text
stringlengths
144
682k
1. Home 2. IdeaLab IdeaLab: Stimulating thinking on current topics of interest An initiative to encourage innovation IdeaLab is a forum for reflecting on current topics of interest to Canadians. Experts from the Canadian Commission for UNESCO’s broad network explore a variety of topics such as disinformation, Indigenous cultural heritage, climate change, and education. IdeaLab offers new perspectives to encourage intersectoral and cross-disciplinary dialogue. A hand offers a plant, and the plant grows outward to touch the land, water and the universe, and in the background, there is a pattern of the land. Colors are purple, blue and yellow. June 21, 2021 Land as teacher: understanding Indigenous land-based education What is Indigenous land-based education and what is it not? Four Indigenous voices from across the country share their insights on what it means to them, why it's important for both Indigenous and non-Indigenous Peoples, and how it can support reconciliation efforts in Canada. Read the article. People of all ages and background walk a non-linear path together. Reconciliation and Global Citizenship Education in Canada Read the article Oluseye at Nia Centre for the Arts. He stands behind a mural with various pictures. Art for our sake: creativity and humanity in the African diaspora For people from Afro-diasporic communities, artistic spaces have always been places of self-expression, community and well-being. Mark V. Campbell explains the tensions that exist within a cultural system that is exploitative and unresponsive to the historical realities of Black creatives. Read the article A grey radio is placed in the centre. You can see a white screen with purple radio waves and three buttons (one green button on the left and two purple buttons on the right). A light brown retro design makes the background. A cream-coloured circle is placed to the left of the radio. Four dark brown curves surround the circle. A brown circle is placed to the right of the radio. Four cream-coloured curves surround the circle. Community radio: the eternal springtime of radiobroadcasting More than 100 years ago on May 20, 1920, radio broadcasting began in Canada. Boris Chassagne, director of 60 Secondes Radio, discusses the importance of this mode of communication. Read the article An abstract painting made of various shapes and lines. The following colours are seen on the canvas: black, blue, light blue, white, orange, red, and grey. Montreal, landscapes and lockdown This article, written by Philippe Poullaouec-Gonidec, studies the consequences of the health measures and restrictions imposed during the Spring 2020 COVID-19 lockdown in Montreal. The impacts on certain urban spaces are exposed. Read the article In the center, a black and white picture of Maria Ressa wearing a red blazer. She is surrounded by a yellow circle. The turquoise coloured background is made of newspaper clippings. A few yellow, white, and grey zigzags complete the background. Growing threats to media freedom: democracy under assault Maria Ressa, co-founder, Executive Editor and CEO of Rappler calls for readers to educate themselves and demand accountability from social media platforms and governments. Read the article A mosaic illustration of human faces. A Sense of Belonging: To what? And on whose terms? In this article, author David Divine explores the complexities of belonging, particularly in relation to Black communities in Canada. Who defines acceptance, and why do we seek to belong? These questions and answers are explored drawing on a sociological exploration of inclusion and broader meanings of belonging. Read the article School children and their teacher wear masks and maintain social distancing. Education and COVID-19: challenges and opportunities The UNESCO Chair in Curriculum Development explores the challenges and opportunities created by the COVID-19 crisis for education stakeholders in terms of curricula, school environments, students and teachers. Read the article
Is NASA’s plan to destroy ISS a good idea considering the inflating cost of Space station? • Twitter • Facebook • Google+ • Pinterest NASA is an independent agency of the Federal Government of the United States responsible for working on the civilian space program as well as aeronautics, and aerospace research on what’s happening outside of our home. For almost half of last century, NASA was mostly working on finding resources on Mars so that the Humanity can sustain itself on the surface of Mars, as the technology got better and better the horizons of research got bigger and bigger. As a result in 1998 NASA with the help of the space agencies of fifteen other nations including Russia and many European countries. The artificial satellite is orbiting very close to earth and has been the home for 226 astronauts yet. Most of the work that occurs in the space station deals with how our atmosphere is evolving and how the world outside of Earth is shaping. For more on ISS click here. However, NASA is now planning to dismantle ISS due to the lack of funds from its supporters. The Plan NASA’s policy regarding the ISS has been changing slightly since the start of the program, but there were no drastic changes. However, since the start, if Tump’s government many policy elements regarding ISS have changed, last year the acting head of NASA Robert Lighthood hinted on the Plan of abandoning or controlled destruction of ISS is under consideration. The new plan was given by the head of human spaceflight a week before the interview. He said that they are now considering to make a new spacecraft that will be comparable to the size of a standard school bus, and this “armored space bus” called “Deep space gateway” will circle the astronauts around the moon by 2025, and then a new spacecraft will start its journey through the space in 2033, thus expanding the Horizons of Human space travel and perhaps reaching Venus too. According to plan, ISS will fall somewhere in the Pacific ocean at sometime 2024. Now to fund the new program NASA had to cut down the costs of its existing projects and ISS being the most cost incurring project will potentially be the one that may take the hit. They said the $3 billion yearly bills of the ISS would cut down to finance the new project. Now let’s see how good or bad is the plan of getting rid of the ISS? Image: Nasa Potential benefits of destroying ISS ISS is hovering on the orbit that is very close to Earth, and since the drag force has the most effect on this orbit, ISS is coming down ever so slightly with every second, thus there is a possibility that it may de-orbit and fall on the Earth and it can cause destruction on the inhabited area if it is not controlled. Since the space station is fairly big the cost of getting the satellite to a higher orbit will be well over the books. So, they must do something before the slight possibility may not turn into an inevitable reality. So, they may have to destroy it or make it fall on the surface of Earth such that the place of impact is inhabited. On the other hand, ISS is not designed to work unmanned so, just abandoning it would not solve the problem in hand. Because of its structural flaws and the atmospheric pressure astronauts have to do more work on its construction rather than research which was the primary purpose of getting the international space station. All in all, it is very costly it makes the ISS work and getting ISS to a higher orbit where it will not be affected by anything in space will literally be astronomical. What can be done if it’s not destroyed? ISS was the biggest project of the 20th century which had costs of billions of dollars and included almost all developed countries. It even made the arch enemies USA and Russia sit on the same table. The scientists were so much confident of the project that the news that was circling at that time was humanity had started its search for the new home. It had many grandiloquent promises which as the time passed were becoming reasonable due to the intense advancement in the technological sector. It even fulfilled some of the promises, while due to the structural flaws it became invaluable for the scientists. However, NASA’s veteran Micheal Foale is still hoping that something can be done with the ISS, it has been the epitome of human development for a lot of time, he does not want the ISS to end up in the Pacific ocean. In an interview with BBC, he said, “I’m hoping that commercial space can come up with a business plan that allows part of the ISS to be maintained in space, without sinking it into the Pacific Ocean. You have to come up with innovative ways of keeping it in space.” Only time can tell how good his proposition of dealing with the ISS is. ISS was and has been one of the greatest achievements of humankind, which has laid foundations for the further, much bigger and cost-effective projects such as the “Deep space gateway.” However, due to its structural flaws, the costs and no return in any form is forcing the governments to stop financing the project in the future. Micheal Foale’s proposition seems good but it’s too much to ask for a private investor, but it is not the right time to pass judgment on it. According to the current scenario and state of events, it would be rational to make it fall into the ocean so that the funds can be allocated somewhere else. error: Content is protected !!
Urinary incontinence has many possible causes and it can afflict people of any age. However, many of these factors correspond with old age, which is why the elderly are more prone to bladder control problems. Some of the conditions that come with old age and contribute to urinary incontinence include weakened or overactive bladder muscles, weak pelvic floor muscles and nerve damage from diseases such as diabetes or Parkinson’s disease. Men may also suffer blockage of urine out of the bladder from an enlarged prostate as they age. To make matters worse, old age diseases like arthritis may make it difficult for the elderly to get to the bath­room in time. Another medical condition that largely affects the elderly and exacerbates incontinence is Alzheimer’s disease. Patients sometimes either do not realise that they need to urinate, forget to go to the bathroom or are simply unable to find the toilet due to their impaired mental state. Treatment for age-related incontinence Bladder dysfunction in the elderly can often be improved through medication, medical devices, physiotherapy, surgery and lifestyle changes. It is possible to condition the body through exercise to strengthen the pelvic floor muscles, scheduling urination, or drinking more water and less alcohol and caffeinated beverages. If the incontinence problem is beyond treatment, there is also the option of adult diapers and catheterisation. Depending on the patient’s mobility, mental alertness and degree of muscular control, there are several methods of catheterisation available to them: • External catheters, aka condom catheters or male catheters, consist of a sheath made out of PVC, latex or silicone, with an adhesive to attach it to the penis, with the standard tube coming out of the other end, connected to a drainage bag. • Intermittent catheters are inserted through the urethra into the bladder to urinate whenever necessary. • Indwelling urinary catheters are inserted into the bladder through the urethra, with an inflatable balloon end to keep the catheter in position at the bladder, while the outside end of the catheter leads to a drainage bag. • Suprapubic catheters are surgically passed through the abdominal wall, directly into the bladder and they need to be replaced every six to eight weeks. Risks of urinary tract infection from catheter use While catheters are invaluable for managing the bladders of the elderly, there is an increased risk of infection to the urinary tract with long-term use. The catheter can sometimes introduce bacteria or fungi to the bladder over extended periods, allowing microbes to multiply and cause what is known as a Catheter-Associated Urinary Tract Infection (CAUTI). Indwelling catheters are a major cause of CAUTI in hospital wards. How UroShield can help lower risks of CAUTI The risk of infection greatly diminishes the usefulness of indwelling and suprapubic catheters for bladder management. However, there is now a way for catheter users to lower the likelihood of infection and it’s called UroShield. UroShield is a compact external medical device that generates low-frequency, low-intensity ultrasound waves along the full length of the catheter, up into the balloon and down into the bag, both on the outside and inside surfaces of the catheter. The ultrasound gently vibrates the catheter to stop the bacteria from adhering to the catheter and forming the biofilm – preventing infections from developing. Where biofilm is present, UroShield helps to break up the protective layer which normally protects the bacterial colony from antibiotics, giving it a better chance at curing the infection. The vibrations also prevent catheter encrustation and blockage, caused by crystalline deposits of mineral salts in the urine. UroShield also helps to reduce catheter-associated bladder spasms and pain and is effective for any kind of catheter, both urethral and suprapubic. To find out more about how UroShield works and what it can do for you, get in touch with us at 020 8773 7844 or fill out our online form. You may also like:
How to Use Computers? There is so much to creating and handling documents in Word that more always seems less. Here are some tips and tricks to help you out. The more recent versions of MS Word offer new special effects to your text. If you're looking for a new way to make  a headline or title stand out, try the following - Select the text you want to change and go to the menu option titled 'Format' followed by 'font'. Then go to the middle column and under effects, choose any one effect that you want from the following - outline, shadow, emboss, engrave. You can also view the effect you choose in a small box in the corner. Once you click OK, you will find your headline displaying the selected effect. Remember that the larger the text size, the better these effects will look in print. You can change everything on your default document - fonts, spacing between paragraphs, heading styles and so on. You just have to change the style template that your document uses. This style template is the de facto standard your text file chooses whenever you open a new document or work on an existing one. In order to change this template, you can use Word's 'Style Gallery'. Take the following steps: 1. Choose Format - Style Gallery from the top menu. 2. Select a template from the 'Template' box. 3. You can see what your document will look like from the preview box. 4. When you find the look you like, click OK. Word Wisdom 1. Select a rectangular block of text at any point on a page by pressing the 'Alt' key on your keyboard while dragging the cursor. 2.  Draw quick lines by simply typing several dashes or underlines and hitting 'Enter'. 3. To highlight a sentence anywhere in your document, hold the 'control' key down and click on the sentence. Simple Explanations to Terms and Phrases used in the Digital World Internet :  The vast collection of interconnected networks that use a common language called TCP / IP. The Internet rose from the Arpanet and today links billions of computers in almost every country of the world. In simpler words, the Internet is a worldwide computer system that people use to exchange messages. Byte :  A set of bits that represent a single character. Kilobyte : A thousand bytes. Megabyte : A million bytes. Network : Anytime you connect two or more computers together, to enable them to share resources, you have a computer network. WWW :  frequently used when referring to the 'Internet', www or just 'the web' is that part of the internet allowing text, graphics, sound, video, files etc to be mixed together. Subscribe to our Newsletter
Archived | Autism Coalition: What Is Autism?, Common Characteristics & Possible Causes | Circa December 2003 #NotAnAutisticAlly #AutisticHistory Autism Coalition: Not An Autistic Ally Screenshot of Autism Coalition: What is autism? page. Full text below. What Is Autism? Autism is a developmental disability that generally appears between the ages of 15 and 20 months of age. In most cases, the child is progressing normally, and then begins to regress, losing speech, social skills and physical abilities. While there are varying degrees of severity, most children completely withdraw into a world of their own.  A frightening aspect of the disorder is that children cannot assess sensory input properly. Autistic children cannot perceive fear or dangerous situations, nor can they filter and ignore stimulus. This sensory overload would be equivalent to your being intensely aware of the feel and color of this paper, the sensation of each article of clothing you are wearing, every single sound coming from the street and inside the building around you, and the fluorescent lights and every object that reflects the light near you. If a child with autism could read this letter, they would have to endure all this and more while trying to concentrate and comprehend this material. Normal functioning under this kind of sensory bombardment is nearly impossible.  Autistic children typically have a host of biomedical and neurological problems as well. Many suffer from chronic diarrhea because their intestines are so damaged that they cannot absorb vital nutrients, minerals and vitamins essential for optimal brain function. Liver and kidney functions are impaired, causing their bodies to store up high levels of toxins found in the environment such as lead, mercury, arsenic and other heavy metals. Their immune systems are compromised to the extent that they cannot fight off even the simplest of fungal, parasitic and bacterial infections.  Children do not outgrow autism. There is no cure. It is a lifelong disability with a normal life expectancy. It affects boys five times more than it affects girls, although girls are generally more severely affected.  In the United States over one million individuals live with autism, making it more prevalent than Down Syndrome, childhood diabetes, and childhood cancer combined.  Click on the links below to find out more about the disorder itself. Screenshot of Autism Coalition: Common Characteristics of Autism. Full text below. Common Characteristics of Autism Infants with Autism Avoid eye contact Seem deaf Start developing language, then abruptly stop talking altogether  Social Relationships Act as if unaware of the coming and going of others Physically attack and injure others without provocation Inaccessible, as if in a shell  Exploration of Environment Remain fixated on a single item or activity Practice strange actions like rocking or hand-flapping Sniff or lick toys Show no sensitivity to burns or bruises and engage in self-mutilation, such as eye gouging  Normal Infants Study mother’s face Easily stimulated by sounds Keep adding to vocabulary and expanding grammatical usage  Social Relationships Cry when mother leaves the room and are anxious with strangers Get upset when hungry or frustrated Recognize familiar faces and smile  Exploration of Environment Move from one engrossing object or activity to another Use body purposefully to reach or acquire objects Explore and play with toys Seek pleasure and avoid pain  * This chart is furnished by the National Institute of Mental Health. This list is not intended to be used to assess whether a particular child has autism. Diagnosis should only be done by a specialist using highly detailed background information and behavioral observations. Screenshot of Autism Coalition page: Possible causes of autism. Full text below. Possible Causes of Autism It is generally accepted that autism is caused by abnormalities in brain structures or functions. The brain of a fetus develops throughout pregnancy, and, at the time of birth, has become a complex organ with distinct regions and subregions, each with a precise set of functions and responsibilities.  Brain development does not stop at birth, however. The brain continues to change throughout the first years of the child’s life. Scientists are learning that a number of problems may interfere with the brain’s development. For example, certain types of cells may migrate to places in the brain where they are not meant to be. Some parts of the brain’s intricate communication network may disrupt the overall task of coordinating sensory information, thoughts, feelings and actions.  Among the possible factors contributing to autism is heredity. Several studies involving twins suggest that autism can be inherited. This is also supported by findings that suggest parents who have one child with autism are at slightly increased risk for having more than one child with autism. While genetics does seem to play a role in autism, it does not seem to be due to one particular gene. While no one gene has been identified as causing autism, researchers are searching for irregular segments of the genetic code that autistic children may have inherited. It also appears that some children are born with a susceptibility to autism, but researchers have not yet identified a single “trigger” that causes autism to develop.  Another potential factor in the development of autism is the pregnancy period itself. As the brain grows and develops during pregnancy, anything that disrupts normal brain development may have lifelong effects on the child’s sensory, language, social and mental functioning. For this reason, certain conditions, such as the mother’s health during pregnancy or problems involving the delivery, are being researched to see if they interfere with normal brain development.  Individuals who have certain medical conditions seem to be more at risk for autism. These conditions include Fragile X syndrome, tuberous sclerosis, congenital rubella syndrome, and untreated phenylketonuria (PKU).  An area of controversy and concern in the autism community is the link between vaccinations and autism. In particular,  vaccines which contained thimerosal (a mercury-based preservative) are believed by some to be associated with the development of autism.* Another area of controversy is whether the Measles-Mumps-Rubella (MMR) vaccine is linked with autism. In a 2001 investigation by the Institute of Medicine, an expert committee concluded that the “evidence favors rejection of a causal relationship…. between MMR vaccines and autistic spectrum disorders (ASD).” Moreover, a recent Danish study of the health records of over 530,000 children in Europe found that the rate of autism was virtually the same for children who had received the MMR vaccine and those who had not. While many researchers note that there is no definitive proof of a link between the MMR vaccine and autism, most agree that more research is needed.  *Thimerosal is no longer used in vaccines administered to children six months and younger in the US. Fact: Vaccines Do Not Cause Autism. Screenshot of Autism Coalition: How Autism Is Diagnosed page. Full text below. How Autism Is Diagnosed Presently, autism cannot be diagnosed by any one medical test. An accurate diagnosis can only be made after a trained professional has observed the communication, behavior, and developmental skills of the individual. Parental (and other caregivers’) input and developmental history can be very important in the diagnosis process.  Many of the traits associated with autism are shared by other disorders, such as hearing loss, speech problems, mental retardation and neurological problems. Because of this, it is not uncommon to order various medical tests to rule out or identify other possible causes of the symptoms being exhibited. Distinguishing autism from other conditions is crucial, as an accurate diagnosis and early identification will aid in the creation of an appropriate and effective educational program and treatment regimen.  Once other conditions have been ruled out, it is necessary to visit a professional who specializes in autism. Experts in autism may come from a variety of disciplines, including child psychiatry and psychology, developmental pediatrics or pediatric neurology. Autism specialists use a variety of methods to identify the disorder. Using a standardized rating scale, the specialist closely observes the child’s language and behavior. A structured interview is also used to elicit information from parents about the child’s behavior and early development. The specialist may also test for certain genetic and neurological problems. After assessing observations and test results, the specialist makes a diagnosis of autism only if there is clear evidence of poor or limited social relationships, underdeveloped communications skills, repetitive behaviors, interests, and activities. People with autism generally have some impairment within each category, although the severity of each symptom may vary. The diagnostic criteria also require that these symptoms appear by age 3. Some specialists may be reluctant to give a diagnosis of autism, however, as they fear it may cause the parents to lose hope. Because of this, the specialist may apply a more general term that simply describes the child’s behaviors or sensory deficits. For example, children with milder or fewer symptoms are often diagnosed as having Pervasive Developmental Disorder (PDD). Although terms like PDD do not significantly change treatment options, they may keep the child from receiving the full range of specialized educational services available to children diagnosed with autism. They may also give parents false hope that their child’s problems are only temporary. Research has shown, however, that early diagnosis can lead to dramatically better results for those suffering from autism. With an early diagnosis, the child can immediately begin benefiting from one of the many specialized intervention approaches. Again, while there is no one test that can diagnose autism, several specialized screening methods have been developed that are now used in diagnosing autism. To see a description of several of these methods, as provided by The Autism Society of America, click here. Information furnished by The National Institute of Mental Health (NIMH). Fact: You can’t cure Autistics from being Autistic. Fact: You can’t recover an Autistic from being Autistic. Fact: Vaccines Do Not Cause Autism. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
Instability in Niger: How Boko Haram Affects Poverty News Writing, Poverty, Published The following was published on The Borgen Project’s Magazine. You can read it here SEATTLE — Niger is the second least developed country in the world, according to a 2016 U.N. report. Of the 19.8 million people in Niger, 49 percent live in poverty, 81 percent live in rural areas where food insecurity is high and 20 percent lack sufficient levels of food. Niger has a 3.9 percent annual growth rate–one of the highest in the world–and is prone to political instability and food insecurity. There are many contributing factors to poverty and instability in Niger. However, a major source compounding the situation is Boko Haram, a terrorist group originating in Nigeria. The Rise of Boko Haram Founded in 2002 by the cleric Mohammad Yusuf, Boko Haram began as an organization intending to teach Wahhabism, a fundamentalist Islamic ideology focused on purely monotheistic worship. The organization’s name has become loosely translated to “Western education is forbidden.” This translation ties into the group’s primary belief: all aspects of Western culture are prohibited due to Boko Haram’s belief that Western teaching has contributed to the severe poverty that Nigeria faces today. Following the end of the Sokoto Caliphate in 1903, British colonial missionaries came to power in Nigeria. Christianity and Western education were imposed on the indigenous populations, fostering suspicion and mistrust. Yosuf and his followers believed that the Western Christian education, introduced by the British colonialists, “was responsible for entrenching the status quo in a country in which 60 percent of the population live in dire poverty on less than $1 a day,” according to The Independent. Furthermore, the majority of Nigeria’s wealth resides with the Christian populations in the south. To say that a terrorist organization such as Boko Haram has emerged solely due to poverty–or any one cause–would be an inaccurate oversimplification of complex political, economic and cultural issues. That said, poverty has had a hand in exacerbating tensions and potentially contributing to a much greater problem. Boko Haram emerged in the poorest part of Nigeria, where more than 50 percent of the population is malnourished and 71.5 percent live in extreme poverty. The emergence of Boko Haram, and its subsequent violent extremism, has spilled over the border into Niger, heightening poverty and instability in Niger. Poverty in Niger Niger has been relatively peaceful over the last few years, though conflict from violent extremist groups outside its borders, such as Boko Haram in Nigeria, have caused an increase in people seeking refuge, a strain on national resources and further instability in Niger. In 2017, the political climate of Niger was stable, though the arrival of Boko Haram in Niger caused security disruptions along the border of the Diffa region. Jihadist attacks and drug smuggling in the Tillaberi and North Tahou regions encouraged the Niger government to bolster defense and security forces and to launch new military operations. The G5 Sahel countries (Burkina Faso, Mali, Chad, Niger and Mauritania) launched Operation Barkhane and MINUSMA in 2014 and 2013, respectively, to combat terrorism in these regions. In Bamako in July 2017, a new military operation is estimated to cost €423 million, plunging Niger into a public debt of 37 percent of its GDP in 2018. The devastation caused by Boko Haram has amplified instability in Niger: food insecurity has increased, governmental debt has skyrocketed and a humanitarian crisis is underway, due to the 300,000 refugees and displaced persons in Niger. Due to the military operations, the government has closed markets, restricted access to land for farming and banned fishing. The incomes of the people of eastern Niger have been reduced to a tenth of what they had been before Boko Haram invaded Niger. The emergency measures are severely limiting people’s access to food, markets, money and supplies, contributing to increased food insecurity and reliance on humanitarian aid. The increased spending on security and Niger’s hosting of refugees is estimated to cost 1 percent of Niger’s annual GDP. To cope with the humanitarian needs of local Nigeriens and the refugees from Nigeria, the Niger government has requested assistance from developmental partners and implemented a $40 million emergency plan. Solutions to Instability in Niger Despite the high rates of poverty and instability in Niger exacerbated by violent extremist groups such as Boko Haram, there are many organizations working to reduce poverty. Save the Children has made progress in Niger by integrating health, protection and nutrition programs. Additionally, they are working to increase children’s access to education, deliver lifesaving medications and alleviate suffering among child refugees, internally displaced children and returnees. Concern Worldwide, an international agency, has been integrating food security, health and education programs in Niger since 2005. These programs are designed to strengthen the healthcare system by providing additional support and training, food, medicine and equipment. Additionally, Concern Worldwide distributes seeds to Niger’s farmers and trains them on better farming techniques to help improve their crop yields and food production. The United Nations High Commissioner for Refugees and the International Rescue Committee both provide protection, assistance and emergency support in Niger and Nigeria for victims fleeing Boko Haram attacks. The International Rescue Committee is working with local primary care facilities to improve sanitation and reduce malnutrition in Niger. Though instability in Niger is severe and influenced by a variety of factors, one of which is Boko Haram, there are many organizations working in Niger to lessen the devastating impact of poverty. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
What is the biblical meaning of the Day of the Lord? : a day inaugurating the eternal universal rule of God: a in the Old Testament : an eschatological day of ultimate judgment bringing final deliverance or doom. What does the day of the Lord mean in the Bible? What is the coming day of the Lord? The Day of the Lord is a time of judgment, a time when a sentence is passed and settled forever. It is a day that is coming for certain as Obadiah said, “For the day of the Lord is near upon all the heather; as thou hast done, it shall be done unto thee: thy reward shall return upon thine head” (Obadiah 1:15). IT IS INTERESTING:  Frequent question: How do you become married in the Bible? Why do you long for the day of the Lord? Why do you desire this, the Day of Yahweh, for yourselves? It is darkness and not light. It appears that the Israelites were longing for the Day of the Lord, meaning (they thought) the day when God would fulfill their destiny as his covenant people and make Israel essentially rulers of the world. Who told the Israelites that the day of the Lord would be a day of darkness? Amos was sent. a day of darkness for the Israelites. follow Jesus’ example. How do we keep the Day of the Lord holy? Who changed the Sabbath to Sunday? What day is the Lord Day in Revelation? The Lord’s Day in Christianity is generally Sunday, the principal day of communal worship. It is observed by most Christians as the weekly memorial of the resurrection of Jesus Christ, who is said in the canonical Gospels to have been witnessed alive from the dead early on the first day of the week. What is God’s Judgement described as? Objective and subjective judgment IT IS INTERESTING:  You asked: When did the Mormon pioneers arrived in Utah? In Catholic doctrine, divine judgment (Latin judicium divinum), as an imminent act of God, denotes the action of God’s retributive justice by which the destiny of rational creatures is decided according to their merits and demerits. What was the prophet Joel’s main message? What prophet was taken up by a fiery chariot? In the Bible, in the Second Book of Kings, we read how the Prophet Elijah was taken up in a chariot of fire: “behold, there appeared a chariot of fire, and horses of fire… and Elijah went up by a whirlwind into heaven”. Is Jesus the Lord? When we accept Jesus Christ as our Savior, it involves a recognition of His lordship, for the Savior who saved us when we received Him by faith is the Lord Jesus Christ. We cannot and do not receive Him as Savior only. We receive Him as Lord and Savior. Who anointed the first king of Israel? Author of Introduction to the Old Testament. Saul, Hebrew Shaʾul, (flourished 11th century bc, Israel), first king of Israel (c. 1021–1000 bc). According to the biblical account found mainly in I Samuel, Saul was chosen king both by the judge Samuel and by public acclamation. Which tribe of Israel worked in the Tabernacle? The Tribe of Levi served particular religious duties for the Israelites and had political responsibilities as well. In return, the landed tribes were expected to give tithes to the Kohanim, the priests working in the Temple in Jerusalem, particularly the tithe known as the Maaser Rishon. IT IS INTERESTING:  Best answer: How many religions are in the World 2019? What does God warn the Israelites about through Zephaniah? Boldly predicting the destruction of Judah for the evil committed by its occupiers, the prophet spoke against the religious and moral corruption, when, in view of the idolatry which had penetrated even into the sanctuary, he warned that God would “destroy out of this place the remnant of Baal, and the names of the … What prophet criticized the rich people and was banished from the temple? Amos (prophet) Died 745 BCE Venerated in Judaism Christianity Islam Feast June 15 (Orthodox) Major works Book of Amos Saving grace
How does a Laser Cutter work? 2/4/2018 laser cutting Laser Cutting is a very popular technique used across many different industries. But how does it actually work? Lasers and why they are used for cutting Laser stands for Light Amplification by Stimulated Emission of Radiation. These days, Lasers are used for many different purposes. The most popular area is cutting of materials like stainless steel, mild steel, aluminum, wood, plastics and many others. This process is very accurate and provides excellent quality cutting with a very small heat-affect zone. Laser is also used for engraving and etching of materials. This means that laser is an ultimate solution for decorating, packaging, manufacturing, construction, electrical and other applications. What is the laser cutting process? A column of very high intensity light is called a laser beam. In most of CO2 lasers, the beam travels from the laser resonator, which creates the beam, through the machine’s beam path. Mirrors are typically used to direct the beam to a lens, which focuses the light at the work zone. The focused laser beam goes through the bore of a nozzle right before it hits the plate. A special lens or a curved mirror does the focusing of the laser beam. This process takes place in the laser cutting head. The beam has to be focused very precisely so that the shape of the focus spot and the density of the energy in that spot are consistent, perfectly round and centred in the nozzle.  A jet of air, oxygen or nitrogen is also passed through the nozzle. Because a large beam is focused to a single very small point, the heat density at that spot is extreme. On CNC laser cutters (such as the Amada LCG3015 used by LaserSpeed), the laser cutting process is controlled by special software. Using the special drawings file, the laser cutting head is moving over the metal plate in the shape that is specified by this file. There are many parameters that are controlled by the CNS laser cutter to ensure high quality and a very accurate cutting process. Advantages of laser cutting  Laser cutting has many advantages apart of high quality and accuracy. For example, mechanical cutting is more time consuming and not that effective in terms of saving materials. Laser cutting has no cutting edge which means that there is less material wasted after work is done. Because laser systems have a small heat-affected area, there is a lower risk of damaging the material. It is also possible to cut some materials that are difficult or impossible to cut by more traditional means. Laser cutting has a couple of advantages over waterjet and plasma cutting. Laser is more accurate and more energy efficient. Modern laser machines operating at higher power are approaching plasma machines in their ability to cut through thick materials, but the capital cost of such machines is much higher than that of plasma cutting machines capable of cutting thick materials like steel plate. Laser Cutting with LaserSpeed  LaserSpeed aims to make the laser cutting process easy. Having a team of professionals on-site, customers just need to have an idea of product they want to have and LaserSpeed will do everything: drawing design, selection of correct materials, take care of the cutting process and deliver it right to your door. To learn more about laser cutting and other available services provided by LaserSpeed, please visit our website or talk to our friendly team. A wig with a very clip in hair extensions beautiful curl, light hair is also very hair extensions foreign, with a baseball cap, it looks a little playful.This long curly wig has hair wigs uk a regular mid-wave volume and a remy hair extensions classic Qi Liu, which is very sweet.
Meaning of Background What is Background: Background It is an English word that means 'bottom', 'under the surface' or 'background'. Although in English it is used extensively in many areas, such as the Spanish word “fondo”, the same is not the case when it is used in the Spanish language. The word background used in the context of the Spanish language refers specifically to the experience or training of a person in relation to a matter or in relation to their own history. In that sense, one can speak of a background professional, academic or personal, all of which make up the substrate or the fund on which a person is constituted. We speak in this case of work experience, academic training or level of instruction, life experiences that influence the behavior or attitude of the person, etc. The term, therefore, has a wide use in the field of human resources. For example: “Could you tell me about your background professional?". Another way to use the expression in Spanish could be: “All the responsibilities to be assigned will depend on the background of the candidate ”. Background in computer science In the field of computing, the term background refers to the execution of systems, programs or activities that take place in the background during a certain work session. It can also be used in an everyday sense to name the background of the graphical interface screen. See also: • Backup • Back office Tags:  Religion-And-Spirituality General Sayings And Proverbs
Best answer: Can a 4 month old fake cry? What age do babies start fake crying? However, by the end of 20s after crying, positive affect emerged in approximately 65% of episodes (confirming that fake or not, a parent’s responsiveness alleviates distress rapidly). Finally, only one of the two children showed this “fake crying” pattern, but showed it as early as 7 months of age. Can babies pretend to cry? Parents sometimes think their babies cry just to get attention, and a new study from Japan backs up this notion: babies can “fake cry”, the study says. … Fake crying could add much to their relationships,” Nakayama said. The child who exhibited fake crying, called infant R, also had more episodes of real crying. Can a 4 month old baby manipulate? That’s because young babies who feel a deep trust in their parents tend to develop a secure sense of self that helps them self-soothe later on. Newborns aren’t manipulative. Can babies fake laugh? Laughing – in many ways – has the same effect on social partners as playing. … For example, infants can employ fake laughter (and fake crying!) beginning at about six months of age, and do so when being excluded or ignored, or when trying to engage a social partner. IT IS IMPORTANT:  How long is Xanax in breastmilk? Can 3 month old baby fake crying? There is no specific age when a baby may begin fake crying. Babies usually learn several new communication skills between the ages of six and 12 months (1). Therefore, a baby may display more episodes of fake crying between the ages of six and 12 months. Why do babies fake screams? Babies have hunger cries, pain cries, overstimulation cries, and another amorphous category known as the fake cry – which happens when nothing is actually wrong, but baby is still trying to get attention. Researchers in Japan captured and analyzed this fake cry over the course of 6 months. Do babies cry when they want attention? Before you know it, you’ll probably be able to recognize which need your baby is expressing and respond accordingly. But babies also can cry when feeling overwhelmed by all of the sights and sounds of the world — or for no clear reason at all. Why does my 4 month old keep yelling? Babies this age are learning how to interact with the world around them. To get your attention, your baby might cry, fuss, or squeal. To get a better view of the room, babies may use newfound strength to push up on their arms while lying on the belly. Why does my 4 month old keep crying? Colic. Colic is the main cause of recurrent crying during the early months. All babies have some normal fussy crying every day. When this occurs over 3 hours per day, it’s called colic. Can you spoil a 4 month old? IT IS IMPORTANT:  What age do babies stop wearing scratch mitts?
Was Sherlock Holmes the first to use forensics? Was Sherlock Holmes the first forensic scientist? Sherlock Holmes worked as a consulting detective in London with his partner Dr. John H. … Holmes was a freelance detective as well as a forensic scientist, the first of his time. Who used forensic science first? Although it is uncertain exactly where the concept of forensic science originated, most historical experts agree it was very likely in China around the 6th century or earlier. This belief is based on the earliest known mention of the concept, found in a book titled “Ming Yuen Shih Lu,” printed in that period. How did Sherlock Holmes contribute to forensic science? Sir Arthur Conan Doyle, author of the Sherlock Holmes stories, has long been credited as an influence to forensic science due to his character’s use of methods such as fingerprints, serology, ciphers, trace evidence, and footprints long before they were commonly used by actual police forces. Did Sherlock Holmes use forensic science? But Conan Doyle resolved that his detective would solve his cases using reason. … Conan Doyle made Holmes a man of science and an innovator of forensic methods. Holmes is so much at the forefront of detection that he has authored several monographs on crime-solving techniques. THIS IS IMPORTANT:  What does a forensic counselor do? Did Sherlock use the scientific method? Sherlock Holmes would reason his way to the answer using both old and new forensic methods. … But Holmes does solve a number of his cases using scientifically based forensic methods. He truly is the first scientific detective in fiction. What famous cases did Sherlock solve? The list is therefore as follows: • The Speckled Band. • The Red-Headed League. • The Dancing Men. • The Final Problem. • A Scandal in Bohemia. • The Empty House. • The Five Orange Pips. • The Second Stain. How did Sherlock Holmes solve crimes? Holmes thinks otherwise. Sherlock Holmes never uses deductive reasoning to assist him in solving a crime. Instead, he uses inductive reasoning. … Deductive reasoning starts with a hypothesis that examines facts and then reaches a logical conclusion. What method did Sherlock Holmes use to solve most crimes? Sherlock Holmes is famous for using his deductive reasoning to solve crimes. But really, he mostly uses inductive reasoning.
Opinion: Composting should be mandatory in New York City In Japan, all residents are responsible for sorting their trash into several waste streams. They are required to label clear garbage bags with their name and address, so the contents can be easily identified. If anything ... Climate action can lessen poverty and inequality worldwide If all countries adopted the same tax on carbon emissions and returned the revenues to their citizens, it is possible to keep the global temperature from rising more than 2 degrees Celsius while also benefiting well-being, ... When variations in Earth's orbit drive biological evolution Coccolithophores are microscopic algae that form tiny limestone plates, called coccoliths, around their single cells. The shape and size of coccoliths varies according to the species. After their death, coccolithophores sink ... Satellites to enable monitoring of CO2 emissions Researchers have developed a model that can calculate individual countries' carbon dioxide emissions from fossil fuel burning using observations from space. The new results could be put to use within the Earth observation ... Laser spectrometer precisely monitors atmospheric N2O and CO Nitrous oxide (N2O) and carbon monoxide (CO) are important drivers in global warming. However, there are many difficulties in reliable monitoring, especially for N2O, as the concentration of N2O in atmospheric is only a few ... page 1 from 1 Carbon (pronounced /ˈkɑrbən/) is the chemical element with symbol C and atomic number 6. As a member of group 14 on the periodic table, it is nonmetallic and tetravalent—making four electrons available to form covalent chemical bonds. There are three naturally occurring isotopes, with 12C and 13C being stable, while 14C is radioactive, decaying with a half-life of about 5730 years. Carbon is one of the few elements known since antiquity. The name "carbon" comes from Latin language carbo, coal, and, in some Romance and Slavic languages, the word carbon can refer both to the element and to coal. There are several allotropes of carbon of which the best known are graphite, diamond, and amorphous carbon. The physical properties of carbon vary widely with the allotropic form. For example, diamond is highly transparent, while graphite is opaque and black. Diamond is among the hardest materials known, while graphite is soft enough to form a streak on paper (hence its name, from the Greek word "to write"). Diamond has a very low electrical conductivity, while graphite is a very good conductor. Under normal conditions, diamond has the highest thermal conductivity of all known materials. All the allotropic forms are solids under normal conditions but graphite is the most thermodynamically stable. Carbon is one of the least abundant elements in the Earth's crust, but the fourth most abundant element in the universe by mass after hydrogen, helium, and oxygen. It is present in all known lifeforms, and in the human body carbon is the second most abundant element by mass (about 18.5%) after oxygen. This abundance, together with the unique diversity of organic compounds and their unusual polymer-forming ability at the temperatures commonly encountered on Earth, make this element the chemical basis of all known life.
Cologne/Bonn Airport is the international airport of Germany's fourth-largest city Cologne, and also serves Bonn, former capital of West Germany. It is named after Konrad Adenauer, a Cologne native and the first post-war Chancellor of West Germany. Konrad Hermann Joseph Adenauer (1876 – 1967) was a German statesman who served as the first Chancellor of the Federal Republic of Germany (West Germany) from 1949 to 1963. He was co-founder and first leader of the Christian Democratic Union. He played a major role in rebuilding the nation from the ruins of WW II. He was often referred to as the "Der Alte" ("the old man"), and was in his seventies when he was elected as the Chancellor. Under his leadership and guidance, Germany became a democracy and achieved stability and economic prosperity. He also became famous for forging close relations with former German enemy nations and for re-establishing the position of Germany on the international stage. A qualified lawyer, he was interested in politics from a young age and was active in the Cologne city council, soon becoming the Mayor for Cologne. He was a strong opponent of Adolf Hitler and the Nazi Party and he was imprisoned for 2 days in 1934. He was also imprisoned in 1944 and accused of being involved in the July Plot. He was released from an internment camp at Brauweiler in 1944. After the war he was elected as the first Chancellor and in this position he played a pivotal role in the country’s reconstruction. More Info:
Crystallization of worthless time Crystallization of worthless time resin, wax, pigment “Kintsugi” is a technique used in Japan for repairing broken vessels. Lacquer and metal are used to join breaks in vessels and fill up chipped places. Vessels are a crystallization of functional beauty that draw close to our lives. “Kintsugi” connects our feelings for those vessels with the future. It is nothing other than wrapping time called feelings around something which has value, so to speak, and making that thing even more valuable. The concept termed “wabi-sabi”, which is peculiar to Japan, and is similar to, yet different from, Western modernism. The big factor encompassed by this minimal beauty is time. The basis of this work is a panel made while mixing resin, wax, and pigment, which are materials which have different time axes – that is, different congealing points and melting points. The panel’s broken lines, full of unpredictability, are displayed and repaired using “kintsugi”. Breaking a mere worthless thing which does not involve time in our lives, and on the other hand, affirming that temporality only, and connecting it with the future. This is an endeavor which uses time to give value to something which at first glance has no value, and it is a crystallization of worthless time. What He Made “Crystallization of Worthless Time” is a work produced by Seitaro Yamazaki to discuss Kintsugi (golden joinery) as a Japanese traditional technique to repair pottery can be related to what kinds of times. \What make up the picture are wax, epoxy resin, pigment, lacquer, and gold. Both wax and epoxy resin being the support media of this work can be liquid, solid or gas, but the conditions for these phase transitions being generated are totally different and these two materials are in different time axes thermally. Exactly because in different time axes, cracks will be found in these two. What fills such cracks is Kintsugi using lacquer and gold. Kintsugi that is supposed to have been called out for anchoring two separating times will, precisely because it is Kintsugi, create a unique time in which Kintsugi is a scenery in itself. The way how these materials exist are also the allegorical meaning of a phenomenon where individuals are forced to live several time phases in today’s society. We have to live at least both the time phases of digital space and our own body concurrently, which will inevitably cause a time fracture within an individual. However, when something which can flexibly join such a fractured surface has been brought about, more than one time phase and their joint area within an individual may on the whole produce forms, colors and beauty unique to him or her. Why He Made Seitaro Yamazaki has been consistently working on the visualization of multiple times existing (or may exist or may have existed) in the world we live in and examining how such time groups can be related with each other. What Seitaro Yamazaki addressed in “Crystallization of Worthless Time” was the process to examine the bandwidth of time groups which can be generated by a craftwork repair technique called Kintsugi that has been developed in the islands of Japan. Kintsugi was originally designed and has been developed as a technique to repair damaged pottery and restore their functions and therefore its basic role was to join the “time before being damaged” and the “time after being damaged” by the “restoration and maintenance of functions”. Through the appearance of the time being the functions of pottery at a place discontinued due to the damage and by restoring the functions of pottery, Kintsugi produces new times and beauty values thereafter. What Kintsugi is requiring as the joint surface for times is a nominal scale to make a distinction between functioning and not functioning as pottery. Meanwhile, what Kintsugi is joining in this work is a picture with no function or value in itself which has appeared in this world with carrying two time axes at the same time but is destined to break apart early. Since this picture does not have a function, unlike Kintsugi for pottery, there is no way to do Kintsugi for joining times before and after. However, in parallel, by joying through Kintsugi two times separating from each other, it becomes possible to produce new times and beauty values not being exposed to a nominal scale of functions. How He Made Seitaro Yamazaki first created the picture by pouring into a form the mixture of wax, pigment and epoxy resin and then dried it at the point when a satisfactory texture was obtained. Because wax and plastic cannot be chemically bound through such a method and their toughness and malleability differ, unexpectedly shaped cracks will be generated on the picture as being dried. Further, after fracturing the picture as it was by throwing it at the floor, he filled kokuso lacquer in the fractures surface and dropped golden powder on it – so-called Kintsugi -, which is how this work has been produced. A big Kintsugi displayed in the upper right corner of the picture is a part filled with fragments lost when the picture was fractured. Facebook Instagram Youtube To receive news on upcoming exhibitions and artworks. Please subscribe to our newsletter.
Iraq's incoming cabinet is approved by the Council of Representatives (photo via Government of Iraq website). Iraq’s Missing Federation Council Iraq peacefully experienced last month its fourth transfer of authority, with Adel Abdel Mahdi sworn in as prime minister. But since the 2003 invasion led by the United States, Iraq has not been successful in translating democracy from an ideal abstract to a functioning system. This is partly because conflicting parties have chosen to use mechanisms beyond state institutions to resolve issues. The undermining of Iraq’s modern, democratic institutions—whose establishment has been a remarkable development—has led to their paralysis. Although parliamentary democracy is new to the Iraqi people and the state, the parliament has been one of the most active of Iraq’s institutions. Surrounded by a region of authoritarian and undemocratic countries and contending with internal conflicts, Iraq’s parliament has offered hope for protecting rights of all from the dictatorship of the majority. Yet, despite this success, the parliament’s upper house, constitutionally defined as the Federation Council, has never been established. Establishing the Federation Council would be a step forward in Iraq’s democratization and ability to resolve disputes. Constitutional Provisions Implementation of the Iraq Constitution, which was supported by a majority of Iraqis and which was a pioneer step in building a new Iraq, has remained a key issue. The failure to implement the constitution was one of the main reasons used to justify the Kurdish independence referendum. Establishing the Federation Council has been one of the least discussed issues but a serious demand of the Kurds, now some Shiite and Sunni parties similarly back it. Per Article 48 of the Iraqi Constitution, “The federal legislative power shall consist of the Council of Representatives and the Federation Council.” Furthermore, according to Article 65, the Federation Council is “to include representatives from the regions and the governorates that are not organized in a region. A law, enacted by a two-thirds majority of the members of the Council of Representatives, shall regulate the formation of the Federation Council, its membership conditions, its competencies, and all that is connected with it.” Although per Article 137 the Council of Representatives should have issued a decision by a two-thirds majority vote in its second electoral term, this article remained unimplemented. The political consensus among the main Iraqi constituencies­—the Kurds, the Sunnis, and the Shiites—that has managed politics post-2003 has resulted in disputes among the conflicting sides, more precisely between Erbil and Baghdad on one hand and Sunnis and Shiites on the other. Although the Council of Representatives has been one of the most active Iraqi institutions, it has been criticized for passing laws that have sometimes further divided these conflicting sides or for failing to pass desperately needed laws that would help the country end contradicting Baghdad-Erbil interpretations of the constitution. If the Council of Representatives had been able to pass the oil and gas law, for example, many of the disputes between Erbil and Baghdad could have been avoided. Additionally, when the Council of Representatives passes a law, it is approved by the president, who does not have power to veto it. Similar to the U.S. Senate, the Federation Council could have checked the laws passed by the lower house, and the requirement of a two-thirds majority to pass laws would have made it impossible for any political side in the Council of Representatives to impose its will over others. Strengthening Decentralization Many Iraqi political parties point out that they believe in in the principle of decentralized power, if not a strict federal system with strong regional governments, as is the case in Kurdistan. The new prime minister, president, and the speaker of the Council of Representatives also back this principle. Strengthening decentralization and empowering governorates and regions is in line with the constitution. Moreover, decentralization of power is essential for stability of Iraq, as local administrations can protect their areas through local police rather than militias. The Sunnis and the Kurds now have no issues with the Iraqi Army’s deployment in their areas, but they oppose the deployment of militias. Turkmen in Kirkuk also view Kurdish peshmerga and Asayish security forces in the city as militias. The Federation Council could make this decentralization a reality, as the members would be from the governorates and regions directly and could guarantee the constitutional rights of their constituents. Although Iraq has been federal since 2003 and the Kurdistan Region has been recognized officially as a federal region, both the Iraqi and Kurdistan governments have failed to decentralize power. The governments remain similar to the former Iraqi regime in their management of administrative powers. In the area of political disputes and political conflicts, federalism may be very suitable for power sharing, but democratic institutions need to be present to guarantee that the regions and governorates can protect themselves from the majority when it wants to impose its will. Nevertheless, many political parties feared that federalism may lead to secession, and some, such as former prime minister Nouri al-Maliki, wanted to have more powers in Baghdad. Since 2010—when Ayad Allawi was deprived of the right to form the Iraqi cabinet despite his Iraqiya coalition having won the parliamentary elections, leading Kurds and Sunnis to protest Baghdad’s decision-making process—there have been several proposals for establishing the Federation Council or replacing it with a new council. This issue was also used to justify former Kurdistan Region president Masoud Barzani’s call for the independence referendum held last year. During the Iraqi parliamentary elections this past May, Barzani renewed his call for establishing a strategic council representing all political constituencies until the Federation Council was established. Barzani might have been inspired by the Kurdistan Region Referendum Council, which made decisions concerning the referendum, or the Council of the Political Parties, which included representatives from all Kurdish political parties at monthly meetings to discuss political issues. Nevertheless, Barzani’s call was in opposition to the Iraqi Constitution, and such a council would undermine the Iraqi parliament, presidency, and cabinet. Instead, it could serve to satisfy the participation of key leaders such as Barzani and Allawi in the decision making process, rather than developing democratic standards, behaviors, and principles. Although the Iraqi Constitution does not discuss the nature of the Federation Council, political parties agree that its members should be experienced politicians, former lawmakers, and experts who could deal with laws and issues calmly and professionally on the basis of either skills and experience or expertise. As passing the laws at the Council of Representatives is by absolute majority, the demands of certain political sides have been that the Federation Council should require a two-thirds majority to approve laws to ensure that all regions and governorates will be content with them. How the governorates and the regions will be represented is the question for the different factions at the Council of Representatives to answer. Regions, however, should have a stronger presence so that interests of their citizens are protected. Unions should also have their own representatives so that the rights of workers they represent are not violated. The process of electing members of the council should be through elections, and requirements such as minimum age, expertise, experience, and skills could be set for candidates. As the elections in Iraq are bringing in some populist and uneducated members to the Council of Representatives, the Federation Council at which experts, experienced lawmakers and skillful and experts’ members represent regions and governorates is much more needed so as to check the laws the Council of Representatives passes. Despite all positive aspects of the establishment of a Federation Council, there are legitimate doubts that it would be able to resolve issues, as the political behaviors of the parties may not change significantly. Party leaders, rather than representatives in parliament, are still the ones who make decisions. The Iraqi people also fear that the Federation Council may merely become a financial burden on the Iraqi public budget, which is why most are not concerned about it and many of do not even know about it. Yet the Federation Council could strengthen the representation of minorities who are currently unheard in the lower house. Securing seats for minorities such as Yazidis, Christians, and Turkmen would not completely address their concerns, but it would definitely strengthen their representation. Such moves could prove to be essential progress in Iraq’s democratization and stability.
Colostrum intake has lifelong impact on calves The worst thing that can happen to a newborn calf is to not get colostrum, that all-important first milk produced by the mother after birth. Colostrum is high in nutrients and antibodies, which provide calves with their initial protection against disease. The quality and timing of getting the colostrum are also critical to calves. Years ago, Dr. Jim Quigley, who was a professor at the Universi­ty of Tennessee at the time, outlined the “5 Qs” of feeding colostrum effectively. I found these tips to be a great calf-raising resource: 1. Feed quality colostrum. 2. Use the proper quantity. 3. Provide it quickly. 4. Keep equipment squeaky clean. 5. Quantify passive transfer. If you can guarantee that calves are fed adequate amounts of high-quality colostrum soon after birth, using clean equipment and making sure that appropriate passive transfer takes place, you can protect the young animals from many diseases, increase their immune systems, improve their growth and help ensure healthy and productive lives. Colostrum contains high levels of immunoglobulins and other bioactive compounds that protect the young calf. To have colostrum with the appropriate immunoglob­ulins, the cow must be producing them. For your calves, follow the vaccination program recommended by the herd veterinarian. Generally, vaccinating cows six to nine weeks prior to calving and giving boosters three to six weeks prior to calving is one of the best ways to protect against common calf diseases. We have seen increased colos­trum yield and density in cows that were fed MFA Ricochet Mineral for at least 60 days prior to calving. The effect is more pronounced in heifers and in the summer, but then one would expect lower colostrum production in heifers and in the summer. Every calf should get colos­trum—bulls and heifers alike. Aim to feed 10% of calf bodyweight in colostrum within two hours of birth. Feed another 5% bodyweight 10 hours later. For a 90-pound calf, that typically looks like feeding 2 quarts of colostrum 30 minutes af­ter birth, 2 quarts an hour later, and 2 quarts 11-12 hours after birth. Every calf should get colostrum, but not every cow will produce colostrum that should be used. Some cows are not good sources, such as Johne’s-positive cows, cows with mastitis, cows leaking milk, etc. Thus, it is important to have a supply of colostrum for calves whose dams are compromised. A colostrum replacer should provide at least 100 grams of immunoglo­bins; if under 100, the product is a supplement, not a replacer. Even with the best colostrum ever, you need to feed enough— and more is better. I used to think that 2 quarts of good colostrum was more than enough. Dr. Roy Ax, professor of dairy science at the University of Wisconsin and University of Arizona, changed my mind. He tracked the survivability and longevity of cattle in which the only difference in management was whether the calves at birth got 2 quarts or 4 quarts of colostrum. The calves that received more colostrum had greater lifetime productivity. Colostrum feeding and collection equipment must be adequately cleaned. This step is critically im­portant. The equipment should be rinsed with warm water to get rid of dirt and colostrum residues. Then, while wearing appropriate PPE, scrub all surfaces with chlorinated alkaline soap and hot water. Make sure that the water stays hot—really hot. Note that most household water heaters are factory set for “hot” water to be 120°F, but to clean and sanitize equipment, the water temperature should be 165°F. Use an acid-sanitizing solution to rinse all equipment, and let everything dry completely. Cooling colostrum is also an important quality-control step. A milk jug full of colostrum put in the refrigerator takes a lot longer to cool than does the same amount of colostrum in a line pan placed in an ice bath. Fresh colostrum should be fed or prepped for storage within half an hour of harvest. A calf’s colostrum intake follow­ing birth can impact them through­out their life, either positively or negatively. The right amount at the right time can benefit overall calf health and reduce risks for calfhood diseases, increase average daily gain and more. Talk with your MFA live­stock experts for more information on helping your calves get off to the right start. • Created on . • Hits: 111 Eating too many acorns can make cattle sick Acorns drop off oak trees in early fall, and cattle often like to eat them. But acorns, along with oak buds and very young leaves, can be poisonous when eaten in excess. Cattle and sheep are more susceptible than goats, but the toxic compounds in oak, called “gallotan­nins,” are tough on the kidneys in all ruminants. Immature green acorns are the main culprit as they contain the highest levels of toxins, but cattle could be affected if they eat too many acorns no matter what time of year. Cattle with acorn poisoning will have lower dry matter intake and may be weak and listless. The oak gallotannins irritate the gastrointes­tinal tract, so cattle tend to “hunch up” and have off-color or bloody manure. Often there will be sores in their mouths, and they will become dehydrated. If producers don’t catch these signs early on, the cattle may experience rapid weight loss. The best way to prevent losses from acorn poisoning is to preclude cattle access to them. Move the herd away from dropped acorns or con­sider fencing off larger areas where oak trees are growing. Recognizing that this is not possi­ble in many situations, it’s import­ant to provide enough forage and supplements to keep cattle from wanting to eat acorns instead. Most of the time, acorn consumption is tied to a feed availability issue. Problems usually occur in pastures where there is not much grass left or not much hay fed. The amount of acorn toxins tolerated by an animal is influenced by the protein content of its diet. If the protein intake is high, the animal can con­sume more acorns without having poisoning symptoms. Making sure cattle stay hydrated will also help. Unfortunately, there is no sure-fire antidote for acorn poisoning. If signs are noticed soon enough, cattle supplemented with protein and good-quality hay should recov­er. For more progressed symptoms, there are a few care options. Ac­cording to the Merck Vet Manual, a pelleted ration supplement contain­ing 10% to 15% calcium hydroxide plus access to more palatable feeds may be used as a preventive mea­sure. Calcium hydroxide, anti-bloat medication and purgatives (such as mineral oil, sodium sulfate or magnesium sulfate) may be effec­tive antidotes if administered early in the course of disease. Fluid and electrolyte replacements may also help keep kidneys operating and correct dehydration. One of the most practical means of providing calcium hydroxide and other things that will help alleviate the problem is to offer MFA Perfor­mance First 20% Shield tub or MFA Performance First 16% tub. It is not effective to use a low-intake “all-in-one” tub, nor is it effective to use a cooked, low-moisture tub. MFA does offer a supplement specifically formulated for this situ­ation, Acorn Special Cubes, which are meant to be fed at 2 pounds per head per day to cattle. These cubes also contain calcium hydrox­ide and modest energy and protein content. However, they are not floor-stocked at MFA locations and would have to be ordered at a 2-ton minimum. That usually makes the Performance First tubs an easier, more economical solution. If you are going to provide cattle with calcium hydroxide, feed 0.2 to 0.25 pounds per head per day. Calcium hydroxide is hydrated lime or “builder’s lime.” It is dusty and noxious to handle. If you put calcium hydroxide into a grain mix to top dress, keep the moisture off it. Dry, oily things cattle like to eat work best as carriers, such as extruded soybeans or dry distillers’ grains. Calcium hydroxide that gets wet sets up like mortar, which is why it is used in the brick and block masonry building trades. It is much easier on all concerned to use pressed or poured tubs rather than to add calcium hydroxide directly to feed. For acute cases of acorn poison­ing, ask your veterinarian about specific treatments. My experi­ence has been that cattle exposed to acorns for a long time do not respond well. Producers need to be aware of the disease and get more nutrition into cattle so that they don’t eat the acorns. Well-fed cattle are more resistant to the toxins, and they are less likely to eat acorns if they have enough forage and feed. Prevention is far more effective than treatment. • Created on . • Hits: 1739 Use custom approach to start cattle on feed Cattle feeding is about risk management, providing nutrition to help the animals reach their genetic potential and caring for them in an environment they find welcoming. Animal performance starts with get­ting cattle on feed. If done correctly, quality will follow. Producers should take a slow-and-steady approach to starting cattle on feed, being attentive to the needs of each pen. Receiving programs are not one-size-fits-most. There are specific goals for each type of cattle and certain criteria the producer needs to appreciate. Management of the diets can have long-term impacts on performance. Considerations include: • Are they Health Track calves? • Are they bawling? • Were they sold through a sale barn? • Are they yearlings? • Are they local, or are they from the North, West, East or South? The step-up program will be affected by all of the above. When starting cattle on feed, ensure adequate amounts of clean, fresh water. The more water space, the better. If they don’t drink, they will not eat. Having a meter to mea­sure water intake is great. If calves are slow to eat, make sure they know where the water source is. It might be necessary to let the wa­terer run over to attract them to it. Make sure that the water is flowing properly and that it is good quality. If you’re unsure, have it tested at a lab for livestock suitability. When cattle are dehydrated, there are distinct visual symptoms—both physical and behavioral—such as lethargy, tightening of the skin, weight loss, reduced feed intake, increased fecal viscosity and drying of mucous membranes. The best approach is to avoid dehydration with adequate water supplies. Having delicious grass hay in the bunk is also good idea. Shipping and co-mingling stresses are hard on the animal and hard on the rumen. To feed the calf, we need to make sure to feed the rumen bugs. It is important to rebuild a proper rumen fiber mat and correct any disruptions caused by shipping stress. This will allow cattle to come up on feed in a healthy manner. It may not necessarily be quicker, depending on their risk factor, but it should be healthy and consistent. The biggest thing that a manager can control is how the calves are fed every day. If you do not have a pen walker or rider, consider feeding twice a day. This gives you two opportunities daily to observe the cattle. It is important to frequent­ly check pens for morbid calves. Problems recognized early are easier to fix. Not all cattle come up on feed the same way. A rule of thumb is to start at 1.5% of their bodyweight on a dry matter basis. As an example, start with 5 pounds of pellets and 5 pounds hay per head per day for 6-weight calves, and work up to about 2.5%, using 5 pounds of hay and 12 pounds of pellets such as MFA Cattle Charge R with Shield. Feed delivery needs to be appro­priate. It is undesirable to overfeed, and it is undesirable to underfeed. If you deliver too much feed, expect to see reduced palatability of the bunk ration and erosion of the feed-to-gain ratio. If you don’t provide enough feed, the cattle can be short on energy, protein, medication, vitamins and minerals, resulting in reduced performance. An advantage of feeding twice a day is that you can adjust the feeding rate within half a day. Ensure feed is fresh, whether it is silage, high-moisture grain, dry feed or liquid feed. Moldy, dusty hay, off-colored burnt corn, corn silage that has heated and so forth do not entice an animal to the bunk. No one likes to scoop bunks or pitch top spoilage, but it’s cheaper to pay for that labor than reduced perfor­mance or dead calves. It is very helpful to calculate the daily dry matter intake. If feed intake is less than expected, look at health issues, feed quality, feed availability, water availability and quality, cattle comfort and other factors. Monitor and evaluate the cattle every day. When doing this, don’t be on your phone when you feed or walk pens. It is important to spend time in the pen looking at and listening to the cattle. A common acronym is DART, representing four areas to be thoroughly assessed and monitored: Depression, Appetite, Respiratory and Temperature. Remember, how you start the cattle on feed will affect how they perform for the remainder of the feeding period. The bottom line is that dry matter intake is the most important driving force for healthy, high-performing cattle and the lowest cost of gain all the way to market. • Created on . • Hits: 3089 Stretch your forage resources Weather and growing condi­tions impact the yield and quality of forages fed to cattle. Despite all management efforts, there is an ever-present risk that adverse events will lead to a shortage of forages. In May and June, we had a really good idea that the drought in the Dakotas would result in reduced forage availability west of the river. Throughout the Corn Belt, expect­ed reductions in forage yield were spotty. In the Western U.S., the area under drought has continued to increase. When forage shortages do occur, there are several alternatives that may help stretch supplies. In terms of alternatives for dairy cows, we’re looking at replacements for alfalfa and corn silage. For beef cows, we typically need alternatives to fescue pastures. Usually, it is easier to replace the forage equivalent of a beef cow diet rather than a dairy diet. The specifications are more modest, and it takes a lot less to fill the shortfall. Consider feeding crop residues, such as corn stover, to beef cows. Corn stover refers to the plant material—including leaves, stalks and cobs—remaining in a field after it has been harvested. This is a pragmatic solution, and a common expectation is to budget an acre of corn stalks per month for each cow. For dairy cows, however, feeding stover is not always the most viable option. Mid-gestation spring-calving cows typically have lower nutrition requirements, so they may be able to handle the lower forage quality of corn stalks. However, corn stover does not have adequate nutritional value for wet milk cows. Treating and processing corn sto­ver to improve its digestibility and/ or protein content can increase its potential as feed, particularly with dairy cows, but there are some sig­nificant limitations. Corn stover is lower in bulk density, nutrient value and digestibility. It is also relatively resistant to handling and grind­ing and has a high transportation cost per pound of total digestible nutrients. When growing corn for grain, standability is important. Producers tend to select hybrids with a high lignin content in the stalk, which results in tougher plants that stand up better. From a corn grower’s perspective, this is desired. Lodged stalks can’t easily be picked up by the combine. As corn plants ma­ture, the amount of lignin increases, while the digestible fiber—cellulose and hemicellulose—decreases. The high lignin content of corn stover creates a challenge when fed to dairy cattle. The lignin acts as a barrier around the fiber, which hinders digestion by rumen bac­teria. To address these challenges, mechanical chopping and chemical treatment of stover is often used to disrupt the lignin barrier, increasing the accessibility of cellulose and hemicellulose for rumen bacteria and resulting in improved overall digestibility. Purdue University research found that using calcium hydroxide-treated corn stover can be a partial replacement for forage fed to dairy cattle without negatively impacting production. Calcium hydroxide is a common food ingredient used in a variety of applications, from pickling and preserving fruits and vegetables to adding calcium to fruit juices and baby formulas. It is formed by mixing water with calci­um oxide derived from limestone. At Purdue, researchers used corn stover that had been chopped, hydrated to 50% moisture, treated with 6.6% percent calcium hy­droxide, combined with distiller’s grains, and fed at low rates. The study proved that the treated stover could replace up to a quarter of the alfalfa or corn silage fed to milking Holsteins while maintaining perfor­mance. That was not true, however, for the untreated stover. Feeding calcium hydroxide-treated corn stover also resulted in more efficient feed-to-milk conver­sion compared to feeding untreated stover, and consequently income over feed costs were greater when treated corn stover was included in the diet. Another point worth consider­ing is the final calcium content of the treated stover when adding a calcium hydroxide treatment to feed. This might be helpful in some situations, such as if you’re needing to feed a restricted forage and high-grain diet to mature cattle. For dairy dry cows, however, it could result in excessive levels of calcium. For beef or dairy producers look­ing to expand your forage supply, talk with your MFA agronomy or livestock consultants for more information on how to effectively use corn stover in your feeding program. • Created on . • Hits: 3426 Cow-calf producers can reap creep feed benefits Livestock production is shifting from commodity to value-added markets. It is a lot easier to sell flesh on calves than it was years ago. With calves on their dam, however, a common question is how to pre­pare them for the next step. Dr. John Herrick, extension beef veterinarian at Iowa State University, promoted the idea of preconditioning calves more than 50 years ago. He believed that if calves were weaned for at least 30 days, vaccinated, fed from a bunk, taught to drink water from a tank or fountain, castrated, dehorned and treated for parasites before they left the cow-calf producer’s farm, they would be more properly prepared to thrive in their new home in the feedlot. Still, there has not been universal adoption of these types of programs, like MFA’s Health Track, within the cattle industry. One of the easiest-to-implement components of a preconditioning program is to offer creep feed. Creep feeding calves is a well-estab­lished management tool that will both increase weaning weight and produce gain. By filling the nutri­tional gap created when milk and forage can no longer meet calf di­etary needs, creep feed helps calves reach full genetic growth potential. As with any other management practice, creep feeding must be properly employed to succeed. Creep feeding teaches calves to eat and prepares them for wean­ing. As calves get bigger and less dependent on milk from mom, it is important that they do not over-eat creep. The conventional wisdom is that creep should supplement the forage, not replace it. If forage is unavailable, weaning the calves and dry lotting them tends to be preferred. The objective is to use creep feed to supplement the energy intake of rapidly growing calves to support the additional growth. The decision to creep or not to creep depends on whether it increases profit. Feed costs, price slide, equipment investment and labor are inputs that should be ac­counted for to more accurately look at the potential increase in profit. Creep-fed calves are usually easier to wean than naive calves and experience fewer setbacks. They also tend to adapt to feedlot rations quicker. When fence-line weaning, creep feeders serve as a nutrition base station to nourish calves. Feeding creep also reduces the variability of weaning weights. Every year—and within the year— forage quantity and quality can sub­stantially vary. If forage availability is restricted early in the year, dam milk production might be reduced. Offering creep feed will help these smaller calves. For older calves, creep feed can provide additional energy and protein when cool-sea­son pasture quality is declining and when the calves are more depen­dent on forage to support their weight gain. Creep feeding is also very effective if you need to stretch limited forage resources. Creep-fed calves eat feed bet­ter and will more quickly recover their weight lost in weaning and shipping. They have much better average daily gain the first 28 days post-weaning than do non-creep-fed calves. The increased calf weight has a significant effect on profit­ability. In newly received feeder calves, those that are creep-fed have reduced incidence of morbidity and mortality compared to others. Creep feeding provides an opportu­nity to use a coccidiostat to reduce the likelihood of the calves breaking with cocci when they are weaned. Creep feed is also an effective way to provide growth promotants or feed-through parasite control. While creep feeding gives you more pounds of calf to sell, the cost of those extra pounds can vary tremendously. Using more efficient creep feeds such as MFA’s Cattle Charge or Full Throttle will give better feed-to-gain ratios than will creep feeding commodities. Re­search data indicate that higher-en­ergy creeps will result in greater marbling improvement in carcass grade compared to high-fiber creep feeds. If necessary, MFA Cadence can be used as a limiter feed if ad lib intake is excessive. Creep feeding is one of the most practical practices to add value to calves, increasing weight and performance while reducing vari­ation and morbidity. Talk with the livestock experts at your local MFA affiliate to learn more about this practice and how it may fit your operation. • Created on . • Hits: 3294 About Today's Farmer magazine  ©2021 MFA Incorporated. Connect with us.
