult the individual man pages for more information. Each of the bandwidth benchmarks is listed below with a brief overview of the intent of the benchmark. bw_file_rd reading and summing of a file via the read(2) interface. bw_mem_cp memory copy. bw_mem_rd memory reading and summing. bw_mem_wr memory writing. bw_mmap_rd reading and summing of a file via the memory mapping mmap(2) interface. bw_pipe reading of data via a pipe. bw_tcp reading of data via a TCP/IP socket. bw_unix reading data from a UNIX socket.
Control messages are also fundamental to the performance on most computer systems. The latency measurements are intended to show how fast a system can be told to do some operation. The results of the latency metrics can be compared to each other for the most part. In particular, the pipe, rpc, tcp, and udp transactions are all identical benchmarks carried out over different system abstractions. Latency numbers here should mostly be in microseconds per operation. lat_connect the time it takes to establish a TCP/IP connection. lat_ctx context switching; the number and size of processes is varied. lat_fcntl fcntl file locking. lat_fifo ``hot potato'' transaction through a UNIX FIFO. lat_fs creating and deleting small files. lat_pagefault the time it takes to fault in a page from a file. lat_mem_rd memory read latency (accurate to the ~2-5 nanosecond range, reported in nanoseconds). lat_mmap time to set up a memory mapping. lat_ops basic processor operations, such as integer XOR, ADD, SUB, MUL, DIV, and MOD, and float ADD, MUL, DIV, and double ADD, MUL, DIV. lat_pipe ``hot potato'' transaction through a Unix pipe. lat_proc process creation times (various sorts). lat_rpc ``hot potato'' transaction through Sun RPC over UDP or TCP. lat_select select latency lat_sig signal installation and catch latencies. Also protection fault signal latency. lat_syscall non trivial entry into the system. lat_tcp ``hot potato'' transaction through TCP. lat_udp ``hot potato'' transaction through UDP. lat_unix ``hot potato'' transaction through UNIX sockets. lat_unix_connect the time it takes to establish a UNIX socket connection.
mhz processor cycle time tlb TLB size and TLB miss latency line cache line size (in bytes) cache cache statistics, such as line size, cache sizes, memory parallelism. stream John McCalpin's stream benchmark par_mem memory subsystem parallelism. How many requests can the memory subsystem service in parallel, which may depend on the location of the data in the memory hierarchy. par_ops basic processor operation parallelism.
bargraph(1), graph(1), lmbench(3), results(3), timing(3), bw_file_rd(8), bw_mem_cp(8), bw_mem_wr(8), bw_mmap_rd(8), bw_pipe(8), bw_tcp(8), bw_unix(8), lat_connect(8), lat_ctx(8), lat_fcntl(8), lat_fifo(8), lat_fs(8), lat_http(8), lat_mem_rd(8), lat_mmap(8), lat_ops(8), lat_pagefault(8), lat_pipe(8), lat_proc(8), lat_rpc(8), lat_select(8), lat_sig(8), lat_syscall(8), lat_tcp(8), lat_udp(8), lmdd(8), par_ops(8), par_mem(8), mhz(8), tlb(8), line(8), cache(8), stream(8)
Funding for the development of these tools was provided by Sun Microsystems Computer Corporation. A large number of people have contributed to the testing and development of lmbench.
The benchmarking code is distributed under the GPL with additional restrictions, see the COPYING file.
Carl Staelin and Larry McVoy Comments, suggestions, and bug reports are always welcome. (c)1994-2000 Larry McVoy and Carl Staelin $Date$ LMBENCH(8) | <urn:uuid:70029cb8-d3de-458d-aa8a-2382d3df1ff6> | CC-MAIN-2019-43 | http://manpages.ubuntu.com/manpages/xenial/man8/msleep.8.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986657586.16/warc/CC-MAIN-20191015055525-20191015083025-00413.warc.gz | en | 0.81769 | 1,337 | 2.75 | 3 |
For Future Students
College and Career Planning
Mining involves much more than just digging minerals out of the ground. In order to effectively plan and run a mine, companies must work with experts in many different fields including health, science, engineering, environment, social science, business and law. See the descriptions below for just a few of the technical paths you can pursue for a career in the mining industry.
Geologists are scientists who understand the rocks, minerals and structures that make up the earth. They play a major role during exploration (finding and characterizing ore deposits), mine planning, mine operations and reclamation of closed mines. Other specialized career fields in geology applied to mining include geophysicists, geochemists and hydrogeologists.
How do I become a geologist?
Most mining geologists have a BS in geology, geoscience or earth science. Many also obtain an MS and PhD. The entry-level degree for many jobs in mining is an MS.
Mining engineers understand the entire mining process including the business and management aspects of mining. They use this integrated understanding to design the mine, choose the best equipment and best practices for excavating and processing. Some engineers specialize in ventilation (regulating the temperature and air quality in underground mines), mine automation and technology (how to manage the Terabytes of data generated from all the machines and how to use autonomous vehicles), and how to finance mines (the business of mining).
Why should I become a Mining Engineer?
How do I become a mining engineer?
Most mining engineers have a BS in geological engineering. Some also get an MS, ME or PhD.
Mineral engineers specialize in mineral processing (determining how to separate valuable material from waste rock) and extractive metallurgy (extracting elements from minerals). They apply their expertise in the chemistry of minerals to separate the economic from uneconomic minerals and to separate the elements in each mineral. They also play an important role in managing water quality at the mine site, the energy usage and environmental footprint of mines during and after mining.
Why should I become a Mineral Engineer?
How do I become a mineral engineer?
Most mineral engineers have a BS in mining engineering, extractive metallurgy, mineral engineering or chemical engineering. Some also get an MS, ME or PhD.
Environmental Engineers and Scientists
Environmental engineers and scientists must design, build and operate systems that monitor water quality, mitigate dust and other hazards and restore land disturbed by mining activity. Many specialists are needed to ensure safe environmental conditions during and after mining, including hydrologists, biologists, ecologists, chemists, chemical engineers and even electronics engineers.
How do I become an environmental specialist?
Environmental scientists have a BS, MS or PhD in a field such as environmental science, ecology, hydrology or geology. Environmental engineers often have a degree in environmental or chemical engineering.
Health and Safety Specialists
Health and Safety Specialists are responsible for keeping workers safe and healthy on the job. They design equipment and protocols that protect everyone on the job site. Some safety specialists include industrial hygienists (experts in preventing industry related illnesses), Occupational Health and Safety Specialists (experts in the laws and regulations related to safety on the mine site), and Safety Engineers (people who help design safety features of systems and equipment).
How do I become a safety specialist?
Many safety specialists start with a BS in Public Health and some continue on to get a MPH (Master of Public Health).
Data scientists are responsible for handling, processing and interpreting huge data sets in real time. Modern mining means 24-hour, real-time analysis and interpretation of everything from huge autonomous haul trucks to drills to slope movement, water flow rates and water quality. These advancements are only useful if we have advanced computing power as well as experts to design and understand these systems.
How do I become a data analytics engineer?
Experts are needed in many fields relating to big data
'Ask a Pro' interview series
What does a Mining Engineer do? What do you love about your job? What advice do you have for high school students? The 'Ask A Pro' career-exploration video series gives you a chance to explore your interests and career options by connecting with industry professionals. Through these short interview videos students can hear professionals' real world experiences! | <urn:uuid:c536a101-01ac-4280-a721-85a93438242b> | CC-MAIN-2020-40 | https://minerals.arizona.edu/content/future-students | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400191780.21/warc/CC-MAIN-20200919110805-20200919140805-00784.warc.gz | en | 0.950279 | 888 | 3.34375 | 3 |
The intrathecal space is the area between the thin layers of tissue that surround the brain and spinal cord. This space is filled with a liquid called cerebrospinal fluid.
Medicines can be delivered into the intrathecal space with a needle or through a thin flexible tube called a catheter.
eMedicineHealth Medical Reference from Healthwise
To learn more visit Healthwise.org | <urn:uuid:04742694-b646-4cdd-ae98-2a27e8c12252> | CC-MAIN-2015-06 | http://www.emedicinehealth.com/script/main/art.asp?articlekey=138296&ref=127828 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422118108509.48/warc/CC-MAIN-20150124164828-00099-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.91221 | 81 | 3.140625 | 3 |
Two groups of astronomers working independently in Germany have discovered a massive new exoplanet that's quite strange--for a few reasons.
The newfound exoplanet, dubbed Kepler-432b, was monitored by NASA's Kepler space telescope from 2009 to 2013 and identified as a planetary candidate in 2011. Using the 2.2-meter telescope at Calar Alto Observatory in Andalucía, Spain and the Nordic Optical Telescope on La Palma in the Canary Islands, the researchers are now confirming that, indeed, it's a planet.
(Story continues below image.)
lllustration of the orbit of Kepler-432b (inner, red) in comparison to the orbit of Mercury around the Sun (outer, orange). The red dot in the middle indicates the position of the star around which the planet is orbiting. The size of the star is shown to scale, while the size of the planet has been magnified ten times for illustration.
Analyzing the data from both telescopes, the researchers discovered Kepler-432b is incredibly dense; though it's around the same size as Jupiter, its mass is six times that of the gas giant. Its orbit around its host star, a red giant with a radius that's four times that of our Sun, is also unusual.
“The majority of known planets moving around giant stars have large and circular orbits," Dr. Davide Gandolfi, an astronomer at Heidelberg University's Center for Astronomy in Germany and a researcher involved in the discovery, said in a written statement. "With its small and highly elongated orbit, Kepler-432b is a real ‘maverick’ among planets of this type."
Due to the orbit's elongated shape, Kepler-432b's seasons are extreme, with temperatures ranging from 932 degrees Fahrenheit in winter to 1,832 degrees Fahrenheit in summer. A year on the planet corresponds to roughly 52 Earth days, according to the researchers.
And the planet is only one of five observed orbiting a red giant host star at such a close distance. Red giants are stars in their last stage of life. They can grow to become anywhere from 10 to 100 times their original size, and as they grow, any planets nearby are at risk of being devoured.
So though Kepler-432b has been able to survive near its star so far, it likely won't be around for much longer.
“The days of Kepler-432b are numbered,” Mauricio Ortiz, a PhD student at Heidelberg University who led one of the two studies of the planet, said in the statement. “In less than 200 million years, Kepler-432b will be swallowed by its continually expanding host star.” | <urn:uuid:43401e44-0bb0-464c-adff-41a1175aa635> | CC-MAIN-2019-35 | https://www.huffpost.com/entry/kepler-432b-exoplanet-extreme-seasons_n_6672378 | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330913.72/warc/CC-MAIN-20190826000512-20190826022512-00166.warc.gz | en | 0.954059 | 558 | 3.75 | 4 |
a word, sound, or custom that a person is unable to pronounce or perform correctly. It is used to identify foreigners or those who do not belong to a particular class or group of people.
It's as close to an objective fact as facts about these things get: religious beliefs are crazy. A quick tour of the world's religions would include gods, angels, ghosts, demonic possessions, talking animals, prophecies, virgin births, afterlives of all sorts, revelation, reincarnation, transubstantiation, and superaquatic perambulation, to name just a few. And that doesn't even include creation myths, which are a particularly rich source of absurdity.
When I realized what was going on here, it kind of blew my mind. The craziness of these beliefs isn't a bug; it's a feature. Religious beliefs are necessarily crazy, not just incidentally crazy — because only crazy beliefs can be used to distinguish members of the community.
A good religious belief allows us to answer the central political question: Are you with us or against us? (Are you on our side? Are you one of us?) This is why questions about belief are especially pronounced when discussing religion across a divide — atheist/theist, Mormon/Catholic, etc. What you believe is a badge of membership in a particular tribe. Which badge you're wearing tells me whose side you're on.
This is all well and good, but you might think that belief in the absurd would be hard to stabilize. There's a countervailing force pushing against these beliefs: by supposition, they fly in the face of the facts. Wouldn't the crazy beliefs of a group tend to evaporate over time?
Actually, it turns out to be easier than you might think for a group of people to stabilize belief in the absurd. To begin with, the crazy beliefs that we're talking about aren't really falsifiable. They (mostly) don't make concrete predictions, or lead to obviously maladaptive behavior. They tend to be about the past or an unspecified future, or about the ineffable or supernatural (read: nonexistent). Some, like transubstantiation, are (by construction) impossible to verify or refute with evidence. Others, such as the specific nature of the trinity, are so nonsensical as to be practically devoid of meaning. Are the invisible gremlins living in the engine of your car pink invisible gremlins, or orange? It may make a world of difference to believers, but it's hard for a scientist to care one way or the other.
There's also a powerful stabilizing force at play in the kinds of communities that maintain crazy beliefs, namely moralistic punishment. Moralistic punishment refers to the norm of punishing not only cheaters, but also those who fail to punish cheaters. It's a powerful mechanism, and when trained on certain forms of cheating (e.g. not paying taxes), can be a force for tremendous social good. But a community that's good at moralistic punishment can also aim their punishment apparatus at more arbitrary behaviors, such as professions of belief. Once a moral community decides that "wrong belief" (i.e. heresy) is a form of cheating, there will come to bear on those beliefs a tremendous social pressure. A community that treats heresy as cheating becomes capable of believing (and reinforcing belief in) almost anything.
(Under this view, the craziness acts as a barometer for how strong the moral community is — how tightly the group is able to circle around its sacred center, how much it's able to suppress its members' common sense. The particular craziness of e.g. Mormon beliefs is a signal that the Mormon moral community is exceptionally strong. To maintain such beliefs in the modern era, in face of the world, is quite the feat of solidarity.)
Thus there is a symbiotic relationship between the beliefs and the moral community. The moral community allows the crazy beliefs to come into being (and stabilize), and those beliefs in turn help define and reinforce the boundaries of the moral community.
There's an analogy here with spectator sports. Precisely because there are no substantive reasons to prefer the A's over the Dodgers, your loyalty to a specific team serves as an excellent signal of loyalty to the local community. If there were substantive reasons to prefer one team over another — if the Dodgers were more entertaining, say, or gave out $100 to anyone caught wearing their apparel — then being a fan would reflect only your selfish interests, rather than your loyalties to a particular community.
Of course, fans (or religious adherents) will verbalize all sorts of reasons for their loyalty (or beliefs), but those reasons are largely confabulatory. Statistically speaking, you're overwhelmingly likely to root for your local team, just as you are overwhelmingly likely to absorb the religion you were raised in. You may give reasons later in life for being a Christian or a Muslim or a Buddhist, but in most cases, the only reason with any causal/explanatory power is your upbringing.
I should note, in closing, that there are many religious beliefs which don't function as shibboleths — beliefs which serve object-level, functional purposes. These just aren't the beliefs we usually label as crazy. For example, most religions believe you should treat other members of your tribe (however defined) with respect, that you should put others' welfare before your own. Religions also encode lots of different beliefs about human nature, usually in narratives and laws. Many of these beliefs may be wrong, but many are surely correct and worthy of serious study.
beliefs as badges. C.f. Robin Hanson's great metaphor on beliefs as clothes.
moralistic punishment. Much more here. | <urn:uuid:e52b8deb-ffd0-4259-969f-2b26c45f7374> | CC-MAIN-2019-51 | https://meltingasphalt.com/religious-beliefs-are-shibboleths/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540488620.24/warc/CC-MAIN-20191206122529-20191206150529-00361.warc.gz | en | 0.96116 | 1,178 | 2.515625 | 3 |
Written By Yashvardhan Didwania (Grade 8)
“What is Skin Donation?”. Well, skin donation is when a person willingly gives his skin when he/she is dead to help those who need skin. Did you know that more than 70 lakh people in India suffer from burns or injuries every year in road accidents and most of them are women and children? In that 10 % of them are likely to die. So, what can you do for them?
Before that you should know of what importance skin is to a human. Skin is the largest organ in the human which protects us from harmful chemicals, environmental changes. It is vital for a human. Usually a skin can repair itself if there is a small injury to it but when the skin is badly wounded it cannot repair itself without external help. Skin from a dead person acts as a temporary option but it vital for the recipient (the person in need of the skin). Mostly the people get recovered as there is enough skin in the skin bank.
This is why donating your skin to the skin bank is very important so that they can give your skin to someone in need. It’s your option to choose if you want to donate your skin after your death to help them in need. Instead of burning the skin it would be more helpful if the skin would be donated to the skin bank after your death.
A common prejudice on skin donation is that your whole skin is removed from your body and then you look awful after death but that’s not true. Only the skin from the back, thighs and legs are taken and in no way is your figure disturbed or broken after your death.
So how can you donate your skin?
Many people in the world don’t know that skin can be donated the same way other organs are donated. Main cities like Mumbai in India have skin banks. These skin banks give your and others skin to those in need. Some important things you should know before you donate your skin is that your skin can be used for 5 years as it’s frozen and that the skin has to be donated within six hours of your death.
So, what exactly happens after your death?
First after receiving the notice of your death, the team comes from skin bank to the location of the body and remove the skin from a simple procedure which takes around 45 minutes, they remove the skin and take it to the skin bank to store it.
There’re around 8 layers of skin in your body but don’t worry, they only take the topmost layer and therefore they do not cause any disfigurement in your body.
Are there any restrictions for donating your skin?
There’re no restrictions for people to donate their skin except their age. They’ve to be above 18 years of age to donate their skin and they shouldn’t have skin diseases like HIV & Hepatitis B, STD S, Septicaemia (Pneumonia, T.B, Etc), any kind of skin infection, having evidence of skin cancer. In that case they cannot donate their skin.
Featured Image Courtesy – mrDr.com.au | <urn:uuid:3c2a30ef-b380-4331-aba9-96a00f57d967> | CC-MAIN-2023-06 | https://mypenmyfriend.com/skin-donation-a-brief-on-its-importance/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00391.warc.gz | en | 0.956421 | 650 | 2.9375 | 3 |
- Most Recent Edits
- Salish Sea References
- Wiki Rules
The Elwha Delta is an example of a wave dominated delta, where barrier beach formation controls the configuration of the river outlet. The Elwha has very low indicators of degradation compared to other Puget Sound deltas (Cereghino et al 2012). The greatest source of degradation is the historical damming of the Elwha river, which dramatically reduced sediment supply. Ongoing dam removal has dramatically increased sediment input, and is altering the structure of the delta.
Nearshore Strategies Data Report
Cereghino et al 2012 completed a soundwide analysis to identify and describe river delta sites in Puget Sounds as part of a nearshore ecosystem restoration strategy (using remote sensing data c. 2000-2006). The following narrative of this delta site was developed to support distribution and use of analysis results:
- The Elwha Delta in the Juan de Fuca sub-basin historically contained 46 acres of vegetated wetland along a 4 km shoreline. The delta receives flow from a 83,609 square kilometer watershed. These characteristics make this system the 11th largest delta out of 16 systems in Puget Sound.
- Simenstad et al 2011 found that this system had lost none of its vegetated tidal wetlands, and 25% of its shoreline length. Of the remaining shoreline, 2% shows some evidence of infrastructure development. In the surrounding uplands, 7% of land is estimated to have greater than 10% impervious surface. Across the watershed, 2% of land is estimated to have greater than 10% impervious surface. Based on these paramters, the site was given a degradation score of 6 out of 100, making it the 16th most degraded delta in Puget Sound. It faces no risk of future development locally, and a low risk of development across the watershed. Approximately 98% of the watershed is currently impounded behind dams.
- Tom Roorda Aerial Photography has been documenting changes in the delta (see sample image, note copyright).
- Clallam County is working with the Lower Elwha Klallam Tribe on the Elwha Estuary Dike Removal on the west side of the delta
- seattle times reports on change in the valley
- The Lower Elwha Klallam Tribe provides information on their website
- the National Park Service is providing information on line
- The US Geological Survey maintains a Elwha Web site
- Delta progradation has accelerated since first Elwha Dam removal.
- Barrier beach formation apepars to change the orientation and character of distributary and tidal channel networks.
Related Wiki Resources | <urn:uuid:de8b90c0-2081-4e73-acb3-1657378da0d7> | CC-MAIN-2023-40 | https://salishsearestoration.org/wiki/Elwha_Delta | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00169.warc.gz | en | 0.905089 | 574 | 3.28125 | 3 |
Violence against women (VAW) and HIV/AIDS are major public health problems that adversely affect sexual and reproductive health. They intersect with each other in important ways. Research exploring these intersections in countries in different regions of the world documents an undeniable link between VAW and HIV infection. This involves multiple pathways, either directly through rape/sexual assault or indirectly through fear of violence and difficulties for women in controlling and negotiating safe sex and condom use. Violence in childhood may also increase sexual risk behaviour and thereby risk of acquiring HIV.
Evidence shows that HIV can also be a risk factor for violence since disclosure can put women at risk of violence by their partners, family or community members. Drug use is another common dimension of both phenomena, and can also serve as risk factor or outcome of experiencing violence or HIV infection. Additionally, vulnerable populations, particularly sex workers, may face increased risks, and require special attention.
A review of tested strategies for addressing violence against women and HIV shows promising possibilities for reducing the occurrence of both and developing strategies for prevention and to support those affected. Results of this review also show that any long-term solution to VAW and/or HIV prevention requires addressing the social context and the gender inequalities that form a core element of this.
Programmes and policies should address the underlying social and economic issues, gender inequalities and harmful gender norms and apply a human rights focus. At the same time, there is a need to develop services, such as comprehensive post rape care that responds to the physical and psychological health needs of violence survivor, and testing and counselling services that address VAW and at Tukundane charity organization, we aim at finding solution with your help of course it takes village to raise a child .. | <urn:uuid:19547c43-3462-475f-a9ff-3fb447440d84> | CC-MAIN-2020-50 | https://tukundane.org/fight-against-violence/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141180636.17/warc/CC-MAIN-20201125012933-20201125042933-00201.warc.gz | en | 0.949063 | 346 | 2.890625 | 3 |
From: NASA HQ
Posted: Friday, December 17, 2010
NASA's Lunar Reconnaissance Orbiter is allowing researchers to create the most precise and complete map to date of the moon's complex, heavily cratered landscape.
