text stringlengths 144 682k |
|---|
Long Term complications of Hypertension
High blood pressure is a common condition in which the long-term force of the blood against your artery walls is high enough that it may eventually cause health problems, affecting almost every organ systems.
Complications of Hypertension
Uncontrolled high blood pressure can lead to complications including:
• Heart attack or stroke. High blood pressure can cause hardening and thickening of the arteries (atherosclerosis), which can lead to a heart attack, stroke or other complications. Keeping the blood pressure at check ensures further delaying and prevention of these complications.
• Aneurysm. Increased blood pressure can cause your blood vessels to weaken and bulge, forming an aneurysm. If an aneurysm ruptures, it can be life-threatening. Avoiding spikes in blood pressure over the years is protective for these complications.
• Weakened and narrowed blood vessels in your kidneys. This can prevent these organs from functioning normally. Kidney complications are preventable if measures to keep blood pressure at check are adopted from the start.
• Thickened, narrowed or torn blood vessels in the eyes. This can result in vision loss.This also is a preventable complication,if the spikes in blood pressure over the years is avoided.
• Metabolic syndrome. This syndrome is a cluster of disorders of your body’s metabolism, including increased waist circumference; high triglycerides; low high-density lipoprotein (HDL) cholesterol, the “good” cholesterol; high blood pressure and insulin resistence. These conditions make you more likely to develop diabetes, heart disease and stroke. Maintaining the blood pressure at check during the years prevents these complications in later years.
• Trouble with memory or understanding. Uncontrolled high blood pressure may also affect your ability to think, remember and learn. Trouble with memory or understanding concepts is more common in people with high blood pressure. Repeated damage to the brain cells by high blood pressures can be prevented by managing blood pressure from the start by various lifestyle changes.
• Neurological complications like dementia (Memory loss),can also be prevented by avoiding undue surge in BP over the years.
Lifestyle changes can help you control and prevent high blood pressure along with the blood pressure medications advised by your doctor. Here’s what you can do:
• Eat healthy foods. Eat a heart-healthy diet. Avoid saturated fats and trans fats.
• Decrease the salt in your diet.
• Limit alcohol. Even if you’re healthy, alcohol can raise your blood pressure. If you choose to drink alcohol, do so in moderation.
• Don’t smoke. Quitting smoking is the only way to prevent complications.
• Manage stress. Reduce stress as much as possible.
• Monitor your blood pressure at home.
• Control blood pressure during pregnancy. If you’re a woman with high blood pressure, discuss with your doctor how to control your blood pressure during pregnancy.
Regular visits to your doctor and getting the right tests done is important. They can detect irregularities in your blood pressure early on.
It’s vital to pay attention. This is especially true when it starts to show up with problems in other parts of your body.
Pay attention to your body and take care of yourself.
-Dr Prerna Gaur |
Recap of the day -21/12/18
Recap of the day -21/12/18
Language: Students presented their understanding of sensory words through google presentation and illustrations and also as a class decided the success criteria for creating a Poetry.
U O I – Learners visited the 94.3 MY FM. (Field trip for the Media unit).
Language: Describe the image given below using the sensory words.
Math :
Refer the link below and solve Task 1 in graph book and Task 2 in math homework book.
Mixed bag cycle 21 Math
U O I –Listen to RJ Pratiksha on MyFM on either of the days (Saturday or Sunday) and in your UOI notebook, answer the questions stated below. Do write the start time and end time of listening to the show.
1. What are the messages conveyed by RJ Pratiksha during her show? What was the purpose of the messages? Do you agree with the messages?
2. Identify any one advertisement which is repeated during her show. What was the tagline of the product/message? What was the message of the advertisement? Do you agree with the message?
3. How many times was the Jingle and tagline of MyFM played?
Comments are closed. |
How Bitcoin started the decentralized era
Nicholas Say
Nicholas Say
Do you wonder how Bitcoin started a new era in finance? It is pretty simple. Bitcoin proposed the radical notion that we don't need centralized authorities controlling vital social systems. One of the biggest issues of the modern era is how small groups have taken up power over systems like money, which was basically impossible before central banks existed.
Instead of using fiat currency, which can be created and spent by the centralized authorities, Bitcoin encourages the use of honest money that is totally open to public inspection. While Bitcoin does offer some amount of privacy, all the transactions can be inspected on the blockchain.
In a centralized financial system, the public has little, if any, oversight, and this leads to abuses of power. Economies work better when money is sound, and can't be created at will. Bitcoin also creates a global standard for exchange and development that can't be influenced by nations that have more power.
The decentralization that Bitcoin engenders is only beginning. Most people still don't understand Bitcoin, how to use it, or why it keeps going up in value. This will likely change as more people know why Bitcoin can change the world for the better. |
Christianity cookies notice
Join our newsletter
Subscribe above
Capital punishment and assisted dying
Capital punishment and assisted dying are controversial subjects even among Christians, but the bible offers some guidance.
Read time: 3 minutes, 15 seconds
Human life is precious. Christians believe there is something special and unique about human beings: all humans, no matter how tiny, frail or fallible, are made ‘in the image of God’. All humanity shares something of his nature. The Bible says God made people ‘a little lower than the angels and crowned (us) with glory and honour’. Life is a God-given gift. That means men and women should conserve and respect human life. But every person is doing to die - death is inevitable, but it is not the end. Christianity teaches that our time on earth is only a fraction of our existence. God is eternal and has given us the possibility of an eternity in relationship with him. That changes the perspective on death and leads some to the conclusion there is no absolute duty to save every life no matter what the cost. The Bible is very clear that murder is wrong. But there are some issues of life and death where Christians do not agree and continue to debate the ethics involved. Two of these are assisted dying and capital punishment.
The death penalty
The Christian faith is the source of many of the foundations of modern society including the justice system. Many countries have abolished the death penalty or capital punishment for serious crimes but it is still used in others. The Bible refers to capital punishment. The laws which God gave to the ancient Hebrew people around 3,500 years ago set out the exceptional circumstances in which it was to be carried out. These seem very harsh from our modern perspective but the context was very different to our times. Bible books including Exodus and Leviticus refer to taking ‘life for life, eye for eye, tooth for tooth…’ In part, this was about making sure any punishment given to an offender was appropriate for the crime that had been committed.
Some Christians believe that the death penalty is still acceptable as a last resort. But for others it is not. In his teachings recorded in the Bible book Matthew, Jesus says, ‘you have heard that it was said “eye for eye and tooth for tooth”. But I tell you do not resist an evil person… love your enemies, do good to those that hate you…’ The World Council of Churches, which includes hundreds of Christian denominations, campaigns vigorously to have the death penalty abolished around the world. It argues that an irreversible punishment makes it impossible for someone to do what God wants them to do: ask for forgiveness and change their ways.
Continued below...
Christianity Capital punishment and assisted dying
Assisted dying
Medical progress has created new ethical questions about the sanctity of life.
Assisted dying or euthanasia is another subject where Christians disagree. Recent advances in medical treatment have prolonged the lives of chronically ill people and given many the chance of life where it would have been impossible decades ago. But this medical progress has also created new ethical questions about the sanctity of life and a person’s right to end their life or ask someone else to help them to do so. The Bible does not give clear answers to these questions. Some Christians think that a desperately ill person with no hope of recovery should be allowed to choose when and how to end their life. They see assisted dying as merciful. Others believe that everyone’s life has value, no matter the situation; that life is a God-given gift which only God can bring to an end. Critics of euthanasia are also concerned that vulnerable people should never be pushed towards assisted dying because they feel they are a burden to their family and to society. Most Christians would favour the best use of pain control and compassion rather than allowing someone else to intervene to accelerate death. |
Writing attention grabbing introductions
I ran down the stairs full of excitement.
writing attention grabbing introductions
Comment below and share your favorite one! Make that happen if your world fails to line up perfectly. An attention getter is also called a hook because it hooks the reader, just like a fishing hook.
A simile is less strong than a comparison in a metaphor. It consists of an intriguing opening that is designed to grab your reader's attention. Introduction to english essay.
Catchy hooks for essays
If a pomelo and a grapefruit sound a lot alike, it's because they are actually related. Why not, after all? In this essay, I intend to walk you through milk's journey from dairy farms to your refrigerator. This little town is famous for its free range wild chickens. At the beginning of your essay you should classify similarities and differences of. If the attention grabber was only a sentence or two, add one or two more sentences that will lead the reader from your opening to your thesis statement. Do they want to see that you understand a subject? These tactics only tend to confuse audiences, if only for a few seconds, which is all it takes to lose them — and a confused mind does not pay attention. A good description hook will make your reader want to know what comes next in your writing. Here is an example of a descriptive lead. It is important. Anecdote An anecdote is a story that illustrates a point. Example of a Descriptive Essay Attention Getter The house felt warm and smelled of wood smoke, pine, and cinnamon from my dad's delicious baked apples. The children, let out of school to march along Main Street in their Halloween costumes, collected candy from the merchants along the parade route. Attention grabbers for essays.
That doesn't give you much text to convince readers to stick around. You don't ever want the choice of balance to be.
Just about everyone in the small town was there. Use only two or three exchanges between speakers to make your point.
how to grab the readers attention examples
It is also a city that has passed many dog-friendly laws and regulations. But both share something very, very important; a love of pizza.
Rated 6/10 based on 103 review
Basics of essay writing |
• Singapore starts to assemble one of the world’s largest floating photovoltaic farms.
• Bird deaths from wind turbines drop by 72% when a single blade is painted black.
• The next generation of solar panels could produce almost one-third more electricity.
Singapore solar
Singapore’s Public Utilities Board (PUB) and marine and utilities group Sembcorp Industries have begun to build a 60 megawatt-peak (MWp) floating solar photovoltaic farm. It’s on the Tengeh Reservoir in the Western Water Catchment in the West Region of Singapore.
Singapore has opted for a floating solar farm because the island has a scarcity of land. The solar farm will occupy an area equivalent to 45 football fields when it’s finished. It will power water treatment plants and offset 7% of the PUB’s energy needs. It will go live in 2021.
It uses double-glass PV modules mounted on high-density polyethylene floats. The PV panels are UV-resistant in order to prevent sunlight damage.
PUB said that the solar farm will “have minimal impact on the reservoir’s water quality and biodiversity.”
Bird-friendly wind turbines
A study from the Norwegian Institute for Nature Research found that painting one out of four white wind turbine blades black reduces the amount of birds killed by the blades by 72%.
Why does this work? The scientists say it’s because of something called “motion smear.” The movement of the all-white blades makes them appear invisible to birds, who have excellent peripheral eyesight, but they can’t see as well when they look forward. So having one black blade is easier for the birds to spot.
The study, which is published in Ecology and Evolution, was conducted on Norway’s island of Smøla for 7.5 years before the blades were painted, and 3.5 years after treatment.
Of the eight turbines used in the research, four were painted and four were left bare. There were a total of 1,275 searches conducted for dead birds between 2006 and 2016. The birds that benefited the most from the painted blade were large birds and birds of prey, such as eagles and vultures.
Solar tech breakthrough
Oxford University spin-off Oxford Photovoltaics Limited has developed technology that could enable solar panels to generate almost one-third more electricity.
Oxford PV has discovered that coating solar panels with a thin layer of perovskite crystal increases power generation because perovskite is able to absorb different parts of the solar spectrum than traditional silicon.
The Guardian explains:
The mineral perovskite, also known as the crystal calcium titanate, was first discovered by a Russian mineralogist in the Ural mountains in 1839. In the last 10 years, scientists around the world have been locked in a race to engineer chemical compounds based upon the perovskite crystal structure but that are able to generate more renewable electricity at a lower cost.
A silicon solar cell can convert around 22% of available solar energy into electricity. Oxford PV’s perovskite-on-silicon solar cell can reach a level of up to 27.3%.
Oxford PV aims to start manufacturing the perovskite panels by the end of 2020 and start selling them within the next year.
Photo: PUB
FTC: We use income earning auto affiliate links. More.
About the Author |
Netting fruit trees
Killed by netting. Photograph: Denise Wade
Killed by netting. Photograph: Denise Wade
Whether it is a backyard fruit tree or an orchard, netting can provide a reliable physical barrier between animals and a crop. Growers can use a range of netting options to protect orchard crops from damage by flying foxes, birds, possums, rats, and even some insects.
Using the right type of netting will protect the fruit. Using the wrong type, or badly erected netting may injure or kill animals if they become entangled. This is recognised across Australia as a cruel and unnecessary cause of stress, injury and death for a range of animals—both wild and domesticated—and a campaign is underway to encourage the use of safe netting to stop the deaths of thousands of animals each year.
Effective use of netting
Who’s eating the fruit?
The first step in netting a fruit tree is to identify the type of animal eating the fruit and whether netting will solve the problem.
Fruit can be damaged by a range of different animals, and for netting to have any impact, it must create a barrier between the fruit and the animal trying to eat it. Netting is only an effective solution where the fruit is being eaten by larger birds or mammals like rats, possums or flying-foxes.
Bird damage is relatively easy to detect as they will be feeding during the day. Mammals are nocturnal, but will leave clues like damaged fruit with teeth marks, scratchings on the bark, or a scatter of droppings under the tree.
The following guide will help identify what type of mammal is eating your fruit.
SpeciesIndication of presence
• compressed pellets of fruit pulp that are spat out after the juice has been squeezed out of them
• ‘squirts’ of droppings
• partially-eaten fruit (may show scrape marks made by small front teeth and large canines)
• fruit dropped on ground away from tree.
Common ringtail and common brushtail possums
• partially-eaten fruit showing a series of scrapes (may show scrape marks from the front row of six teeth, forming a groove about 10mm wide)
• fruit disappears (can be carried away by brushtail possum)
• pellet-shaped droppings (around 10–15mm long) under tree
• can be seen with a torch at night.
• partially-eaten fruit showing a series of small scrapes (may show scrape marks of a single pair front teeth, each about 2mm wide)
• small pellet-shaped droppings less than 1cm long.
Is it worth netting?
It is important to weigh up the cost of netting against the value of the fruit being grown. If netting is too costly, it may be better to consider some alternatives (see below), or accept that a small percentage of fruit will be eaten by wildlife. In times of drought when there is little food around for native animals you, may even remove netting and sacrifice some of your fruit to help local animals survive.
Will netting affect how the fruit develops?
No. Netting allows fruit to develop while protecting it from possums, birds and flying-foxes as well as wind and hail damage. It can even form a better microclimate for a fruit tree to grow in and for fruit to develop. The size of the mesh must be large enough to allow pollinating insects to reach any flowers on the tree and fertilise them. Avoid using shade cloth as it can make fruit go mouldy.
Netting safely for wildlife
Types of netting
Sturdy netting with a knitted mesh and a small aperture less than 5mm by 5mm, woven from strands 500 microns thick (minimum) will keep out birds, possums, flying-foxes and rats. White coloured netting is best as it stands out against the foliage of the fruit tree. This will make it easier for flying-foxes to see and avoid. This type of netting will also protect fruit from sunburn, hail damage and fruit fly.
Suitable netting can be purchased from hardware stores, nurseries or specialist netting manufacturers.