August 9, 2021 Are vaccines linked to lower Alzheimer's risk? Here's what the evidence says so far. Daily Briefing Several studies suggest a correlation between receiving common vaccines, including those against diptheria/tetanus and influenza, and a reduced risk of Alzheimer's disease, Allysia Finley reports for the Wall Street Journal. Your top resources on the Covid-19 vaccines The link between vaccines and Alzheimer's risk While multiple studies have shown a correlation between vaccination and a lower Alzheimer's risk, none have proven a causal link, Finley reports. Still, two decades' worth of research have produced some intriguing results. According to Finley, one of the first studies to suggest a link was published in 2001. In that study, researchers tracked around 3,600 Canadians who were over the age of 65. After adjusting for age, sex, and education, they found that having been vaccinated for diphtheria/tetanus, poliomyelitis, or influenza correlated with a 59%, 40%, and 25% reduction in risk for Alzheimer's, respectively. However, the study demonstrated only correlation, not causation, Finley writes. It also didn't account for other potentially influential variables, such as the fact that vaccinated people may have been more likely to get regular checkups and have fewer underlying medical conditions. But more recent research seems to support the notion that vaccination is tied to a lesser Alzheimer's risk—even when those additional factors are controlled for, Finley writes. For instance, a research article published in April in the Journals of Gerontology looked at the correlation between Alzheimer's and the tetanus, diphtheria, and pertussis (Tdap) vaccine using health records from the Veterans Health Administration and a database of private medical claims for adults over the age of 65. In that study, the researchers found—after adjusting for demographics, health services utilization, health conditions, and medications—those who received the Tdap vaccine had a 42% lower risk of developing dementia compared with those who hadn't. Similarly, a study published this spring in Vaccines looked at the health records of 12,185 bladder cancer patients in Israel and the United States from 2000 to 2019. It found that patients over 75 who had received BCG—a tuberculosis vaccine that's also used as treatment for bladder cancer—as a cancer treatment had a 27% lower risk of developing Alzheimer's between 3.5 to seven years later. "We attributed BCG's beneficial effect on neurodegenerative diseases to a possible activation of long-term nonspecific immune effects," the study authors wrote. For example, the BCG vaccine was shown to increase levels of anti-inflammatory cytokines, which could increase the number of T-cells that help regulate inflammation, Finley reports. Another study published this spring looking at BCG, from the Montefiore Medical Center and Albert Einstein College of Medicine, found that patients with bladder cancer who received the vaccine had a 60% lower risk of developing Alzheimer's and other dementias than patients who didn't receive the vaccine. And a study published last year by the National Heart, Lung, and Blood Institute looked at data of more than 5,000 people aged 65 and older participating in a cardiovascular health study. It found that participants between the ages of 65 and 75 who received a pneumonia vaccine were 25% to 30% less likely to develop Alzheimer's. Moreover, a separate study from the University of Texas' McGovern Medical School found that seniors who more frequently received influenza vaccines and got their first vaccine before age 60 were significantly less likely to develop Alzheimer's, Finley writes. Could Covid-19 vaccines have a similar effect? Because Covid-19 vaccines are so new, it's not yet clear whether receiving those vaccines is also tied to a lower risk of Alzheimer's. However, according to Finley, Covid-19 vaccines do trigger a strong immune response similar to that prompted by some of the other vaccines that have been studied. For instance, the mRNA Covid-19 vaccines have been found to generate cytokines like those spurred by the BCG treatment, Finley writes. Any direct benefit in reducing Alzheimer's risk would, of course, be in addition to the vaccines' main purpose: preventing Covid-19—a disease that may itself pose brain risks. Researchers at the Cleveland Clinic this summer found that Covid-19 infections "significantly altered Alzheimer's markers implicated in brain inflammation," Finley reports. (Finley, Wall Street Journal, 8/5) Have a Question?
© Copyright Architecture as Language  1.   Introduction  That architecture is a language of some kind or at least similar to one is an idea that appears fairly often in discussions on architectural theory. Usually the use of the term ‘language ‘ is confined to noting the similarities that arise between architecture and natural language in the sense that both systems can be seen to represent events taking place elsewhere so to speak.  That is, in some referent system or other. The similarity may sometimes be extended to noting that both systems use vocabularies of elements organized by some kind of syntax or grammar. However there is usually an implication that any similarity between them is no more than a sometimes useful but ultimately superficial coincidence. The ideas put forward in this paper propose that there are in fact deep functional similarities between architecture and natural language and that on this basis they are analogous in terms of their organization and functioning. It is proposed here that architecture, like natural language (written or spoken language), is simply one of many different types of language each with its own lexicon and grammar. Others would include music, scientific theories, art, political organization and many others. The definition of ‘language’ as it is used here is, therefore not a matter of the content, the substrate, the particular kind of lexicon or the ‘subject matter’ of any given system, but of what the system does and how it does it. In other words, the similarities and analogies between these different kinds of language systems reside at the level of their organization and functioning. In order to examine the idea of architecture as a language, it is important to define what a language is and does and therefore how well architecture fits within that framework. 2.     Similarities and Differences between Different  Kinds of Systems Architecture does not use notes or chords to produce its forms, and music does not use columns or windows. For most people such very obvious and yet very fundamental differences between systems would seemingly eliminate any possible similarity between them. Yet these differences only occur at one level of the system’s existence, namely that of the components or elements which are manipulated in its attempt to represent other systems.  The premise of this paper is that at the level of organization and function there are considerable similarities between different systems. The comparison will be made between architecture and natural language (written or spoken) starting with the following two general statements: a)  The difference between systems whether music or architecture or science is a matter of the medium or material which is manipulated to achieve the goals of the system. b)  The similarity between systems is a matter of the processes involved rather than components which are manipulated. Thus in order to find a similarity (if there are any) we have to compare the processes which operate within each system. Thus instead of searching for similes or metaphors we would look for ANALOGIES. That is, functional similarities, of organization or process between different systems. 3.     Language – A General Description As a general description of language one can suggest the following set of characteristics. One could, for instance say the following: a)     Language is a system of communication. b)  Each act of communication is a report or representation of things or events. It is an attempt to model a particular experience and transmit the form of that model to another. c)   In language representational process involves the combination of a finite number of discrete units to generate a potentially infinite set of statements about experience (the referent). d)    These discrete units form a vocabulary or lexicon while their arrangement is constrained by a grammar or syntax. In other words there only so many ways of arranging the units into a meaningful or legitimate statement. Language in this sense is rule-governed. e)       Language is a digital representation of an analogue (continuous/seamless) event. Digital in the sense of using a set of separate and distinguishable elements to describe an experience which has no such distinct internal divisions. f)  The closeness of the relation between the representation and the event to which it refers is a function of the particular arrangement of the elements (signs) of the language which is governed by syntactic rules. These are a matter of convention or historical usage. g)     Language can be analysed into syntactic, semantic and pragmatic processes. h)   Syntactics governs the legitimate combination of discrete units (based on collective previous usage) required to produce a meaningful statement. i)   Semantics refers to the difference between the intended and received meaning of a particular statement or report. More basically, does the report trigger the necessary or predicted response in the receiver? If it doesn't the statement is meaningless. Meaning is a function of probability or expectation. j)    Pragmatics refers to the intentions behind the statement – its intended meaning and the desired response in the receiver. This is a matter of the SELECTION of the discrete units to be used and the kind of syntactic level (mode, mood, register, attitude) required. Pragmatics is essentially a matter of context. k)    Language may be seen as a code while the statements produced can be seen as messages drawn from legitimate combinations of that code. l)     Language seeks to achieve both the accurate representation of events (the selection of discrete units and their legitimate combination through syntax) and the desired meaning of that statement as it is received by the recipient (pragmatics). 4.     Architecture as a Language Based on the general statements about language made above we can now look at how well architectural processes fit into that scheme of things. Thus: a)    Language is a system of communication, a report or representation of things or events between sender and receiver. Architecture communicates, reports or represents the organization of an institution (client, program) in a particular place and time (the context: location, finance, technology,etc). In other words a building is a report or representation of the functions and relationships within an institution and the immediate  context within which the institution will be materialized. That is the concrete reality of designing buildings. b)   Any statement in a language has a referent. It is always talking about something (event or thing). The referent in architecture is the institution, client or program which is being represented. c)    Language is digital. That is, it uses discrete elements (words, for instance) combined in certain legitimate ways (syntactic rules) to represent its referent. For architecture those discrete elements are architectural forms or compositional techniques selected from the current typical set of a style (the vocabulary). In architecture, syntax involves the conventional ways of combining architectural elements. Conventions which by definition are derived from past experience. d)   Elements are combined to define the function and relationships of the referent institution. Using the forms at its disposal and constrained by the prevailing rules of syntax architecture makes a metaphor of the institution; a metaphor in built form. That is, a form which represents the elements and relations of the institution. e)  For language there is always a statement about something. In architectural terms, the building is equally a statement about something: the referent institution. f)   While the number of typical (discrete) elements is finite, the number of possible combinations of those (buildings or statements) is infinite, though not all of these would be accepted as legitimate or meaningful combinations of form. g)   A set of elements plus the rules which govern their legitimate arrangement and from which statements can be derived is called a language. So too in architecture, a set of typical or conventional architectural forms plus the compositional rules which govern their arrangement can be termed a language. h)  In architecture, a particular or characteristic set of forms together with their conventional usage or rules of combination is called a style. i)    The typical set or style provides a code from which selections may be made for particular contexts. Legitimate combinations of form are constrained by the rules of the code. The style is the code, the building is the message derived from selections of forms and syntax of the code-style. j)     As a message, the building is a report about the ‘state of things’ in the referent institution in a particular context, namely this time and this place. k)    Meaning in architecture involves both denotative and connative dimensions of experience. The denotative refers to the expected or permissible arrangements of form which can be derived from the repertoire of a particular style. In other words it is ‘internal’ to architecture. The connotative dimension refers to the appropriateness (expectation) of these forms in a particular social or built context. This is the ‘public’ meaning of a particular combination of forms. l)  Architecture like written/spoken language is rule-governed. m) Architecture like Language can be analysed into syntactic, semantic and pragmatic processes. Syntactic constraints on architecture are, like written language, fairly easy to observe in the expected/unexpected relationships between stylistically familiar elements. So too, in many cases it is fairly easy to understand the architect’s semantic intentions behind the composition of the forms of the building. In other words the building can be analysed in semantic, pragmatic and syntactic terms. n)   Analysis can only be carried realistically IF the stylistic repertoire being used is known. This allows one to understand the constraints within which the architect has made his choice of elements and combinations and thus within which the building has taken shape. 5.        The Architect as Author If we want to think of this issue in personal terms or in terms of authorship we can usefully consider the following: a)   Using the formal vocabulary available to him (within the repertoire of a particular style) and constrained by the rules (of selection and combination and context), the ARCHITECT SPEAKS THE BUILDING. HE is indeed the author of the building. b)   The building is a STATEMENT by him about some referent event and its context and derived by him from a selection of possible (appropriate?) elements and their combinations to represent this event/context. 6.     Conclusion No doubt some critics would feel more secure about this analogy between architecture and natural language if they could find the equivalent of ‘verbs’ in the architects statement, namely in the building. Verbs are, of course ‘words’ in the text which represent actions or events taking place ‘somewhere else’. Where would we find equivalent signs in the composition of a building. These would lie in the relationships which the architect sets up between different parts of the building and which reflect or represent the dynamics of the institution and/or its context. In other words it is the geometrical arrangement of the building which reflects the dynamics of its referent. THE GEOMETRY IS THE VERB. After all its only a report. Now these concrete (!) arrangements don’t look like verbs, but then what does a verb look like? It is a written or spoken WORD. A thing in other words which represents an action. So too with the geometric composition of the building. If we avoid the literary bias so prevalent even in our visual disciplines and concentrate on processes, then many disciplines can be understood as different materials or media all manipulated by a similar formative process. architecture, design history, cultural history of Europe, US, Asia, gothic, islamic, renaissance, baroque, modern, postmodern,  Architecture Art Design Cultural History and Theory and More From Undergraduate to Graduate: its all here. Packed with information. Everything you wanted to know about : free html visitor counters free html visitor counters
SEO Headline (Max 60 characters) Report: Lenders Use Educational Data to Discriminate February 6, 2020 Financial companies often use data on borrowers' higher education to determine access to credit and the price of consumer financial products. And those education data can lead to redlining, a form of discrimination against borrowers who attended community colleges, historically black colleges and universities, or Hispanic-serving institutions. That was the key finding of a new report from the Student Borrower Protection Center, a nonprofit group led by Seth Frotman, the former student loan ombudsman for the federal Consumer Financial Protection Bureau. For example, the group said, borrowers who take out student loans may pay a penalty for attending a community college. "Wells Fargo charges a hypothetical community college borrower an additional $1,134 on a $10,000 loan when compared to a similarly situated borrower enrolled at a four-year college," according to the report. Likewise, borrowers who refinance student loans with a company that uses education data may pay a penalty for having attended an HBCU. "When refinancing with Upstart, a hypothetical Howard University graduate is charged nearly $3,499 more over the life of a five-year loan than a similarly situated [New York University] graduate," the group said. Upstart responded with a statement, saying the company conducts rigorous, regular fair-lending tests across millions of borrowers, in collaboration with the CFPB. "According to the CFPB, Upstart’s AI model increases access to credit across all tested race, ethnicity and gender segments by 23-29 percent while also decreasing average rates by 15-17 percent," Upstart said. "Too many people are unfairly disadvantaged by traditional lending models primarily based on credit score and income, and solving that requires considering more data." The report called on federal and state regulators to enhance oversight of the financial sector's use of education data. "The use of education data in underwriting could charge borrowers more for a loan simply for choosing the most accessible path for pursuing the American Dream," the center said. "Is this what is meant by a mission of ‘innovation’? Access to credit should not simply mean ‘more people getting more loans.’ It is imperative to examine the variance in the cost of those loans. Otherwise, expanded access to credit will not expand equity." Opinions on Inside Higher Ed Inside Higher Ed’s Blog U Back to Top
As students, our capacity for new concepts is crucial to the acquisition of new skills and effects throughout online lectures on the longevity of our attention. The COVID-19 pandemic has resulted in online training, which reduces the pressure to maintain credentials and overall mental immunity for students to present their assignments. ‘Mental health’ remains a stigmatized and brushed topic in India until now. India has one of the worst rates of suicide in the world for children in schools, where fear and shame are related to mental health concerns, such as depression, parental pressure, and a focus on examinations. Should the Indian system of education make students’ mental health courses compulsory? The Indian Education System is examined for its hard and unreasonable standards which emphasize quantitative education, tiring hours, and the implementation of a curriculum to limit the originality of the kid. The pupils are a victim of worsening mental health issues because of Indian parents’ usual nascent mentality that is a marker of a child’s intellect. The requirement for the hour in the school system is creativity and self-winding. Mental health education, which alleviates the stigma of anxiety and depression, may do this and encourage pupils to discuss their ideas in an open and secure setting. Benefits of Mental Health education in schools 1. Education in mental health enhances sensitivity. The notion of self-care and well-being will be more understandable for students. You will be encouraged to take after your health and understand your health 2. Kids will be well able to recognize the problems of mental health and the symptoms. Thus, they may be proactive and spot problems early on. An early procedure can make a difference to the world. 3. They will be exposed to techniques and instruments that meet the difficulties of mental health that enable them to build problem-solving abilities. Does depression increase the risk of suicide? While most people suffering from depression do not die from suicide, serious depression increases the risk of suicide compared with those without depression. The probability of suicide death can partly be associated with depression intensity. New statistics on depression that have been following people for several years show that around 2% of those persons who have ever been treated for depression in an outpatient environment are dying from suicide. In the hospital, the incidence of suicide death is twice as high among those who are ever treated for depression (4%). Depression patients are approximately three times the likelihood of killing by suicide (6%) following suicide ideation or suicide attempts as those who have been treated as surgery patients. Gender disparities in the risk of suicide in the depression also exist dramatically in a lifetime. Whereas around 7% of males who have a lifetime of depression die by suicide, just 1% of women who have a lifetime of depression die by suicide. Incidents happened in Jharkhand Although one of the best centres for mental health treatment is home, there appears to be an essentially non-existent mental health system in the state with just four out of 24 districts operating the District Mental Health System. Amongst many others, the National Mental Health Survey (NMS), 2016, Jharkhand concluded that the treatment gap in Jharkhand is only about 75% owing to the government’s low attention on mental health, the highest in the country, for Common Mental Disorders (CMDs) and substance use diseases. The results of the survey commissioned by the Health and Family Welfare Minister of the Union (INWS) Bangalore and carried out by the Central Psychiatric Institute (CIP) Ranchi in coordination with the Ministry of Health, Medical Education and Family Welfare of the State clearly show that the government needs to come up with specific information. Jharkhand survey co-investigator Dr. Nishant Goyal stated that four were selected for Jharkhand research in 43 districts across the country. ‘Interviews of 3,590 persons, including 267 teenagers, were held in Bokaro, Hazaribagh, Ranchi, and Godda and there were 3,022 interviews with valuable documents on several study methodological criteria. In all, almost 40,000 adults and 1,200 youngsters from 12 states in six regions were interviewed by NMHS. The statistics show that over 15 Crores of Indians aged 13 or older are likely to have one or more issues and need assistance,” said Goyal on Friday, the World Health Day. Different components of mental health education 1. A curriculum on mental health should include three components in schools – the first is to educate people who could be in distress on the significance of emotional well-being, removes the taboo surrounding psychic sickness. The aim is not to examine the intricacies of the many diseases and their symptoms, but rather to realize that mental health issues are real, that they are not due to a person’s character defect or weakness, and that there may be suffering in many individuals around us. 2. The second element of the program should thus be to encourage behavioural seeking assistance. The sensations of loneliness, hopelessness, and helplessness experienced by students can be improved if they know where and how to get support. It is important to stress the concept that requesting assistance is rather a strength than a weakness. And most all, students need a safer place in the form of professors and consultants with whom they can express their problems, rather than depending on unsustainable sources of information such as peers and the Internet. 3. The third and arguably the most essential part of the curriculum is the preventative aspect, and we may take any action to guarantee that kids can adapt more effectively and cope with the demands and problems they experience. The answer is life skills training, which enables learners to improve self-understanding and emotional awareness, improve communication skills such as empathy and affirmation, critical thinking, and effective choices, and successfully deal with stress with positive attitudes and thinking. Why is it necessary to compensate for mental health education? Mental health education must start in the early school years to support optimum growth and development. In this period kids make their first friendships and teens shape their self-esteem and self-esteem. Young people are growing up and encounter a range of difficulties including exclusion, intimidation, conflict, and poor self-appreciation. We need to recognize and provide them with the necessary tools to deal with these problems. The mental health of the kids may be substantially enhanced by a united effort of experts, parents, and teachers, thus creating the scene for a better, happier future. 1. Increasing awareness is a key objective of mental health education. This teaches youngsters what psychology is and how to preserve healthy psychological health. It is important for young people to grasp the notion of self-care and to be accountable for themselves. The concept that mental health is an important aspect of total health and well-being should also be emphasized. 2. Another objective of education in mental health is to teach children, parents, and teachers how to detect the problems of mental health in themselves and others. When difficulties with mental health are left undetected or untreated, they can lead to poor coping skills and adversely influence a child’s capacity to develop and learn. Children must also have methods and resources for coping with mental health issues, together with increased knowledge of the importance of mental health. 3. Early mental health intervention may also change the world. Before serious mental diseases manifest, little changes in behaviour and thoughts typically occur. Teachers, families, friends, and individuals themselves can detect these early warning signals, but only if they know what to look for. Some of these indicators include changes in mood, anxiety, retreat, and a drop in academic performance. The severity of the mental disease may be reduced by early intervention. It can also delay or perhaps prevent the severe mental disease from occurring. 4. Awareness of mental health can save a life. The problem of suicide and self-harm among young people is worrisome. Suicide is the second-largest cause of mortality for young people between 15 and 24 years old. Awareness of the signs and other psychiatric conditions might enable young people to detect these problems and look for assistance before it is too late. By integrating mental health education and information on how and where to seek assistance, the school may save lives. In conclusion, with each generation, the frequency of mental illness increases in youth, and society are responsible for the greatest possible protection for our kids. School teaching on mental health may have a major influence on the present and future mental health of children. The awareness of mental health can also help to eradicate stigma and promote resilience. The advantages of such training are overwhelming. Schools can promote healthy mental health via confidence and self-esteem. Kids need to be taught how to detect indications of mental health deprivation and how to seek help in the face of mental health problems. Author(s) Name: Aeshita Marwah (University of Petroleum and Energy Studies, Dehradun) Related Posts
Clean Mobility Zero emission vehicles (ZEV) are critical to the development of a clean mobility network. ZEVs are vehicles that run on fuels other than gasoline and include a variety of low- to no-emission technologies including battery electric vehicles (EV), plug-in hybrid EVs (PHEV), and hydrogen fuel cell vehicles. These vehicles lower greenhouse gas (GHG) emissions, improve air quality, and offer a cost competitive option to gasoline-powered vehicles due to lower fuel and maintenance costs. Despite these benefits, barriers to ZEV market growth have historically included concerns related to vehicle range limitations, up front vehicle cost, and charging infrastructure availability. Moving California to Zero Emissions: Vehicle Electrification California is a national leader in vehicle electrification strategies that reduce GHG emissions and air pollution. Several policies and incentives have spurred the ZEV market in the state. As a result, there were over 803,816 ZEVs on California roads at the start of 2021, making up nearly 45% of total ZEVs in the US. It is expected that 100% of new passenger vehicles sold in the state will be ZEV by 2035 due to Executive Order N-79-20, which was signed on September 23, 2020. Regional partnerships, policies, and programs helped to spur ZEV adoption in the county from the early stages of the vehicle electrification movement, making the San Diego region a market leader in ZEV sales and usage. However, significant investment in ZEV charging infrastructure is still needed to meet our state and local greenhouse gas reduction goals, further reduce air pollution in our region, and meet projected demand. County of San Diego Efforts The County of San Diego (County) is committed to doing its part to increase the number of ZEVs on the road and improve access to charging infrastructure in order to provide clean transportation options for all residents. This important work protects the public’s health and safety, sustains the environment, and improves the quality of life for residents and visitors. Electric vehicle EV parking Efforts to transition to cleaner vehicles that emit zero GHG emissions are an important strategy for the County to achieve GHG reduction goals and greater sustainability for the region.
Resequencing 545 ginkgo genomes across the world reveals the evolutionary history of the living fossil 作 者:Zhao YP, Fan GY, Yin PP, Sun S, Li N, Hong XN, Hu G, Zhang H, Zhang FM, Han JD, Hao YJ, Xu QW, Yang XW, Xia WJ, Chen WB, Lin HY, Zhang R, Chen J, Zheng XM, Lee S MY, Lee J, Uehara K, Wang J, Yang HM, Fu CX*, Liu X*, Xu X*, Ge S* 影响因子: 11.878 刊物名称: Nature Communications 出版年份: 2019 卷: 期: 页码: DOI:10.1038/s41467-019-12133-5 文章摘要 : As Charles Darwin anticipated, living fossils provide excellent opportunities to study evolutionary questions related to extinction, competition, and adaptation. Ginkgo (Ginkgo biloba L.) is one of the oldest living plants and a fascinating example of how people have saved a species from extinction and assisted its resurgence. By resequencing 545 genomes of ginkgo trees sampled from 51 populations across the world, we identify three refugia in China and detect multiple cycles of population expansion and reduction along with glacial admixture between relict populations in the southwestern and southern refugia. We demonstrate multiple anthropogenic introductions of ginkgo from eastern China into different continents. Further analyses reveal bioclimatic variables that have affected the geographic distribution of ginkgo and the role of natural selection in ginkgo’s adaptation and resilience. These investigations provide insights into the evolutionary history of ginkgo trees and valuable genomic resources for further addressing various questions involving living fossil species.
Domestic Dog Distemper A Danger For Wild Animals Most of you are familiar with the term distemper when we talk about dogs. The canine distemper virus (CDV) was recognized at the beginning of the 20th Century. It is a close relative of measles and only affected dogs. It was such a problem that there is now a preventive vaccine given to dogs to prevent spread of the disease. Now they are finding cases of distemper in wild animals. They believe that CDV was a big reason for the thylacine becoming extinct. The thylacine was known as the Tasmanian tiger because of the black stripes on its back. The CDV has evolved to infect a variety of animals, even marine mammals. The big cats seem to be the most in danger partly because their numbers are already decreasing. In the mid 1990's about 30% of the lions in the Serengeti, Africa, died from CDV.  It was contracted from dogs in the villages in the area. In the Russian Far East some of the big cats have been acting strangely. They seem to lose their fear of humans and just wander into villages. They become easy prey for hunters and poachers because they have lost that fear.They even wander into traffic because the fear is gone. Some of the big cats die from respiratory problems like pneumonia. Some die from seizures and other neurological conditions.. The symptoms can vary.  Apparently some of the big cats have built enough of an immunity to CDV to recover from distemper. There aren't any accurate numbers of infections, recoveries and deaths because CDV is a recent development. A true diagnosis is hard without being able to examine brain tissue. They assume that dogs are the only transmitters of CDV to other animals. Dogs are captured and eaten a lot by the big cats. But there will have to be more studies done to see if the animals are now transmitting to each other or if CDV is present in other places. The Sumatran tiger is found only on the island of Sumatra. Wildlife veterinarians there believe that CDV might already have infected a big percentage of the tiger population. Sumatran tigers are critically endangered so this could mean the end for them. They are hoping to identify and find a way of dealing with CDV so they can save the tigers from extinction. Popular Posts
As verbs the difference between have and get is that have is to possess, own, hold while get is to obtain; to acquire. I believe a large reason why this occurs is people possess a “have to” mentality. Unlike other survival shows, there's a bit more to the story than what first meets the eye. The woman, as many of us would, says “I have to go to the doctor, I have to take these medicines, I have to get radiation,” but one day her thought process changed with one simple word. have to, has to in the Simple Present. Look no further, I have the perfect recommendation. And 'have' implies that you already have possession of such object. GET TO frames it more from a sense of gratitude and appreciation. The best part? This show is unique in characters, storytelling methods, and plot. A COVID-19 antibody test looks for signs of a previous infection. If you aren't convinced yet, allow me to provide you with a list of further persuasion. Has and have are different conjugations of the verb to have. Sometimes, the little things in life seem the most fascinating and joyous to us compared to the flamboyant luxuries that we perhaps have a wishful desire for. A countless amount, am I right? NOT Have you a fast car? They both mean the same thing, which is, "I need to go now." Got vs Have When we talk about the differences between “got” and “have,” it actually means the differences between “have” and “have got” or “got” and “have got.” Both of these are used to refer to possession when it is used in reference to possessing something. You ask where people or things have got to when they do not arrive or are not where you expect…. The woman, as many of us would, says “I have to go to the doctor, I have to take these medicines, I have to get radiation,” but one day her thought process changed with one simple word. Self-improvement + business book summaries you can read or listen to in under 20 minutes. Have To vs Get To.,, 27 Things To Carry In Your Purse, Because If 2020 Taught Us Anything, It's You Just Never Know, 34 Harry Styles Lyrics As Instagram Captions That'll Even Make Him 'Adore You', 20 Songs For That Breakup Playlist You'll Listen To While Binging Ice Cream, 10 Memories From The Early 2000s Because Life Was Easier Then, 11 Christmas Movies You'll Remember If You Were A 2000s Kid, 9 Reasons 'The Wilds' Should Be Your Next Binge Watch, 5 Therapeutic Ways To Be Adventurous During The Pandemic, 10 Things TikTok Made Me Buy, And Now My Life Is So Much Better. What to Know. The Christmas season is coming to an end, but it's not too late to get some last-minute movies in! That’s the good news. Everyone's been here. Values have gotten a bad rap because of how they are discussed in politics and as they relate to religious beliefs. In positive sentences. As a noun get is offspring or get can be (british|regional) a git or get can be (judaism) a jewish writ of divorce. This slight change in your language will slowly alter your perspective. Vs. You get to take the kids to school. I will have got to meet her at the airport. To is also used to indicate a range or a period of time, like when you say it will take you five to ten minutes to finish something. Unfortunately, this year didn't look like a typical Christmas. Women are known to lug around heavy purses with unnecessary items inside. If for some reason you're not diggin' it, you can easily cancel whenever you want (but if you're anything like any of our 150,000+ other members, you'll probably wanna stick around!) Who knew that two simple words could change one's mindset, perspective and approach to work and life? Radhi, SUNY Stony Brook3. Have (got) to is less common than must in this meaning: You have so much work and you’re not feeling well. Telling yourself you "GET to" instead of "HAVE to" empowers just about everything you do and makes it, whatever it is a privilege instead of an obligation. Filled with positivity, gratefulness, and humility you will truly realize how much you “get to” do in your life. With FlashBooks, you can get your knowledge on whenever you want, wherever you want. – How fortunate both you and your children are that they have access to education everyday, a safe place to go where they can grow and be among friends. Do I have to get up early? Must vs. have to Both Must and have to express obligation or necessity, but there are some small differences: • Must expresses the speaker's feelings, whereas have to expresses, above all, an impersonal idea: “Have to” implies a requirement or obligation and often has a negative connotation attached to it. We need to be prepared with a list of things to have with us whenever we leave the house again. Dr. Kevin Elko tells a story of a courageous friend who was battling cancer. This is something that is completely avoidable. Think about how many times a day you say the words “have to.” Simply switching one word – “have” to “get,” we alter the outlook of our minds. We say this as if we have no choice, as if we 'Have' and 'Have got' are only used in the present simple. Learn more. You can listen to audiobook summaries on your morning commute to work, or you can easily read a summary on your phone while you're waiting in line at the bank.
What is critical feminist criminology? What is critical feminist theory in criminology? The feminist-etiological approach assumes that the low crime rate among women can be explained by the gender-specific socialisation background. The values and norms set by society and the ‘intended’ female role model mean that women have less opportunity to commit criminal acts. What does feminist criminology mean? Feminist criminology focuses on women offenders, women victims, and women in the criminal justice system in order to understand the causes, trends, and results of female criminality. What is a critical feminist? The phrase critical feminist theory evokes multiple theories and meanings. In some usages, the term critical modifies feminist theory, suggesting that all feminist theory criticizes the misogynistic view of women that characterizes society. What does feminist criminology focus on? Feminist Criminology provides a venue for articles that place women in the center of the research question, answering different questions than the mainstream approach of controlling for sex. The main aim of Feminist Criminology is to focus on research related to women, girls and crime. IT IS INTERESTING:  Is forensics a good career? What does feminism stand for? Feminism is: 1. The advocacy of women’s rights on the basis of the equality of the sexes. 2. The theory of the political, economic, and social equality of the sexes. What feminist theories are there? Feminist theories bear diverse labels such as liberal feminism, cultural feminism, radical feminism, women of color feminisms, lesbian feminism, global feminism, socialist feminism, postmodern feminism, and third wave feminism. Who created feminist criminology? In this volume, Claire Renzetti traces the development of feminist criminology from the 1970s to the present, examining the diversity of feminisms which have developed: liberal feminist criminology. Marxist, radical and socialist feminist criminologies. structured action theory. What is the main focus of green criminology? Green criminology is a branch of criminology that involves the study of harms and crimes against the environment broadly conceived, including the study of environmental law and policy, the study of corporate crimes against the environment, and environmental justice from a criminological perspective. What are some of the criticisms of feminist criminology? One of the chief feminist complaints against traditional criminology was its relative disinterest in victimization and its tendency, when discussing crimes in which women were the primary victims, to blame the victim. Domestic homicide was said to be victim-precipitated in many cases, as was wife battering. What are the 4 types of feminism? What are the 3 types of feminism? IT IS INTERESTING:  What gave rise to radical criminology? Who is a feminist woman? “Being a feminist means that you fight for the equality of all people. It’s important that your feminism is intersectional; it should not exclude people based on their gender, race, socioeconomic status, ability, or sexual orientation. Feminism allows people to look at the world not as it is, but how it could be. Who is the mother of criminology? Cesare Lombroso Known for Italian school of positivist criminology Scientific career Fields Medicine Criminology Influences Comte Darwin Galton Morel Panizza Rokitanski Is feminism Marxist? Definition. Marxist feminism is an emancipatory, critical framework that aims at understanding and explaining gender oppression in a systematic way (Holmstrom, 2002). Marxist feminism emerged as a theoretical response to the inadequacies of Marxism, liberalism, and radical feminisms. What is conflict school criminology? Abstract. Social conflict theorists suggest that crime in any society is caused by class conflict and that laws are created by those in power to protect their rights and interests. All criminal acts have political undertones, and Quinney has called this concept the “social reality of crime.”
Hidden Causes Behind Laziness You Should Know About What is behind laziness? Although many may not believe it, this dimension can hide the shadow of a depression, the rumor of fears, the weight of stress or even the pressure of a society that excessively praises effort and the achievement of goals … Thus, we could say, without a doubt, that we are facing a dimension with great psychological conditions that we must know. It is enough to do a minimum search on the net to see the large number of articles related to laziness. However, most of them have the same focus, the same purpose: the obligation to overcome it. They offer us dozens of strategies to get rid of that common reality, like someone taking off an old dress or an uncomfortable scab. However, they rarely invite us to understand that behind laziness there may be latent processes and neglected facts. On the other hand, experts on the subject, such as Dr.  Nando Pelusi, an evolutionary psychologist and a rational-emotional therapist, explain something very interesting about it. Our species has tended to save energy. That is, laziness, or rather that immobility that sometimes characterizes us, is something we have inherited from our ancestors. When resources were scarce and insecure, we tended to save our strength with the thought that we could need it at any time. Perhaps, in the same sense, the embrace of laziness is due to the fact that we also perceive a certain insecurity around us and we need a time of introspection and stillness to save energy and reflect. Now, as Dr. Pelusi points out,  that capacity to react, fight and seek solutions to problems in areas that we have not traveled is in our genes. Laziness, therefore, has (in most cases) its reason for being and its purpose. In this sense, understanding it, knowing what is behind it can make life easier in many ways. “We know what we are, not what we can be.” Hamlet, William Shakespeare- Factors behind laziness What lies behind laziness is not always weakness. Nor is it idleness, procrastination, or procrastination. Sometimes we tend to confuse terms and it is necessary to separate one thing from another. For example, we know that laziness and the person who procrastinates have one element in common: low motivation. However, the procrastinator does have the intention or idea to be employed on the task. On the other hand, the person characterized by laziness does not always have the strength to achieve their objectives.  Therefore, it is in those cases when it would be necessary to know what is behind that state. Let’s look at the most frequent causes. Laziness as a mask of fear Laziness simulates that soft and comfortable bed from which to flee from reality. We abandon ourselves to it when excessive fears accompany us in our daily lives. Fear of not being able to fulfill what we had set out to do, fear of failing, fear of not being what others expect, anguish at having to face what we do not control … Soon we finished doing it: we leave it all for tomorrow or better, for when he sees me with more spirits . However, that tomorrow never comes because fears already collapse our entire world. Laziness as a symptom of depression Depression is not always easy to detect for those who suffer from it. In most cases, it is camouflaged after exhaustion, apathy and that discouragement that engulfs everything in its black hole. In this way, studies such as the one carried out at Harvard Medical University and published in the journal Clinical Neuroscience  reveal precisely that laziness is a recurring symptom in a large part of depression patients. Therefore, let us never neglect that reality, especially if it is accompanied by psychological symptoms such as hopelessness, negativity and fatalistic thoughts. Biological causes Behind laziness there may be medical conditions that need to be clarified. Thus, when faced with states of prolonged fatigue, exhaustion and discouragement, it is always convenient to perform a series of clinical diagnostic tests. We cannot ignore that any alteration in the thyroid gland, as well as diabetes, anemia, sleep apnea, heart disease or even fibromyalgia can explain this reality. Behind laziness there is lack of real purpose Purposes are part of our vital definition. Thus, those who are lacking in goals, disappointed by certain experiences or affected by a reality that they consider too complex or adverse, will experience a clear discouragement. What’s more, that lack of illusion often leads us towards that laziness where stillness is a safe haven where we can be calm. In some way, we have all gone through these specific times. What’s more, many of our teenagers can experience that feeling and translate it into isolation where they spend hours in their rooms under the shell of laziness. It is a known process that will end the moment they find a personal purpose. Studies, such as the one published in the Lancet magazine and carried out by the Institute of Epidemiology at University College London, show us that well-being and happiness are precisely related to having a purpose, to giving meaning to life. Therefore, if behind laziness there is indeed the emptiness of goals, of that confidence in the future and the illusion for a present, it is time to look for what motivates us, that gives us joy, hope and a purpose. To conclude, perhaps it would be a good time to remove the stigma commonly associated with laziness. It is clear that there will always be profiles characterized by voluntary neglect, by that manifest and even annoying inactivity. However, there is something that demands our reflection: when laziness embraces us, we are also accompanied by discomfort  and that uncomfortable apathy that we cannot define. Let us learn, therefore, to understand what is behind the scenes of this state. Let’s poke around it, search and understand. Let’s not put off that annoyance from today until tomorrow, because if there is one thing we know about laziness, it is that the longer we take to face it, the more exhausted we will feel. Add a Comment
logo logo Using Java Objects for Comparing API and DB Test Data Automated tests deal with a lot of information comparison, where expected values are compared against actual ones. In certain situations, a test must compare a very large number of values, which leads to an assertion for each of these values. This, in turn, leads to a very large number of code lines, which are difficult to read, understand and maintain. For more clarity and maintainability, Java Objects can be used. In this article I will show you how to model the test data you receive from various sources, like an API and a DB, into plain Java Objects. Then I will show you what a test assertion looks like when using these objects. The Example Let’s assume you are working on an API that retrieves hotel information. By calling a particular endpoint of the API, you will receive the hotel related data that you need to compare to the values stored in the DB, corresponding to the same hotel. The DB is the source of truth, therefore the values from the DB are the ‘expected’ ones. The data returned by the API will be the ‘actual’ values you will use in the test assertions. Let’s assume you are interested in a hotel whose id is 1. The id is the unique identifier of the hotel in the ‘hotel’ DB table. You need to pass the same id to the API in order to retrieve the information for this hotel. Your task is to compare the information stored in the DB for the hotel with id ‘1’ to the information retrieved from the API when calling it with the value ‘1’ for the id. This example assumes you are using RestAssured for calling the API, and Spring’s JdbcTemplate to query the database. The hotel information retrieved from the API will be stored in a JsonPath variable, whereas the information from the DB will be stored into a Map. The challenge will be to compare these values represented by different types (JsonPath versus Map). The solution will be to bring these values to the same denominator. Simply put, to translate them to the same Java type, namely Object. Well, a Hotel Object. Read on. The Test Data For each hotel, the information that is of interest in your test is: the name of the hotel; the chain the hotel is part of; the address (represented by city, country, street and zipcode); the total number of rooms; the number of rooms for each room category (single, double, triple); the number of available rooms for each room category (at the time the DB/API are queried) and the price per night for each room category. For example, for the hotel with id ‘1’, this data is: name of the hotel – Little Hotel; hotel chain – Little Hotels; country – Littlenia; city – Littleville; street – Little Street no 1; zipcode – 000001; total number of rooms – 40; number of single rooms – 10; the number of  double rooms – 25; number of triple rooms – 5; number of available rooms is 0 for each type of room except for the triple one, where there are 2 available rooms; then, the price for single rooms is 25, the price for double rooms is 50, and the price for a triple room is 75. Confused already? 😵 Just imagine the number of assertions needed for checking this data. And this is only for one hotel right now. How about needing to test 100 hotels? Don’t worry, I have you covered. It will be as easy as pie. But first, let’s take a look at the DB structure used to store this information. Just so we know where from and how we need to gather the information. DB Structure The following diagram represents the conceptual structure of the DB that would be used for storing the information presented above. Some parts are missing from the city and country tables, as only the required fields are depicted. The database structure In order to query the DB for the hotel information, I recommend using Spring’s JdbcTemplate, because it is very easy and simple to work with. Please refer to the official JdbcTemplate documentation. In our case, getting the information from the DB can be done either with one very intricate query, or with two simpler ones. I will exemplify the latter option, only to make it more clear what happens. Hotel Information from DB So, let’s start by gathering the information from the ‘hotel’ table. The corresponding SQL query is: select * from hotel where id=1; This statement should be passed to the ‘queryForMap()’ method (from the JdbcTemplate class). This returns all the information corresponding to our hotel, including the id. Of course, for the city and country, the only information that is returned by this query is the id of the city, as it appears in the ‘city’ table. You should store the result of the select statement to a variable of type Map<String, Object>. Let’s name it ‘hotelInfoFromDB’. The values in this Map, at this point, are the following: hotelInfoFromDB = {number_of_single_rooms=10, chain=Little Hotels, price_double_room=50, number_of_double_rooms=25, number_of_triple_rooms=5, available_double_rooms=0, available_triple_rooms=2, zipcode=000001, total_number_of_rooms=40, price_single_room=25, street=Little Street no 1, name=Little Hotel, available_single_rooms=0, price_triple_room=75, id=1, city_id=1} The keys of the map are equal to the column name where each value is stored. You can now retrieve the city and country information from the city and country tables by using the following SQL statement, which you should also pass to the ‘queryForMap()’ method: select city.name as city, country.name as country from city, country where city.id=1 and city.country_id=country.id; Let’s say you store the result of this query to a Map named ‘cityAndCountry’. The result of this SQL statement should be added to the same Map that stores the result of the first statement (the one made against the ‘hotel’ table). You can do that by using the ‘putAll()’ method as follows: At this point, the ‘hotelInfoFromDB’ Map variable holds all the hotel information we have in all our tables: hotelInfoFromDB = {number_of_single_rooms=10, country=Littlenia, chain=Little Hotels, city=Littleville, price_double_room=50, number_of_double_rooms=25, number_of_triple_rooms=5, available_double_rooms=0, available_triple_rooms=2, zipcode=000001, total_number_of_rooms=40, price_single_room=25, street=Little Street no 1, name=Little Hotel, available_single_rooms=0, price_triple_room=75, id=1, city_id=1} Hotel Information from the API For the purpose of this example, let’s assume that you will use RestAssured to make a request to the API. This request will return a JSON representing the information corresponding to the hotel with id 1. The result of the API request will be stored in the test into a variable of type JsonPath. Please refer to the RestAssured documentation for further details. The JSON returned by the API in this example will be the following: "name": "Little Hotel", "chain": "Little Hotels", "address": { "country": "Littlenia", "city": "Littleville", "street": "Little Street no 1", "zipcode": "000001" "no_of_total_rooms" : 40, "no_of_rooms" : { "no_of_single_rooms" : 10, "no_of_double_rooms" : 25, "no_of_triple_rooms" : 5 "no_of_available_rooms" : { "no_of_available_single_rooms" : 0, "no_of_available_double_rooms" : 0, "no_of_available_triple_rooms" : 2 "price" : { "price_per_single_room" : 25, "price_per_double_room" : 50, "price_per_triple_room" : 75 As you can see, we have all the required hotel information in this JSON. Getting each hotel detail from this API response will be done by specifying the path in the JSON to the information we are interested in. Let’s assume that the JsonPath variable which you will use to store the API’s JSON response is named ‘hotelInfoFromAPI’. The path for getting the name of the hotel from the JSON is: name. Now, to get the name of the hotel, as a Java String, from the ‘hotelInfoFromAPI’ variable, the following code should be used: Similarly, to get, for example, the number of available triple rooms, you need to use the path: no_of_available_rooms.no_of_available_triple_rooms.  Getting this information as a Java int value should be done as follows: As you might have noticed, some of the hotel information, when translated into Java types, should be represented by Strings. Other information is more suited to be an int. The prices look best as Double values. You will see how this is relevant in the next section of this article. The Java Object As I mentioned at the beginning of the article, the purpose of this test is to check that the data gathered from the DB and the data gathered from the API, for the hotel with id 1, is identical. At this time, this data is represented in two different ways: a JsonPath variable and a Map. Comparing the data at this point can be quite difficult due to the different representations of the expected and actual values. The object properties The solution is to bring both the expected data and the actual data to a common form. Given that we are talking about a hotel, and its’ properties, we can consider creating a Java Object called Hotel, which will represent the data we are interested in. This Object will have some String properties, like the hotel name, chain name or the street where the hotel is located. Some of the Hotel properties will be int, namely those that represent the number of rooms the hotel offers or the number of currently available rooms. Double will be used for the price per room properties. The Hotel class properties will be as follows, considering that the naming of the properties reflects the Java camel case convention: public class Hotel { private String name; private String chain; private String country; private String city; private String street; private String zipcode; private int noOfTotalRooms; private int noOfSingleRooms; private int noOfDoubleRooms; private int noOfTripleRooms; private int noOfAvailableSingleRooms; private int noOfAvailableDoubleRooms; private int noOfAvailableTripleRooms; private Double pricePerSingleRoom; private Double pricePerDoubleRoom; private Double pricePerTripleRoom; The ‘expected’ constructor (for the DB data) Now it’s time to write the constructor which generates a Hotel Object based on the hotel information retrieved from the DB. It will take as a parameter the Map<String, Object> which stores the required information. It will extract the information from the map as follows: each Object property will receive a value from the Map (by specifying what is its’ corresponding key), in the ‘get()’ method. For example, if you want to get the hotel name (if the name of the Map parameter passed to the constructor is simply ‘map’), you can use the following code: map.get(“name”).toString(). The constructor which extracts the information from the Map is: public Hotel(Map<String, Object> map) { this.name = map.get("name").toString(); this.chain = map.get("chain").toString(); this.country = map.get("country").toString(); this.city = map.get("city").toString(); this.street = map.get("street").toString(); this.zipcode = map.get("zipcode").toString(); this.noOfTotalRooms = Integer.parseInt(map.get("total_number_of_rooms").toString()); this.noOfSingleRooms = Integer.parseInt(map.get("number_of_single_rooms").toString()); this.noOfDoubleRooms = Integer.parseInt(map.get("number_of_double_rooms").toString()); this.noOfTripleRooms = Integer.parseInt(map.get("number_of_triple_rooms").toString()); this.noOfAvailableSingleRooms = Integer.parseInt( this.noOfAvailableDoubleRooms = Integer.parseInt( this.noOfAvailableTripleRooms = Integer.parseInt( this.pricePerSingleRoom = Double.parseDouble(map.get("price_single_room").toString()); this.pricePerDoubleRoom = Double.parseDouble(map.get("price_double_room").toString()); this.pricePerTripleRoom = Double.parseDouble(map.get("price_triple_room").toString()); If you call this constructor by passing the ‘hotelInfoFromDB’ Map as a parameter to it, the resulting Object will look like: Hotel{name='Little Hotel', chain='Little Hotels', country='Littlenia', city='Littleville', street='Little Street no 1', zipcode='000001', noOfTotalRooms=40, noOfSingleRooms=10, noOfDoubleRooms=25, noOfTripleRooms=5, noOfAvailableSingleRooms=0, noOfAvailableDoubleRooms=0, noOfAvailableTripleRooms=2, pricePerSingleRoom=25.0, pricePerDoubleRoom=50.0, pricePerTripleRoom=75.0} The ‘actual’ constructor (for the API response) In order to transform the data gathered from the API into the Hotel Object representation, you can write a new constructor in the Hotel class, which takes as parameter a JsonPath. This is basically the response of the API request you make for id 1. Populating each property of the Hotel object happens by extracting the desired values from the JsonPath parameter by specifying the path corresponding to each property, in the JSON. The constructor you need for generating the ‘actual’ Hotel information is: public Hotel(JsonPath jsonPath) { this.name = jsonPath.get("name").toString(); this.chain = jsonPath.get("chain").toString(); this.country = jsonPath.get("address.country").toString(); this.city = jsonPath.get("address.city").toString(); this.street = jsonPath.get("address.street").toString(); this.zipcode = jsonPath.get("address.zipcode").toString(); this.noOfTotalRooms = Integer.parseInt(jsonPath.get("no_of_total_rooms"). this.noOfSingleRooms = Integer.parseInt(jsonPath. this.noOfDoubleRooms = Integer.parseInt(jsonPath. this.noOfTripleRooms = Integer.parseInt(jsonPath. this.noOfAvailableSingleRooms = Integer.parseInt(jsonPath. this.noOfAvailableDoubleRooms = Integer.parseInt(jsonPath. this.noOfAvailableTripleRooms = Integer.parseInt(jsonPath. this.pricePerSingleRoom = Double.parseDouble(jsonPath. this.pricePerDoubleRoom = Double.parseDouble(jsonPath. this.pricePerTripleRoom = Double.parseDouble(jsonPath. If you call this constructor by passing the ‘hotelInfoFromAPI’ JsonPath as a parameter to it, the resulting Object will look like: Hotel{name='Little Hotel', chain='Little Hotels', country='Littlenia', city='Littleville', street='Little Street no 1', zipcode='000001', noOfTotalRooms=40, noOfSingleRooms=10, noOfDoubleRooms=25, noOfTripleRooms=5, noOfAvailableSingleRooms=0, noOfAvailableDoubleRooms=0, noOfAvailableTripleRooms=2, pricePerSingleRoom=25.0, pricePerDoubleRoom=50.0, pricePerTripleRoom=75.0} Before you can consider the Hotel object complete and ready to be used in tests, you still need to define 3 methods: the equals(), hashCode() and toString() methods. Luckily, if you are using IntelliJ as your code editor, by using the ‘Alt + Ins’ shortcut (or equivalent in MacOs) in the class, these will be created for you automatically. These methods are necessary for Object comparison and output of the Object’s properties. For the sake of giving you a complete example, here are these 3 methods you need to add to your Hotel class: public boolean equals(Object o) { if (this == o) return true; Hotel hotel = (Hotel) o; return noOfTotalRooms == hotel.noOfTotalRooms && noOfSingleRooms == hotel.noOfSingleRooms && noOfDoubleRooms == hotel.noOfDoubleRooms && noOfTripleRooms == hotel.noOfTripleRooms && noOfAvailableSingleRooms == hotel.noOfAvailableSingleRooms && noOfAvailableDoubleRooms == hotel.noOfAvailableDoubleRooms && noOfAvailableTripleRooms == hotel.noOfAvailableTripleRooms && Objects.equals(name, hotel.name) && Objects.equals(chain, hotel.chain) && Objects.equals(country, hotel.country) && Objects.equals(city, hotel.city) && Objects.equals(street, hotel.street) && Objects.equals(zipcode, hotel.zipcode) && Objects.equals(pricePerSingleRoom, hotel.pricePerSingleRoom) && Objects.equals(pricePerDoubleRoom, hotel.pricePerDoubleRoom) && Objects.equals(pricePerTripleRoom, hotel.pricePerTripleRoom); public int hashCode() { return Objects.hash(name, chain, country, city, street, zipcode, noOfTotalRooms, noOfSingleRooms, noOfDoubleRooms, noOfTripleRooms, noOfAvailableSingleRooms, noOfAvailableDoubleRooms, noOfAvailableTripleRooms, pricePerSingleRoom, pricePerDoubleRoom, public String toString() { return "Hotel{" + ", chain='" + chain + '\'' + ", country='" + country + '\'' + ", city='" + city + '\'' + ", street='" + street + '\'' + ", zipcode='" + zipcode+ '\'' + ", noOfTotalRooms=" + noOfTotalRooms + ", noOfSingleRooms=" + noOfSingleRooms + ", noOfDoubleRooms=" + noOfDoubleRooms + ", noOfTripleRooms=" + noOfTripleRooms + ", noOfAvailableSingleRooms=" + noOfAvailableSingleRooms + ", noOfAvailableDoubleRooms=" + noOfAvailableDoubleRooms + ", noOfAvailableTripleRooms=" + noOfAvailableTripleRooms + ", pricePerSingleRoom=" + pricePerSingleRoom + ", pricePerDoubleRoom=" + pricePerDoubleRoom + ", pricePerTripleRoom=" + pricePerTripleRoom + The Test At this point, most of the work is done: you collected the data from various sources, and converted it to the same entity (namely a Hotel Object), via the corresponding constructors. The test itself only involves passing the two constructor calls to an assertion method, as follows: assertEquals(new Hotel(hotelInfoFromAPI), new Hotel(hotelInfoFromDB)); If the information retrieved from the API (via ‘new Hotel(hotelInfoFromAPI)’) equals the information retrieved from the DB (via ‘new Hotel(hotelInfoFromDB)’), this assertion will pass successfully. And that’s it! A very short test, with only one assertion, which checks, at the same time, multiple values. And the beauty of this approach is that you can use these constructors to generate Objects representing any hotels you are interested in. You only need to change the needed hotel id when querying the API or the DB to the desired values, generate the corresponding Objects and add them to the assertion. Reading References About the author Corina Pip Corina is a Test & Automation Lead, with focus on testing by means of Java, Selenium, TestNG, Spring, Maven, and other cool frameworks and tools. Previous endeavours from her 11+ years testing career include working on navigation devices, in the online gaming industry, in the aviation software and automotive industries. Apart from work, Corina is a testing blogger (https://imalittletester.com/) and a GitHub contributor (https://github.com/iamalittletester). She is the creator of a wait based library for Selenium testing (https://github.com/iamalittletester/thewaiter) and creator of “The Little Tester” comic series (https://imalittletester.com/category/comics/). She also tweets at @imalittletester. Join TestProject Community Join Us Now   Leave a Reply popup image A new world for test automation Get Started
Process Analysis Essays Process Analysis Essays Process analysis essays are academic types of writing.  Therefore, you should not neglect the important of academic essay format: introduction, body and conclusion. However, unlike other types of essays, process analysis essays’ body should include a detailed description and, more important, analysis of the process. Read the following process analysis essays’ example and learn how to write your own process essays .  If you need help with writing, do not hesitate to request professional essay writing help at our site. Process Analysis Essays Sample According to the static theory in normal conditions the adjustment of the forward rates to changes in their Interest Parities should be instantaneous and automatic. This would mean that, whenever there is a change in Interest Parities, the mere fact of that change should lead to a corresponding adjust ment of forward rates, just as an alteration in Mint Parities would lead to an instantaneous and automatic adjustment in spot rates. Doubtless, in normal conditions, there is a strong tendency towards an adjustment. The question is whether the mere fact that in New York the Treasury bill rate has increased by 1 per cent while the London Treasury bill rate has remained unchanged induces Foreign Exchange dealers to widen the discount on the forward dollar to a corresponding degree, or whether forward dollars depreciate because of certain transactions undertaken by Foreign Exchange dealers in consequence of the new discrepancy created by the change in the New York bill rate. In this respect there is a considerable difference between stable and unstable conditions. In normal conditions the material effect of changes in Interest Parities is apt to be so quick and so extensive that dealers are inclined largely to act on their past experience and mark their rates up or down even before a change in the relation between supply and demand. They know that a change in the Bank rate or some other change leading to alterations of Interest Parities is usually followed by interest arbitrage transactions which cause a corresponding movement in forward rates. They are inclined to take it for granted that this must always be so, and forward margins are adjusted to a considerable extent even before the change in Interest Parities actually gives rise to a sufficient buying or selling pressure through arbitrage transactions to cause a change in the rates. This is in accordance with the static theory under which the rôle of Forward Exchanges is to compensate international discrepancies between national levels of interest rates -- that is, the economic equivalent of Nature is supposed to abhor the economic equivalent of a vacuum in physics. It is because of this anticipation of the effect of a change in Interest Parities that the belief had arisen that in given conditions the adjustment of forward rates to the new Interest Parities is always necessarily automatic and instantaneous and can take place without any actual transfer of funds. No doubt, if a sufficient number of Foreign Exchange dealers believed implicitly -- if sub-consciously -- in the static theory, and if they had both the will and the means to act on this conviction, that theory would create its own justification. Custom Written Essay If you have no time or no desire to write your process analysis essays, you have an opportunity to order process analysis essays writing service at our site.  We are able to write your process analysis essays within any deadline, even if you have to submit the completed paper in less than 8 hours!