"This dataset is being used to make digital elevation and terrain maps that will be a fundamental reference for future scientific and human exploration missions to the moon," said Dr. Gregory Neumann of NASA's Goddard Space Flight Center in Greenbelt, Md. "After about one year taking data, we already have nearly 3 billion data points from the Lunar Orbiter Laser Altimeter on board the LRO spacecraft, with near-uniform longitudinal coverage. We expect to continue to make measurements at this rate through the next two years of the science phase of the mission and beyond. Near the poles, we expect to provide near-GPS-like navigational capability as coverage is denser due to the spacecraft's polar orbit." Neumann will present the map at the American Geophysical Union meeting in San Francisco December 17.
The Lunar Orbiter Laser Altimeter (LOLA) works by propagating a single laser pulse through a Diffractive Optical Element that splits it into five beams. These beams then strike and are backscattered from the lunar surface. From the return pulse, the LOLA electronics determines the time of flight which, accounting for the speed of light, provides a precise measurement of the range from the spacecraft to the lunar surface. Range measurements, combined with accurate tracking of the spacecraft's location, are used to build a map revealing the contours of the lunar landscape. The five beams create a two-dimensional spot pattern that unambiguously reveals slopes. LOLA will also measure the spreading of the return pulse to get the surface roughness and the change in the transmitted compared to the return energy of the pulse to determine surface reflectance.
The new LOLA maps are more accurate and sample more places on the lunar surface than any available before. "The positional errors of image mosaics of the lunar far side, where direct spacecraft tracking - the most accurate -- is unavailable, have been one to ten kilometers (about 0.62 to 6.2 miles)," said Neumann. "We're beating these down to the level of 30 meters (almost 100 feet) or less spatially and one meter (almost 3.3 feet) vertically. At the poles, where illumination rarely provides more than a glimpse of the topography below the crater peaks, we found systematic horizontal errors of hundreds of meters (hundreds of yards) as well." In terms of coverage, the nearly three billion range measurements so far by LRO compare to about eight million to nine million each from three recent international lunar missions, according to Neumann. "They were limited to a mile or so between individual data points, whereas our measurements are spaced about 57 meters (about 187 feet) apart in five adjacent tracks separated by about 15 meters (almost 50 feet)."
"Recent papers have clarified some aspects of lunar processes based solely on the more precise topography provided by the new LOLA maps," adds Neumann, "such as lunar crater density and resurfacing by impacts, or the formation of multi-ring basins."
"The LOLA data also allow us to define the current and historical illumination environment on the moon," said Neumann. Lunar illumination history is important for discovering areas that have been shaded for long periods. Such places, typically in deep craters near the lunar poles, act like cold storage, and are capable of accumulating and preserving volatile material like water ice.
The landscape in polar craters is mysterious because their depths are often in shadow. The new LOLA dataset is illuminating details of their topography for the first time. "Until LRO and the recent Japanese Kaguya mission, we had no idea of what the extremes of polar crater slopes were," said Neumann. "Now, we find slopes of 36 degrees over several kilometers (several thousands of yards) in Shackleton crater, for example, which would make traverses quite difficult and apparently causes landslides. The LOLA measurements of shadowed polar crater slopes and their surface roughness take place at scales from lander size to kilometers. These measurements are helping the LRO science team model the thermal environment of these craters, and team members are developing temperature maps of them."
LRO and LOLA were built and are managed by NASA Goddard. The research was funded by NASA's Exploration Systems Mission Directorate at NASA Headquarters in Washington.
For images, refer to: http://www.nasa.gov/mission_pages/LRO/news/lola-topo-map.html
// end // | <urn:uuid:ef4d1e07-d1ca-4354-bdc4-c04bd37fe1e9> | CC-MAIN-2018-39 | http://www.spaceref.com/news/viewpr.html?pid=32320 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156690.32/warc/CC-MAIN-20180920234305-20180921014705-00062.warc.gz | en | 0.934424 | 951 | 3.8125 | 4 |
Integration of gender concerns into the planning and design of agricultural censuses and surveys
The adoption of a gender perspective in agricultural censuses or surveys has to be decided in the first stages of planning of the agricultural census or survey, because it has significant implications in terms of topics covered, census and surveys operations such as data collection design and training of field staff, and, at a later stage, data analysis and dissemination. An analysis of agricultural censuses undertaken in Africa in the 2000 census round showed, for example, that the production of statistics on gender and agriculture is improved when the need for gender statistics is incorporated into the objectives and scope of the censuses (FAO Regional Office for Africa, 2005). The analysis also showed that the process of obtaining gender statistics improves when potential users of gender statistics, with clear demands of specific data, are involved in the preparation of the censuses.
Coverage of all relevant units of enumeration
Gender bias in data collection can be introduced by improper coverage of all relevant units of enumeration. The unit of enumeration in agricultural censuses and surveys is the agricultural holding. An agricultural holding is an economic unit of agricultural production under single management, comprising all livestock kept and all land used wholly or partly for agricultural production purposes, without regard to title, legal form or size (FAO, 2007). There are two types of agricultural holdings: (a) holdings in the household sector – that is, those operated by household members; and (b) holdings in the non-household sector, such as corporations and government institutions.
Proper coverage of the household sector is the most important from the perspective of generating gender statistics. The exclusion of small holdings, a sub-sector where women and family members play a particularly important role, can be a drawback of agricultural censuses or surveys. When holdings below a certain size and/or holdings located in urban or peri-urban areas are excluded from censuses and surveys, women’s contribution to agricultural production may be underestimated. In addition, these excluded holdings could be playing an important role in food production and food security.
The inclusion of all units relevant to agricultural production needs to be considered when preparing the frame of agricultural holdings in the household sector and when designing the sampling frame for agricultural surveys. In particular, frames based on administrative sources where women are less likely than men to have their holdings registered can introduce significant gender-bias in data obtained. Gender differentials also need to be considered when deciding the stratification variables in the sampling design of agricultural surveys. When necessary, oversampling in one or more strata should be considered to allow for an adequate number of both women- and men-operated holdings in each stratum.
Adequate units of data collection and analysis
Comprehensive coverage of gender issues in agricultural censuses and surveys requires the use of multiple units both in the data collection stage as well as in the data analysis stage. As noted before, the unit of enumeration in agricultural censuses and surveys is the agricultural holding. Many censuses and surveys collect most of the data at the level of agricultural holding. For example, data on inputs for agricultural production, such as seeds or pesticides, are usually purchased for the whole holding and therefore they are collected at the level of the holding. Other examples of items usually collected at the holding level are the use of irrigation or use of agricultural machinery.
However, it may be necessary to collect and analyse data at intra-holding level in order to get a true picture on gender issues. Data on farm labour, especially data on participation of household members in activities of agricultural production, can be better captured at individual level, along with data on sex, age, marital status, educational attainment, or other characteristics related to the type and amount of work performed on the farm or for other business.
Depending on the country, data on land use and livestock are sometimes more suitable to be collected for smaller units within the holding. For example, data on land use are often collected at the level of parcels or plots that compose a holding. More general, data can be collected at the sub-holding level. A sub-holding is defined as a single agricultural activity or group of activities managed by a particular person or group of persons (sub-holders) in the holder's household on behalf of the agricultural holder. There may be one or more sub-holdings in a holding. A sub-holding could comprise a single plot, a whole field, a whole parcel, or even the whole holding. A sub-holding could also be a livestock operation associated with a plot, field or parcel, or a livestock operation without any land.
The collection of data on crops and livestock at the more disaggregated level may be preferred for several reasons. First, collecting data at the level of parcels or plots reduces the errors in reporting. This is especially the case when agricultural households work on several different plots of land, and different individuals are in charge of each plot or crop; or, when some household members are responsible for herds that are separated from those of the main holder. Gathering the data at plot level and herd level may appear as more time consuming. However, when data are collected at the whole farm level, the respondents may have by themselves to add up the information on different plots to come up with the required answer, increasing the chances for non sampling errors like reporting errors. The quality of data improves when women and men in charge of each plot or crop respond separately to questions about the plots or crops for which they are responsible. The operator of each plot is more likely to know specific details about the size and quality of the plot, how much time each household member has spent working on various tasks on that particular plot. Second, plots from the same holding may differ in terms of land quality, the degree of land degradation and erosion, and the data collected at their level may explain differences in agricultural production. Finally, disaggregated data at the level of sub-holdings are crucial for understanding gender roles and decision-making within the agricultural holding.
It is, however, to be noted that in most cases the application of sub-holding concept on the ground poses many practical challenges and increases the cost of data collection. Before deciding to apply this concept for large scale survey like an agricultural census a careful evaluation of social customs and cost-benefits of using this concept is recommended.
Gender-specific conceptual and measurement issues related to the topics covered in agricultural censuses and surveys have to be adequately reflected in the design of questionnaires used (see box 3.3 for a checklist of the main points that should be taken into account in designing questionnaires). It is important, from a gender perspective, that the questionnaire corresponding to the household sector is structured by the needed level of data collection. In that respect, different modules may be designed for different levels of data collection and/or different topics. For example, data collected at individual level may be covered by a module on demographic, social and economic characteristics of household members, including involvement in agricultural and non-agricultural economic activities on and off the holding; and a module on characteristics of non-family agricultural labour. Identification of the owners of agricultural resources and sub-holders may also be based at data collected at the level of individual household members.
Some other modules of the questionnaire, such as those on livestock or land use, may be designed to collect data at sub-holding level with the possibility of identification of the sub-holder. The implementation of the sub-holding/sub-holder concepts, important from a gender perspective, may be complex. The approach used by a country will depend on national agricultural practices and social and cultural conditions, taking into consideration the data collection methodology already existing or suitable. For example, when countries have the practice of collecting data on crops at the plot level and data on livestock at the herd level, it is relatively straightforward to identify the women and men who are in charge of those parcels and herds (sub-holders). Alternatively, a smaller set of items can be collected at the level of sub-holdings separately from the main crop and livestock data, by asking specific questions about the type of crop and livestock activities carried out under the control of the sub-holder.
Box 3. 3 Incorporating a gender perspective in the design of questionnaires for agricultural censuses and surveys. A checklist
Members of the team designing the questionnaires have been trained in gender issues and gender-specific measurement issues related to family and non-family farm labour and role of women as managers of holdings and sub-holdings.
For the household sector, there is a clear indication of the items to be collected at holding level, at sub-holding level, or at individual level of household members and hired labourers. If possible, identification of holders, sub-holders and owners allow the link with the individual characteristics of the household members.
When identifying the sub-holders, use a series of questions about each household member to find out about the types of work each carried out on the holding and their role in managing agricultural production activities.
Use of a series of questions instead of one question to identify the household members owning by themselves or jointly with another person parcels/plots of land, livestock by type, and agricultural machinery.
Avoid language suggesting that holder or sub-holders are male.
When measuring economic activity, the question should have a note for the interviewers indicating the use of activity lists (provided in the manual) and follow up probing questions.
Language in the questionnaire should be carefully used to avoid that the agricultural work of women is perceived and reported as housework rather than as economic activity.
If household head needs to be identified, a short note on the questionnaire should indicate the criteria of identification
Selection and training of the field staff
The quality of data collected in agricultural censuses and surveys (similar to other data collection programmes) depends on the quality of staff selected and the training provided. Box 3.4 presents a list of factors that should be taken into account when incorporating a gender perspective in the preparation of manuals and training of interviewers for agricultural censuses and surveys.
It should be noted that men are greatly overrepresented among field staff in agricultural censuses and surveys, often as a result of using as interviewers workers in agricultural extension services who are predominantly men. In general, it is important that both women and men are selected as interviewers and supervisors, and both women and men are trained to obtain quality data from both female and male respondents. In particular, the recruitment of women operators should be seriously considered in countries where women farmers do not feel free to talk directly to male enumerators due to cultural factors.
Box 3. 4 Incorporating a gender perspective in the preparation of manuals and training of interviewers for agricultural censuses and surveys - A checklist
Identify the key gender issues prevailing in the agricultural sector in the country of interest.
Gender training should emphasize gender-related objectives and goals of the census.
Gender training should increase awareness about the role of women in managing holdings and sub-holdings.
Both women and men are selected as training instructors and as trainers presented in audio-visual materials.
Interviewers women and men should be trained to interview persons of the same sex and of the opposite sex.
The language and examples given in the manuals or training materials with regard to identification of agricultural holders and sub-holders and the household head are free of gender-based biases.
Manuals and training materials provide examples on identifying joint agricultural holders.
Manuals and training materials should show examples for identifying the real decision maker in the farm. In particular, persons who are usually absent from the household should not be declared as household head or agricultural holder.
Training provides guidelines in obtaining information from women and men in charge of each plot or crop.
When collecting data on economic activity, provide in the manuals lists of economic activities, including lists of own-account productive activities and probing lists, to avoid underreporting of women’s economic activity. Training should emphasize problems and stereotypes associated with women’s work.
The census advertising is an important tool for improving the census coverage, in particular, of small holdings managed by women, and the reporting of women’s agricultural activity. The presentations prepared for advertising should illustrate both women’s and men’s contribution to agricultural production. The choice of type of media should take into account the fact that women may have easier access to some types of media than others. For example, in certain groups of population, women are more likely than men to be illiterate. Women may be easier to reach by radio programmes targeted at women or by use of graphics in places where women tend to gather together. | <urn:uuid:caa63ada-73b0-45b6-92cc-1bc3c1e1a033> | CC-MAIN-2013-48 | http://unstats.un.org/unsd/GenderStatManual/Agricultural-censuses-and-surveys.ashx | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164026161/warc/CC-MAIN-20131204133346-00019-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.935118 | 2,585 | 3.078125 | 3 |
What if the deadline is already today and the essay is still a big headache for you? Create your beautiful essay using our tips for writing to make your life much easier.
How to write an essay fast and unmistakably at the same time
Quick essay writing is a very real phenomenon. It is hard to even for a professional essay writer. But in order to make this possible, you need to have certain abilities and know the guidance on where to start and how to continue the process of creating the text. If right now you are experiencing a feeling of excitement that you have the task of writing an essay but do not understand what plan you need to follow in the process, we will show you, using the example of obvious tips and consistent actions, what to do and how to achieve the perfect result. Take a ten-minute break from your daily routine, arrange a cup of coffee for yourself and start reading our tips for writing, which will change the way you think about paperwork and help make your life easier.
A sequence of thoughts and actions on how to write an essay
Even if the process of writing an essay is something incomprehensible and confusing for you every time, be sure that this task has rules, following the sequence of which you can optimize your time and achieve a better result. We have sequentially described for you seven steps that will be your guide to the world of quality writing:
- Evaluate the amount of your free time. We know that the more time you have, the slower the work progresses. You can afford to be distracted by checking social networks, taking a long break in order to have a cup of coffee, or do something else that is not important at the moment. Divide your time into two halves, the first of which you will devote to studying the material and the second in order to directly create an essay.
- Learn the topic and requirements specified in your assignment. Make sure you understand the essence of the future essay and know the structure of the future text. If necessary, read your homework several times to avoid wasting time.
- Start your research and create your first short draft. Once you have determined the main idea of your essay, take the time to create headings for your text that will help structure and create a logical sequence.
- Development of main thoughts. After creating the templates, describe in one or two sentences what exactly you want to tell the reader in each paragraph. This must be done not at the first stage of creating an essay in order not to get confused in your own thoughts and not to lose the logical component of the text.
- Find evidence and form statements. To create a strong essay, you just need to argue your own thoughts with existing evidence. Make sure you find enough and include them in the text.
- Collect all your thoughts into one text. After doing research, creating a draft, and adding all the arguments there, describe in detail each of the paragraphs, collecting from each thought a single text that will tell the reader about the essence of your topic and what problem you wanted to reveal for them.
- Read the finished result and convince yourself of the ideality of the essay. Always remember the golden rule of validation. Even if your essay has deep meaning and you spent hours of work to create it, the presence of grammatical or other errors can ruin the whole impression of your work. Delete unnecessary sentences and give your essay a final look!
After understanding the essence of the recommendations and imaging in your head an action plan for your paperwork, creating an essay becomes a relatively easy task. Knowing and understanding the basic requirements for the process helps to complete all the work much faster.
Your problem-solving can always get easier
We wish with all our hearts that after reading these recommendations, you would feel your own strength and understand which direction to take while writing an essay. We believe that in a few hours of work, your essay will be ready, and you are capable of it! But what if you do not have these few hours, or if the information received only made you panic? If all your thoughts at the moment are one big snow globe, but at the same time, the deadline is still approaching, we invite you to buy an essay and relax, moving on to other everyday tasks.
Essay writing is always a creative process that requires mental effort and a certain amount of time spent. Be calm when there are experts nearby who have created their own way of high-quality and flawless essay writing. Your time is the most precious resource, and we know how to save it. We are happy to inform you that we will take that responsibility upon ourselves and give you confidence and additional hours of personal freedom! | <urn:uuid:9868a3e6-89bc-4a54-8152-a686e1bec1d2> | CC-MAIN-2022-21 | https://adclays.com/seven-tricks-how-to-write-an-essay-quickly/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00178.warc.gz | en | 0.942774 | 949 | 2.625 | 3 |
INSTRUCTIONS: Develop an essay addressing the question below. Responses must be double-spaced and reflect grammatical correctness, logical organization, and critical thinking. I expect your essay to display the intellectual standards of breadth, depth, clarity, accuracy, precision, significance, relevance, and logic. The response will be a minimum of 1500 words +/-250 words. Margins must be “1” all around. Font must be either Times New Roman regular size 12 or Courier New size 11 font. The essay requires “your” individual analysis and reasoning, not that of another author. If you use facts/data to support your reasoning and/or arguments, cite using APA style and list the sources at the end of your essay in a reference section. When you have completed your exam, send it through the Final Examination listing on the Assignment page. Be sure to place your name and FEX in the upper right hand corner of the first page of your response. No separate title page. To check originality, you can submit as many times as you want to up and until the assignment deadline. At that time, the last file submitted will be the graded copy. Your response must have an introduction including the purpose of the essay; main content (addressing the questions below); and a conclusion. When submitting, be sure to use the proper file naming protocol listed in the syllabus.
QUESTION: Throughout this course you were exposed to a wide variety of criminal behaviors and crimes. I want you to identify the one criminal behavior/crime studied in the course that has changed your thinking and perspective on this particular criminal behavior/crime. Identify the criminal behavior/crime and explain in a well-reasoned and thoughtful response as to why it has changed your thinking and in what way? Has it changed your thinking about the offenders, victims, causes, and/or prevention of the criminal behavior/crime? If so, how? Be specific and detailed. Do you feel that you need to share your new found knowledge and thinking on this criminal behavior/crime with colleagues and/or the leadership of your organization or company? Why or why not? Finally, do you plan to continue monitoring research on this criminal behavior/crime in the future? Why or why not? If yes, what will be your strategy to stay abreast of research on this particular criminal behavior/crime?
Top Quality and Well-Researched Papers
All ourbpapers are written from scratch. In fact, Clients who ask for paraphrasing services are highly discouraged. We have writers ready to craft any paper from scratch and deliver quality ahead of time.
Professional and Experienced Academic Writers
Our writers keeps you posted on your papers progress - providing you with paper outline/draft. You are also at liberty to communicate directly with your writer.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time, in many cases quite ahead of time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admission Essays & Business Writing Help
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered. | <urn:uuid:0e885057-ceb7-4129-9c4d-6793f6dbed76> | CC-MAIN-2022-33 | https://iwritehomework.com/criminal-behaviors-and-crimes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00488.warc.gz | en | 0.937337 | 1,140 | 2.859375 | 3 |
Module Summary – DSCR Minerals, Rocks, and Fossils
In the Delta Science Content Reader Minerals, Rocks, and Fossils, students learn what minerals are and how they can be identified by observing their properties. Students discover processes that lead to the formation of rocks and trace how rocks are transformed into other types of rock in the rock cycle. They are also introduced to the importance of minerals and rocks as resources for jewelry, building materials, and other goods. The book concludes with a discussion of how fossils form and what they reveal about Earth’s history. | <urn:uuid:6a6afa59-9e70-4b69-b84b-2b994f1554fa> | CC-MAIN-2015-06 | http://www.fossweb.com/module-summary?dDocName=D2662158 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122122092.80/warc/CC-MAIN-20150124175522-00068-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.956353 | 116 | 4 | 4 |
Maintaining physical health brings a variety of benefits - including for the brain. A new study affirms that but also finds that lower IQ in teen years is correlated to a higher risk of dementia before the age of 60.
IQ doesn't really go up or down much so IQ at a young age isn't telling us much, but a study of one million young Swedish men included the data so it ended up being a factor.
Researchers at the Sahlgrenska Academy of Gothenburg University previously analyzed Swedish men's conscription results and were able to show a correlation between cardiovascular fitness as a teenager and health problems in later life. In a new paper based on data from 1.1 million young Swedish men, the Gothenburg researcher team shows that those with poorer cardiovascular fitness and/or lower IQ in their teenage years more often suffer from early-onset dementia.
"Previous studies have shown the correlation between cardiovascular fitness and the risk of dementia in old age. Now, for the first time, we can show that the increased risk also applies to early-onset dementia and its precursors," says Sahlgrenska Academy researcher Jenny Nyberg, who headed the study.
The increased risk remained even when controlled for other risk factors, such as heredity, medical history, and social-economic circumstances.
Expressed in figures, the study shows that men who when conscripted had poorer cardiovascular fitness were 2.5 times more likely to develop early-onset dementia later in life. A lower IQ entailed a 4 times greater risk, and a combination of both poor cardiovascular fitness and low IQ entailed a 7 times greater risk of early-onset dementia.
Fitness strengthens the brain
"We already knew that physical and cognitive exercise reduces the risk of neurological disease. Physical exercise increases nerve cell complexity and function and even generation of new nerve cells in the adult brain, which strengthens our mental and physiological functions. In other words, good cardiovascular fitness makes the brain more resistant to damage and disease," says Prof. Georg Kuhn, senior author of the study.
People who develop early-onset dementia are often of working age and can have children still living at home, which means the consequences for both the sufferers and their families are even more serious. Despite this, patients with early-onset dementia are a relatively overlooked group.
"This makes it important to initiate more research into how physical and mental exercise can affect the prevalence of different types of dementia. Perhaps exercise can be used as both a prophylactic and a treatment for those in the risk zone for early-onset dementia," says Nyberg.