Thin nylon (monofilament) netting should not be used as it is easily pulled out of shape by an animal climbing on it, causing the animal to become entangled. Once entangled, birds and flying-foxes become stressed, breaking bones and tearing wing membranes as they struggle to get free. The monofilament line can cut into the animal causing deep wounds and even stop circulation. Ultimately, these injuries can lead to shock and death, particularly if the animal is trapped for a long time. Entangled flying-foxes may also be mothers nursing young that are waiting at a nursery roost. These young will starve if the parent does not return to the roost within a day.
Netting methods
When netting fruit trees, ensure that the net is taut. If the netting is loose or easily loses its shape, it is more likely to act as a trap for wildlife.
To keep netting taut, the first step is to build a frame over the tree to support the netting. This could be a box-shaped frame of PVC pipe or timber, or a number of star pickets or stakes that are located around the tree to form a frame for the netting, e.g. crossing three or four stakes to make a tepee frame. It is important that the frame keeps the netting off the tree and is sturdy enough for the netting to be pulled taut.
Tent pegs, or any heavy objects (e.g. bricks) wrapped in the ends of the netting, can be used to keep the netting tensioned over the frame and stop animals from getting under the net. Clothes pegs and tie wire may be used to stop the net slipping and sagging on the frame to form traps. The more places that the netting is held in position, the more even the tension of the netting will be on the frame.
When estimating how much netting is needed, allow enough net for it to be firmly attached to the ground.
It is important to have some way of getting to the tree to remove fruit. Either a flap could be cut into the netting or an overlapping section of netting built into one side of the frame to allow a person to slip in between them. Any openings in the net could be closed off with clothes pegs or by weaving a garden stake through the mesh along the edge of the flap (or overlap) and the adjoining section of netting.
The bounce test
Common brushtail possums can weigh up to 3.5kg, common ringtails 1.1kg, and grey-headed flying-foxes up to 1kg, and they can weigh down loose netting. For the netting to be effective, it must be tensioned enough to stop folds of net forming around an animal when it lands on or crawls over the net. Ideally, a flying-fox should almost bounce off the netting rather than sink into it when it lands.
Check netting at least daily. Animals can sometimes still become entangled, even when the netting set up properly.
Entangled animals
Animals entangled in netting are likely to be injured and highly stressed, meaning any attempt to remove them is potentially dangerous for the animal and the rescuer.
If you find an entangled animal, without touching the animal cover it with a towel then contact the RSPCA Qld. They will put you in contact with a licensed wildlife rescuer who is trained to handle and care for wildlife. Read about what you can do if you come across a sick, injured or orphaned animal.
If you find a dead flying-fox, check to see if it is carrying a baby. If there is a baby present contact RSPCA Queensland. Dead flying-foxes should be collected using equipment such as a shovel and/or tongs, then wrapped and placed in a rubbish bin or landfill site, or buried deep enough so it won’t be dug up by another animal.
Alternatives to netting
Tree collars
Different animals reach the fruit in different ways. If the problem is a possum or a rat climbing up the tree, then a sheet metal collar around the trunk may stop these animals reaching the fruit. If the tree is short enough for an animal to jump into the lower branches or to climb on to the tree from a fence or a neighbouring tree, a collar will not work.
If another tree overhangs a fruit tree, the branches can be pruned back so that it becomes too far for a possum to jump between them.
Paper bags
Covering individual fruit in paper bags can also work where the fruit can be reached easily and safely. |
How Machine Learning is Optimizing Customer Support (Examples Inside!)
Consider all the different ways humans have come to rely on machines to expand their abilities. From calculators to cell phones, industrialization to robotics, humans have been able to achieve more than they ever have before, due to adopting machines. Machine learning is the next frontier in using machines to work more efficiently. And it’s particularly helpful in optimizing customer support.
What is machine learning? Machine learning is “a set of techniques that gives computers the ability to learn1 without being explicitly programmed.” And just like other machines that we rely on to expand our human abilities, computers equipped with machine learning allow humans to do more. Machine learning allows computers to sort through data and calculations much faster than a calculator controlled by a human can. It’s like outsourcing our brain to a computer – but for every cycle our brain makes, a machine makes thousands.
Using machine learning requires a lot of data, or examples to “train” the computer, and a lot of computing power to make connections. With the amount of data being generated by humans every day, and the rapidly increasing power of computers, we’re at a special time in history for machine learning. In fact, “it’s the first time in history we have sophisticated computing power on the one side and huge amounts of data to learn with on the other,” says Lukas Rathman in his Medium piece on Machine Learning for the Rest of Us
How Machine Learning Optimizes CS
Customer support is a prime target for machine learning because we have a lot of unstructured data. (Unstructured data is information that we haven’t sorted or tagged or told the computer what’s important about it). This unstructured data (generated through our everyday conversations with customers) contains a lot of insights that are helpful in understanding what customers are thinking and doing.
Machine learning can help us do more with the information we already collect through our human conversations. There are four main ways that customer support teams can use machine learning.
Tagging Incoming Conversations
One of the primary methods of automating customer support is to route conversations to the right person, quickly. If you can tag a conversation with what it’s about, what language it’s in or the sentiment of the customer, it becomes simple to tailor the response to that case. This might look like increasing the priority or sending the message directly to someone who speaks the right language or has the product knowledge for that question.
Machine learning can accurately identify the right tag for each incoming conversation by using natural language processing (NLP). By looking for patterns in language and text, machines can “read” or understand human conversation. While they don’t understand it exactly like we do, they can uncover meaning and themes in a wide variety of topics. The more historical conversations the machine gets to “read”, the more accurate its tagging will be. Most machine learning tools will also let humans provide feedback on their accuracy by marking the suggested tags as correct or incorrect. This feedback improves the tagging over time.
Uber built a tool called COTA (Customer Obsession Ticket Assistant) that uses machine learning to categorize incoming conversations2. When customers submit a ticket, COTA “reads” the message, identifies what it’s about likely and sends it to the right customer care team along with three potential solutions. The agent can then review the solutions, personalize the right one, and send it to the customer. They’ve seen really promising results already. “By improving agent performance and speeding up ticket resolution times, COTA helps our Customer Obsession team better serve our users, leading to increased customer satisfaction. Moreover, COTA’s ability to expedite ticket resolution saves Uber tens of millions of dollars every year.”
Ocado, an online grocery store in the UK, uses natural language processing to label incoming messages with tags that help them prioritize customer concerns. Using the Google Cloud Natural Language API, “they were able to label messages with tags such as “Feedback” or “Positive.”” Messages that were urgent due to customer sentiment or because they required a quick reply were filtered to the top of the queue. Ocado was able to respond to urgent emails four times faster3, and saved money on headcount in the contact center.
Magoosh, an online tutor service, uses machine learning to help service agents with case classification, tagging and re-routing. I wanted to highlight them here because they’ve reported that their solution is showing a 92% accuracy for tag predictions – which means that the majority of customers are getting sent exactly to the right place immediately after submitting a ticket. It also greatly reduces the amount of classification work support agents need to do when filing a ticket.
Predictive Support and Advice
For frequently asked questions that only require a straightforward response, machine learning can often predict exactly what customers need to hear.
Machine learning
Bank of America takes this one step further with Erica: their helpful assistant that provides advice for customers4. Providing every customer with a personal financial advisor that digs through their financial information to offer advice would be costly and inefficient. But, Bank of America’s customers were consistently happier when they received service that could help them become more financially secure. Enter Erica. She is a machine learning driven assistant that examines trends and surfaces recommendations for the bank’s customers at scale. For example, she might highlight a recurring payment that you need to review or an opportunity to reduce debt.
The bank hopes to use Erica to streamline mobile banking for their customers and provide a more personalized experience to every single one of their customers.
Customer Insights
When you run a bigger customer support team, it can be almost impossible to decide the most important customer gripe to focus on. One agent might only see 2% of the total volume (on a team of 50) so it’s impossible for them to identify trends. Even in smaller teams, humans struggle to make accurate assessments of trends, due to an emotional attachment to certain customers or features. This is where machine learning can help. By analyzing customer conversation data, machine learning can uncover trends that your team didn’t even think to look for – simply because of the speed that machine learning computers can crunch through data.
For example, Air Canada, an airline company, used machine learning to look through thousands of customer conversations5 initiated during online booking alongside the user sessions stored on their server. By examining customer complaints and common errors, they found several common problems customers had when booking tickets. They could also identify the most buggy devices and browsers. This allowed them to prioritize fixes to make booking flights easier for their customers, improving the customer experience, and saving their contact center the labor costs of supporting these customers.
Improve Knowledge Base by Analyzing Search Activity
More frequently, customers help resolve their own questions by using a knowledge base or help center. This is great because it’s often much faster for the customers to get help and it’s more cost effective for the company providing support. Machine learning can help improve knowledge base through two strategies: highlighting gaps in available content and improving the search functionality to display more relevant help.
Codecademy uses Solvvy AI to analyze customer search trends in their6 knowledge base. By identifying common trends, they were able to streamline and restructure their knowledge base documentation. They also found topics that customers were searching for, but not finding answers on (for a variety of reasons). Closing these gaps helped customers find better help faster, and reduced the incoming load on the customer support team.
Freshdesk’s Freddy chatbot uses machine learning to continually improve the solutions it suggests to customers through chat. Freddy relies on NLP to understand what customers are asking, identify solution articles that have helped customers before, and proactively resolve customer inquiries.
Uncovering the Benefits of Machine Learning in Customer Support
It can be hard to find examples of teams using machine learning, because many teams don’t want to give up their secret weapon. It’s also a fairly new technology, so as more companies start incorporating it and the vendors offering these tools mature, we’ll see more use cases come up.
However, the emergence of machine learning as a critical technology for the future of customer support can’t be ignored. It’s only a matter of time before machine learning is a requirement for mature support organizations – just like a help desk.
1 –
2 –
3 –
4 ––heres-what-it-does.html
5 ––heres-what-it-does.html
6 – |
Journaling for Your Health
Clarifies your thoughts and feelings. Do you ever seem all jumbled up inside, unsure of what you want or feel? Jotting down your thoughts and emotions quickly get you in touch with your internal world.
Reduces stress. Writing about anger, sadness and other painful emotions helps to release the intensity of these feelings.
Can help you solve problems. Typically we problem solve from a left-brained, analytical perspective. But sometimes the answer can only be found by engaging right-brained creativity and intuition.
Your journaling will be most effective if you do it daily for about 20 minutes. Write quickly, as this frees your brain from “shoulds” and other blocks to successful journaling.
Source: Psych Central |
Taking Back Our Stolen History
Thomas Jefferson and John Adams Die on the 50th Anniversary of the Signing of the Declaration of Independence, Fulfilling Dr. Benjamin Rush’s Prophesy
The Dream of Dr. Benjamin Rush & God’s Hand in Reconciling John Adams and Thomas Jefferson
One of the more bitter aspects of the retirement of John Adams from the presidency in 1800 was the fact that several of those with whom he had early co-labored during the Revolution had become his fervent adversaries. This was especially true in the case of Thomas Jefferson who, although serving closely with Adams during the Revolution, had become one of his chief enemies during President Washington’s administration. This feud not only deeply embittered Adams emotionally but it also troubled Dr. Rush, who was still a close friend of both Adams and Jefferson. In his concern over the relationship between these two, one night several months after Jefferson’s retirement from the Presidency in 1809, Dr. Rush had a dream about the two which he felt was important. On October 17, 1809, he wrote down an account of that dream and sent it to John Adams. In describing that dream, he related what he had seen:
Jefferson / Adams
At the time this letter was written, Jefferson and Adams were still vehement opponents. None of what was described in this letter had begun to come to pass, nor did it seem likely that it ever would. Nevertheless, Adams received the dream from his dear friend with an open heart and candidly responded:
Your prophecy, my dear friend, has not become history as yet. I have no resentment of animosity against the gentleman [Jefferson] and abhor the idea of blackening his character or transmitting him in odious colors to posterity. But I write with difficulty and am afraid of diffusing myself in too many correspondences. If I should receive a letter from him, however, I should not fail to acknowledge and answer it. 2 [To see the entire John Adams to Benjamin Rush letter click here.]
Shortly after this letter, Rush, who was also a dear friend of Jefferson, initiated a correspondence with Jefferson on the same topic, attempting to reconcile the two. Jefferson, too, listened to Rush with an open heart, and tentatively reached out to Adams with a gracious letter. Adams, as he had promised, did “not fail to acknowledge and answer the letter,” and thus began a cordial renewing of a warm and sincere friendship between the two.
In retrospect, the amazing accuracy and future fulfillment of several parts of Dr. Rush’s dream are absolutely astounding. As accurately described in his dream, Adams and Jefferson did again become close friends, and there did indeed follow the “correspondence of several years” described in the dream. Furthermore, the “world was favored with a sight of the letters” as entire volumes were eventually published which contained the letters written between those two in their latter years. Interestingly, seventeen years after his dream, they did “sink into the grave nearly at the same time” as the two men died within three hours of each other on the same day: July 4th, 1826 – the fiftieth anniversary of the Declaration of Independence! Finally, both expired “full of years and rich in the gratitude of praises of their country.” It would appear that Providence had indeed given this dream to Dr. Rush since, although extremely unlikely at the time, it all eventually came to pass. (For similar Providential involvement in dreams, see Genesis 41:25+ and Daniel 2:28+).
In 1812, some three years after Dr. Rush had related his amazing dream to John Adams, Dr. Rush gratifyingly noted that a reconciliation between the two had begun:
I rejoice in the correspondence which has taken place between you and your old friend, Mr. Jefferson. I consider you and him as the North and South Poles of the American Revolution. Some talked, some wrote, and some fought to promote and establish it, but you and Mr. Jefferson thought for us all. I never take a retrospect of the years 1775 and 1776 without associating your opinions and speeches and conversations with all great political, moral, and intellectual achievements of the Congresses of those memorable years. 3
Shortly after this letter, Dr. Rush wrote with similar excitement to Jefferson, also expressing to him his pleasure over the rekindled friendship:
Dr. Benjamin Rush
In a letter which I received a few days ago from Mr. Adams, he informs me, with a kind of exultation, that after a correspondence of five or six and thirty years had been interrupted by various causes, it had been renewed, and that four letters had passed between you and him. In speaking of your letters, he says, “They are written with all the elegance, purity, and sweetness of style of his youth and middle age, and with (what I envy more) a firmness of finger and steadiness of chirography [handwriting] that to me are lost forever.” It will give me pleasure as long as I live to reflect that I [Dr. Rush] have been in any degree instrumental in effecting this reunion of two souls destined to be dear to each other and animated with the same dispositions to serve their country (though in different ways) at the expense of innumerable sacrifices of domestic ease, personal interest, and private friendships. Posterity will do you both justice for this act. If Mr. Adams’ letters to you are written in the same elevated and nervous style [at that time, the word “nervous” was defined as “possessing or manifesting vigor of mind; characterized by strength in sentiment or style”], both as to matter and language, that his letters are which he now and then addresses to me, I am sure you will be delighted with his correspondence. Some of his thoughts electrify me. I view him as a mountain with its head clear and reflecting the beams of the sun, while all below it is frost and snow. 4
On the death of Adams and Jefferson on the very same day, some 17 years after Benjamin Rush has seen that event in his dream, the Rev. Edward Everett (a U. S. Representative & Senator, Governor, Diplomat, Secretary of State, and President of Harvard) delivered an oration in remembrance of the two in which he noted the great impact on America of their dual influence, both before and after their reconciliation:
Having lived and acted and counseled and dared and risked all, and triumphed and enjoyed together, they have gone together to their great reward. . . . Forgetting the little that had divided them and cherishing the communion of service and peril and success which had united, they walked with honorable friendship the declining pathway of age; and now they have sunk down together in peace into the bosom of a redeemed and grateful country. . . . They were useful, honored, prosperous, and lovely in their lives, and in their deaths they were not divided. 5
3. Benjamin Rush, Letters of Benjamin Rush, L. H. Butterfield, editor (Princeton: The American Philosophical Society, 1951), Vol. II, p. 1127, to John Adams on February 17, 1812.