What laws protect employees from job discrimination? Title VII of the Civil Rights Act, as amended, protects employees and job applicants from employment discrimination based on race, color, religion, sex and national origin. … The Age Discrimination in Employment Act (ADEA), as amended, protects persons 40 years of age or older from age-based employment discrimination. What are the three most important laws that regulate discrimination in employment? What law protects workers from discrimination? What are the 7 types of discrimination? Types of Discrimination • Age Discrimination. • Disability Discrimination. • Sexual Orientation. • Status as a Parent. • Religious Discrimination. • National Origin. • Pregnancy. • Sexual Harassment. What do you need to prove discrimination? This requires a plaintiff to first establish a prima facie case of employment discrimination by demonstrating that she: (1) is a member of a protected class; (2) met her employer’s legitimate job performance expectations; (3) suffered an adverse employment action; and (4) another similarly situated employee outside of … IT IS INTERESTING:  What is interim protection order? Can you sue for unfair treatment at work? Under California law, it is a civil right to have the opportunity to seek and hold employment without discrimination based on race, religion, sexual orientation, and other forms of unlawful discrimination. Employees who are discriminated against can file a lawsuit against their employers for unlawful discrimination. What is unfair treatment at work? How do you challenge discrimination? There are three things you can do: 1. Complain informally to your employer. 2. Raise a grievance using your employer’s grievance procedures. 3. Make a claim to the Employment Tribunal. What is an example of unfair discrimination? Unfair discrimination can take many forms. For example, where an employee is unnecessarily sidelined because he/she is disabled this could be unfair discrimination. If an employee is sexually harassed this is a form of unfair discrimination based on sex. What is discrimination and examples? An ever-growing number of terms have been coined to label forms of discrimination, such as racism, sexism, anti-Semitism, homophobia, transphobia, or cissexism (discrimination against transgender persons), classism (discrimination based on social class), lookism (discrimination based on physical appearance), and … What are the 12 protected characteristics? Protected characteristics IT IS INTERESTING:  Do you get drug tested to join the National Guard?
Political Science: Identifications example Haven't found the essay you need? Order Now Text Preview Political Science: Identifications Arend Lijphart is a political scientist who focuses on such scientific fields as comparative politics, election systems, democracy, and ethnicity. Lijphart also distinguished methods of political science into statistical and comparative. A behavioral approach to political science is concentrated on individuals and social groups rather than on political institutions. The behavioral approach in comparative politics is complicated because it is a value-free approach which is concentrated on quantitative methods. The nation is a large entity of people who are united by collective political identity. Nations are crucial to comparative politics because nation-states are its objects of analysis. The State of Nature is a concept that was created to hypothesize the situation when people lived before society was established. State of nature, as well as contractarianism, is an underlying concept while comparing policies in democratic countries because the establishment of democracy is explained via these concepts. Max Weber was a sociologist and a political scientist who proposed a perception of objectivity in qualitative comparative political researches. The methodology of his studies was borrowed by comparative political scientists. Sovereignty is an absolute authority to govern over the particular political entity. Comparative politics analyzes different extents of sovereignty acquired by states or other administrative entities. An ethnicity is a group that shares common features such as language, culture, religion and distinguishes themselves from other ethnic groups on this basis. Comparative politics analyze ethnicity because such concepts as nation or state can be explained through these lenses. Public good is a system of material resources or values that should be provided to citizens by their state. In this respect, the task of comparative politics is to define and compare perceptions of public good in different societies. Electoral authoritarianism is the type of authoritarian regimes which keeps multi-party system as a democratic facade and a source of their legitimacy. Electoral authoritarianism is a perspective field of study in the case of comparative politics because cases of such authoritarianism vary to a large extent. Case studies are scientific researches of particular objects of study in their development. Case studies are used in comparative politics to compare different states or social groups. 2. Explain the relationship between the State of Nature, Sovereignty, and Contractarian View of the State. In your answer, discuss the modern state and where it comes from and the role of the people. Your answer should explain what you think the relationship is and not simply what the book or lecture said. State of nature, sovereignty, and contractarian view of the State are one of the main concepts of the liberal theory of the state. More specifically, the demise of the State of Nature led to the contract within the society, and a state was created, in which people had the sovereignty. However, there is no straight connection between the contractarian view of state and the emergence of a modern state. State of nature is an imaginary situation that might have been present before the creation of first societies. In the state of nature, there is no supreme authority and … Download Full Essay Show full preview
Issue: GCD-LCM-ZERO-ARGS References: CLtl pg.202 and Document 86-003 pg.3 Category: CHANGE Edit history: Revision 1 by Skona Brittain 03/22/87 Revision 2 by Skona Brittain 01/06/89 Revision 3 by Skona Brittain 04/28/89 (removed references to cases of no args to lcm) Problem Description: These functions are not well-defined for sets of arguments that include the number zero. The arguments to lcm and gcd must be positive integers. Test Case: (lcm 1 0) would be an error instead of having the value 0. Having the least common multiple of a set of numbers be less than the least common multiple of a proper subset of that set violates monotonicity. For example, monotonicity is violated by (lcm 1 0) < (lcm 1) and (lcm 0) < (lcm). Increasing the restrictions on the candidates for the lcm should only be able to increase the value of the least qualifying one. What the first example is saying is that the the least multiple of 1 is 1 but the least number that is a multiple of both 1 and 0 is 0. This is patently ridiculous. Any reasoning that says that 0 is the lcm of 1 & 0 would also say that 0 is the lcm of 1 alone, since 0 would be considered a multiple of 1 and is less than 1. Furthermore, it would say that 0 is the result of the lcm operation on any set of arguments at all. Although this would be mathematically consistent, it would not make lcm a very useful operator. The root of the problem is that it is unnatural to apply lcm or gcd to anything but natural numbers. Negative numbers are not having much of an effect because they are just being treated as if they were their absolute values, i.e. the negativity of negative arguments is ignored, but zero really screws things up. If it is desired that zero be an allowed argument, it should also just be ignored, (i.e passed over, the way nil in an association list is passed over) Current Practice: I know of no implementations that currently implement this change. Cost to Users: Very slight. Cost to Implementors: Very slight. Should lead to a reduction in code, since most algorithms for computing gcd and lcm are for positive integers anyway. see Esthetics. Mathematical correctness is much more aesthetic than its alternatives.
The Death Penalty Uncovered The Death Penalty Uncovered Print page The government has continued to allow the death penalty to be sentenced for people who they say commit heinous crimes. Many prisoners are on Death Row who are innocent, have severe mental issues or illness, and in some cases, prisoners are kept in solitary confinement until it is time for their execution, which the Supreme Court has ruled as unconstitutional and unethical. However, the motion was overturned. Millions of Americans who weren’t given a fair trial and are innocent are awaiting their death date and they deserve justice. The death penalty should be abolished. Britain influenced America’s use of the death penalty more than any other country. When European settlers came to the New World, they brought the practice of Capital Punishment. In 1612, Virginia Governor Sir Thomas Dale enacted the Divine, Moral and Martial Laws, which provided the death penalty for even minor offenses such as stealing grapes, killing chickens, and trading with Indians.Laws regarding the death penalty varied from colony to colony. The New York Colony instituted the Duke’s Laws of 1665. Under these laws, offenses such as striking one’s mother or father, or denying the “true God,” were punishable by death. The first attempted reforms of the death penalty in the U.S. occurred when Thomas Jefferson introduced a bill to revise Virginia’s death penalty laws. Although some U.S. states began abolishing the death penalty, most states held onto Capital Punishment.Although some states abolished the death penalty in the mid-Nineteenth Century, it was actually the first half of the Twentieth Century that marked the beginning of the “Progressive Period” of reform in the United States. Support for the death penalty has fluctuated throughout the century. According to Gallup surveys, “in 1936 61% of Americans favored the death penalty for persons convicted of murder. Support reached an all-time low of 42% in 1966. Throughout the 70s and 80s, the percentage of Americans in favor of the death penalty increased steadily, culminating in an 80% approval rating in 1994.” A May 2004 Gallup Poll found that a growing number of Americans support a sentence of life without parole rather than the death penalty for those convicted of murder. Only 55% of those polled responded that they believed the death penalty is implemented fairly, down from 60% in 2003.The overall support is about the same as that reported in 2002, but down from the 80% support in 1994. Today in recent records and data provided, 40% of U.S. citizens support the death penalty, and the number of executions and sentencing has decreased since 2010. Since 2001, “673 executions have been carried out by lethal injection, ten executions by electrocution and one execution by shooting, and no executions have been carried out by hanging or gas chamber.Nineteen (out of 50) states have abolished the death penalty.“New Mexico, Connecticut, Maryland and Nebraska abolished the death penalty in 2009, 2012, 2013, and 2015, respectively because American Society has wavered away from those forms of capital punishment,” according to the Gallup Survey. In my opinion, the death penalty is still in effect because America still feels that they can play the role of judge, jury, and executioner. I see it as getting revenge and misplaced anger, people don’t seem to grasp or accept the reality that more suffering would be endured staring at four blank walls than a quick death. It is also unethical to have a person, despite their wrongs committed, awaiting their execution. Now don’t get me wrong, my sympathy and condolences go to families who have lost or been a victim to a person’s crimes, but that still doesn’t condone taking a person’s life for another. It doesn’t stop the pain or resolve anything. Going to jail for people who commit those high degree crimes deserve to meditate and watch their life go by to understand what they have done. A quick death will end their suffering, when they should hold that burden for the rest of their lives. Recently, the state of California voted on abolishing the death penalty and the motion was denied and the death penalty continues to be in effect. Many people say it is because people have grown to fear those who are foreign and commit crimes and want them to be executed based on fear I believe the highest level of punishment should be a life-sentence without parole. On the other hand, being that it is still allowed in states, officials misuse their power and mistreat their prisoners. No one has the right to treat a person like an “it.” Other countries must think of us as animals the way we feel we can treat another being. No matter the crime, no one should be subjected to the different levels of mistreatment some prisoners receive and the unethical procedures still placed in jails for “protocol.” They often use unnecessary force upon prisoners and disrespectful diction for no other excuse than they can because no one is correcting them or taking a stand. So on top of them waiting for their execution they are having to live in this condition and it leads to many prisoners taking their lives or getting harmed by another cellmate. In conclusion, the death penalty continues to be at the hands of society to determine whether it is abolished. It is time to start advancing and see the bigger picture and better ourselves as a union. We should help those who commit crimes and convict them to reasonable punishments for their actions.America tends to go from 0-100 and there is no in between. People need to see that the death penalty is cruel and no person should have to experience death from a hand of another as a punishment for their crimes. There are other ways to go about convicting criminals and those steps should be taken to improve the judicial system.
Who was Dred Scott? Who was Dred Scott? Print page Who was Dred Scott? Dred Scott was an African American who moved to a free territory with his owner and sued for his emancipation.  Dred Scott took it to court and it then ended up at the supreme court. The case was called Dred Scott vs Sandford , Argued February 11–14, 1856 and decided Decided March 6, 1857. Unfortunately he lose to a 7/2 decision written by Chief Justice Roger B. Taney, the Court denied Scott’s request. For only the second time to that point in its history, the Supreme Court ruled an Act of Congress (Missouri Compromise of 1820) to be unconstitutional. 9AFFAC23-BC23-4854-9BFE-D554BF54BEA1 (1) dred and harriet map I Wonder who went to court with Dred Scott. Were they surprised by Judge Taney’s majority opinion? Why did his owner move?  Does this show the western movement of people for greater opportunity? This case points out the need for the 14th Amendment to the US. Constitution which declared citizenship for blacks.  It angered abolitionists because it valued Mr. Sanford’s private property rights over Mr. Scott’s human rights and it pointed out the injustice of citizenship laws under the current U.S. Constitution.  Its interesting to know that the two judges who voted against the majority decided that blacks could be allowed citizenship based on the fact that there were some voting free blacks at the time of the U.S. Constitution’s writing and ratification  in 1787 and 1789.  The outcome of this case became a trigger to the emotional response of abolitionists willing to fight.  Have we formed a more perfect union? This phrase that comes from the preamble is a great phrase it gives us hope that we can move in to the right direction. How does society today compare to society at the time of this decision? The society today is quite different but, we still have echos of from the days of Dred Scott. It seems like the African American culture and the immigrants still gets treated horribly like the society in the 1700’s and 1800’s. Of course we have our freedom and rights but it seems like the whites have the upper hand over these ethnic groups. Overall the society is more diverse and connected because of technology and transportation. More people come together and most people realize that we all are here no matter what.  Even though he lost the case how did Dred Scott help us move forward in forming a more perfect union? It took a lot of time to change and to enforce this law. Dred Scoot took us in the direction in to the 13th 14th and 15th amendment. He even influenced women’s right to vote which is the 19th amendment. Was motivated by the Dred Scott. Although it triggered the civil war it also gave us the vision on Abraham Lincoln, his Gettysburg Address and the emancipation proclamation.
The Death of Privacy Co-authored with Matthew Cahill Navigating through our day-to-day in a world with information at our fingertips is a current reality that we all seem to enjoy. The ease with which we can access information allows us to look up lyrics, movie times, check company profiles and gain instant insights into the people that we meet. While we barely have time to reflect on this current phenomenon, let’s consider the next iteration/evolution of this all-to-easy-to-access information technology? When will real-time data continuously feed into our everyday activities with distilled insights that then shape decisions, relationships and, eventually, our institutions? Imagine a world where Artificial Intelligence (AI) displays graphical information that not only shapes opinions but hacks our minds and becomes the message. Technological advances in civilizations are best understood as extensions of some part of ourselves. Nature replicates itself in a wide variety of ways and humans are but the latest iterations of evolution. The wheel extends the foot. Hammers and guns extend our hands. Computers extend our brains. The internet extends our reach. With each come some unintended and intended consequences. We place different value judgments and often recategorize after the fact. The pace of information delivered to us in real-time has increased over the years. Augmented reality glasses and individual augmentation with other devices has been limited by communication bandwidth capabilities. When we move from 4G to 5G wireless communication, we also enable all these devices and human augmented reality. This upgrade in network capabilities brings cloud server AI and decision support recommendation systems closer to us with the ability to influence our perceptions based on context such as location, the person or activity we are currently engaged with, and so on. For example, the AI can act as a die detector service using biometrics to instantaneously determine if what you hear or see is true or not. It will fact-check in real-time and display colors that indicate true or false? Or, if when you walk into a room, you can scan and see a real-time reading of each person’s net worth? Whether or not they have a transmittable virus or disease? The entirety of an individual’s digital activity can be synthesized into singular graphics and icons for easy consumption. This new AI tool can help you make better decisions about who you choose to engage with and how you interact with each person. Marshall McLuhan wrote in 1964 that the “Medium is the Message” when television (3 channels of sanitized, homogenized, formulaic content) started ushering in the Information Age. As an early intellectual pioneer, he sounded a bell-weather then that was largely ignored in favor of our unbridled bias for technological innovations. We’ve blindly embraced media, in all its glorious forms to watch producers continue to chase each other in creating content that is more and more emotionally provocative. Emotions are the hooks that shape and frame EVERY message we consume. Our brains have an almost insatiable demand for new data and record into our collective memory a string of binary stereotypes. The context is King. Context matters. It makes all the difference. Consider the following: • What do you do when you know when someone is lying? • What do you do when you know how much money each person in the room makes? • Do you still choose to interact if you know a person has a life-threatening illness? • Do you still shake a person’s hand if you know they’ve watched porn earlier that day? • Did you automatically think the person in question was male? Does it make a difference if it’s a woman that’s watched porn earlier in the day? Are you making the world “safer” if you know who in the room has a criminal record? Where sex offenders are? What about if someone was only accused? Can that “news” somehow be scrubbed from their digital profile? The assumption that we can effectively use distilled, filtered real-time data to assist us in deciding who to engage with is overlooking implicit bias. Even with a carefully curated filtered list of criteria, when our brain is presented with the distilled, graphic information, what do we do with it? If it makes us feel good, chances are we’ll still make decisions that fly in the face of reason. Humans have proven over and over again that we are not logical or rational. How we adapt to this technology cannot be foretold. Our historical pattern has shown that we overvalue and blindly embrace technology that appear to make our lives easier. There will be unintended consequences and potentially irreversible changes. It’s a conversation worth having in the hopes of creating more thoughtful practices to mitigate our worst impulses and design policies to protect our public spaces and personal boundaries. 5G — Privacy Not Included 5G technology and infrastructure are being rapidly introduced across the globe, but that isn’t news. Starting as early as 2017, countries such as South Korea, Germany, the United Kingdom, and the United States have been rolling out some form of 5G. While the newly emerging business opportunities are rising, the anonymity and privacy we have become accustomed to are quickly fading. Even though most aspects of our privacy have been diminished by the internet and social media, 5G is going to bring bigger challenges that are not only concerning but potent. To understand just how we will get ourselves into this privacy nightmare we must look at the Internet of Things (IoT), specifically new sensor technology, ‘smart’ glasses (e.g. Google Glasses), and the impacts of Machine Learning (ML) and Artificial Intelligence (AI). A Sensor Filled World The Internet of Things started when we connected two or more machines together. Today, we have billions of machines connected by both wired and wireless technology. For the most part, it’s this connectivity that creates the World Wide Web that we all know and love. More specifically, part of this IoT world includes sensors and visual device connectivity that collect either real-time or close to real-time information and sends this information back to the cloud for processing. While this technology isn’t necessarily new, companies like Wiliot are finding new, better ways of managing and powering sensors by using inked, wireless BLE sensors that harvest energy for its use and communication without the use of batteries. These sensors can be dropped anywhere and survive independently, collecting and transmitting data to the cloud. Yet, what is missing for this technology to be adapted is the bandwidth. The number of these devices capable of functioning within a network filled with sensors is limited to the bandwidth required to upload their data, this means we cannot have a high concentration of them in one single area or else we won’t be able to effectively communicate. While this is one major problem for companies like Wiliot, there is a relatively new solution on the horizon, 5G. With the 5G network, we can pack a large number of sensors in a small area and have the bandwidth to communicate continuously to the cloud. While yes, this is great, what does it mean for our privacy? How will these sensors be used and will they further impede our privacy? My guess is yes, it’s just a matter of when and who will be the first. A New Smart Glasses In April 2012, Google announced a new product, Google Glass. These glasses are a cool, augmented reality tool that can be used to support multiple business models. The need for data indoors and outdoors exists and the use cases are plenty. While the product exists and the capabilities and functions are ready, the product has never been fully adopted by consumers due to a lack of bandwidth. This, as we’ve discovered during our previous 5G discussions, is a huge barrier for new, emerging technologies. To use smart glasses we need cloud-based AI systems to help us understand what we see and augment our reality with real-time information. While this is an available technology, the problem is just the same as with Wiliot; when we place many smart glasses in a small area we do not have enough wireless bandwidth to communicate back to the cloud. This is again where 5G comes to the rescue and enables all of these unique use cases. We say glasses, but some companies are developing contact lenses that will work just like the Google Glasses we all know. We can add other human augmentation devices that can communicate, collect data, and share information with us in real-time via 5G networks. In Conclusion Imagine yourself going to a restaurant, a coffee shop, or entering a conference room where every word you say or whisper is recorded and attributed to you. Every move you make is videotaped and analyzed in real-time. Your body posture, skin temperature, heart rate, pupil dilation, breathing level, gestures, tone of voice, the language you use are analyzed and conclusions and suggestions are communicated to those who come in contact with you via their smart glasses or other AR-like devices. Even more so, imagine a world where every move you’ve made can be archived and viewed at a later date. Will you feel safe? How much of your everyday activities including your biometric state at every moment are you willing to share with everyone? Dying to know more and what exactly this means for our privacy as we know it, read my next piece, The Death of Privacy. Also published on Medium. 5G — The Self-Driven Car In this second installment about 5G technology, we will examine the exciting technology behind the “self-driving car” and future businesses in light of both Artificial Intelligence (AI) and 5G.  What If What would you give to avoid unproductive time in traffic, the risk of accidents, the stress and all the ill that comes from being stuck in a car? The premise of self-driving cars sounds like the correct solution for the problem, assuming that you must travel to work or to a meeting and you need a car to get there. The basic assumption that drives the self-driving car business is that a car can mimic the human brain and act faster and better than a person in critical situations. We like to imagine the self-driving car as self-sufficient such that it can come to the door when requested pick us up and safely deliver us to our intended destination. This concept is driving new business models in which we (people) no longer own cars, truck delivery fleets, boats, or drones; rather, operating or service companies that provide us with these vehicles. New businesses that will negotiate the best services, fares and manage our complete transportation budget will emerge and this new economy around transportation will flourish.  In this segment about potential 5G impacts, we will examine the economy around the self-driving car and suggest that 5G will excite a shift from “self-driving” to “self-driven” and some combination of the two will compete in the coming years. We start with a casual problem, a split-second decision that we all may face at one time or another when driving. The Situation I just took a right turn onto a narrow street driving 20 mph (or so I think). I noticed myself too close to a woman who was getting into a car on my right. My mind tells me that she is going to open the door to her car and I need to move to the left to give her some space when this kid came out of nowhere, chasing a ball in front of me. I panic – my heart is drumming in my throat and I get this strong sinking sensation in my stomach. I slam the breaks and veer hard to my left. The child running after the ball has now hit my car as I come to a halting stop.   The bicyclist, who came fast from my blind spot on my left hits the front left side of my car and is knocked down. The car is at a complete stop with chaos unfolding around us…. In this case, I was lucky, very lucky indeed, no one died yet a child and bicyclist left the scene with minor injuries. What would I give to avoid this accident? How many nights will I stay awake trying to figure out what I could have done differently to avoid this accident and come up with nothing? The premise of the self-driving car is that issues like this are avoided. The car will somehow solve this problem and will be safe, yet I know that this is hardly true. There are enough corner cases that we can not imagine or train a car to handle. Cases in which it will need to make life and death decisions. Do we rather have a car driven by an AI make this decision or a human?! I am not certain that we have a good answer. Instead, why not figure out a system that reduces the chances of problems in the first place? I would stipulate that the solution is not a “self-driving car” but a “self-driven car”.   A New Possibility A self-driven car is a car with no brain, for example, a car without an AI inside. This type of car is operated by an AI outside of the car who can and will operate multiple cars at any given moment. This centralized or cloud-based AI will be connected with multiple input drones and sensors all around the city. Additionally, it will be able to calculate risks and move cars in the safest  possible way and safest speeds according to and depending on its risk assessments. In the scenario of the self-driven car, we have now taken the AI out of the car  and placed it in a more centralized location where it can have access to more real-time data. By incorporating sensors, cameras, and drones to be present in and around the scene, the centralized AI will have advanced notice and enough information about the situation way ahead of the self-driving car which is supposed to make a right turn onto this street. From an economic aspect, the self-driven car needs one AI for hundreds of cars. Cars will become a simple and low-cost device while easy to maintain and update.  These cost savings will translate to more efficient operations and better-operating companies. Artificial Intelligence (AI) Market The only problem that we are facing with the self-driven car is the need for split-second communication between the many sensors and the vehicles that it controls; this is where 5G comes to the rescue. 5G can support very high speeds of data with up to a 1-millisecond delay. The centralized AI will ‘see’ the woman parking her car, the child playing with a ball and the bicyclist on the way. This AI will significantly slow down my vehicle (eg. 1-5 mph) in anticipation of these unpredictable factors on the road to allow all participants to come out unscathed. Moving away from ‘self-driving cars’ to ‘self-driven cars’ we also enable a new business model in which a transportation company owns cars and a dedicated 5G spectrum to handle the control and information dissemination to and from, cars, sensors, drones, and other infrastructure static and dynamic elements. The reason I am suggesting that car fleet management companies will own spectrum is to make sure that they get enough bandwidth to handle their need with relying on the local cellular companies to handle it correctly. Unlike mobile communications, vehicle fleet management will become a utility and mission-critical.  In Conclusion While the future of 5G doesn’t have one set path, companies can be proactive in their approach to its possibilities. 5G presents an opportunity for companies to adjust their focus towards new value propositions that will change the way consumers live, work, and play. This is a very exciting and fruitful future for companies and users. The possibilities and the variable impacts provide an excuse for creatives and strategists to envision and devise new ways.  Companies that effectively create and protect those innovative value propositions are the next unicorns. While they benefit the most from what 5G has to offer, others will show up and vanish quickly. Understanding the interplay between self-driving and self-driven and how the economy shifts are yet another subtle key to the future of transportation, spectrum control, federal laws, and local ordinance. In all, 5G is just a vehicle that empowers new opportunities for those who can see it…and the clock is ticking. A brave new world is in the making… will today’s top companies maintain top status in the marketplace or bottom out?  Also published on Medium. 5G – Here’s where the fuss should be Starting the conversation about the broad business aspects of 5G. There is more to 5G than meets the eye. Companies will soon need to make decisions on how to approach this impending market reality and find areas where they can seek new value propositions. Data communication speeds will move up to 20-50 Gbps versus todays 1 Gbps and 1-millisecond delay compared to the current 70-millisecond delay. 5G transcends physical boundaries and gives millions access to data speeds that were previously inaccessible. The move from wired to wireless outdoors will enable anyone to communicate at speeds which are available only to large corporations. When data becomes a commodity, how does the economic model around it change? Which new business models are enabled and which one must be abandoned? In this blog, we start the conversation and focus on infrastructure changes and impacts on hardware companies. This 5G series will further develop and cover multiple verticals starting with self-driving cars (which will no longer be needed), followed by AI and ML, and finally privacy and security challenges in this new world. Reinventing Infrastructure For 5G to become a reality, new costly infrastructure is necessary as today’s connections cannot handle the bandwidth of 5G. The Strategy Analytics Advanced Semiconductor Applications service report estimates the number of new base station sectors will double between 2018 and 2024 with 5G operators targeting 2020 – 2021 to begin rolling out their services. They are forecasting sector segments will experience a compound annual growth rate greater than 100%. The sheer number of 5G base stations and their unprecedented impact on backhaul infrastructure is one aspect when considering 5G. Fiber or faster transmission technology is essential to meet the capacity and latency requirements of 5G and means replacing the existing infrastructure: cables, radio interfaces, antennas, switches, routers, gateways, relays… you name it, it needs upgrading. Once created and operating, the theoretical range for 5G base stations is about 250 – 300 meters, while a 2/3/4G base station has a theoretical range between 50,000 – 150,000 meters. This means the number of base stations required to cover the same area is a factor of 200x to 600x for 5G base stations to cover the same area. By estimating the performance per 5G base station there needs to be a multiplier of at least 20x faster. This number is very large, yet telecom theory allows the assumption that only a small percentage of the backhaul is active at any given time. Using this model we can estimate a multiplier of a 1000x capacity increase in the transition from 4G to 5G. To support a 5G system with the same number of subscribers, the backhaul bandwidth must increase by a factor of 1000x. Furthermore, some applications will require diverse Quality of Service (QoS) that will drive for higher network and backhaul demands in certain areas. Some topological and physical issues related to the radio spectrum used in 5G will further exacerbate this issue. With the debut of 5G on the horizon, architects, engineers, cable providers, telecommunicators, and app developers need to think beyond their current value propositions and fast. Caption: Backhaul relative to base stations (BTS) and the cloud. Figure credit: Shmuel Silverman – Multi-Innovation Further, new traffic models will dictate conceptual changes and force migrations of existing systems to a new paradigm. Some or all of the large network switching manufacturing giants will experience huge pressure to reduce costs and increase network efficiencies and capabilities. Network automation can no longer be nice to have, it becomes essential. The existing network management system will not be able to scale and new technologies and applications are required. Additionally, the high availability of 5G will be another point of contention between the existing switching manufacturer and cellular network operators.  In the end, 5G creates an opportunity for fiber players such as Nokia, Huawei, Ciena, ECI Telecom, Coriant, Infinera, Fujitsu, Cisco, Aspire Technology, ExterNetworks, Accedian, ADVA Optical to change the game by introducing new and compelling value proposition(s) to make it simpler for 5G operators to install, deliver, and maintain value to clients. The challenge in the coming years will be in reassessing and identifying new value proposition(s) to be proactive with 5G, as well as maintaining their place in the market against competitors.  The Flight Towards the Last Mile When WiFi first debuted in 1997, its purpose was to replace existing residential ethernet cables by surpassing its speeds. Homes no longer needed to install cables between rooms. Cables, switches, and routers were replaced by a single unit – the WiFi router. 5G speeds can replace Interhome cabling in the same way that WiFi replaces Intrahome cabling. Existing cable providers like Comcast and AT&T need to reconsider their strategy in this regards. Each home would have the equivalent of a fiber connection for a small fraction of today’s costs delivered by the 5G cellular operator. Cable service providers already face disruptions in other areas of their market, but 5G will present them with additional challenges that could greatly influence their future.  In Conclusion While the future of 5G doesn’t have one set path, companies can be proactive in their approach to its possibilities. 5G presents an opportunity for companies to adjust their focus towards new value propositions that will change the way consumers live, work, and play. This is a very exciting and fruitful future for companies and users. The possibilities and the variable impacts provide an excuse for creatives and strategist to envision and devise in new ways. It will be the companies who effectively create and protect those innovative value propositions that will become the next unicorns and benefit the most from what 5G has to offer.  Note to readers: Stay tuned for my next 5G piece, the democratization of the self-driving car. Kodak film square What Apple needs to learn from Kodak’s missteps Kodak’s value proposition Kodak was founded by George Eastman and Henry Strong in 1888. During the 20th century, Kodak transformed the photography industry to become a creative outlet available to the masses. By reducing the film processing cost, it enabled every person the opportunity to own a camera and capture memories on film. By the 1970s Kodak owned over 85 percent of the market. But by the early 2000s, Kodak’s net income had declined and the company is still struggling even today to stay ahead of the game. Kodak identified their value proposition as “capturing memories” or, “Kodak Moments,” and that the real value is in sharing those captured memories. While Kodak’s innovative minds knew that digital would be the future, even creating a digital camera in 1975, they couldn’t break away from their foundational belief that traditional film would be everlasting. Despite owning many patents in the digital tech space, Kodak didn’t anticipate the rapid growth and enthusiasm from consumers for the digital camera. In addition to smaller profit margins compared to their traditional film revenue, Kodak failed to stay relevant in the market. What is interesting is that Kodak’s decline happened long after the Ethernet revolution, and the boom. The writing was on the wall and yet Kodak still did not see it. Photo by Olia Nayda on Unsplash Apple’s value proposition While Apple doesn’t have the same longevity as Kodak, they still established itself as a household name and worldwide brand. Founded in 1976 by Steve Jobs, Steve Wozniak, and Ronald Wayne, it would be the Steves that would develop the Apple personal computers and grow the company. Wayne left the company after only 12 days, while the Steves would leave to pursue other ventures as the competition in the personal computer market grew by 1985. By the end of September 1997, Apple’s sales had declined to $1.6 billion and the company was desperate for a revival. Steve Jobs was asked to return to Apple that July after CEO Gil Amelio was ousted. He spoke at Apple’s Worldwide Developers Conference (WWDC) where he declared Apple’s value proposition is in addressing the following questions: • “What incredible benefits can we give to the customer?” • “Where can we take the customer?” which translated into “Is there a magical user interface that will enable a broad base market?” Later that year when the iPhone was introduced, Jobs called it, “Magic!” The iPhone changed how the world uses a smartphone and moved the customer base (SAM) from a few million users to billions. It was this value proposition that helped Apple become the dominant market leader in the smartphone business. Kodak and Apple’s common threads Both Apple and Kodak created unique value propositions that changed their respective worlds. Kodak figured out how to reduce the price of the film which allowed cameras to be used by anyone for any occasion. Apple figured out a magical user interface that enables people of all ages and skill level to use a smartphone and be enchanted by its features. But, Kodak failed to change their value proposition along with the market and to their detriment. So, how can Apple avoid this same issue? The answer is hidden within Steve Jobs words from the 1997 WWDC. This a very broad statement and can not be taken as the value proposition, but an intention, or company vision. When it comes to the value proposition, Apple needs to do better than that. Kodak was a giant in technology and in research — they once owned over 75,000 patents! Currently, Apple is a giant in technology and in research— owning over 75,000 patents, as well. Remember, Kodak was one of the first companies to develop a digital camera. There is a reason to believe that amongst the patents that Apple owns today there are some that will be part of the “next big thing.” Yet, will Apple be able to recognize these patents and technology, as well as continue its market leadership? Understanding that value proposition shifts over time and capturing the shifts correctly, are the key to any company’s future. Apple not only needs to clearly identify the correct value proposition, but it will also need to reposition itself as a leader in the market and the technology. An example: after the world learned that smartphones are useful and great, the next value proposition is about communication and the magical interfaces that no longer depends on touchscreens…if this is true, the days of the smartphone as we know it are numbered. How long do you think Apple has before they will need to come up with new and exciting technology in order to maintain their market position? Tech devices Let’s begin with what started this war: Steve Jobs Think BIG like Steve Jobs “You can’t start with the technology and try to figure out where you’re going to try to sell it.” — Steve Jobs, Apple’s Worldwide Developers Conference, 1997. Over 20 years ago, Steve Jobs stepped on stage at Apple’s Worldwide Developer Conference after Gil Amelio was ousted as CEO of the company by the board of directors. Jobs was taking on the crucial task of rebuilding the company’s product line as well as the public’s faith in the company. But, not everyone in attendance was thrilled with Job’s return to Apple. In fact, one particular audience member shared his skepticism and disappointment with him. I highly recommend you watch the entire clip for yourself. I was completely captivated by Jobs’s response to the man’s questions and feel that his answer is one that can help business leaders grow today. Jobs“You know, you can please some of the people some of the time, but one of the hardest things, when you’re trying to effect change, is that people like this gentleman are right in some areas. Can you pick out what Jobs identifies as Apple’s value proposition? “What incredible benefits can we [Apple] give to the customer? Where can we take the customer?” That is Apple’s value proposition. These questions are what helped Apple develop and create the magical user interface of the iPhone. This device would go on to change how the world uses a smartphone. It would also grow a customer base (SAM) from a few million users to BILLIONS of users. The success of Apple revolves around their philosophy and strategy: Start with the value proposition and then develop the technology to deliver, NOT the other way around. As a company, the most important IP asset that you own is your value proposition. Why not develop a strategy to protect this IP as opposed to trying to just protect your technology? Before Apple debuted the first iPhone in 2007, the company went ahead and protected their value proposition — iPhone user experience using less than 10 US patents: These patents have also been instrumental in the infringement litigation between Apple and Samsung. Apple generates over 4,000 patents per year but they only needed these 7 to protect their company’s value proposition and therefore become the masters of their market. By protecting their use case, they were solidifying the Apple brand into the minds of technology and electronic consumers around the world. Now, do you know how many patents you need to have in your portfolio to protect your value proposition? Digital caterpillar to butterfly Businessᴵᴾ Score: A new way to assess business potential using IP Castle surrounded by moat How to use patents as a barrier to entry 1. What is your value proposition? 2. Can this value proposition be protected with patents? DIgital lock 3 Questions to Answer Before You Develop a Patent Most CEOs that I meet believe that IP protection is important in protecting their business. But when they’re faced with questions like, “Why are there so many competitors if your business is well protected?” and “Do you believe your competition is infringing on your patents?” They commonly answer with, “We are in a high-value market,” and “I don’t believe so.” Are you sure that you aren’t developing IP that can be easily circumvented by your competition? If you aren’t protecting your IP properly, then your IP can be easily circumvented by the competition and therefore brings no value to your business! What a devastating reality! Let’s pause that nightmare for a moment and review what circumvention means in a bit more context. The value of your IP changes with your target audience. If you plan to sell or exit with a large S&P500 company then you need to consider their strength and ability to work around you. Graphic by Multi-Innovation For example, if you plan to sell or exit with a mid-market company, then adjust the cost number in the above figure by a factor of 10, e.g. $20M is $2M and so on. However, you cannot change the time associated with circumvention. Time and cost are two independent factors that need to be considered while you review your patent portfolio. Anything that can be circumvented in less than 2 years is considered to be easy to circumvent. So what you are looking for is to create patents that are hard and/or difficult to circumvent by your competitors. Now, to create a hard and/or difficult to circumvent patent must be valued within the context of your business. Thus, we arrive at the next question: How well does your IP protect your value proposition? Your value proposition is an innovation, service or feature or a combination, which you intend to use to make your company or product attractive to your customers. The value proposition is used to differentiate between a company and its competition in the same Serviceable Obtainable Market (SOM). So, are any of your patents unrelated to or add directly to the overall protection of your value proposition? If not, then you should consider them as a liability and you may even consider abandoning those patents. This begs the question, “How do I know that a patent is protecting my value proposition?” This is a good question and the answer is actually pretty simple: If a patent or a portfolio of patents prevents a competitor from delivering your Value Proposition or a subset thereof to your clients, then you have created a valuable patent and/or portfolio. Once you have identified how easily your patents can be circumvented and what your business’ value proposition is, you can begin thinking differently about your patent portfolio. Now, you must answer the 3 key questionsbefore developing your patent strategy: 1. What is your business objectives context? This will help you define your circumvention criteria. 2. Can your value proposition be protected? It isn’t always obvious that any business value proposition can be protected, in fact, based on my experience, some can and some cannot be protected. 3. If you answered ‘yes’ to question #2, then: Is this patent that I am about to draft part of a cohesive and clear strategy that will protect my value proposition? If you cannot yet answer these questions, then you should stop spending your time and money on patents that are most likely going to be circumvented by your competition and therefore worthless in protecting you and your business. But never fear! If you think that you ready to develop a patent and are just unsure of your strategy, there are resources available that can support you. So when you are asked next, “Do you believe your competition is infringing on your patents?” you will answer with a confident, “Nothing is breaking through my patent strategy!”
Advanced searches left 3/3 Search only database of 7.4 mil and more summaries Lewis Dot Diagram For Lead Summarized by PlexPage Last Updated: 19 October 2020 * If you want to update the article please login/register General | Latest Info Lewis uses simple diagrams to keep track of how many electrons were present in the outermost, or Valence, shell of the atom. The kernel of an atom, ie, nucleus together with inner electrons, is represented by a chemical symbol, and only Valence Electrons are drawn as dots surrounding the chemical symbol. Thus, three atoms shown in Figure 1 from Electrons and Valence can be represented by the following Lewis diagrams: if an atom is a noble - gas atom, two alternative procedures are possible. Either we can consider an atom to have zero Valence electrons or we can regard the outermost fill shell as a Valence shell. The first three noble gases can thus be written as: notice from the preceding example that Lewis diagrams of alkali metals are identical except for their chemical symbols. This agrees nicely with the very similar chemical behavior of alkali metals. Similarly, Lewis diagrams for all elements in other groups, such as alkaline earths or halogens, look the same. Lewis diagrams may also be used to predict valences of elements. Lewis suggested that the number of valences of an atom was equal to the number of Electrons in its Valence shell or to the number of Electrons which would have to be added to the Valence shell to achieve the electronic shell structure of the next noble gas. As an example of this idea, consider the elements Be and O. Their Lewis diagrams and those of noble gases He and Ne are compared to Be with He, We see that the former has two more Electrons and therefore should have Valence of 2. Element O might be expected to have Valence of 6 or Valence of 2 since it has six Valence electronstwo less than Ne. Using rules of Valence developed in this way, Lewis was able to account for the regular increase and decrease in subscripts of compounds in the table found in the Valence section, and reproduce them here. In addition, he was able to account for more than 50 percent of formulas in the table. Lewis ' success in this connection gives clear indication that electrons were the most important factor in holding atoms together when molecules form. Despite these successes, there are also difficulties to be found in Lewis theories, in particular for elements beyond calcium in the periodic table. Element Br, for example, has 17 more Electrons than noble - gas Ar. This leads us to conclude that Br has 17 Valence Electrons, which makes it awkward to explain why Br resembles Cl and F so closely even though these two atoms have only seven Valence Electrons. Draw Lewis diagrams for atom of each of the following elements: Li, N, F, Na. We find from the periodic table inside the front cover that Li has an atomic number of 3. It thus contains three electrons, one more than noble gas He. logo is an Online Knowledge, where all the summarized are written by a machine. We aim to collect all the knowledge the World Wide Web has to offer. Nvidia inception logo jooble logo © All rights reserved 2021 made by Algoritmi Vision Inc.
Matching Limb Protection Sleeves Tourniquet Cuff Technology Tourniquet Cuff Technology: What is the purpose of a tourniquet cuff? The purpose of a tourniquet cuff is to safely stop or restrict arterial blood flow into a portion of an extremity by applying a uniform circumferential pressure around the extremity at a desired location. Pneumatic tourniquet cuffs In general, a pneumatic tourniquet cuff is [...] Tourniquet Cuff Selection Are you selecting a tourniquet cuff that meets all FDA requirements as a Class I medical device? In the United States, pneumatic tourniquet cuffs are regulated as Class I medical device by the Food and Drug Administration (FDA). Risks of injuries to patients and legal liability for users arise from use of a pneumatic tourniquet [...] Tourniquet Cuff Application Proper Tourniquet Cuff Application: After the patient is brought into the OR, apply the tourniquet cuff at the desired location on the limb, pressurized within the appropriate pressure range for an appropriate period of time. The following sections provide a general sequence of events for preparation, cuff application and setting up the tourniquet instrument (Note: [...] Preoperative Patient Assessment Personalized Scalp Tourniquets Alopecia (hair loss) is a common consequence of cancer treatment known to have a profound impact on quality of life.  Tourniquet technologies have been investigated from the mid-1960s to early 1980s as a strategy for preventing chemotherapy-induced alopecia (CIA) but their ambiguous results precluded incorporation into any standard of treatment [1].  Fundamental advances inherent in [...] Pediatric Tourniquets Pediatric patients need pediatric tourniquets because infants and children have smaller limb circumferences and limb lengths, different mass of muscle and other soft tissues, and different physiological characteristics such as blood pressures and heart rate. These characteristics can vary greatly within the pediatric population from neonatal to adolescent patients. To ensure safe and effective tourniquet [...] Intravenous Regional Anesthesia (IVRA) Equipment Preparation For the best patient outcome, it is important that all equipment is assembled, calibrated, and tested prior to its use. The following sections highlights some key considerations during equipment assembling, calibration and testing. Assembling equipment and supplies Efficiency in the operating room demands that all of the necessary equipment and supplies be assembled before the [...] 10 Best Tourniquet Practices for Surgical Tourniquets in 2018 Best Tourniquet Practices There are many types of tourniquet cuffs, instruments, and limb protection sleeves available for the clinicians. Due to common misconceptions and misinformation, it may be a challenge to select and use the most appropriate tourniquet technology for your patients. Here is our list of top 10 best tourniquet practices you need [...]
+1 (208) 254-6996 [email protected] In both Phillip Roth’s “The Conversion of the Jews” and Part 1 of America Is In The Heart we see the main characters (young Ozzie and young Allos) questioning their situations. How does this self-questioning create tensions in their identity formation? Provide an example from each story.   How does Bulosan engage in how Filipinos/Filipino-Americans are racialized? Provide an example from the Philippines (Part 1) and from the United States (either Part 2 & 3).  Don't use plagiarized sources. Get Your Custom Essay on Roth, The Conversion Of The Jews Just from $13/Page Order Essay
Postcards From The Future Show What London Could Look Like After Climate Change Postcards from the Future.jpg What will the world's biggest cities look like as climate change progresses? In a series called Postcards from the Future, U.K. artists Robert Graves and Didier Madoc-Jones imagined future scenes from London, transforming familiar city views according to different scientific projections. "We were hearing a lot about the potential impacts of climate change, but everything we were hearing about was just words, or very two-dimensional graphics in magazines," says Madoc-Jones. "The only imagery we were getting was pictures or reports from places like Bangladesh…the trouble is that when you live in London, when you hear reports of people suffering in other parts of the world, you can easily forget about those things and put them to one side." Postcard by Robert Graves and Didier Madoc-Jones
Africa's Forests May Be Our Last Chance to Slow Climate Change Deforestation is now the second leading cause of global climate change. Debates on this topic often centre on the Amazon, given the high-profile destruction of its forest biodiversity. However, a troubling rise in deforestation in Central Africa - home to the world's second largest tropical forest - has received surprisingly little attention. Two-thirds of Africa's remaining forests are located in the Democratic Republic of Congo (DRC). These forests span 1.7 million km², which is equivalent to one-third of Brazil's Amazon. They also store 22 billion tonnes of carbon, ranking them among the world's largest remaining carbon reserves.
Alan Mandel Butler, 14 January 2017 perception of theatre and performing arts education. Ideas touched upon included; Challenging how teachers are trained - from the concept of a self perpetuating cycle of mediocrity in the training of teachers Being open - ensuring that there is a constant dialogue and openness to the approach of education and the real world aspects of theatre that are prevalent to society as a Sharing your own context - true re-engagement in education and learning must be from an individual perspective. Each and every student and educator have their own stories and perceptions for contextual analysis of their situation and how they can change / develop it. Being an individual should be embraced and not sidelined to fit into a stauts quo Being vulnerable - being comfortable in being uncomfortable and being allowed to make mistakes. Mistakes are a tremendous part of the learning process and should be embraced. Vulnerability as a performer and as an educator should be encouraged to continue to break boundaries, ask questions and make change
The Democratic Memory Act: Spain tackles its past once again 25 July 2021 Sagrada Família, Barcelona, Spain - © Countries choose different paths when reckoning with painful and contested histories. Spain is currently at an inflection point that could change how it handles the legacy of its still divisive past with the proposed Democratic Memory Act. The pacto del olvido During its transition to democracy after the death of dictator Franco, Spain chose to look away from its history with the pacto del olvido, the pact of forgetting. This choice to move forward without unpacking the violence of the Civil War and repression of the opposition under Franco started out as an informal agreement among the elites negotiating the transition as well as among the people of Spain (although not all agreed with this path forward, there was enough of a consensus for it to be the chosen path). It was arguably influenced by decades of Francoist propaganda insisting that both sides were equally to blame for the violence of the Civil War. Although there was certainly blood on both sides of the war, only one side won and repressed the other for decades, with tactics ranging from summary executions, to forced labor, and even illicit stealing of children. The agreement to forget the past was codified by the pre-constitution 1977 Amnesty Law, which within its broad scope freed those who had been political prisoners under Franco, and now has become one of the primary stumbling blocks in pursuing accountability for human rights violations from that era ever since. Arguably, the pacto del olvido created a group of citizens whose rights have now been dually violated: first by the Franco regime, and secondly by the Spanish government (in the comprehensive sense including the judiciary, the executive, and the legislature over time) not only failing to secure their access to justice, but in some instances actively blocking it. For example, the Supreme Court in a 2012 decision rejected any chance of investigating human rights violations that occurred under the Franco regime, despite international norms indicating that the government (including the judiciary) has a responsibility to not only uphold but also to actively pursue the right to truth for victims. Past attempts at justice Spain has received criticism for the failure to appropriately address historical injustices. For example, the United Nations has called for the 1977 Amnesty Law to be repealed, as it violates victims’ rights to justice and truth. Although there have been civil society organizations such as the Asociación para la Recuperación de la Memoria Histórica that have worked to help victims of Franco’s regime, the burden to ensure the rights of victims of human rights violations falls on the national government. Some regional governments such as Catalonia have stepped up to help fund the exhumation of mass graves, but the scale is limited. Congress condemned the Franco dictatorship in 2002, which is an important step in recognizing its victims, but remains insufficient in providing justice. Act 52/2007, known as the Historical Memory Act, was an initial attempt to move toward justice, including measures such as renaming streets currently named after members of the Franco government. Although this would have been an improvement from the pacto del olvido, it was still heavily limited, prompting criticism from the United Nations and advocates for more comprehensive justice. For example, Act 52/2007 would earmark funding for the exhumation of mass graves by non-governmental organizations rather than shoulder government responsibility for undertaking the exhumations. However, even these first steps toward progress were not fully realized, as it was repealed for a lack of funding by the Partido Popular, the conservative party, when it came into power shortly after the passage of the Act. The proposed Democratic Memory Act The new proposed Democratic Memory Act would go further than its 2007 predecessor, fulfilling many of the recommendations from the United Nations. Total, the current draft of the Act includes 65 articles and 14 additional provisions, grouped into five sections: 1. Establishing the general disposition and purpose 2. Defining and recognizing the victims 3. Laying out various central policies of democratic memory 4. Recognizing those who have worked to defend democratic memory and establishing a new Council of Democratic Memory 5. Laying out the sanctions regime for violations The introduction of the proposal notes that it is rooted in the principles of transitional justice: implementing the rights to truth, justice, reparations, and guarantees of non-repetition of violations. Even if the proposed Democratic Memory Act makes it through the parliamentary process and becomes law, bringing these principles to life will be a complex and ongoing process. It has already undergone changes from the original draft during the consultative process with the Consejo Fiscal (a board of public prosecutors headed by the Attorney General) and Consejo General del Poder Judicial (CGPJ, or the General Council of the Judiciary), and will likely incorporate further changes during the legislative process. If approved, it will not only involve measures that recognize wrongs, but also include specific actions to take stock of what needs to be done, as well as how to then go about acting on the research conducted. On the recognition side, for example, dates of tribute will be established, and the teacher training and educational curriculums will be reworked. The act will also establish an investigator of human rights violations—the particulars of this element have already been revised several times, and will likely continue to be one of the most debated measures in the parliamentary process. If maintained, this measure will likely come into conflict with the 1977 Amnesty Law that forbids prosecution for crimes during the Franco regime, which remains in place. How that conflict will be resolved remains to be seen, and will shape how much of a tangible impact the Democratic Memory Act is able to have on the prosecution of the human rights violations that it is intended to address. Information-gathering measures are included, such as an inventory of economic exploitation, audits of forced labor under the regime, and establishing a national DNA database to identify victims in mass graves and create an official register. Notably, in contrast to the previous 2007 Act, the Democratic Memory Act promises that the state will take responsibility for exhumations of mass graves and includes a detailed sanctions regime for violations. The ongoing debate The Act is not without its controversy or obstacles, and its passage and implementation are far from guaranteed. Although the Act enjoys support on the left, the right is largely critical of it. The Partido Popular and Vox have both stated their opposition to the Act, and will be its primary opponents during the coming parliamentary process. A measure in the original proposal that would prohibit exaltation of the Franco regime has proved to be particularly controversial. As demonstrated by the protests, counter-protests, and debate when Francisco Franco was exhumed in 2019, the Franco years and how their legacy should be handled remains deeply contested throughout Spain as the pacto del olvido has faded in recent decades. Given that the Act has not yet begun the parliamentary process, there are many debates yet to come. Human rights organizations are urging the government to advance the Act in the name of justice, while critics on the right declaim it as punitive and a threat to the freedoms of speech and association. Historian Stanley Payne goes as far as insisting that the Act not only violates the Spanish Constitution, but that it is also an attempt to exact vengeance on the losers of an ideological battle. What Payne misses (besides the fact that the government helping someone find out where their loved one is buried is quite distinct from the government killing people without trial, for instance) is that inherently, this Act is restorative rather than punitive. Although it includes sanctions for violations, unlike the 2007 Act, this Act is not about retaliation against any group. It is about ensuring justice for a group: one that has been discriminated against systematically for decades. [The initial draft of the bill]( Memoria Democr%C3%A1tica.pdf) was approved by the Council of Ministers in September of 2020, and was finally approved to be sent to parliament on 20 July 2021, following the incorporation of feedback from the Consejo Fiscal and the Consejo General del Poder Judicial. Although it should be noted that this consultative process is not legally binding, it is mandatory to undergo and can have informal influence on how the parliamentary process unfolds. Both bodies were divided, but ended up voting in favor. The Consejo Fiscal was split along ideological lines, with the conservative block being critical of what they termed to be calculated ambiguity and promises that could not be kept in the original proposal of the Act. It is likely that the Act could end up in front of the Constitutional Court due to the controversy over measures linked to freedom of speech and association. Although some constitutions across the world (including other countries in Western Europe, such as Germany and Italy) explicitly prohibit ideologies that threaten democracy or constitutionalism, Spain’s constitution is not among their number. For this reason, the CGPJ noted concerns about the measure in the original proposal that censured Franco apologists. Thus, if these measures remain, it is possible that the measure of the Act prohibiting the glorification of the Franco regime (aimed at organizations like the Franco Foundation) could be struck down, or at least face legal challenges. To anticipate this challenge and respond to the CGPJ feedback, the revised version of the Act expanded on the requirements to ban an organization, adding the following: “that extols the coup and the dictatorship or exalts their leaders, with contempt and humiliation of the dignity of the victims of the coup, the war or the Franco regime.” The revisions also include adding citations of European precedents such as resolutions regarding the construction of a common European identity in support of democratic values and against totalitarianism. With regard to the investigation of human rights violations, the wording was changed to reference general human rights violations under international law rather than violations specifically due to the Civil War and the Franco regime, as the original proposal read. Whether these changes are sufficient to pass a legal challenge or convince Congress remains to be seen. Recovering collective memory: a moral imperative Scholars disagree over precisely how to define when a transition to democracy is complete to its fullest extent, with some arguing that it is not until transitional justice is achieved. Regardless of the scholarly debates, Spain must reckon with its past and fulfill its obligation to bring justice to the victims of human rights violations of the Franco regime. It is time for the graves to be exhumed, reparations to be paid to those who were imprisoned or fired for their political sympathies, and more. This means that it is time not only for the measures of this proposed Democratic Memory Act, but also for further measures that are currently blocked by the 1977 Amnesty Law. It is time for Spain to turn from past willful forgetfulness to the future recovery of collective memory. The passage of each year makes this a more pressing and critical matter, strengthening the moral imperative to pass the Democratic Memory Act and embrace further transitional justice measures. Aspen Brooks Aspen Brooks is a dual degree Master’s candidate at University of London SOAS (MSc in Politics of Conflict, Rights, & Justice) and Johns Hopkins University SAIS Europe (MA in International Affairs). She holds a BA in International Relations and Spanish from Linfield University. Her research interests include human rights, transitional justice, language, and education. When she’s not working as a research assistant for the Institute for Comparative Federalism at Eurac Research, you can find her working at a local winery in Seattle, embroidering, or reading! Facebook Comments Related Post 06 July 2021eureka The necessary reform of local administration in Spain Gabriel Moreno González Eurac Research logo What we do Great Place To Work ISO 9001 / 2015 ISO 9001:2015 ISO 27001 ISO 27001:2013 Privacy Policy
Category cathode The Science Behind Hydrogen Hybrid Cars When a state-of-the-art high definition television is lined up alongside a conventional TELEVISION with the old style cathode ray tube know-how, the differences are obvious, and the benefits immediately apparent. To calculate cell potential one must know that from given half reactions which steel is to be anode and which is cathode. In a discharging battery or galvanic cell (diagram at right), the anode is the damaging terminal because it is the place typical present flows into “the device” (i.e. the battery cell).cathode It’s best to never use the phrases anode or cathode to explain the structural elements of a Zener diode, for the same cause you should not use such phrases for the construction of a chargeable battery... National Cathode Corporation In vacuum electronic gadgets electrons are emitted by the cathode and flow to the anode. It is subsequently from the cathode that electrons move into these devices. However, in a major or secondary cell the cathode is the electrode that spontaneously turns into negative during discharge, and from which due to this fact electrons emerge. The relative drawbacks of tungsten cathodes are a piece perform of 4.7eV, inadequate beam present, and a short service life. LaB6 has a work operate of 2.66eV – thus more simply emitting electrons – and is a comparatively steady materials, so it has been increasingly used as a material for cathodes as an alternative of tungsten... In these conditions, the Certificate of Analysis is out there for obtain, but other product details, such as the product name, are not. By clicking join, you comply with obtain our publication for info on information, promotions, merchandise & presents as a Member of the Oakley MVP Loyalty Program. Find the latest news and media data for BASF’s Catalysts division, headquartered in Iselin, New Jersey, USA, the world’s main supplier of environmental and process catalysts. Secondly, using out of date parts wherever practical makes the most of the assets, vitality and related carbon emitted on behalf of those parts. Nevertheless, sustainability is not only about carbon emissions, but also the use of uncommon earth metals in electronics... Which Is Anode And Which Is Cathode? LCD monitors are rapidly replacing the previous cathode ray tube (CRT) kind monitors. Whereas in electrolytic cell discount takes place on the proper electrode, so right one is the cathode. Diagram of a copper cathode in a galvanic cell (e.g., a battery). CRTs normally have higher refresh charges than the response instances of LIQUID CRYSTAL DISPLAY monitors, which reduces eyestrain and could also be preferable for those who spend an excessive amount of time in front of a computer.cathode A cathode is the electrode by means of which the negatively charged electrons enter a tool or a system from an exterior circuit in case of electrolytic cell, or it’s the source of electrons in an electronic valve... A CRT Monitor is likely one of the most common types of pc monitors used immediately. The opposite of an anode is a cathode When the present by the device is reversed, the electrodes swap functions, so anode turns into cathode, whereas cathode turns into anode, as long as the reversed current is applied, with the exception of diodes the place electrode naming is at all times primarily based on the ahead present course.cathode For instance, in an amplifier, a triode (a tube with three electrodes, Anode, Cathode and Grid) will be made by making use of a various sign, maybe from a vinyl disk, to the grid. Positively charged cations transfer towards the cathode allowing a optimistic current i to flow out of the cathode.cathode On discharge, the anode undergoes oxidation, or lack of electrons, and the cath... Testing SCR Technically tagged as Lithium-Ion (Li-Ion) batteries, lithium batteries are rechargeable powerhouses wherein the ions move from the destructive to optimistic electrode while at work and at cost. So the constructive electrode will be the one the place the oxidation response will happen and thus it is the anode. In a cathode ray tube , the anode is the optimistic terminal where electrons movement out of the device, i.e., where optimistic electrical current flows in.cathode The cathode has a negative charge because it is linked to the negatively charged finish of an exterior energy supply. The cathode is a negatively charged electrode that shoots a beam of electrons in the direction of a positively charged electrode, often known as an anode.cathode In a recharging battery, or an electrolytic cell , the ano... Signal Up Image change into weak or dim often occur after the monitor have been used for a few years. So the unfavourable electrode will be the one where the reduction reaction will take place and thus it is the cathode. CRT screens generate their screen images through the use of a cathode (heated filament) inside a vacuum sealed glass tube. Sacrificial anodes are significantly needed for systems the place a static charge is generated by the action of flowing liquids, akin to pipelines and watercraft.cathode 1 The route of typical current (the circulation of constructive costs) in a circuit is opposite to the path of electron stream, so (negatively charged) electrons movement out the anode into the surface circuit. The vacuum tube works by heating the Cathode so that it’ll emit electrons.cathode This contrasts wi... The Lithium Ion Battery Advantages Are Liquid Crystal Show or LIQUID CRYSTAL DISPLAY TVs leading the way? So the positive electrode will be the one the place the oxidation reaction will happen and thus it is the anode. In a cathode ray tube , the anode is the constructive terminal the place electrons move out of the device, i.e., the place positive electrical present flows in.cathode Batteries require a constructive terminal (cathode) and a destructive terminal (anode). The electrons then strike the screen within the form of a ray and cause it to shine. In electronic vacuum units equivalent to a cathode ray tube , the anode is the positively charged electron collector.cathode To calculate cell potential one should know that from given half reactions which metal is to be anode and which is cathode... Plasma Display And Its Advantages Every occasionally it’s a good suggestion to take a look at what kinds of TV show applied sciences are on the market and run by how they’re doing compared to one another. His motivation for changing it to something meaning ‘the East electrode’ (different candidates had been “eastode”, “oriode” and “anatolode”) was to make it immune to a attainable later change in the path conference for current , whose exact nature was not identified on the time.cathode While it would be good to think that we’re above such issues, it’s worth declaring that cathode ray tube TV’s have additionally fallen out of favor as a result of flat panel TELEVISION shows are much more stylish. Current flows reverse the course of damaging cost carriers, such as electrons in metals.cathode The terms anode and cathode are not defined ... A monitor, also called display is principally an digital visual show for computers. The current drawn from the 14 and 15” picture tube is less than the 17” tube and in case you use this way to brighten up the 17” tube, the facility provide may go into shutdown mode and generally will even result in power blink. LCDs, however, are becoming more and more comparable in measurement to CRT displays.cathode The electrodes can be like the factors of the river shortly earlier than or after the waterfalls on this picture: the cathode is like the edge of a waterfall the place the water drops down and the anode is like the point the place the water drops into...