Article: "Cardiovascular and cognitive fitness at age 18 and risk of early-onset dementia", Brain, March 7 2014. Source: University of Gothenburg | <urn:uuid:52cf1e08-eab2-4761-a77c-848b38754d3d> | CC-MAIN-2023-50 | https://www.science20.com/news_articles/physically_fit_teens_lead_lower_risk_early_dementia-131361 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00354.warc.gz | en | 0.960861 | 574 | 3.046875 | 3 |
Implantation of a stent-like flow diverter can offer one option for less invasive treatment of brain aneurysms – bulges in blood vessels – but the procedure requires frequent monitoring while the vessels heal. Now, a multi-university research team has demonstrated proof-of-concept for a highly flexible and stretchable sensor that could be integrated with the flow diverter to monitor hemodynamics in a blood vessel without costly diagnostic procedures.
The sensor, which uses capacitance changes to measure blood flow, could reduce the need for testing to monitor the flow through the diverter. Researchers, led by Georgia Tech, have shown that the sensor accurately measures fluid flow in animal blood vessels in vitro, and are working on the next challenge: wireless operation that could allow in vivo testing.
The research was reported in the journal ACS Nano and was supported by multiple grants from Georgia Tech’s Institute for Electronics and Nanotechnology, the University of Pittsburgh and the Korea Institute of Materials Science.
“The nanostructured sensor system could provide advantages for patients, including a less invasive aneurysm treatment and an active monitoring capability,” said Woon-Hong Yeo, an assistant professor in Georgia Tech’s George W. Woodruff School of Mechanical Engineering and Wallace H. Coulter Department of Biomedical Engineering at Georgia Tech and Emory University.
“The integrated system could provide active monitoring of hemodynamics after surgery, allowing the doctor to follow up with quantitative measurement of how well the flow diverter is working in the treatment.”
Cerebral aneurysms occur in up to 5% of the population, with each aneurysm carrying a 1% risk per year of rupturing, noted Youngjae Chun, an associate professor in the Swanson School of Engineering at the University of Pittsburgh. Aneurysm rupture will cause death in up to half of affected patients.
Endovascular therapy using platinum coils to fill the aneurysm sac has become the standard of care for most aneurysms, but recently a new endovascular approach – a flow diverter – has been developed to treat cerebral aneurysms.
Flow diversion involves placing a porous stent across the neck of an aneurysm to redirect flow away from the sac, generating local blood clots within the sac.
“We have developed a highly stretchable, hyper-elastic flow diverter using a highly-porous thin film nitinol,” Chun explained. “None of the existing flow diverters, however, provide quantitative, real-time monitoring of hemodynamics within the sac of cerebral aneurysm".
"Through the collaboration with Dr. Yeo's group at Georgia Tech, we have developed a smart flow-diverter system that can actively monitor the flow alterations during and after surgery.”
Repairing the damaged artery takes months or even years, during which the flow diverter must be monitored using MRI and angiogram technology, which is costly and involves injection of a magnetic dye into the blood stream.
Yeo and his colleagues hope their sensor could provide simpler monitoring in a doctor’s office using a wireless inductive coil to send electromagnetic energy through the sensor. By measuring how the energy’s resonant frequency changes as it passes through the sensor, the system could measure blood flow changes into the sac.
“We are trying to develop a batteryless, wireless device that is extremely stretchable and flexible that can be miniaturised enough to be routed through the tiny and complex blood vessels of the brain and then deployed without damage,” said Yeo. “It’s a very challenging to insert such electronic system into the brain’s narrow and contoured blood vessels.”
The sensor uses a micro-membrane made of two metal layers surrounding a dielectric material, and wraps around the flow diverter. The device is just a few hundred nanometers thick, and is produced using nanofabrication and material transfer printing techniques, encapsulated in a soft elastomeric material.
“The membrane is deflected by the flow through the diverter, and depending on the strength of the flow, the velocity difference, the amount of deflection changes,” Yeo explained. “We measure the amount of deflection based on the capacitance change, because the capacitance is inversely proportional to the distance between two metal layers.”
Because the brain’s blood vessels are so small, the flow diverters can be no more than five to ten millimeters long and a few millimeters in diameter. That rules out the use of conventional sensors with rigid and bulky electronic circuits.
“Putting functional materials and circuits into something that size is pretty much impossible right now,” Yeo said. “What we are doing is very challenging based on conventional materials and design strategies.”
The researchers tested three materials for their sensors: gold, magnesium and the nickel-titanium alloy known as nitinol. All can be safely used in the body, but magnesium offers the potential to be dissolved into the bloodstream after it is no longer needed.
The proof-of-principle sensor was connected to a guide wire in the in vitro testing, but Yeo and his colleagues are now working on a wireless version that could be implanted in a living animal model. While implantable sensors are being used clinically to monitor abdominal blood vessels, application in the brain creates significant challenges.
“The sensor has to be completely compressed for placement, so it must be capable of stretching 300 or 400%,” said Yeo. “The sensor structure has to be able to endure that kind of handling while being conformable and bending to fit inside the blood vessel.” | <urn:uuid:4478f2b0-03d5-4f58-a7e7-c0cd8d9f1677> | CC-MAIN-2019-04 | https://medical.electronicspecifier.com/sensors-1/integrated-sensor-could-monitor-brain-aneurysm-treatment | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583822341.72/warc/CC-MAIN-20190121233709-20190122015709-00241.warc.gz | en | 0.932498 | 1,197 | 2.625 | 3 |
The purpose of this glossary is for educational purposes only. We have compiled a list of common insurance terms and provided definitions. Insurance terms can be complicated and overwhelming since there are quite many. Our goal is to simplify your life.
The cost to repairing or replacing an item of property during the time of loss, less depreciation; ACV is often used to determine the amount of reimbursement for a loss.
Add-on insurance coverages that apply only in certain situations. Additional coverages have reduced or separate limits of liability. They require the insured to meet specific requirements before they become applicable. Additional coverages are also known as coverage extensions, other coverages, and extended coverages.
Within an insurance policy, an additional insured is an individual or company who receives the insured’s benefits under the insurance policy. They will be listed in the declarations. For example, a mortgage company that insured property and has an insurable interest.
An insurer is licensed to conduct business in the state or country. The insurer is a fully licensed carrier, and they are approved to provide specific lines of insurance coverage in the state the insurance exposure is located.
Type of policy limit found in liability policies that place a ceiling on coverage to a specified total amount for all losses (property damage, bodily injury, etc.) that occurred within the policy period.
This method involves assigning a value for a property in which the insured and insurer agree, at the beginning of the policy period, on the maximum amount paid in the event of a total loss.
Insurance coverage, unless explicitly omits, covers any risk. For example, if the policy does not expressly exclude flood insurance, then the house would be covered in the event of a flood. See Open peril policy.
An organization that provides ratings on insurance companies’ financial stability that do business in the United States. They are headquartered in Oldwick, New Jersey, and were founded by Alfred M. Best.
An individual or company that meets a state insurance department’s standard and is approved by the responsible authority to do business in the given state, also known as admitted insurer.
An add-on to an insurance policy where the coverage for a property automatically increases over time, considering changing construction costs, protecting the insured from facing losses.
A basic named-peril is a term that is used to label specific losses or damages that are “named” or written in your insurance policy. Here are the basic named perils: fire, lightning, explosion, windstorm or hail, smoke, aircraft or vehicles, riot or civil commotion, vandalism or malicious mischief, sprinkler leakage, sinkhole collapse, and volcanic action.
Provides immediate but temporary insurance for some time until a formal policy has been issued or denied.
This type of named-peril relates, particularly to property coverage. Includes an additional six areas of protection on top of the 11 of the basic form policies. Added areas include burglary, fallen objects, ice or snow, frozen plumbing, accidental water damage, and electricity.
A dwelling policy covering theft attempted theft and vandalism, and malicious mischief resulting from theft, and applies to theft on and off the premises.
Also known as a builder’s risk policy covering residential, commercial, and farm structures that are being renovated or under construction.
Covers losses resulting from a person unlawfully entering premises evident from forced entry.
A type of insurance coverage businesses typically for liability, property, and coverage on business interruptions.
Ending or terminating an insurance policy before the confirmed end date.
A broad type of insurance coverage for employers, businesses, and individuals against property damage and other liabilities. It’s also an umbrella term for different types of insurance like aviation, surety bonds, and workers’ compensation.
A certificate provided by an insurance company that authenticates the existence of a policy; includes a brief description of the type of coverage under the policy.
A requirement set out in a policy stating the insured pay part of a loss to an insurance company- usually at least 80%.
The amount the insurance company will not pay if the policyholder fails to adhere to the coinsurance clause.
A form located in a different section of an insurance policy; containing critical information about the policy, such as the name of the insured, policy terms, and the amount of coverage included.
An insurance cover offering more than what a standard policy provides; usually purchased separately from a standard policy and works as an extension.
A regulated insurance form is used to issue an insurance contract. Generally contains insuring agreements, coverages, exclusions, and conditions.
This must occur before a liability policy can apply to a given loss. The coverage trigger is the occurrence of injury or property damage that takes place during the policy period.
A financial grant is awarded by a court to compensate an injured party for their pain/suffering.
The part of an insurance contract showing who is insured, when and where the coverage is adequate, what property or risk is covered, and how much coverage applies.
The amount of money you- the insured individual- are expected to pay towards an insured loss before the insurance company starts to pay.
The expenses incurred by the insurer from a legal matter after defending a case against insured persons.
Part of a homeowner’s policy that may help repair or rebuild your home’s physical structure, flat, or place of residence if damaged by a covered peril such as lightning strikes or fires; some versions can cover additional living expenses.
There are different coverages in the tier of policy that you choose. Note: DP stands for “dwelling policy”.
A DP1 policy is a type of home insurance that protects rental or vacant homes from nine named perils. It covers the property for its actual cash value, not replacement cost.
This coverage protects your home against things like burst pipes, theft, and other perils for dwellings under construction; the limits of liability increase as construction of the building progress.
Represents any premiums an insurance company has accumulated on the part of the insurance contract that has expired.
Protection against damage to a structure, its contents, or both after an earthquake. Type of insurance is available as an additional policy and backing to homeowners, commercial properties, and dwelling policies.
A building without a basement with its lowest elevated floor above ground level by shear walls, post, foundation walls, piers, columns, or pilings.
Covers insured for loss of equipment due to electrical or mechanical breakdown of most types of equipment.
Insurance that covers a claim when the primary insurance limit has been used up or exhausted.
A list of perils, persons, or situations not covered under the insurance policy.
Extended cover of the casualty insurance policy; supplies insurance against risks unprotected under the primary policy
FCRA is a federal law that monitors the gathering and reporting of credit information about consumers; allows consumers to obtain information in credit reports for free.
When a policy is canceled by the insurance company or the insured on its effective date.
The procedure used to figure out the amount it would cost to replace or repair a damaged property with less costly typical constructions methods and materials.
Anything that makes risk more probable or a loss more likely to occur due to the peril. There are five types of hazards: Physical Hazard, Moral Hazard, Morale Hazard, Legal Hazard & Information Hazard.
A policy that integrates both personal liability cover and personal property coverage. Depending on the policy chosen by the insurer, the property coverage can vary, whereas liability coverage remains the same.
This type of peril is caused directly by a person/s such as vandalism, regulation, poor design or production, theft, negligence, etc.
Part of the homeowner’s policy that authorizes cover on the insured individuals’ business activities conducted on the residence premises.
The measures of compensating the insured, as close to the same financial condition preceding the incident, for the loss or damage that has occurred.
The insurance protections provided when damage or loss is sustained, insured needs to be restored to the approximate financial condition preceding the incident.
An insurance system that gradually increases property coverage to match the effects of inflation.
The realistic concern of a person acquiring insurance for any individual or estate against unforeseen events, such as death or losses.
The total amount of insurance purchases vs. the actual replacement cost of the insured property is usually expressed as a ratio.
A common law that states any person or entity is accountable for the financial damage suffered by another group, entity, or person.
Transfers the weight of financial loss- because of a liability claim- from the insured to the insurer
The possibility that a person or business will sustain a loss from a claim made against them stating they are legally responsible for injuries or damages sustained.
When an untrue statement is broadcasted about an individual as a fact rather than an opinion. If the statement can be proven to be broadcasted maliciously, the harmed person can sue for damages- typically classed as Defamation.
A legal entity allowed when forming a business; offers a sophisticated business structure and provides personal liability protection for debts incurred by the company.
A voluntary group of individuals is set up to write insurance policies; everyone is accountable for the amount of policy they write.
A disadvantage or physical damage to a property that causes a loss of use or a loss of income.
A neutral price that could be achieved from a property sale at the time of loss/damage.
A type of homeowners insurance that protects a mobile homes structure and its contents; some policies also included property and liability insurance
Business or person who is labeled as the insured in the policy contract.
Only insures against losses explicitly listed in the policy; if the risk is not listed, there is no coverage.
Often called specified peril policy- only insures against losses specifically defined in the policies contract.
Showing insufficient care needed to safeguard others from harm or damage to themself or others.
An organization that is not permitted or licensed to do business in a particular state.
An area considered a moderate-to-low threat flood zone and did not signify immediate danger. Zones B, C, or X’ are used to describe the type of flood.
An incident that happens at a specific time and place or over a length of time.
Unlike a named peril policy, an open peril policy provides cover to the insured for any loss caused by any peril that is not clearly ruled out by the policy.
Insurance that gives part coverage for demolition costs and increased construction costs that are regulated by law or regulation.
More than two types of insurance cover combined into a single contract; also called a multi-line policy.
The source of personal injury or property damage; the cause of loss. Perils are terms used to name the risks that can cause injury or property damage. Lightening or fire are examples of perils. They are generally named in your policy.
Protects against damages that are not bodily but discriminatory like slander, libel, false arrest, violation of privacy, malicious prosecution, and wrongful entry.
A policy that validates liability cover to the dwelling policy, like the homeowner’s policy, can be purchased as a standalone policy.
Protection for individuals and their families.
Property that is not real estate can be an asset that is movable and not rooted in a fixed location.
Endorsed by the homeowner’s policy; adds relief cost cover for personal properties.
Extra insurance that gives the insured further protection and cover than other policies. Can provide cover for certain lawsuits, property damage, and personal liability scenarios.
The date and length of time when the coverage begins and ends.
Coverage that takes priority when more than one policy or coverage bears on the same loss.
Concerned with how the action that caused the loss to the insured happened and if it resulted from an insured peril.
The fee to repair a damaged or destroyed item that is insured.
The fee to replace a damaged or destroyed item is insured without lowering the price because of depreciation.
Attempting to steal or stealing property from an individual or place with force or a threat to force.
A policy that is customized to cover specific goods for a specific amount.
An additional policy an insured individual can add to their homeowner’s policy; extends the type of coverage to protect against personal property and expensive goods such as jewelry.
See Open peril policy
Refers to land with roughly a 1 percent chance of a flood occurring there in any given year. The two classifications for SFHA areas are 1) “A” zones and 2) “V” zones.
Section of the insurance policy that insures against losses arising from particular events is clearly set out in the policy, such as theft or fires.
Provides the insured- through the insurer- the legal right to file a liability suit against the party at fault which caused a loss to the insured. Insurers are granted the right to request reimbursement for any loss incurred.
The action of unlawfully taking on stealing property includes burglary and robbery.
Extra insurance- available as personal or commercial insurance- gives the insured further protection and cover than other policies. Can provide cover for certain lawsuits, property damage, and personal liability scenarios.
Comprising all components that work interdependently, such as the building and its parts used to structure the build, such as exterior walls, interior walls, plumbing fixtures.
An insurer restricts the property coverage if no people are occupying the premises.
When a property or dwelling is unoccupied by people, insurers will restrict the level of coverage when the property is vacant for an extended period.
An insurance company uses this technique to figure out the most convenient payment for a loss.
An agreed policy is written by the insurer and insured, listing the value of the insured property in advance and is not related to the amount of insured loss.
Appears in several property insurance policies; covers any damage to the insured property caused by malice, misconduct, or destruction.
Voluntarily giving up a known right or claim.
A distinctive agreement is set between the insurer and the insured is written within the insurance policy. Breaching the warranty agreement can void the policy.
Insurance for landlords and tenants is all we do.Get started | <urn:uuid:05091c87-1ef6-4e20-bff8-0abf0c1ab08b> | CC-MAIN-2021-39 | https://www.steadily.com/glossary/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060882.17/warc/CC-MAIN-20210928184203-20210928214203-00219.warc.gz | en | 0.948055 | 2,932 | 2.515625 | 3 |
Edgar Allan Poe is a figure often association with the dark and the macabre. This week is the anniversary of his strange death and subsequent burial.
While his death was noted in several regional newspapers, his funeral was barely attended. His cousin-in-law Reverend Clemm presided over the rainy ceremony, cut short by the weather and lack of mourners.
Essentially penniless, Edgar was buried in an unmarked grave near his grandfather, David Poe, Sr. in the Westminster Hall and Burying Ground in Baltimore. He was placed in a simple coffin under that marker on October 9, 1849.
In 1875, there was renewed public interest in Poe’s gravesite. The Southern poet Paul Hamilton Hayne wrote about the unkempt gravesite and began a push to re-inter Poe with a more fitting monument.
Money was raised through local efforts, including that of a local teacher. There are reports that she had her students recite Poe’s works in public in return for donations to the fund. The money was raised and a large stone with bronze medallion was commissioned.
Next, the committee had to exhume Poe’s remains in order to place them under the new stone (The graveyard staff didn’t realize that many of the stones had been turned to face the gate but the map did not reflect that. Apparently, they first dug up the wrong person). An article in a Baltimore paper at the time writes:
. . . The laborers employed to perform the task, upon digging to a depth of about five feet, discovered the coffin in a state of good preservation, after having lain in its place nearly 26 years. The lid was removed, and the remains curiously examined by the few present. There before their gaze, was extended the skeleton, almost in perfect condition, and lying with the long bony hands reposing one upon the other, as they had been arranged in death. The skull bore marks of greater decay, the teeth from the upper jaw having become dislodged, but those in the lower were all in place, and some little hair was still clinging near the forehead. Beyond what has been described nothing was to be seen. The coffin was inclosed in another, and reinterred.
The rededication on November 17, 1875 was attended by numerous fans, well-wishers and even poet Walt Whitman. A number of famous writers sent letters to be read out at the ceremony.
In a strange twist, William Gill — a Poe biographer who remained influential in securing a new grave for Poe — helped bring Virginia Clemm’s remains to rest with Poe in Baltimore. She had been buried in Fordham and portions of the cemetery were being razed. Gill learned of it and went to the graveyard where he found workers with her remains in a shovel. He gathered the bones into a box, which he took home and stored under his bed until he could have them interred with Poe in Baltimore. He was eventually able to reunite Clemm and Poe when he interred her remains with his in 1885. | <urn:uuid:fa1b4000-9c5e-4abd-ba7d-e0bb1e5b3b92> | CC-MAIN-2019-26 | https://mwgerard.com/31-days-of-halloween-october-9/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000545.97/warc/CC-MAIN-20190626194744-20190626220744-00159.warc.gz | en | 0.990124 | 631 | 3.109375 | 3 |
What can I find in this article?
- What is the color of the August birthstone?
- The History of the August Birthstone
- What is the meaning of peridot?
- The healing properties of the August birthstone
- What is the durability of the August birthstone?
- What is the price of a peridot birthstone?
- Are there any secondary August birthstones?
- Cleaning and Caring for Peridot?
- Final Thoughts
Peridot, the August Birthstone
Peridot (pronounced per-i-doh, -dot), the yellowish green gemstone known to the Egyptians as "the gem of the sun", is the official August birthstone. Formed deep in the earth's magma and erupted to the surface through volcanoes, this August birthstone has also been found in meteorites and comet dust.
The August Birthstone is Peridot, the secondary August birthstones are Sardonyx and Spinel.
Named for the Arabic word faridat, which means "gem", peridot is also known as chrysolite, or olivine – the group of minerals to which peridot belongs. Peridot is long believed to ward off evil, cleanse the mind of negativity and aide friendship.
Peridot is often mistaken for emerald. In fact, peridot has been called "an evening emerald" for the way it fluoresces a brilliant green under artificial light. There are even many historians who believe that Cleopatra's notorious emerald collection was actually peridot.
Peridot gets its unique yellow-green color from the presence of iron in its chemical composition, not from trace amounts of impurities, as with other gemstones. Actually, peridot is one of the few gemstones that only come in one color, though shades may vary from yellowish-green to olive to brownish-green, depending on how much iron is present. Yellowish-green is the most common shade of peridot.
The August birthstone color is green, peridot is never too light and never too dark it has a well saturated color.
We have seen very vibrant and lively colored peridot coming from Myanmar (Burma) in the past few years. The Burmese peridot's are usually quite clean and come in bigger sizes. They are priced higher since the color, clarity and size is uncommon in peridot from other locations. The first and last image in the first row, of the picture seen below are peridot's from Myanmar (Burma).
The first appearance of peridot in historical reference and lore dates back to before recorded time in the Hawaiian creation myths in which peridot was called the "tears of Madame Pele", who is revered as the goddess of volcanoes and fire and the creator of the Hawaiian Islands.
Peridot has been mined from as long ago as the second millennium B.C. when Egyptians first started to uncover "the gem of the sun" from the island of Topazios in the Red Sea, now called St. John's Island, or Zabargad. It has been reported that miners spectacularly unearthed peridot at night, due to the magical way it was said to glow in the dark.
Referred to as chrysolite at the time, peridot is featured on Aaron's breastplate to represent one of the 12 tribes of Israel. Aaron was high priest of the Israelites and brother to Moses; together they led the Israelites out of bondage to liberation. Though it is not well-understood why peridot was chosen as one of the 12 gemstones, it clearly had a profound significance to the Israelites.
Peridot has been worn throughout the ages for its mystical and curative properties;
Peridot was officially recognized in 1912 as the August birthstone by the organization known today as the Jewelers of America.
Only five years before this event, the location of Zabargad – lost for centuries – was rediscovered; mining resumed though production peaked in the 1930s and ended sometime around World War II.