4. Benjamin Rush, Letters of Benjamin Rush, L. H. Butterfield, editor (Princeton: The American Philosophical Society, 1951), Vol. II, pp. 1127-1128, to Thomas Jefferson on February [i.e., March] 3, 1812. Letter was actually received on March 19, 1812.
5. Edward Everett, An Address Delivered at Charlestown, August 1, 1826, in Commemoration of John Adams and Thomas Jefferson (Boston: William L. Lewis, 1826), pp. 8-9.
Source: WallBuilders.com
Another perspective comes from James Perloff on this subject in his article presenting compelling evidence that Thomas Paine, not Thomas Jefferson, wrote the Declaration of Independence:
Much of the American republic’s history is surprisingly shrouded in secrecy. All the men who took part in the Boston Tea Party swore a 50-year oath of silence. This is why no participant published a description of it until George Hewes’s memoir in 1834.
In my post The Secrets Buried at Lexington Green, we explored the fact that Americans firing shots at Lexington was also kept publicly secret until 50 years after the event.
Was there also, then, a 50-year oath of silence regarding the Declaration? Thomas Jefferson dropped no hint of authorship for 45 years. Finally, in 1821 he recalled:
“It was accordingly done” is not a very emphatic claim to authorship. If there was a 50-year oath of silence associated with the Declaration, it might be noteworthy that that both Jefferson and John Adams died on the exact day it would have expired: July 4, 1826. I have always romanticized that coincidence, and perhaps it should just stay romanticized. In any event, Jefferson said nothing about writing the Declaration until after Paine’s death.
But why couldn’t Paine be acknowledged as the Declaration’s author? Three reasons stand out:
1. The Declaration was supposed to be written by elected delegates, something Paine was not.
2. Since Paine hadn’t lived in the colonies before November 30, 1774, it was debatable if he could even be described as an “American.” Although his allegiance to the revolutionary cause might certainly have merited that characterization, most Americans would have been surprised to learn their Declaration was penned by someone who had resided so briefly on their continent. (Paine later returned to Europe, living there from 1787 until 1802.)
3. But the most important reason Paine couldn’t be acknowledged was that he later wrote The Age of Reason, in which he bitterly denounced Christianity.
I do not believe in the creed professed by the
Since America was predominantly Christian, it couldn’t be admitted that someone of such views had penned the nation’s birth certificate. It would have caused what we now call “cognitive dissonance.”
See also: (WND) The eerie coincidence of 1826
Recommended Books:
This book spent time at #3 on Amazon overall and was ranked #1 in 5 categories including #1 in History titles, #1 in US History, #1 in Books on Israel and History. 10’s of thousands of copies were sold during that period. Find out why the book continues to re-set the foundation of American History studies.
Find out why Glenn Beck said: “I have been trying to articulate this message for years, Tim Ballard finally did it! This book is the key to restoring America.”
Find out what is behind this endorsement by David Barton: “The concept of what a covenant truly is and means is unfamiliar to most today, for it far surpasses any legal understandings or obligations with which our current culture is acquainted. God established a covenant with Abraham and his posterity, and the Bible recounts not only the duties but also the remarkable benefits produced by that mutual accord. Tim Ballard documents the “extension” of that covenant re-invoked during the establishment of this nation… a covenant made between God and America’s early colonists and Founders. “The Covenant” not only shows the unprecedented blessings America has received as a result of obedience to God but also what every citizen today can do to honor our national covenant with God and thus ensure His continued blessings.” David Barton, Historian and bestselling author.
Why did Christopher Columbus insist that an “angel” guided him at the moments of greatest distress? What prompted the original colonists to embrace the idea that the land of America was “New Israel” to them? What power urged Washington and his rag-tag army to successfully conquer the greatest military power on earth? What brought about the terrible national crisis that left our nation grieving, humbled and repentant after the desolation of Civil
" >War?
What is the secret behind this nation’s unsurpassed record of prosperity, protection and liberty? And what are the responsibilities and consequences incumbent upon a people so blessed?
The answers to these, and many other questions relating to America’s real national treasure are found in the pages of THE COVENANT.
In his new book, author Timothy Ballard answers both HOW and WHY the America’s very existence stands in fulfillment of ancient biblical prophecy.
Ballard’s research takes his reader on a journey through American history that has rarely, if ever, been traveled before.
THE COVENANT: America’s Sacred and Immutable Connection to Ancient Israel sheds new light on the bloodline-inheritance the founders carried to America.
To be certain, this book is not about America’s ties to the Jewish State called “Israel” which was formed by U.N. edict in 1948 but rather, the text hearkens back to a period around 720 B.C. when the Northern Kingdom of ancient Israel (the Ten Tribes) was destroyed and carried away by the Assyrians to the “North” where they became lost as to their own identity scattered among the lands and peoples of Western Europe, Great Britain and Scandinavia. These people inherit through birth and bloodline, the right to invoke “the Promises made to the Fathers.”
Gr 2-4-Suzanne Tripp Jurmain makes early American history more accessible and our founding fathers more human for young students in her book (Dutton, 2011) about the friendship and feud between Thomas Jefferson and John Adams. She profiles both the differences between these two men as well as the bond that grew between them as they worked together to forge a new nation. Problems arose over the question of balance of power: Adams believed that the president should be given more power, while Jefferson feared that a president who was too powerful might damage the new government. Their dispute was exacerbated when Adams was elected president, with Jefferson as his vice president, and their opposing political parties escalated the feud to the point of violence. When Jefferson defeated Adams for the presidency in the next election, it seemed that their friendship would be doomed. The book ends on a positive note, however, as the two did reconnect through a long string of correspondences, and they died on the same day. Richard Poe expressively reads this engaging, heartwarming tale with clarity and humor. By humanizing these two friends, rivals, and leaders, students will be better able to understand this segment of American history and the intricacies of our early government.-MaryAnn Karre, Horace Mann and Thomas Jefferson Elementary Schools, Binghamton, NYα(c) Copyright 2011. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted. –This text refers to an out of print or unavailable edition of this title.
Leave a Reply
|
The Great Migration is quite simply the greatest gathering of terrestrial megafauna in the world today. In a given day you can see hundreds of thousands of wildebeest not to mention the zebra and other grazers. And the vast majority will successfully cross, perhaps several times, the Mara River aka the herbivore River Styx.
Like all good adventures, it starts out with hope and the promise of literal greener pastures. The herbivores set out from the Serengeti to feast on the long fresh grasses of the Masai Mara.
Nothing is more terrifying to wildebeest than crossing a river. This is a place of death for them and it creates palpable fear and panic in the herd.
River crossings for wildebeest is an event to be feared. The rivers are filled with massive flesh-hungry crocodiles, not to mention aggressive hippos, that sit around for long stretches of time just waiting for meat-on-the-hoof to cross. For the wildebeests, this threat causes them to panic while crossing.
It is a hurried entrance in the river and an even more urgent exit. If the wildebeest are lucky they will survive the crocodile gauntlet and the river current. All they need to do now is safely exit the river.
A photograph makes the river crossing look placid, but it is anything but. The rocks are slick and the wildebeest push each other in a panic to exit the river. This is the time of their greatest danger.
However, wet rocks make for an unlikely adversary for the panicked wildebeest. For some, it’s all too easy for a panicked step to cause a hoof to slip off of the wet rocks. An injured hoof or torn muscle means that wildebeest will never get off of the river’s edge.
Poor chap wrecked his leg in a panicked attempt to get out of the river. As he couldn’t hoist himself out of the river it was only a matter of time before his head slipped under the water to come out no more.
And wildebeest by the dozen injure themselves on those wet rocks. None of the injured make it out alive. The River Styx swells with the dead.
At any given spot on the Mara there are several to dozens of dead wildebeest. Death on the river is inescapable.
And this mass death is glory to the flesh eaters. Crocodiles are so bloated on flesh that they don’t even bother to eat the dozens of additional carcasses around them.
This crocodile, along with several of its friends, were so filled with flesh that they completely ignored the bodies strewn about the river.
Vultures follow the crossings and feed on the dead on the river banks and those that are partly submerged.
Vultures don’t have to compete with each other for a carcass. There is plenty to go around for all.
For those that survive the crossings, they get the opportunity to eat, breed, and cross again. For the rest, there will be no greener pastures. They belong to the River Styx now.
[adinserter name=”Block 1″] |
Time Limit : sec, Memory Limit : KB
Binary Tree Intersection And Union
Given two binary trees, we consider the “intersection” and “union” of them. Here, we distinguish the left and right child of a node when it has only one child. The definitions of them are very simple. First of all, draw a complete binary tree (a tree whose nodes have either 0 or 2 children and leaves have the same depth) with sufficiently large depth. Then, starting from its root, write on it a number, say, 1 for each position of first tree, and draw different number, say, 2 for second tree. The “intersection” of two trees is a tree with nodes numbered both 1 and 2, and the “union” is a tree with nodes numbered either 1 or 2, or both. For example, the intersection of trees in Figures 1 and 2 is a tree in Figure 3, and the union of them is a tree in Figure 4.
A node of a tree is expressed by a sequence of characters, “(,)“. If a node has a left child, the expression of the child is inserted between ’(’ and ’,’. The expression of a right child is inserted between ’,’ and ’)’. For exam- ple, the expression of trees in Figures 1 and 2 are “((,),(,))“ and “((,(,)),)“, respectively.
Each line of the input contains an operation. An operation starts with a character which specifies the type of operation, either ’i’ or ’u’: ’i’ means intersection, and ’u’ means union. Following the character and a space, two tree expressions are given, separated by a space. It is assumed that 1 <= #nodes in a tree <= 100, and no tree expression contains spaces and syntax errors. Input is terminated by EOF.
For each line of the input, output a tree expression, without any space, for the result of the operation.
Sample Input
i ((,),(,)) ((,(,)),)
Output for the Sample Input |
Week 12 of Pregnancy: What's Going On Inside
Topic Overview
Congratulations, you've made it through your first trimester! You can now hear your baby's heartbeat with a Doppler heart monitor. That can be very exciting.
Inside your uterus, an important organ called the placenta has formed. The placenta's main job is to give your baby oxygen and nutrients through the umbilical cord.
How your baby is changing
• When you are 10 weeks pregnant, your embryo has nearly all of the body structures that an adult has. The brain is now more complex. After this point, we call this tiny being a fetus.
• This month, the tiny fetus starts moving the head and jaw, grasping, moving the tongue, and stretching. Eyelids are covering the eyes, and fingernails are starting to grow.
Current as of: June 16, 2021
Author: Healthwise Staff
Medical Review:
Adam Husney MD - Family Medicine
Kathleen Romito MD - Family Medicine
William Gilbert MD - Maternal and Fetal Medicine |
Do you know? The wolfberry is a treasure all over!
Wolfberry is a traditional Chinese medicinal material. Since ancient times, wolfberry has been a good nourishing product. It is called “Chilaozi”. It has significant anti-aging, nourishing liver and kidney, and improving eyesight. Nowadays, many people often face their computers and mobile phones. In order to protect their eyes and improve their eyesight, many office workers often soak wolfberry water to drink, and use wolfberry soup for more advanced ones.
wolfberry is a treasure
But most office workers just soak it in water to save trouble. Experts say that simply drinking the water soaked in wolfberry can not fully absorb the nutrients. If matched with other ingredients, it will not only fully absorb nutrients, but also double the effect!
Please continue reading…
First, let’s take a look at the efficacy of wolfberry
wolfberry is a treasure
Modern research shows that wolfberry has the effects of lowering blood sugar, anti-fatty liver, and anti-atherosclerosis. In addition, wolfberry is also a good medicine for strengthening the body, nourishing the essence and marrow, nourishing yin and nourishing the kidney, replenishing qi and calming the nerves, strengthening the body, and delaying aging. It has significant effects on chronic hepatitis, central retinitis, and optic nerve atrophy; Protecting the liver, lowering blood pressure, and aging diseases of the elderly with organ decline have a strong improvement effect.
• Delay aging
Goji berry has been a nourishing and nourishing top grade since ancient times. It has the effect of delaying aging and anti-aging, so it is also called “Kai Lao Tzu”. The vitamin C content of wolfberry is higher than orange, the content of β-carotene is higher than that of carrot, and the iron content is higher than that of steak.
• Impotence
wolfberry is a treasure
The aphrodisiac function played by wolfberry is surprising. Wolfberry is called “Fruit Viagra”. From this point of view, it must have aphrodisiac effect. Then one of the characteristics of wolfberry that distinguishes it from other fruits is that it can reduce the cholesterol content in the human body.
In many cases, the physical ability of men is related to the kidney, because the kidney contains essence. So the reason why our human body can distinguish the strong or not is with the kidney function. Therefore, wolfberry can help men nourish the kidneys and essence, and the medicinal properties of wolfberry are very peaceful. Since ancient times, wolfberry has been used as a medicine to strengthen the body, so the effect can be guaranteed.
• Whitening and beauty
For women, eating wolfberry often can also whiten and beautify the skin. Taking a cup of wolfberry tea every day can increase the activity of skin cells and increase the ability of the skin to absorb oxygen, so that it can help the surface skin cells to maintain sufficient nutrients and make the skin more white and elastic.
• Nourish the liver and improve eyesight
wolfberry is sweet and calm in nature, and belongs to the liver and kidney meridian. It has the effect of nourishing liver and kidney, nourishing liver and improving eyesight. It is often used with rehmannia, chrysanthemum, yam, cornus and other medicines.
• Tonic deficiency and produce essence
Goji berries are treasures all over the body. Goji berries can nourish deficiency and produce essence. They can be used as medicine or for making tea, wine, and stewing soup. If they can be drunk regularly, they can strengthen the body.
Dry chewing is the most nutritious, but control the amount!
Chewing directly with your mouth will more fully absorb the nutrients in the wolfberry, which is more conducive to the health effects of the wolfberry. Physicians of the past dynasties often used wolfberry to treat dizziness and night blindness caused by insufficient liver blood and kidney yin deficiency. But pay attention to when chewing wolfberry, it is best to halve the amount of eating, otherwise it is easy to nourish too much.