Naval History and Heritage Command National Museum of the U.S. Navy American Alliance of Museums Accredited Museums Logo Related Content Document Type • Historical Summary Wars & Conflicts File Formats Location of Archival Materials • National Museum of the U.S. Navy Polar Opposites The North and South Poles are at opposite ends of the earth. Below are characteristics of each area. Arctic Circle/ North Pole Antarctica/ South Pole An almost landlocked sea of frozen ice covers the North Pole. Antarctica is a huge continent, the center of which is the South Pole. It is a roughly circular landmass between 5 and 6 million square miles, about the size of Africa. The Center of the Arctic Circle is the 10,000-foot deep Arctic Ocean, which is really a branch of the Atlantic Ocean The center of the continent is a high plateau hidden under a perpetual ice cap, 9,000 feet thick at the pole. The land that surrounds the North Pole includes Greenland, northern Scandinavia, the northern territories of Siberia and parts of Alaska and northern Canada. Antarctica is surrounded by the Antarctic Ocean, which contains the southernmost parts of the Atlantic, Pacific and Indian Oceans. The Arctic region is, on the average, 35 degrees warmer than Antarctica. Antarctica is one of the coldest, windiest, driest, and highest places on Earth. Temperatures average minus 70 to minus 80 degrees Fahrenheit in the winter. The coldest recorded temperature is minus 128.6 degrees Fahrenheit. A range of animals lives in the Arctic Circle including polar bears, hares, gulls, gullemots and zooplankton. Antarctica is a frozen desert. It receives less than 2 inches of precipitation a year. Nothing lives there except lichens, mosses, fungi and fresh water algae. Penguins, seals are found along the coast and reproduce in the Antarctic waters. The northern polar region has been the home of the Inuit (commonly known as Eskimo) people for thousands of years. Unlike the northern Polar Regions, Antarctica is uninhabited by humans. Scientists and researchers from many nations live and work there today. Published: Thu Apr 25 10:52:49 EDT 2019
Ego Psychology: Case Conceptualization Of Ashoke's Travel Experiences 1905 Words8 Pages Ashoke, is a survivor of a tragic train wreck which now influences his travel experiences. The client experiences flashbacks of the train wreck from time to time and feels triggered by train stations and certain luggage. Although he shows great anxiety before boarding a train, he is still functional and travels by them. Ashoke takes advantage of new opportunities that come to him, such as the opportunity to teach in Cleveland, and is very supportive of his wife and children. Gogol, his son, faces a constant dilemma with both his American and Bengali identity. His family wants him to follow his father’s footsteps and become an engineer, but he wants to pursue architecture. His mother wants him to follow Bengali culture, such as marrying someone from the same background. Regardless of his parents’ desires, he focuses more on his friends and American culture than his own family’s values. When his father passes away, he begins to cherish his family values. Gogol is very caring and committed to his passions. He follows his dreams, which make him into a successful individual. Case Conceptualization Ego Psychology Ashoke demonstrates his id, ego, and superego in various instances. His ego consists of his ability to have a stable job and family in this country by following its societal rules. When he was younger, he took the opportunity to travel a lot on his own and focus on his education, leading him to live alone in America. This ties into having Ashima, his Open Document
Table Of Contents FTP Upload Last Modified: June 10, 2021 Uploads a file to an FTP server, such as a real-time target. Some versions of Microsoft Windows block incoming FTP traffic by default. If prompted by the OS, allow VeriStand to use port 21 (FTP) to transfer data. Property/Section Description FTP Server Includes the following properties that configure access to the FTP server: • URL—The address of a file or directory on the FTP server. The address cannot contain any characters that define the protocol. For example, is a valid address, but is not. • Username—Specifies the username to use to access the FTP server. • Password—Specifies the password for Username. • Timeout—Specifies the time in seconds to wait for a response from the FTP server before returning a timeout error. • Passive Connection—If TRUE, specifies that this step initiates a connection on the FTP data port. If FALSE, specifies that this step listens for a connection on the FTP server. • SSL—If TRUE, specifies that data transmission is encrypted using an SSL protocol. FTP Transfer Includes the following properties that configure details of the file transfer: • Source—The path to the source file(s) to upload. This can be a file or a folder containing multiple files. • Is Folder?—If TRUE, specifies that URL is a folder. If FALSE, specifies that URL is a specific file. • Filter—If the path to the files to transfer is a folder, specifies a regular expression to use to filter the files in the folder by filename. This step only acts on the files that match the regular expression. The match is not case-sensitive. • Binary—If TRUE, transmits data in binary form. If FALSE, transmits data as text. • Behavior—Specifies the action to take if a file of the same name already exists in the Destination directory. • Overwrite—Overwrites the existing file. This option does not change the creation date of the file, but it does change the most recent access date. • Skip—Skips the file completely and does not include it in the download. • Unique—Downloads the file and appends a number to the filename to create a unique name. • Buffer Length—The size of the buffer, in bytes, to use for streaming data. The minimum is 2. Includes the following properties for configuring a proxy server: • Enable Proxy—If TRUE, specifies to transmit data through a proxy server. • Proxy URL—Specifies the URL of the proxy server. • Proxy Username—Specifies the username for the proxy server. • Proxy Password—Specifies the password for the Proxy Username. Includes the following property that configures which port the proxy server uses: • Proxy Port—Specifies the port the FTP proxy uses. If Enable Proxy is FALSE, this value is ignored. Recently Viewed Topics
Publishers of technology books, eBooks, and videos for creative people Home > Articles Shadows and Occlusion • Print • + Share This This chapter is from the book Occlusion, in brief, is blocking, as in when an object blocks light. Technically, you could say that all regular shadows are kinds of occlusion, but most people reserve the term occlusion for a reference to other kinds of light-blocking that aren't regular shadows from a light. The few examples that follow should shed some light on different kinds of occlusion. Ambient Occlusion Ambient occlusion is a function designed to darken parts of your scene that are blocked by other geometry or less likely to have a full view of the sky. You can use ambient occlusion as a replacement or supplement to the shadows in your fill lights. The main idea behind ambient occlusion is hemispheric sampling or looking around the scene from the point of view of each point on a surface. Figure 3.27 shows how rays are sampled in all directions from a point being rendered. The more of these rays hit an object (instead of shooting off into empty space), the darker the ambient occlusion. Ambient occlusion can usually have a maximum distance set for the rays, so that only nearby objects will cause the surface to darken. Figure 3.27 This diagram illustrates the rays that would be sampled in rendering just one pixel with ambient occlusion. Ambient occlusion looks around the whole scene from the point being rendered, and darkens the point based on how many nearby objects are encountered which might be blocking light. Ambient occlusion can be a terrific substitute for soft shadows from your fill light. You might still want your main light source, such as the sun, to cast a shadow, but your could turn off shadows from the surrounding fill lights, such as lights simulating illumination from the sky. In Figure 3.28, the brightest light source casts a raytraced shadow. The fill lights do not cast shadows, but ambient occlusion softly darkens the areas underneath and between objects, even in areas that are entirely within the raytraced shadow. Figure 3.28 A scene with no shadowing on its fill light can look very flat (left), but adding ambient occlusion (right) provides extra shading that darkens areas that would not be exposed to the sky. It would be possible to use ambient occlusion by itself, with no shadows at all in a scene, but this might produce too uniform a darkening effect in each area where two surfaces came together, and the audience might notice the lack of distinct shadows cast in a specific direction. Compared to raytraced soft shadows from an area light, ambient occlusion can provide similar looking shading in your scene, but usually takes less time to render. Occlusion in Global Illumination Global illumination (abbreviated GI) is an approach to rendering in which indirect light is calculated as it interreflects between surfaces in your scene. GI is different from ambient occlusion, which functions solely to darken parts of the scene. GI adds light to the scene, to simulate bounced or indirect light, essentially replacing both fill lights and their shadows. With GI, objects block light by reflecting it away, just as real objects would. In Figure 3.29, occlusion is seen where the ground is darkened underneath the sphere. It looks very similar to a soft shadow from a light, but it is actually a natural part of global illumination, which grows darker in areas from which light has been reflected away. Figure 3.29 Occlusion is an intrinsic part of global illumination, darkening the area under the sphere where light is reflected away. It is possible to illuminate a GI scene with absolutely no lights. To prevent the scene from being pure black, you would need to provide something brightly shaded to start it off, such as the white cube in Figure 3.30, which has a high incandescence level on its shader. With global illumination, the bright white cube illuminates the whole scene, as if it were an area light. Where light bounces off the sphere, it does not reach the floor, so parts of the floor are occluded as a natural part of the GI process. Figure 3.30 With global illumination, any bright object can be a light source and cast its own shadows, even in a scene with no lights. In theory, productions could be lit entirely with incandescent objects. This would provide interesting options, such as the ability to model any shape you want and use it as a light source. However, this would also make the lighting and rendering process inordinately slow. In productions that use global illumination at all, it is most often used to supplement the direct illumination from conventional lights. Other Types of Occlusion Final gathering and image-based lighting are two more algorithms that are related in that they provide extra illumination, usually with built-in occlusion. Final gathering (sometimes abbreviated FG) serves as a simplified form of global illumination. By itself, it can provide a relatively quick, single-bounce solution to adding both indirect light and soft occlusion to a scene, and it is becoming increasingly popular for this purpose. FG can also be used in conjunction with a full GI solution where it serves to smooth out and improve the quality of the global illumination. Image-based lighting (abbreviated IBL) is an approach to rendering in which a sky dome surrounding the scene is mapped with an image of an environment, and the colors and tones from that image are used to illuminate the scene. The process of rendering with IBL often uses a similar rendering technique to those used in rendering GI, and it will often include similar built-in occlusion. In renderers that do not provide built-in occlusion in IBL renders, IBL can be combined with ambient occlusion. Chapter 4, "Lighting Environments and Architecture," will talk more about GI, FG, and IBL. • + Share This • 🔖 Save To Your Account Peachpit Promotional Mailings & Special Offers Collection and Use of Information Questions and Inquiries Online Store Contests and Drawings Service Announcements Customer Service Other Collection and Use of Information Application and System Logs Web Analytics Cookies and Related Technologies Do Not Track This site currently does not respond to Do Not Track signals. Pearson may send or direct marketing communications to users, provided that Correcting/Updating Personal Information Sale of Personal Information Supplemental Privacy Statement for California Residents Sharing and Disclosure Pearson may disclose personal information, as follows: • As required by law. Requests and Contact Changes to this Privacy Notice Last Update: November 17, 2020
Humans are different from other animals because we possess consciousness. We have a natural instinct, a gut feeling that has evolved from our primal senses. Architecture shapes the world around us, and our daily experiences revolve around the spaces we live in and move about. But how much of that do we really notice and take in? Most of us are caught up with a million things on our to-do lists, scrolling through our phones, taking calls and answering emails; and in that hustle, our environment remains in the background. Design and planning today are focussed on being functionally efficient. Our buildings maintain the ideal temperature and humidity for us to work at our optimum levels. Even subtle changes in this optimum environment tend to manifest as physical and mental health changes. Pandering to our senses to that extent has reduced architecture to a mere backdrop. Keys to making Architecture memorable - Involve the senses - sheet1 In the opening paragraph of his book “Thinking Architecture”, Zumthor makes us ask ourselves what we think about when we think about architecture. What are the sensations we associate with architecture? Throughout the book, he narrates different stories that his mind has linked to specific encounters with architecture- be it an oak staircase, a well-lit corridor, the texture of flooring tiles, a particular door handle- different elements provide the reader with a fleeting glimpse of the past that he so fondly remembers. Think back to your childhood home, the gardens, and verandahs you played in, the low table where your grandmother served you food, sleeping under the stars in the hot summer nights- so many of these memories are shaped by the places we lived in. Even as we grow older, all these feelings will come rushing back if we ever step into a place that is similar to these. In fact, we also unconsciously try to shape the space around us in a similar way in the rest of our life too, from the places and events that Keys to making Architecture memorable - Involve the senses - sheet2 2RasmusHjortshoj by Peter Zumthor © shaped our minds, the.lessons we learned, the opinions we formed. Architecture is as much about design as it is about the memories. “Producing inner images is a natural process common to everyone. It is part of thinking. Associative, wild, free, ordered and systematic thinking in images, in architectural, spatial, colorful, and sensuous pictures- this is my favorite definition of design There has been a great deal of philosophical discussion regarding this aspect of architecture. Alain de Botton, in his book “The Architecture of Happiness” has talked about some ideas of architectural development that have made it memorable. Some of them reflect the points I wrote above- Architecture brings out specific aspects of our personalities, and projects ideals in our minds- sometimes falsely. Architects have used various elements in their designs as a challenge to viewer perceptions. The pointed spires in churches and cathedrals, the alluring expanse of the Persian-Mughal style domes, the impossible curves of Gehry’s Guggenheim, the confusing facades of Gaudi’s houses, and the marvel of the Hindi temples- they have all continued to astonish our minds. Keys to making Architecture memorable - Involve the senses - sheet3 Institute Of Contemporary Art ©Steven Holl The different styles of architecture that developed over the course of history have shaped our personal preferences and opinions on a very superficial level. This is why some of us admire intricate designs and enormous, elegant structures of the classical style, while others feel themselves identifying more with the modern minimalist approach. This is also why we also simply rearrange our furniture or repaint a room ‘for a change’. But architecture is not just about the visual perspective. According to Juhani Pallasmma in his book “The Eyes of the Skin” he emphasizes the importance of all five senses in the art of shaping spaces and buildings. We might use our vision for the first impression of a space, judging distance and space depth. But it’s only through employing the other senses that we can truly experience architecture. A simple touch helps us to actually connect with the planes, acoustics help us understand the harmony between various elements and the sense of smell helps us gauge the quality of the space. It is like watching a movie without the sound, we miss out on the emotion conveyed by the space. This approach to design is called a phenomenological approach- which focusses on not just creating a building, but an experience. It requires not just design acumen, but an understanding of the human thought process (both conscious and subconscious), and its reactions to elements and spaces- not from a technical aspect, but from an experiential or philosophical one. Keys to making Architecture memorable - sheet4 Villa Savoye ©daveybot It is important to also learn from these experiences. Architecture tells the story of the evolution of mankind and therefore has a lot to teach us. Developing architecture as a sensory narrative is also important because it is only when you experience a space first-hand that you understand what works and what doesn’t. A lot of what Many celebrated buildings throughout history have in reality been failures. The owners of Villa Savoye came to despise the iconic skylights and the bands of windows because it interfered with the heating systems. It was a space worth experiencing- every nook and corner. Their house has come to be known as a symbol of Corbusier’s work, but in the end, it could never be what it was originally meant to be- a home. “As people move about the environment, they acquire knowledge about the patterns of their own movement and about spatial relations among places in the world. This knowledge is encoded and stored in memory, allowing people to find the places again”                                                                       –Human Spatial Memory: Remembering Where Write A Comment
In the months and weeks leading up to the Tokyo Olympics, intelligence agencies and cybersecurity experts warned of the risks of cyberattacks and the need to exercise preventative measures to prevent the kinds of incidents we have seen in the previous Olympics at Rio de Janeiro, Sochi, Pyeongchang and London. Fortunately, the International Olympics Committee (IOC) and the local organizers of the Tokyo Games, the Tokyo Organizing Committee (TOC), needed no convincing. Over the course of these games, it’s become increasingly clear that the organizers did indeed exercise preventative measures and that despite the challenges and limitations of holding an Olympics during a pandemic, the Tokyo Olympics have been a real success story from a cybersecurity perspective. Organizers of all large-scale, televised sporting events—and indeed just all organizations in general—should look to this year’s games as a model to emulate. The Best Kind of Defense One of the things that the Tokyo Olympics got right from a cybersecurity perspective is a principle often taught, suitably enough, in sports. As coaches often like to say, “The best defense is a good offense.” A common problem that we see in the cybersecurity field is that far too many organizations wait until they’ve been attacked. Nowadays, this is a recipe for disaster. We know the rate of cyber threats is increasing, with ransomware attacks having spiked 150% in just one year and state-sponsored cyberattacks, also known as advanced persistent threats (APTs), having doubled in three years. We also know that large-scale sporting events such as the Super Bowl, the World Cup, and the Olympics—for various reasons, including the market size of these events and their modern reliance on digital technology—are frequently the target of cyber threats. Learning from the lessons of past Olympic games, the International Olympics Committee (IOC) and the Tokyo Organizing Committee (TOC) fortunately did not make the same mistake. While this year’s games have not been entirely free of an incident (there was a relatively minor one early on, for example), the kinds of incidents that specialists such as myself are most concerned about with large-scale events like these are the those that shut down critical parts of the infrastructure such as ticketing, scorekeeping, or media broadcasting. In fact, something like this almost occurred at the 2018 Olympics in PyeongChang, South Korea, in which the Opening Ceremonies were nearly brought to a halt. The fact that there was not an equivalent malicious event during the Tokyo games is no accident or stroke of luck. In this day and age, that’s extremely unlikely. Instead, the lack of incidents at the Tokyo Olympics tells us that aggressive preemptive measures were taken. And while I do not know, in this case, what each and every one of those measures was precise, I know which basic principles were observed. Having the Right People in Place With an international event of this size, the first mandatory element to have in place, of course, are the behavioral specialists and analysts who can implement user and entity behavior analytics (UEBA): the process of interpreting intelligence, detect patterns from that intelligence, and putting together plans for preemptive cyberattacks or counter attacks. Also necessary are the supporting teams of Level 1 security operations center (SOC) analysts who have their eyes on the glass 24/7, see all the traffic in real-time, collect all the alerts, filter out the false positives, and, when it’s justified, escalate abnormal activity to their behavioral specialist.   Since the Olympics are inseparable from world politics and diplomacy, we can be certain that these analysts represented all the key security and intelligence agencies from the major countries coming together in collaboration. For the U.S, that would likely be the FBI, NSA and CISA. For the U.K., that would be MI5 and the SIS, and so on. While the pandemic may have made the logistics of such collaboration more involved, there would nevertheless have been a joint command center in some shape or form in which the specialists from these agencies can share information in real-time. On top of this, we also know that numerous private security firms from various countries, including Japan, Taiwan and even Israel, have also been recruited to help in what seems to reflect the growing (and necessary) trend of cooperation between government organizations and private tech companies in the area of cybersecurity.         Going on the Offensive What I’m confident played an essential role in the Tokyo Olympics, having been relatively uneventful from a cybersecurity perspective, is intelligence-driven defense, or the act of looking for known threat actors through the kind of characteristic behaviors they are known to exhibit. Again, it’s defense through preventative offense. Another recent success story in which the same approach was used was the 2020 presidential election, further proving that investing in proactive, robust cybersecurity measures works. The fact that foreign actors did not successfully interfere in the election was not a sign that the preemptive actions were a waste of effort but rather a success. The same applies to this year’s Olympics. The lack of significant disruptions has been a clear win and is almost certainly a direct result of preemptive measures.      The tactics of cyber threat actors constantly evolve, so we must stay vigilant as well, and resting on our laurels is never a good idea. But given the alarming number of cybersecurity incidents so far in 2021, a success story like the Tokyo Olympics is a welcome bit of positive news and serves as a model example for organizations out there that still tend to err on the side of passivity. The ransomware attacks on Colonial Pipeline and JBS are just two of many examples showing that waiting until an incident occurs is costly and preventable. Instead, take a cue from the Tokyo Olympics: go on the offensive and beat threat actors at their own game.
• Publications • Influence The phylogenetic and historical demographic evidence suggests that there was a time lag between phylogenetic divergence and population establishment and that phenotypic adaptation of some endemic species to the limnetic environment occurred much later than the divergences of those endemic lineages. Expand Multiple colonizations of Lake Biwa by Sarcocheilichthys fishes and their population history Coalescent-based population analyses indicated that the local populations colonized the rocky bottom habitat in Lake Biwa from other habitats after the Last Glacial Maximum, likely reflecting past environmental changes in the lake, including the disappearance of rocky areas during the glacial climate. Expand Isolation and characterization of 15 microsatellite loci for the Japanese gudgeon Sarcocheilichthys variegatus In three populations of Sarcocheilichthys from Lake Biwa and the Ashida River in western Japan, seven to 27 alleles were observed for each locus, and only one locus showed significant deviation from Hardy–Weinberg equilibrium in a population. Expand A Novel Resource Polymorphism in Fish, Driven by Differential Bottom Environments: An Example from an Ancient Lake in Japan The results suggest that the gudgeon populations in Lake Biwa show a state of resource polymorphism associated with differences in the bottom environment, emphasizing the importance and generality of feeding adaptation as an evolutionary mechanism that generates morphological diversification. Expand
Data connections 1. How does an FTP server know the port number to use for a data connection? 2. True or false: when a user runs an FTP application, the application acts as both a client and server. Explain your answer. Don't use plagiarized sources. Get Your Custom Essay on Data connections Just from $13/Page Order Essay 3. List the three types of protocols used with email, and describe each. 4. According to the original email paradigm, could a user receive email if the user’s computer did not run an email server? Explain Place Order Grab A 14% Discount on This Paper Pages (550 words) Approximate price: - Paper format • 275 words per page • 12 pt Arial/Times New Roman • Double line spacing Try it now! Grab A 14% Discount on This Paper Total price: How it works? Follow these simple steps to get your paper done Place your order Proceed with the payment Choose the payment system that suits you most. Receive the final file
The power of I statements when supporting customers Some customer support situations call for tact. Others, empathy. And all require the support agent to make the customer feel heard, and like their needs are in good hands. In customer service, there are several communication strategies that agents can call upon — from empathy statements to various questioning types. One such communication technique is the use of “I statements”. So, where does the power of I statements lie when supporting customers? What are I statements? I statements are statements that (typically) begin with ‘I’. They put the speaker at the centre of the point being made. Not every sentence that begins with ‘I’ is an I statement. Rather, to be an I statement, the message must convey the feelings, viewpoints, or beliefs of the speaker. “I” vs “you” Contrasting with the I statement is the ‘you’ statement. You statements generally begin with the word ‘you’, and so tend to be more accusatory. Comparing the two is a good way to truly begin to understand the power of I statements, as they can completely change the tone of the message — without losing the meaning. For example: “You are interrupting me and not letting me help you.” “I will do my best to help you, but I need you to answer these questions so I can get to the root of the issue.” The power of I statements I statements convey three key elements from the speaker. These are assertiveness, empathy, and responsibility. And all are powerful in customer support interactions. • Assertiveness I statements are an oft-touted tool for creating assertiveness. (Without, crucially, eliciting defensiveness from the listener.)  In customer support, assertiveness helps to create a sense of confidence. The agent knows what to do and can confidently guide the customer to a resolution. • Empathy I statements humanise the agent. They’re not cold or robotic — they convey feelings and viewpoints. When used they remind the customers that there’s a thinking, feeling human on the other side of their screen, or the other end of their phone. Plus, because I statements are a way to assert the feelings of the speaker, they can be used to convey empathy to upset customers. As such, many empathy statements are also I statements. • Responsibility Using I statements can also show that the agent is taking on the responsibility of solving a problem. They’re not passing it off to someone else, they’re engaging with the customer to offer the best support. Disagreeing with customers Sometimes, the customer you’re supporting is mistaken. Contrary to the popular saying, the customer is not always right, and there are times where agents need to (respectfully) disagree with them. I statements are a powerful tool when it comes to disagreeing with customers. This is because they avoid placing blame on the customer for being mistaken — something which tends to lead to defensive behaviour. Read more: How to (respectfully) disagree with customers Calm over-emotional customers Another powerful use of I statements is to calm — and manage — customers whose emotions are getting the better of them. For upset customers, I statements can be used to demonstrate empathy. Agents can share their feelings or viewpoints to show that they align with the customer’s. In turn, this helps the customer feel listened to and understood. For angry customers, meanwhile, the humanising element of I statements can help remind the customer that there’s a human on the other side of the communication channel. (And so, they need to make sure their messages are appropriate.) It can be easy to forget you’re speaking to another person when you can’t see them. I statements are a great conflict resolution tool. They provide a way to convey viewpoints and feelings without using inflammatory language or escalating a situation. The power of I statements To sum, I statements are a handy conversational technique used in conflict resolution, relationship building, and customer support. By starting your sentences with “I”, you demonstrate assertiveness, empathy, and responsibility to the customers listening to your words. (Without an accusatory tone.) So, are your customer service team effectively using I statements? Useful links Seven empathy statements for customer service No, the customer is not always right (and why it’s risky to say so) A live chat session: the perfect place to calm a storm in a teacup
The Fiscal Cliff – A Fake Crisis The mainsteam media talks about the “fiscal cliff” a lot. The fiscal cliff is not a real crisis. It’s a fake crisis created by the State. In the USA, the fiscal cliff refers to two laws. First, the “Bush tax cuts” are set to expire at the end of the year. Second, during the last “debt ceiling” debate, the law had an unusual compromise. If Congress cannot agree on a budget, automatic budget cuts take effect. (the “sequestration”) That would lead to a tax hike and huge budge cuts, if there is no compromise. There’s an obvious fallacy. If Congress wanted to, they could change the law. It’s a fake crisis and not a real crisis. In Europe, there also is a fiscal cliff. There are several insolvent governments, with huge debts. Periodically, they get bailed out. Each bailout gives the governments enough money to pay the creditors/banks for a few more months. However, the budget deficit is not fixed and there’s another crisis every few months. In the USA, the Federal government’s debt is in dollars and the Federal government is the issuer for dollars. The budget deficit is just a number on a piece of paper. In a paper monetary system, you can have arbitrarily large deficits. The budget deficit isn’t free. The cost isn’t deferred to the future. The cost of the deficit is higher inflation. The only limit to deficits is the risk of hyperinflation. In the EU, no government controls its own money. Because the EU governments ceded monetary sovereignty, they can’t inflate their way out of debt like the USA. If Greece has a huge deficit, the cost is paid by inflation throughout the EU. Who benefits from the European government bailout? The main beneficiaries are the banks who own the bonds. Banks borrow cheaply from the central bank (Federal Reserve or ECB), and buy high-yielding government debt. When there is a bailout, those bonds get paid off at face amount, leading to huge profits for the banks. If there were no bailout, those banks would lose a lot of money due to high leverage. The government bailouts are an indirect bailout of the creditors, the big banks. Once in a while, there is not bailout and there’s a default. In that case, insiders and the big banks know it’s coming, and make a fortune short-selling. Who benefits from the periodic crisis? The politicians benefit. It seems like an urgent problem that the politicians are fixing. They get to make deals every time there’s a new compromise. Most people don’t realize that the “fiscal cliff” problem is 100% caused by government. They passed laws that set up a future crisis, if the law is not changed. It’s a fake crisis, because they could always change the law. 2 Responses to The Fiscal Cliff – A Fake Crisis The auction accounts and disbursements are handled EXCLUSIVELY by the FRBNY and have never been reported or audited. Details below and the footnoted article show a comprehensive mathematical analysis of how the Fed’s Ponzi scheme can be carried out. Read it and weep. Open letter to my Senators Dear Senator Receipts from the 2010 Treasury auctions totaled $8.4 trillion. $7 trillion was used to roll-over preexisting securities (without increasing the national debt) and $1.4 trillion was received from deficit spending as detailed above. That $1.4 trillion ($4 billion every day–7/52) disappeared in the catacombs of the FRBNY. Should members of Congress reflect on their involvement ? In addition, commercial banks have a practice of “fractional reserve” that allows them to create check book money as a multiple of “reserves.” It appears the QE’s has the FR banks writing checks in the same manner WITH NO REQUIREMENT FOR RESERVES. This appears to be a new practice of unlimited money creation without authorization of Congress—an entry of hyperinflation. Perhaps Congress should investigate. Olde Reb 2. Pingback: The US Fiscal Cliff: Gauging the Observer Effect | Enterprising Investor Leave a Reply Your email address will not be published.
Catastrophic power outages in Texas aren't just a result of the cold The state's electrical infrastructure plays a big role. Local infrastructure doesn't get much attention -- until it fails. Like right now in Texas. The state's electric grid, like most of the nation's, consists of many parts at least 50 years old. "Our electric grid is not a brand-new, state-of-the-art-designed system, anywhere in the United States," Maggie Koerth, a senior science reporter for FiveThirtyEight, told ABC News' daily podcast, "Start Here." "You're often talking about something that kind of evolved over time, that nobody planned out. ... There's all sorts of little weird things about how our grid functions that are unideal, but work most of the time -- and then when they stop working it becomes a real big problem." Koerth, who wrote a book about U.S. energy systems, said the freezing temperatures and precipitation Texas is experiencing can take down everything from the lines outside people's homes, freeze natural gas at production sites and prevent energy workers from driving to work. The Electric Reliability Council of Texas, the agency that oversees the state's grid, entered its highest alert level overnight into Monday and started rolling blackouts to conserve power. ERCOT also asked residents to close their blinds, unplug unused appliances, postpone doing laundry, wear warmer clothes and set thermostats no higher than 68 degrees. Another factor in the struggle to power Texas is the state's independent grid. "The U.S. electric grid is divided into three parts, everything east of the Rocky Mountains, everything west of the Rocky Mountains and Texas," Koerth explained. "Texas is like a whole other country." "It is like that because of politics. There's no technical reason why it has to be that way. There's no reason it's a remotely ideal situation," she continued. "That is what has evolved in that region for social, cultural, political reasons over the last 100 years. What it ends up meaning is that Texas can't share electricity or get electricity from the rest of the country very easily. It's possible, but it's not a very simple thing to have happen." That independence has had some benefits, and is a major reason why the state has led the nation in developing wind farms. But Texas wind farms are different from those in states to the north. In Minnesota, turbines are running with ease because of investments in a cold-weather package for their turbines, which includes heaters and de-icing mechanisms, Koerth explained. That said, a lack of wind power isn't the biggest problem in Texas, said Koerth, who added that "a far greater proportion of their lost generation capacity was coming from natural gas." The Texas outages are a wake-up call for serious discussions about infrastructure upgrades," Koerth said. "Our electrical infrastructure, all over the U.S., is very, very old. This is something that you see when disasters happen," she said. "You saw that with the Camp Fire, in California, with that 100-year-old transmission line that was involved in sparking that fire. "There's a bunch of old houses in America that are still operating a knob-and-tube wiring because there's not a big incentive to spend your renovation money on something like that if it's still working, until it catastrophically fails. It's the same thing with the grid as a whole." Top Stories Top Stories Top Stories Top Stories ABC News Live ABC News Live 24/7 coverage of breaking news and live events
Skip to main content Using C. elegans to discover therapeutic compounds for ageing-associated neurodegenerative diseases Age-associated neurodegenerative disorders such as Alzheimer’s disease are a major public health challenge, due to the demographic increase in the proportion of older individuals in society. However, the relatively few currently approved drugs for these conditions provide only symptomatic relief. A major goal of neurodegeneration research is therefore to identify potential new therapeutic compounds that can slow or even reverse disease progression, either by impacting directly on the neurodegenerative process or by activating endogenous physiological neuroprotective mechanisms that decline with ageing. This requires model systems that can recapitulate key features of human neurodegenerative diseases that are also amenable to compound screening approaches. Mammalian models are very powerful, but are prohibitively expensive for high-throughput drug screens. Given the highly conserved neurological pathways between mammals and invertebrates, Caenorhabditis elegans has emerged as a powerful tool for neuroprotective compound screening. Here we describe how C. elegans has been used to model various human ageing-associated neurodegenerative diseases and provide an extensive list of compounds that have therapeutic activity in these worm models and so may have translational potential. Despite decades of intense molecular research and the identification of many specific causative mutations, debilitating neurodegenerative diseases (NDs) including common disorders such as Alzheimer’s disease (AD) and Parkinson’s disease (PD), afflict millions worldwide and remain a significant and unresolved financial and social burden. Indeed, as ageing itself is by far the greatest risk factor for these diseases, this burden is set to increase dramatically as a result of our increasingly ageing population. Given the urgent need for therapies for these devastating and eventually fatal disorders, many researchers have developed animal models of NDs in order to screen for potential new drugs. In this review, we focus on compound screens performed in the nematode worm, Caenorhabditis elegans. We describe various different NDs that have been modelled in worms and list the therapeutic compounds that have been identified for each. In some cases, these compounds have also been shown to be protective in mammalian ND models, suggesting translational potential for human patients. We conclude that the combination of accurate genetic ND worm models with high-throughput automated drug screening platforms is a potentially very efficient strategy for early therapeutic drug discovery for NDs. An overview of human neurodegenerative diseases NDs are characterised by progressive neuropsychiatric dysfunction and the loss of structure and function of specific neuronal circuitry that in turn result in behavioural symptoms. NDs can occur on a completely hereditary basis (e.g. Huntington’s disease), or can be hereditary and also appear sporadically in the majority of cases (e.g. AD, PD). In spite of the diversity in the underlying genes involved, inheritance patterns, clinical manifestation and exact sites of neuropathology, the rare, early onset familial (also known as Mendelian) forms and the more prevalent late-onset sporadic forms of different NDs share some common genetic origins and pathological hallmarks, such as the progressive and chronic nature of the disease, the extensive loss of specific neuronal subtypes, synaptic dysfunctions, the formation and deposition of misfolded protein aggregates [13]. Research and technological innovations over the past 10 years have made considerable progress in the elucidation of mechanisms of ND initiation and progression that lead to neurodegeneration. Emerging common themes in the pathogenesis of neurodegeneration include: aberrant phosphorylation, palmitoylation and acetylation of disease-causing proteins, protein misfolding, deficient ubiquitin–proteasome system (UPS) or autophagic process to clear disease-causing proteins, altered RNA metabolism, oxidative stress, mitochondrial dysfunction, excitotoxicity, disrupted axonal transport, neuroinflammation and microglial activation [4]. Linkage analysis, high-throughput sequencing and genome-wide association studies (GWAS) have also identified susceptibility genes in many NDs (Table 1) and promise to help unravel even more genes, novel loci and common genetic variants associated with the diverse collection of human NDs. Thus developments of therapeutic interventions that are applicable across the broad spectrum of NDs and target the shared pathogenic mechanisms may offer the best hope for a future neuroprotective therapy. Table 1 A list of published C. elegans models of human neurodegenerative diseases and drugs that were shown to confer neuroprotection Caenorhabditis elegans as a model for human neurodegenerative disease A major challenge to the identification of effective disease-modifying therapies arises from an insufficient knowledge about the contribution of multiple pathways to disease pathogenesis. Mammalian disease models offer in vivo opportunities and extensive similarity to the human brain, but testing the therapeutic value of small molecules in mammalian model systems is extremely expensive and requires time-consuming experimental designs that can be prohibitive. Over the past decades, C. elegans has increasingly been used as a model system to study the underlying molecular mechanisms that give rise to neurodegeneration because of its well-characterised and easily accessible nervous system, short generation time (≈3 days) and lifespan (≈3 weeks), tractability to genetic manipulation, distinctive behavioural and neuropathological defects, coupled with a surprisingly high degree of biochemical conservation compared to humans. Remarkable similarities exist at the molecular and cellular levels between nematode and vertebrate neurons. For example, ion channels, receptors, classic neurotransmitters [acetylcholine, glutamate, γ-aminobutyric acid (GABA), serotonin, and dopamine (DA)], vesicular transporters and the neurotransmitter release machinery are similar in both structure and function between vertebrates and C. elegans [5, 6]. Importantly, the impact of different challenges such as genetic perturbations or exposure to drugs on the survival and function of defined neuronal populations in the C. elegans nervous system can be readily studied in vivo. To date, various laboratories have developed and characterised a diverse set of C. elegans models of various human NDs, including AD [7], PD [8] and polyglutamine expansion diseases [9] (Table 1). These worm ND models have been developed by over-expressing human ND-associated genes (both wild type and mutant versions) and by mutating or altering the expression level of the orthologous worm genes. Strong parallels were especially observed in the genotype-to-phenotype correlations between the human NDs and the phenotypes of transgenic C. elegans ND models. This supports the validity of the approach as expression of mutant human proteins in C. elegans can closely model a fundamental property of these mutations in humans. Nevertheless, there are also limitations to using C. elegans to model NDs that must be considered. Although the worm offers huge potential for experimental manipulations, there are aspects of ND pathophysiology that cannot easily be modelled in worms. For example, abundant evidence supports an important role for brain inflammation and microglial cell activation in several NDs, notably AD [10], but there is no microglial equivalent among the 56 glial cells of C. elegans. Clearly, the very simplicity of the worm nervous system that makes it so attractive for studying basic neurobiology is also a disadvantage in that the complexity of the mammalian brain cannot be adequately reflected, and so rodent models will continue to be required to validate any findings from C. elegans ND studies. There are also potential pitfalls of using C. elegans for drug screening, as many compounds do not easily penetrate the worm’s protective cuticle [11] and as biotransformation of compounds by the worms’ E. coli food source may give misleading pharmacological information [12]. Although these potential pitfalls can be mitigated by combining predictive bioaccumulation algorithms [11] with increased dose regimens, and by confirming drug effects using metabolically inactive E. coli, these issues need to be considered when performing drug screens in worms. Despite the above caveats, C. elegans remains a widely used animal model to identify genes that modify neurodegeneration in vivo. Indeed, genetic screens performed on worm models have identified a wide variety of conserved genes that can suppress or increase disease progression and are thus potential therapeutic drug targets. However, relatively few of these genetic modifiers are common to more than one disease model, despite the shared feature of protein misfolding/aggregation [13, 14]. In addition to its utility for screening for genetic contributors to NDs, C. elegans is a useful pharmacological model for testing potential neuroprotective compounds. Numerous well-characterised ND models have been readily exploited for triaging compounds from large libraries consisting of novel and pre-approved drugs, and for testing the effects of individual drugs, prior to validation in vertebrate models. Potential therapeutics identified via such compound screens using specific worm ND models are shown in Figs. 1, 2, listed in Table 1 and described in detail below. Fig. 1 Structures of compounds with therapeutic effects in C. elegans models of human neurodegenerative diseases. Chemical structures were obtained from PubChem ( or MolBase ( AD Alzheimer’s disease, ALS amyotrophic lateral sclerosis, ANCL adult-onset neuronal ceroid lipofuscinosis, FTDP frontotemporal dementia with parkinsonism-17, HD Huntington’s disease, MJD Machado–Joseph disease (spinocerebellar ataxia type 3), PD Parkinson’s disease, Prion prion disease, SMA spinal muscular atrophy Fig. 2 Alzheimer’s disease: amyloid-β (Aβ) models β-Amyloid is the main component of the extracellular plaques found in the brains of Alzheimer’s disease patients. It is widely (though not universally) believed that aggregation of Aβ into oligomeric forms is the main driver of neurodegeneration in Alzheimer’s disease. This has been modelled in nematodes by expressing human Aβ constructs in worm muscle cells [7]. The Aβ-induced paralysis observed in the well-characterised muscle-specific strains has provided a valuable phenotype for straightforward quantification of the effects of treatments on Aβ toxicity and validation of potential therapeutic interventions for Alzheimer’s disease. The C. elegans strain CL2006, which constitutively expresses human Aβ1-42, has been elegantly used to demonstrate the neuroprotective effects of a diverse range of compounds (Table 1; Figs. 1, 2). These include natural products such as specific gingkolides [15], soya isoflavone glycitein [16], the green tea component epigallocatechin gallate [17, 18] and coffee extract [19]; FDA-approved drugs such as tannic acid, bacitracin, rifampicin [20], thioflavin T [21], reserpine [22] and the antidepressant fluoxetine; and polyphenolic compounds such as curcumin and ferulic acid [23, 24]. These treatments conferred considerable life-span extension and cellular stress tolerance [15, 16]. This was a consequence of most compounds attenuating the rate of toxic human Aβ1–42 mediated paralysis, to suppress the Aβ1–42 induced increase in toxic reactive oxygen species and hydrogen peroxide levels, and to inhibit Aβ1–42 oligomerisation and deposition [15, 25]. Recent studies have also demonstrated how the antibiotic tetracycline and its analogues [26], and ethanol extract of Liuwei Dihuang [27] successfully protected the CL4176 inducible Aβ1–42 muscle-specific expression model by inhibiting Aβ1–42 oligomerisation and reducing superoxide production. Oleuropein aglycone, the main polyphenol in extra virgin olive oil, was recently shown to protect against amyloid toxicity in both constitutive and inducible Aβ1–42 models [28]. In addition, two recent large, unbiased yeast-based screens of pharmacological modifiers identified the 8-hydroxyquinoline chemical scaffold (8-OHQ), a class of clinically relevant bioactive metal chelators as neuroprotective compounds that reduced proteotoxicity associated with the aggregation of several ND-specific proteins including TDP-43, α-synuclein, polyglutamine proteins, or Aβ1–42 [29, 30]. Notably, two closely related 8-OHQs–PBT2 and clioquinol, which conferred neuroprotective benefits in mouse models of AD, were further shown to rescue Aβ1–42 toxicity in C. elegans body wall muscle cells [31] and glutamatergic neurons [30]. PBT2 was also effective in improving cognition and reducing Aβ in cerebrospinal fluid in a small Phase IIA trial in AD patients [31]. In addition to amyloid plaque deposition, Alzheimer’s disease is associated with intraneuronal accumulation of neurofibrillary tangles containing the microtubule-associated protein Tau, which aggregates into insoluble fibrillar deposits when it is hyperphosphorylated [32]. Pathological Tau deposits are also observed in Pick’s disease, corticobasal degeneration, Down’s syndrome and specific types of frontotemporal dementia (FTD) such as frontotemporal dementia with parkinsonism chromosome 17 type (FTDP-17) and frontotemporal lobar dementia (FTLD). Various worm transgenic Tauopathy models expressing mutant human Tau constructs have therefore been generated and yielded complementary findings in regards to the effects of neuronal Tau expression [3335]. Neurodegeneration in worms expressing transgenic human mutant Tau can be assessed indirectly, using phenotypes such as impaired locomotion and reduced lifespan, but also directly by visualising loss of neuronal cell bodies and neuronal processes in vivo. An example of the latter is shown in Fig. 3, where a human Tau construct containing the FTDP-17-associated V337 M mutation is expressed in all 302 worm neurons via a pan-neuronal C. elegans promoter. In addition, the 26 GABAergic neurons of the worm are specifically labelled by driving green fluorescent protein (GFP) expression from GABA-specific C. elegans promoter. In control worms, a continuous, intact line of GFP fluorescence is seen running along both the ventral and dorsal nerve cords on opposite sides of the animal. In contrast, the mutant Tau transgenic strains exhibits large gaps in these nerve cords where neuronal processes are missing, thus directly demonstrating severe neurodegeneration in the living animal. Fig. 3 A C. elegans genetic model of the Tauopathy, FTDP-17. Triple transgenic worms expressing human V337M mutant Tau protein (Paex-3::V337M Tau), a pharyngeal GFP marker (Pmyo-2::GFP) and a GFP reporter transgene marking the cell bodies and processes of all C. elegans GABAergic neurons (Punc-25::GFP) were compared with control single Punc-25::GFP transgenic worms. All panels are micrographs of representative whole worms. Control (left panels) and Tau V337M expressing worms (right panel) were examined after 1, 5 and 10 days of age. In control worms, intact ventral and dorsal cords were observed at all ages. In contrast, the mutant Tau transgenic GABAergic reporter strain exhibited severe degeneration of neuronal processes. Ventral and dorsal cord gaps (arrows) are disruptions in the continuity of the ventral and dorsal nerve cords, respectively. Scale bar represents 200 μm for all panels except for the bottom two panels, which are high magnifications of the boxed areas of day-10 worms shown above Using such Tauopathy models, compounds with known anti-aggregation activity like methylene blue, were shown to effectively ameliorate the worms’ motility and neuronal defects [36]. In addition, a novel compound belonging to the aminothienopyridazine class, cmp16, was also shown to rescue these phenotypes and to suppress Tau aggregation in worms [36]. Importantly, aminothienopyridazines are known to suppress Tau aggregation in mammalian cells and so the improved blood–brain barrier permeability of cmp16 suggests that this compound may have significant translational potential. In a recent screen of a library of FDA-approved compounds, dopamine D2 receptor antagonism was identified as a promising strategy for targeting tau-induced neurotoxicity, as antipsychotics such as azaperone, perphenazine, and zotepine improved the phenotypic features of Tauopathy in worms (Table 1; Figs. 1, 2). Azaperone, in particular, effectively ameliorated mutant Tau-induced functional defects and reduced the level of insoluble Tau aggregation [37]. Finally, a recent study reported that the anti-epileptic drug, ethosuximide, could ameliorate the impaired motility and reduced lifespan phenotypes of the Tau V337 M worm FTDP-17 model [38]. Interestingly, ethosuximide’s action in this worm Tau model was independent of its main proposed target in epilepsy, the T-type calcium channel. Polyglutamine (polyQ) disorders Expansion of trinucleotide CAG repeats in a variety of different genes leads to neurodegenerative diseases such as Huntington’s disease and spinocerebellar ataxias due to the expression of a polyglutamine tract within the encoded protein. Diverse worm transgenic models where varying lengths of polyQ tracts are expressed in specific sets of neurons, muscle cells and even intestine cells have been widely used to model several aspects of polyQ neurotoxicity, notably to address the mechanisms underlying the impact of aggregation prone proteins on cellular function and to identify novel disease modifiers [3941]. The progressive nature of polyQ-mediated toxicity, protein aggregation and general severity of phenotype demonstrated in these models is age- and polyQ-tract-length-dependent, recapitulating critical aspects of polyglutamine expansion diseases in patients. Voisine et al. [42] screened candidate pharmacological compounds utilising a HD model in which the pqe-1 genetic mutant background greatly enhanced toxicity induced by a human Huntingtin construct containing a 150-residue glutamine tract (Htt-Q150). Both lithium chloride and mithramycin alleviated neuronal cell death, while trichostatin A (a class I and class II HDAC inhibitor) provided significant neuroprotection. Using the same HD model, Varma et al. [43] discovered that small molecular inhibitors of metabolism (mitochondrial and glycolytic function) such as rotenone, oligomycin and 4-dinitrophenol rescued neuronal loss and degeneration by activating caspase inhibition and ERK and AKT prosurvival signalling and their efficacy was further validated in cell culture and Drosophila HD models (Table 1; Figs. 1, 2). Resveratrol, a demonstrated activator of sirtuin deacetylases, also effectively alleviated Htt-Q128 toxicity in both worm and neuronal culture models [44]. Recently, treatment of a C. elegans model of SCA3 (spinocerebellar ataxia type 3; also known as Machado-Joseph disease) with 17-(allylamino)-17-demethoxygeldanamycin (17-AAG), an HSP90 inhibitor, successfully decreased the mutant ATXN3 aggregation and improved locomotor activity [39]. Treatment of the same model with valproic acid (VA), another HDAC inhibitor and a well-known anti-epileptic drug, also led to improved locomotor activity accompanied by a decrease in mutant ATXN3 aggregation. Therefore, HDAC inhibitors which promote histone acetylation over deacetylation and which were also known to provide protection against polyQ mediated toxicity in vertebrate and Drosophila neurons may hold promise as a preventive therapy in polyQ diseases. Other pan-neuronal or neuron specific HD models facilitated the identification of other potential therapeutic interventions, including the anti-cancer agent β-lapachone [45], D. officinarum root extracts [46] and a phenol glycoside salidroside [47], which conferred protection against polyQ neuronal toxicity. Treating C. elegans muscle polyQ models with hydroxylamine, icariin and celecoxib derivatives (NG-094, icariside II and OSU-03012, respectively) ameliorated polyQ-mediated protein aggregation and protected against polyQ proteotoxicity [4850] (Table 1; Figs. 1, 2). Aspirin, an analgesic agent, was also shown to significantly improve polyQ-mediated animal paralysis, reducing the number of Q35-YFP aggregates and delaying polyQ-dependent acceleration of aging [51]. Parkinson’s disease (PD) Pathologically, PD is characterised by degeneration of dopaminergic neurons in the substantia nigra and accumulation of Lewy bodies containing aggregated α-synuclein protein. Although most cases are idiopathic, PD can be caused by both environmental (e.g. pesticide exposure) and genetic (e.g. α-synuclein and LRRK2 mutation) effects. Multiple worm PD models, notably the toxin-induced models, have aided in the discovery and validation of potential pharmacological interventions for PD. An example of how dopaminergic neurodegeneration can be directly assessed in vivo in C. elegans is shown in Fig. 4. Here, the eight dopaminergic neurons of the worm are specifically labelled by GFP expression from the promoter