Today, peridot gemstones come from Myanmar, Pakistan, China, Vietnam, Tanzania, Madagascar, Germany, Brazil, Czech Republic, Uruguay, and the United States. The primary source of mined peridot comes from the San Carlos Apache Indian Reservation in Arizona, which has a town named for this famous gemstone situated on a huge basalt flow containing fractured masses of peridot. Approximately 80% to 95% of the world's commercial quality peridot is mined from this location. The Peridot Beach in Hawaii remains one of the most exotic locations where these gemstones are found in abundance.
It has long been thought that peridot can aid friendship as well as purify the mind of negative thoughts, particularly those of envy. Moreover, peridot has been credited with endowing its wearer with delight and good cheer, while attracting lovers and strengthening the eyes.
Peridot was first used as a talisman in the ancient world and it has a longstanding mystical reputation. It was once thought to ward off anxiety, making men more articulate and facilitating successful relationships and marriages.
It was also believed to dissolve enchantments. To exert its full potential, the stone was set in gold. If it was intended to provide protection from evil spirits, it had to be pierced, strung on the hair of a donkey, and worn on the left arm.
The ancient Romans wore peridot rings in battles as it symbolized strength and provided protection against the enemies.
Conversely, the ancient Egyptian priests ground the stone into a powder before mixing it with potent drinks to be used in ceremonies as they believed that drinking this concoction would bring them closer to nature.
In modern times, wearing peridot jewelry can help increase financial solidity and contentment in your life. The stone is widely associated with prosperity, loyalty, love, honesty, faithfulness, and optimism. The notion that it reduces stress and eliminates negative thinking, can help enhance harmony, particularly in marriages and other human relationships. Essentially, experts in gemstone significance suggest that the stone can prevent jealousy and anger in relationships.
Wearing the peridot can help you follow your passion and the true desires of your heart. Many people believe that the stone increases willpower and enhances focus, as it allows one to let go of pessimism and all the negative thoughts of the past.
As a testament to willpower and focus, Napoleon Bonaparte, who nearly conquered the world and was fond of peridot, gave his bride-to-be, Josephine, a peridot jewel as a symbol of his love.
Another interesting significance of peridot is that it is widely connected to fame. Many people born in August turn out to be famous in their community. Popular figures who have peridot as their birthstone include Roger Federer, Cameron Diaz, Halle Berry, Tom Brady, and Usain Bolt. If you too have an August birthday and want to climb the social ladder, or become a famous figure in your community, do not hesitate to wear your August birthstone, peridot.
Wearing your August birthstone has a deeper meaning than just improving your looks and boosting your mood. Peridot is renowned for its healing properties for the heart, eyes, stomach, spleen, breast, liver, lungs and sinuses, among other body organs. As a medical remedy, it was powdered to cure asthma. Additionally, holding a peridot under the tongue was supposed to lessen the thirst of a person suffering from fever.
Furthermore, peridot can also help improve mental health and boost spiritual wellness. It is associated with the heart chakra, also green, and wearing it close to the heart is said to cleanse it of negative emotions, leaving the wearer feeling light, blissful and ready to love.
Peridot is regarded as a powerful detoxifying agent. The stone is also thought to improve blood circulation, enhance metabolism, strengthen the immune system and boost digestion. Moreover, it has the ability to eliminate stress and dispel apathy and exhaustion.
Interestingly, people who wear peridot as their birthstone rarely develop illnesses or suffer from depression. Sometimes referred to as "the vitamin D of healing crystals", peridot can also help slow down the aging process, giving you a young and refreshing look. However, in the unlikely event that you fall ill, wearing this stone can aid in the treatment of your condition.
Believe it or not, Peridot is capable of treating heart disorders and other ailments that affect the spleen, gallbladder, gastrointestinal tract, lungs, and thymus. All you have to do is wear the gemstone near the affected area. For instance, if you were experiencing chest problems, you could wear a long necklace, allowing the Peridot gemstone to touch the skin near your chest. This will allow the stone to absorb the negative energy that is causing pain around your chest.
The best part is that Peridot does not discriminate. Anyone can wear this gemstone for both healing and beauty purposes, regardless of whether it is your birthstone or not.
However, many people believe that the stone retains the negative energy after healing your body. For this reason, it is imperative to cleanse your August birthstone regularly by washing it under lukewarm water.
Peridot is considered to have a very good wearability suitable for all types of jewelry, though care should always be taken with gemstone jewelry.
Peridot's hardness (resistance to scratching) ranges from 6.5 to 7 on the Mohs hardness scale.
Peridot's toughness (resistance to breaking and chipping) ranges from fair to good. This puts peridot in the field of durability only slightly below quartz, considered the low-end benchmark for highly durable gemstones.
In other words, peridot can safely be worn every day in jewelry pieces that are susceptible to heavy use, such as rings and bracelets, though the wearer should exercise a bit more caution than with a topaz or ruby. Of course, in pendants, necklaces and earrings, peridot does not require as much care and can be worn every day without worry.
This question is best answered after you have given careful consideration to the way in which you want to use the gemstone; primarily, the jewelry design and your budget will dictate the size and cut of the peridot.
Peridot is a relatively inexpensive gemstone in small sizes, but the value goes up with stones weighing over 5 carats; 10-15 carat stones are very rare and expensive. Peridot ranges in price from about $10 per carat for well-cut stones around 0.21 carats and sized 5 x 3mm, up to as much as $150 per carat for fine gems of top color around 4.5 carats and sized 10.5 x 9.5mm.
Of course these are commercially available peridots; rare gemstones always fetch higher prices that can go into the thousands per carat. In general, the Peridot prices are relatively low; if you are on a budget, consider greenish yellow Peridots with sizes under 5 carats.
August actually has three different gemstones: peridot (the primary and officially recognized birthstone), sardonyx and spinel.
Sardonyx as a secondary August birthstone
Sardonyx is a brownish-red variant of onyx that gets its red bands from the mineral sard; hence, the name sardonyx. It has a history that can be traced even farther back than peridot, again to Egypt, where this gemstone was associated with courage, happiness, clear communication, and, like peridot, stability in marriage and other relationships.
While sardonyx was most commonly used in Ancient Rome to create cameos of Venus, worn on necklaces by women expecting to harness the power of the goddess of love, or of Mars by men hoping to gain protection in battle from the god of war, it was also set in signet rings and used for seals.
Sardonyx has the same Mohs hardness as peridot (6.5 – 7) and is cleaned and cared for in the same way. However, unlike peridot, which is not treated in any way, sardonyx's color is often manipulated with dyes; therefore, sardonyx treated in this way should not be soaked in water.
Spinel as a secondary August birthstone
Spinel takes its name from the Latin word spina, meaning "thorn", due to its pointed, thorn-like crystal form. It occurs in a range of colors, such as rose pink to rich red; lavender to deep violet; light to deep blue, orange, yellow, brown and black.
Spinel is considered to be a soothing stone because of its calming energy. Therefore, it is recommended for those who are suffering from stress. It is also thought to encourage renewal and healing. Different healing properties are attributed to spinel depending on its color. Red spinel is thought to enhance vitality. Both green and pink spinel are said to encourage love and compassion. Violet spinel is associated with spiritual development and yellow is linked to the intellect.
Just like peridot is often mistaken for emerald, spinel is regularly confused with ruby, a misconception that dates back to the mid-14th century and the tale of the Black Prince Ruby. This fabled gemstone is perhaps the most famous of all the British crown jewels for it was given to "The Black Prince", Edward of Woodstock, son of Edward III of England, as a debt paid for military support in a civil war on the Iberian Peninsula. The Black Prince brought the gemstone, which is neither black nor a ruby, back to England where it was worn on helmets by Henry V and Richard III during battle, passed around for a few hundred years as symbols of the king's power, and finally set in the Imperial State Crown at the coronation of Queen Victoria in 1838.
Spinel sits at 8 on the Mohs hardness scale – only rubies, sapphires and diamonds are harder. It is also very resistant to mechanic shock - chipping or breaking. These qualities – high hardness and good toughness – give spinel an excellent durability rating, meaning that this gemstone is suitable for everyday purposes in all types of jewelry. Some people are so confident in the wearability of spinel that they recommend it for engagement ring settings!
The August birthstone is relatively easy to care for and does not require any special cleaning agents beyond a mild soap, such as dishwashing detergent. After soaking the peridot in a bowl with a solution of warm water and half a teaspoon of detergent, gently scour the gemstone with a soft toothbrush. Rinse the peridot in warm, clean water and dry with a soft cloth. Allowing the gemstone to air dry will leave it covered with spots.
Peridots should not be cleaned in ultrasonic or steam cleaners and you should avoid high temperatures, as well as rapid changes in temperature, as these conditions can cause discoloration.
Peridot has a Mohs hardness of 6.5 to 7; so, you should remove your peridot rings and bracelets before doing housework or digging around in the garden. Household cleaners commonly contain hydrochloric or sulfuric acid, both of which can cause peridot to lose its shine. Furthermore, if you wear peridot daily, you should apply makeup and perfumes before wearing your peridot jewelry because the chemicals in those products can compromise the color of the gemstone.
Whether you use a dedicated jewelry box or a simple plastic organizer box, it is recommended that you keep your peridot jewelry separated from other gemstones with jewelry bags or foam-filled jars to avoid scratches from harder gemstones, such as topaz or emerald. Another useful method is to store your peridot jewelry in acid-free paper envelopes arranged in a parcel paper organizer.
People born in August are among the luckiest lot thanks to the fact that they get to enjoy three different birthstones on the same month; gemstones which are not only unique, but also exceptionally exquisite.
Besides, they possess mystical powers that can guarantee your health and wellbeing as long as you keep wearing them along with your other meaningful jewelry. The best part is that anyone can wear August birthstones regardless of their birth month.
So, if you are searching for a powerful and exotic piece of jewelry that can bring happiness and stability to your life, look no further than the August birthstones- peridot, sardonyx and spinel. To find the purest August birthstones please see our stock of peridot and spinel right here.
- First Published: July-17-2019
- Last Updated: November-22-2019
- © 2005-2020 GemSelect.com all rights reserved.
Reproduction (text or graphics) without the express written consent of GemSelect.com (SETT Company Ltd.) is strictly prohibited.
Total Number of Articles: 1360
Technical Information on Gemstones
Learn about technical details and facts surrounding the... | <urn:uuid:8220298e-14be-4840-ad36-8f860cea01bc> | CC-MAIN-2020-40 | https://gemselect.com/other-info/august-birthstone.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244231.61/warc/CC-MAIN-20200926134026-20200926164026-00183.warc.gz | en | 0.960069 | 3,607 | 2.640625 | 3 |
Chinese human rights activist and former political prisoner Harry Wu has died at the age of 79.
The Laogai Research Foundation that Wu founded said he died on April 26 while vacationing in Honduras with friends.
Wu spoke out for decades against China’s brutal forced labor camps, known as laogai, that were established under Chairman Mao Zedong.
Wu himself was sentenced to life in prison in 1960 after he spoke out against the Soviet Union, an ally of China.
He was released in 1979 after 19 years of forced labor mining coal, building roads, and working in agricultural fields.
He was beaten, tortured, and nearly starved to death and he witnessed the deaths of many other prisoners in China from brutality, starvation, and suicide.
In 1985, Wu traveled to the United States and began work to raise awareness about China’s forced labor camps.
He founded the Laogai Research Foundation in Washington in 1992. | <urn:uuid:deed5a56-f358-433b-ae50-fa3b7522d970> | CC-MAIN-2020-34 | https://www.rferl.org/a/china-activist-harry-wu-dies-/27700908.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738982.70/warc/CC-MAIN-20200813103121-20200813133121-00428.warc.gz | en | 0.982803 | 194 | 2.640625 | 3 |
People learn more about their finances through making decisions rather than through pure financial education, research from AUT University shows.
Bart Frijn, director of the Auckland Centre for Financial Research at the university, said a survey of undergraduate students found they became financially literate through experiences such as having a student loan or signing up to KiwiSaver.
"At the point where we have to make a decision, because we are faced with it, it creates a learning moment."
Frijn said the result was surprising as it was typically assumed that people made better financial decisions after they had been taught about financial literacy.
He said the findings meant young people needed to have greater exposure to financial decision making.
"When you try to educate people do it at the moment where they have to make a decision."
Once people had signed up that learning moment passed, he said.
Frijn said the study had implications for those that were automatically enrolled into KiwiSaver and did not have to make a decision on which scheme they went into or which fund.
"You are not really asking them to make a decision - it doesn't create a learning moment."
The study is one of a number being undertaken by the university.
The centre is also hosting a capital markets symposium on May 31 where it will bring together academics and capital market players to talk about research being undertaken and what more could be done in the future. | <urn:uuid:e13caafc-ecd4-41b5-bde2-3e6b12b52165> | CC-MAIN-2014-10 | http://www.nzherald.co.nz/kiwisaver/news/article.cfm?c_id=1501206&objectid=10872237 | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999651529/warc/CC-MAIN-20140305060731-00060-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.986566 | 291 | 2.515625 | 3 |
Tuesday, March 26, 2013
NEW! Fact and Opinion Journal Jot on Teachers Pay Teachers! We are just finishing our ELA Unit 5: American Contributions activities which are part of the Common Core Standards. Our students studied Famous Americans such as: George Washington, Abraham Lincoln, The Wright Brothers, Amelia Earhart, Neil Armstrong, and Sally Ride to name a few. With this Journal Jot, the students participate in activities where they must write facts about these people. Moreover, students must also state their opinions on given topics, supply reasons to support their opinions, and add closure to end their opinion writing. Here are some pictures of activities on display! Students had to choose a Famous American and complete a quilt square for "Our Famous American Quilt." We lined the wall with a "Future Presidents" display! What fun! Look at some of the writing taking place! Here is an example of an opinion booklet with the topic, "Would you rather live in a log cabin or live in a mansion? First Grade is so much fun! ~Teacher Tava
Saturday, March 23, 2013
Ever need some assistance in deciding what to do for a date night? Well, this is such a cute and easy idea! The Date Night Jar! I went to Hobby Lobby and purchased a glass jar, adhesive "R" letter, paints, foam brush, and wooden sticks. I chose to color the sticks to match the color scheme in our bedroom: blue, green, brown, and orange. I painted nine sticks of each color. I added a metal scrapbooking embellishment ring, "love," and decorative ribbons. I wrote ideas for different types of date nights on the sticks: Brown: Vacation ideas that need time for planning; I thought it might be fun to draw one of these brown sticks out on New Year's Day and plan this main vacation for the year. Orange: Some expense required for date Green: Minimal expense needed for date Blue: No money required for date This would be a fun gift for a new bride or Mom-to-be, too! The best part is that you and your significant other can write the dates that interest you! Date night will never be a dilemma again! What are some of your favorite date night places to go/ things to do?
Sunday, March 17, 2013
My mom was born on this special day, and she is by far the luckiest person I know! We took her out for an afternoon movie to see "The Great and Powerful Oz." We ordered food in, had cake, and shamrock shakes! She said "60" isn't so bad after all. Here are pictures of the place settings/ table decor-all for Mom which I bought for her! This dish set is so cute and looks great with gold and green linens. I found gold napkin rings, which I wrapped with ribbons, bottle cap scrapbook embellishments, and St. Patrick's Day stickers. Of course the Birthday Girl gets a special place setting, with dinner gift box to open. Then onto the cake. I am not an expert at cakes, but am slowly teaching myself. I used two boxes of white cake and 1 box of yellow cake to make 6 cakes, each layer colored. Baked the cakes, stacked them in rainbow order (I combined the Indigo and purple to only have 6 layers-easier for me :) I dirty-iced the layers with homeade buttercream frosting. Next, I covered the cake in green fondant. I then used the leftover fondant pieces to cut out shamrock shapes, and used the remainder of the buttercream frosting to add other details to the cake. It was very delicious! Of course, the inside when cut is the real surprise! How pretty! Hope you had an enjoyable St. Patrick's Day 2013, too!
Saturday, March 9, 2013
There are so many options for decorating and designing with glass. Here are a few ideas that I have tried out. Table Centerpiece: Glass decorative pieces with dome-shaped tops are always fun to find. Here are some different ways that I like to use them. Winter centerpieces: I added some fake fluffy white snow and cute little light-up snowmen. How simple! These look great turned on or off. These were a big hit at my parent's 40th Wedding Anniversary party. I enjoy changing these out for the different holidays. Easter is just around the corner, so I have already started setting the table. I added some Easter grass and decorative eggs inside the glass centerpieces. I attended a scrapbooking event a couple of weekends ago and won two glass dome toppers. These are so cute for displaying some mini albums in a craft room or around the house! Glass Block: Firefighter "Hero" Theme-I used mod podge to adhere some scrapbook paper to the back of the glass block. Glass adhesive was used to attach the decorative metal pieces onto the front of the block. Top it off with some ribbon and it is complete! The glass block decor looks great with the lights plugged in or unplugged. I also made one for my brother. The adhesive outline of the state looks neat on the front of the block. Jewelry: These lil glass jewelry pieces make great gifts! Add embellishments like mini jewels with special glass adhesive. What fun! I would love to see some of your creations! Leave a comment and direct me to your blog. Let's keep the sharing going! :) | <urn:uuid:1b2ff629-a8ed-4d22-a0ff-729ed540df0b> | CC-MAIN-2017-22 | http://tinytreasuresbyt.blogspot.com/2013/03/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00050.warc.gz | en | 0.956104 | 1,120 | 2.625 | 3 |
Jun 10, 2020
Oct 02, 2017 What is a Proxy Server and How Does it Work? Jun 10, 2020 What is a Proxy Server? - Computer Hope Oct 07, 2019 Proxy Server - What They Are & How to Use A proxy server is a computer on the web that redirects your web browsing activity. Here's what that means. Normally, when you type in a website name (Amazon.com or any other), your Internet Service Provider (ISP) makes the request for you and connects you with the destination—and reveals your real IP address, as mentioned before.
Proxy Definition in Computers | Your Business
Best proxies of 2020: Free, paid and business proxy FilterBypass is a web proxy service with extra security features available at the click of a mouse, including URL encryption, page encryption, and the ability to disable scripts and cookies 3 Ways to Use a Proxy - wikiHow
Apr 28, 2020
How to Configure a Proxy Server on a Mac When you configure a proxy server on your Mac, applications will send their network traffic through the proxy server before going to their destination. This may be required by your employer to bypass a firewall, or you may want to use a proxy to bypass geoblocking … | <urn:uuid:92ee2910-7a9a-4ce0-a759-828c41c44c82> | CC-MAIN-2022-27 | https://megavpnydtkxj.netlify.app/clouatre10862fof/what-is-proxy-in-computer-puza.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00207.warc.gz | en | 0.916102 | 251 | 2.8125 | 3 |
At the Midwest Alliance for Mindfulness we’ve offered in the past a discussion and practice group called Inner Revolutionaries in which we explored the radical edges of mindfulness. By radical, we mean two things – total or complete and outside the confines of mainstream US views. This opportunity for experimentation and group exploration can help us break through rigid ways of thinking and open ourselves to new possibilities.
Radical compassion means total compassion – nothing is excluded. According to philosopher Khen Lampert, it’s a specific type of compassion which includes the inner imperative to change reality in order to alleviate the pain of others. This state of mind, according to Lampert’s theory, is universal, and stands at the root of the historical cry for social change. It involves a sense of social responsibility and a desire for the common good (Traditions of Compassion: From Religious Duty to Social Activism, 2005). Insight meditation teacher, Tara Brach, calls radical compassion an embodied experience – “a felt sense of tenderness, that is inclusive of all beings, and naturally moves us to act from a caring heart”.
Research is telling us that the seeds of compassion are inborn and that we can learn to cultivate this beneficial quality. But, any natural instinct can be oppressed by cultural norms and social pressures. Mainstream US culture overvalues a number of qualities and behaviors, such as competition, rugged individualism, bootstrap mentality and put-down humor, that can limit our interest in cultivating compassion. In addition, the very same technology that brings us wondrous innovations can also serve to disconnect us. So, it’s important that we are intentional about exercising our innate capacities for caring and kindness and pursuing authentic human encounters that trigger our natural empathy.
Compassion is Good for Us All
Although we may get temporary relief from our own distress by hating those we blame for it, this mind state takes a toll on us. The immediate gratification we sometimes experience from anger can make it self-perpetuating. But this state of mind requires an amazing amount of mental space and energy and, over the long term, it can have harmful effects on our health. Research shows compassion provides a buffer against stress and increases our sense of connection with others. This creates a beneficial cycle that, over time, can:
- improve social relationships
- increase longevity
- enhance positive emotions and levels of reported happiness
- decrease mental illness
- reduce inflammation in the body
Out of control or chronic anger is not only harmful to the individual, it causes problems for the greater society, even becoming a threat to public health. It’s much easier for us to mistreat those we judge as fundamentally bad. Research tells us that punitiveness isn’t nearly as effective for behavior change as reinforcement and people generally live up or sink down to the expectations we set for them. Finally, hatred results in counter-hatred and a harmful escalating cycle emerges. In my blog post, Is Anyone Beyond Compassion? I list a number of very interesting situations in which a compassionate approach has been the most effective response to some of society’s deepest problems.
While it is easy to love the lovable, it may be the unlovable who need our love more. – Thich Nhat Hanh
It’s not always easy to love. There may be a secret fear that having compassion for people who do evil deeds will make us seem guilty by association – that we will be seen as somehow complicit. Also, the people we help can bring up unresolved issues or push our buttons, which can lead us to feel resentful or overwhelmed. If we have a mistaken view of compassion as permissiveness, we might feel fearful of allowing ourselves to have kind feelings for people we perceive as dangerous or threatening.
Wise compassion can be firm and fierce, but never angry. It takes great courage and determination to set and maintain a boundary or to sit unwavering in the burning heat of another’s disapproval. Setting a limit does not mean closing your heart. It means seeing the bigger picture and allowing your intention to help outweigh your desire to be comfortable. In this way love can be a powerful force for transformation.
“…the natural love of the heart has to be balanced with the wisdom of equanimity. If we focus only on feelings of love and compassion without the balance of equanimity and peace, we can get overly attached to the way we want things to be.” – Jack Kornfield
How Can We Cultivate Radical Compassion in Our Lives?