When soaking wolfberry, add some other foods to match, it is more nutritious and convenient. So which foods will be more nutritious when mixed with wolfberry?
Second, goji berries with these foods are more nutritious
• Chinese wolfberry + red dates
wolfberry and red dates have the functions of invigorating the spleen and stomach, and protecting the liver. The two complement each other. In addition, red dates have the effect of nourishing qi and nourishing blood, and are called “natural vitamin pills”. In winter, I often drink wolfberry and red date tea, which not only warms the body but also enhances the ability to resist the cold, women often drink it, whether it is complexion or skin condition, it will be better.
Method: Before the red dates are soaked in water, it is best to fry them in a pot over medium heat for a few minutes, and wait until the skin of the dates becomes darker. Let cool for later use. Then put it in the teapot together with the wolfberry, pour in hot water to brew, you can also put a little rock sugar according to your taste. Cover and simmer for 5 minutes, you can taste the fragrant wolfberry red date tea.
Some netizens may ask, why is the dose not given? Generally, fruit food is soaked in water and does not require a specific dosage. Just like we usually drink tea, you can quantify it randomly, or you can use a 5:5 or 4:6 method to quantify. The following are similar.
• Chinese wolfberry + longan
The most prominent effect of this tea is to soothe the nerves and help sleep. People who often suffer from insomnia, dreaminess and heart palpitations may wish to drink it regularly, which has a good conditioning effect.
Method: Compared to brewing with water, steaming is recommended. Both taste and taste are better. The specific method is also very simple. Wash the wolfberry, put it in a container with the longan meat, add a proper amount of water and raisins, and steam for 15 minutes. The soft waxy longan and the nourishing goji berries are delicious and nourishing.
• Wolfberry + Chrysanthemum
Chinese wolfberry chrysanthemum tea can relieve eye fatigue, enhance eyesight, and have outstanding effects in eye protection. Office workers and students who use their eyes often can drink some regularly. Before drinking, close your eyes and approach the cup. The warm water vapor can eliminate the fatigue and dryness of the eyes and feel more comfortable.
wolfberry is a treasure
Method: Put the washed wolfberry and appropriate amount of chrysanthemum in a cup, add water to brew, wait for ten minutes, you can drink the fragrance of wolfberry chrysanthemum tea.
• Chinese wolfberry + yam
The nourishing effects of Chinese yam and wolfberry intersect in many ways. Both can strengthen the kidneys, reduce blood sugar, and nourish the spleen and stomach. Coupled with the effect of medlar to replenish yang, drinking in winter can also enhance cold tolerance.
Method: Peel and wash the yam and cut into small cubes. After washing the rice, pour it into the pot together with the yam. Add the wolfberry to a boil on high heat. Change to a low heat and simmer for about 15 minutes. Wait until the porridge becomes thick. Sprinkle some chopped green onion and salt.
• Wolfberry + Hawthorn
The most prominent effect of wolfberry and hawthorn tea is to lower blood fat and protect blood vessels, which has a certain preventive effect on arteriosclerosis.
Method: Fresh hawthorn or dried hawthorn slices can be used, pour it into a teacup together with wolfberry, and soak in boiling water for about 15 minutes. The sour taste can be appetizing, and it is also very good to drink as a drink.
Hits: 0
Leave a Reply
|
Individualistic responses of forest herb traits to environmental change ($) (Plant Biol)
Functional traits have shown promise for their ability to improve predictions of interspecific plant responses to environmental factors, but most trait-based studies have not addressed the role of intraspecific trait variation (ITV) in trait-environment relationships. ITV may be directly or indirectly altered by climate change pressures and land use histories, depending on individual levels of phenotypic plasticity. Blondeel et al. use a factorial manipulative experiment to test changes in mean plant height and mean specific leaf area (SLA) within 15 different plant species from temperate European forests in response to warming with open-top chambers, fluorescent light addition, and nitrogen addition. Community members were diversified to include a range of levels of forest (shade) adaptation and colonization ability and soils had different agricultural use histories. ITV responses to treatments were variable and dependent on species but some patterns did emerge. This study found that mean plant height increased within species in response to more available light, warming, and agricultural land-use due largely to enhanced vegetative cover. The mean plant height of fast-colonizers increased the most in response to treatments. These results highlight the potential importance of the indirect effects of climate change and land use history in the form of increased competition and a shift towards fast growing and colonizing species. Surprisingly, there were no interactive effects of treatments on ITV and mean SLA experienced species-dependent bidirectional change with few strong patterns emerging in response to treatments. (Summary by Sienna Wessel) Plant Biology 10.1111/plb.13103
[altmetric doi=”10.1111/plb.13103″ details=”right” float=”right”] |
The exponent of a number says how many times to use the number in a multiplication.. Our page on Perimeter explains this in more detail. 43 means 4 to the power of 3 or 4 cubed, that is 4 Ã 4 Ã 4. For more, see our page on area, surface area and volume.
Volume is the three-dimensional space occupied by a solid or hollow shape. A term may include addition or subtraction operations, but only in brackets, e.g. A square number has an odd number of factors. Privacy Policy | Mathematical operations are often referred to as ‘sums’. x), or several constants and variables multiplied together (e.g. Simple and beautiful way to discover how to add a virtual keyboard for Emoji symbols visible as small pictures. While this is a serious limitation, multi-level formulas are not always needed and even when they are needed, proper math symbols still look better than improvised ASCII approximations. Re: Symbol math error? Some more examples: It is an important rule that applies only to right-angled triangles. List of set symbols of set theory and probability. Sometimes people use the ^ symbol (above the 6 on your keyboard), as it is easy to type. Compare: ∀(x, y ∈ A ∪ B; x ≠ y) x² − y² ≥ 0 § Failure of power and logarithm identities, Complex exponents with positive real bases, earlier definition of exponentiation with an integer exponent, "Etymology of some common mathematical terms", Earliest Known Uses of Some of the Words of Mathematics, Proceedings of the American Mathematical Society, National Institute of Standards and Technology, Complex number to a complex power may be real, "Aufgaben und Lehrsätze, erstere aufzulösen, letztere zu beweisen", Journal für die reine und angewandte Mathematik, "A Survey of Fast Exponentiation Methods", Philosophical Transactions of the Royal Society of London, "BASCOM - A BASIC compiler for TRS-80 I and II",, Articles lacking reliable references from July 2018, Articles with unsourced statements from November 2017, Wikipedia articles with style issues from February 2020, Articles with unsourced statements from April 2014, Articles with unsourced statements from August 2020, Creative Commons Attribution-ShareAlike License, This page was last edited on 24 October 2020, at 17:59. Available symbol sets. The line connecting the centre of a regular polygon with one of its sides. The term radius is used in the context of circles and other curved shapes. An asymptote is a straight line or axis that is specifically related to a curved line. the study of motion, where velocity, acceleration, force, displacement and momentum are all vector quantities. You can multiply any number by itself as many times as you want using exponents.
You can assign infinity symbols and any other text characters to your keyboard using this technique. The perimeter of a circular shape is specifically called its circumference. This online mathematical keyboard is limited to what can be achieved with Unicode characters. The angle symbol â is used as shorthand in geometry (the study of shapes) for describing an angle. Extrapolate is a term used in data analysis. It measures how far each member in the set is from the mean and therefore from every other member in the set. A line of reference about which an object, point or line is drawn, rotated or measured. Exponents are also called Powers or Indices. A full rotation (360 degrees) is 2Ï radians. Negative?
The exponent of a number says how many times to use the number in a multiplication. 4 3 means 4 to the power of 3 or 4 cubed, that is 4 × 4 × 4. Configure your keyboard layout in Windows so that you can type all additional symbols you want as easy as any other text. x over x2; prefer 1/x over x−1) and roots (prefer sqrt(x) over x0.5, prefer cbrt(x) over x1/3). That last example showed an easier way to handle negative exponents: My favorite method is to start with "1" and then multiply or divide as many times as the exponent says, then you will get the right answer, for example: If you look at that table, you will see that positive, zero or negative exponents are really part of the same (fairly simple) pattern.
You can type many frequently used symbols with this method. n à (nâ1) à (nâ2) à ⦠à 2 à 1. A mathematical symbol is a figure or a combination of figures that is used to … See our page on Decimals for examples of its use. Quantitative data are numeric variables or values that can be expressed numerically, i.e. They may be quantitative or qualitative variables. Volume is measured in cubic units, e.g. It is quantified by the cubic measurement of the space enclosed by its surfaces. A datum is a single value of a single variable. by using a name or symbol, and are obtained by observation. "Exponent" redirects here. After clicking the More arrow, click the menu at the top … In words: 8 2 could be called "8 to the power 2" or "8 to the second power", or simply "8 squared" . The Math.pow() function returns the base to the exponent power, that is, baseexponent. Qualitative data are type variables that do not have a numerical value and may be expressed descriptively, i.e.
Ratios compare one part to another part, and proportions compare one part to the whole. Exponents are also called Powers or Indices. In the expression 6x, 6 is the coefficient and x is the variable. 2. / is used in spreadsheets and other computer applications. â´ is a useful shorthand form of ‘therefore’, used throughout maths and science. The expression â ABC is used to describe the angle at point B (between points A and C). The exponent is usually shown as a superscript to the right of the base. This symbol ± means ‘plus or minus’. For example,32, means 3 to the power of 2, which is the same as 3 squared (3 x 3). Pythagoras was a Greek philosopher, credited with a number of important mathematical and scientific discoveries, arguably the most significant of which has become known as Pythagoras’ Theorem. 3(2 -x3).
But only third and fourth level chooser keys and unicode hex codes can produce mathematical power text symbols. Character Palette allows you to view and use all characters and symbols, including power signs, available in all fonts (some examples of fonts are "Arial", "Times New Roman", "Webdings") installed on your computer. In Javascript you should write like a = "this \u2669 symbol" if you want to include a special symbol in a string. ⪠⫠These symbols are less common and mean much less than, or much greater than. It says that ‘the square on the hypotenuse is equal to the sum of the squares on the other two sides.’. This is explained in more detail on our Introduction to Numbers page. âµ is a useful shorthand form of ‘because’, not to be confused with ‘therefore’. See our page on Types of Data for more. Exponentiation is a mathematical operation, written as bⁿ, involving two numbers, the base b and the exponent (or index or power) n. When n is a positive integer, exponentiation corresponds to repeated multiplication; in other words, is product of a number b multiplied by itself n times. CharMap allows you to view and use all characters and symbols available in all fonts (some examples of fonts are "Arial", "Times New Roman", "Webdings") installed on your computer. 3x2). The keyboard itself is preinstalled on your iOS device, so you don't have to download, or buy anything. Degrees ° are used in several different ways.
Dubai Marathon 2021, Matisyahu One Day Meaning, One Punch Man Season 2 Ova 3 Genos And Memory Loss, Susan Decker Obituary, Braden Galloway Parents, Lincoln 2x4c Battery, Miami Tip Net Worth, How Old Is Susan Lucci And Her Husband, Steve Little Borderlands 3, Phil Knight House Address, How To Soften Hard Taco Shells, Queen's House Bedding, Noman Ijaz Wife, Neptune In Capricorn 5th House, Need For Speed Underground Extra Options, The Paper Bag Princess Theme, Simon Farnaby Age, Tin + Hydrochloric Acid Equation, Bryan Scofield Left Wbre, Team Hasselborg Wedding, Skyrim Se Thieves Mod, |
VLSI Design Group
Search This Site
Sub-Threshold FPGAs
The SubVT FPGA is an effort by the Sub-VT group to explore reconfigurable circuits operating at low voltages. Our initial sub-threshold FPGA chip (90nm bulk CMOS)contains two different FPGAs, each of about 1000 basic logic elements (BLEs) in size. The first FPGA, which we refer to as the "Custom Case," is specifically designed to operate at low-energy. Our research has shown us that the majority of delay and energy is consumed in the global routing network; therefore, our efforts have focused on making the interconnect more efficient. Besides many small optimizations, the main feature of the custom case is the low-swing interconnect links received by a special asynchronous sense amp. In addition, the architecture of the custom-case is designed to be resistant to process, voltage, and temperature variations. The second FPGA, called the "Base-Case" because it is inspired from industry "best-practices" that we optimized for sub-threshold, was built in order to provide a comparison for the Custom Case in the same technology. The Custom-Case is approx 2.5X as area efficient, and simulations (on a benchmark suite of 40 different cases) show it to be much more efficient than the Base Case. The Custom Case in Sub-VT averages 25x less energy compared to the Base Case at 1.2V. When operating at the same energy, the custom-case is approx 7x faster. When operating at the same VDD, the custom-case operates 4.5X faster using 40% less energy.
The FPGA team also explored and optimized the circuit typologies of global interconnect and CLBs. A 130nm test chip implementing low-swing interconnect meshes with different circuit parameters is measured. The results show that optimization of the low-swing interconnect provides up to 60.2% lower energy-delay-product (EDP) than a straightforward, un-optimized design at VDD = 0.4V. Furthermore, the simulation results show that the optimized interconnect is 97.7% faster and 42.7% lower energy than a traditional uni-directional interconnect at VDD = 0.4V. We also compared area, delay, and energy for two intra-CLB topologies: multiplexer-based routing and island-style bi-directional routing, similar to the global FPGA interconnect, but used inside the CLB (which we call a mini-FPGA). The mini-FPGA style of local CLB interconnect prove to be favorable for minimum-energy operation, as they can reduce transistor count by as much as 62%, and consume as much as 77.9% less energy. Multipexer-based CLBs have performance benefits by reducing delays by almost 3x. We are currently working towards dynamic voltage scaling and measurements using real-life applications.
Students: He Qi |
Skip to content
New initiatives show how federal stimulus dollars advance scientific and medical research
Stanford's medical school just unveiled a new Web site featuring stories, interviews, and videos that illustrate how research funding from the American Recovery and Reinvestment Act of 2009 (ARRA) is advancing human knowledge, helping the economy, and improving human health.
Above, Hugh O'Brodovich, MD, talks about using a $3.5 million grand-opportunity grant to examine a severe form of lung disease in premature infants that can lead to a lifetime of medical difficulties
In the last six months, the School of Medicine has been awarded more than $84 million in grants because of the stimulus package, and the money is expected to create up to 200 jobs.
To better understand the wide-ranging economic and scientific impact of funding provided by the ARRA, visit ScienceWorksForUs, a new initiative that tracks the flow of stimulus dollars to scientific research and related activities. U.S. Rep. Nancy Pelosi (D-Calif.) and other members of Congress announced the launch of the site yesterday.
Previously: Showing us the money
Popular posts |
Quick Answer: What Is SOC Education?
What does SOC analyst mean?
SOC analyst is a job title held by infosec newbies and more experienced pros alike..
What does SOC mean on application?
Social Security NumberSOC: Social Security Number.
What is SOC in medicine?
standard of care ‘; the SOC corresponds to a level of competence in performing medical tasks accepted as reasonable, and reflective of a skilled and diligent health care provider. See Ethics, Malpractice, Practice guidelines. Cf Reasonable person standards. Standard of care.
What does AF mean on Instagram?