of the C. elegans dopamine transporter. In control worms, fluorescent neuronal cell bodies extending long processes are clearly visible in the head (6 neurons) and tail (2 neurons) of the animal. However, treatment with the PD-inducing toxin, 6-hydroxydopamine (6-OHDA), causes the loss of GFP-labelled dopaminergic neuronal cell bodies and/or processes, thus enabling direct visualisation of neurodegeneration. Fig. 4 A C. elegans model of toxin-induced Parkinson’s disease. a Dopaminergic (DA) neuronal cell bodies and neurites in BY250 worms were visualised using an integrated Pdat-1::GFP dopamine transporter marker. C. elegans has eight DA neurons: six are located in the anterior region, which can be subclassified in pairs as two anterior deirid neurons (ADE), two dorsal cephalic neurons (CEP) which are postsynaptic to the ADE neurons and two ventral CEPs that are not postsynaptic to the ADEs; two posterior deirid neurons (PDE) located posteriorly are also shown. Arrows depict the four CEP neuron processes and indicate the ADE and PDE cell bodies in a young worm. Anterior is to the left. b Representative examples of worms scored which display the three characteristic stages of DA neurodegeneration in response to 6-OHDA. Magnification of anterior region of C. elegans shows only the anterior-most DA neurons. WT: in this example, all six anterior DA neurons of this worm appear robust and the dendrites are intact and fully extended. Neuronal process blebbing; cell body rounding: this worm exhibited prominent cell body rounding (asterisk) and dendrite blebbing (arrows); cell body loss: this worm exhibited a complete loss of GFP in most DA neurons as CEP and ADE neurons have all degenerated and are no longer visible in any focal plane, only retention of GFP expression in the remnants of neuron cell bodies and broken neurites. All scale bars represent 20 μm. c Representative images of worms 24 h post-6-OHDA-exposure are presented. BY250 worms treated with ascorbic acid (AA) alone expressed intact and strong GFP in all six DA neurons and dendrites in the heads. However, the majority of BY250 worms incubated with 50 mM 6-OHDA showed a marked GFP expression reduction in the dendrites of ADEs and CEPs, many of the cell somas became round (asterisk) and blebs appeared along the dendrites of CEPs (arrows) Chemical screens have suggested that compounds which protect mitochondria or increase autophagy protect against α-synuclein toxicity [52, 53]. Braungart et al. [54] performed a focused compound screen using the C. elegans MPTP model of PD and found that lisuride and apomorphine (dopamine receptor agonists), as well as rottlerin (protein kinase C inhibitor) ameliorated the MPTP-induced behavioural defects when present at a low concentration. In addition, nomifensine (dopamine transporter inhibitor), nicotine (acetylcholine receptor agonist), selegiline (monoamine oxidase inhibitor), MPEP (mGluR-5 inhibitor), amantadine, α-lipoic acid (antioxidant) and ascorbic acid (antioxidant) were effective at higher concentrations [53]. In another screen, two mammalian dopamine D2 receptor agonists, bromocriptine and quinpirole, were identified to confer significant neuroprotection independent of dopamine receptors in a 6-OHDA-induced dopaminergic neurodegeneration model of PD [55]. Similarly, a low concentration of acetaminophen (analgesic and antipyretic) was reported by Locke et al. [56] to protect significantly against 6-OHDA toxicity-induced dopaminergic neurodegeneration in P dat-1 ::GFP expressing worms. However, the protection appears to be selective as acetaminophen was not neuroprotective against α-synuclein-induced neurodegeneration at any concentration tested. The anti-epileptic drug, valproic acid provided significant dopaminergic neuroprotection in a C. elegans PD model associated with human α-synuclein overproduction, which was further shown to be mediated through ERK-MAPK signalling [57]. A more recent study has also demonstrated the neuroprotective effects of the naturally occurring polyamine spermidine and phytocompounds such as n-butylidenephthalide, curcumin, N-acetylcysteine and vitamin E on 6-OHDA-induced degeneration of dopaminergic neurons and their ability to attenuate α-synuclein accumulation. n-butylidenephthalide, in particular, had the greatest neuroprotective capacity and was shown to also restore food-sensing behaviour and dopamine levels in both pharmacological and transgenic C. elegans PD models as well as enhancing the life span of 6-OHDA-treated animals [58]. Acetylcorynoline, the major alkaloid component derived from Corydalis bungeana, a traditional Chinese medical herb demonstrated the same neuroprotective effects when applied to the same pharmacological and transgenic C. elegans PD models [59]. Kinase-targeted inhibition of LRRK2 protein activity was recently established as an effective treatment for PD as LRRK2 kinase inhibitors consistently mitigated pathogenesis caused by different LRRK2 mutations. Liu et al. [60] showed that though GW5074, an indoline compound, and sorafenib, a Raf kinase inhibitor, did not have protective effects against α-synuclein- and 6-OHDA-induced toxicity, they increased survival and reduced dopaminergic neurodegeneration in G2019S-LRRK2 transgenic C. elegans and Drosophila. Yao et al. [61] further demonstrated the potency of kinase inhibitors as they were able to pharmacologically rescue both the behavioural deficit and neurodegeneration manifested by the expression of mutant LRRK2 G2019S and R1441C in vivo using two LRRK2 inhibitors, TTT-3002 and LRRK2-IN1, which also potently inhibited in vitro kinase activities of LRRK2 wild-type, R1441C and G2019S at nanomolar to low micromolar concentrations when administered either pre-symptomatically or post-symptomatically. Compounds that have been shown to be protective in the various worm PD models are listed in Table 1 and their chemical structures shown in Figs. 1 and 2. Amyotrophic lateral sclerosis (ALS) A number of transgenic lines expressing mutant forms of human SOD1 found in familial ALS patients under a range of promoters have been generated and recapitulated the motor neuron degeneration and paralysis characteristic of ALS patients [102, 103, 105, 108]. Genes recently shown to be mutated in ALS include the DNA/RNA binding proteins TDP-43 and FUS, and C9ORF72, a novel familial and sporadic ALS causative gene. Treatment with methylene blue, an aggregation inhibitor of the phenothiazine class, not only rescued toxic phenotypes (including neuronal dysfunction and oxidative stress) associated with mutant TDP-43 and FUS in C. elegans and zebrafish ALS models [62], but also ameliorated Tau mediated toxicity in a newly established C. elegans model [36]. Using transgenic TDP-43 models, Tauffenberger et al. evaluated 11 compounds previously reported to enhance longevity in C. elegans and resveratrol (polyphenol), rolipram (phosphodiesterase 4 inhibitor), reserpine (antihypertensive), ethosuximide (anti-epileptic), trolox and propyl gallate (antioxidants) were revealed as effective candidates that protected against mutant TDP-43 toxicity in motor neurons [63] (Table 1; Figs. 1, 2). Recent genetic experiments by Kraemer’s group suggested that inhibiting cell division cycle kinase 7 (CDC7) kinase activity reduces phosphorylation of TDP-43 and the consequent neurodegeneration. Small molecule inhibition of CDC-7 by PHA767491 was further shown to robustly reduce TDP-43 phosphorylation and prevent TDP-43 dependent neurodegeneration both in vitro and in vivo [64]. Autosomal dominant adult-onset neuronal ceroid lipofuscinosis (ANCL) ANCL, also known as autosomal dominant Kufs’ disease and Parry disease, is a rare hereditary disease characterised by intra-neuronal inclusions of autofluorescent lipofuscin-like material and neurodegeneration [65, 66]. Recently, four independent research groups have reported that ANCL is caused by mutations in the DNAJC5 gene that encodes the endogenous neuroprotective synaptic chaperone cysteine string protein (CSP) [6770]. Our lab has recently developed a C. elegans model of ANCL by using null mutants of the worm DNAJC5 orthologue, dnj-14 [71]. These worms have similar phenotypes to ANCL patients and also to CSP mutants in mice, in terms of reduced lifespan, progressive neuronal dysfunction and neurodegeneration [72]. This evolutionary conservation of CSP’s neuroprotective function suggests that the worm dnj-14 model could have potential for identifying generic neuroprotective interventions rather than disease specific drug targets. Indeed, a focused screen of pharmacological compounds that ameliorated the dnj-14 lifespan and neuronal defects identified the polyphenolic molecule resveratrol, which has been shown to be neuroprotective in a range of animal neurodegeneration models [71]. In contrast to other worm neurodegeneration models [44, 63, 73, 74], however, resveratrol acted in a sir-2.1-independent manner, as sir-2.1; dnj-14 double mutants showed full lifespan rescue by resveratrol. Instead, the mechanism of resveratrol action appeared to be via inhibition of cAMP phosphodiesterase, as the phosphodiesterase inhibitor, rolipram was shown to mimic the effect of resveratrol in rescuing dnj-14 phenotypes [71]. More recently, the anti-epileptic drug ethosuximide has been shown to be protective in the dnj-14 model, acting through a DAF-16/FOXO-dependent mechanism that is distinct from its proposed mechanism of action in epilepsy [38]. Ethosuximide also ameliorates the phenotypes of worm models of FTDP-17 [38] and ALS [63] and reduces protein aggregation in a mouse neuronal cell culture model of Huntington’s disease [38], suggesting that it may have general and evolutionarily conserved neuroprotective properties. Indeed, it has recently been shown that ethosuximide reverses cognitive decline in a rat model of Alzheimer’s disease [75]. Finally, a recent genome-wide transcriptional profiling study of dnj-14 mutants revealed a striking reduction in expression of ubiquitin proteasome system (UPS)-related genes in comparison to wild type control strains [76]. Genes encoding components of multimeric E3 ubiquitin ligases were especially over-represented, suggesting that these may represent potential novel drug targets for treatment of ANCL and perhaps other neurodegenerative diseases. Translational implications of C. elegans chemical screens The different screening strategies that have been applied to C. elegans ND models have provided distinct insights into potential therapeutic approaches in patients. These strategies range from robotic automated imaging-based approaches designed for high throughput compound library screening [77] to highly focused screens of a selected small group of compounds that target a common pathological process such as protein aggregation [21]. Large scale screens offer greater coverage of chemical space and so have potential to identify unifying pharmacological themes amongst multiple hits from compound libraries. For example, several different dopamine D2 receptor antagonists were recovered as hits in an unbiased library screen using a Tauopathy model, with genetic techniques then being used to confirm that reduced D2 receptor function is indeed neuroprotective [37]. Whilst this suggests that several currently prescribed atypical anti-psychotic drugs could potentially be re-purposed for treatment of human tauopathies, dosing regimens would need to be carefully considered given reports that the relatively high doses of these medications used to treat aggression and agitation in dementia patients may increase the risk of death [78]. One observation that emerges from our analysis of the large number of studies to date is that very few compounds are therapeutic in multiple C. elegans ND models. Indeed, out of the 72 compounds shown in Figs. 1 and 2, only ethosuximide and resveratrol are effective in more than two ND models and therefore appear to have general neuroprotective activity. This may be due in part to the fact that most published studies have focused on relatively small sets of compounds and so activity across multiple ND models remains to be tested. Nevertheless, it seems certain that this also reflects disease-specific pharmacological actions—for example, Raf kinase inhibition is therapeutic in LRRK2-based PD models, but ineffective in α-synuclein- and 6-OHDA-based PD models [60]. Clearly, effective clinical treatments with such highly disease-specific drugs requires knowledge of the underlying pathophysiological mechanism, which is not always diagnosable in NDs. Drugs such as ethosuximide and resveratrol are therefore potentially very useful, as they may provide general neuroprotective activity regardless of uncertainties regarding molecular pathology. The mechanism of action of ethosuximide and resveratrol remains unclear and controversial [7981], but both have been linked to increased longevity and healthspan in model organisms [82, 83]. Given that dietary restriction, the best established intervention known to increase longevity and healthspan, is therapeutic in multiple ND models from invertebrates to mice [84], it is clear that slowing the ageing process can confer general neuroprotection. It may be that ethosuximide and resveratrol modulate some of the same conserved neuroprotective mechanisms that decline with age, thus potentially explaining their therapeutic effects in radically different ND models. Conclusions and future perspectives The nematode C. elegans has great potential for expediting neuroprotective drug discovery. Its facile genetics and suitability for high-throughput compound screening mean that both target-driven and phenotypic screening approaches can easily be performed (and potentially combined). Although phenotypic screening became unfashionable as a drug discovery paradigm in the post-genomic era, Swinney and Anthony have clearly shown that most new medicines still continue to be discovered via phenotypic screening [85]. This influential work has forced a re-evaluation in the pharma industry and a consequent shift towards phenotypic screening that incorporates available knowledge of targets/mechanisms [86], for which C. elegans is ideally suited. Furthermore, there is increasing evidence that using compound combinations designed to act on multiple molecular targets can be an effective therapeutic strategy—as exemplified by the spectacular success of combination therapy for HIV [87]. Testing of many such drug combinations can be performed rapidly and cheaply using worm models, in contrast to rodent models. In addition, technical developments such as CRISPR [88] now offer the potential to rapidly create new and more accurate C. elegans models of human neurodegenerative diseases, by precisely delivering single-copies of mutant genes identified from patients to appropriate desired locations in the worm genome. Although C. elegans has already facilitated the identification of potential novel therapeutics, the future combination of more accurate genetic models with high-throughput automated drug screening platforms is a potentially very efficient strategy for therapeutic drug discovery for NDs. 1. 1. Muchowski PJ (2002) Protein misfolding, amyloid formation, and neurodegeneration: a critical role for molecular chaperones? Neuron 35(1):9–12 CAS  Article  Google Scholar  2. 2. Taylor JP, Hardy J, Fischbeck KH (2002) Toxic proteins in neurodegenerative disease. Science 296(5575):1991–1995 CAS  Article  Google Scholar  3. 3. Soto C, Estrada LD (2008) Protein misfolding and neurodegeneration. Arch Neurol 65(2):184–189 Article  Google Scholar  4. 4. Ehrnhoefer DE, Wong BK, Hayden MR (2011) Convergent pathogenic pathways in Alzheimer’s and Huntington’s diseases: shared targets for drug development. Nat Rev Drug Discovery 10(11):853–867 CAS  Article  Google Scholar  5. 5. Hardaway JA, Hardie SL, Whitaker SM, Baas SR, Zhang B, Bermingham DP, Lichtenstein AJ, Blakely RD (2012) Forward genetic analysis to identify determinants of dopamine signaling in Caenorhabditis elegans using swimming-induced paralysis. G3 2(8):961–975 CAS  Article  Google Scholar  6. 6. Barclay JW, Morgan A, Burgoyne RD (2012) Neurotransmitter release mechanisms studied in Caenorhabditis elegans. Cell Calcium 52(3–4):289–295 CAS  Article  Google Scholar  7. 7. Link CD (1995) Expression of human beta-amyloid peptide in transgenic Caenorhabditis elegans. Proc Natl Acad Sci USA 92(20):9368–9372 CAS  Article  Google Scholar  8. 8. Nass R, Miller DM, Blakely RD (2001) C. elegans: a novel pharmacogenetic model to study Parkinson’s disease. Parkinsonism Relat Disord 7(3):185–191 Article  Google Scholar  9. 9. Satyal SH, Schmidt E, Kitagawa K, Sondheimer N, Lindquist S, Kramer JM, Morimoto RI (2000) Polyglutamine aggregates alter protein folding homeostasis in Caenorhabditis elegans. Proc Natl Acad Sci USA 97(11):5750–5755 CAS  Article  Google Scholar  10. 10. Amor S, Puentes F, Baker D, van der Valk P (2010) Inflammation in neurodegenerative diseases. Immunology 129(2):154–169 CAS  Article  Google Scholar  11. 11. Burns AR, Wallace IM, Wildenhain J, Tyers M, Giaever G, Bader GD, Nislow C, Cutler SR, Roy PJ (2010) A predictive model for drug bioaccumulation and bioactivity in Caenorhabditis elegans. Nat Chem Biol 6(7):549–557 CAS  Article  Google Scholar  12. 12. Cabreiro F, Au C, Leung KY, Vergara-Irigaray N, Cocheme HM, Noori T, Weinkove D, Schuster E, Greene ND, Gems D (2013) Metformin retards aging in C. elegans by altering microbial folate and methionine metabolism. Cell 153(1):228–239 CAS  Article  Google Scholar  13. 13. van Ham T, Breitling R, Swertz M, Nollen E (2009) Neurodegenerative diseases: lessons from genome-wide screens in small model organisms. EMBO Mol Med 1(8–9):360–370 Google Scholar  14. 14. Chen X, Burgoyne RD (2012) Identification of common genetic modifiers of neurodegenerative diseases from an integrative analysis of diverse genetic screens in model organisms. BMC Genom 13:71 Article  CAS  Google Scholar  15. 15. Wu Y, Wu Z, Butko P, Christen Y, Lambert MP, Klein WL, Link CD, Luo Y (2006) Amyloid-beta-induced pathological behaviors are suppressed by Ginkgo biloba extract EGb 761 and ginkgolides in transgenic Caenorhabditis elegans. J Neurosci 26(50):13102–13113 CAS  Article  Google Scholar  16. 16. Gutierrez-Zepeda A, Santell R, Wu Z, Brown M, Wu Y, Khan I, Link CD, Zhao B, Luo Y (2005) Soy isoflavone glycitein protects against beta amyloid-induced toxicity and oxidative stress in transgenic Caenorhabditis elegans. BMC neuroscience 6:54 Article  CAS  Google Scholar  17. 17. Abbas S, Wink M (2009) Epigallocatechin gallate from green tea (Camellia sinensis) increases lifespan and stress resistance in Caenorhabditis elegans. Planta Med 75(3):216–221 CAS  Article  Google Scholar  18. 18. Abbas S, Wink M (2010) Epigallocatechin gallate inhibits beta amyloid oligomerization in Caenorhabditis elegans and affects the daf-2/insulin-like signaling pathway. Phytomedicine 17(11):902–909 CAS  Article  Google Scholar  19. 19. Dostal V, Roberts CM, Link CD (2010) Genetic mechanisms of coffee extract protection in a Caenorhabditis elegans model of beta-amyloid peptide toxicity. Genetics 186(3):857–866 CAS  Article  Google Scholar  20. 20. Lublin A, Isoda F, Patel H, Yen K, Nguyen L, Hajje D, Schwartz M, Mobbs C (2011) FDA-approved drugs that protect mammalian neurons from glucose toxicity slow aging dependent on Cbp and protect against proteotoxicity. PLoS One 6(11):e27762 CAS  Article  Google Scholar  21. 21. Alavez S, Vantipalli MC, Zucker DJ, Klang IM, Lithgow GJ (2011) Amyloid-binding compounds maintain protein homeostasis during ageing and extend lifespan. Nature 472(7342):226–229 CAS  Article  Google Scholar  22. 22. Arya U, Dwivedi H, Subramaniam JR (2009) Reserpine ameliorates Abeta toxicity in the Alzheimer’s disease model in Caenorhabditis elegans. Exp Gerontol 44(6–7):462–466 CAS  Article  Google Scholar  23. 23. Jagota S, Rajadas J (2012) Effect of phenolic compounds against Abeta aggregation and Abeta-induced toxicity in transgenic C. elegans. Neurochem Res 37(1):40–48 CAS  Article  Google Scholar  24. 24. Keowkase R, Aboukhatwa M, Luo Y (2010) Fluoxetine protects against amyloid-beta toxicity, in part via daf-16 mediated cell signaling pathway, Caenorhabditis elegans. Neuropharmacology 59(4–5):358–365 CAS  Article  Google Scholar  25. 25. Smith JV, Luo Y (2003) Elevation of oxidative free radicals in Alzheimer’s disease models can be attenuated by Ginkgo biloba extract EGb 761. J Alzheimers Dis 5(4):287–300 Google Scholar  26. 26. Diomede L, Cassata G, Fiordaliso F, Salio M, Ami D, Natalello A, Doglia SM, De Luigi A, Salmona M (2010) Tetracycline and its analogues protect Caenorhabditis elegans from beta amyloid-induced toxicity by targeting oligomers. Neurobiol Dis 40(2):424–431 CAS  Article  Google Scholar  27. 27. Sangha JS, Sun X, Wally OSD, Zhang K, Ji X, Wang Z, Wang Y, Zidichouski J, Prithiviraj B, Zhang J (2012) Liuwei Dihuang (LWDH), a traditional Chinese medicinal formula, protects against β-Amyloid toxicity in transgenic Caenorhabditis elegans. PLoS One 7(8):e43990 CAS  Article  Google Scholar  28. 28. Diomede L, Rigacci S, Romeo M, Stefani M, Salmona M (2013) Oleuropein aglycone protects transgenic C. elegans strains expressing Abeta42 by reducing plaque load and motor deficit. PLoS One 8(3):e58893 CAS  Article  Google Scholar  29. 29. Tardiff DF, Tucci ML, Caldwell KA, Caldwell GA, Lindquist S (2012) Different 8-hydroxyquinolines protect models of TDP-43 protein, alpha-synuclein, and polyglutamine proteotoxicity through distinct mechanisms. J Biol Chem 287(6):4107–4120 CAS  Article  Google Scholar  30. 30. Matlack KE, Tardiff DF, Narayan P, Hamamichi S, Caldwell KA, Caldwell GA, Lindquist S (2014) Clioquinol promotes the degradation of metal-dependent amyloid-beta (Abeta) oligomers to restore endocytosis and ameliorate Abeta toxicity. Proc Natl Acad Sci USA 111(11):4013–4018 CAS  Article  Google Scholar  31. 31. McColl G, Roberts BR, Pukala TL, Kenche VB, Roberts CM, Link CD, Ryan TM, Masters CL, Barnham KJ, Bush AI et al (2012) Utility of an improved model of amyloid-beta (Aβ1-42) toxicity in Caenorhabditis elegans for drug screening for Alzheimer’s disease. Mol Neurodegener 7:57 CAS  Article  Google Scholar  32. 32. Mandelkow EM, Mandelkow E (1998) Tau in Alzheimer’s disease. Trends Cell Biol 8(11):425–427 CAS  Article  Google Scholar  33. 33. Brandt R, Gergou A, Wacker I, Fath T, Hutter H (2009) A Caenorhabditis elegans model of tau hyperphosphorylation: induction of developmental defects by transgenic overexpression of Alzheimer’s disease-like modified tau. Neurobiol Aging 30(1):22–33 CAS  Article  Google Scholar  34. 34. Kraemer BC, Zhang B, Leverenz JB, Thomas JH, Trojanowski JQ, Schellenberg GD (2003) Neurodegeneration and defective neurotransmission in a Caenorhabditis elegans model of tauopathy. Proc Natl Acad Sci USA 100(17):9980–9985 CAS  Article  Google Scholar  35. 35. Miyasaka T, Ding Z, Gengyo-Ando K, Oue M, Yamaguchi H, Mitani S, Ihara Y (2005) Progressive neurodegeneration in C. elegans model of tauopathy. Neurobiol Dis 20(2):372–383 CAS  Article  Google Scholar  36. 36. Fatouros C, Pir GJ, Biernat J, Koushika SP, Mandelkow E, Mandelkow E-M, Schmidt E, Baumeister R (2012) Inhibition of tau aggregation in a novel Caenorhabditis elegans model of tauopathy mitigates proteotoxicity. Hum Mol Genet 21(16):3587–3603 CAS  Article  Google Scholar  37. 37. McCormick AV, Wheeler JM, Guthrie CR, Liachko NF, Kraemer BC (2013) Dopamine D2 receptor antagonism suppresses tau aggregation and neurotoxicity. Biol Psychiatry 73(5):464–471 CAS  Article  Google Scholar  38. 38. Chen X, McCue FH, Wong SQ, Kashyap SS, Kraemer BC, Barclay JW, Burgoyne RD, Morgan A (2015) Ethosuximide ameliorates neurodegenerative disease phenotypes by modulating DAF-16/FOXO target gene expression. Mol Neurodegener 10(1):51 Article  Google Scholar  39. 39. Teixeira-Castro A, Ailion M, Jalles A, Brignull HR, Vilaca JL, Dias N, Rodrigues P, Oliveira JF, Neves-Carvalho A, Morimoto RI et al (2011) Neuron-specific proteotoxicity of mutant ataxin-3 in C. elegans: rescue by the DAF-16 and HSF-1 pathways. Hum Mol Genet 20(15):2996–3009 CAS  Article  Google Scholar  40. 40. Brignull HR, Morley JF, Garcia SM, Morimoto RI (2006) Modeling polyglutamine pathogenesis in C. elegans. Methods Enzymol 412:256–282 CAS  Article  Google Scholar  41. 41. Faber PW, Voisine C, King DC, Bates EA, Hart AC (2002) Glutamine/proline-rich PQE-1 proteins protect Caenorhabditis elegans neurons from huntingtin polyglutamine neurotoxicity. Proc Natl Acad Sci USA 99(26):17131–17136 CAS  Article  Google Scholar  42. 42. Voisine C, Varma H, Walker N, Bates EA, Stockwell BR, Hart AC (2007) Identification of potential therapeutic drugs for huntington’s disease using Caenorhabditis elegans. PLoS One 2(6):e504 Article  CAS  Google Scholar  43. 43. Varma H, Cheng R, Voisine C, Hart AC, Stockwell BR (2007) Inhibitors of metabolism rescue cell death in Huntington’s disease models. Proc Natl Acad Sci 104(36):14525–14530 CAS  Article  Google Scholar  44. 44. Parker J, Arango M, Abderrahmane S, Lambert E, Tourette C, Catoire H, Neri C (2005) Resveratrol rescues mutant polyglutamine cytotoxicity in nematode and mammalian neurons. Nat Genet 37(4):349–350 CAS  Article  Google Scholar  45. 45. Shin BH, Lim Y, Oh HJ, Park SM, Lee S-K, Ahnn J, Kim DH, Song WK, Kwak TH, Park WJ (2013) Pharmacological activation of Sirt1 ameliorates polyglutamine-induced toxicity through the regulation of autophagy. PLoS One 8(6):e64953 CAS  Article  Google Scholar  46. 46. Yang X, Zhang P, Wu J, Xiong S, Jin N, Huang Z (2012) The neuroprotective and lifespan-extension activities of Damnacanthus officinarum extracts in Caenorhabditis elegans. J Ethnopharmacol 141(1):41–47 Article  Google Scholar  47. 47. Xiao L, Li H, Zhang J, Yang F, Huang A, Deng J, Liang M, Ma F, Hu M, Huang Z (2014) Salidroside protects Caenorhabditis elegans neurons from polyglutamine-mediated toxicity by reducing oxidative stress. Molecules 19(6):7757–7769 Article  CAS  Google Scholar  48. 48. Haldimann P, Muriset M, Vigh L, Goloubinoff P (2011) The novel hydroxylamine derivative NG-094 suppresses polyglutamine protein toxicity in Caenorhabditis elegans. J Biol Chem 286(21):18784–18794 CAS  Article  Google Scholar  49. 49. Cai WJ, Huang JH, Zhang SQ, Wu B, Kapahi P, Zhang XM, Shen ZY (2011) Icariin and its derivative Icariside II extend healthspan via Insulin/IGF-1 pathway in C. elegans. Plos One 6:e28835 50. 50. Ching TT, Chiang WC, Chen CS, Hsu AL (2011) Celecoxib extends C. elegans lifespan via inhibition of insulin-like signaling but not cyclooxygenase-2 activity. Aging Cell 10(3):506–519 CAS  Article  Google Scholar  51. 51. Ayyadevara S, Bharill P, Dandapat A, Hu C, Khaidakov M, Mitra S, Shmookler Reis RJ, Mehta JL (2013) Aspirin inhibits oxidant stress, reduces age-associated functional declines, and extends lifespan of Caenorhabditis elegans. Antioxid Redox Signal 18(5):481–490 CAS  Article  Google Scholar  52. 52. Wolozin B, Gabel C, Ferree A, Guillily M, Ebata A (2011) Watching worms whither: modeling neurodegeneration in C. elegans. Prog Mol Biol Transl Sci 100:499–514 CAS  Article  Google Scholar  53. 53. Ved R, Saha S, Westlund B, Perier C, Burnam L, Sluder A, Hoener M, Rodrigues CM, Alfonso A, Steer C et al (2005) Similar patterns of mitochondrial vulnerability and rescue induced by genetic modification of alpha-synuclein, parkin, and DJ-1 in Caenorhabditis elegans. J Biol Chem 280(52):42655–42668 CAS  Article  Google Scholar  54. 54. Braungart E, Gerlach M, Riederer P, Baumeister R, Hoener MC (2004) Caenorhabditis elegans MPP + model of Parkinson’s disease for high-throughput drug screenings. Neurodegener Dis 1(4–5):175–183 CAS  Article  Google Scholar  55. 55. Marvanova M, Nichols CD (2007) Identification of neuroprotective compounds of Caenorhabditis elegans dopaminergic neurons against 6-OHDA. J Mol Neurosci 31(2):127–137 CAS  Google Scholar  56. 56. Locke CJ, Fox SA, Caldwell GA, Caldwell KA (2008) Acetaminophen attenuates dopamine neuron degeneration in animal models of Parkinson’s disease. Neurosci Lett 439(2):129–133 CAS  Article  Google Scholar  57. 57. Kautu BB, Carrasquilla A, Hicks ML, Caldwell KA, Caldwell GA (2013) Valproic acid ameliorates C. elegans dopaminergic neurodegeneration with implications for ERK-MAPK signaling. Neurosci Lett 541:116–119 CAS  Article  Google Scholar  58. 58. Fu R-H, Harn H-J, Liu S-P, Chen C-S, Chang W-L, Chen Y-M, Huang J-E, Li R-J, Tsai S-Y, Hung H-S et al (2014) n-Butylidenephthalide protects against dopaminergic neuron degeneration and α-synuclein accumulation in Caenorhabditis elegans models of Parkinson’s Disease. PLoS One 9(1):e85305 Article  CAS  Google Scholar  59. 59. Fu R-H, Wang Y-C, Chen C-S, Tsai R-T, Liu S-P, Chang W-L, Lin H-L, Lu C-H, Wei J-R, Wang Z-W et al (2014) Acetylcorynoline attenuates dopaminergic neuron degeneration and α-synuclein aggregation in animal models of Parkinson’s disease. Neuropharmacology 82:108–120 CAS  Article  Google Scholar  60. 60. Liu Z, Hamamichi S, Lee BD, Yang D, Ray A, Caldwell GA, Caldwell KA, Dawson TM, Smith WW, Dawson VL (2011) Inhibitors of LRRK2 kinase attenuate neurodegeneration and Parkinson-like phenotypes in Caenorhabditis elegans and Drosophila Parkinson’s disease models. Hum Mol Genet 20(20):3933–3942 CAS  Article  Google Scholar  61. 61. Yao C, Johnson WM, Gao Y, Wang W, Zhang J, Deak M, Alessi DR, Zhu X, Mieyal JJ, Roder H et al (2012) Kinase inhibitors arrest neurodegeneration in cell and C. elegans models of LRRK2 toxicity. Hum Mol Genet 22:328–344 62. 62. Vaccaro A, Patten SA, Ciura S, Maios C, Therrien M, Drapeau P, Kabashi E, Parker JA (2012) Methylene Blue protects against TDP-43 and FUS neuronal toxicity in C. elegans and D. rerio. PLoS One 7(7):e42117 CAS  Article  Google Scholar  63. 63. Tauffenberger A, Julien C, Parker JA (2013) Evaluation of longevity enhancing compounds against transactive response DNA-binding protein-43 neuronal toxicity. Neurobiol Aging 34(9):2175–2182 CAS  Article  Google Scholar  64. 64. Liachko NF, McMillan PJ, Guthrie CR, Bird TD, Leverenz JB, Kraemer BC (2013) CDC7 inhibition blocks pathological TDP-43 phosphorylation and neurodegeneration. Ann Neurol 74(1):39–52 CAS  Article  Google Scholar  65. 65. Haltia M (2003) The neuronal ceroid-lipofuscinoses. J Neuropathol Exp Neurol 62(1):1–13 Google Scholar  66. 66. Haltia M, Goebel HH (2013) The neuronal ceroid-lipofuscinoses: a historical introduction. Biochim Biophys Acta 1832(11):1795–1800 CAS  Article  Google Scholar  67. 67. Noskova L, Stranecky V, Hartmannova H, Pristoupilova A, Baresova V, Ivanek R, Hulkova H, Jahnova H, van der Zee J, Staropoli JF et al (2011) Mutations in DNAJC5, encoding cysteine-string protein alpha, cause autosomal-dominant adult-onset neuronal ceroid lipofuscinosis. Am J Hum Genet 89(2):241–252 CAS  Article  Google Scholar  68. 68. Benitez BA, Alvarado D, Cai Y, Mayo K, Chakraverty S, Norton J, Morris JC, Sands MS, Goate A, Cruchaga C (2011) Exome-sequencing confirms DNAJC5 mutations as cause of adult neuronal ceroid-lipofuscinosis. PLoS One 6(11):e26741 CAS  Article  Google Scholar  69. 69. Velinov M, Dolzhanskaya N, Gonzalez M, Powell E, Konidari I, Hulme W, Staropoli JF, Xin W, Wen GY, Barone R et al (2012) Mutations in the gene DNAJC5 cause autosomal dominant Kufs disease in a proportion of cases: study of the Parry family and 8 other families. PLoS One 7(1):e29729 CAS  Article  Google Scholar  70. 70. Cadieux-Dion M, Andermann E, Lachance-Touchette P, Ansorge O, Meloche C, Barnabe A, Kuzniecky RI, Andermann F, Faught E, Leonberg S et al (2013) Recurrent mutations in DNAJC5 cause autosomal dominant Kufs disease. Clin Genet 83(6):571–575 CAS  Article  Google Scholar  71. 71. Kashyap SS, Johnson JR, McCue HV, Chen X, Edmonds MJ, Ayala M, Graham ME, Jenn RC, Barclay JW, Burgoyne RD et al (2014) Caenorhabditis elegans dnj-14, the orthologue of the DNAJC5 gene mutated in adult onset neuronal ceroid lipofuscinosis, provides a new platform for neuroprotective drug screening and identifies a SIR-2.1-independent action of resveratrol. Hum Mol Genet 23(22):5916–5927 Article  Google Scholar  72. 72. Burgoyne RD, Morgan A (2015) Cysteine string protein (CSP) and its role in preventing neurodegeneration. Semin Cell Dev Biol 40:153–159 CAS  Article  Google Scholar  73. 73. Bizat N, Peyrin JM, Haik S, Cochois V, Beaudry P, Laplanche JL, Neri C (2010) Neuron dysfunction is induced by prion protein with an insertional mutation via a Fyn kinase and reversed by sirtuin activation in Caenorhabditis elegans. J Neurosci 30(15):5394–5403 CAS  Article  Google Scholar  74. 74. Karuppagounder SS, Pinto JT, Xu H, Chen HL, Beal MF, Gibson GE (2009) Dietary supplementation with resveratrol reduces plaque pathology in a transgenic model of Alzheimer’s disease. Neurochem Int 54(2):111–118 CAS  Article  Google Scholar  75. 75. Tiwari SK, Seth B, Agarwal S, Yadav A, Karmakar M, Gupta SK, Choubey V, Sharma A, Chaturvedi RK (2015) Ethosuximide induces hippocampal neurogenesis and reverses cognitive deficits in amyloid-beta toxin induced Alzheimer’s rat model via PI3 K/Akt/Wnt/beta-catenin pathway. J Biol Chem 290:28540–28558 76. 76. McCue HV, Chen X, Barclay JW, Morgan A, Burgoyne RD (2015) Expression profile of a Caenorhabditis elegans model of adult neuronal ceroid lipofuscinosis reveals down regulation of ubiquitin E3 ligase components. Sci Rep 5:14392 CAS  Article  Google Scholar  77. 77. Sleigh JN, Buckingham SD, Esmaeili B, Viswanathan M, Cuppen E, Westlund BM, Sattelle DB (2011) A novel Caenorhabditis elegans allele, smn-1(cb131), mimicking a mild form of spinal muscular atrophy, provides a convenient drug screening platform highlighting new and pre-approved compounds. Hum Mol Genet 20(2):245–260 CAS  Article  Google Scholar  78. 78. Schneider LS, Dagerman KS, Insel P (2005) Risk of death with atypical antipsychotic drug treatment for dementia: meta-analysis of randomized placebo-controlled trials. JAMA 294(15):1934–1943 CAS  Article  Google Scholar  79. 79. Crunelli V, Leresche N (2002) Block of thalamic T-type Ca(2+) channels by ethosuximide is not the whole story. Epilepsy Curr Am Epilepsy Soc 2(2):53–56 Article  Google Scholar  80. 80. Park SJ, Ahmad F, Philp A, Baar K, Williams T, Luo H, Ke H, Rehmann H, Taussig R, Brown AL et al (2012) Resveratrol ameliorates aging-related metabolic phenotypes by inhibiting cAMP phosphodiesterases. Cell 148(3):421–433 CAS  Article  Google Scholar  81. 81. Hubbard BP, Gomes AP, Dai H, Li J, Case AW, Considine T, Riera TV, Lee JE, SY S, Lamming DW et al (2013) Evidence for a common mechanism of SIRT1 regulation by allosteric activators. Science 339(6124):1216–1219 CAS  Article  Google Scholar  82. 82. Evason K, Huang C, Yamben I, Covey DF, Kornfeld K (2005) Anticonvulsant medications extend worm life-span. Science 307(5707):258–262 CAS  Article  Google Scholar  83. 83. Baur JA (2010) Resveratrol, sirtuins, and the promise of a DR mimetic. Mech Ageing Dev 131(4):261–269 CAS  Article  Google Scholar  84. 84. Pani G (2015) Neuroprotective effects of dietary restriction: evidence and mechanisms. Semin Cell Dev Biol 40:106–114 CAS  Article  Google Scholar  85. 85. Swinney DC, Anthony J (2011) How were new medicines discovered? Nat Rev Drug Discovery 10(7):507–519 CAS  Article  Google Scholar  86. 86. Swinney DC (2013) The contribution of mechanistic understanding to phenotypic screening for first-in-class medicines. J Biomol Screen 18(10):1186–1192 Article  Google Scholar  87. 87. Weiss RA (2008) Special anniversary review: 25 years of human immunodeficiency virus research: successes and challenges. Clin Exp Immunol 152(2):201–210 CAS  Article  Google Scholar  88. 88. Frokjaer-Jensen C (2013) Exciting prospects for precise engineering of Caenorhabditis elegans genomes with CRISPR/Cas9. Genetics 195(3):635–642 Article  CAS  Google Scholar  89. 89. Fay DS, Fluet A, Johnson CJ, Link CD (1998) In vivo aggregation of beta-amyloid peptide variants. J Neurochem 71(4):1616–1625 CAS  Article  Google Scholar  90. 90. Link CD, Johnson CJ, Fonte V, Paupard M-C, Hall DH, Styren S, Mathis CA, Klunk WE (2001) Visualization of fibrillar amyloid deposits in living, transgenic Caenorhabditis elegans animals using the sensitive amyloid dye, X-34. Neurobiol Aging 22(2):217–226 CAS  Article  Google Scholar  91. 91. Yatin SM, Yatin M, Aulick T, Ain KB, Butterfield DA (1999) Alzheimer’s amyloid beta-peptide associated free radicals increase rat embryonic neuronal polyamine uptake and ornithine decarboxylase activity: protective effect of vitamin E. Neurosci Lett 263(1):17–20 CAS  Article  Google Scholar  92. 92. Drake J, Link CD, Butterfield DA (2003) Oxidative stress precedes fibrillar deposition of Alzheimer’s disease amyloid beta-peptide (1–42) in a transgenic Caenorhabditis elegans model. Neurobiol Aging 24(3):415–420 CAS  Article  Google Scholar  93. 93. Florez-McClure ML, Hohsfield LA, Fonte G, Bealor MT, Link CD (2007) Decreased insulin-receptor signaling promotes the autophagic degradation of beta-amyloid peptide in C. elegans. Autophagy 3(6):569–580 CAS  Article  Google Scholar  94. 94. Link CD, Taft A, Kapulkin V, Duke K, Kim S, Fei Q, Wood DE, Sahagan BG (2003) Gene expression analysis in a transgenic Caenorhabditis elegans Alzheimer’s disease model. Neurobiol Aging 24(3):397–413 CAS  Article  Google Scholar  95. 95. Aparecida Paiva F, de Freitas Bonomo L, Ferreira Boasquivis P, Borges Raposo de Paula IT, Guerra JF, Mendes Leal W, Silva ME, Pedrosa ML, Oliveira Rde P (2015) Carqueja (Baccharis trimera) Protects against oxidative stress and beta-amyloid-induced toxicity in Caenorhabditis elegans. Oxid Med Cell Longev 2015:740162 Article  Google Scholar  96. 96. Link CD (2006) C. elegans models of age-associated neurodegenerative diseases: lessons from transgenic worm models of Alzheimer’s disease. Exp Gerontol 41(10):1007–1013 CAS  Article  Google Scholar  97. 97. Dosanjh LE, Brown MK, Rao G, Link CD, Luo Y (2010) Behavioral phenotyping of a transgenic Caenorhabditis elegans expressing neuronal amyloid-β. J Alzheimers Dis 19(2):681–690 CAS  Google Scholar  98. 98. Treusch S, Hamamichi S, Goodman JL, Matlack KES, Chung CY, Baru V, Shulman JM, Parrado A, Bevis BJ, Valastyan JS et al (2011) Functional links between Aβ toxicity, endocytic trafficking, and Alzheimer’s disease risk factors in yeast. Science 334(6060):1241–1245 CAS  Article  Google Scholar  99. 99. Hornsten A, Lieberthal J, Fadia S, Malins R, Ha L, Xu X, Daigle I, Markowitz M, O’Connor G, Plasterk R et al (2007) APL-1, a Caenorhabditis elegans protein related to the human beta-amyloid precursor protein, is essential for viability. Proc Natl Acad Sci USA 104(6):1971–1976 CAS  Article  Google Scholar  100. 100. Ewald CY, Cheng R, Tolen L, Shah V, Gillani A, Nasrin A, Li C (2012) Pan-neuronal expression of APL-1, an APP-related protein, disrupts olfactory, gustatory, and touch plasticity in Caenorhabditis elegans. J Neurosci 32(30):10156–10169 CAS  Article  Google Scholar  101. 101. Oeda T, Shimohama S, Kitagawa N, Kohno R, Imura T, Shibasaki H, Ishii N (2001) Oxidative stress causes abnormal accumulation of familial amyotrophic lateral sclerosis-related mutant SOD1 in transgenic Caenorhabditis elegans. Hum Mol Genet 10(19):2013–2023 CAS  Article  Google Scholar  102. 102. Wang J, Farr GW, Hall DH, Li F, Furtak K, Dreier L, Horwich AL (2009) An ALS-linked mutant SOD1 produces a locomotor defect associated with aggregation and synaptic dysfunction when expressed in neurons of Caenorhabditis elegans. PLoS Genet 5(1):e1000350 Article  CAS  Google Scholar  103. 103. Witan H, Kern A, Koziollek-Drechsler I, Wade R, Behl C, Clement AM (2008) Heterodimer formation of wild-type and amyotrophic lateral sclerosis-causing mutant Cu/Zn-superoxide dismutase induces toxicity independent of protein aggregation. Hum Mol Genet 17(10):1373–1385 CAS  Article  Google Scholar  104. 104. Murakami A, Kojima K, Ohya K, Imamura K, Takasaki Y (2002) A new conformational epitope generated by the binding of recombinant 70-kd protein and U1 RNA to anti-U1 RNP autoantibodies in sera from patients with mixed connective tissue disease. Arthritis Rheum 46(12):3273–3282 CAS  Article  Google Scholar  105. 105. Gidalevitz T, Krupinski T, Garcia S, Morimoto RI (2009) Destabilizing protein polymorphisms in the genetic background direct phenotypic expression of mutant SOD1 toxicity. PLoS Genet 5(3):e1000399 Article  CAS  Google Scholar  106. 106. Silva DF, Esteves AR, Oliveira CR, Cardoso SM (2011) Mitochondria: the common upstream driver of amyloid-beta and tau pathology in Alzheimer’s disease. Curr Alzheimer Res 8(5):563–572 CAS  Article  Google Scholar  107. 107. Zhang T, Mullane PC, Periz G, Wang J (2011) TDP-43 neurotoxicity and protein aggregation modulated by heat shock factor and insulin/IGF-1 signaling. Hum Mol Genet 20(10):1952–1965 CAS  Article  Google Scholar  108. 108. Li J, Huang KX, Wd L (2013) WD: Establishing a novel C. elegans model to investigate the role of autophagy in amyotrophic lateral sclerosis. Acta Pharmacol Sin 34(5):644–650 CAS  Article  Google Scholar  109. 109. Liachko NF, Guthrie CR, Kraemer BC (2010) Phosphorylation promotes neurotoxicity in a Caenorhabditis elegans model of TDP-43 proteinopathy. J Neurosci 30(48):16208–16219 CAS  Article  Google Scholar  110. 110. Ash PE, Zhang YJ, Roberts CM, Saldi T, Hutter H, Buratti E, Petrucelli L, Link CD (2010) Neurotoxic effects of TDP-43 overexpression in C. elegans. Hum Mol Genet 19(16):3206–3218 CAS  Article  Google Scholar  111. 111. Morley JF, Brignull HR, Weyers JJ, Morimoto RI (2002) The threshold for polyglutamine-expansion protein aggregation and cellular toxicity is dynamic and influenced by aging in Caenorhabditis elegans. Proc Natl Acad Sci 99(16):10417–10422 Article  CAS  Google Scholar  112. 112. Wang H, Lim PJ, Yin C, Rieckher M, Vogel BE, Monteiro MJ (2006) Suppression of polyglutamine-induced toxicity in cell and animal models of Huntington’s disease by ubiquilin. Hum Mol Genet 15(6):1025–1041 CAS  Article  Google Scholar  113. 113. Yamanaka K, Okubo Y, Suzaki T, Ogura T (2004) Analysis of the two p97/VCP/Cdc48p proteins of Caenorhabditis elegans and their suppression of polyglutamine-induced protein aggregation. J Struct Biol 146(1–2):242–250 CAS  Article  Google Scholar  114. 114. Parker J, Connolly J, Wellington C, Hayden M, Dausset J, Neri C (2001) Expanded polyglutamines in Caenorhabditis elegans cause axonal abnormalities and severe dysfunction of PLM mechanosensory neurons without cell death. Proc Natl Acad Sci USA 98(23):13318–13323 CAS  Article  Google Scholar  115. 115. Lejeune F-X, Mesrob L, Parmentier F, Bicep C, Vazquez-Manrique R, Parker JA, Vert J-P, Tourette C, Neri C (2012) Large-scale functional RNAi screen in C. elegans identifies genes that regulate the dysfunction of mutant polyglutamine neurons. BMC Genom 13(1):91 CAS  Article  Google Scholar  116. 116. Teixeira-Castro A, Ailion M, Jalles A, Brignull HR, Vilaça JL, Dias N, Rodrigues P, Oliveira JF, Neves-Carvalho A, Morimoto RI, Maciel P (2011) Neuron-specific proteotoxicity of mutant ataxin-3 in C. elegans: rescue by the DAF-16 and HSF-1 pathways. Hum Mol Genet 20:2996–3009 CAS  Article  Google Scholar  117. 117. Christie NT, Lee AL, Fay HG, Gray AA, Kikis EA (2014) Novel polyglutamine model uncouples proteotoxicity from aging. PLoS One 9(5):e96835 Article  CAS  Google Scholar  118. 118. Hamamichi S, Rivas RN, Knight AL, Cao S, Caldwell KA, Caldwell GA (2008) Hypothesis-based RNAi screening identifies neuroprotective genes in a Parkinson’s disease model. Proc Natl Acad Sci USA 105(2):728–733 CAS  Article  Google Scholar  119. 119. van Ham TJ, Thijssen KL, Breitling R, Hofstra RMW, Plasterk RHA, Nollen EAA (2008) C. elegans model identifies genetic modifiers of α-Synuclein inclusion formation during aging. PLoS Genet 4(3):e1000027 Article  CAS  Google Scholar  120. 120. Lakso M, Vartiainen S, Moilanen AM, Sirvio J, Thomas JH, Nass R, Blakely RD, Wong G (2003) Dopaminergic neuronal loss and motor deficits in Caenorhabditis elegans overexpressing human alpha-synuclein. J Neurochem 86(1):165–172 CAS  Article  Google Scholar  121. 121. Settivari R, LeVora J, Nass R (2009) The divalent metal transporter homologues SMF-1/2 mediates dopamine neuron sensitivity in Caenorhabditis elegans models of manganism and Parkinson’s disease. J Biol Chem M109.051409 122. 122. Cao S, Gelwix CC, Caldwell KA, Caldwell GA (2005) Torsin-mediated protection from cellular stress in the dopaminergic neurons of Caenorhabditis elegans. J Neurosci 25(15):3801–3812 CAS  Article  Google Scholar  123. 123. Kuwahara T, Koyama A, Gengyo-Ando K, Masuda M, Kowa H, Tsunoda M, Mitani S, Iwatsubo T (2006) Familial Parkinson mutant alpha-synuclein causes dopamine neuron dysfunction in transgenic Caenorhabditis elegans. J Biol Chem 281(1):334–340 CAS  Article  Google Scholar  124. 124. Buttner S, Broeskamp F, Sommer C, Markaki M, Habernig L, Alavian-Ghavanini A, Carmona-Gutierrez D, Eisenberg T, Michael E, Kroemer G et al (2014) Spermidine protects against alpha-synuclein neurotoxicity. Cell Cycle 13(24):3903–3908 Article  CAS  Google Scholar  125. 125. Karpinar DP, Balija MB, Kugler S, Opazo F, Rezaei-Ghaleh N, Wender N, Kim HY, Taschenberger G, Falkenburger BH, Heise H et al (2009) Pre-fibrillar alpha-synuclein variants with impaired beta-structure increase neurotoxicity in Parkinson’s disease models. EMBO J 28(20):3256–3268 CAS  Article  Google Scholar  126. 126. Kuwahara T, Koyama A, Koyama S, Yoshina S, Ren C-H, Kato T, Mitani S, Iwatsubo T (2008) A systematic RNAi screen reveals involvement of endocytic pathway in neuronal dysfunction in α-synuclein transgenic C. elegans. Hum Mol Genet 17(19):2997–3009 CAS  Article  Google Scholar  127. 127. Kuwahara T, Tonegawa R, Ito G, Mitani S, Iwatsubo T (2012) Phosphorylation of α-synuclein protein at Ser-129 reduces neuronal dysfunction by lowering its membrane binding property in Caenorhabditis elegans. J Biol Chem 287(10):7098–7109 CAS  Article  Google Scholar  128. 128. Saha S, Guillily MD, Ferree A, Lanceta J, Chan D, Ghosh J, Hsu CH, Segal L, Raghavan K, Matsumoto K et al (2009) LRRK2 modulates vulnerability to mitochondrial dysfunction in Caenorhabditis elegans. J Neurosci 29(29):9210–9218 CAS  Article  Google Scholar  129. 129. Yao C, El Khoury R, Wang W, Byrd TA, Pehek EA, Thacker C, Zhu X, Smith MA, Wilson-Delfosse AL, Chen SG (2010) LRRK2-mediated neurodegeneration and dysfunction of dopaminergic neurons in a Caenorhabditis elegans model of Parkinson’s disease. Neurobiol Dis 40(1):73–81 CAS  Article  Google Scholar  130. 130. Bizat N, Peyrin J-M, Haïk S, Cochois V, Beaudry P, Laplanche J-L, Néri C (2010) Neuron dysfunction is induced by prion protein with an insertional mutation via a Fyn kinase and reversed by Sirtuin activation in Caenorhabditis elegans. J Neurosci 30(15):5394–5403 CAS  Article  Google Scholar  131. 131. Park K-W, Li L (2011) Prion protein in Caenorhabditis elegans: distinct models of anti-BAX and neuropathology. Prion 5(1):28–38 CAS  Article  Google Scholar  132. 132. Nussbaum-Krammer CI, Park K-W, Li L, Melki R, Morimoto RI (2013) Spreading of a prion domain from cell-to-cell by vesicular transport in Caenorhabditis elegans. PLoS Genet 9(3):e1003351 CAS  Article  Google Scholar  133. 133. Lakowski B, Hekimi S (1998) The genetics of caloric restriction in Caenorhabditis elegans. Proc Natl Acad Sci USA 95(22):13091–13096 CAS  Article  Google Scholar  134. 134. Levitan D, Greenwald I (1998) Effects of SEL-12 presenilin on LIN-12 localization and function in Caenorhabditis elegans. Development 125(18):3599–3606 CAS  Google Scholar  135. 135. Wittenburg N, Eimer S, Lakowski B, Rohrig S, Rudolph C, Baumeister R (2000) Presenilin is required for proper morphology and function of neurons in C. elegans. Nature 406(6793):306–309 CAS  Article  Google Scholar  136. 136. Springer W, Hoppe T, Schmidt E, Baumeister R (2005) A Caenorhabditis elegans Parkin mutant with altered solubility couples alpha-synuclein aggregation to proteotoxic stress. Hum Mol Genet 14(22):3407–3423 CAS  Article  Google Scholar  137. 137. Sämann J, Hegermann J, von Gromoff E, Eimer S, Baumeister R, Schmidt E (2009) Caenorhabditits elegans LRK-1 and PINK-1 act antagonistically in stress response and neurite outgrowth. J Biol Chem 284(24):16482–16491 Article  CAS  Google Scholar  138. 138. Briese M, Esmaeili B, Fraboulet S, Burt EC, Christodoulou S, Towers PR, Davies KE, Sattelle DB (2009) Deletion of smn-1, the Caenorhabditis elegans ortholog of the spinal muscular atrophy gene, results in locomotor dysfunction and reduced lifespan. Hum Mol Genet 18(1):97–104 CAS  Article  Google Scholar  139. 139. Article  Google Scholar  140. 140. Ruan Q, Harrington AJ, Caldwell KA, Caldwell GA, Standaert DG (2010) VPS41, a protein involved in lysosomal trafficking, is protective in Caenorhabditis elegans and mammalian cellular models of Parkinson’s disease. Neurobiol Dis 37(2):330–338 CAS  Article  Google Scholar  141. 141. Liu J, Banskota AH, Critchley AT, Hafting J, Prithiviraj B (2015) Neuroprotective effects of the cultivated Chondrus crispus in a C. elegans model of Parkinson’s disease. Mar Drugs 13(4):2250–2266 Article  Google Scholar  142. 142. Caldwell KA, Tucci ML, Armagost J, Hodges TW, Chen J, Memon SB, Blalock JE, DeLeon SM, Findlay RH, Ruan Q et al (2009) Investigating bacterial sources of toxicity as an environmental contributor to dopaminergic neurodegeneration. PLoS One 4(10):e7227 Article  CAS  Google Scholar  Download references Authors’ contributions XC, JWB, RDB and AM conceived and designed the study. XC and AM wrote the manuscript, with input from JWB and RDB. All authors read and approved the final manuscript. We are grateful to the BBSRC and AgeUK for funding our research into worm models of neurodegeneration. We thank Dr. Brian Kraemer (University of Washington, USA) for providing the CK49 and CZ1200 strains shown in Fig. 3; and the Caenorhabditis Genetics Center for providing the BY250 strain created by Dr. Randy Blakely (Vanderbilt University, USA) shown in Fig. 4. Competing interests The authors declare that they have no competing interests. Author information Corresponding author Correspondence to Alan Morgan. Rights and permissions Reprints and Permissions About this article Verify currency and authenticity via CrossMark Cite this article Chen, X., Barclay, J.W., Burgoyne, R.D. et al. Using C. elegans to discover therapeutic compounds for ageing-associated neurodegenerative diseases. Chemistry Central Journal 9, 65 (2015). Download citation • Adult onset neuronal ceroid lipofuscinosis • Aging • Alzheimer’s disease • Amyotrophic lateral sclerosis • Caenorhabditis elegans • Compound screening • Frontotemporal dementia • Huntington’s disease • Neurodegeneration • Parkinson’s disease
Слике страница ness of mind which would do honour to the heroism and patriotism of the greatest and most polished nations. Perhaps the following intefesting anecdote cannot be paralleled in ancient or modern history ; it happened about twelve years ago in the neighbourhood of New Orleans, and may be considered as authentic, being communicated by M. Bossu, an officer of distinction, who then enjoyed a considerable command in that country. “ The tragical death of an Indian of the Collapissa națion,” says this geptleman, “who sacrificed himself for his country and son, I have often admired as displaying the greatest heroism, and placing human nature in the noblest point of view. A Chactaw Indian, having one day expressed himself in the most reproachful terms of the French, and called the Collapissas their dogs and their slaves, one of this nation, exasperated at his injurious expressions, laid him dead on the spot. The Chactaws, the most numerous and the most warlike tribe on that continent, immediately few to arms; they sent deputies to New Orleans to demand from the French governor the head of the savage who had Aed to him for protection: the governor offered presents as an atonement, but they were rejected with disdain ; they threatened to exterminate the whole tribe of the Collapislas. To pacify this fierce nation, and [merged small][ocr errors] prevent the effufion of blood, it was at length found necessary to deliver up the unhappy Indian. The Sieur Ferrand, commander of the German posts, on the right of the Misfilipi, was charged with this melancholy commission; a rendezvous was in consequence appointed between the settlement of the Collapissas and the Gerinan posts, where the mournful ceremony was conducted in the following manner : “ The Indian victím, whose name was Tichou Mingo (i. e. servant to the Cacique or prince) was produced. He rose up, and agreeable to the custom of these people, harangued the afle:nbly to the following purpose : "I am a true man; that is to say, I fear not death ; but I lament the fate of my wife, and four infant children, whoin I leave behind in a very I lament too my fother and my mother, whom I have long maintained by hunting: them, however, I re.. commend to the French; since, on their account, I now fall a sacrifice,' " Scarce had he finished this short and pathetic harangue, when the old father, ftruck with the filial affection of the son, arose, and thus addressed himself to his audience-My son is doomed to death; but he is young and vigorous, and more capable than me to support his moth't, his wife and four infant children ; it is neceflary then that he remain upon earth to protect and provide for them : as for me, who draw towards the end of my career, I have lived long enough; may my son attain to my age, that he may bring up my tender infants : I am no longer good for any thing: a few years more or less, are to me of imall moment: I have lived as a man; I will die as a man :- I therefore take the place of my fon*. 66 At these words, which expressed his paternal love and greatness of soul in the most touching manner, his wife, his son, his daughter-in-law, and the little infants, melted into tears around this brave, this generous old man: he embraced them for the last time, exhorted them to be ever faithful to the French, and to die rather than betray them by any mean treachery unworthy of bis blood. My death, concluded he, 5 SI consider as necesary for the safety of my nation, and I glory in the sacrifice.'-Having thus delivered himself he presented his head to the kinsmen of the deceased Chactaw; they accepted it; he then extended himself over the trunk of a tree, when, with a hatchet, they severed his head from his body. + The Indian nations follow the law of retaliation: death they confider as an atonement for death; and it is sufficient that it be one of the fame nation, although even he should not be a kinsman; ---They except r.one but faves, [ocr errors] “ By this facrifice, all animosities were forgotten; but one part of the ceremony remained still to be performed: the young Indian was obliged to deliver to the Chactaws the head of his father : in taking it up he addressed to it these few words: Pardon me your death, and remember me in the world of spirits,'-The French who assisted at this tragedy could not contain their tears, whilst they admired the heroic conftancy of this venerable old man, whose refolution bore a resemblance to that of the celebrated Roman orator, who, in the time of the triumvirate, was concealed by his son: the young man was most cruelly tortured in order to force him to discover his father, who, not being able to endure the idea, that a son so virtuous and so generous, should thus suffer on his account, went and presented himself to the murderers and begged them to kill him and save his son; the fon conjured them to take his life and spare the age of his father ; but the foldiers, more barbarous than the savages, butchered them both on the spot.” Vos fapere & folos aio bene vivere, quorum, Conspicitur nitidis fundata pecunia villis. [ocr errors] THE wealthy cit, grown old in trade, Now wishes for the rural shade, And buckles to his one-horse chair, Old Dobbin, or the founder'd mare; While wecg'd in closely by his fide, Sits Madam, his unwieldy bride, With Jacky on a stool before 'em, And out they jog in due decorum. Scarce past the turnpike half a mile, How all the country seems to smile! And as they slowly jog together, The cit commends the road and weather : While madam doats trees, And longs for ev'ry house she sees, Admires its views, its situation, And thus she opens her oration, What signify the loads of wealth, Without that richest jewel, health? Excuse the fondness of a wife, Who doats upon your precious life ; Such ceaseless toil, fuch conftant care, Is inore than human trength can bear. « ПретходнаНастави »
How does Catholicism affect health care? What does the Catholic Church say about healthcare? The Ethical and Religious Directives for Catholic Health Care Services are clear: “Catholic health care ministry is rooted in a commitment to promote and defend human dignity,” and they explain, “This is the foundation of its concern to respect the sacredness of every human life from the moment of conception until … How might religion affect a person’s health and health care? Religion and spirituality can impact decisions regarding diet, medicines based on animal products, modesty, and the preferred gender of their health providers. Some religions have strict prayer times that may interfere with medical treatment. Do Catholics believe in healthcare? Catholic teaching is emphatic on the need to “guarantee adequate [health] care to all,” as Pope Benedict XVI has stated. How do Catholics define health? Since a Catholic healthcare institution is a community of healing and compassion, the care offered is not limited to the treatment of a disease or bodily ailment but embraces the physical, psychological, social and spiritual dimensions of the human person. – IT IS INTERESTING:  Does the Bible talk about giving money? What is the largest Catholic healthcare system? Ascension Health (St. Louis, Mo., is one of the nation’s largest Catholic and non-profit health systems, with 67 acute-care hospitals and locations in 20 states and the District of Columbia. The system is sponsored by organizations such as the Daughters of Charity National Health System in St. What are Catholic medical ethics? What religion is against medical treatment? Jehovah’s Witnesses refuse blood transfusion. Christian Scientists refuse most medical treatment. Instead they rely on the healing prayers of Christian Scientist Practitioners. Why is religion important in healthcare? Patients often turn to their religious and spiritual beliefs when making medical decisions. Religion and spirituality can impact decisions regarding diet, medicines based on animal products, modesty, and the preferred gender of their health providers. How does religion negatively affect health? Along with the presumed benefits of religious involvement for health, religion may also be associated with negative outcomes, such as poorer mental and physical health status, negative coping behaviors, and inappropriate use of health services (39, 106). What is unique about Catholic Healthcare? The unique qualities of Catholic health care facilities go beyond our not-for-profit status. … Our employees take pride in carrying forth the mission of Catholic health care as is evidenced by their comments and also through letters of appreciation from patients, residents and their family members. IT IS INTERESTING:  What does the stone mean in the Bible? How are Catholic hospitals funded? Despite this heavy mixing of theology and health care, Catholic hospitals in 2011 received $27 billion—nearly half of their revenues—from public sources, according to a new report put out today by the American Civil Liberties Union and MergerWatch, a reproductive rights advocacy group. How big is Catholic Healthcare? Today, with in excess of 4,000 employees, Catholic Healthcare has an enviable reputation in the provision of health, aged, and community services. What do Catholics believe? Why do Catholic hospitals exist? Hospitals run by religious orders were among the first in the United States. Catholic hospitals, because of their mission and their preferential treatment of the poor, are a significant, even essential part of today’s health care safety net. Why are hospitals associated with churches? Because historically, churches were the hospitals. Nunneries were the only place that you could receive some sort of medical care (although it was usually meant to let you die comfortably). All the “nurses” were actually nuns. This is also why the cross makes sense as a symbol for the hospital.