Be Mindful – Consider pausing before reacting to perceived threats or strong feelings, taking a moment to examine your own thoughts, emotions, body sensations and urges to action. This will create space for wiser responding.
Practice Supportive Attitudes & Mental States – In his book The Five Invitations, Frank Ostaseski describes three other qualities that support compassion. Lovingkindness, the foundation for compassion, is the goodwill and friendliness we feel toward others. Appreciative joy, which like compassion is an expression of lovingkindness, happens when we wish for others’ joy or good fortune to continue. Finally, equanimity is the balance and stability that protects the other three qualities, allowing them to be universal, skillful and sustainable. In addition to these sublime mind states, we can also cultivate patience, which might be characterized as the ability to abide with our own suffering.
Connect with your Personal Blocks to Compassion – When unexamined, our own suffering can become a barrier to loving fully. Can you dare to explore your own vulnerability, fears, and uncertainties with self-compassion? Be like the poet Rumi who said, “Seek and find all the barriers we’ve made against love and then love them.”
Cultivate Humility – Having compassion for someone who might seem hard to love takes humility. A modest estimation of one’s own importance in the grand scheme of things is a great equalizer – we realize that nobody is any less or more deserving of happiness than we are. We can see actions, but we can’t see motivations and we don’t have all the information – we aren’t all knowing. When we acknowledge the limits of our control and understanding, we realize that we can’t fully know the heart of another.
Get In Touch With Our Interdependence – Find opportunities to connect with our common humanity and the ways in which we depend on others in daily life. Notice how the misfortune of others, societal unrest and dissatisfaction, ripple out and impact us all. See if its possible to respect the disrespectful and love the unloving without endangering your own personal integrity. Investigate the ways in which increased personal happiness and decreased personal suffering makes the world a better place for everyone.
Connect with Others Directly – Our actions have an effect even when they are committed with anonymity or in secret. The Gyges Effect, based on Plato’s Ring of Gyges, is a phenomenon in which the impersonal nature of the Internet can foster disinhibition in our social interactions. Meeting in person whenever possible helps us be more mindful of the humanity, complexity and three dimensionality of the people we interact with and triggers our natural capacity for compassion.
See the Good in Everyone: Do you believe there is a glimmer of goodness that resides in everyone – even yourself? If so, it can be helpful to remember this when you encounter behavior that makes someone hard to love. Remind yourself that this person too was once in innocent baby and that, underneath it all, they also desire happiness and to be free from suffering (though they may not be pursuing this common goal wisely).
If you are not to become a monster,
you must care what they think.
If you care what they think,
how will you not hate them,
and so become a monster
of the opposite kind? From where then
is love to come—love for your enemy
that is the way of liberty?
From forgiveness. Forgiven, they go
free of you, and you of them;
they are to you as sunlight
on a green branch. You must not
think of them again, except
as monsters like yourself,
pitiable because unforgiving.
– Wendell Berry, Enemies | <urn:uuid:ac055b22-8985-4e3d-8609-68ca7bf64791> | CC-MAIN-2020-45 | https://mindfulness-alliance.org/2019/09/13/radical-compassion/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107912807.78/warc/CC-MAIN-20201031032847-20201031062847-00557.warc.gz | en | 0.930012 | 1,710 | 2.828125 | 3 |
In the early 1980's Bob Bate analyzed the trends of the semiconductor industry and concluded that new device concepts based upon quantum effects would be required to keep the exponential growth trends going into the 21st century. At about this time, Gerry Sollner and co-workers at MIT-Lincoln Lab reported the first quantum-well resonant-tunneling diode (RTD) with respectable performance. The RTD was quickly adopted at TI and elsewhere as the prototypical quantum semiconductor device.
I joined the Nanoelectronics program in mid 1984, and began to address the problem of theoretically modeling devices such as the RTD. The objective was to produce a thorough numerical simulation tool, which would address both the steady-state and transient behavior of the device. This excluded most of the traditional techniques of theoretical physics for dealing with tunneling systems.
The first problem was to define an appropriate representation for the state of the device. This had to represent the ensemble of electrons in the device, and accomodate both the notions of quantum coherence and incorherent superposition. The obvious object to do this was the (von Neumann) density matrix, and based upon experience in device simulation, it was obvious that it should be represented on a real-space basis.
The fundamental approach was to start with an equilibrium density matrix obtained by integrating the Bloch equation with respect to inverse temperature. Then a bias would be applied to the device, and the Liouville-von Neumann equation would be integrated to obtain the transient response. There were two things which had to be added to the ordinary quantum theory to simulate an electron device. One was some notion of dissipation, or random scattering. I found several idealized and/or ad hoc models of such processes. The other problem was that of Ohmic contact boundary conditions. One does not have a device simulation if there is no current flow into and out of the device. An apparently elegant solution was to set the gradient along the diagonal direction of the density matrix equal to zero at the boundaries. This essentially matched up the domain to a spatially uniform semi-infinite reservoir region.
After a number of problems with the mathematical implementation of these schemes, I started a full-up simulation run in late October 1985. The calculations were performed on a VAX-750 system, and consequently took several days of CPU time over a period of more than a week. The results are shown below. (I appologize for the quality. These are scans of some old and faded HP plotter outputs.) The plot is an isometric projection of the lower triangle of the density matrix. The plot on the "horizon" represents the elecron density distribution.
This is the initial, equilibrium state of the device.
The voltage bias has been applied, and the time evolution algorithm run for a few hundred femtoseconds, and the small peak of electron density building up in the quantum well indicates that tunneling is occuring. A very encouraging result.
After something more than a picosecond of simulated elapsed time, things are begining to look a bit more problematic. The density should not have built up so high, as the electric fields ought to be draining electrons from the quantum well.
After a rather long simulated time, there is definitely a problem here. The unstable growth of the quantum well charge density is clearly unphysical.
After a good deal of casting about, I tracked down the source of the trouble. It was the effect of the Ohmic contact (or open system) boundary conditions on the eigenvalue spectrum of the Liouville-von Neumann superoperator. I had not been too concerned with superoperator algebra before, but what I was implementing in code turned out to be a non-Hermitian superoperator. Here's the story:
If you set up the Liouville operator for a closed system with no dissipation, its eigenvalue spectrum looks like (a) below, the eigenvalues are all purely real. If we add a dissipation superoperator the the Liouville operator, as one expects, the eigenvalues now acquire a negative imaginary part, which turns into a decaying exponential when inserted into the Liouville equation. There is one zero eigenvalue, which represents the equilibrium state of the system.
Now, however, if we modify the boundary conditions to open the system, we break the Hermiticity of the Liouville operator. But the boundary conditions that do so are time-reversible, so we introduce imaginary parts to the eigenvalues, but they occur in conjugate pairs, so there is a growing exponential solution for every decaying exponential [(a) below]. If we add in dissipation, the growing solutions are somewhat damped, but not completely (b). This explains what happened in the RTD simulations. Increasing the dissipation rate can result in a stable solution, but in doing so, one essentially kills all of the coherent effects (c).
I finally realized that the problem is that one can't apply open-system boundary conditions which are also time-reversible. Or, to put it another way, if you open the system, you have to do so in a way that breaks the time-reversal symmetry. This can be done if we transform the density matrix into the Wigner distribution function, and apply different boundary conditions to inflowing and outflowing particles. Such a formulation solves the stability problem, as illustrated by the eigenvalue distribution below.
I also demonstrated a realistic calculation of the (intrinsic) transient response of the RTD:
And, finally, small-signal ac response calculations to linear and nonlinear orders: | <urn:uuid:0a955692-5471-4632-89bd-88b0aaf4a363> | CC-MAIN-2013-20 | http://www.utdallas.edu/~frensley/hlts/rtdtrans.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698150793/warc/CC-MAIN-20130516095550-00095-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947497 | 1,168 | 2.6875 | 3 |
Dog Aggression In The Pit Bull (by a member with two pits on another board)
The author owns two pit bulls and works in a veterinary clinic
Dog aggression in the pit bull is something very misunderstood by people unfamiliar with typically dog-aggressive breeds. Dog aggression is not, per se, a bad thing. It does not in any way make the dog a bad dog. It is simply a part of the temperament, and an aspect of the breed which needs to be recognized for what it is and managed in a responsible manner.
Pit bulls-- and here I lump together both the American Pit Bull Terrier (UKC) and the American Staffordshire Terrier (AKC) because they are, in my eyes, the same breed-- were developed originally for bull and bear baiting. When this "sport" was outlawed, they were moved into the dog fighting pit. They were bred for generations, and, unfortunately still are, to be aggressive toward other dogs, and to be strong enough, determined enough, and to have the stamina to fight to the death, either their death or that of the other dog. All of these characteristics are often lumped together under the term "game" (ie the "game-bred pit bull"). Because of their history in the pit, they were selectively bred for these characteristics. This is no different than how other working and sporting breeds were developed- dogs who excelled in their jobs were allowed to reproduce. This is how pit bulls became the breed that we have today.
Dog aggression has a full spectrum, like any other characteristic. There are pit bulls who get along with every other dog they see and can go their entire lives never showing aggression. There are pit bulls who are off-the-wall aggressive toward every other dog they see and cannot safely be allowed around other dogs. The vast majority fall somewhere in the middle, however most pit bulls do have some propensity for inter-dog aggression. They may not actively aggress, however if challenged, they will also not back down. Because of their body type, drive, and determination, most pit bulls if challenged by another breed, will win a fight.
It is not possible to socialize dog-aggression out of the pit bull. A pit bull can be very well socialized as a pup and still reach sexual maturity and become aggressive toward other dogs. This is often referred to as "turning on". Pit bulls do not fight other dogs because they are insecure around them or fearful of them. They fight other dogs because it is instinct. It is what they were bred to do. It is the same as a Border Collie's instinct to herd or a Labrador Retriever's instinct to retrieve. We do not expect to be able to socialize out those characteristics from those breeds, do we? It is no different with dog-aggression in the pit bull.
This is not to say that socialization of pups is not necessary, or that dog-dog aggression cannot be controlled, or that pit bulls should never be allowed to be around other dogs. Socialization as a pup is just as important, perhaps even moreso, as with any other breed. Pit bulls need to learn to behave appropriately with other dogs just as much as the rest of the dog population. However, it is dangerous to fall into the trap of thinking that because the pit bull interacts well with other dogs as a pup, it will always do so. Obedience training is also important. There is no reason a pit bull should not be able to control itself on leash around other dogs. That is a training matter. No matter how badly a dog wants to do something, it can be trained not to in a controlled environment. But training is not going to take away the instinct or the desire to fight.
What does this mean? It means never trust your pit bull not to fight. It means never leave a pit bull alone with another dog. It means that allowing a pit bull to run in an uncontrolled environment with other unfamiliar dogs is irresponsible and an accident waiting to happen. What does this not mean? It does not mean that a pit bull should ever show aggression toward humans. Human aggression and dog aggression are absolutely different things (do we look at a hound who would happily kill a small fuzzy in the backyard and fear for our children? Of course not. Dogs know the difference between dogs and humans. It is humans who seem to have the problem with that). It does not mean that most pit bulls need to be socially isolated- many pit bulls enjoy playing with familiar dogs in controlled environments.
Another caveat to this issue is the increasing trend toward breed specific legislation (or BSL). Pit bulls are being banned from cities, states, and even entire countries all over this world. They are the center of a media frenzy right now, fed by the "if it bleeds it leads" mindset. If a pit bull is involved in an incident, you can be sure it will make the news. If it's a Lab involved, chances are it will either be called a pit bull or never make the news at all. People don't want to hear about "good old-fashioned family dogs" who get into trouble, but those pit bulls, they're downright dangerous. If a pit bull gets in trouble in a dog park, whether the pit bull started it or not (and in some cases, the pit bull wasn't even involved!), they will be on the news, and in some cases, this is enough to spark the start of legislation to ban them outright.
The key to all of this is responsible ownership. Pit bulls are a lot of dog to handle, and they are not the breed for everyone. But they do not need to be- that's why there are over a hundred breeds for people to chose from! Pit bulls need to be closely supervised and watched around other dogs. Owners need to know their dogs, and be aware of subtle signs of aggression that could lead to a problem. These dogs need training and consistant leadership. They are wonderful dogs in their own right, but they are what they are, and as owners we need to accept that dog-aggression is part of what makes them pit bulls.
BSL - Bull Sh!t Law
Why do you weep?
What are these tears upon your face?
Soon you will see, all of your fears will pass away.
And you'll be here, in my arms. | <urn:uuid:83f03c25-605b-4dff-888f-0d2f60766f2e> | CC-MAIN-2015-35 | http://www.chazhound.com/forums/showthread.php?t=7500 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065330.34/warc/CC-MAIN-20150827025425-00046-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.977277 | 1,310 | 2.53125 | 3 |
|University of California, Berkeley|
|Directory News Site Map Home|
|Jepson eFlora: Taxon page
Key to families | Table of families and genera
Indexes to all accepted names and synonyms:
| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
[(Perennial herb), shrub] or tree; wood hard, often aromatic. Leaf: generally alternate, often clustered near stem tips, generally odd-2-pinnate, bases generally swollen; stipules 0. Inflorescence: panicle [raceme or umbel]. Flower: generally bisexual, radial; sepals generally 3–5, fused at base or not; petals generally 3–5, free [or ± fused at base or to filament tube]; stamens generally 8–12, filaments generally fused; disk generally between stamens and ovary; ovary superior, chambers generally 2–5, placentas axile, style generally 1, stigma generally head-like, lobed. Fruit: generally drupe. Seed: many, often winged or with an aril.
± 50 genera, ± 550 species: tropics, subtropics (some temperate). Timber, including mahogany (Swietenia). [Muellner et al. 2006 Molec Phylogen Evol 40:236–250] —Scientific Editor: Thomas J. Rosatti.
Unabridged references: [Pennington & Styles 1975 Blumea 22:419–540; Muellner et al. 2003 Amer J Bot 90:471–480]
Leaf: deciduous, petioled. Inflorescence: panicle; flowers many. Flower: white or purple; sepals generally 5; petals generally 5; filament tube 10–12-lobed at tip (lobes sometimes further divided), anthers 10–12; pistil surrounded by, ± = filament tube, ovary chambers 5–8, style ± as wide as ovary, stigma.
± 10 species: tropical Asia, Australia. (Greek: ash tree, from leaf shape)
Unabridged references: [Miller 1990 J Arnold Arbor 71:453–486]
Previous taxon: Meliaceae
Next taxon: Melia azedarach
Citation for the whole project: Jepson Flora Project (eds.) 2013. Jepson eFlora, http://ucjeps.berkeley.edu/IJM.html, accessed on Jul 24 2014
Citation for this treatment: [Author of taxon treatment] 2013. Melia, in Jepson Flora Project (eds.) Jepson eFlora, http://ucjeps.berkeley.edu/cgi-bin/get_IJM.pl?tid=9668, accessed on Jul 24 2014
Copyright © 2014 Regents of the University of California
We encourage links to these pages, but the content may not be downloaded for reposting, repackaging, redistributing, or sale in any form, without written permission from The Jepson Herbarium.
| Markers link to CCH specimen records. If the markers are obscured, reload the page [or change window size and reload]. Yellow markers indicate records that may provide evidence for eFlora range revision or may have georeferencing or identification issues.
READ ABOUT YELLOW FLAGS
|View elevation by latitude chart|| Data provided by the participants of the Consortium of California Herbaria.
View all CCH records | <urn:uuid:9011ef96-7a24-41cd-ac40-4d5ffdf097ea> | CC-MAIN-2014-23 | http://ucjeps.berkeley.edu/cgi-bin/get_IJM.pl?tid=9668 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997888216.78/warc/CC-MAIN-20140722025808-00202-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.782422 | 792 | 2.53125 | 3 |
Nanga Parbat (also known as Nanga parbat Peak or Diamar) is the ninth highest mountain on Earth and the second highest in Pakistan.Nanga Parbat is the western anchor of the Himalayas, and is the westernmost eight-thousander. It lies just south of the Indus River, in the Diamar District of the Northern Areas of Pakistan.
Nanga Parbat means "Naked Mountain". Nanga Parbat was one of the deadliest of the eight-thousanders in the first half of the twentieth century; since that time it has been less so, though still an extremely serious climb. It is also an immense, dramatic peak, with great local relief.Nanga Parbat has tremendous vertical relief over local terrain in all directions. To the south, Nanga Parbat boasts what is often referred to as the highest mountain face in the world: the Rupal Face rises an incredible 4600 m (15,000 feet) above its base. To the north, the complex, somewhat more gently sloped Rakhiot Flank rises 7000 m (22,966 feet) from the Indus River valley to the summit in just 27 km, one of the 10 greatest elevation gains in so short a distance on Earth.The core of Nanga Parbat is a long ridge trending southwest-northeast. The southwestern portion of this main ridge is known as the Mazeno Ridge, and has a number of subsidiary peaks. In the other direction, the main ridge starts as the East Ridge before turning northeast at Rakhiot Peak (7070m). The south/southeast side of the mountain is dominated by the Rupal Face, noted above. The north/northwest side of the mountain, leading to the Indus, is more complex. It is split into the Diamar (west) face and the Rakhiot (north) face by a long ridge. There are a number of subsidiary summits, including the North Peak (7816m) some 3km north of the main summit.
Attractions: Climbing attempts started very early on Nanga Parbat. In 1895 Albert F. Mummery led an expedition to the peak, and reached almost 7000 m on the Diamar (West) Face, but Mummery and two Gurkha companions later died reconnoitering the Raikot Face.
Six German expeditions attempted the peak in the 1930s, but none succeeded, and dozens of climbers died in storms and avalanches. However, an altitude of about 7700 m was reached on the East Ridge, attained via the Rakhiot Face.
Nanga Parbat was first climbed on July 3, 1953 by Austrian climber Hermann Buhl, a member of a German-Austrian team. By the time of this expedition, 31 people had already died trying to make the first ascent. The final push for the summit was dramatic: Buhl continued alone, after his companions had turned back, and spent a night standing up on the descent. Buhl is the only mountaineer to have made the first ascent of an eight-thousander solo (at least at the summit) and without oxygen.
The second ascent of Nanga Parbat was via the Diamar Face, in 1962, by Germans Toni Kinshofer, S. Löw, and A. Mannhardt. This route is now the "standard route" on the mountain. The Kinshofer route does not ascend the middle of the Diamar Face, which is threatened by avalanches from massive hanging glaciers. Instead it climbs a buttress on the left side of the face.
In 1970 Reinhold and Günther Messner reached the summit via a direct route on the huge, difficult Rupal Face; this was the third ascent of the mountain. Their descent was epic: they were unable to descend their ascent route, and instead made the first traverse of the mountain, going down the Diamar Face. Unfortunately Günther was killed in an avalanche on the Diamar. (Messner's account of this incident was disputed, and cast a further shadow over this achievement. However, in 2005 Günther's remains were found on the Diamar Face, corroborating Reinhold's story.)
In 1978 Reinhold Messner returned to the Diamar Face and achieved the first completely solo ascent (i.e. always solo above Base Camp) of an 8000m peak.
In 1984 the French climber Lilliane Barrard became the first woman to climb Nanga Parbat, along with her husband Maurice Barrard.
Among other ascents of the peak, the 1985 ascent by Jerzy Kukuczka et al stands out. They climbed a bold line up the Southeast Pillar (or Polish Spur) on the right-hand side of the Rupal Face.
Recently some well-known climbers have been attempting very quick ascents of the Rupal Face. In particular, late summer of 2005 was a busy time on the face. In August, Pakistani military helicopters rescued renowned Slovenian mountaineer Toma Humar, who was stuck under a narrow ice ledge at 5900 metres for six days. It is believed to be one of the few successful rescues carried out at such high altitude. In September, Vince Anderson and noted alpinist Steve House did an extremely lightweight, fast ascent of a new, direct route on the face, earning high praise from the climbing community.
On the 17th or 18th of July 2006, José Antonio Delgado Sucre, an elite high altitude climber from Venezuela, died a few days after making the summit, where he was caught by bad weather for 6 straight days and was not able to make his way down. He was the only Venezuelan climber, and one of the few Latin Americans, to have summitted five eight-thousanders.
Nanga Parbat is accessible via Astor valley in Northern Areas of Pakistan over a trekking from Rupal face. | <urn:uuid:4a803ff5-88d9-42b2-9aeb-ed5421926737> | CC-MAIN-2018-09 | http://www.vepakistan.com/travelGuides/descriptiontravelguid.php?id=98 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815951.96/warc/CC-MAIN-20180224211727-20180224231727-00597.warc.gz | en | 0.966526 | 1,247 | 2.8125 | 3 |
I came across a discussion of pedestrian crossing buttons today and I find it really interesting from a usability and user experience point of view, so I wanted to share a few thoughts.
You’ve probably heard this urban myth about pedestrian crossing buttons: that they do absolutely nothing, and are just there to give people the illusion of control. And like many enduring myths, while it’s mostly false, there is also some truth to it. You should read this fascinating BBC News piece: Does pressing the pedestrian crossing button actually do anything?
As a side note, I found out about the BBC News piece through this article on a UX blog: Idiot Buttons: The Placebo in UX Design.
This article opens with the pedestrian crossing buttons example, then goes on claiming that most of the time such buttons do nothing. And yet, the source they give for this claim actually disproves it! Quoting from that piece:
At a standalone pedestrian crossing, unconnected to a junction, the button will turn a traffic light red. At a junction it is more complicated.
Edinburgh has roughly 300 traffic junctions of which about 50-60 are junctions where the green man comes on automatically. (…) At night this might change but during busy times the system is automated.
There are 4,650 pedestrian crossings in London of which about 2,500 are at junctions. At the majority of these junctions the button controls the green man, says Iain Blackmore, Head of Traffic Infrastructure at Transport for London.
So yeah, most of the time the buttons are useful.
My guess is that the author wanted to push the idea of “placebo in UX”, picked a physical world equivalent for their introduction (a common practice in UX vulgarization), then selected a source that they didn’t read closely enough. But let’s go back to the pedestrian crossing buttons.
The BBC News article is about UK pedestrian crossings. It discusses topics such as usability, freedom and pedestrian laws, user perceptions, and hints at engineering and design issues.