! Instagram has recently introduced a paid partnership tag, allowing influencers to highlight more clearly if a post is an advertisement. This is an excellent step-forward in transparency as it is much more obvious to the consumer than a hashtag. Another common hashtag is #af, meaning affiliated.
What is SOC in social media?
What does SOC stand for in texting?
soc : Same old crap.
What is the meaning of SOC in Facebook?
People named Soc Means Log in or sign up for Facebook to connect with friends, family and people you know.
What does BTW mean sexually?
By the wayBTW – By the way. 13. Secondly, what does 78 mean sexually? CRIMES ACT 1900 – SECT 78. Meaning of sexual servitude and sexual services for pt 5.
What are the six types of social media?
What does SOC mean?
System On a ChipStands for “System On a Chip.” An SoC (pronounced “S-O-C”) is an integrated circuit that contains all the required circuitry and components of an electronic system on a single chip. It can be contrasted with a traditional computer system, which is comprised of many distinct components.
What is a SOC girl?
Greasers are poorer than the middle class, live on the West Side, are the trouble makers and wear rough clothes. Socs are the snobby, rich East Side kids who dress very preppy. Socs and Greasers are very different from each other in many ways, but not one of them is better than the other. |
Ubi Sunt in Old English
The Ubi Sunt sensibility hovers throughout Old English poetry but only in The Wanderer (92-96) does it take a form – and rhetorical refrain – so close to the more familiar neiges d’antan of Villon.
Hwær cwom mearg? Hwær cwom mago? Hwær cwom maþþumgyfa?
Hwær cwom symbla gesetu? Hwær sindon seledreamas?
Eala beorht bune! Eala byrnwiga!
Eala þeodnes þrym! Hu seo þrag gewat,
genap under nihthelm, swa heo no wære.
Where has the horse gone? Where the warrior? Where the treasure?
Where the seats of feasts? Where are the hall joys?
Oh, the bright cup! Oh, the mailed warrior!
Oh, the prince’s glory! How that time departed,
grew dark under the night helmet as if it hadn’t been
(tr. Robert E. Bjork)
Tolkien lends a modified version of these lines to Aragorn in the Two Towers as he speaks of Rohan – “Where now the horse and the rider? Where is the horn that was blowing?” |
• IPA: /ɪˈneɪt/
innate (not comparable)
1. Inborn; existing or having existed since birth.
2. (philosophy) Originating in, or derived from, the constitution of the intellect, as opposed to acquired from experience.
innate ideas
3. Instinctive; coming from instinct.
• 1848, Charles Dickens, Dombey and Son, Chapter 3
4. (botany) Joined by the base to the very tip of a filament.
an innate anther
Synonyms Translations Verb
innate (innates, present participle innating; past and past participle innated)
1. (obsolete) To cause to exist; to call into being.
• Russian: порожда́ть
Offline English dictionary |
This is part two of a two part question. You can find part one here.(How to Cause a Hydrosphere Apocalypse Part I The Great Drought)
One of the more interesting movies I watched growing up was Waterworld. I never understood why no one ever talked about it, I always thought it was cool, the music, the action the endless ocean, what more could you want? Admittedly, as I grew up I understood that there wasn’t enough water frozen in the ice caps to make that future happen, only enough to put New York and a lot of other coastal places under 60 ft of water.
But what if there was a world where there was a planetary drowning?
So let’s imagine another interstellar expedition that has discovered a habitable water world. There are no icecaps at the poles, the water is clear and shallow, and there is an absolute abundance of marine life. But no dry land, not even a small set of islands.
But the more astronauts investigate this planet the more anomalies they come across. Dozens of species that come to the ocean surface to breath like whales or dolphins, several species that still have clearly defined arms and legs, and in the shallower parts of the global ocean there are clear trace fossils of foot prints as well as fossils of animals that clearly spent their entire lives on dry land.
The evidence is clear, this world was once not so different from earth until it experienced a Noah’s Ark level flood, only this time there was no dry land left to go to.
So where did all that water come from?
What scientifically feasible scenario could happen that would cause a life supporting planet to flood and loose most of its dry land?
• $\begingroup$ a LOT of comets coming by regularly, over the span of a few hundred million years? Small enough not to cause significant damage by impact, but carrying enough volatiles to boost the oceans? (yes, a ****LOT**** of comets) $\endgroup$
– PcMan
Feb 13 at 11:45
A rain of ice from a dying moon. Saturn's rings drop "each second ... perhaps thousands of pounds of water ice" per second onto the planet. Now true, there's an issue, namely if we compare 1000 kg/s = 1000 L/s = 1 m^3/s to 43.14(6350 km)^2 [the surface area of Earth] x maybe 1 km rise in ocean level = 506 x 10E6 km^3 = 506 x 10E15 m^3, well, it's gonna take a bit more than 40 days and 40 nights, like 16 billion years more.
Nonetheless, we can't deny that a moon can be largely covered in ice, and have sufficient volume. So we need a big moon of mostly water that is 3/4 (506 x 10E6 km^3)^(1/3) = 600 km radius, and it needs to stray within the Roche limit. Over some time, it converts to debris that falls into the atmosphere and raises the planet's ocean a kilometer.
Now, doing this quickly without smashing or roasting the planet would be quite a feat. I wonder if you could roast the moon a little, convert much of that ice to water vapor that drift with relatively little disruption into the atmosphere. The heating from all the potential energy released might have been partly offset by covering the planet in thick white clouds. The slower the process could be made the less outrageously optimistic you need to be with your explanation.
• $\begingroup$ This, i like. An ice moon that came to close, passed Roche's limit and shredded itself. The resultant debris and rings dribbling down on the planet over a very long timespan, so as not to flash-fry the surface with impact heat. $\endgroup$
– PcMan
Feb 13 at 11:48
The one idea that comes to my mind is an icy, millenia-long meteor shower. suppose a vast number of icy meteorites crash into the planet and melt. I know that there's a lot of loose ice in the solar system, but I don't know how likely it is that, should a massive storm of meteors hit the planet, most of them are made of ice rather than rock.
The storm in question would ideally be composed of billions of tiny ice asteroids rather than a few big ones, because we don't know of any major marine amniote groups that survived the chixclub event. surviving multiple such events would be even more difficult. However, if the impacts are smaller than the K.T. extinction impact, and there exists a species of small, adaptable former land-dwellers, they might live to see the new waterworld.
I can't see a way this works via melting ice caps. If there is enough water to cover all the land on the planet, and the planet is warm enough to allow earth-like conditions, then it should be flooded. It might be possible for it to be just warm enough for a very narrow strip of liquid ocean on the equator, which might expose some land, but I don't think this is sustainable for the hundreds of millions of years required for land life to evolve and develop. (I don't know a lot about snowball earth, but not only was it too cold for this to work, but a brief wikipedia search suggests it did not last long enough for the conditions specified.)
Your Answer
|
The origins of blunts
Nowadays, it’s very usual to see someone rolling or smoking a cannabis cigarette wrapped in a tobacco leaf, as the popularity of this type of papers has skyrocketed over the last few years, thanks partly to the publicity - direct or indirect - given to it by many celebrities and figures from different backgrounds. In addition to this, as many of you might know, there are blunts with a wide range of aromas added to them, so apart from altering the smell of the content, they also make it considerably less of a giveaway.
However, this type of rolling leaf is a relatively novel product, since blunts go back decades to when people used to roll cannabis in tobacco leaves, or strip a cigar and use its outer cover as rolling paper. Today we are taking a closer look into the history of blunts, on a journey that will take us from the Caribbean in the 19th century to the cannabis dispensaries and clubs of the modern age.
Properly rolled and ready to use blunts
Properly rolled and ready to use blunts
Origin of blunts
Our journey starts in the Caribbean Sea during the 19th century, on a group of idyllic islands where locals began to roll their marijuana using tobacco leaves. No one really knows why this practice started in places like Jamaica, Dominican Republic, Cuba or Puerto Rico, though there are some theories that could explain it.
On the one hand, it could be simply due to a shortage of rolling paper, something that was highly likely given the difficulties presented by this region at the time in terms of provisioning. We know it wasn’t easy for traders to deal with dangerous storms and avoid the dreaded pirates in order to reach such beautiful places! On the other hand, some sources believe blunts were an effective way of concealing marijuana cigarettes, while others speak of a more powerful effect... Either way, it was a practice that took hold in this region and would end up being exported to the whole world.
Many Caribbean regions grow top-quality tobacco
Many Caribbean regions grow top-quality tobacco
Around the same time, the American tobacco industry obtained a new product: a cigar slightly thinner than the classic Corona and with a more rounded tip, which in fact gave them their name. The blunt was born. Usually rolled with a tobacco mixture and a thicker leaf for the outer layer, blunts soon became highly popular, particularly due to their value for money, which made them much more affordable than the cigars of the time.
Soon after, near the end of the 19th century and the beginning of the 20th, companies like White Owl Blunts, Phillies Blunt and Dutch Masters were producing huge amounts of blunts to supply the American market. Obviously, from time to time some of these cigarettes reached the Caribbean shores much to the local’s delight, who from then on always had the option of stripping a blunt to roll a joint if they had a shortage of tobacco leaves or smoking paper.
It is believed that during the 80s and after a wave of immigration from Jamaica, Puerto Rico and Dominican Republic, the habit of smoking blunts became very popular in the New York area. We are not referring to the classic "branded" American cigars that had been already being produced for a century, but to the enormous cannabis spliffs rolled with tobacco leaves that soon found their way into the New York underground market. We all remember that scene from the film Kids (1995) where a guy rolls a huge blunt in the park...
The legendary Phillies Blunt
The legendary Phillies Blunt
Given the New York anti-drug policy during the 80s and 90s, it's hardly surprising that marijuana users opted for a more stealth format (when rolled, it looks like a normal cigar) that gave them the liberty of making them any size they wanted and sharing them with more people than with a traditional joint. From all the brands available, one that stood out from the competition thanks to its outer leaf sturdiness and a less harsh flavour was Phillies Blunt.
If you are a fan of 90s rap music, you’ve probably heard this name, as numerous artists used to mention it in their lyrics. Dutch Masters was also very popular in NY, which soon became the blunt capital of the world due to a sort of communion between music (especially, hip hop) and traditions, between defiance and a kind of community feeling when smoking a blunt.
Smoking blunts, an unstoppable trend
With the arrival of the year 2000, or maybe a little earlier, Spanish people started using tobacco leaves to roll blunts. These leaves could be found in most grow-shops and some tobacconists. Without a doubt, one of the most popular brands at that time was Royal Blunts, which marketed, among other products, a leaf soaked in honey and cognac which the person writing this article remembers very fondly. These blunts weren’t easy to roll, but once lit they were a real treat!
It should be noted that Royal Blunts were real tobacco leaves without any processing, and had to have the right level of humidity in order to be properly rolled; too dry and they broke into pieces, too moist and the cigar would crumple halfway through the rolling process...and at the same time, trying to keep the veins from upsetting the whole operation, and make the leaves stick once finished... Making a good blunt was a form of art!
Cognac and honey Royal Blunts package
Cognac and honey Royal Blunts package
However, today’s blunt wraps don’t have any of these drawbacks. To make them, the tobacco leaves are usually dried and ground and then combined with cellulose pulp and water; this results in a paste that can then be flattened, dried and cut according to the desired size. To this mixture, they add some flavouring agents that will provide taste and aroma to the cigarette when it’s lit. And that’s the reason we can find blunts with the craziest smells, even tequila! As it could be expected, there are blunts made with hemp instead of tobacco.
Buy blunts in Alchimiaweb
In the smoker category of our headshop, you’ll find different types of blunts. We only offer blunts made from hemp, 100% tobacco-free and, therefore, nicotine-free. The three brands featured in our catalogue offer their blunts in twos, sealed in an airtight bag in order to have the perfect moisture level when opened.
Juicy Jay's Juicy Hemp Wraps are possibly the most popular, with a wide range of flavours for every taste: grape, mango-papaya, tropical, strawberry, and blueberry are a few of them. They also have the natural classic blunt, with no flavouring agents, so you can experience all the nuances in your flowers.
Juicy Jay's Juicy Hemp Wraps
Juicy Jay's Juicy Hemp Wraps
Lion Rolling Circus is another popular brand of blunts, also manufactured 100% from hemp. Within this range, you can find flavours such as chocolate, strawberry, chewing gum, mango, blueberry... and tequila! As in the previous case, Lion Rolling Circus offers blunts completely natural and with no added flavours.
Finally, Kush Herbal Wraps has a collection of hemp blunts with some interesting added flavourings, such as Sweet, Zero, Kiwi-Strawberry and, of course, the Original, with no flavouring at all. As you can see, there is a wide range of blunts brands to chose from, with a huge array of flavours to combine with those of your favourite flowers!
Happy smoking!
Comments in “The origins of blunts” (1)
alan stephen 2021-06-13
I loved the royal blunt cognac and also the hemp wrap. Is there any of these old school papers around, I don't like the others. Any knowledge on making my own, I grow my own tobacco sometimes.
ATTENTION!! Queries about shipping and payment
Do you want to give your opinion on "The origins of blunts" or ask a question abut this post?
Watch out, it will be published!
About this Cannabis Blog
Subscibe to the blog
error_outline Use of cookies |
Readers ask: How Can Human Errors Be Eliminated In Aviation?
Can human error be eliminated?
“ Human error ” is any mistake or action performed by a human which results in the thing they’re doing to be wrong. People perform at different capacities and far from consistently, so the risk of human error can never truly be eliminated.
What are the ways of reducing human errors?
5 Ways to Prevent Human Error Disasters
• Training, Training and More Training. A business is only as strong as its weakest link and that weak link shouldn’t be your employees.
• Limit Access to Sensitive Systems.
• Develop a Strong Disaster Recovery Plan.
• Test your Disaster Recovery Plan.
• Hold Semiannual or Annual Refresher Courses.
What is human error in aviation?
What are the three types of human error in aviation?
You might be interested: FAQ: How To Become Aviation Technician?
Is human error natural?
What is error prevention?
What is ‘error prevention? ‘ ISO 25000 describes the ‘ error prevention ‘ as ‘degree to which a system protects users against making errors. ‘ 1 In other words, designing a system in a way that it would try to make it hard for the user to commit the error.
What causes human error?
Significant potential human errors are identified, Those factors that make errors more or less likely are identified (such as poor design, distraction, time pressure, workload, competence, morale, noise levels and communication systems) – Performance Influencing Factors (PIFs)
What is human error?
Definition. Human error refers to something having been done that was “not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits”. In short, it is a deviation from intention, expectation or desirability.
Can human error be a root cause?
NO! Human error is probably a Causal Factor. (See the definition of a Causal Factor here). When you see human error as a root cause, the result is often to find blame and ineffective corrective action.
What is error aviation?
You might be interested: What Is The Frequency Range Of Communication Radios In General Aviation Aircraft Quizlet?
What are the 12 human factors?
• Lack of communication.
• Distraction.
• Lack of resources.
• Stress.
• Complacency.
• Lack of teamwork.
• Pressure.
• Lack of awareness.
What are four consequences of human error?