99年第2學期-2136 餐旅連鎖經營 課程資訊 iLearn 公告清單 Teams 連結清單 評分項目 配分比例 說明 Class Participation and Attendance 20 If you are absent THREE times throughout the semester without a legitimate reason, you will be penalized with FIVE point deduction off your final grade. Mid Term 30 Cheating will not be tolerated during testing Group Presentation and Report 30 Group presentation is designed to give students an opportunity to be innovative and apply the concepts learned in class to their project. 本課程名額為 40人,已有27 人選讀,尚餘名額13人。 1. Analyzed the history of franchising from 1900’s to the present day 2. Define in writing franchising 3. Explain the different type of franchise agreements 4. Identify and distinguish the two types of franchises 5. Analyze and explain why franchisees fail 6. Explain the criteria for selecting a franchise 7. Understand the cost associated with developing a franchise 8. Understand the personal consideration in developing a franchise 9. Indentify the legal aspects of developing a franchise 10. Explain the advantages of hands-on vs absentee ownership 11. Develop and enforce the system standards 12. Explain the steps used to develop and implement and management system 13. Explain how automation impacts the franchise operation 14. Develop and implement a franchise marketing plan 15. List the steps in handing a labor dispute 16. Understand the considerations in raising money for a new franchise project 17. Explain the components of finding a location and the considerations in this process 18. Analyze financial statements and develop pro form statements 1. 餐飲連鎖經營 ( 1999) Mahmood A. Khan著,掌慶林譯,楊智文化事業(股)公司 3. 餐飲加盟連鎖最佳實務 ( 2006) 金海 , 商周出版
Readers ask: What Does Cre Stand For In Fitness? What is CRE in fitness? Cardio Respiratory Endurance ( CRE ) CRE is the ability of the heart and lungs to work efficiently together to provide the working muscles with oxygenated blood for a prolonged period of time. How does CRE impact on your performance? In football, high levels of CRE help you move around the pitch at competitive speeds for the duration of the game. CRE also allows you to perform all the important skills such as passing, tackling and shooting with more accuracy and a greater chance of success until the end of the match. How do you develop cre? The best way to build your cardio respiratory endurance is by improving your body’s consumption of oxygen. Cardio respiratory endurance, or CRE, is also known as aerobic fitness; it involves performing exercise at a moderate level of intensity for an extended period. Is stamina a physical factor? Develop the physical factor – Fitness Stamina can be increased by making the heart and lungs work hard enough so that they adapt, becoming fitter and more efficient at carrying out their function in the process. A variety of approaches are available to develop stamina. You might be interested:  Quick Answer: How To Start A Fitness Journey Blog? What does CRE stand for? Carbapenem-resistant Enterobacteriaceae ( CRE ) are strains of bacteria that are resistant to an antibiotic class (carpabenem) used to treat severe infections. CRE are also resistant to most other commonly used antibiotics and in some cases to all available antibiotics. Why is this a good test for CRE fitness? The tests can help provide information about how well your heart and lungs are working to get oxygen to your muscles during exercise. Your results may indicate your risk for developing heart disease or other chronic diseases. What is a mental factor? Mental Factors: The way your mind affects how you perform. Emotional Factors: The way your feelings affect how you perform. Social Factors: The way your interactions with others affect how you perform. Physical Factors: The way your fitness, skill level and tactical ability affect how you perform. What are the physical factors of environment? What is speed in PE? Speed is the ability to move all or part of the body quickly. Genetics influence how quick you are, but training can improve your rate or speed of movement. The amount of fast-twitch muscle fibres also influences speed. What is the best way to build cardio endurance? Increasing cardiorespiratory endurance improves oxygen uptake in the lungs and heart and can help a person sustain physical activity for longer. Other exercises that can help improve cardiorespiratory fitness include: 1. running. 2. power walking. 3. swimming. 4. dancing. 5. jump rope. 6. high-intensity sports, such as basketball and soccer. You might be interested:  How To Start Your Own Fitness Clothing Line? How do you improve your cardio endurance? Activities like walking, jogging, running, cycling, swimming, aerobics, rowing, stair climbing, hiking, cross country skiing and many types of dancing are “pure” aerobic activities. Sports such as soccer, basketball, squash and tennis may also improve your cardiovascular fitness. Does interval training improve cre? Interval Training -This involves alternating between periods of hard exercise and rest. It can improve speed, muscular endurance or power with a large work to ratio (1:4), or it can improve CRE with a shorter work to rest ratio (1:1) but over a longer period of time. Why is stamina so important? Increasing your stamina helps you endure discomfort or stress when you’re doing an activity. It also reduces fatigue and exhaustion. Having high stamina allows you to perform your daily activities at a higher level while using less energy. Which sport requires the most stamina? Top-10 Endurance Sports Ranking Sport Rating (%) 1 Orienteering 85.5 2 Triathlon 85.5 3 Rowing 85.3 4 Water Polo 84.1 Why is physical stamina important? Why is stamina important? Stamina is vital to athletes, as it enables them to keep going over a period of time. It is also important on a physical level, since stamina based exercise can help to lower blood pressure and heart rates, as well as burn fat. It can also improve mental wellbeing too. Related posts Leave a Comment
White Shark Natural History close up of a white shark swimming Greater Farallones National Marine Sanctuary protects the wildlife and habitats of one of the most diverse and bountiful marine environments in the world. This area is one of the top four major upwelling areas in the world. These biologically and nutrient rich waters provide sustenance for major populations of top predators, including White Sharks. White Sharks depend on the rich waters of the sanctuary, and as apex predators play a key role in maintaining a balanced ecosystem. Each fall, adult and sub-adult White Sharks frequent the waters of the sanctuary. Adult White Sharks are seen most frequently in the area between Tomales Pt., Año Nuevo Island and the Farallon Islands, where elephant seals and sea lions are abundant. Marine mammals are an important food source for adult and sub-adult White Sharks, particularly pinnipeds, which have a high fat content. White Sharks also feed on whale carcasses. It is thought that they feed relatively infrequently and may only eat a few seals while in the sanctuary. It is important not to interfere during a feeding event. White Sharks expend a significant amount of energy migrating across the Pacific and need to accumulate as much energy as possible during their short feeding season in sanctuary waters. White Sharks are globally distributed apex predators found primarily in temperate and sub-tropical waters. They spend time both far at sea and near the coasts. The best known estimations of coastal aggregations of White Sharks include: • Australia/New Zealand (Feb.–Oct.): 133 juvenile and sub-adult individuals (Dudley, 2010). • South Africa (Apr.–Oct.): 1,279 juvenile and sub-adult individuals (Cliff et al., 1996). • The First Population Estimate for White Sharks in South Africa Using Photo Identification and Automated Software: Estimate across all age classes is 908 (Towner et al., 2013 ) • Northwest Atlantic (migrate between New England and Florida): Number of individuals is unknown. • Northeastern Pacific Population estimates: • Central California (Tomales Pt. and Farallon Islands) (Aug.–Nov): 219 adult and sub-adult individuals (Chapple et al., 2011; study did not include data from Ano Nuevo). • Mexico (Guadalupe Island) (Jul.–Jan.): 133 adult and sub-adult individuals (Sosa-Nishizaki, 2010). • NOAA Fisheries Service Northeastern Pacific Population estimate: estimate: total population estimate across all ages classes is ~3000 (2013 Status Review Report). In the Northeastern Pacific, young of the year and juvenile White Sharks are commonly found along the Southern California Bight and south into central Baja Mexico (Vizcaino Bay). The Northeastern Pacific population of adult and sub-adult White Sharks migrates to an offshore area called the Shared Offshore Foraging Area (SOFA) or "the White Shark Café" (Domeier and Nasby-Lucas, 2008; Jorgensen et al., 2009). Scientists are unsure why they visit this area. This area is the only known location where adult and sub-adult White Sharks from Mexico and California intermingle.
Write differences between systole and diastole. | Filo filo Logodropdown-logo Class 11 Human Physiology Body Fluids and Circulation view icon634 like icon150 Write differences between systole and diastole.   Systole Diastole  1 It is the contraction of the heart chambers to drive blood into the aorta and the pulmonary artery. The aortic valve and the pulmonary valve remain closed during the systole while the semilunar valves remain open. It is the relaxation of the heart chambers between two contractions. During diastole, the chambers are filled with blood. The filling of the atrial chamber is known as atrial diastole and filling of the ventricles is known as ventricular diastole.  2Systole decreases the volume of the heart chambers and forces the blood out of them. Diastole brings the heart chambers back into their original sizes to receive more blood. view icon634 like icon150 filo banner image Connecting you to a tutor in 60 seconds. Get answers to your doubts. playstore logoplaystore logo Similar Topics digestion and absorption breathing and exchange of gases locomotion and movement body fluids and circulation microbes in human welfare
Dent Yorkshire Canada London 3 In the spring of 1846 my 4 x great grandparents Thomas Thompson Dent Jr and Dorothy Hornsby set sail for New York bound for Canada. They arrived in New York on 24 June 1846 then with their five children, William, Thomas, Elizabeth, Richard and Henry, and baby Dorothy, travelled north where they established a farm in Ontario, Canada. Why did they make such a hazardous journey with the risk of disrupting their stable lives? As the eldest son of Thomas Thompson Dent, Thomas Jr stood to inherit much of his land – Thomas Sr owned at least four farms in Bowes, Yorkshire, and the surrounding area. Did father and son fall out, or did Thomas Jr reckon that the prospects for his family were better served in Canada? When Thomas Sr died in 1854 he made no mention of Thomas Jr in his will, so the migration to Canada appears to have severed all ties within that branch of my family. That said, passenger lists indicate that Thomas Jr did travel to Britain then back to Canada in 1871. Although travel was slower in the Victorian era our ancestors were often more mobile than we sometimes realise. In 1846 Thomas and his family made their initial journey by steerage, the cheapest form of maritime travel. Their ship, the Rappahanock, sailed from Liverpool with 453 passengers. Travelling by steerage, one imagines that their journey was a challenging one. The Pays d’en Haut region of New France, 1755, an area that included most of Ontario. In the 1840s, Canada was a young developing country. The Canadian government were looking for settlers to farm the land and they made generous offers to entice people to settle. In Britain, orphans were often sent to Canada to work the land. Many of them stayed and you could argue that they faced better prospects in the fields of Canada than in the slums of a city like London. Between 1815 and 1850, Over 960,000 people arrived in Canada from Britain. The new arrivals included refugees escaping the Great Irish Famine as well as people from Scotland displaced by the Highland Clearances. Infectious diseases killed between 25 and 33 percent of Europeans who immigrated to Canada before 1891. The 1840s in particular saw heavy waves of immigration into Ontario. During this decade the population of Canada West more than doubled. As a result, for the first time, the English-speaking population of Canada West surpassed the French-speaking population of Canada East, tilting the representative balance of power. An economic upturn followed in the 1850s, which coincided with an expansion of the railway system across the province. The economic situation improved further with the repeal of the Corn Laws and trade agreements with the United States. As a result, the timber trade, mining and alcohol distilling boomed. Farmers too benefited from this good fortune. Halton County, Ontario, 1821, home to the Dent family from 1846. In Ontario, Thomas and Dorothy had two more children: Mary and Robert. In 1851 Thomas and his family were farming in Halton County. All their immediate neighbours – farmers, shoemakers, carpenters and a clergyman – came from either England or Ireland. Ten years later, in 1861, Thomas and Dorothy were living in a two storey farmhouse built of brick. They were prospering. However, as we have seen, life in Canada could be a struggle with a battle against infectious diseases and within two years two of their daughters, Mary and Dorothy, died. By 1871 the family had dispersed with sons and daughters marrying. Thomas and Dorothy worked their farm with the assistance of their son, eighteenth year old Robert. Presumably, they hired servants for seasonal tasks. However, at the time of the 1871 census none of those servants lived on the farm. Thomas died in 1876, aged 69, of typhoid. He was buried in St Stephen’s Anglican Cemetery, Hornby, Halton County, Ontario.  By 1881 Robert was running the farm. Dorothy was seventy at this point and still going strong. However, she died in 1888 and was buried in the family plot at St Stephen’s Anglican Cemetery, Hornby, Halton County, Ontario. As for Thomas and Dorothy’s children: William Dent married Margaret Featherstone. They raised a family and ran a farm in Halton, Ontario. Henry Hornsby Dent married Mary Ann Gilley. He also raised a family and ran a farm in Halton, Ontario. By 1911 he regarded himself as a Canadian. Robert married Augusta Tuck. He also considered himself a Canadian and farmed in Halton, Ontario. For this branch of the family the transfer of allegiance from Yorkshire to Canada was complete. Of the daughters, only Elizabeth survived into adulthood. On 30 October 1861 in Halton, Ontario she married Henry Gastle, a farmer originally from England. The couple produced eight sons, pictured, c1880. In all of this, what happened to my 3 x great grandfather Richard Dent? In the 1860s he decided that a farmers life in Canada was not for him and returned to Britain. More about Richard next time.
Monitor the health of your community here Does Lemonade Aid in Weight Loss? Lemonade has been increasingly marketed in diet programs as an aide to weight loss. In particular, the Lemonade Diet, also known as the Master Cleanse, is a popular weight-loss program first developed by Stanley Burroughs in the 1940s. Lemonade is claimed to help detox the body by getting rid of accumulated toxins and waste products from poor dietary habits and environmental chemicals. However, according to the Mayo Clinic, there is a lack of scientific evidence validating detox diets. Benefits of Lemonade According to The Diet and Kimberly Synder, CN and author of "The Beauty Detox Solution," lemon juice may help break down built-up waste in the digestive tract. It is also a source of vitamins and minerals, including vitamins C, B and riboflavin and minerals magnesium and phosphorus. Although lemons are acidic, a condition that is believed to unbalance the natural acid/alkaline state of the body, they are far less acidic than the natural state of the stomach and help to maintain a healthy acid/alkaline balance in the body. This decreases the risk of health issues, such as poor digestion, heartburn and allergies. Snyder also writes that lemon water helps to decrease the risk of constipation by increasing the secretion of bile from the liver. The Lemonade Diet Can You Drink Green Tea While on a Master Cleanse Diet? Learn More The Lemonade Diet, or Master Cleanse, is a detox program that involves drinking a specially prepared Master Cocktail for fast and effective weight-loss. The cocktail includes the combination of water with 10 oz. of fresh lemon juice, a tbsp. of maple syrup and cayenne peppers. The diet is meant to be followed for a 10- to 14-day period, during which time devotees drink six to eight glasses of the lemonade water daily in addition to water and herbal tea with laxatives. It is believed that the lemonade drink helps to flush the body of waste products, allowing the organs time to rest and repair and decrease food cravings. Although this diet may aid weight loss, losses are typically a result of severe caloric and nutrient intake and lack scientific validity. Speak with a physician prior to initiating any diet plan such as this, which may incur serious health risks. Although lemonade has been touted to benefit weight loss, it has been argued that there is nothing unique about it. According to The Diet Channel's Karen Crawford, MS, RD, CSP, lemonade drinks prepared with water and maple syrup lack nutrition and are essentially just sugar drinks. Lemonade provides no valid detoxing properties, and lemon juice is simply a weak acid much like vinegar. Other common ingredients added to lemonade diet drinks, such as cayenne pepper, may only irritate the gastrointestinal tract, leading to diarrhea. As stated by the Mayo Clinic, the healthiest weight loss includes a well-balanced diet combined with regular exercise. How Does the Cayenne Pepper, Molasses & Lemon Diet Work? Learn More Beware of detox diets such as the Master Cleanse or a variation of the Lemonade Diet that involve fasting solely on lemonade drinks and liquids for short- or long-term periods. Low calorie and nutrient intakes on these diets increase the risk of uncomfortable symptoms, such as headaches, nausea, dizziness, mental confusion, lethargy and constipation. Furthermore, poor nutrition for prolonged periods of time can result in health risks, such as heart conditions leading to cardiac arrest, hypoglycemia and vitamin deficiencies. Always consult with a physician prior to initiating any new dietary regimen to ensure individual needs are met.
Damages inflicted on the environment and human’s negative impacts on the nature and the wild life were the main theme of an exhibition recently held by an Iranian artist in the capital city Tehran. In her exhibition, Noushin Sharifat used plastic bags to create special shapes showing some dead animals that are either buried in the bags or carrying them in their bodies. Titled “Indifference”, the exhibition was recently held in Tehran’s Sayeh Gallery with the aim of sending this clear message to the visitors that with the current excessive use of plastic bags, nothing but death is awaiting the animals around us. Black and white plastic bags mainly used in our daily lives are the sole material used in the exhibition. Sharifat’s artistic pieces have been arranged in a special way to raise awareness about the death of animals around us by our excessive use of plastic bags. The arrangement of the skeletons of the animals in the bags creates some strange shapes turning the exhibition into a shocking one for some visitors. Use of real skeleton instead of artificial and hand-made shapes encourages the visitors to look for a logical connection among various parts and concepts of each piece. A general view of the exhibition warns the visitors that they are facing an environmental issue. The damages inflicted on the environment and human’s negative impacts on the nature and the wild life were the main focus of the exhibition. The plastic bags used excessively by human beings are highly visible in the creation of each piece. The bags left in the nature or thrown into the seas by the people pave the way for the deaths of many animals. Sharifat has also used some animal sculls on a piece of barbed wire pointing to the human’s dominance over the nature, limitation of animals’ freedom and restriction of their life-space. The exhibition was wrapped up on September 26. What follows are photos of the exhibition, retrieved from Please enter your comment! Please enter your name here
Secondary Logo Journal Logo The frequency of resistant mutant virus before antiviral therapy Ribeiro, Ruy M.1; Bonhoeffer, Sebastian2; Nowak, Martin A.1,3 Author Information • Free A number of potent anti-HIV drugs that inhibit the replication of the virus in vivo are now available. Reverse transcriptase inhibitors prevent the infection of new cells, while protease inhibitors prevent HIV-infected cells from producing infectious virus particles. Drug treatment usually results in a rapid decline of plasma virus load and an increase in the CD4 cell count [1–5]. Monotherapy often leads to rapid emergence of drug-resistant virus mutants. For some drugs, a single point mutation can confer high level resistance, while for other drugs several point mutations are required. Combination therapy can result in a longer lasting suppression of virus load. Lamivudine and zidovudine together maintain an approximately 10-fold reduction of plasma virus load in patients treated for up to (approximately) 1 year [6]. Combining lamivudine, zidovudine and one (or two) protease inhibitors can reduce virus load by more than 10 000-fold [7,8]. Patients have undetectable plasma virus, declining levels of infectious HIV-1 in peripheral blood mononuclear cells and slowly declining amounts of HIV-1 DNA provirus. The success of antiviral therapy depends (amongst other things) crucially on whether resistant mutant virus is present before the initiation of therapy [9,10]. If resistant virus is present prior to treatment, then application of the drug leads to declining levels of sensitive wild-type virus and increasing levels of resistant mutant virus. Mutant virus grows either because of an increased supply of target cells [11,12] or a reduction in antiviral immunity. If there is only a small probability that resistant virus is present in a patient before antiviral therapy, then a straightforward calculation shows that the chance that it will arise after the initiation of therapy is even smaller [13,14]. We call a virus mutant ‘resistant’ if it has a positive growth rate in the presence of therapy. For single drug therapy, it is likely that certain one or two point mutations confer resistance. Therefore, it seems likely that virus mutants, resistant to almost any single drug therapy, are present in a patient before treatment. Resistance to two or three drugs may require two or more point mutations. Mathematical models of antiviral drug treatment have been developed to study the effect of increasing target cell abundance on rebound of wild-type virus [15], the emergence of resistant mutant virus as a consequence of increasing target cell abundance [11], the effect of treatment on reducing viral diversity [16], the effect on virus load of a drug-induced reduction of infectivity [17], and the emergence of several different mutants of increasing levels of resistance during therapy [18,19]. Mathematical models of antiviral therapy have also provided estimates for kinetic parameters of virus replication in vivo [1,2,4,7,20–23]. De Boer and Boucher developed a mathematical model to study the consequence of preventing CD4 cell increase during therapy on the emergence of resistant virus [24]. In this article we use a quasispecies equation of viral dynamics [25] to calculate the expected frequency of drug-resistant virus in untreated patients. We will provide results for the frequency of resistant mutants that differ in one, two, three or more point mutations from wild-type virus. We will compare the effect of mutation and selection on pretreatment frequency, and also study the consequence of various degrees of selection disadvantage of intermediate mutants. The model We begin with a simple model that contains wild-type virus and one mutant. It is assumed here that wild-type and mutant differ by only a single point mutation (Fig. 1a). The mutation rate is given by the parameter μ. Furthermore, it is assumed that wild-type virus has a fitness advantage over mutant virus in the absence of drug; the selection coefficient is given by s. The model has three variables: uninfected cells, x; cells productively infected by wild-type virus, y0; and by mutant virus, y1. Uninfected cells are produced at rate λ and die at rate dx. Infected cells die at rates ay0 and ay1. Infected cells give rise to new infected cells at a rate proportional to the abundance of uninfected cells multiplied by infected cells; the rate constant is β. It is assumed that free virus dynamics are fast compared with infected cell turnover [22]. Therefore, we do not have to consider a separate equation for free virions, but simply assume that virion abundance is proportional to infected cell abundance. The model equations are as follows: Fig. 1 Fig. 1: . A schematic illustration for the system with (a) one and (b) two point mutations between sensitive wild-type virus and resistant mutant virus. The empty box represents wild-type virus and the shaded box represents mutant virus. At equilibrium, the ratio of mutant to wild-type virus, to first order in μ, is as follow: For example, if the point mutation rate is µ =3 × 10−5[26] and the mutant has a selective disadvantage of s = 0.01 [27], then the relative proportion of mutant to wild-type is 3 × 10−3. In other words, for this choice of parameters, about 1 in 300 cells contains the mutant virus. If the mutant had a large selective disadvantage (s ≊ 1), then the ratio of mutant to wild-type would be approximately 10−5. However, there is some experimental evidence for one-error mutants with frequencies of the order of 10−3 [28] in previously untreated patients. We now expand the model to consider resistant mutants that differ by two point mutations (Fig. 1b). This model has five variables: uninfected cells, x; cells infected by wild-type virus, y00; cells infected by one-error mutants, y01 and y10; and cells infected by the two-error mutant, y11. Note that we use a binary notation for wild-type virus (00) and the various mutants (01, 10, and 11). Thus, at each of two relevant positions we consider one amino-acid substitution. We assume that these amino-acid substitutions are due to a single base substitution in the viral genome. The replication fidelity of the reverse transcriptase may vary for different positions in the genome and therefore we assume that the mutation rate for the first position is µ1and for the second position is µ2. The selective disadvantage of the mutants y01, y10 and y11 is given by s01, s10 and s11, respectively. The model equations are as follows: The abbreviations νi = 1 -µi and rij =1 - sij have been used. The exact equilibrium solution of this system is complicated, but we can obtain an elegant approximation by neglecting back-mutations. In this case, we simply solve the following eigenvalue equation: We obtain the following: If in addition we assume that the selection coefficients are larger than the mutation rates, then we obtain the following approximate equilibrium ratios: Again, this approximation is accurate if the selection coefficients are noticeably larger than the mutation rates. For example, if µ1 = µ2 =3 × 10−5 and if s01 = s10= s11 = 0.01 then y11/y00 ≊ 2 × 10−5. In other words, approximately 1 in 50 000 productively infected cells contains resistant mutant virus, which differs from the wild-type by two point mutations. Table 1 shows the effect of different selective disadvantages for the intermediate mutants, s01 and s10, on the relative frequency of y11. For example, if s11 = 0.01, but s01 = s10 = 1 (i.e., the double mutant has a small selective disadvantage, but the intermediate one-error mutants cannot replicate) then the relative abundance of the double mutant is y11/y00 ≊ 9 × 10−8. If, on the other hand, s01 = s10 = 0.001 (i.e., the intermediate mutants have a selective disadvantage of only 0.1% compared with wild-type) then we find y11/y00 ≊ 1.8 × 10−4. The difference in the equilibrium frequency of the double mutant is several orders of magnitude. Therefore, in order to estimate the pretreatment equilibrium frequency of a resistant variant, it is, of course, not sufficient to know the selective disadvantage of this mutant compared with wild-type, but it is also necessary to know the selection coefficients of all intermediate variants. Table 1 Table 1: . Effect of the selective disadvantages of the intermediate one-error mutants, y 01 and y 10, on the relative abundance of the two-error mutant, y 11. The above model can be expanded to consider mutants that differ from wild-type virus by more than two point mutations. For simplicity, assume that the average mutation rate for each site is the same, μ, and that all mutants have the same selective disadvantage, s, which is much smaller than 1. In this case we obtain (Fig. 2) the following: Fig. 2 Fig. 2: . Time evolution of a system with three point mutations. Originally the patient is infected by wild-type virus. The increase in total abundance of wild-type virus, one-, two-, and three-error mutants is shown. Parameter values are as follows: β = 5 × 10−8, s i = 0.01, λ =107, a = 0.5, d = 0.1 and µI = 3 × 10−5. Of course, n!(µ/s)n has to be less than unity otherwise our approximations break down. This is essentially an error threshold condition of quasispecies theory [29,30]. Table 2 shows equilibrium frequencies of mutants that differ from wild-type by up to five point mutations. For s = 0.01, the frequency of a three-error mutant is 1.6 × 10−7, of a four-error mutant is 1.9 × 10−9 and of a five-error mutant is 2.9 × 10−11. Suppose that there are approximately 107-108 [31] productively infected cells in an HIV-1-infected patient. For s = 0.01, a particular four- or five-error mutant is unlikely to be present, while the three-error mutant is likely to exist. For a higher selective disadvantage (s > 0.01) the three-error mutant is also unlikely to exist in a patient prior to treatment. We can also ask what is the maximum selective disadvantage that is still compatible with the survival of a given virus mutant in a patient with N infected cells. If N =108 and µ =3 × 10−5, then a two-error mutant will survive if s < 0.4, a three-error mutant if s < 0.03, and a four-error mutant if s < 0.007. (In this calculation, intermediate mutants have the same selective disadvantage, s. Other assumptions are also possible and can be calculated.) Table 2 Table 2: . Equilibrium frequencies of mutants that differ from the wild-type by one, two, three, four or five point mutations. The model also provides insight into the time evolution of resistant mutant virus during the course of infection. If a patient is initially infected by sensitive wild-type virus, y0, then the frequency of resistant mutant virus, y1, rises as follows: Note that this calculation assumes that the number of uninfected cells, x, is approximately constant during the rise of resistant mutants. The mutant will arrive at half its equilibrium value after (ln2)/[βx(s-µ)] days. In principle, we can recursively obtain the rate of convergence towards equilibrium for any of the mutant strains, but the analytical expressions are too complex to be shown here. However, it is interesting to compare the times until a two-error (or greater) mutant attains a given frequency relative to the wild-type if (i) the intermediate mutants cannot replicate at all, or (ii) all mutants have the same selective disadvantage. For example, a two-error mutant reaches a frequency of 10−8 about five times faster under scenario (ii) than under scenario (i). Hence, the presence of intermediate mutants with positive growth rate not only strongly affects the equilibrium frequency of a n-error mutant, but also its rate of ascent. Note, however, that the time necessary for a mutant to reach a given percentage of its equilibrium value is larger under scenario (ii), simply because the equilibrium value is much higher in this scenario. The success of drug therapy depends to a large extent on whether resistant virus is present in patients prior to treatment. Based on a quasispecies model for the balance of selection and mutation between wild-type and mutants, we derived analytical expressions for the pre-treatment frequency of mutant virus. We showed that the mutant frequency depends on the number of point mutations between wild-type and mutant, the selective disadvantage of the mutant and all its intermediates, and the mutation rate. For example, for a mutation rate of 3 × 10−5 [26] and a selective disadvantage for the mutant and all intermediates of 1%, we find that the frequency of a three-error mutant relative to wild-type is approximately 10−7. If there are on average 107–108productively infected cells in a patient [31], then such a mutant may well be present before the start of therapy. There are several practical conclusions to be drawn. The probability of treatment failure due to viral resistance can be reduced in three ways: (i) treatment should start early when virus load is still low and the frequency of resistant mutants is small (assuming that most patients are infected by drug-sensitive wild-type virus); (ii) treatment should commence immediately with multiple drugs (three or more) – it is clearly disadvantageous to initiate therapy with one drug and then add other drugs later, giving the virus the possibility to develop resistance to each drug sequentially; and (iii) treatment should combine drugs for which resistance mutations are known to involve a considerable selective disadvantage in the absence of drug. It may be of great importance to identify such combinations, since mutants resistant to these combinations may not exist in patients prior to treatment. 1. Wei X, Ghosh SK, Taylor ME, et al.: Viral dynamics in human immunodeficiency virus type 1 infection. Nature 1995, 373:117–122. 3. Schuurman R, Nijhuis M, van Leeuwen R, et al.: Rapid changes in human immunodeficiency virus type 1 RNA load and appearance of drug-resistant virus populations in persons treated with lamivudine (3TC). J Infect Dis 1995, 171:1411–1419. 4. Nowak MA, Bonhoeffer S, Loveday C, et al.: HIV-1 dynamics: results confirmed. Nature 1995, 375:193. 5. Loveday C, Kay S, Tenant-Flowers M, et al.: HIV-1 RNA serum-load and resistant viral genotypes during early zidovudine therapy. Lancet 1995, 345:820–824. 6. Eron JJ, Benoit SL, MacArthur RD, et al.: Treatment with lamivudine, zidovudine, or both in HIV-positive patients with 200–500 CD4+ cells per cubic millimeter. N Engl J Med 1995, 333:1662–1669. 7. Perelson AS, Essunger P, Cao Y, et al.: Decay characteristics of HIV-1-infected compartments during combination therapy. Nature 1997, 387:188–191. 8. Lafeuillade A, Poggi C, Sayada C, Pellegrino P, Profizi N: Focusing on the second phase of plasma HIV-1 RNA clearance [letter]. AIDS 1997, 11:264–266. 9. Coffin JM: HIV population dynamicsin vivo: implications for genetic variation, pathogenesis, and therapy. Science 1995, 267:483–489. 10. Coffin JM: HIV viral dynamics. AIDS 1996, 10 (suppl 3):S75-S84. 11. McLean AR, Nowak MA: Competition between zidovudine-sensitive and zidovudine-resistant strains of HIV. AIDS 1992, 6:71–79. 12. Nowak MA, May RM: AIDS pathogenesis: mathematical models of HIV and SIV infections. AIDS 1993, 7(suppl 1):S3-S18. 13. Bonhoeffer S, Nowak MA: Pre-existence and emergence of drug resistance in HIV-1 infection. Proc R Soc Lond B Biol Sci 1997, 264:631–637. 14. Bonhoeffer S, May RM, Shaw GM, Nowak MA: Models of virus dynamics and drug therapy. Proc Natl Acad Sci USA 1997, 94:6971–6976. 15. McLean AR, Emery VC, Webster A, Griffiths PD: Population dynamics of HIV within an individual after treatment with zidovudine. AIDS 1991, 5:485–489. 16. Nowak MA, Anderson RM, McLean AR, Wolfs T, Goudsmit J, May RM: Antigenic diversity thresholds and the development of AIDS. Science 1991, 254:963–969. 17. Bonhoeffer S, Coffin JM, Nowak MA: Human immunodeficiency virus drug therapy and virus load. J Virol 1997, 71:3275–3278. 18. Frost SDW, McLean AR: Quasispecies dynamics and the emergence of drug resistance during zidovudine therapy of HIV infection. AIDS 1994, 8:323–332. 19. Stilianakis NI, Boucher CAB, De Jong MD, van Leeuwen R, Schuurman R, De Boer RJ: Clinical data sets of human immunodeficiency virus type-1 reverse transcriptase resistant mutants explained by a mathematical model. J Virol 1997, 71:161–168. 20. Nowak MA, Anderson RM, Boerlijst MC, Bonhoeffer S, May RM, McMichael AJ: HIV evolution and disease progression. Science 1996, 274:1008–1010. 21. Nowak MA, Bonhoeffer S, Shaw GM, May RM: Anti-viral drug treatment: dynamics of resistance in free virus and infected cell populations. J Theor Biol 1997, 184:203–217. 22. Perelson AS, Neumann AU, Markowitz M, Leonard JM, Ho DD: HIV-1 dynamicsin vivo: virion clearance rate, infected cell lifespan, and viral generation time. Science 1996, 271:1582–1585. 23. Herz AVM, Bonhoeffer S, Anderson RM, May RM, Nowak MA: Viral dynamicsin vivo: limitations on estimates of intracellular delay and virus decay. Proc Natl Acad Sci USA 1996, 93:7247–7251. 24. De Boer RC, Boucher CAB: Anti-CD4 therapy of AIDS suggested by mathematical models. Proc R Soc Lond B Biol Sci 1996, 263:899–905. 25. Boerlijst MC, Bonhoeffer S, Nowak MA: Viral quasi-species and recombination. Proc R Soc Lond B Biol Sci 1996, 263:1577–1584. 26. Mansky LM, Temin HM: Lowerin vivomutation rate of human immunodeficiency virus type 1 than the predicted from the fidelity of purified reverse transcriptase. J Virol 1995, 29:5087–5094. 27. Goudsmit J, De Ronde A, Ho DD, Perelson AS: Human immunodeficiency virus fitnessin vivo: calculations based on a single zidovudine resistance mutation at codon 215 of reverse transcriptase. J Virol 1996, 70:5662–5664. 28. Nájera I, Holguín A, Quiñones-Mateu ME, et al.: polgene quasispecies of human immunodeficiency virus: mutations associated with drug resistance in virus from patients undergoing no drug therapy. J Virol 1995, 69:23–31. 29. Eigen M, Schuster P: The hypercycle. A principle of natural self-organization. Part A: Emergence of the hypercycle. Naturwissenschaften 1977, 64:541–565. 30. Nowak MA, Schuster P: Error thresholds of replication in finite populations. Mutation frequencies and the onset of Muller's ratchet. J Theor Biol 1989, 137:375–395. 31. Chun TW, Carruth L, Finzi D, et al.: Quantification of latent tissue reservoirs and total body viral load in HIV-1 infection. Nature 1997, 387:183–188. Antiviral therapy; mathematical model; resistant mutant; viral load © Lippincott-Raven Publishers.
Who doesn’t think that everyone in the world deserves clean water?​ Our Young Pirates have been sailing the seven seas, studying subjects that make people pause for thought. Looking closely at gender inequality has given Young Pirates an understanding of both utter unfairness and lost lack of potential arising from young girls’ poor access to education. Meanwhile, climate change is a huge topic, and strongly related to others, including hunger and access to clean water. More young people are learning why it’s so important to put the planet first, though some said plants could be a lot tastier! Sadly, the aftermath of the European Championship final saw some England football players being racially abused on social media. In the year after George Floyd’s murder, it’s a timely reminder of how far we’ve come – and the distance left to travel – until racism is eliminated, and people aren’t judged on their heritage, language, skin colour or religion. Their passion for the subject matter shone through, helping shape some inspiring insights peppered by plenty of facts and figures. Knowing how to craft an argument will no doubt serve them well in future! The strength of their writing was informed by their willingness to tackle new words during reading sessions, with selected texts promoting good conversations about comprehension. Encouraging young people to fulfil their reading potential is essential to embed a love of books at an early age, which in turn will help them with all areas of their education as they grow older. -Crewmate Mark This blog is about clean water and giving everyone access to clean water. Why is clean water so important? There are several reasons why clean water is important.  People need clean water because dirty water will affect our bodies negatively. Did you know every 10 seconds someone dies from contracting a disease through drinking dirty water?   We are right now petitioning for clean water because the rights for clean water are really important. Do you really think you don’t need clean water for your survival?​  Everybody deserves access to clean water.   Isn’t it horrendous to think that 3.5 million people die each year from dirty water? Clean water is one aspect of improving sustainable food production – in order to reduce poverty and hunger. When it comes to the production of food, clean water is an essential ingredient. Most importantly, if you do not have clean water there is a big chance of dying. What do you think would happen if people didn’t have clean water? Well, we do know that every minute a new-born dies from infection caused by a lack of safe water and an unclean environment.    Isn’t it obvious that clean water is essential?   Humans need clean water  By using dirty water, children are at a higher risk of death and illnesses. Research reveals that, in 2006, nearly 2 million children died from using and drinking unclean water. Additionally, rural Indian areas consume excessive fluoride contaminated water, which leads to skeletal deformities.​ Our immune system relies on clean water to stay strong and hydrated.​ Lots of people are dying and getting sick, including new-born babies, because of contaminated water that spreads deadly diseases. Even at the beginning of our lives, clean water is very important! Contaminated water has killed approximately 450,000 people worldwide. Clean water is really important because children need to have hydration; every person on earth requires at least 20 to 50 litres of clean, safe water a day. That’s between 5 and 7 cups a day. You may be able to live one day without food, but water is too important and is one of the main parts of staying healthy and strong, so we need to drink clean water every day. It’s that simple.   Inequalities in accessing clean water  Even though we are different, we all have one thing in common and it’s that we are all humans and we all should have the same opportunities.​ Clean water helps our communities become more sustainable. Only 40% of the world has access to clean water. Isn’t it time we do something to improve this? Countries that are poorer have less access to safe clean water. Ask yourselves, shouldn’t everyone have access to clean water?  Did you know that more than half of primary schools in developing countries don’t have water or have dirty water?If they don’t have clean water, they will get dehydrated and get sick.​ People who don’t have a tap in their home have to walk a long distance with heavy stuff, just to get clean water to drink, they try to filter their own water.​ We love our toilets, but unfortunately 2 BILLION people don’t have a decent toilet of their own.​ In Ethiopia, children sometimes must skip school to travel long journeys to obtain water that often is not clean, also in school must wash their hands with dirty water.​  Would you really want to walk for 30 mins just to get some clean water?​  Are you aware of this situation? It is heart-breaking knowing that women have to travel very far to access clean water for their families. Isn’t this upsetting? It is also an issue of gender inequality. There are millions of women and children that are sent to get water. Sadly, it is still mostly polluted. Some people get their water from the dirty lakes, which can make them sick and can also kill them! 80% of sewage in some countries goes into the water. This is bad because people might get diseases and become really sick. We need to be more responsible with how we dispose of waste to make more clean water available! How would you feel if you were drinking that polluted water? Do you want people to be poisoned due to the polluted river water?   Why not campaign for clean water? It could lead to a change in so many lives!  Visit www.wateraid.org to find out more or make a donation.  Written by: Ryan, Miyah, Aziz, Baran, Chizara, Cameron, Kairon, Michael, Aleksandra, Rabia, Paige, Kayla, Edward, Gintare, Dulcie, Harry, Orion, Amber, Angel, Teriss, Amy, Kyana, Alfie, Jayden, Christian, Danae, Krystal, Camila, Rayyan, Abdelrahim, Huey, Jacob, Rayn, Chinaza, Cian and Malachi. Form assembly Sign up for our email newsletter Scroll to Top
After years of debate, the British House of Commons approved the creation of embryos with genetic material from two women and one man by a vote of 382 to 128. The House of Lords will probably pass the bill, which amends the 2008 Human Fertilisation and Embryology Act, later this year.  Prof Alison Murdoch, one of the technique’s pioneers, said: “This is good news for progressive medicine. In a challenging moral field, it has taken scientific advances into the clinic to meet a great clinical need and Britain has showed the world how it should be done.” How was it done? How did British scientists manage to persuade Parliament to overcome the “moral challenges” and to accept “progressive medicine”? Its opponents had described mitochondrial transfer ominously as genetic engineering, three-parent babies, and eugenics. Why didn’t Parliament buy it? There are lessons here for other countries where this technique will be debated in the not-too-distant future, like the US and Australia.  The technique is so controversial that even its name is a matter of dispute. Supporters describe it as “mitochondrial transfer”; opponents and the media call it “three-parent embyros”. There are two approaches, one beginning with a woman’s eggs and the other with an embryo. But both transfer the nucleus of a cell with faulty mitochondria floating in its cytoplasm into a cell with healthy mitochondria from a second woman.  There appear to be seven strands in their lobbying strategy.   Advance planning: a number of scientific, ethical and public consultations have been carried out since 2011, with the enthusiastic backing of well-funded scientific and government organisations. Their patient work to win over the politicians and the media was rewarded.  Exaggerate the health impact of the technique. The technique is meant to help families whose children would otherwise live with a mitochondrial disease. These vary greatly in severity, but at their worst the children suffer from diseased organs, gastrointestinal disorders, respiratory disorders, neurological problems, autonomic dysfunction and dementia. There are various estimates of how many families would be helped by the IVF technique. Nature News said that 2,000 women “could benefit”, based on a data from a recent letter in the New England Journal of Medicine. However, the letter actually said that only 152 women would be “at risk” each year. Of these, perhaps 10 or 20 might take advantage of the technique. If Parliament were really interested in curing children, why not back research into Ebola? That has killed thousands of children.  Highlighting the suffering of the children and their parents. Some affected families have had very tragic experiences. One woman, Sharon Bernardi, lost all seven of her children. But there are many families with children who suffer painful diseases whose stories never appear in the media. Those affected by mitochondrial disease are different because their stories were amplified by a powerful public relations machine.  Framing the technique as a cure. In the media, mitochondrial transfer was consistently described as a cure for dread diseases. In fact, not one child will be cured; instead, healthy IVF children will be created. The editor of the Journal of Medical Ethics, Julian Savulescu, phrased this point very carefully in an article for the Guardian: “Importantly, by doing this transplant at the very early stage of embryo development, the disease is cured [my italics]. The children of the offspring of this procedure will themselves be free of mitochondrial disease. It would be eradicated forever in this family.” But in a video directed at members of Parliament, he said, less cautiously, “every year 150 children are born with this condition and you have the power to cure them.” This is not true.  Redefining the human person as nuclear DNA. Mitochondrial DNA constitutes only 0.054 per cent of the total DNA in a cell, according to Dame Sally Davies, Chief Medical Officer for England, who played an important role in the debate. It is the DNA in the nucleus “which determines our personal characteristics and traits such as personality, hair and eye colour”. This was repeated over and over by supportive scientists: mitochondrial DNA is just a battery pack. No one explained how mitochondrial DNA could be both a negligible part of the human person and also have such devastating effect upon a child’s organs, systems and personality.  Redefining genetic engineering. Genetic engineering is modification of the genome; scientists redefined it as modification of nuclear DNA. The mitochondrial DNA is simply a replaceable module or an interchangeable spare part. In one of the cleverest redefinitions, Stephen Wilkinson, a bioethicist at Lancaster University, wrote that “mitochondrial replacement isn’t genetic modification as such, but rather donation … nothing really new is being added to the human gene pool.” In other words, genetic engineering only happens if an artificial or non-human gene is added to an embryo.  Moving the goal posts like this is an old debating trick. Vladimir Putin used it when Russia absorbed Crimea. We are fully, fully, committed to the territorial integrity of Ukraine. What about that illegal invasion of Crimea stuff then? Illegal? You don’t understand; Crimea has always been part of Russia, my friend. We are fully, fully, committed, etc.  Exaggerating the extent of their knowledgeNot all scientists welcomed the decision. Paul Knoepfler, of UC Davis School of Medicine, and a leading American stem cell researcher, thought that legalisation was premature: Michael Cook Michael Cook is the editor of MercatorNet.
UK military fears robots learning war from video games; Will be a real issue by 2020 But artificial intelligence (AI) programs can then “be readily adapted” to wage cyber-warfare, the MoD (Ministry of Defence) says. “Not only will AI increase the variety and tempo of cyber-attacks, it will also decrease the cost and increase the variety of actors able to undertake this activity,” the report says. “As the requirement for skilled specialists involved in the attack diminishes, the limitation will become access to the AI algorithms needed to conduct such an attack. “In other words, any actor with the financial resources to buy, or steal, an AI APT (advanced persistent threat) system could gain access to tremendous offensive cyber-capability, even if that actor is relatively ignorant of internet security technology. “Given that the cost of replicating software can be nearly zero, that may hardly present any constraint at all. This is likely to be a live issue by 2020 or soon thereafter. Sign Up for NextBigWhat Newsletter
by Daniel Fink, MD, Chair, The Quiet Coalition Can hearing aids delay the development of dementia in older people? This question has been discussed since research showed an association between hearing loss and dementia, with greater hearing loss being associated with a greater chance of dementia. This study indicates that the answer may be “yes.”  The study is based on insurance claims data, not clinical data, so clinical studies are needed to confirm the results. But in analyzing data on 79 million adults insured by a private health insurance company, hearing aid use among adults diagnosed with hearing loss was associated with a decreased risk of Alzheimer’s disease or dementia. Hearing loss leads to lack of brain stimulation, social isolation, and depression, all of which have been linked to development of dementia. So the results of the study make sense. It’s possible that treating hearing loss with hearing aids may help delay or prevent dementia. Of course, preventing hearing loss in the first place is far better and far cheaper than providing hearing aids to those with hearing loss, and certainly cheaper than treating dementia. And preventing most hearing loss is easy: avoid loud noise exposure or wear hearing protection if one can’t. Because if something sounds too loud, it is too loud.