I recommend that you read it (of course), with your UX goggles on. Some highlights:
Pushing the button might do one of 3 things
So the button is mostly useful. Well, useful is one thing. Predictable and consistent is another. The button’s behavior may be hard to predict for end users, since pressing the button might:
- Activate a pedestrian green light in maybe 10 seconds. (I don’t have numbers and the article doesn’t mention those. “A few seconds” is what I remember from the eight months I spent in Edinburgh.)
- Activate a pedestrian green light when the next programmed cycle comes (otherwise the next cycle will be skipped), which might be in 10 seconds, 40 seconds or even 100 seconds.
- Do nothing. The next pedestrian green light is programmed and will happen anyway.
Inconsistency fueling urban myth
Now this is just me speculating that:
Inconsistent behaviors might fuel the confusion that many people report in the article and in the selected comments.
Since bad experiences, frustration and disappointment leave a bigger impression that a system that “just works” (when you expect it to work), a minority of “this button does nothing” might be perceived as “most buttons do nothing”.
Automated pedestrian lights (buttons do nothing) might be placed at busiest intersections, and thus impact more users than manual lights at less busy intersections.
Finally, I suspect users often mistake scenario 2 (button does something, but the result happens a long time after that) for scenario 3 (button does nothing). The longer it takes for the next cycle to come around, the more useless the button feels like.
One box, several contexts
Traffic lights and pedestrian lights and buttons at a junction are one fixed set of equipment. According to the article, when pedestrian lights are automated during the day, they may still work manually during the night.
Which means that even if a button is useless during the day, it can’t be removed because it’s needed during the night.
I’m just guessing but I wouldn’t be surprised if local transport authorities fine-tune the settings of traffic lights. So a light that was fully manual might be switched to automatic-during-the-day, and the other way round. You don’t want to change costly equipment for that.
Is this a problem? Are there solutions?
Obviously there’s quite a bit of misunderstandings, frustration and myths, but the statu quo might be good enough, or even the best solution. Or maybe it could be improved. I certainly have not researched this enough to tell.
Just for fun, here are a few hints at “solutions”:
Mode indicator. Since buttons may work in different modes (automatic or manual), the box’s design might show which mode it’s in, and hint at whether the button can be used or not. This can be done with colors, on/off lights or labels, etc. (I’m not sure but I think in Edinburgh when a pedestrian light is automated, the “WAIT” sign on the box is always on, so you know you don’t have to push the button yourself. Obviously this doesn’t seem to be enough to prevent user confusion.)
Context-sensitive messages. In digital UI design it’s easy to show a message or instructions only when they make sense. You can show some buttons and labels only when they can be used. In the analog world, it can be trickier. So one flaw of the UK pedestrian crossing button design is that it always says “Pedestrians: push button and wait for signal opposite” (see pic above; even if that label goes off, it can still be read especially in daylight). Ideally, the box would say “Push …” or “Wait”, but never both at the same time.
Waiting time indicator. Modern boxes would be able to tell pedestrians how long they have to wait. Now, the problem with this solution is that it might actually increase frustration with long lights, or it might push people to jaywalk and be reckless.
Less buttons. Here in France, most pedestrian crossing lights are fully automatic. I’m not 100 percent sure but I’d say all the ones are intersections are automatic, even if it’s a place with very light traffic; so they don’t have a button. Only those in the middle of a road may be manual (with a button). So that’s one solution. But the “pedestrian buttons don’t do squat” myth still exists in France, I’m not sure why.
Pedestrian crossing buttons are a complex topic that can provide a great UX case study. They’re familiar, with quite a bit of hidden complexity. Users have a lot of expectations and believe myths about them.
I’m not formally trained in usability and UX and I don’t know how it’s usually taught, but these buttons sound like great classroom material to me. They can’t be reduced to one concept or talking point. | <urn:uuid:f7152405-5ff4-429a-8977-aa04afab452b> | CC-MAIN-2020-34 | https://fvsch.com/push-and-wait | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738562.5/warc/CC-MAIN-20200809162458-20200809192458-00082.warc.gz | en | 0.934976 | 1,522 | 2.53125 | 3 |
Metformin is a drug commonly used to treat type 2 diabetes by controlling the amount of sugar in the blood. Now, a new study suggests patients with under-active thyroids who take metformin have an increased risk of low levels of thyroid-stimulating hormone.
Metformin, a commonly used medication for type 2 diabetes, could increase risk of low levels of TSH, researchers say.
Having an under-active thyroid - also known ashypothyroidism - means that the thyroid gland does not make enough thyroid hormone to meet the body's needs. The thyroid hormone regulates the metabolism, affecting almost every organ in the body.
Low levels of thyroid-stimulating hormone (TSH), which is excreted by the pituitary gland, can cause serious damage, including cardiovascular conditions and fractures.
Metformin is used either alone or in combination with other medications, such as insulin, to treat type 2 diabetes by decreasing the amount of sugar absorbed from food and the amount made by the liver.
Long-term diabetes and high blood sugar can develop into serious or life-threatening complications, such as heart disease, stroke, kidney problems, nerve damage and eye problems.
However, previous research has suggested that metformin could lower TSH levels, potentially exposing patients to harmful effects of subclinical hyperthyroidism.
As such, the researchers of this latest study, led by Dr. Laurent Axoulay of McGill University in Montréal, Canada, examined data on 74,300 patients who received metformin and sulfonylurea - another common drug for diabetes - over a 25-year period.
They publish their results in the Canadian Medical Association Journal (CMAJ).
'Metformin linked to 55% increased risk of low TSH levels'
Of the study participants, 5,689 had been treated for hypothyroidism, while nearly 60,000 had normal thyroid function. Among the hypothyroidism group, there were 495 cases of low TSH per year, compared with 322 in the normal group.
The researchers found that in patients with treated hypothyroidism, metformin use was linked with a 55% increased risk of low TSH levels, compared with the use of sulfonylurea.
Fast facts about hypothyroidism
Without enough thyroid hormone, the body's functions slow down
In the US, around 4.6% of the population over 12 years old have hypothyroidism
Symptoms include fatigue, weight gain, cold intolerance,constipation, impaired fertility and depression.
The team adds that use of metformin did not appear to affect those with normal thyroid function.
They conclude that their findings "support the hypothesis that metformin may lead to reductions in TSH levels in patients with treated hypothyroidism."
Dr. Axoulay adds:
"Given the relatively high incidence of low TSH levels in patients taking metformin, it is imperative that future studies assess the clinical consequences of this effect."
Though their study had a large sample size, there were certain limitations. For example, their data showed records of prescriptions written by physicians, but it is unknown whether the patients followed the treatment. However, the researchers say prescription renewals were "likely good indicators of adherence."
They add that given the observational nature of the study, residual confounding needs to be considered, despite the fact that consistent results were observed.
Medical News Today recently reported on a study that suggested metformin could increase the lifespan of non-diabetic individuals.
Statins are drugs that lower cholesterol in the body by interfering with the production of cholesterol in the liver. Though they lower bad cholesterol and raise good cholesterol, one side effect is that they increase risk of diabetes. Now, researchers have discovered why and offer a way to suppress this side effect.
One of the world's most widely used drugs, statins have been hailed by the medical community for their ability to prevent heart disease.
Still, the researchers, who have published their findings in the journal Diabetes, were confused as to why diabetes was linked to statin use.
"Recently, an increased risk of diabetes has been added to the warning label for statin use," says lead author Jonathan Schertzer, assistant professor of Biochemistry and Biomedical Sciences, and Canadian Diabetes Association Scholar.
"This was perplexing to us," he continues, "because if you are improving your metabolic profile with statins you should actually be decreasing the incidence of diabetes with these drugs, yet, the opposite happened."
According to the team, around 13 million people could be prescribed a statin drug at some point in their lives.
In January of this year, the Food and Drug Administration (FDA) released a Consumer Update outlining some of the risks associated with taking statins, which included an increased risk of raised blood sugar levels and the development of type 2 diabetes.
At that time, Dr. Amy G. Egan, deputy director for safety in the FDA's Division of Metabolism and Endocrinology Products, said:
"Clearly we think that the heart benefits of statins outweighs this small increased risk. But what this means for patients taking statins and the health care professionals prescribing them is that blood-sugar levels may need to be assessed after instituting statin therapy."
But until Prof. Schertzer and his team conducted their latest research, the pathway linking statins to diabetes was unknown.
Glyburide taken with statins suppressed immune response
After investigating further, the research team found that statins "activated a very specific immune response, which stopped insulin from doing its job properly," says Prof. Schertzer.
After "connecting the dots," he and his team discovered that taking another drug - called glyburide - alongside statins suppressed this immune response.
Though statins can prevent heart disease by lowering cholesterol, they also increase risks for developing type 2 diabetes.
This finding could yield the development of new targets for this immune pathway that do not interfere with the positive effects of statins, they say.
For future research, Prof. Schertzer and colleagues want to understand how statins advance diabetes by understanding how the drugs work in the pancreas, an organ that secretes insulin. Other side effects include muscle pain and muscle breakdown, and the team hopes to understand whether the immune pathway is involved in such side effects.
"It's premature to say we are going to change this drug," says Prof. Schertzer, "but now that we understand one way it can cause this side effect, we can develop new strategies to minimize side effects."
He adds that they could even possibly use natural products or strategies involving nutrition to counter these side effects.
Because statins are so widely prescribed, the researchers say understanding how they prompt adverse effects could lead to vital improvements in the drug, which could ultimately affect a large portion of the population.
Prof. Schertzer concludes by noting:
"With the new federal warning label on the risk of diabetes with statin usage, people are heavily debating its pros and cons. We think this is the wrong conversation to have. Statins are a great drug for many people. What we really should be talking about is how to make them better, and we are beginning to understand the basic biology of statins so we can do just that."
Medical News Today recently reported on a study that suggested patients with terminal illnesses benefit from stopping statins. Researchers from that study said patients in late stages of cancer or other terminal illnesses may extend their lives by discontinuing use of the drug. | <urn:uuid:f1ab99cb-8a23-408a-8912-1992596aea4d> | CC-MAIN-2016-36 | http://christiaannagel.blogspot.de/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982950827.61/warc/CC-MAIN-20160823200910-00208-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.951723 | 1,562 | 3.1875 | 3 |
Collectible Book Terminology Part 6 – Recognizing First Editions
Vintage books offered for sale by individuals are very often misidentified as first editions. In fact, online auction sites are full of old books that are casually and incorrectly represented as firsts.
Some publishers clearly state “First Printing” or “First Edition” on their books’ title pages, which make identification easy. But most first editions are very difficult to recognize.
Unique Publisher Markings—Every publisher is different, and most changed their first edition markings many times throughout the long history of their business:
• Some publishers don’t mark their first editions at all, but subsequent reprints are always noted as such;
• Some publishers show the year of publication only in their first editions;
• Some publishers print their logo (or seal) only in their first editions;
• Some publishers print a single capital letter on the copyright page to indicate the edition number. The letter “A” would be a first edition, while an “E” would be a fifth;
• Some publishers use a series of numbers or letters, eliminating the first number or letter in the series for each new edition. (1 2 3 4 5 6 7 8 9 10 would represent a first edition while 3 4 5 6 7 8 9 10 would represent a third);
• Some publishers use a series of coded letters on the copyright page to indicate the month and year when an issue was printed. In old Harper & Brothers books, a code of B-P would indicate a printing in February 1915.
Extensive guidebooks are available that list many different publishers and the varying ways they have changed their first edition markings over time. But there are exceptions to all the rules, and some publishers do not use any markings at all to identify their editions.
Copyright and Published Dates—A copyright date is not a published date. A copyright date only indicates the first appearance of a work and could be 50 years older than the actual book.
Some books print both a copyright year and a published date. It is usually possible to identify a first edition if the copyright year and the published year are the same; but not always. (The first edition of Gone with the Wind was published in May 1936. Only 10,000 copies were printed but the book was so popular that a second printing was ordered right away, in June, and several subsequent printings also occurred in 1936. Thus, a September 1936 edition of this book is not a first edition, even though the copyright year is also 1936).
Title History—Knowing a book’s original publisher and original publishing date can go a long way toward edition identification. Many popular titles were reprinted over and over, by scores of different publishers.
George Orwell’s Nineteen Eighty-Four was first published in 1949, but a book with this date is not the first edition unless it was published by London’s Secker and Warburg (The Harcourt, Brace and Company version printed later in 1949 was the first American edition).
To the uninformed, a version of Frankenstein with a published date of 1865 may seem like a good candidate for a first edition. It’s certainly a very old and valuable book, but it’s not anywhere close to being a first printing. Frankenstein was first published anonymously in 1818. Author Mary Shelley’s name appeared on the second edition in 1823. Editions of this book were also published in 1831, 1833, 1849 and 1856.
The first illustrated edition of Frankenstein did not appear until 1831. This is the first artist interpretation of the monster.
Points—Many popular books experienced multiple printings in quick succession by the same publisher. But in some cases, meticulous researchers have documented peculiarities that can identify the edition number. These include typos, changes in text or illustrations, binding variants, dust jacket styles, changes in price and the like. The text for the first printing of L. Frank Baum’s The Road to Oz in 1909 was printed on pastel tinted paper, with the color changing every 32 pages (off white, lavender, gray, light blue, salmon, tan and light green). The technique proved to be far too expensive and labor-intensive so was discontinued with subsequent editions.
Common identification points usually include advertising—in the back of the book, on the back of the dust jacket and on the dust jacket flaps. For many old juvenile series books, this is a key source for identifying first editions and is not possible without the dust jacket present.
Sometimes as many as four editions of a vintage juvenile series book were printed in the same year, before the next new title was released. Therefore, the common practice of assuming that a series book is a first edition if the advertising list of previous titles stops with that book (often referred to as “lists to self”) is highly unreliable.
The Bungalow Mystery dust jacket can only be identified as a 1930 first edition with the following points: The back of the dust jacket advertises only the first 10 Amy Bell Marlowe Books for Girls; The inside front flap advertises only the first three Nancy Drew titles; and the inside back flap advertises only the first 10 Beverly Gray titles.
Book Club Editions—A book club edition might have the markings of a first edition because it was printed from the same plates. But it is not. Without a dust jacket, it is often difficult to recognize a book club edition. The book might have an embossed marking on the back and might be made of lesser quality paper, but not necessarily. However, a book club dust jacket will not have a price (and might even state “Book Club Edition” in the lower corner of the front flap). Beware of popular books passed off as first editions that do not have dust jackets (or have price-clipped dust jackets).
So how can a casual buyer be cautious and informed? First edition identification is not specific and never easy. Here are a few tips:
Know Your Seller—Reputable book dealers will have done the necessary research to correctly identify a first edition. Does the seller have a store or website? Does the seller publish a book catalog? Is he a member of the Antiquarian Booksellers Association?
If you’re still not sure . . .
Ask a Worthologist—WorthPoint’s experts understand the points and research materials necessary to identify a book’s true age. A Worthologist can safely authenticate a book for you before you buy. It’s just as important to know when a book is NOT a first edition—and that is usually easy to determine.
Liz Holderman is a Worthologist who specializes in collectible books.
WorthPoint—Discover Your Hidden Wealth
Join WorthPoint on Twitter and Facebook. | <urn:uuid:98f6d8ea-612f-41bb-a04f-7d04c73ee795> | CC-MAIN-2015-32 | http://www.worthpoint.com/blog-entry/collectible-book-terminology-part-6/comment-page-1 | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990114.79/warc/CC-MAIN-20150728002310-00006-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.955004 | 1,413 | 3.109375 | 3 |
Acrostic Poetry or Acrostic (Greek “acros” = outermost. “stichos” = line of poetry)
One word, phrase or sentence representing the subject of the poem is written vertically down the left hand side of the poem with each letter of the subject becoming the first letter of a line of the poem.
Some acrostics have the vertical word at the end or in the middle of the lines.
Double acrostics have 2 verticals (either first and middle or first and last).
Triple acrostics have all 3 verticals (first, middle and last).
Originated in ancient times and used in Greek, Latin and Hebrew literature. Some of the Biblical psalms (in Hebrew) are acrostics.
Some ancient Acrostic writers believed the form has mystical powers.
JD BIDDLE (PI acrostic) Jokester, prankster, and Daredevil. Built for fights, but only off the Ice. Doesn’t wear the Devil blades that Lead to chipped teeth and Endless...
LOOK DOWN (Acrostic) Leaping in Over dolphins Open mouthed and Kelp draped. Doing the impossible – ordinary breathing while under water traveling – Nearing the City of Mer.... | <urn:uuid:33c29bf9-9497-4aa0-ba06-96a8da6f1e5d> | CC-MAIN-2017-47 | http://piratepoems.com/handbook/acrostic-poetry/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806979.99/warc/CC-MAIN-20171123214752-20171123234752-00068.warc.gz | en | 0.894255 | 267 | 3.515625 | 4 |
Biodegradation of Two Synthetic Textiles by Two Ligninolytic Fungi Species: Trametes Versicolor and Ganoderma Lucidum
Disposal of synthetic textile waste by landfill is likely to pose a risk of environmental pollution problems.
Biodegradation remains a viable textile waste management alternative. Ligninolytic white-rot basidiomycetes can effectively
degrade textile wastes. The main objective of this experiment is to assess the biodegradability of two synthetic textiles
containing nylon or polyester fibers by two white-rot fungi, namely Trametes versicolor and Ganoderma lucidum. The results
show that T. versicolor and G. lucidum, alone or in combination, are able to degrade synthetic textiles. However, the
biodegradation efficiency does not improve in co-culture compared to mono-culture.
Index Terms- Environment, Fungal co-culture, Plastic waste, White Rot Fungi. | <urn:uuid:a5490174-702b-4575-bd7b-9b4c0f562c10> | CC-MAIN-2019-39 | http://ijaseat.iraj.in/abstract.php?paper_id=5668 | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572517.50/warc/CC-MAIN-20190916100041-20190916122041-00551.warc.gz | en | 0.84478 | 209 | 2.59375 | 3 |
A Token Ring network is a neighborhood location network (LAN) in which all computer systems are connected in a ring or star topology and a bit- or token-passing scheme is utilised in order to prevent the collision of data in between two computer systems that want to send messages at the same time. If you ran Token Ring at 16Mbps, you could have a packet size up to 18,200 bytes long. New switching technologies and more rapidly versions of Token-Ring are in the operates to speed network throughput (see the facts on Higher Speed Token-Ring earlier in this section).
Use a network analyzer to verify the Duplicate Address test frames from a booting station. Token Ring networks use a sophisticated priority method that permits certain user-designated, high-priority stations to use the network more often. The token will circulate about the ring, followed by the message, passing by way of the location node, till it returns to the supply node.
Use the show interfaces token command to establish the status of the router’s Token Ring interfaces. In this topology only a single computer system at a time can send a information therefore the speed of network reduces as the quantity of computer systems attached to the bus increases.
It describes a specific Token Ring symptom, the challenges that are likely to result in this symptom, and the solutions to those challenges. IBM charged also considerably for royalties to vendors that wanted to generate Token Ring cards and MAUs. The Simple Token Ring diagram beneath illustrates how a number of ring segments are connected with each other by way of Multistation Access Units (MAUs).
Token-Ring implementations frequently use Kind 1 shielded cabling (limiting ring membership to 250 devices) or Category 5 twisted pair cabling (restricted ring membership to 72 devices). Use the clear interface command to reset the interface and reinsert the router into the ring. | <urn:uuid:a4c50e46-9250-45df-af4e-0400430e4b2b> | CC-MAIN-2021-43 | https://www.speedyfeed.com/token-ring-tutorial.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00359.warc.gz | en | 0.881091 | 380 | 3.4375 | 3 |
UCSD may be your very first institute of its type in California. It aims to simply take science and technology by supplying classes in a variety of areas which match the other person from the laboratory for the actual life. They also have a focus on learning and learning. This permits college students to master to use both in-class and hands encounters.
Then you’re going to be content to learn that technology is offered by UCSD if you’re an electrical engineer buying challenge. The course of research involves pupils in construction and planning systems. They’re taught different technologies principles and practices which include things like electromagnetism, Micro Electronics, electricity and control, terminal induction, power electronics, and Thermo Dynamics.
The following schools provide a far more high level degree in Electric Engineering at UCSD. http://vermaelectronicschandigarh.com/index.php/2020/3/2/finding-a-cheap-paper-writing-service/ Under graduate students interested in those classes might take BS or even MEng Eng via a program. These degrees offered via the Master of Science in Electric Engineering or Masters of Science in Materials Engineering can be found by PhD and Experts students.
Physics is the analysis of those forces that govern the movements of power and matter. They comprise force, magnetism, gravity, and electricity. Quantum and classical physics is included by Both standard branches of physics.
Energy can be an effective manner of converting physical motion. Some samples of that are: the atomic result of hydrogen, the movement of the electron round the surface, and the movement of particles over the nucleus of the organism. Energy can be used to alter the dynamics of matter.
Your own teacher will have you ever finish a class at Elementary Mechanics, when applying for school physics. Inside this class, you’ll examine the kinetic energy, potential energy, kinetic energy, and potential energy. You will find out about fluids, solids, and explosives.
For school mathematics, http://optiekmichielsen.be/the-way-to-locate-a-very-good-paper-writing-service/ your own teacher is going to have you ever apply to your area. For your own study and examine scores, work is going to be assessed Within this situation. You may then be assigned a mentor that will help you keep your studies, once you’ve chosen the test.
Generally in the majority of cases, you’ll have to visit summer school after carrying physics at 24, or take a few courses in college. You can even specialize in one of those four divisions of physics. This way, you will receive the main benefit of finding out all of the fundamental components of physics in the contentment of of your own home.
Electricity could be the fundamental element in mathematics. Power is used by engineers in a effort to create the gadget. Electrical engineers deal with voltage, current, and resistance, in addition to magnetism because they deal with the legislation of temperament.
Mechanics is the study of http://vjsingla.com/tips-to-get-essay-books/ the interaction among the forces that cause motion. It addresses everything out of the power of air into air heat and pressures. Mechanics deals with warmth along with electromagnetism.