Human errors have the following impact: high social and economic cost, equipment safety, maintenance performance efficiency and effectiveness, equipment productivity, incidents and accidents and fatality [26].
What type of error is human error?
Random errors are natural errors. Systematic errors are due to imprecision or problems with instruments. Human error means you screwed something up, you made a mistake. In a well-designed experiment performed by a competent experimenter, you should not make any mistakes.
What is the dirty dozen in aviation?
What are slips and mistakes?
Mistakes are errors in choosing an objective or specifying a method of achieving it whereas slips are errors in carrying out an intended method for reaching an objective (Sternberg 1996). In other words, you choose a wrong method for achieving your objective.
Leave a Reply |
Healthy Habits to Protect Your Hearing
Healthy Habits to Protect Your Hearing
In Hearing Health, Hearing Loss by audseo
There are many factors that can damage your hearing. Knowing the threats to your hearing can help you to make healthier choices, which avoid the devastating side effects of hearing loss.
The Dangers of Hearing Loss
When you start to look at hearing and health, you may find that the two are more interconnected than you may first suspect. Commonly mistaken as just an ear issue, the communication problems which arise due to hearing loss have incredibly serious emotional, cognitive and physical side effects.
When you struggle to connect to the people in your life your relationships slowly erode and rifts form. This is true of your closest relationships, such as your significant other and also professional relationships. These rifts can cause major blows to self-confidence, causing chronic depression, anxiety and sleep issues. These emotional and hearing issues can cause many to avoid social situations, which not only furthers depression but can lead to cognitive decline and a less active lifestyle.
In addition, those who suffer hearing loss are at a much higher risk of falls and accidents as they are less aware of their surroundings. Understanding how to protect your hearing can avoid these dangerous side effects from occurring. Here are a few tips to protect your hearing.
Wear Hearing Protection
One of the greatest risks to your hearing is noise. Noise is measured in decibels and any decibel level over 85dB can begin to cause noise-induced hearing loss. While hearing loss in the past has been commonly associated with old age, a new generation is finding they are having to deal with hearing loss due to noise at work and at home. For instance, 50% of people ages 12-35 are exposed to unsafe levels of noise from use of personal audio devices. It is important to know the decibel level in the places you spend the most time, such as work, home and during your favorite hobbies and pastimes. If the decibel level is above 85, be sure to wear hearing protection, which can lower the decibels reaching your ears from 15dB- 33dB. Protective earplugs or headphones should be carried and worn any time you are exposed.
Invest in Noise Cancelling Headphones
The issue with personal listening devices which use headphones or earbuds, is that they have the potential to deliver up to 110 decibels directly to your ear canal, causing serious noise-induced hearing loss. For many who listen to personal listening devices to drown out other noises in a busy room such as a café, they are forced to turn the volume up higher. Investing in noise-canceling headphones eliminates the need to turn the volume up high and damage your hearing. These amazing devices detect the ambient noise in the room and produce an audio signal which effectively inverts these particular sound waves. When the two sound waves are matched, they are effectively flattened, creating the sensation of noise canceling. You will be able to listen to your headphones at a safe volume and maintain your hearing health.
Safe Listening Practices
When listening to headphones, it is important to make sure the volume is never turned up past 60% of the total available volume. This is also true when listening to music in the car or home, as well as when watching TV. It is also important to take listening breaks. It is not just the volume you are exposed to, which can damage your hearing but the length of time.
Live a Healthy Lifestyle
There are many health and lifestyle issues that can affect your hearing. For instance, excessive use of alcohol and tobacco can increase your chance of also having hearing loss. Many health complications such as diabetes, hypertension and cardiovascular disease also carry higher instances of damage to the ears. By maintaining a healthy diet and exercise you can prevent some of these chronic diseases while also making sure your hearing health stays intact.
Have Your Hearing Checked Regularly
The truth is that even if you follow all of these tips, there is still a chance you can experience hearing loss, especially as you age. You may be able to account for potential dangers to your hearing, only to be unexpectedly affected by a loud blast or head impact. The best thing you can actually do for your hearing health is to have your hearing checked regularly. Even a mild case of hearing loss can already begin to affect you negatively. It’s best to identify and treat your hearing, before it can start to impact the quality of your life. |
ISSN 2330-717X
How Do World’s Smallest Sea Turtles Become Stranded In Cape Cod?
A computational analysis has surfaced new insights into the wind and water conditions that cause Kemp’s ridley sea turtles to become stranded on beaches in Cape Cod, Massachusetts. Xiaojian Liu of Wuhan University, China, and colleagues present these findings in the open-access journal PLOS ONE.
The Kemp’s ridley sea turtle is smaller and in greater danger of extinction than any other sea turtle in the world. This species is found in coastal waters ranging from the Gulf of Mexico to Nova Scotia, Canada. While Kemp’s ridley populations have slowly risen since conservation efforts began in the 1970s, the number of turtles found stranded on Cape Cod beaches in the last few years is nearly an order of magnitude higher than in earlier decades.
To help clarify the conditions that lead to stranding, Liu and colleagues combined computational modeling with real-world observations. This enabled them to investigate circumstances that could trigger hypothermia in Kemp’s ridley turtles–the primary cause of most strandings–and subsequent transport of the cold-stunned animals to shore.
The researchers used the Finite Volume Community Ocean Model to simulate ocean currents in Cape Cod Bay. To validate these simulations, they also released drifting instruments into the currents and tracked their movements via satellite. Then, they looked for links between the simulations, the drifter data, water temperature data, and records of where and when Kemp’s ridley turtles were found stranded.
The findings suggest that Kemp’s ridley sea turtles are more likely to become stranded at certain beach locations along Cape Cod when water temperatures drop below 10.5° Celsius and, concurrently, winds blow with high wind stress in certain directions. Once stranded, hypothermic turtles usually require assistance from trained volunteers in order to survive.
While these findings provide new insights that could help guide future search and rescue efforts, questions remain. Further research is needed to clarify the depth of water at which Kemp’s ridley sea turtles typically become hypothermic, and how processes like wind and waves may impact stranding events at those depths.
Co-author James Manning notes: “While the state-of-the-art ocean model can help simulate the process, both the student-built drifters and bottom temperature sensors deployed by local fishermen are critical to the investigation.”
Leave a Reply
|
A Guide to Understanding Maui’s Weather
Depending on where you are on Maui, the weather conditions can be very different.
It can be snowing in one area (like the summit of Haleakala,) and 85 and sunny on the beach. That’s an extreme example. Less severe is it can be pouring down rain near the airport, but 15 miles away at the same elevation in Kihei it can be blue skies and sunny. Why?
Here’s a quick guide to help you understand Maui’s lolo weather patterns.
Maui is generally broken down into four regions, central, leeward, windward and upcountry. The reason for the wild weather swings is due to a few factors:
Haleakala and the West Maui Mountains
These mountains keep rain locked on one side of the mountain. For example, the east side of the West Maui Mountains will receive around 400 inches of rain a year. But the west side of the mountains (Lahaina) may receive around a foot of rain a year.
Another factor in the weather, also related to the mountains, are the winds. The trade winds, arrive from the northeast for about 80% of the year. When blowing, they will wrap around the mountains, causing a jet stream-like action, increasing in force.
The other winds on Maui, called Kona Winds, come from the south. They tend to bring with them VOG (volcano ash fog) from the Big Island and are generally less intense than the trade winds.
Finally, half the island is within 5 miles of the ocean. This creates a robust marine influence for these parts of Maui, but the other half of the island will see no effect at all.
Central Maui
When you land at the airport, you’re in Central Maui. Central Maui is Kahului and Wailuku. Wailuku is the home of the government buildings and sits at the base of the West Maui Mountains. Because of its proximity to the mountains, Wailuku tends to be wetter than Kahului. But, being trapped between the West Maui Mountains and Haleakala, both towns feature warm temperatures, while having less wind and higher humidity than the leeward side of the island.
Leeward Side
The most popular region for visitors is the leeward side, which consists of the south shore (Kihei/Wailea/Makena) and the west side (Lahaina, Kaanapali, and Kapalua).
Here is where the trade winds come in to play. The West Maui Mountains split the winds.
As the winds on the north side of the island blow, they will continue to hug the north shore, but these same winds will funnel between the West Maui Mountains and Haleakala. This blast of wind ends up releasing in Maalaea then wrapping along the Kihei/Wailea coasts. This is why it can be so incredibly windy in the Maalaea Harbor and the south shore. Seeing whitecaps in Maalaea Harbor is not uncommon. The mountains that funnel the winds through also block the rain from coming over to the leeward side, which is why it’s the sunniest, warmest and driest part of the island.
But be aware, the afternoon winds can also make it to the beach, kick up sand, and make your afternoon a major pain in the okole.
The coolest part of the island can get downright frosty at night during the winter (the 40s are not unusual). When people say “upcountry,” they’re generally referring to the Makawao-Pukulani-Kula area. The highway from Kula to Haleakala is also considered upcountry. Upcountry, which is between 1,700 to 4500 feet elevation, and a popular location for residents to reside because of the cooler temperatures, which will average in the 70s and low 80s vs. the 80s and low 90s of the leeward side. Upcountry also has far less humidity, especially compared to Central Maui. Generally speaking, Upcountry has the most comfortable climate.
Windward Side
Consisting of the north shore (Paia/Haiku) and the east side (Hana) of Maui, the windward side is noted for its high winds in Paia and rain around Hana. The northeast trade winds in Paia create excellent conditions for kiteboarding and windsurfing. It’s considered one of the best locations in the world for these activities.
Meanwhile, down the road on the Hana Highway, if you stay at around sea level, the weather isn’t noticeably wetter. But as you climb elevations along the side of Haleakala, you’ll be entering rain forests where it can rain 365 days a year.
Comments (0) Show CommentsHide Comments (Remember)
Cool. Add your comment...
More Articles from Hawaii Life |
leptin rich foods
A vast majority of people worldwide believe that putting on or losing weight is all about persistence, hard work, and calories. However, according to a new search related to obesity, a hormone called leptin plays a significant role.
Leptin is a hormone that your body naturally produces through fat cells. The production of leptin inside your body solely depends on your body fat. People with higher body fat percentage tend to have a higher amount of leptin inside their bodies.
This hormone’s primary function is to control or maintain the amount of fat stored in your body. Furthermore, leptin also regulates the calories you burn and consume. The leptin provides a signal to your brain that you should stop eating when your stomach gets full or overeat.
But apart from this, what if you feel like eating all the time?. Well, if that is the case, then you must be leptin resistant. In other words, being leptin resistant means that your brain has stopped signaling that you should not eat more. Thus, it results in starvation. However, many professionals suggest that one should eat leptin rich foods to increase leptin sensitivity (or, in other words, to decrease leptin resistance).
Moreover, it is quite challenging to say which foods contain a higher amount of leptin because it is a less researched subject. However, including these nine below-mentioned foods in your diet can do wonders in coping with your hunger and satisfying your appetite.
Being a couch potato and eating junk food all the time may give you temporary pleasure. However, sooner or later, you will pay the price.
Many people find it very difficult to stop eating junk food because they become addicted and can not curb their hunger. However, you can try these nine foods to curb your hunger and to satisfy your appetite to some extent.
Apple, being the evergreen fruit, contains many health benefits for humans. It is rich in Vitamin C and Fiber. They have low calories, which means that you will not put on fat by consuming them. Indeed, you will not gain weight by having an apple. But, the question arises on how it does increase leptin sensitivity?
According to research, the answer to that is that apples contain pectin(pectin contains galacturonic acid, and you will usually find it in juicy fruits), which is responsible for decreasing leptin resistance.
Like apples, oatmeal is rich in fiber too. And people all over the world eat oatmeal or cereal to decrease insulin levels. Moreover, you must have seen fit and healthy people eating oatmeal. The primary reason that people eat oatmeal is that it contains protein and helps in fat loss. You must include cereal or oatmeal in your diet because it will kill your hunger and help prevent starvation.
Having fish in the meal will not only satisfy your appetite but also fight with leptin resistance. Consuming fish in a meal will help prevent starvation, and it is a top choice to boost leptin levels. Furthermore, the oil of tuna fish also helps in decreasing leptin resistance and increasing leptin sensitivity.
Green tea is a popular fat loss drink that helps in increasing metabolism too. Drinking green tea regularly twice a day will help you in losing the overall body fat. Moreover, according to a German study, green tea turns out to be an active and effective agent that decreases the leptin resistance.
You might have heard people saying to have almonds to boost your memory. Quite amusing, right?. But almonds, apart from being brain food, contain fatty acids that increase metabolism and boost leptin sensitivity.
Broccoli is rich in calcium, and vitamin C. Calcium increases metabolism, while vitamin C combined with calcium helps burn calories. Calcium and vitamin C combined makes broccoli a helpful agent to decrease leptin resistance too.
Where excessive consumption of junk foods like pizza, burger, hotdog, plays their part in making you leptin-resistant, in the same way, having 2 to 3 eggs a day will help to keep you from becoming leptin resistant. Eggs contain vitamin B12, which helps break down fat cells, further leading to increased leptin sensitivity.
Beans are rich in protein that helps you build muscle(remember that building up muscles and gaining fat are two different things). These build up muscle cells aid in burning calories at a much faster rate. Consequently, it helps in burning away the fat and increasing leptin sensitivity.
If you want to boost your leptin production, consider adding three to four spoons of sesame seeds to your diet. Regularly consuming sesame seeds will help you produce leptin at a higher rate because it contains omega-3 fatty acids, zinc, and fibers. Apart from this, the antioxidants present in these seeds will eventually help in decreasing leptin resistance.
Besides all of the foods mentioned above, one should consider including healthy fruits and vegetables such as watermelon, sweet potatoes, carrots, berries, in his/her diet to boost leptin and decrease leptin-resistance.
Leptin is an essential hormone that helps in controlling or maintaining fat storage in our bodies. However, many people suffer from leptin-resistance. In the condition of leptin resistance, the leptin stops signaling to the brain.
To cope with leptin resistance and to increase the leptin production in your body, you must consider including all the foods mentioned in this article to your diet. These foods, like oatmeal, sesame seeds, lean protein, fish, broccoli, help decrease leptin resistance or increase leptin sensitivity. However, most of them are rich in leptin and help in the leptin’s overall production in your body.
Also, check out this supplement that can help you the leptin resistance.
The research on leptin is quite minimal, and hopefully, we will get to know more about leptin and the causes of leptin resistance in the future. |
15 Fabulous Schönbrunn Palace Facts
This famous palace in Austria has a history of over 3 centuries.
In this post, you’ll discover the ultimate list of Schönbrunn Palace Facts, one of the most popular historic monuments in the capital of the country.
1. Schönbrunn Palace is located near Vienna’s historical center
Schönbrunn Palace is one of the most famous structures in Austria and it’s located just near the heart of the capital of the country, Vienna. It’s considered to be the most important architectural, cultural, and historic monument in the country.