Shopping Cart (0 item) Your cart is currently empty 8 Shocking Facts about the Fast Fashion Industry Scroll down We all love a good shopping spree, don’t we? We love it even more when we find stylish clothes at wonderfully low prices. After all, who doesn’t love a good deal? But, is this love for quick, affordable fashion going to cost us dearly in the long run? Let’s find out. What is fast fashion and how does it work? The fast fashion industry is based on a system that aims to offer you the latest in fashion at very low prices, with an extremely fast turnaround rate. To put it simply, this means that the whole process of creating new designs and making them available at all the different store locations owned by the company can take place in a little over a week. To make this possible, the industry focuses on fast, easy and cheap manufacturing processes while often neglecting the social and environmental impact of these processes, thus contributing to environmental pollution in a big way. Here’s 8 appalling facts that will help you understand the environmental and social impact of the fast fashion industry even better. 1. The textile industry is the second largest polluter of clean water, globally. After textiles are dyed, mills dump dyes and harmful chemicals into nearby freshwater sources. These chemicals pollute water, harm the ecosystem and cause large amounts of fish to die every year. Did you know that in China, an estimated 90% of the local groundwater is polluted and 72 toxic chemicals in the water supply are from textile dyeing! 2. When fashion is consumed that easily, it’s discarded pretty quickly as well. When you discard your old clothing, it ends up in landfills where it can take years and years for these fibers to decompose. Synthetic fabrics such as polyester and nylon can take hundreds of years to biodegrade. Until then, they settle in landfills and release harmful greenhouse gases and toxic substances into the atmosphere. 3. The fashion industry uses roughly 1.5-2.5 trillion gallons of water every year. To make one cotton t-shirt alone, it takes around 2700 liters of water, which is the amount of water that a person drinks in 3 years. From growing the cotton to the manufacturing process, there is huge amount of water wastage and water pollution. 4. Cotton farming uses more pesticides and insecticides than any other crop in the world. It takes almost 140 grams of fertilizer and pesticides to produce enough cotton for a single T-shirt. Unfortunately, 90% of the pesticides used actually end up in the air and water supply, affecting he health of humans and animals. 5. Farmers and textile workers are exposed to toxic chemicals and pesticides, that can cause serious health problems. The Netflix documentary, ‘The True Cost’ sheds light on this issue by showing us the birth defects in the children of Indian cotton farmers and other shocking examples. 6. Billions of animals are slaughtered and processed each year to produce fashionable garments made from leather, fur, wool, feathers/down, or silk. These animals suffer all kinds of atrocities – from mistreatment to forced farming and painful killing methods. 7. If you look at the labels on most of your clothes, you will see that they are made using a large percentage of Polyester. But did you know that polyester is basically a kind of plastic that is extremely harmful for both marine life and humans? How? When polyester clothing is washed in our washing machines, small microfibers are released. These microfibers are extremely tiny and non-biodegradable. Hence, they easily go through our wastewater treatment plants and enter water bodies, where they are consumed by marine animals, thus disrupting the food chain. 8. To keep up with increasing consumer demand while keeping production costs low, many large fashion houses engage in unfair labour practices. Workers receive meager wages and are exposed to hazardous working conditions due to lack of proper regulations. Child labour too is prevalent in the garment making industry. How can we make better choices? As a consumer, our choices can make a difference. Whether it’s opting to use eco-friendly fabrics, supporting sustainable businesses, recycling/donating old clothes instead of disposing them or even using the washing machine less frequently – there’s many ways in which we can contribute towards safeguarding the environment. All it takes is small, mindful choices. Leave a comment below telling us how you’re trying to lessen your environmental impact. Related Products Leave a comment Your email address will not be published Please note, comments must be approved before they are published 15% Off When You Join The Softsens Momma's Club
#title On The Devil, and Devils #author Percy Bysshe Shelley #SORTtopics anti-christian, religion, essays, anti-religion #date 1880 #source https://en.wikisource.org/wiki/The_Prose_Works_of_Percy_Bysshe_Shelley/On_the_Devil,_and_Devils #lang en To determine the nature and functions of the Devil, is no contemptible province of the European Mythology. Who, or what he is, his origin, his habitation, his destiny, and his power, are subjects which puzzle the most acute theologians, and on which no orthodox person can be induced to give a decisive opinion. He is the weak place of the popular religion—the vulnerable belly of the crocodile. The Manichæan philosophy respecting the origin and government of the world, if not true, is at least an hypothesis conformable to the experience of actual facts. To suppose that the world was created and is now superintended by two spirits of a balanced power and opposite dispositions, is simply a personification of the struggle which we experience within ourselves, and which we perceive in the operations of external things as they affect us, between good and evil. The supposition that a good spirit is, or hereafter will be, superior, is a personification of the principle of hope, and that thirst for ​improvement without which present evil would he intolerable. The vulgar are all Manichæans—all that remains of the popular superstition is mere Machinery and accompaniment. To abstract in contemplation, from our sensations of pleasure and pain, all circumstance and limit; to add those active powers, of whose existence we are conscious within ourselves; to give to that which is most pleasing to us, a perpetual or an ultimate superiority, with all epithets of honourable addition; and to brand that which is displeasing with epithets ludicrous or horrible, predicting its ultimate defeat, is to pursue the process by which the vulgar arrive at the familiar notions of God and the Devil. The Devil was clearly a Chaldæan invention, for we first hear of him after the return of the Jews from their second Assyrian captivity. He is, indeed, mentioned in the Book of Job; but, so far from that circumstance affording any proof that that Book was written at a very early period, it tends rather to shew that it was the production of a later age. The magnificence and purity, indeed, of the poetry, and the irresistible grandeur of its plan, suggest the idea that it was a birth of the vigorous infancy of some community of men. Assuredly it was not written by a Jew before the period of the second captivity,—because it speaks of the Devil, and there is no other mention of this personage in the voluminous literature of that epoch. And that it was not written by a Jew at all may be presumed, from a perpetual employment, and that with the most consummate beauty, of imagery belonging to a severer climate than Palestine. But to return to the Devil.—Those among the Greek ​Philosophers, whose poetical imagination suggested a personification of the Cause of the Universe, seem, nevertheless, to have dispensed with the agency of the Devil. Democritus, Epicurus, Theodorus, and perhaps even Aristotle, indeed abstained from introducing a living and thinking Agent, analogous to the human mind, as the author or superintendent of the world. Plato, following his master, Socrates, who had been struck with the beauty and novelty of the theistical hypothesis, as first delivered by the tutor of Pericles, supposed the existence of a God, and accommodated a moral system of the most universal character, including the past, the present, and the future condition of man, to the popular supposition of the moral superintendence of this one intellectual cause. It is needless to pursue the modifications of this doctrine as it extended among the succeeding sects. This hypothesis, though rude enough, is in no respect very absurd and contradictory. The refined speculations concerning the existence of external objects, by which the idea of matter is suggested, to which Plato has the merit of having first directed the attention of the thinking part of mankind… A partial interpretation of it has gradually afforded the least unrefined portion of our popular religion. But the Greek Philosophers abstained from introducing the Devil. They accounted for evil by supposing that what is called matter is eternal, and that God, in making the world, made not the best that he, or even inferior intelligence could conceive; but that he moulded the reluctant and stubborn materials ready to his hand, into the nearest arrangement possible to the perfect archetype existing in his contemplation:—in the ​same manner as a skilful watchmaker, who, if he has diamonds, and steel, and brass, and gold, can compose a time-piece of the most accurate workmanship, could produce nothing beyond a coarse and imperfect clock, if he were restricted to wood, as his material. The Christian theologians have invariably rejected this hypothesis, on the ground that the eternity of matter is incompatible with the omnipotence of God. Like panic-stricken slaves in the presence of a jealous and suspicious despot, they have tortured themselves to devise some flattering sophism, by which they might appease him by the most contradictory praises—endeavouring to reconcile omnipotence, and benevolence, and equity, in the author of an universe, where evil and good are inextricably entangled, and where the most admirable tendencies to happiness and preservation are for ever baffled by misery and decay. The Christians, therefore, invented or adopted the Devil to extricate them from this difficulty. The account they give us of the origin of the Devil is curious:—Heaven, according to the popular creed, is a certain airy region inhabited by the Supreme Being, and a multitude of inferior Spirits. With respect to the situation of it theologians are not agreed, but it is generally supposed to be placed beyond the remotest constellation of the visible stars. These spirits are supposed, like those which reside in the bodies of animals and men, to have been created by God, with foresight of the consequences which would result from the mechanism of their nature. He made them as good as possible, but the nature of the substance out of which they were formed, or the unconquerable laws according to which ​that substance, when created, was necessarily modified, prevented them from being so perfect as he could wish. Some say that he gave them free-will; that is, that he made them, without any very distinct apprehension of the results of his workmanship; leaving them an active power which might determine them to this or that action, independently of the motives afforded by the regular operation of those impressions which were produced by the general agencies of the rest of his creation. This he is supposed to have done, that he might excuse himself to his own conscience for tormenting and annoying these unfortunate spirits, when they provoked him by turning out worse than he expected. This account of the origin of evil, to make the best of it, does not seem more complimentary to the Supreme Being, or less derogatory to his omnipotence and goodness, than the Platonic scheme. They then proceed to relate, gravely, that one fine morning, a chief of these spirits took it into his head to rebel against God, having gained over to his cause a third part of the eternal angels, who attended upon the Creator and Preserver of Heaven and Earth. After a series of desperate conflicts between those who remained faithful to the ancient dynasty and the insurgents, the latter were beaten, and driven into a place called Hell, which was rather their empire than their prison, and where God reserved them, first to be the tempters, and then the jailors and tormentors of a new race of beings, whom he created under the same conditions of imperfection, and with the same foresight of an unfortunate result. The motive of this insurrection is not assigned by any of the early mythological writers. Milton supposes that, on a particular day, God chose to adopt as his Son and heir, ​(the reversion of an estate with an immortal incumbent, would he worth little) a being unlike the other Spirits, who seems to have been supposed to be a detached portion of himself, and afterwards figured upon the earth in the well-known character of Jesus Christ. The Devil is represented as conceiving high indignation at this preference, and as disputing the affair with arms. I cannot discover Milton's authority for this circumstance;[1] but all agree in the fact of the insurrection, and the defeat, and the casting out into Hell. Nothing can exceed the grandeur and the energy of the character of the Devil, as expressed in Paradise Lost. He is a Devil, very different from the popular personification of evil, and it is a mistake to suppose that he was intended for an idealism of Evil. Malignity, implacable hate, cunning, and refinement of device to inflict the utmost anguish on an enemy, these, which are venial in a slave, are not to be forgiven in a tyrant; these, which are redeemed by much that ennobles in one subdued, are marked by all that dishonours his conquest in the victor. Milton's Devil, as a moral being, is as far superior to his God, as one who perseveres in a purpose which he has conceived to be excellent, in spite of adversity and torture, is to one who in the cold security of undoubted triumph inflicts the most horrible revenge upon his enemy—not from any mistaken notion of bringing him to repent of a perseverance in enmity, but with the open and alleged design of exasperating him to deserve new torments. Milton so far violated all that part of the popular ​creed which is susceptible of being preached and defended in argument, as to allege no superiority in moral virtue to his God over his Devil. He mingled as it were the elements of human nature as colours upon a single pallet, and arranged them into the composition of his great picture, according to the laws of epic truth; that is, according to the laws of that principle by which a series of actions of intelligent and ethical beings, developed in a rythmical tale, are calculated to excite the sympathy and antipathy of succeeding generations of mankind. The writer who would have attributed majesty and beauty to the character of victorious and vindictive omnipotence, must have been contented with the character of a good Christian; he never could have been a great epic poet. It is difficult to determine, in a country where the most enormous sanctions of opinion and law are attached to a direct avowal of certain speculative notions, whether Milton was a Christian or not, at the period of the composition of Paradise Lost. Is it possible that Socrates seriously believed that Æsculapius would be propitiated by the offering of a cock? Thus much is certain, that Milton gives the Devil all imaginable advantage; and the arguments with which he exposes the injustice and impotent weakness of his adversary, are such as, had they been printed, distinct from the shelter of any dramatic order, would have been answered by the most conclusive of syllogisms—persecution. As it is, Paradise Lost has conferred on the modern mythology a systematic form; and when the immeasurable and unceasing mutability of time shall have added one more superstition to those which have already arisen and decayed upon the earth, commentators and critics will be learnedly employed in elucidating the religion of ancestral Europe, ​only not utterly forgotten because it will have participated in the eternity of genius.[2] The Devil owes everything to Milton. Dante and Tasso present us with a very gross idea of him. Milton divested him of a sting, hoof, and horns, and clothed him with the sublime grandeur of a graceful but tremendous spirit. I am afraid there is much laxity among the orthodox of the present day, respecting a belief in the Devil. I recommend to the Bishops to make a serious charge to their diocesans on this dangerous latitude. The Devil is the outwork of the Christian faith; he is the weakest point. You may observe that infidels, in their novitiate, always begin by tremulously doubting the existence of the Devil. Depend upon it, that when a person once begins to think that perhaps there is no Devil, he is in a dangerous way. There may be observed, in polite society, a great deal of coquetting about the Devil, especially among divines, which is singularly ominous. They qualify him as the evil spirit; they consider him as synonymous with the flesh. They seem to wish to divest him of all personality; to reduce him from his abstract to his concrete; to reverse the process by which he was created in the mind, which they will by no means bear with respect to God. It is popular, and well looked upon, if you deny the Devil "a local habitation and a name." Even the vulgar begin to scout him. Hell is popularly considered as metaphorical of the torments of an eval conscience, and by no means ​capable of being topographically ascertained.[3] No one likes to mention the torments of everlasting fire and the poisonous gnawing of the worm that liveth for ever and ever. It is all explained away into the regrets and the reproaches of an evil conscience, and, in this respect, I think that the most presumptuous among us may safely say— "One touch of nature makes the whole world kin." On the other hand. Heaven is supposed to have some settled locality, and the joys of the elect are to be something very positive. This way of talking about a personage whose office in the mythological scheme is so important, must lead to disbelief. It is, in fact, a proof of approaching extinction in any religion, when its teachers and its adherents, instead of proudly and dogmatically insisting upon the most knotty or unintelligible articles of their creed, begin to palliate and explain away the doctrines in which their more believing ancestors had shewn a reverential acquiescence, and an audacious exultation of confidence. It is less the opinion of the person himself than that of those by whom he is surrounded, which gives that air of confidence by which the most absurd tenets have been transmitted from generation to generation. A man may, in truth, never have considered whether there is or is not a Devil; he may be totally indifferent to the question; yet it may occur to him to state his positive opinion on one side or the other. The air of confidence with which he does this, is manifestly determined by the disposition with which he ​expects his opinion to be received. One illustration of this view of the subject is afforded by a circumstance in the life of Dr. Johnson, the last man of considerable talents who shewed any serious attachment to the ancient faith, and whose life and death, as compared with that of his contemporary, Hume, affords a just standard of the consolations of the Christian or the Infidel systems. A gentleman inquired of Johnson what he meant by being damned? "Sent to Hell and punished everlastingly," he replied. The Devil is Διάβολος, the Accuser. In this character he presented himself among the character he presented himself among the other Sons of God before his Father's throne, to request to be allowed to tempt Job by tormenting him. God, it seems, had some special reason for patronizing Job, and one does not well see why he spared him at last. The expostulations of Job with God are of the most daring character ; it is certain he would not bear them from a Christian. If God were a refined critic, which from his inspiration of Ezechiel would never have been suspected, one might imagine that the profuse and sublime strain of poetry not to be surpassed by anything ancient, much less modern, had found favour with him. But to return to the Devil, the Accuser. In this view he is at once the Informer, the Attorney General, and the jailor of the Celestial tribunal. It is not good policy, or, at least, cannot be considered as constitutional practice, to unite these characters. The Devil must have a great interest to exert himself to procure a sentence of guilty from the judge ; for I suppose there will be no jury at the resurrection—at least if there is, it will be so overawed by the bench, and the counsel for the crown, as to ensure ​whatever verdict the court shall please to recommend. No doubt that, as an incentive to his exertions, half goes to the informer. (What an army of spies and delators all Hell must afford, under the direction of that active magistrate, the Devil!) If the Devil takes but half the pleasure in tormenting a sinner which God does, who took the trouble to create him, and then to invent a system of casuistry by which he might excuse himself for devoting him to eternal torment, this reward must be considerable. Conceive how the enjoyment of one half of the advantages to be derived from their ruin, whether in person or property, must irritate the activity of a delator. Tiberius, or Bonaparte, or Lord Castlereagh, never affixed any reward to the disclosure or the creation of conspiracies, equal to that which God's Govermnent has attached to the exertions of the Devil, to tempt, betray, and accuse unfortunate man. These two considerable personages are supposed to have entered into a kind of partnership, in which the weaker has consented to bear all the odium of their common actions, and to allow the stronger to talk of himself as a very honourable person, on condition of having participation in what is the especial delight of both of them, burning men to all eternity. The dirty work is done by the Devil, in the same manner as some starving wretch will hire himself out to a king or minister, with a stipulation that he shall have some portion of the public spoil, as an instrument to betray a certain number of other starving wretches into circumstances of capital punishment, when they may think it convenient to edify the rest, by hanging up a few of those whose murmurs are too loud.[4] ​It is far from inexplicable that earthly tyrants should employ these kind of agents, or that God should have done so with regard to the Devil and his Angels; or that any depositary of power should take these measures, with respect to those, by whom he fears lest that power should be wrested from him. But to tempt mankind to incur everlasting damnation, must, on the part of God, and even on the part of the Devil, arise from that disinterested love of tormenting and annoying, which is seldom observed on earth. The thing that comes nearest to it is a troop of idle dirty boys baiting a cat; cooks skinning eels, and boiling lobsters alive, and bleeding calves, and whipping pigs to death; naturalists anatomizing dogs alive, (a dog has as good a right and a better excuse for anatomizing a naturalist,) are nothing compared to God and the Devil judging, damning, and then tormenting the soul of a miserable sinner. It is pretended that God dislikes it, but this is mere shamefacedness and coquetting, for he has everything his own way and he need not damn unless he likes. The Devil has a better excuse, for, as he was entirely made by God, he can have no tendency or disposition, the seeds of which were not originally planted by his Creator; and as everything else was made by God, those seeds can have only developed themselves in the precise degree and manner determined by the impulses arising from the agency of the rest of his creation. It would be as unfair to complain of the Devil for acting ill, as of a watch for going badly; the defects are to be imputed as much to God in the former case, as to the watchmaker in the latter. There is also another view of the subject, suggested by mythological writers, which strongly ​recommends the Devil to our sympathy and compassion, though it is less consistent with the theory of God's omnipotence than that already stated. The Devil, it is stated, before his fall, was an Angel of the highest rank and the most splendid accomplishments, who placed his peculiar delight in doing good. But the inflexible grandeur of his spirit, mailed and nourished by the consciousness the purest and loftiest designs, was so secure from the assault of any gross or common torments, that God was considerably puzzled to invent what he considered an adequate punishment for his rebellion; he exhausted all the variety of smothering and burning and freezing and cruelly-lacerating his external frame, and the Devil laughed at the impotent revenge of his conqueror. At last the benevolent and amiable disposition which distinguished his adversary, furnished God with the true method of executing an enduring and terrible vengeance. He turned his good into evil, and, by virtue of his omnipotence, inspired him with such an impulse, as, in spite of his better nature, irresistibly determined him to act what he most abhorred, and to be a minister of those designs and schemes of which he was the chief and the original victim. He is for ever tortured with compassion and affection for those whom he betrays and ruins; he is racked by a vain abhorrence for the desolation of which he is the instrument; he is like a man compelled by a tyrant to set fire to his own possessions, and to appear as the witness against, and the accuser of his dearest friends and most intimate connexions; and then to be the executioner, and to inflict protracted torments upon them. As a man, were he deprived of all other refuge, he might hold his breath and die—but God ​is represented as omnipotent and the Devil as eternal. Milton has expressed this view of the subject with the sublimest pathos. It is commonly said that the Devil has only precisely so much power as is allowed him by God's providence. Christians exhort each other to despise his attacks, and to trust in God. If this trust has ever been deceived, they seem in a poor way, especially when it is considered that God has arranged it so that the Devil should have no inconsiderable portion of the souls of men. A pious friend of mine tells me that she thinks that about nineteen in twenty will be damned. Formerly it was supposed that all those who were not Christians, and even all those who were not of a particular sect of Christians, would be damned. At present this doctrine seems abandoned or confined to a few. One does not well see who is to be damned, and who not according to the fashionable creed. The sphere of the operations of the Devil is difficult to determine. The late inventions and improvements in telescopes have considerably enlarged the notions of men respecting the bounds of the universe. It is discovered that the Earth is comparatively a small globe, in a system consisting of a multitude of others, which roll round the sun; and there is no reason to suppose but that all these are inhabited by organized and intelligent beings. The fixed stars are supposed to be suns, each of them the centre of a system like ours. Those little whitish specks of light that are seen in a clear night, are discovered to consist of a prodigious multitude of suns, each probably the centre of a system of planets. The system of which our earth is a planet has been discovered to belong to ​one of those larger systems of suns, which, when seen at a distance, look like a whitish speck of light; and that lustrous streak called the milky way is found to he one of the extremities of the immense group of suns in which our system is placed. The heaven is covered with an incalculable number of these white specks, and the better the telescopes the more are discovered, and the more distinctly the confusion of white light is resolved into stars. All this was not known during the gradual invention of the Christian mythology, and was never even suspected by those barbarians, in the obscure extremities of the Roman Empire, by whom it was first adopted. If these incalculable millions of suns, planets, satellites, and comets are inhabited, is it to be supposed that God formed their inhabitants better, or less liable to offend him than those primordial spirits, those angels near his throne, those first and most admirable of his creatures, who rebelled and were damned? Or has he improved like a proficient in statuary or painting, proceeding from rude outlines and imperfect forms, to more perfect idealisms or imitations, so that his latter works are better than his first? Or has some fortunate chance, like that which, when the painter despaired of being able to depict the foam of a horse, directed the spunge so as to represent it accurately, interfered to confer stability and exactness upon one, or how many, among the numerous systems of animated nature? There is little reason to suppose that any considerable multitude of the planets were tenanted by beings better capable of resisting the temptations of the Devil than ours. But is the Devil, like God, omnipresent? If so he interpenetrates God, and they both exist co-essentially; as metaphysicians have compared the omnipresence of God, pervading the infinity of space ​and being, to salt mixed with water. If not he must send some inferior Angels, either to this or some other planet, first to tempt the Inhabitants to disobey God, and secondly to induce them to reject all terms of salvation; for which latter purpose, it seems equally requisite that he should take up his residence on the spot; nor do I see, how he or God, by whose providence he is permitted, that is to say, compelled to act, could commit a business of such high moment to an inferior Angel. It seems very questionable whether the Devil himself, or only some inferior Devil, tempted and betrayed the people of the Earth; or whether Jupiter, a planet capable of containing a hundred times more inhabitants than the earth,—to mention only the planets of our own system,—or the Sun, which would contain a million times more, were not entitled to the preference. Any objection that might arise from the multitude of Devils, I think futile. You may suppose a million times as many devils as there are stars. In fact you may suppose anything you like on such a subject. That there are a great number of Devils, and that they go about in legions of six or seven, or more at a time, all mythologists are agreed. Christians, indeed, will not admit the actual substance and presence of the Devils upon Earth in modern times. Or, in proportion as any histories of them approach to the present epoch, or indeed any epoch in which there has been a considerable progress in historical criticism or natural science, they suppose their agency to be obscure and superstitious. There were a number of Devils in Judea in the time of Jesus Christ, and a great reputation was gained both by him and others, by what was called casting them out. A droll story is told us ​among others of Jesus Christ having driven a legion of Devils into a herd of pigs, who were so discomfited with these new invaders that they all threw themselves over a precipice into the lake, and were drowned. These were a set of hypochondriacal and high-minded swine, very unlike any others of which we have authentic record; they disdained to live, if they must live in so intimate a society with Devils, as that which was imposed on them, and the pig-drivers were no doubt confounded by so heroical a resolution. What became of the Devils after the death of the pigs, whether they passed into the fish, and thence by digestion, through the stomach, into the brain of the Gadarene Icthyophagists; whether they returned to Hell, or remained on the Earth, the historian has left as subject for everlasting conjecture. I should be curious to know whether any half starved Jew picked up these pigs, and sold them at the market of Gadara, and what effect the bacon of a demoniac pig, who had killed himself, produced upon the consumers. The Devils requested Jesus Christ to send them into the pigs, and the Son of God shewed himself more inclined to do what was agreeable to the Devils than what was profitable to the owners of the pigs. He had, no doubt, say the Christians, some good reasons. Poor fellows! They were probably ruined by this operation. The Gadarenes evidently disapproved of this method of casting out Devils—they thought probably that Jesus shewed an unjust preference to these disagreeable beings; and they sent a deputation to request him to depart out of their country. I doubt whether the yeomen of the present day would have treated him with so much lenity. Among the numerous theories concerning the condition ​of Devils, some have resorted to the Pythagorean hypothesis, but in such a manner as to pervert that hypothesis, from motives of humanity, into an example for cruel tyranny. They suppose that the bodies of animals, and especially domestic animals, are animated by Devils, and that the tyranny exercised over these unfortunate beings by man is an unconscious piece of retaliation over the beings who betrayed them into a state of reprobation. On this theory Lord Erskine's Act[5] might have been entitled "An Act for the better protection of Devils." How devils inhabit the bodies of men is not explained. It cannot be that they animate them like what is called the soul or vital principle because that is supposed to be already preoccupied. Some have supposed that they exist in the human body in the shape of teniæ and hydatids, but I know not whether those persons subject to vermicular and animalcular diseases, are the most likely to be subject to the incursions of Devils from any reason a priori, although they may safely be said to be tormented of Devils. The pedicular diseases on this view of the subject may be the result of diabolical influence, the sensorium of every separate louse being the habitation of a distinct imp. Some have supposed that the Devils live in the Sun, and that that glorious ​luminary is the actual Hell; perhaps that every fixed star is a distinct Hell appropriated to the use of its several systems of planets, so great a proportion of the inhabitants of which are probably devoted to everlasting damnation, if the belief of one particular creed is essential to their escape, and the testimony of its truth so very far remote and obscure as in the planet which we inhabit. I do not envy the theologians, who first invented this theory. The Magian worship of the Sun as the creator and Preserver of the world, is considerably more to the credit of the inventors. It is in fact a poetical exposition of the matter of fact, before modern science had so greatly enlarged the boundaries of the sensible world, and was, next to pure deism or a personification of all the powers whose agency we know or can conjecture, the religion attended by the fewest evil consequences. If the sun is Hell the Devil has a magnificent abode, being elevated as it were on the imperial throne of the visible world. If we assign to the Devil the greatest and most glorious habitation within the scope of our senses, where shall we conceive his mightier adversary to reside? Shall we suppose that the Devil occupies the centre and God the circumference of existence, and that one urges inwards with the centripetal, whilst the other is perpetually struggling outwards from the narrow focus with the centrifugal force, and that from their perpetual conflict results the mixture of good and evil, harmony and discord, beauty and deformity, production and decay, which are the general laws of the moral and material world? Alas! the poor theologian never troubled his fancy with nonsense of so philosophical a form. He ​contented himself with supposing that God was somewhere or other; that the Devil and all his angels together with the perpetually increasing multitude of the damned were burning above to all eternity in that prodigious orb of elemental light, which sustains and animates that multitude of inhabited globes, in whose company this earth revolves. Others have supposed Hell to be distributed among the comets, which constitute, according to this scheme, a number of floating prisons of intense and inextinguishable fire; a great modern poet has adopted this idea when he calls a comet "A wandering hell in the eternal space." Misery and injustice contrive to produce very poetical effects, because the excellence of poetry consists in its awakening the sympathy of men, which, among persons influenced by an abject and gloomy superstition, is much more easily done by images of horror than of beauty. It often requires a higher degree of skill in a poet to make beauty, virtue, and harmony poetical, that is, to give them an idealized and rhythmical analogy with the predominating emotions of his readers,—than to make injustice, deformity and discord poetical. There are fewer Raphaels than Michael Angelos; better verses have been written on Hell than Paradise. How few read the Purgatorio or the Paradiso of Dante, in the comparison of those who know the Inferno well. And yet the Purgatorio, with the exception of two famous passages, is a finer poem than the Inferno. No poet can develope the same power in that part of his composition where he feels himself in- secure of the emotions of his readers, as in those where he knows that he can command their sympathy. ​As to the Devil, and the imps, and the damned living in the Sun, why there is no great probability of it. The Comets are better fitted for this; except that some astronomer has suggested the possibility of their orbits gradually becoming ecliptical, until at last they might arrange themselves in orbits concentric with the planets, lose their heat and their substance, become subject to the same laws of animal and vegetable life as those according to which the substance of the surface of the others is arranged. The Devils and the damned, without some miraculous interposition would then be the inhabitants of a very agreeable world; and as they probably would have become very good friends from a community of misfortune and the experience which time gives those who live long enough of the folly of quarrelling—would probably administer the affairs of their Colony with great harmony and success. But there is an objection to this whole theory of solar and planetary Hells; which is, that there is no proof that the Sun and the Comets are themselves burning. It is the same with fire as with wit. A man may not be witty himself as Falstaff was, though like him he may be the cause of wit in others. So the Sun, though the cause of fire, may only develope a limited proportion of that principle on its own surface. Herschel's discoveries incline to a presumption that this is actually the case. He has discovered that the cause of light and heat is not the burning body of the Sun itself; but a shell as it were of phosphoric vapours, suspended many thousand miles in the atmosphere of that body. These vapours surround the sphere of the Sun at a distance, which has not been accurately computed, but which is assuredly very great, encircling and canopying it with a vault of ætherial ​splendour whose internal surface may perform the same office to the processes of vital and material action on the body of the sun, as its external one does upon those of the planets. A certain degree of plausibility is conferred on this notion by the observation that the interior surface, as far as can be collected from a view of the sides of the chasm, is of an obscurer colour than the external one: what are called spots in the sun, being no more than immense rents produced probably by streams of wind in the incumbent mass of vapours, which disclose the opaque body of the sun itself. All this diminishes the probability of the sun being a Hell, by shewing that there is no reason for supposing it considerably hotter than the planets. Not to mention that the Devils may be like the animalculæ in mutton broth, whom you may boil, as much as you please, but they will always continue alive and vigorous. The idea of the sun being Hell, is an attempt at an improvement on the old-established idea of its occupying the centre of the earth. The Devils and the damned would be exceedingly crowded in process of ages, if they were confined within so inconsiderable a sphere. The Devil and his Angels are called the Powers of the Air, and the Devil himself Lucifer. I cannot discover why he is called Lucifer, except from a misinterpreted passage in Isaiah, where that poet exults over the fall of an Assyrian king, the oppressor of his country:—"How art thou fallen, Lucifer, king of Morning!"—The Devil after having gradually assumed the horns, hoof, tail, and ears of the ancient Gods of the woods, lost them again, although wings had been added. It is ​inexplicable why men assigned him these additions as circumstances of terror and deformity. The Sylvans and Fauns, with their leader the great Pan, were most poetical personages, and were connected in the imagination of the Pagans with all that could enliven and delight. They were supposed to be innocent beings in habits, and not greatly different from the shepherds and herdsmen of whom they were the patron saints. But the Christians contrived to turn the wrecks of the Greek mythology, as well as the little they understood of their philosophy, to purposes of deformity and falsehood. I suppose the sting with which he was armed gave him a dragon-like and viperous appearance, very formidable. I can sufficiently understand why the author of evil should have been typified under the image of a serpent; that animal producing merely by its sight so strong an associated recollection of the malignity of many of its species. But this was eminently a practice confined to the Jews, whose earliest mythology suggested this animal as the cause of all evil. Among the Greeks the Serpent was considered as an auspicious and favourable being. He attended on Æsculapius and Apollo. In Egypt the Serpent was an hieroglyphic of eternity. The Jewish account is, that the Serpent, that is the animal, persuaded the original pair of human beings to eat of a fruit, from which God had commanded them to abstain, and then in consequence God expelled them from the pleasant garden, where he had before permitted them to reside, God on this occasion, it is said, assigned a punishment to the Serpent, that its motion should be as it now is along the ground upon its belly. We are given to suppose, that before this misconduct it hopped along ​upon its tail; a mode of progression which, if I was a Serpent, I should think the severer punishment of the two.[6] The Christians have turned this Serpent into their Devil, and accommodated the whole story to their new scheme of sin and propitiation. [1] For Milton's purpose there is quite sufficient authority in the second Psalm and the twelfth chapter of the Revelation. The Revelation, though purporting to relate to the future, of course draws upon tradition and antecedent literature for its imagery. [2] Compare this and the preceding paragraph with that passage in The Defence of Poetry which begins with the words The poetry of Dante (Vol. III, p. 126); and note how admirably Shelley was able to adapt his profound criticism alike to the purposes of satire and those of a higher strain. [3] Cf. Marlowe's Faustus, Act II, Sc. 1: "Hell hath no limits, nor is circumscribed In one self place; but where we are is Hell, And where Hell is, there must we ever be: And to be short, when all the world dissolves, And every creature shall be purified, All places shall be Hell that are not Heaven." [4] Cf. Paragraph IX of the Address to the People on the Death of the Princess Charlotte (Vol. II, pp. 110 and 111), in which Shelley puts this point with desperate earnestness. [5] More strictly speaking Lord Erskine's Bill; for Shelley did not live to see an Act passed on this subject. Lord Campbell tells us in his Lives of the Lord Chancellors that Erskine "almost entirely confined himself for some years to a subject which he made peculiarly his own, and with which his name will ever continue to be associated." On the 15th of May 1809, he made a memorable speech, in moving the second reading of his Bill "For the Prevention of Cruelty to Animals," which, however, was thrown out by the Commons after passing the Lords. Erskine reintroduced it with amendments in 1810, but withdrew it after it had passed the Committee of the Commons. It was not until the 22nd of July 1822, a fortnight after Shelley's death, but while Erskine was still alive, that the measure, having been brought forward by Mr. Martin, M.P. for Galway, became law, and set the example which has since been so largely followed by legislators throughout the civilized world.
Pest Advice - House Mice What are they? house mouse House mice can live and breed in houses, buildings and other structures such as garden sheds, which give them protection from the cold and wet weather and which provides them with the three essentials for survival - food, water and shelter. Although an abundant supply of food is preferable, house mice can survive on relatively poor diets, eating between 3 to 4 grams of food a day and can survive without access to free water, obtaining their daily needs from their food. The ideal environments for house mice are buildings with dead spaces and harbourages free from disturbance and close to food and water. They are extremely good climbers, climbing walls, pipes, cavities and ductings. They have very hard incisor teeth which can penetrate materials such as concrete, lead and aluminium. This can result in expensive damage and even fires when electric cables are damaged. House mice like to know the area where they live and will familiarise themselves with their home surroundings; in most cases activity will be restricted to a radius of up to 10 m. They use the same familiar pathways. This produces smear marks by the continual rubbing of their fur against surfaces. In urban areas, house mice are able to breed throughout the year, producing between 5 and 10 litters each of about 4-8 young. They can live for more than two years, though the average life span is about 10 months. House mice are inquisitive animals with sporadic and unpredictable feeding habits and will feed from numerous different sites each night rather than one or two sites close to their nest. They will feed on almost anything, but generally prefer cereal based foods such as grass and canary seed. In some urban areas they have become unable to digest cereal based food, preferring high protein foods instead. These house mice have been termed 'behaviourally resistant' because their avoidance of normal foods seems to be genetically based. How to prevent an infestation • Don't leave open food out in the kitchen overnight • Don't leave uneaten meals intended for a pet cat or a dog in dishes out overnight • Remove all food and waste spillages as they occur  • Empty food waste bins in the kitchen etc frequently  • Store food in rodent proof containers • Ensure that refuse is not allowed to accumulate in the yard or garden • Seal structural defects in the house to prevent mice gaining access to your home (mice can squeeze through gaps in excess of 5mm). If signs of infestation are noticed, for example, fresh mouse droppings, gnaw or smear marks, take immediate action to control the infestation. How can I treat them? Mouse poisons* can be bought from most supermarkets, hardware stores and garden centres. Baits should be placed in several locations and checked every 4 to 5 days and replenished accordingly until no further poison is taken and mice are no longer active. Traps are also readily available and should be positioned in several locations around the infested site. Make sure traps and poisons are located away from children, pets and other wildlife. *Always refer to the product instructions BEFORE use and follow these at ALL times. Last Updated on Thursday, December 5, 2019
Andrew J. Cutler, MD: Screening Techniques for ADHD November 5, 2020 Kenny Walter Attempts to use neuroimaging to screen for ADHD in the past have failed. Screening for attention deficit/hyperactivity disorder (ADHD) has not changed much over the years. Often the screening practices include a self-screening questionnaire to help the patient recognize the signs and symptoms of ADHD. For adolescent ADHD patients, the screening process can also include interviews from teachers, family members, and other people. While there are tools to help the psychiatry screen patients for the disorder, a high degree of suspicion remains the most important aspect of screening for ADHD. Doctors will look to find out not only about the individual symptoms each patient must have, but also how these symptoms might impact their lives. For example, ADHD is known to have an impact on an individual’s school or work function, so to be diagnosed and treated for ADHD most patients can readily have an example of how those functions have been impacted. In an interview with HCPLive®, Andrew, J. Cutler, MD, Clinical Professor of Psychiatry at SUNY Upstate Medical University, explained why screening practices are effective and why there is some hope for new techniques and technologies to make an impact in the future. Cutler said right now there is no biomarkers or clinically relevant sensitivity testing useful and accurate enough to be used on the widescale for ADHD.
Page 1 of 1 Tips to Improve English Grammar Posted: Thu Nov 08, 2018 2:57 pm by RobertsDale Learning any new language is a challenging task. The first step towards learning any new is to understand its grammar rules and apply it in your spoken and written language. Learning grammar is never easy and it takes time and effort to have a good grasp over it. Most native speakers make grammatical errors while speaking and writing and find it difficult to improve. But once you have a hold over the grammar than you will always speak and write correctly. You will not have any problem in forming sentences and this is the ultimate goal of any language learner. Correct grammar ensures that you are communicating effectively and clearly. Following are the few tips which will help you improve your grammar: Practice exercises There are plenty of grammar exercises available online. You can practice them for free. There is also lot of grammar material available which explains key components of grammar like nouns, verbs, adjectives, adverbs, use of proper tenses etc. Taking up grammar exercises and quizzes on daily basis will help you improve your grammar to a great extent. Note down the mistakes that you make and improve upon it by taking more exercises in that particular concept. Work on it for a few days. Speak and write in English Once you start speaking and writing in English the results of your efforts will show. Practicing grammar is not limited to exercises and quizzes but actually applying it in your daily lives. Pay attention to grammar when you're reading or listening When you're reading a book or a newspaper try to pay attention to the sentence structure and understand why a particular sentence is written in a particular way. Try to make sentence of the similar type. If you're not able to make then do go through the grammar concepts and understand the rules. Identify your mistakes This is a very important exercise. Keep notes of grammar concepts that you think are difficult for you to grasp. While practicing English grammar exercises take a note of the mistakes that you're making. Write down the sentences where you're making mistakes. Do go through the notes quite often. Read a lot Reading improves your vocabulary as well as English to a great extent. If you find certain sentence structure difficult, then try speaking it aloud and repeat it as many times as possible until you get it right. Listen and read aloud Listening is important in improving your grammar because your ears are tuned to listen to sentences that are spoken in a particular manner. In this view, it is good to even read aloud sentences from a book so that you are tuned to listen to correct grammar which in turn will make you speak error-free English. Re: Tips to Improve English Grammar Posted: Wed Nov 14, 2018 9:11 pm by jonathanrace I agree especially with "read a lot". Input, input and more input! you will see how these things actually work rather than learning them in some abstract manner. :) Re: Tips to Improve English Grammar Posted: Wed Jan 23, 2019 3:48 pm by AshTBX How do I post a forum plz help Re: Tips to Improve English Grammar Posted: Mon Mar 16, 2020 12:50 pm by Mathewdexter Your post is helpful for the people who have a little bit idea about English grammar and wants to improve. One of the most important parts to me in your post is 'identify your mistakes'. When a man can identify his mistakes, he can skip those errors. I just love your concept to read newspapers. Finally, I want to say that one needs a good ... mmar-books book at first and then he will be able to apply all the statistics. Re: Tips to Improve English Grammar Posted: Mon Mar 23, 2020 12:59 pm by VeronicaReid From my own experience: Get surrounded by English everywhere The more you hear it and speak it - the more it becomes a part of your daily life Re: Tips to Improve English Grammar Posted: Mon Jun 14, 2021 2:42 pm by hestro Reading, as everyone suggests, is incredibly important. Read well-edited and varied content: novels, of course, but magazines like The New Yorker or National Geographic are great as well, and pick up a few newspapers now and then. You'll get a feel for how punctuation and grammar works in different contexts as you go. Aside from that, hare are some tips that might be helpful - because in the end, you won't get that far if you just stick to reading the same way you always have. - Actually brush up on technical guidelines. Read up on grammar guides and things like synonyms and sentence structure. Print a few interesting ones out to keep in your workplace. There are often a few specific things in multiple languages that trip people up (in Dutch, it's usually the DT-rule, Dutch-speakers will know what I mean - in English, things like "him and I/him and me" or the common "less/fewer" can slip by even experienced writers out of habit). As you read or write, try to get into the habit of actively noticing structures that don't come as easy, and look them up. You'll have to do that less and less as you go. - Think about creative ways to use common errors and how they might change the meaning and general style of a sentence. A character that says "me and him went out last night" will make a different impression on a reader than one that speaks Oxford English consistently. A "less" where there should be "fewer" will change the rhythm and tone of a line of poetry (and that goes double for punctuation).
Developer's Guide to Angular Security Angular is a great platform for building responsive, universal Single Page Applications. All the stable releases of Angular are production ready and deployed by a large number of enterprises and users everywhere. Here, we’ll shift our focus towards the security aspects of Angular. Web development isn’t about writing code that works, it’s also about writing code that’s foolproof and not prone to vulnerabilities. A number of common vulnerabilities for different web applications are regularly brought to light. Vulnerabilities can seep in through obsolete dependencies, bad coding practices, or irregularities in patching updates. In this article, we’ll discuss vulnerabilities that can occur with Angular application(s) and the best ways to circumvent these vulnerabilities. Regular Angular Updates & Vulnerable Dependencies The Angular team is publishing releases at frequent intervals for different feature developments, bug and vulnerability fixes, security patches, etc. Software development teams are strongly suggested to keep their Angular libraries updated constantly to stay in sync with the latest available developments. If not, malicious users may be able to attack the application that is using known security vulnerabilities associated with older versions of the software. With the sheer number of third-party library components available today, it can be a difficult task to develop applications without the use of these libraries. Libraries sometimes can have publicized vulnerabilities that can be maliciously used by attackers to input harmful data or code into applications. Some of the well-known vulnerabilities include CSRF, buffer overflows, XSS, etc. To verify that your dependencies and components are free some of the common loopholes and exploits, you can use open source vulnerability management tools. Here is a list of things that you can do to ensure that your code is secure. 1. Always download libraries from a repository like npm or GitHub 2. Use updated versions of libraries and avoid obsolete packages 3. Monitor for vulnerabilities by running an npm audit or use a code analysis tool 4. Regularly visit security resources like NVD (National Vulnerability Database) and CVE (Common Vulnerabilities and Exposures) Preventing Cross-Site Scripting (XSS) XSS allows malicious users to input client-side scripts into web pages that are accessed by regular users. This code can inflict considerable damage. For example, it’s possible to steal user data or undertake actions that impersonate the user with the intention to cause harm. You can read more about XSS on the OWASP website. Angular Sanitization and Security Contexts In order to systematically and effectively block XSS bugs, Angular assumes each value as an untrusted value by default. Therefore, when a value is entered into the DOM using a template via a property, style, attribute, interpolation or class binding, Angular automatically sanitizes the value and disallows untrusted values. Here is a sample declaration in the BrowserModule: export const BROWSER_SANITIZATION_PROVIDERS: Array<any> = [ {provide: Sanitizer, useExisting: DomSanitizer}, {provide: DomSanitizer, useClass: DomSanitizerImpl}, providers: [ exports: [CommonModule, ApplicationModule] export class BrowserModule {} The idea behind the DomSanitizer is to sanitize the input and to clean up user-submitted data. Here is an example of the of what the skeleton of the class might look like: export enum SecurityContext { NONE, HTML, STYLE, SCRIPT, URL, RESOURCE_URL } export abstract class DomSanitizer implements Sanitizer { abstract sanitize(context: SecurityContext, value: SafeValue|string|null): string|null; abstract bypassSecurityTrustHtml(value: string): SafeHtml; abstract bypassSecurityTrustStyle(value: string): SafeStyle; abstract bypassSecurityTrustScript(value: string): SafeScript; abstract bypassSecurityTrustUrl(value: string): SafeUrl; abstract bypassSecurityTrustResourceUrl(value: string): SafeResourceUrl; As you would have noticed, there are two distinct patterns. There first is the sanitize method. This identifies the ‘context’ as well as the ‘untrusted value’ and returns a trusted value. The second method uses the ‘bypassSecurityTrustX’ method which captures the ‘untrusted value.’ This is based on value usage and returns the trusted object. The Sanitize() Method In the event that a value is trusted for a particular context, the sanitize method will expose the safe value within it and utilize it directly. If not, the value will eventually be sanitized to be rendered safe based on the security context. Three main functions exist for sanitizing values: 1. The sanitizeHTML function that sanitizes untrusted HTML values by parsing them and verifying its tokens. 2. The sanitizeStlye function that sanitizes untrusted styles or URL values using regular expressions. 3. The sanitizeURL function that sanitizes untrusted URL values using regular expressions. How to Disable Sanitization In certain situations where it might be required to disable sanitization, users are able to work around security using a constructed value via one of bypassSecurityTrustX methods. They can bind this to the value from the relevant template. Here is an example: import {BrowserModule, DomSanitizer} from '@angular/platform-browser' selector: 'my-app', template: ` <div [innerHtml]="html"></div> export class App { constructor(private sanitizer: DomSanitizer) { this.html = sanitizer.bypassSecurityTrustHtml('<h1>DomSanitizer</h1><script>ourSuperSafeCode()</script>') ; Authentication in Angular using JSON Web Tokens If you’re going to implement authentication in Angular, the best bet is to use a JWT-based authentication system. As a matter of fact, using JSON Web Tokens is the best choice if you’re implementing an authentication system in any Single Page Application (SPA). In a nutshell, JWTs are digitally signed JSON payloads, encoded in a URL-friendly string format. The payload contained in a token defines a user session. This could mean that it contains details unique to the user like userId or emailId. In order to confirm that the token is valid, the server needs to validate the token. What this means is, the server doesn’t have to contact the database to validate the token. The token gets invalidated when it expires, and the expiry time is defined when you create the token. The Angular Authentication Process Outline 1. When the user creates an account, the authentication server creates a new token and returns it to back to the client-side application. 2. The token payload assigns something unique to the user (like a userId) and additional details that include the expiry time. 3. The frontend stores this token somewhere - preferably in a cookie and appends the token into the header for all the requests it make. 4. The server validates the token and if the token is valid, the user is able to access the requested resource. 5. When the token expires, the server decodes and checks whether the payload matches the data in the database. If yes, a new token is generated. For more information specific to Angular, reference this article on Content Security Policy CSP or Content Security Policy is an additional security layer that assists in detecting and inhibiting specific types of attacks including XSS and data injection. Such attacks have a goal of data theft to the distribution of malware to website defacement. To enable CSP, you would need to configure your web server to return the correct Content-Security-Policy HTTP header. You can find detailed steps to enable CSP on the MDN website. Using the Offline Template Compiler or the AOT Compiler Angular templates are theoretically executable and therefore the HTML tags, binding expressions, and attributes in templates are trusted to be safe. An attacker may be able to perform something malicious if they’re able to parse an unintended value into the template. To prevent such breaches, users can utilize offline template compilers. This process is also known as template injection. In case you use Angular CLI, you can easily enable AOT: ng build --aot ng serve -aot Avoid Direct Use of the DOM APIs Unfortunately, the built-in browser DOM APIs do not automatically secure the application from security vulnerabilities. As an example, ‘document’ - the node that is available through ‘ElementRef’ might contain unsafe methods. Users should avoid interacting with the DOM through direct means and use Angular templates wherever available. XSS Protection on Server-Side The data validation on the client-side is usually for cosmetic purposes. Someone can try to make direct API calls to the backend with the intention of breaking something. All data on the server-side code needs to be validated and should escape appropriately to inhibit server XSS vulnerabilities. This is largely because injecting template code in an Angular application is similar to injecting executable code directly into the application. It is recommended that Angular templates on the server-side not be generated using a template language. HTTP-Level Vulnerabilities Angular comes with built-in support that can help prevent a couple of common HTTP vulnerabilities – Cross-Site Script Inclusion (XSSI) and Cross-Site Request Forgery (CSRF or XSRF). Both of these vulnerabilities have to be inhibited mainly on the server side. However, Angular also assists helpers to make integration on the client side simpler. Cross-Site Script Inclusion (XSSI) XSSI, also known as a JSON vulnerability, enables an attacker’s website to access data using a JSON API. Such attacks work on older browsers by including an API URL via a <script> tag after overriding native JavaScript object constructors. Servers can fend off such attacks by using a prefix on all JSON responses and render them non-executable using the string ")]}',\n". The AngularHttpClient library is able to read and strip the string ")]}',\n" from each response prior to parsing further. Cross-Site Request Forgery (XSRF) XSRF, also known as ‘one-click attack’ or ‘session riding’, is a website violation where unauthorized commands are sent from a web application that is trusted by a user. In usual anti-XSRF methods, application servers transmit a random authentication token via a cookie. The receiving code reads the cookie and includes a custom request header in the token for each following request. The server then makes a comparison between the received cookie value and the request header value and rejects the request in case the values are missing or are a mismatch. The reason this method is effective is because all browsers use the same origin policy. Only the code from the originating website can read the cookies from the site and include custom headers on request. Therefore, only a trusted user application can read the cookie and add a customized header. Angular Security Summary We’ve covered all the security details that you need to be aware of while building components in Angular. It’s important to take security seriously (it shouldn’t be just limited to front-end). What are your thoughts on Angular security? Let us know in the comments. Empower your development. Build better applications. Try GrapeCity's Tools for JavaScript and .NET Download Now!
Feb. 15, 2017 Previous Next Lab-Corps experience inspires application of carbon capture technology to untapped industry Sometimes a scientific breakthrough can end up in the most unexpected places. Just ask Congwang Ye, a Lawrence Livermore National Laboratory (LLNL) engineer whose work with carbon capture microcapsule technology, intended for filtering CO2 from power plants, could end up solving a big problem for craft beer makers. In December, Ye participated in the Department of Energy’s Lab-Corps Pilot Program, an intensive eight-week entrepreneurial boot camp that teaches scientists and engineers the tricks of the trade for spinning out technology from LLNL to the marketplace. Part of the Lab-Corps curriculum requires participants to conduct 100 interviews with prospective customers to discover how to adapt technology to business. With such a small window of time, Ye, the team’s principal investigator, needed something that could be marketed easily. The first idea was to replace the existing CO2 filters used in anesthesia machines, which got the team started. One interviewee even offered to place an order right away. However, Ye’s industrial mentor, Gerry Barañano, a veteran entrepreneur from Tech Futures Group, pointed out the limit of market size, so they quickly pivoted. "We avoided spending weeks of time on something less meaningful because of his entrepreneurial instinct," Ye said. Lab-Corps: Carbon capture technology adapted to craft beer-making After considering several applications that might benefit from reusable microcapsules that can rapidly absorb CO2, including waste gasification, fertilizer production and deep-water diving, he didn’t have to go far to find the next promising lead. Lab-Corps happened to be held in Golden, Colorado, the home of Coors Brewing Company and part of the Denver metro area, which boasts more than 200 microbreweries. The team’s entrepreneurial lead, Lionel Keene, an LLNL engineer who once founded his own software company, suggested contacting Coors, and the group talked their way into touring the facility, which they found had an aging CO2 reclamation system. "Luck plays a big role in a lot of these things and frankly, we got lucky," Keene said. "We had a flexible product, so if one thing didn’t work out, we could find somewhere else where it might be useful. Sometimes it’s just a matter of talking to the right person." In meeting with Coors and a local CO2 supplier, Ye and Keene learned that during the fermentation process, breweries produce about three times the amount of CO2 needed for carbonization and packaging. Coors, for example, generates roughly 300 million pounds of carbon dioxide per year during the fermentation steps, but only needs 80 million pounds, most of which is currently purchased through suppliers. Furthermore, typically 80 percent of the cost of purchasing CO2 comes in transportation. If breweries could capture and reuse CO2 using the microcapsules, Ye thought, they could be self-sustaining and sell the excess to other nearby consumers. "We want to adapt this technology for capturing CO2 in breweries as a way to reduce CO2 emissions to the atmosphere and cut their purchase costs by up to 75 percent," Ye said. "It will be more environmentally friendly, and not only will it save on costs, but they also can create revenue by selling the excess." But before working their way up to the big guys, Ye and Keene realized they would have to start out with small producers. They focused their attention on microbreweries, which generally can’t afford large commercial CO2 reclamation systems but produce enough carbon dioxide to make an impact. During the visits, they were amazed by pioneering ecosystems that also could benefit from a more efficient carbon capture technology. While in Colorado, they visited Upslope, a craft brewery that works with Boom Algae, an algae company, to capture CO2 for algae growth, that eventually converts into a green ink they use in menus and promotional literature. The breweries were interested, but they didn’t like the idea of a large, monolithic system. Ye’s group presented a "propane tank model," a basic CO2 capturing system using barrels filled with millions of microcapsules that could absorb CO2 from the fermentation gas. In theory, Ye’s company -- with a working name of MECS (Micro-Encapsulated CO2 Sorbent) -- would provide the equipment at no cost upfront, the brewers would collect CO2 gas from the fermenters, fill the tanks and MECS would send trucks to pick them up. The captured CO2 would be reclaimed at a centralized hub, sold back to brewers at a big discount, and MECS would keep the surplus and sell it on the open commodities market. The idea could potentially save breweries tens of thousands of dollars a year, Keene said. While applying for the DOE’s Technology Commercialization Fund, Ye is shopping the smaller-scale carbon capture technology around to craft breweries. He’s also in discussions with UC Davis, which has a pilot-scale winery and brewery, to install the system to prove the concept works. Ye also believes existing CO2 suppliers could be partners, instead of competitors. "Their trucks need to come out to deliver CO2 anyway, and could easily swap our capture tanks in the same trip," Ye said. "Working with us means they would have an option to possess commodity, be less dependent on the major CO2 distributors and to expand their own business." If it hadn’t been for Lab-Corps, Ye said he never would’ve thought about applying his technology to the beer industry. The experience, he said, taught him to think about how science can be practically applied to the marketplace, the importance of communicating with potential customers and how to work with seasoned mentors to come up with a plausible business plan. "The point of Lab-Corps is to take lab technology and think outside the box," Ye said. "When we get to talk to the real consumers, they tell us something else they care about, and it opens your mind to things you wouldn’t have thought of in the lab. You find out their actual needs, and it makes your proposal more powerful. Lab-Corps has helped personally to develop the skills to talk to strangers and find information from the conversations. The experience helped me think about the technology and how to adapt it for what people actually want."                  lab corp The Lab-Corps MECS team also includes John Litynski from the Department of Energy, who served as an observer. Hannah Farquar and Roger Werne of LLNL’s Industrial Partnerships Office, and Christine Hartmann, manager of the Proposal Development Office, provided assistance. LLNL has seen six teams graduate from the Lab-Corps Pilot Program’s first two years Ten LLNL scientists and engineers have reaped the benefit of applying entrepreneurial skills and market discovery practices to their scientific projects. The next call for applications will be released in the spring for teams to participate in the program in early fall. For more information, contact farquar3 [at] llnl.gov (Hannah Farquar.) The research team behind the technology includes Joshuah Stolaroff, Du Nguyen, Sarah Baker, William Smith, James Oakdale, Eric Duoss, Bill Bourcier, Chris Spadaccini and Roger Aines, as well as collaborators from multiple universities and institutions across the globe. The Laboratory Directed Research and Development (LDRD) program, the Department of Energy’s Advanced Research Projects Agency-Energy (ARPA-E) and the National Energy Technology Laboratory funded the research project.
Myopia, Or Nearsightedness, May Be More Prevalent In Firstborn Children First Born Glasses The oldest kid is more likely to don a pair of glasses compared to those born after them. Photo courtesy of Flickr, Mark Probst Birth order may have something to do with who gets stuck wearing glasses in their family. Myopia, or nearsightedness, is a vision impairment that affects nearly 30 percent of the American population, and according to a new study, especially firstborn children. The findings, published in JAMA Ophthalmology, reveal a “quirky” link between children born first in the family and the increased likelihood of them developing myopia. Researchers examined 90,000 adults between the ages of 40 and 69 and discovered those who were born first in their family were roughly 10 percent more likely to be myopic and 20 percent more likely to have high myopia than their younger siblings. It’s currently a mystery as to why firstborns are at an increased risk. At first, researchers believed it could be because of their tendency to have a lighter birth weight, but after examining behavioral patterns of firstborns, it may be something within parents' control. "My assumption is that individuals who go on to spend more years in full-time education spend relatively less time outdoors and relatively more time in tasks such as reading during their childhood," the study’s co-author Jeremy Guggenheim, a professor at Cardiff University, told Time. According to the National Eye Institute, myopia develops in a region within the eye that’s responsible for focusing on images in front of the retina instead of on the retina, which results in blurred vision. It’s often diagnosed in children between the ages of 8 and 12, and can worsen with age. Currently, researchers believe people whose parents have myopia may be more likely to develop the condition, but it’s the only susceptible risk factor known other than birth sequence. Eyeglasses, contact lenses, and surgery are the only ways to correct myopia. “Myopia is not curable or reversible, but there are promising interventions using optical and behavioral approaches that can help slow the progression and prevent people from becoming highly myopic,” said acting CEO of Brien Holden Vision Institute Professor Kovin Naidoo and researcher of a recent study, in a press release. In the study, researchers estimated there’s a high likelihood that five billion people will be myopic by the year 2050, a drastic increase from the current two billion people worldwide. A near-sightedness epidemic would increase the risk for blindness, leading researchers to recommend people implement preventive treatments to slow the trend. Recommendations included encouraging the child to spend more time outside while minimizing their time spent on electronic devices, such as cellphones, tablets, video games, television, and the computer screen.   Source: Williams C and Guggenheim JA. Role of Educational Exposure in the Association Between Myopia and Birth Order. JAMA Ophthalmology. 2015. Join the Discussion
How Long Does Cilantro Take to Grow How Long Does Cilantro Take to Grow The botanical name of Cilantro is Coriandrum Sativum. Cilantro is widely used in many dishes and cuisines; however, unlike other herbs, and you may not see cilantro growing in anyone’s home garden. They can be found outside somewhere. This is due to the reason that it is challenging to grow cilantro which is not true. In this article, we will check how long cilantro takes to grow and whether it can be grown from cuttings. For all the facts and information, you need to read this article till the end. Here are some of the tips you will get to know how to grow cilantro in no time, so it will not take much longer to grow cilantro if you have a complete guide on how to do it. There is a little difference between cilantro and coriander as they are both derived from Coriandrum Sativum. Some countries where Coriandrum leaves and stems are called Cilantro, and in some, their dried leaves are called coriander. However, there are some countries where both leaves and dried seeds are called coriander. So, different countries have different names for the two categories derived from the same source. Methods To Grow Cilantro Methods To Grow Cilantro Cilantro can be grown in soil as well as the soilless environment as you like to grow them. Let us discuss both methods here. Grow Cilantro in Water If you live at a place where the soil is not available or not favorable so in that you need not worry as Cilantro can be grown without soil and just in water. Take a deep vessel or glass bottle in which you need to fill water, dip the seedlings in that and wait for a few weeks, and you will see roots coming out of those seedlings. Just make sure to change the water to avoid the death of cutting. You can also use liquid fertilizers to help in the growth of cilantro. Please keep the leaves above the water when they grow. Grow Cilantro in Soil Cilantro grows very well in the drained soil. It would help if you put the cutting in the seedling soil mixture. Once you see them growing, you need to replace them in a pot. Except this, you can also put them directly in a pot or wooden box with good depth. As Cilantro has a tap root system, so they easily grow in any wooden box, container, and pot, etc. How To Grow Cilantro from Cutting?  How To Grow Cilantro from Cutting How to grow cilantro from cuttings, if this is what you are looking for, first, you need to collect a few cuttings for a regular pot as the cilantro can be grown without the seeds.  While collecting the seedlings, it is advised to get them in a group and not get just one or two as they will not grow. This is because they will not be able to maintain that type of environment. If they are in a group, it will be quite easy for them to survive as they can easily provide appropriate shade and humidity to each other. Cuttings You May Need There are two types of cuttings that you need to grow Cilantro. Let us discuss step by step. Root Cutting: This is a very easy and fast-growing technique to use for cilantro. You need to cut the root with three inches of stem and use it right away as it will be fresh. It would help if you did not store it to be used later as it will not be effective then. If you use it freshly cut, then it will help in enhancing the rate of germination, and this will help in the fast growth of your cilantro.  Stem Cutting: Another method to grow cilantro is to use stem cutting. If you have brought fresh cilantro from the market, then you need to follow this technique for them. You need to separate the leaves for your use, and you can use the stems for growing cilantro for you. You need to cut the stem 3-4 inches and place them as it is for some time. You need to put the root side down and shoot the side in an upward direction, to be precise, so that your cilantro will grow with proper technique and with the best result. To grow cilantro, you need to take care of good soil if you are growing them in soil, change the water timely if you are growing in water. Take care of temperatures, and they will show roots in 2 weeks. Sandy Jensen What are the Specialities of Giant Sequoia Bonsai Tree? Previous article How to Use the Stem and Root of Coriander Next article You may also like Leave a reply More in Gardening
gnuplot for dummies… At first glance, it might seem that Gnuplot is more difficult to use for plotting than MS Excel. But it only seems that way, the entry threshold is a little higher (you can’t use a mouse to click it, you need to read the documentation here), but in practice, it comes out much easier and more convenient. I wrote a script once and have been using it all my life. It’s really much more difficult for me to plot a graph in Excel, where everything is not logical than in Gnuplot. And the main advantage of Gnuplot is that you can embed it into your programs and visualize data on the fly. Also Gnuplot without any problems builds a graph from a 30-gigabyte file of statistical data, while Exel simply crashed and could not open it. The pluses of Gnuplot include the fact that it can be easily integrated into the code in standard programming languages. There are ready-made libraries for many languages, I personally came across Fortran and Python. Thus, you can generate graphs directly from your program. Gnuplot — real application There are two ways to work with Gnuplot: command mode and script execution mode. I recommend using the second mode immediately, as it is the most convenient and fastest. Moreover, the functionality is absolutely the same. The graph is plotted by the plot command. As command parameters, you can specify a function or the name of the data file. As well as which column of data to use and how to connect the points, how to denote them, etc. Let’s illustrate. gnuplot> plot sin(x) Gnuplot interactive plot of sin(x) function After executing the command, a window will open where there will be a sine graph with default signatures. Let’s improve this graph and figure out some additional options at the same time. Let’s sign the axes. set xlabel "X" Specifies the label for the abscissa axis. set ylabel "Y" Specifies the label for the ordinate axis. Let’s add a grid to show where the graph is built. set grid We will set the limits of the values to which the graph will be limited via the command set yrange [-1.1:1.1] Thus, the graph will be drawn from the minimum value of -1.1 to a maximum value of 1.1. Likewise, I set the range for the abscissa so that only one period of the sinusoid is visible. set xrange[-pi:pi] We need to add a title to our schedule: set title "Gnuplot's examples" font "Helvetica Bold, 20" Note that you can set fonts and their sizes. See the Gnuplot documentation for what fonts can be used. And finally, in addition to the sine on the graph, let’s also draw the cosine, and also set the line type and its color. And also add legends, what are we drawing. plot sin(x) title "sin(x)" lc rgb "red", cos(x) title "cos(x)" lc rgb "green" Here we draw two graphs on one canvas, in red and green. In general, there are a lot of options for lines (dotted line, stroke, solid), line widths, colors. Like the types of points. My goal is only to demonstrate the range of possibilities. Let’s bring all the commands into one pile and execute them sequentially. the result: If you honestly repeated all this after me, you might have noticed that manually entering it every time, even copying, is somehow not comme il faut. But is this a ready-made script? So let’s do it! a gnuplot script We make it executable and run it. chmod +x gnuplottest.gpi As a result, we get the same window with charts. If you don’t add -persist to the title, the window will automatically close after the script is executed. In order to output data to a file and not to the screen, you need to reassign the terminal. set terminal png size 800, 600 set output "result.png" As you might guess, we indicate the file type, its resolution, then we indicate the file name. Add these two lines to the beginning of our script, and we get this picture in the current folder. Our final Gnuplot graph In order to save to postscript, you need to use the following commands: set terminal postscript eps enhanced color solid set output "" In Python? Here a simple code for plot a cosine function in Python using matplotlib: import numpy as np import matplotlib.pyplot as plt t = np.arange(0.0,2.0,0.01) s = 1+ np.cos(2*np.pi*t) plt.title('Cosine wave plot(cos(x))') FIGlet – as you can read here – is a program for making large letters out of ordinary text. A very quick note on how to add FontArt to Python’s output view.I will give a few tips on how to add FontArt to the python output display. The method is quite easy, the first thing we have to do is install the PyFiglet library. PyFiglet converts ASCII text to ASCII art font. pip install pyfiglet After the installation is complete, then open the code editor and type the following code: # You can get the type of font itself at the following link. import pyfiglet result = pyfiglet.figlet_format('wow', font='banner3') The result of the code is like this: In addition, we can also change the displayed font, by adding a font parameter to the .figlet_format function: import pyfiglet result = pyfiglet.figlet_format('wow', font='colossal') The result of the code is like this: Below, a complete code for the project: import pyfiglet import argparse # python # python --text "Ciao" # python --text "Ciao" --font banner3-d # You can see the font list here: parser = argparse.ArgumentParser() parser.add_argument('-t', '--text', help='text') parser.add_argument('-f', '--font', help='font') text = 'This is sample text' args = parser.parse_args() if args.text: text = args.text if args.font: result = pyfiglet.figlet_format(text, font=args.font) result = pyfiglet.figlet_format(text) The Fibonacci sequence… The Fibonacci sequence is one of the most well known mathematical sequences and is the most basic example of recurrence relations. Each number in the sequence consists of the sum of the previous two numbers and the starting two numbers are \(0\) and \(1\). It goes something like this: \(1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144 \text{ and so on forever…}\) We will go through a few different approaches for the optimal solution: 1. Using simple recursion 2. Using cache with recursion 3. Using Binet’s formula Using simple recursion This is a very simple and easy way to return the nth Fibonacci number in Python: def recursiveFib(n): if n == 1 or n == 2: return 1 return recursiveFib(n - 1) + recursiveFib(n - 2) It uses recursion to repeatedly call itself multiple times calculating the previous number and using it to work out the next. But that is also its downside, as the function extremely inefficient and resource intensive, this is because at every stage it calculates the previous two numbers, and the previous two numbers of those number etc. Soon you reach a point where it takes too long to calculate the next number – for example on my computer it took me 1.61 seconds to calculate the 35th number. This will obviously be extremely slow, and basically impossible, to calculate higher values. processing time of the recoursiveFibo routine Using cache with recursion Since we constantly calculate the previous two numbers, we can harness the power of caching to store the number, so we do not need to calculate them anymore. The built-in functools module allows us to use a least recently used cache; a type of cache which organises the items in order of use. This can speed up the process by a huge amount. # procedura ricorsiva con cache def recursiveFibCached(n): if n == 1 or n == 2: return 1 return recursiveFibCached(n - 1) + recursiveFibCached (n - 2) Firstly, we need to import the lru_cache decorator from the functools module and place it before our function. We can supply a maxsize value to tell the cache how many items to store, but by default it is 128 and that works perfectly fine. Using cache with recursion Using Binet’s formula Binet’s formula is a formula which can be used to calculate the nth term of the Fibonacci sequence, which is exactly what we want to do, and is named after it was derived by the french mathematician Jacques Philippe Marie Binet. The formula is shown below: \(F_n = \frac{\phi^n-(-\phi)^{-n}}{\sqrt{5}}\) We can convert thing formula into Python and start using it straight away: def formulaFib(n): root_5 = 5 ** 0.5 phi = ((1 + root_5) / 2) a = ((phi ** n) - ((-phi) ** (-n))) / root_5 return round(a) Using Binet’s formula Note for the Python implementation we need to return the rounded version of the number we calculate, this is because when we calculate a large number Python will return to us a number where there can be 20+ trailing 9’s after the decimal place. This is all well and good since now we do not have any loops and can instantly compute the answer, right? Well, there is a small catch to this method. If we try to calculate anything above the 1475th number, we will run into an error; OverflowError: (34, 'Numerical result out of range'). This is due to the way floats are implemented in Python and they can only have a certain maximum value, which we exceed using this method. However, a fix to this is very easy to implement. We can use a built-in module called decimal to create a decimal object with a much higher precision and size to use in our equation: import decimal def formulaFibWithDecimal(n): decimal.getcontext().prec = 10000 root_5 = decimal.Decimal(5).sqrt() phi = ((1 + root_5) / 2) return round(a) In this new function we set the precision value to 10’000 digits long and we convert our root 5 value into a decimal object value and use that in our equation. This allows us to easily calculate the 10’000th number in the sequence in an astonishing 41.9 seconds, a huge improvement over all our previous methods. Basic Plotting with matplotlib The Python ecosystem gives us the option of visualizing relationships between numbers via matplotlib, a plotting library (i.e., not part of core Python) which can produce quality figures. Inside the matplotlib package is the matplotlib.pyplot module, which is used to produce figures in a MATLAB-like environment. Here a simple example code for the matplotlib.pyplot module. import matplotlib.pyplot as plt def plotex(cxs,cys,dxs,dys): plt.xlabel('$x$', fontsize=10) plt.ylabel('$f(x)$', fontsize=10) plt.plot(cxs, cys, 'r-', label='quadratic: $y=x^2$') plt.plot(dxs, dys, 'b--^', label='other function: $y=x^{1.8}-1/2$') x1 = [0.1*i for i in range(60)] y1 = [x**2 for x in x1] x2 = [i for i in range(7)] y2 = [x**1.8 - 0.5 for x in x2] plotex(x1, y1, x2, y2) A matplotlib.pyplot module example We start by importing matplotlib.pyplot in the (standard) way which allows us to use it below without repeated typing of unnecessary characters. We then define a function, plotex(), that takes care of the plotting, whereas the main program simply introduces four list comprehensions and then calls our function. If you’re still a beginner, you may be wondering why we defined a Python function in this code. An important design principle in computer science goes by the name of separation of concerns (or sometimes information hiding or encapsulation): each aspect of the program should be handled separately. In our case, this means that each component of our task should be handled in a separate function. Let’s discuss this function in more detail. Its parameters are (meant to be) four lists, namely two pairs of \(x_i\) and \(y_i\) values. The function body starts by using xlabel() and ylabel() to provide labels for the x and y axes. It then creates individual curves/sets of points by using matplotlib’s function plot(), passing in the x-axis values as the first argument and the y-axis values as the second argument. The third positional argument to plot() is the format string: this corresponds to the color and point/line type. In the first case, we used r for red and - for a solid line. Some of the most important line styles/markers in matplotlib The fourth argument to plot() is a keyword argument containing the label corresponding to the curve. In the second call to plot() we pass in a different format string and label (and, obviously, different lists); observe that we used two style options in the format string: -- to denote a dashed line and ˆ to denote the points with a triangle marker. The function concludes by calling legend(), which is responsible for making the legend appear, and show(), which makes the plot actually appear on our screen. We could fine-tune almost all aspects of our plots, including basic things like line width, font size, and so on. For example, we could get LaTeX-like equations by putting dollar signs inside our string, e.g., ‘$x i$’ appears as \(x_i\). Electric Field of a Distribution of Point Charges Very briefly, let us recall Coulomb’s law: the force on a test charge Q located at point P (at the position r), coming from a single point charge q0 located at r0 is given by: \(\mathbf{F}_{0}=k \frac{q_{0} Q}{\left(\mathbf{r}-\mathbf{r}_{0}\right)^{2}} \frac{\mathbf{r}-\mathbf{r}_{0}}{\left|\mathbf{r}-\mathbf{r}_{0}\right|}\) where Coulomb’s constant is \(k=1 /\left(4 \pi \epsilon_{0}\right)\) in SI units (and \(\epsilon_0\) is the permittivity of free space). The force is proportional to the product of the two charges, inversely proportional to the square of the distance between the two charges, and points along the line from charge q0 to charge Q. The electric field is then the ratio of the force F0 with the test charge Q in the limit where the magnitude of the test charge goes to zero. In practice, this given us: \(\mathbf{E}_{0}(\mathbf{r})=k q_{0} \frac{\mathbf{r}-\mathbf{r}_{0}}{\left|\mathbf{r}-\mathbf{r}_{0}\right|^{3}}\) where we cancelled out the Q and also took the opportunity to combine the two denominators. This is the electric field at the location r due to the point charge q0 at r0. If we were faced with more than one point charge, we could apply the principle of superposition: the total force on Q is made up of the vector sum of the individual forces acting on Q. As a result, if we were dealing with the n point charges q0, q1,…, qn −1 located at r0, r1,…, rn−1 (respectively) then the electric field at the location r is: \(\mathbf{E}(\mathbf{r})=\sum_{i=0}^{n-1} \mathbf{E}_{i}(\mathbf{r})=\sum_{i=0}^{n-1} k q_{i} \frac{\mathbf{r}-\mathbf{r}_{i}}{\left|\mathbf{r}-\mathbf{r}_{i}\right|^{3}}\) Note that you can consider this total electric field at any point in space, r. Note, also, that the electric field is a vector quantity: at any point in space this E has a magnitude and a direction. One way of visualizing vector fields consists of drawing field lines, namely imaginary curves that help us keep track of the direction of the field. More specifically, the tangent of a field line at a given point gives us the direction of the electric field at that point. Field lines do not cross; they start at positive charges (“sources”) and end at negative charges (“sinks”). We will plot the electric field lines in Python; while more sophisticated ways of visualizing a vector field exist (e.g., line integral convolution), what we describe below should be enough to give you a qualitative feel for things. We are faced with two tasks: first, we need to produce the electric field (vector) at several points near the charges and, second, we need to plot the field lines in such a way that we can physically interpret what is happening. Code below is a Python implementation, where Coulomb’s constant is divided out for simplicity. import numpy as np import matplotlib.pyplot as plt from math import sqrt from copy import deepcopy def makefield(xs, ys): qtopos = {1: (-1,0), -1: (1,0)} n = len(xs) Exs = [[0. for k in range(n)] for j in range(n)] Eys = deepcopy(Exs) for j,x in enumerate(xs): for k,y in enumerate(ys): for q,pos in qtopos.items(): posx, posy = pos R = sqrt((x - posx)**2 + (y - posy)**2) Exs[k][j] += q*(x - posx)/R**3 Eys[k][j] += q*(y - posy)/R**3 return Exs, Eys def plotfield(boxl,n): xs = [-boxl + i*2*boxl/(n-1) for i in range(n)] ys = xs[:] Exs, Eys = makefield(xs, ys) xs=np.array(xs); ys=np.array(ys) Exs=np.array(Exs); Eys=np.array(Eys) plt.streamplot(xs, ys, Exs, Eys, density=1.5, color='m') We start by importing numpy and matplotlib, since the heavy lifting will be done by the function streamplot(), which expects NumPy arrays as input. We also import the square root and the deepcopy() function, which can create a distinct list-of-lists. The function makefield() takes in two lists, xs and ys, corresponding to the coordinates at which we wish to evaluate the electric field (x and y together make up r). We also need some way of storing the ri at which the point charges are located. We have opted to store these in a dictionary, which maps from charge qi to position ri. For each position r we need to evaluate E(r): in two dimensions, this is made up of Ex (r) and Ey (r), namely the two Cartesian components of the total electric field. Focusing on only one of these for the moment, say Ex (r), we realize that we need to store its value for any possible r, i.e., for any possible x and y values. We decide to use a list-of-lists, produced by a nested list comprehension. We then create another list-of-lists, for Ey(r). We need to map out (i.e., store) the value of the x and y components of the total electric field, at all the desired values of the vector r, namely, on a two-dimensional grid made up of xs and ys. This entails computing the electric field (contribution from a given point charge qi ) at all possible y’s for a given x, and then iterating over all possible x’s. We also need to iterate over our point charges qi and their locations ri; we do this by saying for q, pos in qtopos.items(): at which point we unpack pos into posx and posy. We thus end up with three nested loops: one over possible x values, one over possible y values, and one over i. All three of these are written idiomatically, employing items() and enumerate(). Our second function, plotfield(), is where we build our two-dimensional grid for the xs and ys. We take in as parameters the length L and the number of points n we wish to use in each dimension and create our xs using a list comprehension; all we’re doing is picking x’s from −L to L. We then create a copy of xs and name it ys. After this, we call our very own makefield() to produce the two lists-of-lists containing Ex (r) and Ey (r) for many different choices of r. The result of running this code is shown in the following figure. Visualizing the electric fields resulting from two point charges.