The study of math is something which may be done everywhere, as long as you are prepared to think outside the package. You can get some invaluable information by choosing physics courses at UCSD, but you may also generate some creations just by using these concepts. If you know to write, you can be a writer.
It should really come as no real surprise that UCSD provides a sort of programs that will help you achieve a high school degree. You’ll also find a way to acquire in to any college that you just choose, provided that you satisfy the entry requirements. | <urn:uuid:443eb4ff-1134-4606-9ab8-609c15c58888> | CC-MAIN-2020-34 | https://javexpo.com/atitlewhat-exactly-are-g-in-physics/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739370.8/warc/CC-MAIN-20200814190500-20200814220500-00049.warc.gz | en | 0.938155 | 801 | 2.578125 | 3 |
In English, you have been learning about ‘How to Train Your Dragon’.
Today and tomorrow, you are going to design your very own pet dragon. Think about it's size, colour, special skills, personality etc.
You need to show us what your dragon looks like (draw a picture, make a model....whatever you like), and then write a short paragraph or some bullet point notes describing what your pet dragon is like.
Here are some prompts to help you:
Does it breathe ice? fire? bubbles? Melted chocolate?
Do you fly around on it's huge back, or is it so teeny tiny that you carry it around in your pocket?
Can it change colour? Or turn itself invisible?
Can it talk to you? In English? Or do you have a secret dragon language?
Is it angry or calm? Shy or confident? Funny or serious?
Do you go on adventures together to far off lands? Or would your dragon rather chill out in your
living room with a good book?
What else is special about your dragon?
Here is a lovely song to listen to while you work :) https://youtu.be/Y7lmAc3LKWM | <urn:uuid:c979da01-60c8-4a27-b4a7-0294428902c1> | CC-MAIN-2021-39 | https://www.j2e.com/st-johns-cofe-primary-school5/Miss+N+Clarke2/Dragon+Art+week+4/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057796.87/warc/CC-MAIN-20210926022920-20210926052920-00207.warc.gz | en | 0.920264 | 252 | 3.40625 | 3 |
A lottery is a gambling game in which people pay for the chance to win a prize that may be anything from money to jewelry to a new car. The prizes are normally distributed through a random drawing, although the term also refers to any scheme in which something of value is awarded to people who pay some sort of consideration for a chance to receive it. In some cases, the term lottery is used to describe a government-sponsored promotional activity that is not gambling, such as a drawing to determine units in a subsidized housing project or kindergarten placements in a reputable public school. Federal statutes prohibit, among other things, the mailing in interstate or foreign commerce of promotions for lotteries or the sending of lottery tickets themselves.
The American lottery has been around since the early 19th century and is one of the country’s largest forms of entertainment, bringing in billions of dollars annually for state governments. The lottery is a popular alternative to more traditional sources of entertainment, such as sports or movies, and it provides a unique opportunity for people to experience the thrill of winning. However, the growth of the lottery has led to concerns about its impact on society. It has been criticized for targeting lower-income individuals, increasing opportunities for problem gambling and for encouraging people to spend more than they can afford to lose.
Despite the fact that many Americans buy a ticket every week, the majority of players are middle-class people who have a relatively low income. They are disproportionately male, white and non-Hispanic. They are more likely to work in the service industry than the average American and to be married. They are also more likely to have children and to own their own homes.
In order to generate revenue, the lottery typically sells a combination of small prizes (often called tickets) and a single large prize. A percentage of the proceeds is usually deducted for profit and promotion, with the remainder awarded to winners. Lotteries have a wide appeal and have been used to fund a variety of projects, from infrastructure to education to military service.
Unlike other forms of gambling, lotteries are not operated by private entities and the profits from the games are deposited into the state treasury. Consequently, the lottery has become a popular means for states to raise funds without imposing especially onerous taxes on poorer residents or raising property tax rates. It is important for people to understand how the lottery works and the advantages and disadvantages of playing it before they decide whether or not to participate. | <urn:uuid:f5ea44e7-e110-4cd7-a301-aec0e63486c9> | CC-MAIN-2023-23 | https://thegioisogroup.com/what-is-a-lottery-6/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00697.warc.gz | en | 0.978263 | 494 | 3.0625 | 3 |
Eyesight and Driving
As a driver, having good eyesight is vital to ensure you are not endangering yourself or other road users. Driving with poor or impaired eyesight not only puts other motorists at risk of having a road traffic accident, but is also against the law and could result in a fine, penalty points on your licence or even a ban from driving.
There are strict rules regarding driving and eyesight in Britain. Anyone who wishes to drive a vehicle must be able to see clearly at a certain distance in order to be considered safe to drive.
All learner drivers are therefore required to pass a basic eyesight test before they are allowed to take their practical driving test. This involves being able to read a car number plate on a stationery vehicle from a distance of 20.5 metres. For the new-style number plates (introduced on 1 September 2001), the distance requirement is 20m.
Learners are given three opportunities to prove to the examiner they can read the number plate correctly*. If after three attempts they fail to answer correctly and meet the required eyesight standard, they will not be allowed to continue the practical driving test and the Driver and Vehicle Licensing Agency (DVLA) will be notified of the practical test failure on the eyesight requirement. Learners must then pass a separate eyesight test before they can attempt the standard eyesight check and continue with the practical driving test.
*Learners who canít speak English or have difficulty reading are allowed to write down what they see.
Wearing glasses/contact lenses
Learners who need to wear glasses or corrective lenses for the eyesight test must ensure they wear them throughout the practical test and whenever they are driving. Learners risk failing their eyesight and practical test on the spot if they:
- forget to bring their glasses/corrective lenses to the test,
- bring the wrong pair,
- bring damaged glasses/lenses, or
- take off their glasses/ lenses during the practical test
Under the current UK law, Britons who have passed their driving test and need glasses or contact lenses to see clearly must ensure they wear them when driving or else they could be fined up to £1,000, receive three penalty points or be disqualified from driving.
Informing the DVLA about eyesight conditions
When applying for a driving licence from the Driver and Vehicle Licensing Agency (DVLA) individuals should inform the agency of any illness or condition they have which may affect their sight. This includes any visual condition that affects sight in one or both eyes (not including short or long sight or colour blindness), or if they only have sight in one eye. Applicants should also declare if they have had sight corrective surgery carried out.
Those who hold a full UK driving license and believe they have an eye condition which should be reported must complete a medical questionnaire and send it to the DVLA. The agency will then assess their case and decide whether it is safe for them to continue driving. If they decide that it isn't, the driverís licence will be revoked. For most cases, this will take less than a month.
General Eye Tests
Once an individual has passed their driving test they are not legally required to have an eye test for driving purposes until they are 70 years old, despite the fact that eyesight can start deteriorating from the age of thirty. Because of this, many people continue to drive for many years with less than adequate vision.
It is therefore recommended that all motorists have their eyesight tested once every two years to check whether it is safe for them to continue driving. As well as determining whether or not a person needs glasses or contact lenses to aid their vision, eyesight tests are also crucial for detecting serious conditions which may need immediate treatment, such as glaucoma and cataracts, and may also give clues about less common diseases.
Many people over the age of 60 may suffer from both glaucoma and cataracts Ė two of the most common eyesight conditions. Glaucoma occurs because of a problem with fluid draining from the eye, whereas cataracts cloud the lens of the eye, preventing much of the light from passing through.
Although the two diseases are unrelated, both are serious conditions that can lead to blindness if left untreated. While surgery can reverse the loss of vision from cataracts, vision loss from glaucoma is permanent and irreversible.
|Blow-up seat belts will give greater crash protection in rear car seats - Thu, 28 Jun 2012|
|Advanced drivers more aware of potential hazards on the road - Wed, 27 Jun 2012|
|Travellers find child seats hired with a rental car are substandard - Wed, 20 Jun 2012| | <urn:uuid:371b16bb-f98a-464b-ab3f-467fe885a177> | CC-MAIN-2015-18 | http://www.caraccidents.co.uk/eyesight-and-driving.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246641393.36/warc/CC-MAIN-20150417045721-00052-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.953816 | 969 | 2.8125 | 3 |
I recently reviewed Henry Louis Gates Jr.’s The Trial of Phillis Wheatley (2003). In one part, I discussed Thomas Jefferson’s racist rejection of Phillis Wheatley as an African-American poet.
Gates’ book is an excellent analysis on Wheatley’s mission and legacy, but it misses the point. The root of Jefferson’s “blind spots” was not racism but the sin of unbelief. By rejecting the timeless truth of imago dei (Genesis 1:27), Jefferson refused to believe that all people – red, yellow, black, and white – are created equal in mind, body, and spirit. We all came from Adam and Eve, so we share the same blood (Genesis 2:7, 21-22; Acts 17:26). Since we’re all human beings, we have the same moral, emotional, and intellectual capacities. We don’t need to “prove” our humanity to anyone through what we say or do. Humanity is our God-given birthright. Each person who accepts these fixed truths will treat others equally regardless of class, ethnicity, religion, or gender. They won’t create a sliding cultural standard for people to achieve and then judge them for their failures.
The pro-life movement today also suffers from unbelievers’ “blind spots,” as seen in the German-language short film Crescendo (2011). The year is 1770 in Bonn (Holy Roman Empire) and Ludwig van Beethoven (1770-1827) has yet to be born. His mother Maria is married to an abusive man and already has a child by him. Through a potion, she tries to get an abortion but fails. So Maria decides to “embrace the discordant note” and give birth to the great composer.
Although Crescendo is an excellent film, it implicitly argues that, through abortion, we might kill geniuses in various fields of knowledge. The internet is littered with ads and editorials that contain the same line of reasoning. Do we need the promise of a brilliant future so that we’ll be given a chance to live? No. We’re all human beings from the moment of conception, with an equal right to life. It doesn’t matter whether we become artists or arsonists, musicians or murderers, Mother Teresa or Adolf Hitler. Physical appearance is also irrelevant, so we shouldn’t abort Down syndrome or spina bifida babies, for example.
If pro-lifers want to win, then they must reject pro-choice arguments that deny both imago dei and Almighty God. He alone is the author of life, so we must surrender the choice to him. | <urn:uuid:fec0a007-8ebd-4516-b545-fb885669a44b> | CC-MAIN-2017-43 | https://artsandculturereviews.wordpress.com/2015/04/09/crescendo-choosing-life/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822625.57/warc/CC-MAIN-20171017234801-20171018014801-00012.warc.gz | en | 0.919772 | 576 | 2.65625 | 3 |
Thérêse Ghembaza is a French researcher who has a website, in French and English, entitled The Great Enigmas of Antiquity(a) in which she discusses matters such as the Hyksos, the identity of Moses and the Kushites. The site also deals with her theory that Atlantis had been situated in Meroë on the Upper Nile, a theory that she developed in another paper(c), which is certainly worth a read.
While at first sight this might be seen as a wild claim, Ghembaza offers a well reasoned theory which was presented to the 2nd Atlantis Conference held in Athens in 2008. She has imaginatively linked aspects of Meroitic geography and history with Plato’s story of Atlantis. For example, she identifies Tyrrhenia with Tyre in Lebanon and claims that Tyrrhenia in Italy was a later colony of Tyre! While some of her ideas are convincing I found others a little threadbare. Nevertheless Ghembaza must be applauded for her efforts to construct a scientific explanation for the Atlantis narrative.
Ghembaza has kindly drawn my attention to two quotations from Pliny the Elder and Ovid that offer possible explanations for Plato’s orichalcum (see Document 091011). The former refers to a Cypriot copper mixed with gold which gave a fiery colour and called pyropus, while Ovid also refers to a cladding of pyropus, a term often translated as bronze. She also mentions auricupride(Cu3Au), an alloy that may be connected with orichalcum.
(d) See: Archive 2526
Neith was an ancient Egyptian goddess and patron god of Sais, where Solon is said to have learned about Atlantis. Neith is often identified with the Greek goddess Athena as well as the Berber and Punic goddess Tanith (Tanit, Tanut), although this has been disputed (a). Tanith is said to be derived from the Phoenician lunar goddess and claims have been made that Tanit was also a Hyksos goddess.
The association of Greek with Egyptian deities was originally told to us by Herodotus(b). A similar connection between Greek and Hindu gods has also been identified(c).
(b) See: Archive 2574
The Biblical Exodus has been linked by some with the time of the destruction of Atlantis. J. G. Bennett has firmly identified the 2nd millennium BC eruption of Thera with the destruction of Atlantis(f) and in turn the effect of the volcanic fallout on the Egyptian nation generating the Plagues of Egypt recorded in Exodus.
Dr. Hans Goedicke, a leading Austrian Egyptologist, expressed a similar view regarding an Exodus link in a 1981 lecture, leading to quite a media stir(c). Ian Wilson, best known for The Turin Shroud, has calculated that the volcanic plume from the Theran eruption would have been clearly visible from the Nile Delta[979.112].
Riaan Booysen believes(b) that there were two Exodus events that can be linked with three possible Theran eruptions and has identified the Israelites as the Hyksos. Ralph Ellis has also linked the biblical Exodus with the expulsios of the Hyksos and devoted a short book to the idea.
Immanuel Velikovsky and others believed that the controversial Ipuwer Papyrus provides evidence in support of the biblical Exodus as well as the ‘Plagues of Egypt’(d).
Emilio Spedicato links the biblical Exodus with the explosion of Phaëton in 1447 BC, without any reference to the destruction of Atlantis, which, based on his interpretation of Plato’s text, he associates with a much earlier catastrophe(a).
Alfred de Grazia offers a radical interpretation of the Exodus in God’s Fire , in which he saw the Exodus as a highly organised, rather than an opportunistic event. He also attributed some level of electrical knowledge to Moses, whom he credits with the construction of the Ark of the Covenant, if not the ‘invention’ of Yahweh himself!
Perhaps the most extreme Exodus theory has been presented if by Finkelstein & Silberman, who have claimed that “the saga of Israel’s Exodus from Egypt is neither historical truth nor literary fiction” [280.70]. However, the same disbelieving Finkelstein is now going on a search for the Ark of the Covenant(e) !
Flavio Barbiero has now produced an extensive paper(g) in which he precisely dates the Exodus to the night between the 14th and 15th of July of 1208 B.C. (2/3 July of today).
Riaan Booysen is a South African researcher (and avid tennis fan) who has written articles on a number of ancient mysteries, which can be found on his website(e). Among his controversial ideas are that the Queen of Sheba, Nefertiti and Helen of Troy were a single person(d).
He offers a major paper on Atlantis(a), in which he bravely identifies its location as an extensive landmass which included present day Australia. Unlike other writers who have offered similar suggestions based on guesswork, Booysen offers a coherent thesis based on the geology of the South Pacific and early cartography.
His theory requires a radical redating of the Antarctic ice cap, which has led to continued debate on the internet(c).
Booysen has published another contentious offering in 2013, entitled Thera and the Exodus in which he argues that there were at least two Theran eruptions which led to two separate ‘Exodus’ events by the biblical Israelites, whom he identifies as the Hyksos!
He dates these events to ca. 1613 & 1450 BC.
Booysen has now commented on negative feedback from his book(b).
A year later he ventured into even more contentious territory with the publication of BARBELO – The Story of Jesus Christ, now available as a free ebook(f).
Avaris (Tell el Dab’a) located in the Nile Delta, was the capital of the Hyksos rulers of northern Egypt during the second millennium BC. Recent excavations have unearthed Minoan style frescoes, including bull leaping. At least one writer has remarked on the similarity of this ‘island’ city to Plato’s Atlantis (The Jerusalem Post, July 12th 2006)
The Hyksos is the name applied to two dynasties of foreign kings who ruled Egypt around 1650-1530 BC(a). They are generally accepted to have been a Semitic people, from an unknown land, who invaded Egypt around 1710 BC. They ruled for over a hundred years until defeated by the Egyptian Pharaoh Amasis I.
Their name was originally taken to mean ‘Shepherd Kings, but more recently, it is accepted that the Egyptian term ‘heqa-khase’ which means ‘rulers of foreign lands’ gives us a simple but credible title of ‘Foreign Kings’. It has been suggested by David J. Gibson (1904-1966) that the modern interpretation indicated that the Hyksos ruled a vast empire and has devoted a book to justifying this view(g).
Walter Baucum summarises his view on the subject as follows, “The Early Hyksos Shepherd Rulers of Egypt were descendants of Shem and identical with Typhon and the Titans, the peoples of Set, and to some degree with the Hebrews. The early Hyksos were to a large degree Israelites but after they left, the Amalekites conquered Egypt and were also referred to as Hyksos”.
There have also been persistent suggestions that there were strong links between the Hyksos and Crete, as referred to below, but the exact nature of the links is unclear and may not be more than you get between nations trading over an extended period. The relevance of such links, if they were ever shown to be political rather than commercial, would take on new significance for supporters of the Minoan Hypothesis. Time will tell.
E. J. de Meester has suggested links between Crete and the Hyksos, an idea an included in an article by Philip Coppens(b). In a similar vein Diaz-Montexano claims that a study of the names of the Hyksos pharaohs suggests to him that they were proto-Greek or Mycenaeans.
An example of the diversity of opinions regards the origins of the Hyksos is a brief article written by Emilio Spedicato who identifies them with the Scythians.>Gunnar Heinsohn (1943- ) is a German professor emeritus at the University of Bremen, who presented a paper entitled ‘Who were the Hyksos’ to the 6th International Congress of Egyptology in 1993, in which he concluded that they were to be identified with the Old-Akkadians(j).<
Perhaps even more radical is the suggestion by Riaan Booysen that the Hyksos were the fleeing Israelites in the biblical Exodus story(c). In fact he claims that there were two ‘exoduses’ which coincided with two separate eruptions on Thera. This idea is not as new as it might seems as something similar was proposed by the 1st century AD Jewish historian Josephus(d).
Nick Austin also identifies the Hyksos as Jews [1661.184], but is more generous than Booysen claiming that there were four separate eruptions of Thera. Like many others he has also associated the biblical Exodus and the Plagues of Egypt with the Theran eruptions.
Ralph Ellis, among others, has endorsed(e)(f) the idea that the biblical Exodus and the historical Expulsion of the Hyksos describe the same event.
There are theories, many and varied, regarding the origins and post-Egyptian settlement of the Hyksos. Arguably, the most exotic was put forward by a Chinese geochemist, Sun Weidong, who proposed that Hyksos migrants were responsible for the founding of the Chinese civilisation!(h)(i)
(b) See: Archive 2133
(g) See: Archive 3468
Egypt occupies the northeastern corner of Africa. However, the ancient Egyptians considered themselves as Asian (Tim. 24b). In practical terms its territory consisted of a few miles either side of the Nile and its large Delta. In an expansionist period in the 2nd millennium BC, Egypt controlled parts of what are now Israel, Lebanon and Syria. Over its long history, Egypt itself was overrun by a variety of invaders – Hyksos, Kushites, Assyrians, Persians, Greeks and Romans.
Egypt was viewed by the Greeks of Plato’s time as guardians of ancient history and wisdom and consequently was a place of pilgrimage for many of its greatest philosophers, who travelled there to be initiated into the cults of Isis and Osiris. Gustav Parthey (1798-1872), the German antiquarian, researched the education of 40 leading philosophers, writers and politicians of ancient Greece and found that all had studied under Egyptian priests. Clement of Alexandria (150-215 AD) suggested that Plato travelled to Heliopolis and was a disciple of the Egyptian priest Sechnuphis. Other classical writers such as Strabo and Plutarch have confirmed this(i).
In spite of this the Greeks arrogantly referred to all non-Greeks, including the Atlanteans (Crit. 113a) as ‘barbarians’. It is of interest that Athene after whom the Greek capital is named, originated in Egypt where she was worshipped as Neith.
The late Philip Coppens went as far as to suggest(a) that Greece was in fact an Egyptian colony!
Plato’s text seems to infer that the destruction of Atlantis in 9600 BC was contemporary with Egyptian civilisation, raising archaeological questions regarding the earliest date for the establishment of an organised society in Egypt. Unfortunately, there is not a lot to support this contention. The oldest known art in Egypt was discovered in 2007 when petroglyphs estimated to be 15,000 years old. The earliest culture along the Nile, identified by archaeologists is that of what is known as the Badarian dated to around 4500 BC. They produced basic pottery, jewellery and used stone tools although they had some knowledge of metals. The Badarians were followed by the Naqada who led on to what we identify as the spectacular ancient Egyptian civilisation. However, in 2007, rock carvings, similar in style to the Lascaux paintings were discovered near the village of Qurta, 650km south of Cairo. The 160 carvings, spread over 1.5km of rock face, discovered so far, mainly depict wild bulls and have been dated to 13000 BC(h)
September 2013 saw the publication(c)(d) of a more definitive date for the start of the state of Egypt, beginning with the reign of king Aha circa 3100 BC. The evidence indicated that the process of moving from the pre-Dynastic groupings to a form of statehood was more rapid than previous thought. This undermines even more firmly the claims of the Egyptians that their country was founded around 8,600 BC as reported by Plato.
It is not surprising that ancient Egypt has presented us with very many unanswered questions, some of which have been compiled, posted on Wikipedia but subsequently removed(g).
Many writers have remarked how all aspects of ancient Egyptian culture seem to have arrived fully developed, in fact later dynasties did not surpass some of the achievements of the earlier ones. The conclusion of some is that the fully matured civilisation of the early Egyptians was in fact a legacy from elsewhere.
Sanchuniathon refers to the original kings of Egypt calling them ‘Aleteans’. Albert Slosman claims that survivors from Atlantis had migrated to Egypt. The archaeologist, Marcelle Weissen-Szumianska, in a 1965 book, Origines Atlantiques des Anciens Egyptiens , maintained that the pre-pharaonic Egyptians originated in Atlantis, which had been situated in Morocco! Others suggest that Egypt was an Atlantean colony. The idea was brought to a ridiculous level by Augustus Le Plongeon who claimed that Egypt was a Mayan colony!
Robert Schoch has controversially dated the construction of the Sphinx to between 7000-5000 BC, while the megalithic structures at Nabta Playa suggest a sophisticated culture in that area around 5000 BC. Even if both these early dates are correct they are still over four and a half millennia short of Plato’s date. These most likely explanation is that Plato’s number of 9,000 years before Solon is incorrect as 9000 is too neat and may have been a siglum used to express a large but uncertain number or is an exaggeration just as today we speak of having ‘a million and one things to do’.