The palace compound, including its immense garden, is massive and covers an area of 186.28 hectares (460.3 acres). It’s located just a few kilometers to the southwest of Vienna’s historic center in a district called “Hietzing.”
schonbrunn palace facts
The palace / Thomas Wolf / https://creativecommons.org/licenses/by-sa/3.0/de/deed.en
2. It was the summer residence of the House of Habsburg
The palace was the summer residence of the Habsburg Rulers for multiple centuries. The House of Habsburg is considered to be one of the most influential royal families in Europe.
In their glory days, they ruled over an extended area in Europe and continuously occupied the throne of the “Holy Roman Empire” which ruled over most parts of western and central Europe from 1440 until its dissolution in 1806.
habsburg rulers
Habsburg Rulers / Wiki Commons
3. The area was originally the emperor’s private hunting ground
The land on which the palace was built used to be occupied by a large mansion referred to as “Katterburg,” which was built in the year 1548. It was Holy Roman Emperor Maximilian II who purchased the land including the mansion in 1569.
The idea was to populate the massive area with wild animals such as pheasants, ducks, deer, and boar, with the intention to create a private area for the royal family to hunt.
Schonbrunn palace area
4. The original palace was constructed halfway the 17th century
It wasn’t until the next century though that the mansion was replaced what would be the first palace constructed on the site. It was Empress Eleonora of Gonzaga, who enjoyed hunting as well, who constructed a “Château de Plaisance” on the site between 1638 and 1643.
She had inherited the land after the death of her husband, Holy Roman Emperor Ferdinand II, and this way she could spend more time in the area, while at the same time populating another area with more exotic animals such as turkeys and peafowl.
The original palace in the 17th century
The original palace in the 17th century / Wiki Commons
5. It was named after the source of water of the palace
The name of the palace is believed to date back to the 14th century when Emperor Matthias discovered a spring on the land that the palace as built on.
Schönbrunn” literally translates to “beautiful spring,” so the palace was simply named after the source of water used for the palace.
The first time the name “Schönbrunn” was actually used in writing was on an invoice dating back to 1642, around the time that the original palace as constructed.
Palace front
The palace entrance / Simon Matzinger / https://creativecommons.org/licenses/by-sa/3.0/deed.en
6. The current palace was built by a very powerful woman
The original palace built in the 17th century was remodeled in the Baroque style by architect Johann Bernhard Fischer von Erlach. Emperor Leopold I commissioned him to build an imperial hunting lodge for his son, Crown Prince Joseph.
The shape of the palace we see today was constructed in the 18th century by Empress Maria Theresa, the mother of equally famous Marie Antoinette who would become Queen of France, and the only female Habsburg Ruler and one of the most powerful women in Europe at the time.
Most of the construction took place during the 1740s and 1750s while the palace and its garden were continuously expanded and remodeled in the latter part of the century as well.
Palace in 1750s
7. It was redecorated during an important period in European history
The final remodeling happened during the reign of Franz I, the final emperor of the Holy Roman Empire. He ruled from 1792 until August 6, 1806, when he abdicated as a response to the coronation of Napoleon Bonaparte as emperor of the French.
During the French Revolution, he commissioned the remodeling of the palace in the neoclassical style, which is for the most part how it appears today.
Schonbrunn palace front view
8. The number of rooms inside Schönbrunn Palace is simply astounding
There are a total of 1,441 rooms in the massive palace, including some of the most beautifully decorated rooms in the world. It has been the host to the leading statesmen of Europe for multiple centuries.
It was the main focus of the court life of the Habsburg Rulers and they welcomed their guests in the marvelous Royal Gallery, one of the most amazing rooms in the palace.
Royall Gallery
Royal Gallery / Ralf Roletschek / https://en.wikipedia.org/wiki/en:GNU_Free_Documentation_License
9. Part of the garden was designed by an admirer of a famous French landscape architect
The garden of Schönbrunn Palace is referred to as the “Great Parterre” and a large part of the garden was built in the French Style, resembling the immense garden at the Palace of Versailles.
The reason for this is simple. The main landscape architect was Jean Trehet who happened to be a great admirer of André Le Nôtre, the main landscape architect of Louis XIV of France!
The garden also contains a huge maze, about 32 sculptures, and numerous fountains. Some parts of it were turned into an English-style garden in the 19th century.
Schönbrunn Palace garden
The garden / David Jones / https://creativecommons.org/licenses/by/2.0/deed.en
10. The garden of Schönbrunn Palace features an Orangerie
An Orangerie is a building where numerous types of fruit trees were planted and which were protected during the cold winter months. By building a large greenhouse, the palace could grow orange trees which would only grow in a warmer climate.
The Orangerie of the Schönbrunn Palace probably dates back to the 17th century, when the original palace was built but was seriously expanded during the reign of Maria Theresa in the 18th century.
The Orangerie is located in the northeastern part of the garden.
orangerie schonbrunn palace
The Orangerie / C. Garitan / https://creativecommons.org/licenses/by-sa/4.0/deed.en
11. The hill featuring the gloriette was supposed to be the palace’s location
One of the most remarkable Schönbrunn Palace facts is that the original location of the palace is now occupied by one of the most prominent buildings in the garden, the so-called “Gloriette.”
This building was constructed by Maria Theresa and was built to glorify the empire and Habsburg Power, as well as the “Just War” they were fighting at the time.
Stones from the nearby “Schloss Neugebäude” were used to build this magnificent Gloriette on a 60-meter-high (200 feet) hill, overlooking the Neptune Fountain and “Great Parterre” below.
Gloriette and Neptune Fountain
Gloriette and Neptune Fountain / Simon Matzinger / https://creativecommons.org/licenses/by-sa/3.0/deed.en
12. The Roman ruins in the garden aren’t real
One of the most peculiar Schönbrunn Palace facts is that it was actually a trend in the 18th century to construct so-called “follies,” which are basically fake architectural structures.
In this case, the fake elements were Ancient Roman Ruins, which were constructed in 1778 and referred to as the “Ruin of Carthage.” Today it forms a remarkable attraction in the garden of Schönbrunn Palace.
Roman Ruin in palace garden
Roman Ruin / My Friend / https://creativecommons.org/licenses/by-sa/3.0/deed.en
13. It houses one of the biggest botanical gardens in the world
The Palmenhaus Schönbrunn is a huge greenhouse that opened its doors in the year 1882 and is considered to be one of the largest botanical exhibits in the world.
One of the most fascinating Schönbrunn Palace facts is that it’s one of 4 greenhouses in the palace complex, and contains over 4,500 different types of plant species.
Schonbrunn botanical garden
14. The oldest zoo in the world is part of the palace’s compound
Another one of those amazing Schönbrunn Palace facts is that it houses the oldest continuously operated zoo in the world, referred to as the “Tiergarten Schönbrunn” or simply the “Vienna Zoo.”
It was originally founded as an imperial menagerie in the year 1752 and still contains some of the Baroque buildings of this period, making it one of the most fascinating zoos in the world to visit!
tiergarten schonbrunn
Tiergarten / Gryffindor / https://creativecommons.org/licenses/by-sa/3.0/deed.en
15. It’s a UNESCO World Heritage Site and the most popular tourist attraction in Vienna
UNESCO has included the Schönbrunn Palace in its World Heritage List in 1996, and the palace is the most popular tourist attraction in Vienna and all of Austria. It’s been owned by the Republic of Austria ever since 1918.
More than 5 million tourists from all around the world visit the palace and its many attractions every year, making it one of the most popular tourist attractions in all of Europe as well!
fun schonbrunn palace facts |
While we know the Arctic blast that crippled much of the Southwest and Southeast last week caused unprecedented damage to cities and homes, the full extent of its impact on wild game and fish populations remains unclear. State wildlife officials are still conducting surveys to assess the situation.
Mortality is expected in big and small game and non-game animals, game birds, songbirds, and fish due to the storm itself, as well as continued freezing temperatures, ice, snow, and frozen waterways. Quail in Texas and Oklahoma likely took a hit, and other reports note dead songbirds, including purple martins, Eastern phoebe, and wrens, and shorebirds like pelicans and cormorants.
Exotic and unusual species, such as nutria in Louisiana and blackbuck, axis deer, and others on ranches in Texas, could take a hit, state officials say. The Texas Parks and Wildlife Department doesn’t manage or regulate exotic species such as axis or blackbuck, but the agency is gathering information about how they fared during the storm.
“We acknowledge the cold weather likely did have a significant impact on these species,” the agency told Outdoor Life in a statement. “The native whitetail and mule deer are much more tolerant to these extreme cold weather events than the exotics.”
Read Next: There’s More to Texas Than Hunting Exotic, High-Fence Ranches
TPWD does not foresee any significant losses or mortality for whitetail or mule deer, and said its staff is not hearing about any noticeable deer mortalities except for a few older deer, which isn’t unexpected.
“The more pressing concern is possible impacts on the native habitat in some regions,” the TPWD statement continued. “In South Texas, some of the brush species still had green leaves prior to the freeze/snow and now staff are noticing many shrubs shedding leave[s] and turning brown. Additionally, staff are seeing some impact on the winter weeds, which are critical for deer this time of year and into the early spring. There still are some green patches of bur clover, but we’re also seeing that a lot of it is burned from the freeze.”
Despite the persisting cold temperatures, TPWD hopes that the soil will eventually absorb moisture from the snow and ice, and contribute to a strong spring green-up.
“Despite the potential significant loss of axis [deer], the silver lining is this mortality event may lower free-ranging exotic populations in areas of the Texas Hill Country where they were overpopulated, ultimately helping native habitats that benefit white-tailed deer and other wildlife.”
In Louisiana, invasive nutria likely sustained some mortality, but unfortunately won’t be wiped out.
“Nutria will huddle together in the cold temperatures so I don’t believe many will perish from the cold,” Jennifer Hogue-Manuel, the furbearer biologist and manager of the Coastwide Nutria Control Program, wrote in an email. “I have seen nutria lose tails and toes from frostbite, though.”
Assessing Fish Kills
Along the Texas coast from Sabine Lake to Lower Laguna Madre, TPWD officials are gathering reports of massive fish kills from agency officials, guides, anglers, and other boaters. Initial reports began arriving Feb. 14 and continued the following week. Officials say the non-recreational species that were impacted include pinfish, spot, silver perch, gulf menhaden, mullet, and other foraging fish. The hardest-hit game species include red drum, spotted seatrout, sheepshead, grey snapper, snook, black drum, and tarpon.
“The geographic extent of fish kills includes the entire Texas coast, but at this point it appears as if bay systems south of Galveston Bay received most of the impacts,” the TPWD announced in a press release. “The majority of the kills were located along the southern shores and undeveloped areas such as the back sides of the barrier islands…There appear to be differential impacts often seen in various freeze events. Areas such as Pringle Lakes and south of 9 Mile Hole at the Land Cut in the Laguna Madre appear to have higher proportions of game fish impacted.”
Officials with the Arkansas Game and Fish Commission say forage species such as shad likely will die in lakes due to the excessive cold. Deeper lakes in the northern half of the state won’t fare as badly as shallower lakes in the southern half. Shad are prolific spawners, however, and populations should rebound quickly.
While other species may not be so resilient across the South, only time will tell the extent of the damage. To report winter-kill of fish and game in Texas, click here. |
Home & Garden: Bird songs | PostIndependent.com
Home & Garden: Bird songs
Larry Collins
Free Press Home & Garden Columnist
As I mentioned in my last column, birds draw on a variety of sounds to communicate.
Typical sounds fall into two main groups: relatively long and elaborate songs, used to impress and attract a mate or declare territorial boundaries; and briefer calls, typically used to identify family members, announce the presence of a predator, or convey information about food.
This week I want to talk about bird songs.
Why? Birds put a lot of effort into singing, drumming, winnowing, and otherwise making a prominent exhibition. They do this to impress mates and proclaim territories.
How does a duckling know how to quack like a duck, or even which duck to quack like? Different species learn in surprisingly different ways — some know their songs at birth, some require tutoring; others learn their songs and then improvise to build their repertoires; and still others, like the mockingbird, copy nearly anything they hear into songs with hundreds or thousands of variations.
Songs are often loud and repetitive, so they tend to be noticed more than other bird sounds. Birds may sing their songs thousands of times throughout the day. Dickcissels may spend as much as 70 percent of the day singing while establishing territories and courting females.
Some birds have large repertoires of songs. The Brown Thrasher can sing as many as 2,000 distinct songs. Other species, such as the Henslow’s Sparrow, seem to have only one song. In North America, we hear mostly males singing, because they typically take the lead in defending territories and attracting mates. However, especially in the tropics, some species sing duets involving both the male and female.
Experiments with recorded songs have shown that birds sing to attract mates. For example, House Wren songs broadcast near nest boxes will attract female House Wrens. Female birds may also judge the quality of a male’s song when selecting a mate. Some studies have shown that males with extra food in their territories are the most persistent singers, and in some species the most persistent singers attract females the soonest.
Playback experiments have also shown that songs are important in defending a territory. For example, male House Wrens respond aggressively to the recording of another male’s song, sometimes even attacking the loudspeaker. In other tests, researchers temporarily removed male birds from their territories but played songs through speakers on some of the territories. Neighboring males were less likely to invade territories from which songs were broadcast, showing that song means “Keep out!” to other birds.
Although most birds sing with their voices, others use their bills or wings to drum up a mate’s interest. A woodpecker drums on a tree or our houses to produce a “song” that other members of the same species recognize. Woodpeckers often select dry branches, hollow logs, or other materials that provide maximum volume for their drumming. Like songs, drumming is used in courtship and to declare a territory.
The next time you hear a bird singing, see if you can determine whether it is a song or a call. Also, try to determine the species of bird. The latter can be a real challenge!
Speaking of bird identification, information overload is the bane of the bird watcher — as anyone knows who has ever flipped through 40 species of sparrows in a field guide.
What if an app could quickly tell you which birds are most likely options based on your location, season, and a brief description? Not just which birds theoretically could occur near you; but, which birds are actually reported most often by other birders? That’s what Merlin Bird ID does. And it’s free — because Cornell Lab of Ornithology wants to make bird watching easier for everyone.
Merlin Bird ID covers 285 of the most common birds of North America (with more on the way). In addition to help with ID, it contains expert tips, more than 1,400 gorgeous photos, and sounds for each species. It is available now for iPhone and other iOS7 devices (like tablets), and it’s coming soon for Android.
Get more details at the Merlin website, http://www.merlin.allaboutbirds.org, where Android users can sign up for notification when it’s ready.
Thanks again to the Cornell Lab of Ornithology for some of the information in this column.
Local bird expert and GJ Free Press columnist Larry Collins owns Wild Birds Unlimited, 2454 Hwy. 6&50, which caters to folks who want the best backyard bird-feeding experience possible. Email your bird-feeding and birding questions to lcollins1@bresnan.net and he’ll answer them in his bi-weekly Q&A column.
Support Local Journalism
Support Local Journalism
Start a dialogue, stay on topic and be civil.