MediaLAB Amsterdam The KJ Method by .   120 +  A brainstorming and prioritizing method that places emphasis on the most important ideas and actions. How do you assess what is most important? This method allows to prioritize your efforts. 1. Set up a group meeting and a room. You need at least 5 participants to generate a sufficient amount of ideas. 2. Select a moderator. This moderator frames the design challenge. 3. Participants generate many ideas and write them on post-its. 4. Collect the idea post-its, shuffle them, and hand them out. No one should get one of their own ideas. 5. Ideas are read out as the moderator transcribes them on flipchart pages. During this phase, anyone can ask for clarification of any idea brought up and recorded. Ideas are categorized in groups (post the post-its on a wall or whiteboard). No more than 10 groups! 6. Best ideas are voted up, so that each group has clear winners. Discuss the insights. 7. Individuals take ownership of ideas and take responsibility for implementing or further developing each on a deadline. A starting point for a design solution and a priority list for actions and directions. Combine the KJ Method with practical concepting and prototyping methods to work out your ideas. Source: MediaLAB Amsterdam OHIWA, Hajime, et al. KJ editor: a card-handling tool for creative work support.Knowledge-Based Systems, 1997, 10.1: 43-50. Comments (0) 
Selenium and Vitamin E Concentrations in a Healthy Donkey Population in Central Italy. School of Biosciences and Veterinary Medicine, University of Camerino, Matelica, MC, Italy. Electronic address: [Email] Selenium and vitamin E protect the body against oxidative stress. Clinical manifestations of their deficiency in equids include neurologic and muscular symptoms. Despite the importance of donkeys as working and production animals, there is a dearth of scientific data on selenium and vitamin E normal values. Therefore, the aim of this study was to investigate the plasma concentrations of selenium and vitamin E in healthy donkeys belonging to different ages, sexes, and productive phases. Animals were divided into five groups including foals (group A: n = 7, n = 4 males and n = 3 females), weanlings and yearlings (group B: n = 7, n = 2 males and n = 5 females), nonpregnant nonlactating jennies (group C: n = 5), pregnant nonlactating jennies (group D: n = 9), and adult males (group E: n = 9). Plasma samples obtained from each animal were tested for vitamin E and selenium concentration. One-way analysis of variance showed significant differences in selenium concentrations (P = .001) between group A and group E. In this study, we found the selenium range for donkeys to be 0.02-0.14 μg/mL, which is lower than the recommended range for horses. The results suggest that donkeys may have a lower selenium requirement than horses. Plasma vitamin E levels were 3.29-12.99 μmol/L, with foals having lower concentrations than adults. Knowing specific reference ranges for vitamin E and selenium in healthy donkeys can help improve our understanding of how to prevent deficiencies that could compromise their overall health and well-being. Dairy donkeys,Donkeys,Plasma concentrations,Selenium,Vitamin E, OUR Recent Articles
Why Eating Local Makes a Difference in Your Carbon Footprint In which I eat my words as well as my vegetables. Local Food Still matters Local food in Huntsville, Ontario. Lloyd Alter In January 2020, I wrote a post titled "One Less Thing to Worry About in Your Carbon Footprint: Whether Your Food Is Local" based on one of our favorite sources: Our World in Data. The online research site says "the goal of our work is to make the knowledge on the big problems accessible and understandable." At the time, Our World in Data's senior researcher Hannah Ritchie wrote about reducing the carbon footprint of your food: "‘Eating local’ is a recommendation you hear often – even from prominent sources, including the United Nations. While it might make sense intuitively – after all, transport does lead to emissions – it is one of the most misguided pieces of advice.... GHG emissions from transportation make up a very small amount of the emissions from food and what you eat is far more important than where your food traveled from." Ritchie concluded that what you eat is far more important than where it came from, because of the huge carbon footprint in some foods like red meat compared to others. "Whether you buy it from the farmer next door or from far away, it is not the location that makes the carbon footprint of your dinner large, but the fact that it is beef," wrote Ritchie. Footprint broken down including transport CC/ Hannah Ritchie/ Our World in Data This is, of course, absolutely true, as can be seen by the graph, where the beef bar at top overwhelms every other food and the red bar representing transport is almost invisible. But over the course of 2020, when I was writing a book on living a 1.5-degree lifestyle, I kept revisiting this question of local food and it troubled me. As I noted in the earlier post, "Our household rule is that if it grows here (in Ontario, Canada) then we wait until we can eat the local version, but I still get to have a grapefruit for breakfast and some guacamole at lunch." But did this research mean that California strawberries and lettuce were back on the menu? Our World in Data often bases its work on earlier published research, reinterpreting it and reformatting it for the modern age, noting on its about page that "a key part of our mission is therefore to build an infrastructure that makes research and data openly available and useful for all." Much of this post was based on the work of Joseph Poore and Thomas Nemecek and their 2018 study on the global impacts of food production, which mentioned transport emissions, but I couldn't find where they clearly identified them. Ritchie also mentions Christopher Weber and Scott Matthews's 2008 study "Food-Miles and the Relative Climate Impacts of Food Choices in the United States." This study comes to the same conclusion as Ritchie: Again, no argument here, but this was written back in 2008 when everyone was talking about local food, when living the 100-mile diet was the talk of the town, and people were discussing this as a one-or-the-other thing. The authors are trying to demonstrate again that what you eat matters a lot more than where it came from. Comparison of foods Comparison of foods. Environ. Sci. Technol. 2008, 42, 10, 3508-3513 But much depends on the food. Although table C demonstrates that red meat has the biggest climate impact on an average household and that delivery and freight are thin little bars on the left, note that fruit and vegetables have a pretty big impact. Take out red meat and dairy and they become dominant. Continue to table B and out the total contribution of transportation, fruit and vegetables actually contribute more than meat, and it is almost entirely by truck. The study states: "Final delivery (direct t-km) as a proportion of total transportation requirements varied from a low of 9% for red meat to a high of around 50% for fruits/vegetables." (If you are wondering why gas pipelines are on the chart, it's for the contribution to fertilizer production.) So when you are eating fruits and vegetables, you are eating a lot more diesel, but according to the authors, it is still a small proportion of the total footprint of the food that we eat. Or is it? The Impact of the Cold Chain cold chain distribution sustainability Yu Xin Shi, Ryerson University When you get to the "Discussion and the Uncertainties" in the results, the authors note: "Refrigerated trucking and ocean shipping of fresh foods are more energy-intensive than the average intensity of trucking or ocean shipping. However, neither of these uncertainties are likely to change the overall results of the paper substantially." One might argue that it changes the results significantly. While studying the issue for my sustainable design class at Ryerson University, my student Yu Xin Shi found refrigeration accounts for 20% of the fuel used in transportation and that 3% to 7% of the global leakage of HFC refrigerants (a major greenhouse gas) came from the transportation of food. She found that a single head of lettuce spent 55 hours on a refrigerated truck. Her source was was work by Professor Jean-Paul Rodrigue of Hofstra University. I asked Rodrigue for a comment and the professor tells Treehugger: "You are asking for technical details that I cannot provide as an indirect source of information since I have not made these calculations. This said, the ocean shipping of refrigerated goods is substantial... It may be a safe assessment that the footprint of cold chain logistics may be underestimated, but by how is at this point quite an ordeal." So I cannot conclusively say how much diesel is in my salad from California, but do believe that it is higher than what ends up in the Our World in Data chart. As such, I think it is not correct to say that eating locally doesn't matter — and, depending on what you eat, it can matter a lot. From a carbon footprint point of view: 1. Cutting back on red meat and dairy has the most immediate and dramatic impact. Whether they are local or not is almost irrelevant. 2. For fruit and vegetables, eat seasonal first; hothouse tomatoes can have a higher footprint than chicken. 3. But also for fruit and vegetables, the transportation footprint is significant, as much as 50%. They are such low carbon foods that it isn't huge, but there are still alternatives and it is still better to eat local and seasonal than to truck strawberries and lettuce from California. We are not talking about much when we are living a typical North American lifestyle that emits 18 tonnes of carbon per year, but when you get down to counting grams trying to maintain a 1.5-degree lifestyle and emit less than 2,500 kilograms per year, it can add up. I don't think we should ever say that food miles don't matter, because they add up too. I can't put a hard number on it, but local food still matters. View Article Sources 1. Ritchie, Hannah. "You want to reduce the carbon footprint of your food? Focus on what you eat, not whether your food is local." Our World in Data, 2020. 2. "About." Our World in Data. 3. Poore, J., and T. Nemecek. "Reducing Food’s Environmental Impacts Through Producers and Consumers." Science, vol. 360, no. 6392, 2018, pp. 987-992, doi:10.1126/science.aaq0216 4. Weber, Christopher L., and H. Scott Matthews. "Food-Miles and the Relative Climate Impacts of Food Choices in the United States." Environmental Science & Technology, vol. 42, no. 10, 2008, pp. 3508-3513, doi:10.1021/es702969f
In Tirsbjerg Plantation by Hoven is the ”Danmarksstenen” which was erected in remembrance of the reunification in 1920. The place has been used as a place for festive arrangements for many years. In pagan times the people probably believed in the god Tir hence the name Tirsbjerg Knap. In 1904, Tirsbjerg Plantage ved Tarm was bought by the Copenhagen paper dealer Adolf Levison, who wanted the plantation to be public and thereby for the benefit and joy of the area's population. Even then, the locals used the party place for public meetings and much more. In 1914, Levison donated the plantation to the state. In the spirit of the times, heath cultivation had great support, and therefore two memorial stones were erected. One named Danmarkssten and the other a memorial stone for King Chr, d. IX. The Danish stone is made of boulders, and is roughly cut out. It has the following text: "I think it is most beautiful in Denmark". The text itself is surrounded by a twisted ribbon.
Good Stores to Buy Electrician Products Solar Panels You are looking to use free, environmentally friendly energy to power your home and want to know how many solar panels you will need. There are many factors that will determine how many you need and how many you can buy. These include your energy consumption target calculations (how many energy-efficient household appliances and devices you have), your budget and the type and size of the solar panel you use. Prices can also vary depending on whether you are looking to purchase a high-tech array or if you are building your own panels from cheaper materials. The number of panels that you can put together into an array will vary, as well as their quality. It is important to calculate the energy a solar panel can provide and then compare that figure with what you need. A $300 solar panel can provide 100 to 200 watts of power, which is a significant amount considering that the average household uses about 8000-9000 kwh per year. There are so many good online stores which provide facility of Интернет-магазин электрики of a variety of electric products. You might not need to use as much energy depending on your specific needs. If you’re an environmentalist and know how to select appliances that offer better functionality while using less energy, it might be possible to cut that amount by half or less. You might also find that your manufacturing costs are reduced to less than $200 for a standard 36-cell solar panel. You will only need 30 to 40 panels depending on how good your solar array is. This should provide enough power for your whole home. Although this number is still too high, it can be decreased if you use another type of energy like wind power. This will give you more energy during cloudy or rainy days when solar panels aren’t as efficient and can reduce your need for panels by half. Be careful, because different solar cells provide different amounts of energy. The easiest way to calculate the energy output is to measure the current and voltage produced by your solar panel and multiply these values by the watt value. A small solar panel producing 12 volts will produce 72 watts. Although a weak panel might not give you enough energy, there are inexpensive panels that can provide twice as much power and cost less than $300 to $400. If you need to power a lot of low-energy gadgets or appliances, a solar array with 10-20 of these panels could be a viable option. How efficient solar cells can convert solar energy into electricity will also play a role in how many panels you need. For example, panels made with monocrystalline solar cells require less sunlight than those made from thin films or polycrystalline cells to generate a certain amount of energy. A monocrystalline solar panel company, which produces high-quality panels made of monocrystalline silicon, was able to set a world record in solar energy efficiency. It produced solar cells capable of converting more than 24 percent of the sun’s radiation into electrical power. Researchers even believe that monocrystalline solar cells may be possible in the next few years. This would significantly increase the efficiency rating of these solar cells and solar energy overall. One example of the energy efficiency these panels offer is that a panel with 36 monocrystalline cells can produce between 100 and 130 watts. You will need 10 panels to achieve 1 kw (1000 W). Pricing for this plan can vary depending on the quality of the panel and the brand. Prices range from $3000 to $5000. Contrary to these results, technologies that use polycrystalline cells can barely get close to the 20% limit today while thin-film based technologies only provide 15 to 17 percent efficiency. These numbers may prove monocrystalline PV cells technological superiority, but they don’t necessarily mean that it is the best choice to buy them. Although it is true that monocrystalline PV cells will produce a greater output than you need, you will still need to buy more panels. However, this can lead to a significant price differential. To save money, you may choose to have less energy efficiency or a lower price. Polycrystalline solar cells are better than thin-film-based technologies in this regard. They are also less expensive than monocrystalline ones. When it comes to purchasing or manufacturing solar panels, most people are concerned about their budget. While DIY panels may be cheaper, they can have great quality differences. You will also need to do a lot of work if your panels are to perform well. You will know exactly how much power it produces and how stable it is before you buy a solar panel. Using simple math, you will be able to calculate how many devices are needed to reach your energy goal. There are many companies that offer different types of solar panels, each based on different technologies. This is the main problem. You may find it difficult to choose between them. To see what other buyers have to say about any product, look on multiple websites. Most people believe that a solar panel array is feasible for between $3000 and $8000. However, this number can vary depending on what technology you choose and your needs. Manufacturers are working hard to create better technology that allows people to purchase more efficient solar panels at a significantly lower price. However, you must consider all options and not just stick to a few brands because they have a particular marketing strategy. The numbers will tell you all you need to know and you can decide for yourself which panels and how many you need. Many times, the company that you do business with will actually be able to offer you a feasible plan for managing your energy consumption and solar panel number. They can often provide an accurate estimate of how much energy you will get based on your budget and the proficiency level of the solar power array that you need. The sun’s rays can be turned into electricity. Homeowners are increasingly taking advantage of this opportunity to reduce their carbon footprint and help the environment. Homeowners are increasingly installing solar electricity at home with backup batteries to power their homes. As a backup, a battery bank can be used to power solar electricity systems. When the solar system is in operation, the battery bank stores excess electricity. The stored electricity is used to draw down the excess during night and cloudy days. Solar panels and battery backup can be used as primary generators of electricity. This will reduce the amount of public grid electricity that a home uses. Most home solar electricity systems connect to the public grid. Grid connection provides additional backup to ensure that your household has power at all times. The first source of electricity is the solar panel system that includes batteries. It reduces household electricity consumption from the grid. The household that wants to generate solar electricity must decide on the best system for them. A handy calculation that can be used to help you make this decision is how much power your household requires when it is all blazing. This is when all appliances are turned on. Because electric heaters, air conditioner units, televisions and microwave ovens all use large watts of power to function, this can be quite large. A battery bank’s capacity is expressed in ampere or amp-hours. A battery might be rated to provide 140 amp hours of power, for example. Watt hours are the amount of electricity that can be drawn when a battery is fully charged. This is accomplished by multiplying amp hour by voltage. The 140 amp hour battery is capable of providing 110V wiring with 140 times 110 or 15.4Kwh of electricity. The following components are common to a solar home electricity system with battery backup: The solar panels that charge the battery. A battery bank is used to store electricity. An inverter converts the electricity from the batteries to the voltage needed by the household. The system also has an automatic or manual changeover switch that redirects power from the grid to inverter as required. Leave a Comment
The Agreement Reached at the Non-Proliferation Treaty Conference Endangers Israel's Survival in an Hostile Region / DR.Rivka Shpak Lissak A. Israel is the only state under threat Arab States except Egypt and Jordan are in a state of war with Israel. Israel is under constant threats from Iran, whose president openly declared his intention to wipe out Israel from the world map. Iran stands behind the Hamas in Gaza who openly declared its goal to eliminate the state of Israel and establish a Palestinian state on its ruins. Iran stands also behind the terrorist organization, the Hezbollah, in Lebanon, who openly declare its opposition to the existence of the Jewish state. Iran is an ally of Syria who had already tried 3 times to destroy Israel (1948, 1967, 1973). Jordan and Egypt signed peace treaties with Israel, but this is a cold peace and the population of those states are daily exposed to false accusations and incitement by the local media against Israel. B. Israel is the Victim of a campaign to de- legitimate it's right to exist All Arab countries, including Egypt and Jordan, and the PA who signed the Oslo agreement with Israel, are directly involved in a continuous campaign in the U.N and its organizations, especially the Human Rights Council, to demonize Israel through false accusations with the intention to de-legitimize the mere existence of the state of Israel. So, Israel is situated in an hostile region and surrounded by enemies from 2 sides and cold relations from 2 other sides. C. Jews were never welcomed in the region Israel is the only non- Muslim state in the region and the Muslims are known for their lack of tolerance against ethnic- religious minorities. The Arab Countries never welcomed the Jews who returned to their homeland by 2 international resolutions: the League of Nation in 1922 and the United Nations in 1947. They tried to eliminate its existence in 1948, 1967 and 1973. D. There was never a Palestinian Political Entity in Palestine There was never an Arab or Palestinian sovereignty in Palestine (whose ancient name is Israel). Since the Jews became a minority in their own country as a result of the policy of the Roman and Byzantine Empires, the country was very densely populated.In the 16th century the population numbered about 150,000. A significant part of the local Arab population, immigrated to the country from all Arab and some Muslim states, looking for work opportunities created by the returning Jews and the British Mandate development projects, between the middle of the 19th century and the middle of the 20th century, when the state of Israel was established. E. Palestinians rejected a state of their own 6 times During the British Mandate rule it became clear that Jews and Arabs are unable to live together peacefully in one state. A British investigation committee, the Peel committee, suggested in 1936/7 to divide the country, who was promised to the Jews twice, into 2 states: a Jewish and an Arab state. This was the first time, out of 6, that the Arab citizens of Palestine (Palestinians today) were offered a state and rejected the offer. They could get a state also in 1947 by the U.N resolution and could establish a state between 1948 –1967 when they were under Arabic rule. The 4th time they were offered a state was in 1967, after the 6 days war, when Prime Minister Levi Eshkol offered "land for peace." Opportunity number 5 came in 2000 in the Camp David Summit and the 6th was in 2009 when Prime Minister Euhd Ulmert offered a very generous proposal to Abu Mazen and got no answer. F. Only Israel is accused on the Palestinian state issue Arab states refuse to make peace with Israel unless Palestinians get a state. But, you need 2 to agree on this issue and the Palestinians have so far refused to give-up the demand for the "right of Return" which is a throian horse to turn Israel into a Palestinian state. The PA refuses to recognize Israel as the national Jewish state because it means to give-up the "right of return." G. The Arab proposal at the Non- Proliferation Conference resolution is part of an effort to de- legitimize the state of Israel Foreign sources claim Israel has nuclear power. If it has nuclear power, Israel never threatened any country to use it even though it was attacked by Arab states 3 times. If Israel has nuclear power, it needs it as a preventive measure to prevent other states from trying to destroy it. A resolution that ignores the Iranian nuclear threat on Israel and the state of war between Israel and Arabs, and demand only Israel to reveal its nuclear power is unjust and hypocritical. As long as Israel is threatened by states and terrorist organizations in the region it can't reveal its defensive secrets. President Obama strongly opposed singling out Israel over the talks for a Mideast atomic weapon- free zone. The United States declared that the failure of the resolution to mention Iran, a nation in longstanding violation of the NPT and U.N Security Council Resolution which poses the greatest threat of nuclear proliferation in the region and to the integrity of the NPT, is deplorable. In Short, A Mideast atomic weapon- free zone will be possible only after all the states in the region make peace with Israel. Post new comment • Lines and paragraphs break automatically. More information about formatting options prevent automated spam submissions. Enter the characters (without spaces) shown in the image.
Tag: business mobility framework Which businesses need business mobility to thrive? Business mobility is about how businesses move around the world. It is the means of moving people, goods and services from one place to another. It has changed how we interact with our environment, how we work, how much money we make, and how we spend. The latest Business Mobility Index shows Australia has the worst mobility ranking of any OECD country. It ranks 23rd in the world, behind only the US and the US Virgin Islands. Here’s what you need to know about business mobility. How does business mobility work? Business mobility works by providing a range of services for businesses that have to move around. These include: • Expanding and improving supply chains and processes • Improving efficiency and quality of business supply • Providing flexible, affordable and reliable services • Establishing new markets for business • Supporting small businesses • Reducing costs and increasing productivity of the Australian workforce. It can also help to improve the performance of existing businesses and organisations.2. What is business mobility? Business Mobility is a framework for managing the movement of goods, people and services. It helps companies to manage their business mobility from a supply chain, supply chain management, logistics, supply chains, operations and human resources.3. Why is business migration so important? Business migration is essential to the continued growth and success of Australia’s economy. It creates new jobs and helps people to earn a living. Business mobility can help businesses operate more efficiently and create new opportunities for Australian workers. For example, it can improve the efficiency of the workplace and increase productivity.4. How many businesses need to move to become mobile? The Business Mobility index of 27 OECD countries shows that more than 70 per cent of the OECD countries have a business mobility gap of 0.5 per cent. The lowest proportion of businesses is in the United States at 0.1 per cent and the highest is in Germany at 0,895 per cent, while Australia has a business migration gap of 1.3 per cent4. What are the key problems in business mobility for businesses? The Business Mobility Framework identifies the challenges and opportunities that businesses face when moving to mobile. It also provides guidance for businesses to ensure their business is prepared to move. For the first time in the survey, the index also includes the challenges that businesses experience when they are moved from one location to another, which can include a significant cost. This includes the cost of transporting goods and people across borders. Business Mobility Survey results are based on a random sample of 2,000 respondents in the first quarter of 2017. This data is based on the online survey conducted between February 6 and February 15, 2017. The survey is conducted by Qantas Research on behalf of the ABS, using its proprietary online survey tool. 후원 콘텐츠
New York City welcomes Apollo 11 crewmen in a showering of ticker tape down Broadway and Park Avenue in a parade termed as the largest in the city's history. Image: NASA Moon, Man, and Myths The 50th Anniversary of Apollo 11 In celebration of the 50th anniversary of Apollo 11, BackStory launches into the history of America’s race to the moon. We’ll hear from flight director Gene Kranz about what it was like in Mission Control during the moon landing. And we’ll explore a kind of Apollo nostalgia that has crept into movies and other forms of pop culture. Plus, stay tuned throughout the episode to hear from our listeners about their memories of the moon landing. This episode and related resources are funded by a grant from the National Endowment for the Humanities. Any views, findings, conclusions, or recommendations expressed in this show, do not necessarily represent those of the National Endowment for the Humanities. 00:00:00 / 00:00:00 View Resources Moon Landing Lesson Set Download the Lesson Set On July 20, 1969, the United States celebrated an amazing scientific achievement: landing the Apollo 11 on the surface of the moon. As Neil Armstrong and Buzz Aldrin became the first two men to walk on the lunar surface, the American public watched with nationalistic pride. This singular moment was the culmination of a decade of extensive efforts by the U.S. government and the scientific community. It also served as a public declaration of international supremacy during the Cold War between the U.S. and the Soviet Union. This lesson reflects on the legacy of the “space race” during the 1960s. Fifty years after the fact, the moon landing is still celebrated as one of the greatest achievements in human history. However, this era is also often treated with an uncritical nostalgia. For many Americans, the Apollo 11 mission represents a moment of unity at a calamitous time in American history. For other Americans, the “space race” was a distraction from the fight for civil rights and the intractable conflict in Vietnam. As you go through the lesson, encourage students to think critically about these contradictions. Why does the Apollo 11 mission remain the subject of American nostalgia after fifty years? What role did the space race play in advancing social, economic, and geopolitical interests? How should we reflect on this time period as students of history?
Shopping Cart Your Cart is Empty There was an error with PayPalClick here to try again Brenda Hill    Book Editing Services            Author * Editor * Writing Coach Writing Tips A) Star of the Show - protagonist B) Villain - antagonist C) Love interest Romeo & Juliet - Great Love Defies Death. Beyond the Quiet - a repressed widow learns to live. Act 1, Act 2, & Act 3 A) First Person Narrative - not as popular with general audiences: I watch the boat skim the waves... B) Second Person - again not as popular: You are waiting for your husband/wife/children to come home. They’re late, and you're checking the windows every three minutes... C) Third: 1) Single - one person all through the book: He walked to the window, pulled back the drape, and stood watching for their Camry to turn into the driveway. It was almost midnight... SHOW, don't TELL SHOW, don't TELL A) You could TELL the reader about Mr. Jones: Mr. Jones liked children. Did the reader feel a connection to Mr. Jones?   How about this one: Every Saturday, Mr. Jones gathers the neighborhood children and takes them to the park. Three Saturdays ago, he taught them to fish. Another Saturday, he gave instructions on swimming and diving. For those few hours each weekend, he was the father he'd always longed to be. C) Failure, or Disaster – character’s attempts to reach his goal fails. Dramatically. A) Reaction - wail, moan, or cry B) Dilemma - what do I do now? Getting your characters talking is the heart of your story. It's where the action takes place and holds the most interest. Many readers skip over narration to read the dialogue, no matter how you've slaved to write that exact word. But when you must write narration, stay true to your character. You do not want to sound like an English professor unless your character teaches English. Nor do you want them to be illiterate, unless you're writing another Grapes of Wrath. It all depends on your character and story. Use contractions, the way people speak. Keep dialect at a minimum. Use tags and beats. Style is more than the way you string words together. It's also how you present your story to the reader. Be sure to vary each scene/chapter as well as sentence length. How quickly or how slow you present your story is called PACING. A historical romance, for instance, moves along at a slower pace than a mystery/suspense, and once you learn pacing, you'll be able to control whether the reader flies through your manuscript, not wanting to put it down, or whether the unfolding is so slow the reader falls asleep. a) Present: she looks into the mirror. What will the other girls wear? She tugs at her skirt, wondering if it is too long. b) Past - more popular: she looked into the mirror. What would the other girls wear? She tugged at her skirt, wondering if it was too long. To outline or not to outline. Do you really need it? One writer outlines extensively using index cards and colored markers. Another simply lists chapters and their one-line content. One former instructor writes his story then, during revision, outlines using stepping stones/plot points. You must find what works for you. MINI-SYNOPSIS, or Your Jewel A) correct grammar, punctuation and sentence structure C) a cool-off period after the first draft D) and, most important of all, an excellent editor. No one can write a mistake-proof manuscript, but a manuscript full of errors is a sure way to get it rejected. If you can't afford a professional, perhaps a retired school teacher or someone good in grammar may be willing to proofread your manuscript - but be careful. S/he may be excellent in spotting wrong word usage or incorrect grammar, but do not rely on her/him for true story editing. Unless they've had extensive writing classes, few proofreaders recognize a Point of View drift or misplaced Flashbacks. Instead, consider joining a writers' critique group. Most are willing, even eager, to trade manuscripts for critiquing. Even then, they may be beginners who can proofread, but they may not know modern story structure. Even if one or more of the members’ knowledge is is extensive, realize there’s just not enough time at a meeting to go into structure detail. Plus, it’s difficult, if not impossible, to check while viewing a few pages at a time. But for what they DO offer, the experience may be priceless.
Extension Notes: Mistletoe: From Tree Thief to Holiday Tradition – by Rebecca Konopka Extension Notes: Mistletoe: From Tree Thief to Holiday Tradition - by Rebecca Konopka 2 Once autumn leaves have fallen, mistletoe becomes highly visible on large trees throughout Kentucky.  Phoradendron, the scientific name for this parasitic plant, means tree thief.  These small, leafy plants are commonly found on twigs and branches of many hardwood species in the southern United States. Mistletoes extract water, mineral elements and food from tree hosts; hence the name, tree thief.   Mistletoe use in holiday traditions has roots in pagan times.  The appearance of a live parasitic plant while the host tree appears dead led some to believe mistletoe mysteriously held the life of the tree during winter. Druids harvested mistletoe in a special rite, never allowing the plant to touch the ground, and then hung it in their homes for good luck.   Phoradendron, the most common mistletoe growing in Kentucky, resembles another species that grows in Europe. It has simple, fleshy green leaves arranged oppositely on the stem.  Stems are short and more branched than host trees, so mistletoe often appears as a spherical bunch of dense vegetation.  These bunches may be a foot or two in diameter and are located high in the tree where sun exposure is highest.  Mistletoe berries range from white to straw-colored to light red.  Birds eat the fruits, reportedly toxic to humans and animals, then deposit the seeds onto branches where they germinate and penetrate the next host tree.   Mistletoe commonly appear in open-grown trees where birds tend to roost and thereby, less frequently in forest trees. Generally, they cause minimal damage, although they can be harmful to stressed trees. Mistletoe can be removed from landscape trees by pruning.   Please enter your comment! Please enter your name here
What to eat to help raise zinc level? What to eat to help raise zinc level? Do you know that Zinc, this micronutrient plays an important role in the formation of structural proteins like antioxidants and in the outer membrane of each cell? This means that if  zinc level in our body is low, the proteins that our cells form will not be able to function correctly, leading to increased risk of oxidative damage and impaired cellular function. Zinc is very important in the development and function of immune cells, specifically T-cell growth and differentiation into white blood cells to ward off infection and disease. Which are the foods which supply us with the neccessary zinc? There are many whole foods that are high in zinc, but if you require treatment for deficiency, speak to your doctor or natural health specialist before beginning any regimen of zinc supplementation. Some of the best foods o raise zinc level are: Grass-Fed Beef and Lamb Pumpkin and Squash Seeds Chickpeas (Garbanzo Beans) and Mung Beans Cooked Oysters Kefir or Yogurt Cocoa Powder Ask a natural health specialist or  medicine doctor before beginning any treatment for zinc deficiency. How do you find out if you are suffering from zinc deficiency? Those who suffer from zinc deficiency tend to have the following symptoms: Compromised immune system: Zinc affects cell activities. Zinc deficiency can cause reduced or weakened antibodies and compromise the immune system. Thus the deficient person will be prone to infection or flu. Diarrhea: A compromised immune system makes one susceptible to infection. One of these infections is a bacteria that causes diarrhea. Hair loss and skin lesions: It is important for normal cell growth. Zinc nutrition deficiency weakens the cells, which can result in hair loss in case of cells on the scalp and lesions on the skin. This is one of the prominent signs of its deficiency. Loss of appetite and/or anorexia: A deficiency of zinc causes decreased loss of appetite. If zinc deficiency is not identified and treated, decreased loss of appetite can eventually lead to anorexia. Impairment of cognitive and motor functions. Its deficiency in a pregnant mother can not only weaken the mother, but can also cause damage to the fetus’s neurological system, impairing the motor skills and cognitive skills of the infant. Other signs of zinc deficiency are reduced fertility, rashes on the skin, spots on fingernails, sleep disturbace, loss of sex drive, loss of taste or smell, and ­ in some cases ­ mild anemia. Share This
From our Research Centre 05 Feb 2021 Dr. Frederick Charles von Heidenstam in Cyprus The last Sunday of January is known as World Leprosy Day, dedicated to raising awareness of Leprosy or Hansen’s Disease that many people believe to be extinct. According to the World Health Organization, this day was chosen by French humanitarian Raoul Follereau in 1953 to coincide with the anniversary of Mahatma Gandhi’s death on 30th January 1948. CVAR’s photographic archive houses historic photographs that constitute important resources for leprosy in Cyprus during the early years of British rule on the island. The main protagonist in these images is Dr. Frederick Charles von Heidenstam, who was assigned in 1882 as chief medical officer in Cyprus. In one of the images, he was photographed standing in front of the church of Saint Charalambos at the leper farm in Nicosia, 1906. When the British arrived on the island, the Cyprus leper farm was situated a few miles outside Nicosia. It was established during the Ottoman period as a result of Hadjigeorgakis Kornesios’s reaction to the Pasha’s decision to dissolve the lepers’ camp situated outside Famagusta Gate. Being concerned about the fortune of these people, the dragoman spared a small plot of land for their use, where they were to live by cultivating the land. However, due to the Ottomans’ mismanagement and disinterest in the farm and its residents’ wellbeing, the lepers occasionally were leaving the farm and went begging once again. In 1882 when Dr. Heidenstam was appointed chief medical officer, the living conditions at the farm improved tremendously. Under his supervision, two stone-building houses were constructed and soon occupied, while he made sure that the sick would receive medical care from district medical officers. He was also responsible for the construction of a kitchen, religious spaces for the Christians and Muslims, and the improvement of the irrigation system at the farm. Interestingly enough, in his report on leprosy in Cyprus published in 1890, he referred to his proposal to transfer the leper farm to the Klidhes Islands situated at the north point of the island. However, he stated with great disappointment that the idea was abandoned after haphazard consideration by the authorities. If it were to take place, it would have been similar to the Cretan Spinalonga that run as a lepers’ asylum from 1903 – 1957. Dr. Heidenstam served as chief medical officer in Cyprus until he died in 1909. He arrived on the island in 1876 where he was appointed medical officer by the Ottoman administration. Further to the arrival of the British in 1878, he was appointed mayor of Larnaca and at the same time served as police magistrate. He was of Swedish origins, born in Athens, and married to a Greek woman from the Ionian Islands. Even though he was a foreigner, his work was highly appreciated in Cyprus and became widely accepted by the locals. He was buried in the British cemetery in Nicosia. FORC - 5 .2.2021 -pht_01966-1.jpg From our research center - 5 February 2021 - pht_01885-1.jpg Discover More
sour weed plant The best perspective for your health The best perspective for your health Red sorrel, Rumex acetosella, sheep’s sorrel, sour weed CLICK FOR: CLICK FOR: Nutrient tables Red sorrel is a very common herb. It can be used as a spice raw or cooked. It is best to use when its leaves are green. If the leaves are red in color, this is a sign that it contains a high amount of oxalic acid. It blooms from May to the beginning of August. General information: From Wikipedia: “Rumex acetosella, commonly known as sheep’s sorrel, red sorrel, sour weed and field sorrel, is a species of flowering plant in the buckwheat family Polygonaceae. The plant and its subspecies are common perennial weeds. It has green arrowhead-shaped leaves and red-tinted deeply ridged stems, and it sprouts from an aggressive and spreading rhizome. The flowers emerge from a tall, upright stem. Female flowers are maroon in color. Distribution and habitat: The plant is native to Eurasia and the British Isles, but it has been introduced to most of the rest of the Northern Hemisphere. It is commonly found on acidic, sandy soils in heaths and grassland. It is often one of the first species to take hold in disturbed areas, such as abandoned mining sites, especially if the soil is acidic. Livestock will graze on the plant, but it is not very nutritious and is toxic in large amounts because of oxalates. The American copper or small copper butterfly depends on it for food.” “A perennial herb that has a slender and reddish upright stem that is branched at the top, reaching a height of 18 inches (0.5 meters). The arrow-shaped leaves are small, slightly longer than 1 inch (3 cm), and smooth with a pair of horizontal lobes at the base. It blooms during March to November, when yellowish-green (male) or reddish (female) flowers develop on separate plants at the apex of the stem, which develop into the red fruits (achenes). Rumex acetosella is widely considered to be a hard-to-control noxious weed due to its spreading rhizome. Blueberry farmers are familiar with the weed because it thrives in the same conditions under which blueberries are cultivated. Culinary uses: There are several uses of sheep sorrel in the preparation of food including a garnish, a tart flavoring agent, a salad green, and a curdling agent for milk in cheese-making. The leaves have a lemony, tangy or nicely tart flavor. It is also known as sheep shower in parts of the country and there is a recipe for sheep shower wine online.” ​Interesting facts: “The oldest fossil record of red sorrel comes from the Boreal/Atlantic and was found in 1931 near Moosburg (Baden-Württemberg, Germany). The oldest literary mention is by Johann Bauhin in the year 1592.*” Red sorrel, Rumex acetosella, sheep's sorrel or sour weed has a sour taste and contains many natural chemicals, including oxalic acid.
kids encyclopedia robot Multiverse facts for kids Kids Encyclopedia Facts Physical cosmology WMAP 2010.png Universe · Big Bang Age of the universe Timeline of the Big Bang Ultimate fate of the universe A multiverse is the theory of a conjectured set of multiple possible universes, including ours, which make up reality. These universes are sometimes called parallel universes. A number of different versions have been considered. The term "multiverse" was coined in 1895 by psychologist William James as a philosophical concept. The cosmological multiverse The cosmological multiverse tries to explain why the universe we observe i.e. ''our universe'' seems so welcoming to the emergence of life. Even small changes to the way physics works would make life impossible. In a multiverse a vast number of universes are randomly created and some happen to favour life emerging there. Many inhospitable universes would also have been created, but there would be no life there to observe their existence. The quantum multiverse The quantum multiverse is another version in which our universe splits into alternative futures with every quantum event. This is called many-worlds interpretation of quantum mechanics. kids search engine Multiverse Facts for Kids. Kiddle Encyclopedia.
What is the Sound Equivalent of a Visualization? Visualizations are well-studied, understood, and popularized. They are a part of every day life—we see weather maps, activity circles, and stock charts every day. We know the names of the patterns: bar chart, pie chart, line chart, etc. We learn them in grade school. You probably put one in your slide deck last week. I’ve often wondered why this was not true of Sonifications. If you’re like me, this term will be new to you. It actually took me a while to find it—my google searches came up with Auralizations and Audibilizations first. But, if you’re talking about trying to understand data with sound, the correct term seems to be Sonification. There is a body of research about it in academia, but it doesn’t extend much outside of there. As far as I can tell, there is no equivalent to Edward Tufte’s visualization books, but for sound. There is no way to make them in Excel. But they are all around us. We hear, make, and use them all of the time. Consider just the ones you might encounter while driving. When you honk your horn, you are conveying information about your car and mood to others. Similarly, an ambulance uses a siren to convey their position and direction to you. My car tells me (with beeps) if I am drifting out of my lane. It gets even madder if I am about to hit something. It beeps whenever I shift into reverse. Turning signals remind me to turn them off with a steady metronome-like beat. So do the hazard lights. I get warnings when my lights are left on, the keys are locked in, or if I don’t fully shut the door. If my radio is tuned to traffic, that’s a kind of Sonification (data -> speech). My GPS does the same kind of thing for directions. Radar detectors buzz if they detect the fuzz. So, I hope I have convinced you that Sonifications are common. In my own thinking I have come up with these few similarities that seem to tie them together • Sonifications are real-time • Sonifications are actionable • Sonifications interrupt you while you are engaged doing something else This is why we use them in a car. You are completely busy, with your vision fully engaged in a life or death activity. The sonifications are there to tell you that something important needs to be done right now.
Sarah Davis • Why are women's friendships so tricky? During a particularly painful time in her life, Sarah Zacharias Davis learned how delightful-and wounding-women can be in friendship. She saw how some friendships end badly, others die slow deaths, and how a chance acquaintance can become that enduring friend you need. The Friends We Keep is Sarah's thoughtful account of her own story and the stories of other women about navigating friendship. Her revealing discoveries tackle the questions every woman asks: - Why do we long so for women friends? - Do we need friends like we need air or food or water? - What causes cattiness, competition, and co-dependency in too many friendships? - Why do some friendships last forever and others only a season? - How do I foster friendship? From the Trade Paperback edition. • This concise text delivers a basic introduction to neurology and is designed for use by medical students during their rotation in neurology and related disciplines. Updated and expanded, this second edition follows the same order as the first, starting with how to approach a patient with a neurologic problem followed by the latest information on the phenomenology, pathophysiology and symptoms of common adult and pediatric neurologic diseases.  Supplementing the learning experience are clinical cases that begin each chapter and videos of examples ranging from how to perform the normal neurologic exam to abnormal exam findings.Easy-to-read and richly illustrated, Fundamentals of Neurologic Disease, 2nd Edition is an invaluable resource for anyone seeking to learn the fundamentals of neurology. • "This book is a really practical, hands-on guide packed with a wealth of advice on strategies and "things to try" reflecting the authors' extensive experience. If you want to make effective, inclusive dyslexia-friendly classrooms a reality rather than an aspiration, this book is for you." - Dr John P. Rack, Head of Research and Development, Dyslexia Action Chapters cover: understanding learners with dyslexia dyslexia and phonics dyslexia and English as an Additional Language dyslexia and mathematics dyslexia and science dyslexia and creativity Barbara Pavey is a lecturer in Higher Education, training dyslexia specialists in the North of England. Margaret Meehan is Coordinator of Specialist Tuition at Swansea University. Sarah Davis is an Early Years Leading Teacher working in North Yorkshire.
playing chess Geometric Distribution The geometric distribution computes the probability that the first success of a Bernoulli trial comes on the kth trial. Sign up and browse through relevant courses. For example, suppose we want to roll a four on a six-sided die. Probability of success is fixed 3. Geometric distributions 1. Geometric Distribution 3 Stanley Milgram, a Yale University psychologist, conducted a series of experiments on obedience to authority starting in 1963. The random variable is the number of rolls until we get a four. In a geometric experiment, define the discrete random variable X as the number of independent trials until the first success. Type: ppt. Post to: Tweet. If Y has the geometric distribution with probability p of success on each trial, the possible values of Y are 1, 2, 3, … . We say that X has a geometric distribution and write [latex]X{\sim}G(p)[/latex] where p is the probability of success in a single trial. statistics; wilt; High School; Mathematics; Discussion . Trials are Independent 4. Geometric Distributions PowerPoint Add to Favourites. Teaching about the geometric distribution is likely to be new for your students and may also be new for you to teach. Its inclusion on the syllabus for Cambridge International AS & A Level Mathematics Probability and Statistics for examination from 2020 is, perhaps, the most significant change from the previous syllabus. 4 Parts of a Geometric Distribution 1. Upload Content | Embed Content. Description explanation of Chapter 8.2. We will roll until we get a four, then we stop. Outcomes are success or not success 2. If k is any one of these values, P(Y=k)=(1−p)k−1p GeometricProbability(12/9/12 7 • Mean of a Geometric Distribution The table below shows part of the probability distribution of Y. Experimenter (E) orders the teacher (T), the subject of the experiment, to give severe electric shocks to a learner (L) each time the learner answers a question incorrectly. The probability of getting a four on the first roll is P(1)=1/6. Geometric Distribution 2. An introduction to the Geometric distribution, complete with ACE objectives and a comparison starter to the Binomial distribution. Formalizing Geometric Probability Distribution • Geometric Distribution is a discrete random variable that arises from the Bernoulli trials; trials are repeated until the first success • Geometric Experiment: a set of repeated, independent Bernoulli trials, each with a probability of success of p. • Probability p of success (p) and failure (1-p) do not change from trial to trial. Want to learn? Why Does Lsu Only Wear White, Canlı Radyo Dinle Kesintisiz, Edinburgh Population Growth, Middlegame Wiki, Marshall Attack Main Line, Best Steam Mop, Coralito's Signature Vs Perfect Agony, Ab Ovo Company,
What is The Innate Religion? Islām is referred to as the deen-ul-fiṭrah, which translated from the original Arabic means 'the religion/way of human nature' or simply: ‘the innate religion’. That is, the way or inclination which is most natural to mankind. Intrinsic to the nature of the design of mankind is a bias or inclination, which has a role in how we decide what feels right or wrong; natural or unnatural; moral or immoral. "So direct your face towards the religion, inclining to truth. Adhere to the natural disposition upon which Allāh[1] has created all people. There should be no change in the creation of Allāh [so let people remain true to their inherent good nature]. That is the correct religion, but most of the people do not know." (Qur'ān, Chapter 30, verse 30) Although people have an intrinsically moral bias, they also have needs, weaknesses and can have selfish tendencies. These can often overrule their natural inclination towards good. Therefore, the 'moral bias' is not always enough. It needs to be supplemented with guidance and discipline. According to Islām, every child is born in this natural disposition: the fiṭrah. All people are born innocent and pure, however, they may in later life be corrupted and act against their good nature. In Islām, there is no concept of 'Original Sin' as every person is accountable for themselves. One person's wrong-doing is not transferred to another to carry the consequences. "No soul earns any blame except against itself, and no bearer of burdens will be made to bear the burden of another. Then to your Lord is your return and He will inform you concerning that over which you used to differ." (Qur'ān, Chapter 6, verse 164) Islām is a way of life and is not exclusive to a group of people or a period of time. It is for everyone to benefit from for all of time. Anyone can choose Islām. Accepting Islām is "as simple as 1,2,3"... (1) having a pure monotheistic belief in God, (2) declaring that belief, (3) acting upon and benefiting from that belief. The only condition is sincerity in all the above: (1) sincerity of belief, (2) sincerity of speech, (3) sincerity of action. One's belief should affect one's conduct. If it does not, then their belief is either not sincere or not important. So what are key aspects of Islām that can benefit people? This website provides an overview (see menu options on the left) and the answers to this question can also be further elaborated by useful (external) links provided. [1] See article: “What is the Name of God? A brief illustrated guide to understanding Islām. Answers regarding the truth of Islām. Information pertaining to Islām's compatibility with established science.
Any Increased Risk for Overdose if You Mix Opioids & Amphetamines? Opiates or narcotic drugs are the class of drugs that include prescription pain medications, such as Vicodin (acetaminophen and hydrocodone), morphine, OxyContin (oxycodone), codeine, and the illicit drug heroin. Opiate drugs are central nervous system depressant drugs. Most of the opiates that are available with a prescription are classified as Schedule II controlled substances (medicines with less than 90 mg of codeine are classified in Schedule III), whereas illicit opiates like heroin and desomorphine are classified in Schedule I by the United States Drug Enforcement Administration (DEA). The primary medicinal uses of opiate drugs include pain control, although other uses are also approved. Amphetamines are central nervous system stimulant drugs. These drugs are often used medicinally to improve attention and concentration, promote wakefulness, reduce the lethargy associated with brain injury or metabolic disorders, and as dietary aids. Amphetamines are generally classified as Schedule II controlled substances by the DEA, although some weaker stimulants similar to amphetamines can be found in over-the-counter diet aids and other over-the-counter products. Mixing amphetamines and Opioids is extremely dangerous The practice of mixing central nervous system stimulants (amphetamines) and central nervous system depressants (opiates) is not uncommon, as individuals who engage in this practice are typically trying to promote the psychoactive effects they desire from these drugs while at the same time trying to cancel out their negative effects. The practice is also extremely dangerous. Issues with Mixing Amphetamines and Opiates In many circles, the combination of an opiate drug and a central nervous system stimulant is referred to as a setup or even a speedball, though this term most often applies to combinations of cocaine and heroin or cocaine and morphine. According to sources, such as the textbook Concepts of Chemical Dependencyand the three-book series Neuropathology of Addictions and Substance Misuse, combining stimulants and depressants can lead to serious risks. • If either of the drugs is being used for medical reasons, combining central nervous system stimulants and central nervous system depressants reduces the effectiveness of the medicinal purposes of one or both drugs. • This combination leads to an increased risk for overdose. The effects of the stimulant medication counteract the effects of the opiate medication. Individuals may believe they have a much higher tolerance for the opiate drug than they actually have, and they may take excessive amounts of the opiate. Stimulant drugs are typically metabolized quickly in comparison to central nervous system depressant drugs like opiates, and a person using both of these drugs may wind up with dangerous levels of the opiate drug in their system. This can lead to toxic effects or an overdose, which can be fatal. • The opposite situation is also possible, where the individual ingests more stimulant medication that they can tolerate due to the countering of the stimulant effects by the opiate drug. This can lead to the potential for overdose or toxic effects associated with the stimulant drug. Amphetamine overdose can also be fatal; however, the more common complication is overdosing on the opiate drug. • Combining drugs that have opposite mechanisms of action and opposite effects can lead to an increased potential for side effects, such as nausea, vomiting, or allergic reactions. • Combining opiates and amphetamines can lead to an increased risk for heart attack or stroke. • Mixing these substances leads to an increased burden on the liver. Over time, this can lead to serious liver damage. • Individuals who combine these drugs orally run the risk of developing issues with the gastrointestinal system, such as ulcers or abscesses. • The effects of these drugs lead to significant alterations in cognitive capacities. This contributes to an increased potential for accidents due to poor judgment or engaging in risky behaviors that an individual would not normally attempt. • There is an increased risk for an individual to experience seizures when amphetamines are combined with opiates. Seizures can be potentially fatal. • There is increased risk for an individual to experience psychosis, which consists of having hallucinations and/or delusions. Psychotic individuals are a danger to themselves and others. • Other psychiatric effects can occur as a result of this combination, including mania, depression, anxiety, extreme mood swings, and even potential suicidality. • Chronic use of opiates and amphetamines in combination can lead to the development of significant tolerance to one or both of these drugs. This can result in the person needing more of one or both drugs to get the same effects that they previously experienced at lower amounts. Developing tolerance to drugs increases overdose risk. • The development of tolerance is often followed by the development of withdrawal symptoms. Once an individual has developed both tolerance and withdrawal, they have developed physical dependence on a drug. • Individuals who regularly engage in polysubstance abuse are more likely to develop substance use disorders, a form of a mental illness that will eventually require professional intervention. • Individuals with substance use disorders are far more likely to be diagnosed with another mental disorder, including trauma- and stressor-related disorders, anxiety, depression, eating disorders, personality disorders, etc. • Having a chronic substance use disorder is associated with poorer physical health, lower rates of employment, and higher rates of mortality compared to individuals without substance use disorders. The Need for Professional Help Get professionals help for polysubstance abuser's Individuals who engage in polysubstance abuse typically do so in an attempt to capitalize on the desired psychoactive effects of two or more different drugs. However, there is always a cost associated with any choice, and the costs associated with drug abuse typically far outweigh any of the subjective benefits that one may perceive. The costs associated with combining amphetamines and opiate drugs are very high. They can range from minor issues associated with accidents to severe physical and mental health issues, including potential overdose. For many individuals, recovery from an overdose, even if the overdose did not produce serious long-term effects, is costly and emotionally draining. Moreover, the potential for suffering significant brain damage that will not resolve or the potential for a serious overdose that can lead to death is increased when an individual combines amphetamines and opiates. The desire to use prescription medications or illicit drugs in an attempt to chase positive mood states or to escape negative feelings and replace them with artificially induced short-term feelings of wellbeing represents a severe form of maladjustment that becomes chronic for many individuals. Those with polysubstance abuse problems are often very difficult to treat, have more serious issues with relapse, and will often be involved in a very long-term and complicated treatment program. Anyone who is habitually using amphetamines in conjunction with opiates, and not doing so under the supervision of a physician and according to the instructions of the physician, should discuss their issues with a licensed mental health clinician who specializes in the assessment and treatment of addictive behaviors. You aren't alone. You deserve to get help.
New Millennium Spacecraft It's called the New Millenium Initiative, a revolutionary new way to build spacecraft for the 21st century. Mary Kicza is with NASA's Office of Space Science. "We're preparing to launch smaller spacecraft on the order of 250 kilograms. New Millenium is going to push that even further still and get to the 50 kilogram and hopefully into the tens of kilograms" range for spacecraft. One minute Frontiers version:
Ultimate You Change Centre Does Stretching Help Prevent Muscle Injuries? There has been a lot of ongoing debate whether or not stretching before exercise helps. The Centers of Disease Control and Prevention has finally released the results of its research of more than 350 case studies regarding stretching and muscle injury. So does stretching have an effect on muscle injury prevention? Unless you’re a gymnast, then stretching those muscles before some serious exercise does very little to impact or avoid muscle strain and tear. According to CDC’s Julie Gilchrist, M.D., one of the researchers for the study, she explained that it is the warming up that averts muscle strain. Poor exercise techniques are usually the causes of muscle injuries such as a rip or tear. It is essential to be informed with how the body’s connective tissues work and its biochemical functions. The human body is equipped to handle strain but only to a certain degree. The legs and arms have limited range of motions that incorrect body mechanics can wreak instant damage. If you are stress-loading an arm with a barbell, then contorting the rest of body raises your risk of injury. An Overview on Muscle Tear When undue pressure such as sudden heavy lifting during workout during sports activities or even performing routine tasks, you risk damage to muscle fibers and its attaching tendons. Small blood vessels can also tear resulting in localized bleeding and therefore bruising or inflammation. Some of the symptoms of muscle tear are: –          Pain even when at rest –          Bruising, inflammation and redness –          Limited movement –          Inability to move the muscle In instances where you have injured a muscle, protect the torn muscle from further injury by resting and avoiding activities that can aggravate the damage. You can also ice the bruised area every 20 minutes as this would counteract the swelling and can provide some pain relief. However, if these home remedies do not help or the pain and swelling has not subsided in the next 24 hours, seek medical help. Warm-Up’s, Why They are Important The psychological and physiological benefits of warming up are many. Athletes and physically active individuals perform some type of warm-up before going into their daily exercise routine. It is the warming up that gives any athlete or workout enthusiast the needed flexibility, revving the muscles and conditioning them for the strenuous activity. Experts say that proper warm-ups work to increase the circulation and blood flow to the muscles that are being exercised. As a result, muscle stiffness is avoided and performance is optimized. Other benefits of warming up also include: • Increases cooling efficiency by activating the body’s heat-reducing mechanism. This is also known as efficient sweating where the person who is working out is prevented from overheating. • Better range of motion. Flexibility of the joints is increased allowing more mobility and strength. • Improved blood temperature. This aids the body’s oxygen to lessen its bind on the hemoglobin of the blood. In effect, oxygen is readily distributed and utilized. • Increased temperature of the body. This essentially results in pliability of the muscles making it less prone to injury. • Elevated muscle temperature. Warming up increases the temperature within the muscles which makes it more elastic and easy to contract.  It also aids the muscles that are being worked out to relax more quickly. • Overstretching of the muscles is reduced. • Dilatation of the blood vessels means better circulation and lower stress to the heart. • Warming up hypes the production of different hormone production that promotes regulation of energy output. • Psychological prep. The warm up is an ideal time to clear the mind and prepare a focused, clear vision of the upcoming exercise or activity. *Note that warm-ups don’t include stretching alone. thumbnail photo credit: blog.gaiam.com
1) My father_______ a suit to work. a) wear b) wears c) is wearing d) wearing 2) We _______ TV now. a) watching b) wear c) wears d) are watching 3) The children_______ swimming lessons every week. a) have b) are having c) has d) are have 4) Look, Mary _______. a) sleeps b) sleep c) is sleep d) is sleeping 5) _______ now? a) Do they sunbathe b) Do they sunbathing c) Are they sunbathing d) Are they sunbathe 6) Jake _______ for the exam at the moment. a) studying b) studies c) studys d) is studying 7) Fran _______ her grandparents once a week. a) visits b) visit c) is visiting d) is visits 8) _______ on the phone now? a) Does she talk b) Is she talkking c) Is she talking d) Is she talk 9) They _______ on Sundays. a) don't work b) doesn't work c) aren't working d) not work 10) They _______ basketball every afternoon. a) are playing b) are play c) plays d) play Promijeni predložak Interaktivne aktivnosti Vrati automatski spremljeno: ?