In 1897, a Russian scientist, A.N. Karnozhitsky was probably the earliest commentator to propose a close link between Egypt and Atlantis, placing the Pillars of Heracles near Sais and located Atlantis itself not far from the western mouth of the Nile.
Some years ago, Egypt was again been proposed as the original Atlantis, in a still (Mar. 2017) unpublished book, The Joshua Crossing, by N. R. James. However, 2006 did see a paper presented by Professor Hossam Aboulfotouh of Minia University, Egypt, placed Atlantis in the Nile Delta. The following year R. McQuillen also offered an Egyptian location for Atlantis, placing it at Pharos near Alexandria.
A novel idea has been put forward by Mary Whispering Wind(b), who bravely offers the idea that the Atlantean province of Egypt was in fact, Colchis, situated on the east coast of the Black Sea! She bases her claim on an interpretation of Herodotus (Book II.104/5) who was commenting on circumcision being only practiced by Egyptians, Ethiopians and Colchians, in my mind, stretching what Herodotus said beyond the acceptable.
An even more radical suggestion was made by Reinoud M. de Jong in a 2009 paper(f) where he boldly claimed “that during the whole period of the (Michigan) copper trade, America was part of the Egyptian Empire” and during the Old Kingdom “this huge empire was known as Atlantis”!
One blogger, from California, has gone so far as to suggest that the ‘Egypt’ which Solon visited was on the shores of the Sea of Marmara!(e)
(a) See Archive 2136 | <urn:uuid:a59ea899-9e5a-4eb0-858a-99a48811a3a2> | CC-MAIN-2020-29 | http://atlantipedia.ie/samples/tag/hyksos/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00109.warc.gz | en | 0.967393 | 3,515 | 3.015625 | 3 |
SOLVE SMALL, DENT BIG. How To Be a Hit With Your Parents!July 21, 2016
Evolution of Our Solutions: Journey of the Waterless Urinal
In the past two years, sanitation in India is probably the most written about topic at this time of the year and yet year after year the attention doesn’t seem to yield many results. In many ways India’s dismal sanitation situation is a stark reminder of the lopsided nature of India’s growth story complete with its flashy facades and broken bowels. We recently wrote about how construction figures are not enough when assessing sanitation facilities in schools <>. Today we talk about our experiments with sanitation. At Reap Benefit we use an action oriented approach to address complex social problems. We trust our prototypes and users and dive right into the deep end with our solutions.
The state of Public Toilets in our country is pitiable and most of us would rather not even use them, preferring instead to hold it in. A public space which deters the entry of people rather than inviting them, defeats its purpose. A matter of serious concern in the area of sanitation is the stench of urine which persists in many schools and public urinals. A lot of people insist on using an open space even when there is a toilet in close proximity. Observations such as these, as well as instances visible in many government aided schools where students preferred to use every other available space for urinating save the toilet, prompted us to find a solution to this particular problem.
The journey of the Waterless Urinals began just as most Reap Benefit stories do, and that is with the question, ‘Why?’. Why were students urinating outside the toilet rather than inside the toilet? Why did the toilets smell so much? What was responsible for the smell? Questions were plenty and soon we began investigating in to the matter. Through this endeavour we wanted to not only eradicate or reduce the foul smell of urine, but to also bring about instinctive behavioural changes in the habits of people in relation to sanitation in particular.
The first step to the challenge was to discover exactly what caused the smell and how to combat it. A few lessons spent brushing up on science revealed a rather simple explanation for the cause of smell in toilets. Urine contains ammonia and after flushing, uric acid is released and it is the mixture of this uric acid with air which is responsible for that stench lingering in the toilet long after one has finished his/her business. The solution to minimize and eradicate smell is actually really simple, all one has to do is flush properly and make sure the water flushes out every trace of urine. However, this solution is not the simplest for a country like ours, where accessibility to water and water shortages is a daily nightmare for so many. Hence, an alternative solution had to be found to cut off the smell which required minimal water.
At Reap Benefit, we work on core principles of ‘low cost and simple solutions’, our products are meant to be obtainable by everyone, using the most basic everyday materials and turning them in to innovations serving other purposes. We initially introduced plants in to the urinals, experimenting to see if the scent of the plants could overpower the stench of urine, this however proved unsuccessful for long term. Also, it was observed that most male toilets in Government schools had no urinals or pans to begin with, and students were not able to understand the difference of peeing on the side of a road or in a proper urinal, seeing as essentially for them both were just plain flat ground. We understood then, that urinals would also have to be designed to ensure a behavioural change and to clean up our streets better.
The second experiment we tried involved a 20litre Bisleri can and engine oil, materials what were cheap and accessible to everyone. The water can was upturned and a major portion of the top half was cut off, the mouth of the can was then fixed to pipes which were connected to the sewage line. Engine oil was then poured down the drain, and this was intended to block urine and air from mixing. Oil was observed to be a good solvent and deterrent, and fulfilled its purpose of reducing the smell, but although it was successful in combatting the smell, it was not seen to be a viable long term solution for numerous reasons. Firstly, it required a lot of maintenance with oil having to be poured every second day or so, and this just did not seem feasible; the lesser maintenance required the better. Secondly, it could cause a lot of clogging as remnants of it remained still, and it could potentially cause severe sewage problems. With potential setbacks such as these, a better model had to be developed.
It was back to the drawing board for team Reap Benefit, and with another of our principles in mind, ‘Fail fast and learn faster’, we persevered and worked on designing an innovation which met all the requirements. It was understood that to combat the smell, we needed to block the passage of air in to the pipes, and after experimenting with a few objects, it was something as simple as a table tennis ball which appeared to be the best option. The table tennis ball was placed at the mouth of the PVC pipe and this ensured a slower trickle of water down the drain and blocked air passageways. After many tries and experimentation, the tennis ball revealed itself to be the best option. However, before introducing the innovation to schools and the public, a change in design was also a requirement, seeing as the earlier version was kicked around as most urinals were placed outdoors. Using the Bisleri can still, we instead cut off a rectangle on one side of the upturned can, rather than the top half and mounted it on the wall. The new design was implemented in a few places and after observing it for some time, it was declared a success! In brief, it is an innovation which is simple and low cost, required less maintenance, and was not reliant on water to ensure it remain clean and sanitary.
It has been four years since the first implementation of our version of a waterless urinal, and while it has been challenging in many ways, it has also been a huge success. The urinals have been installed in several schools all around Karnataka, including Bengaluru and Hubli, and have drastically improved the sanitation and hygiene. The foul smell of urine has recorded to have been reduced, and even more importantly, it was observed that behavioural changes began to be instilled in students, with them understanding the importance and necessity of using the correct facilities, instead of just urinating anywhere. While these successes have been recorded on a large scale, it has not been without obstacles. Approaching schools and convincing them of the purpose and need of such an innovation, was one of the bigger challenges we faced, as well as the tennis balls being stolen, and nails rusting. And while the urinals serve their purpose, they however are not aesthetically pleasing, which brings us to the next step to improve the existing model.
The journey of the waterless urinal has been quite an experience, with most people finding it hard to digest. Nevertheless, chances were taken and the innovation has a success rate of 60%, with majority of the schools happy and pleased with how situations have improved. The year 2016 also saw the implementation of waterless urinals in a private school to already existing urinals. The table tennis balls were added here and the intention was to eradicate smell and moreover to cut down the usage of water. While the innovation began with the intention of improving sanitation, it is now also an important product for cutting down the use of water.
The Waterless Urinal has survived the test of time and weather conditions and has proved to be a durable product which delivers on its promises. The design has undergone through several transformations over the years, and while it requires a makeover still, that does not take from it the success stories it has brought out, and while hurdles may continue to cross our path, with this innovation we are confident enough about it, and the beneficial aspects it serves to ensure its further and future success. | <urn:uuid:87908f73-94f5-4b4c-a2a1-6d4efce606c4> | CC-MAIN-2018-05 | http://www.reapbenefit.org/2016/09/27/journey-of-the-waterless-urinal/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887414.4/warc/CC-MAIN-20180118131245-20180118151245-00612.warc.gz | en | 0.979958 | 1,675 | 2.65625 | 3 |
The incidence of Attention Deficit Hyperactivity Disorder, commonly called ADHD or ADD, has exploded -- a relatively uncommon syndrome has become a household word. Three to seven percent of the children in the United States, over 4 million of them, are being diagnosed with this "disease," and 2.5 million are being treated with Ritalin or some other long-term medication. This is a 1,600 percent increase since the 1970s! It sometimes seems that every time we turn around, another child has been diagnosed with ADHD and placed on pharmaceutical medication, which the child is expected to take throughout childhood and even for life. Worse yet, there is very little solid research concerning the long-term benefits or side effects of these medicines.
What is going on here? Have millions of our children become so hyperactive and unable to focus that they are incapable of succeeding at school or dealing with the demands of normal life? Or are we creating an illness where there is none, calling normal variations in temperament and personality a "disease" that requires the intervention of long term, and extremely profitable, pharmaceutical medication?
Furthermore, for those children who really are having difficulties, can we go back to basics? Can we find more natural, less invasive and less dangerous methods for healing these children and enabling them to succeed and thrive without the necessity of pharmaceutical treatment?
As an integrative pediatrician who has helped hundreds of children diagnosed with ADHD over the past 20 years, I offer these practical points to consider:
1. ADHD is often grossly and carelessly misdiagnosed and overdiagnosed. All too often a teacher complaint and a 10-minute talk with a pediatrician results in an ill-considered diagnosis and an indefinite prescription for psychostimulant medication. This hurried process can miss both simple explanations (a gifted child who is bored, a poor fit between student and teacher, parents without adequate time and resources to motivate an intense and difficult child), or more serious problems like anxiety, depression, dyslexia and other learning disabilities.
2. If a child really is having significant attention issues, nutrition, and not medication, is the place to start. Many children begin the day with pop-tarts, Lucky Charms, and similar junk food. We might as well pour table sugar down their throats and send them off to learn. I have seen many children whose attention problems were fixed simply by providing them with a good breakfast and a decent lunch (often hard to obtain at your typical school).
3. In addition to the basics of nutrition, many children have real food allergies or sensitivities. Several research studies have shown, for instance that artificial colors and flavors can make normal children hyperactive and hyperactive children worse. Think about that the next time you see a child downing a huge bottle of bright purple Gatorade. For some kids, even such basic foods as milk and wheat can be triggers for hyperactive behavior.
4. Omega-3 fatty acids, found in fish oil, have been shown in multiple research studies to have significant and sometimes dramatic positive results in children with ADHD. These studies have shown that ADHD children are usually even more deficient in these crucial fats than are most people in our country, and that a daily fish oil supplement can result in dramatic improvement.
5. Recent research has shown that deficiencies of such basic minerals as iron, zinc and magnesium can contribute to ADHD symptoms, and adding simple supplements of these minerals can help improve those symptoms. Levels of these nutrients can be easily checked by your doctor, but very few do so.
By the way, why don't most doctors know and tell you about this? It is because all too many physicians get their information from pharmaceutical representatives and from conferences sponsored by pharmaceutical companies. These companies have no interest in letting anyone know about cheap and simple nonpharmaceutical treatments. It is also a sad fact that most of the "experts" who write articles in prestigious journals about the "correct" treatment for ADHD receive significant financial support from these same companies.
6. Let's not forgot the important role of good parenting in fixing what may look like ADHD. Unfortunately, many have little time for proper parenting. Imagine working or single parents picking their child up at six o'clock, after seven hours in school and three hours in aftercare, then having to rush home and trying to find time to make a decent meal and supervise homework. Is it any wonder everyone is overstressed and kids can't concentrate? Most kids are resilient and will get by, but for the child who may have a harder time concentrating in the first place, this could put him or her over the edge. It's no wonder a simple pill looks like an easy alternative.
7. ADHD has also been linked to too many hours of TV watching and video game playing. These may seriously impair children's ability for sustained attention and focus.
8. Finally, are our schools part of the problem? Caring and hardworking teachers are being given larger classes, less time to teach, and forced by "No Child Left Behind" to teach only for standardized tests. Entire schools are judged by their student's performance on these tests. Again, encouraging parents to place their children on medication can become an all too easy solution.
There are some children with severe ADHD who truly need medication, but many more who are misdiagnosed or have mild symptoms. Let's do better evaluations, and begin with basic, simple and safe interventions before exposing children to what might be a lifetime of powerful medications with long-term effects that are not really known.
For more details and information on natural, safe, effective therapies, see my book "ADHD Without Drugs: A Guide to the Natural Care of Children," with a foreword by Andrew Weil, M.D. It's filled with information that parents, educators and other health professionals can understand and put into immediate practical use. | <urn:uuid:5d6a42e5-60a1-4c59-83cc-4b8906eae781> | CC-MAIN-2015-48 | http://www.huffingtonpost.com/sanford-newmark-md/do-25-million-children-re_b_708093.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398465089.29/warc/CC-MAIN-20151124205425-00026-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.966466 | 1,199 | 2.796875 | 3 |
What is the purpose of State Caucuses and Primary Elections ?
Well folks it time for the four year election circus to start and with that comes a lot of questions about the United States election process. We have all been bombarded with Republican Debates, and hours of conversations about the upcoming State Caucuses and Primary Elections.
The purpose of these events is so that each political party can select a nominee fairly at their National Conventions. Caucuses are private events paid for by the particular party looking for their nominee. So for example, the upcoming Republican Iowa caucus is paid for by the Republican Party. However, not all states use the caucus method to select Presidential candidates some States such as Virginia use the Primary Election method.
Primary Elections are state run where potential candidates have to submit petitions to the states that hold these elections to be on the ballot. So for example, in VA if you want to be on the ballot you need to have at least 10,000 signatures and must include 400 signatures from each Congressional District as well. Once on the ballot, registered voters go to their local polling place and select which candidate that they think is best.
Once all the voting is done either through a caucus format or primary the votes for all the different candidates are counted and then turned into "delegates". Each party has a set number of delegates. Delegates are registered and active party members who go to the National Convention and vote for their party's candidate. Each party has their own number of delegates and divides them based on their specific party rules. Once, all the delegates are divided they go in turn to their National Convention and vote. After all the voting is done at the convention the candidate with the most votes is the winner of their Party's Nomination and will go on to represent them in the General Election.
While, this is a crazy process it does insure that,we the voters are fairly represented at these conventions. So, when the caucuses come to your town or Primary Elections happen make sure that your voices are heard. Vote!!!! After all, people have fought, sacrificed and died for this process in order to keep our system, warts and all, free and fair. | <urn:uuid:eee762f0-7b9e-432b-ac0f-2eb012a1e34f> | CC-MAIN-2017-30 | https://hubpages.com/politics/What-is-the-purpose-of-State-Caucuses | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423269.5/warc/CC-MAIN-20170720161644-20170720181644-00628.warc.gz | en | 0.974819 | 439 | 2.90625 | 3 |
Materials engineers at the Khalifa University of Science and Technology in the United Arab Emirates have used Projection Micro Stereolithography (PµSL) to fabricate microfluidic devices for porous materials research by capturing the surface minerology and pore-throat morphology of carbonate rock. Studying fluid-solid interactions in porous materials is important to research in earth, space, energy, environment, biological, and medical applications. PµSL, a micro-precision 3D printing technology from Boston Micro Fabrication (BMF), produced a porous micromodel that was seeded with a solution-based mineral coating. A thin layer of calcite crystals was then grown in situ.
Porous materials and their interactions with fluids have applications in hydrocarbon energy extraction, carbon sequestration, and thermal energy storage. In porous materials like carbonate rock, researchers have struggled to characterize and manipulate fluid-solid interactions because pore-throat morphology is heterogenous and surface wettability is complex. Yet, PµSL technology can create microfluidic devices that model carbonate rock and that have transparent networks of channels for ease of observation.
At the Khalifa University of Science and Technology, researchers used a BMF S130 3D printer to produce a complex anisotropic model with up to 2µm feature resolution. The inner surfaces of this microfluidic device were then seeded with calcite nanoparticles (CalNP). The resulting growth of crystals inside of the micromodel provided a benchtop research platform for studying the microscopic fluid-solid interactions in many subsurface energy and environmental applications.
The materials engineers described their development of this research platform in a paper, “Empowering microfluidics by micro-3D printing and solution-based mineral coating”, that was published by The Royal Society of Chemistry.
Interested in learning more? Download the full paper here. | <urn:uuid:980c4cfb-bed7-4cc2-906d-68153ff7259d> | CC-MAIN-2021-10 | https://bmf3d.com/blog/micro-3d-printing-produces-microfluidic-devices-for-porous-materials-research/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178355944.41/warc/CC-MAIN-20210226001221-20210226031221-00217.warc.gz | en | 0.903902 | 396 | 3.328125 | 3 |
The 4 misspellings of Mallary, why journalists get names wrong & how to get them right
My parents loved the show "Family Ties" so much that they decided to name me after one of the main characters, Mallory Keaton. They wanted to make the name more feminine and distinct, though, so they decided to spell it with two A's.
"It's not Mallory, it's Mallary!" my mom used to tell people, putting an emphasis on the "O" and the "A."
I've repeated those words throughout my life and have found that journalists have an especially hard time spelling my name right. Though they could easily look at my byline or e-mail signature to see the correct spelling, reporters and editors have addressed me as "Mallory," "Mallery," "Malory" "Malary," and yes, even "Melanie."
Craig Silverman, author of "Regret the Error," said academic research shows that misspelled names are the sixth most common newspaper error. Misquotes are the most common, followed by incorrect headlines, numerical errors, general misspellings and incorrect job titles.
"It is one of the easiest things to verify and yet it's one of the things journalists think about verifying the least," Silverman said. "We use names on such a frequent basis that it's the kind of thing that lends itself to assumptions."
The error is so common, Silverman said, because journalists forget to ask for the right spelling, they do it from memory, they assume the name is spelled the "normal way," or they're misled by incorrect sources online.
Relying on other sources -- even ones that are usually reliable -- doesn't always work. The New York Times, for instance, has spelled numerous names wrong throughout the years (as has Poynter).
Drawing on the Times' own corrections, Silverman said the paper has referred to Jackson Pollock as "Jackson Pollack" at least 66 times. Silverman pointed out in his book that the Times has also misspelled Dan Aykroyd's name at least 45 times, Madeleine Albright's at least 40 times, and Philip Morris' at least 128 times. A few years ago, former public editor Clark Hoyt wrote about the Times' history of misspellings, saying "The New York Times misspells names at a ferocious rate."
Silverman said by phone that the "misspelled name champion" was Theodore Sorensen, an adviser to President John F. Kennedy. In a correction a few years ago, the Times acknowledged having misspelled his name more than 135 times in headlines and articles.
Last October, the Times wrote an obituary on Sorensen, saying he had once predicted that journalists would get his title wrong and misspell his name in his obit. The Times got Sorensen's name right in the obit, but that same week The Washington Post ran an obituary and misspelled it.
Journalists also misspell more common names, Silverman said, because they assume they know how to spell them correctly and don't bother checking.
Sometimes, if a simple name appears in the same story as names that are especially difficult to spell, the writer is more apt to focus on the hard-to-spell names. This was the case in one of Dave Barry's columns a few years ago.
"In yesterday’s column about badminton, I misspelled the name of Guatemalan player Kevin Cordon. I apologize," Barry wrote in a correction. "In my defense, I want to note that in the same column I correctly spelled Prapawadee Jaroenrattanatarak, Poompat Sapkulchananart and Porntip Buranapraseatsuk. So by the time I got to Kevin Cordon, my fingers were exhausted." (Silverman declared this 2008's correction of the year on his "Regret the Error" blog.)
Why misspellings matter
Research has shown that inaccuracies cause the public to lose trust in the media. Particularly when it comes to misspelled names, sources may assume that if a reporter got a name wrong, he or she may have gotten other more significant facts wrong, too.
Silverman pointed to a newspaper that misspelled Abraham Lincoln's name.
"You can imagine how maybe it was a slip of the finger, and you can see how it would happen," Silverman said, "but when you're a reader and you see your newspaper has misspelled 'Abraham Lincoln,' there's something about that that's going to strike home with you and make you think, 'Is this really a paper I should be reading?' "
And if you're the source whose name was misspelled, you can't help but wonder just how much the journalist who interviewed you really cared. Names are a part of who we are, so we feel disrespected when journalists don't take the time to spell them right.
"When you misspell someone's name, it's something that's taken very personally and I think it really taints the person's view of you," Silverman said. "It says you're sloppy and that you're careless, and perhaps also suggests that the source didn't have such a big impact on you. It's just so easy to have gotten right that people can't understand why you got it wrong."
How to get names right
The best way to ameliorate the problem, Silverman said, is to start every interview by asking for the correct spelling of the source's name, and his or her title. Doing so on a regular basis he said, sends a message to sources that you're committed to accuracy.
"One of the key things about accuracy is that it's a learned behavior," Silverman said. "If you create habits that reinforce accuracy, then your chances of making an error are greatly reduced."
When I'm interviewing a source I ask for the correct spelling of his or her name and then read it back to verify that I heard and typed it correctly.
After I've written the story, I double check to make sure the spelling of the name in my story matches the spelling in my notes. And I check the name every time it appears in the story. (When fact-checking this story, for instance, I noticed I had spelled Sorensen's two different ways.)
If I'm quoting someone else's work in my story, I copy and paste the person's byline rather than writing it by sight or memory.
I've had my own byline misspelled enough times to know that it gets frustrating after a while. (Just Google "Mallory Jean Tenore" and you'll see what I mean.)
A few times, I've written to bloggers who have spelled my name wrong and asked them to correct it. Other times, I just roll my eyes and joke that I'm going to change my legal name to "Mal."
I can just hear my mom now: "It's not Mallory, it's Mallary!" | <urn:uuid:9684b516-4bf6-4132-89f1-e569d15cd82f> | CC-MAIN-2016-40 | http://www.poynter.org/2011/the-4-misspellings-of-mallary-why-journalists-get-names-wrong-how-to-get-them-right/115894/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660467.49/warc/CC-MAIN-20160924173740-00310-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.969801 | 1,464 | 2.546875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.