User Legend: iconModerator iconTrusted User |
The Hawaiian Islands are one of the most unique and sacred island chains in the world. Collectively, Hawaii is a volcanic archipelago of eight major islands, islets, and several smaller atolls. The main islands consist of Hawaii (Big island), Maui, Oahu, Kauai, Molokai, Lanai, Kaho’olawe, and Ni’ihau. Hawaii’s culture is distinctly unique with the history and arrival of the Polynesian voyagers, canoe plants, and the many people who arrived in Hawaii to work on sugar and tropical fruit plantations. Hawaii’s ecosystem is particular to itself with many micro-climates, and a diverse ecology. Hawaii’s people are a combination of Native Hawaiians, and a melting pot of cultures from around the world.
End of content
All loaded |
Fresh Coast Salt Therapy
breathe - relax - restore
Dry Salt Therapy is simple to understand. There are three primary characteristics of pure sodium chloride, NaCl, known as salt:
2. Salt is anti-bacterial
3. Salt is anti-inflammatory
Active salt rooms include a halogenerator and are primarily based on providing a controlled way of providing micronized particles of salt in the air to be inhaled and exposed to the skin. This can be achieved only by a special piece of equipment known as a halogenerator. Pure sodium chloride is placed into the halogenerator, which then precisely crushes and grinds the salt into specific micronized particles and disperses the salt aerosol into the air in a closed environment such as a room or chamber. This type of dry salt therapy is known as Halotherapy.
How Dry Salt Therapy Improves the Respiratory System
|
4 Foods to Keep Your Brain Sharp
By Stephen R. Farris
If you're in college, you know how tough it is to juggle all of those classes, taking down during each class, and staying up countless hours each night studying and doing homework.
Not to mention sleep is when you get it, and eating healthy can be a challenge, especially when it comes to brain health. College students may opt for more fast foods, or stock pile junk food in their dorm room to snack on.
One thing to consider -- if you're having problems with concentrating on your school work -- is it could be the result of the foods you are consuming. Not only could those foods pack on more weight on your body, they can also cause you to feel fatigue, it could also have an effect on your mental health in the form of losing focus.
However, there are certain foods you can eat -- and even stockpile -- that will actually give you more energy and keep your brain sharp.
Blueberries, strawberries, and blackberries (to name a few) all contain a flavonoid called anthocyanins. Anthocyanins have been linked to improving mental sharpness by increasing the flow of blood to the brain.
Citrus Fruits
Similar to berries, citrus fruits - such as oranges, grapefruits, tangerines, lemons, and limes - have a number of flavonoids that include hesperidin, naringin, quercetin, rutin, and a number of others. In other words, citrus fruits are loaded with flavonoids. These flavonoids found in citrus fruits can lead to memory boost, and also help protect your nerve cells from injury.
Want to increase your brain health, then you might want to drink or eat something of the dark chocolate variety. Dark chocolate and other cocoa products score highest in the amount of flavonoids found in them. In one research, people who drank 990 mg of a cocoa beverage once a day for eight weeks, showed to have an increase in mental testing.
If you are a college student and looking to buy snacks for your dorm room, then go nuts. No, not literally, but more in the food variety. Nuts are loaded with nutrients -- including Vitamin E and zinc -- that are good for brain health. Nuts are considered a healthy fat, loaded with protein and fiber.
Other foods that are good for brain-health include eggs, fish, avocados, beets, and vegetables (red, green, and orange).
If you're having trouble concentrating, talk with your local chiropractor to find out some of the tips and suggestions they can offer to help you get back on track.
To learn more about your health, wellness and fitness, see your local chiropractor at The Joint Chiropractic in Lake Mary, Fla.
Story link
Download your offer today and save!
$29 New Patient Special, Consultation | Exam | Adjustment
|
DASVANDH or Dasaundh, lit. a tenth part, refers to the practice among Sikhs of contributing in the name of the Guru one-tenth of their earnings towards the common resources of the community. This is their religious obligation a form of seva or humble service so highly valued in the Sikh system. The concept of dasvandh was implicit in Guru Nanak`s own line: “ghali khai kichhu hathhu dei, Nanak rahu pachhanahi sei He alone, 0 Nanak, knoweth the way who eats out of what he earneth by his honest labour and yet shareth part of it with others” (GG, 1245).
The idea of sharing and giving was nourished by the institutions of sangat (holy assembly) and langar (community kitchen) the Guru had established. In the time of Guru Amar Das, Nanak III, a formal structure for channelizing Sikh religious giving was evolved. He set up 22 man/Is or districts in different parts of the country, each placed under the charge of a pious Sikh who, besides preaching Guru Nanak`s word, looked after the sangats within his/her jurisdiction and transmitted the disciple`s offerings to the Guru.
As the digging of the sacred pool, amritsar, and erection in the middle of it of the shrine, Harimandar, began under Guru Ram Das entailing large amounts of expenditure, Sikhs were enjoined to set apart a minimum often per cent (dasvandh) of their income for the common pool, Guru ki Golak (q.v.). Masands, i.e. ministers and tithe collectors, were appointed to collect kar bhet (offerings) and dasvandh from Sikhs in the area they were assigned to, and pass these on to the Guru.
Dasvandh has since become part of the Sikh way of life. The custom bears parallels to Christian tithes requiring members of the church to pay a tenth part of the annual produce of their land or its equivalent in money to support it and the clergy, and to Muslim zakat requiring assignment of 2.5 per cent of one`s annual wealth for the welfare of the destitute and the needy. Classical Indian society had no set procedure for regulating donations or charities, though references are traceable such as those in Parasar Rishi`s writings urging the householder to reserve 1/21 part of his income for Brahmans and 1/31 part for the gods. The Upanisads and the Bhagavadgita commend “true alms” given with a sense of duty in a Fit place and at a fit time to a deserving person from whom one expects nothing in return.
DasvandA is, however, to be distinguished from dan or charity. It essentially attends to the needs of the community and contributions are made specifically for the maintenance of its religious institutions such as gurdwaras and guru ka langar and projects of social welfare and uplift. The custom of dasvandh was codified in documents called rahitnamas, manuals of Sikh conduct, written during the lifetime of Guru Gobind Singh or soon after. For example, Bhai Nand Lal`s Tankhahnama records: “Hear ye, Nand Lal, says Gobind Singh, one who does not give dasvandh and, telling lies, misappropriates it, is not at all to be trusted.”
The tradition has been kept alive by chosen Sikhs who to this day scrupulously fulfil the injunction. The institution itself serves as a means for the individual to practice personal piety as well as to participate in the ongoing history of the community, the Guru Panth.
References :
2. Gopal Singh, A History of the Sikh People. Delhi, 1979
3. Avtar Singh, Ethics of the Sikhs. Patiala, 1970
5. Cole, W. Owen and Piara Singh Sambhi, The Sikhs: Their Religious Beliefs and Practices. Delhi, 1978 W.S. |
Bible Questions and Answers
The real serpent was just that — a real serpent. It was one of the animals that God had made, howbeit more perceptive than the rest and gifted with intelligence and the power of speech.
Genesis 3:1 Now the serpent was more subtil (shrewd, crafty, sensible) than any beast of the field which the LORD God had made
The serpent was part of the creation declared very good on the sixth day.
The serpent was not morally evil but the argument from its limited reasoning capacity deceived Eve into thinking that she could eat of the tree of the knowledge of good and evil and not die. We might suppose that having no moral faculty the serpent couldn’t understand the concept of death as a punishment for disobedience, but based his argument on the non-poisonous nature of the fruit. There was no restriction on the animals eating the fruit. Death would come not from the act of eating the fruit but as punishment for disobeying the commandment of God.
Eve was deceived but Adam was not.
By his flawed reasoning the serpent became the author of Adam and Eve’s downfall. In this capacity the serpent (now long dead) is made the figure for the propensity to sin which resides in all of Adam’s offspring. The propensity to sin was a result of eating of the fruit.
The serpent is not the puppet of, or a cipher for, a fallen angel as is commonly believed.
The evil in the world comes from within man, not from a fallen angel.
Temptation to sin is driven by lust within.
Here is a link to information which you will find helpful: Do You Believe in a Devil?
I hope you have found this helpful.
May God bless you, |
Behavioural and Allied Sciences
Behavioural and Allied Sciences
1.Explain Type “A” and Type “ B” Personality traits
2.Explain the different behaviour styles for handling conflict.
3.“Stress is both a friend and foe. A mild stress may lead to increase in employee’s job performance while high level of stress has harmful consequences”. Elucidate this statement.
4.Answer any three of the following.
a)Components of Attitudes
b)Concept of Emotional Intelligence
c)Eustress and distress
d)Johari Window
e)Listening Process
5.Quote an example of school/college life where your performance suffered due to stress. Also mention any of your personal/Professional achievements that were due to your ability to handle stress in an effective manner
6.What do you understand by attitude? “Job related attitudes are significant for understanding Organizational Behaviour”. Explain
7.What are the techniques of managing emotions at work? Explain.
8.Explain the importance of self awareness in building self concept.
Case Study
Coping Strategies
This stress audit case study is about Company A, a 100-year-old UK manufacturing organization. The company employs 15,000 people and operates on 50 sites. It primarily supplies the agricultural machinery markets.
The company set itself the objective of pulling itself out of a stagnant loss-making situation and to regain market dominance. It set out to accomplish this by completely redesigning its manufacturing techniques through lessons learnt from Japanese companies. The company also implemented a large-scale programme of organizational restructuring involving decentralization and the establishment of cost centers. However, the payoffs were not as great as expected, even after several years of development.
The programme of large-scale change, in the context of an already ailing business had improved performance at a slower than expected rate. Individuals were experiencing stress also. Changes were being implemented and performance was being improved slowly but at a high personal cost (in terms of health) and high organization cost (in terms of disappointing efficiency increases).
Senior managers presumed that middle managers were experiencing the worst stress, being caught between upper management and the work force. A stress audit was conducted with middle managers at each site. The hypothesis was confirmed by the stress audit. An analysis of the stress audit results indicated that stress levels were greater than expected and that many middle managers had adopted stressed styles of behaviour. The stress audit revealed that many of the middle managers perceived also that several of the changes going on around them were outside their influence or control.
Analysis of stress sources and stress coping strategies employed by the middle managers revealed that the organizational development effort itself had the effect of being a source of stress. This in turn made it difficult for people to cope with the change of working practices.
The organization decided therefore to implement additional programmes of stress counseling, and to address the issues of roll clarity and participation in change planning. The latter were seen as complimentary inputs to the development process. Efficiency gains and a reduction of stress were realized as a result.
Q1. Based on the above case study, what steps the company should take to reduce Organisational stress?
1. Which of the following best explains why an employee behaves as s/he does?
2. Environmental stressors include—
3. The behavioural outcomes of stress can include—
4. Inter personal Intelligence is the ability to—
5. Intra Personal Intelligence is a correlative activity—
6. Recognizing emotions of others—
7. Listening process is-
8. People who go through life watching it around them are—
9. Your five senses and past experiences create your —
10. Critics usually have a _____________attitude about life.
11. The physical presence but the mental absence of the listener can be defined as—
12. Levelling and assimilation takes place in__________ Listening.
13. Which is a deterrent to listening Process?
14. _____________component represents the beliefs of a person about an attitude object.
15. Self esteem has ________interrelated aspects.
16. Absenteeism is an outcome of _________symptoms.
17. Behaviour style for handling any situation should be—
18. ___________ people attempt to get what they want by making others feel sorry or guilty.
19. __________is empathetic Listening
20. Our tendency to seek out the company of others, even if we do not feel particularly close them, is known as—
21. Which of the four components of social support does NOT correspond to information-giving or anxiety reduction?
22. When compared to people who are less physically attractive, attractive people are viewed as being—
23. Characteristics of attitude is—
24. Stressors at workplace is termed as—
25. Eustress is—
26. Factors affecting Organisational Effectiveness are—
27. Consequences of stress can be—
28. The stage of stress where maximum adaption is when the individual restores the equilibrium—
29. ______________occurs when we feel insecure, inadequate, helpless or desperate.
30. There are _____________types of Personality—
31. Type ‘b” Personality is—
32. _______________method does not require the use of judges in scaling the statements.
33. ____________________refers to any incompatibility that an individual might perceive between two or more his attitudes
34. An atmosphere of objectivity and mutual trust can help reduce—
35. In alarm stage, the resistance is—
36. Music—
37. Stress results in—
38. What is the key word in understanding organization structure?
39. Which of the following is true of managers in relationship to conflict?
40. Organization Structures
Contact for best and lowest cost solution or
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)
Note: We are not associate with any university or institute. We provide solution for reference & study purpose only.
Marketing Research/ Research Methodology
MBA Assignment A
Question1. “Food Mania” is a chain of fast food restaurants located in major metropolitan areas in the south. Sales have been growing very slowly for the last two years. Management has decided to add some new items to the menu, but first they want to know more about their customers and their preferences.
a) List two Hypothesis
b) What kind of research design is appropriate? Why?
Question2. Develop a plan for conducting a focus group to determine consumers’ attitudes towards and preferences for imported automobiles. Specify the objectives of the focus group, write a screening questionnaire, and develop a moderato’s outline.
Question3. You are in the marketing research department of a firm specializing in developing decision support system (DSS) for the health care Industry. Your firm would like to measure the attitudes of hospital administrators towards DSS. The interview would be conducted by telephone. You have been asked to develop an appropriate scale for this purpose. Management would like you to explain and justify your reasoning in constructing the scale.
Question4. After receiving some complaints from readers, your campus newspaper decides to redesign its front page. Two new formats B and C were developed and tested against the current format,’ A.’ A total of 75 students were randomly selected and 25 students were randomly assigned to each of three format conditions. The students were asked to evaluate the effectiveness of the format on an 11-point scale. ( 1 = Poor, 11 = excellent )
a) State the null hypothesis
b) What statistical test should you use?
c) What are the degrees of freedom associated with the test statistic?
Question5. Describe the appropriate target population and the sampling frame in each of the following situations:
a) The manufacturer of a new cereal brands want to conduct in home product usage test in Chicago.
b) A national chain store wants to determine the shopping behavior of customers who have in store charge card.
c) A local TV station wants to determine households’ viewing habits and programming preferences.
d) The local chapter of the American Marketing Association wants to test the effectiveness of its new member’s drive in Atlanta.
e) A distance education institute wants to determine effectiveness of its management programme launched 3 years ago.
Question6. Develop a series of questions for determining the proportion of households with children under age 10 where child abuse takes place. Use the randomized response technique.
Question7. A manufacturer would like to survey users to determine the demand potential for a new power press. The new press has a capacity of 500 tons and cost $225,000.It is used for forming products from lightweight ad heavyweight steel can be used by automobile, construction equipment and major appliance manufacturers.
a) Identify the population and sampling frame that could be used.
b) Describe how a simple random sample can be drawn using the identified sampling frame.
c) Could a stratified sample be used? If so, how?
d) Could a cluster sample be used? If so, how?
e) Which sampling technique would you recommend? Why?
Question8. A major department store chain is having an end –of –season sale on refrigerators. The number of refrigerators sold during this sale at a sample of 10 stores was 59.
a) Is there evidence that an average of more than 50 refrigerators per store were sold during this sale? Use alpha = 0.05
b) What assumption is necessary to perform this test?
MBA Assignment B
Case Detail :
Read the case study given below and answer the questions given at the end
Case Study
Nike Sprints Ahead of the Competition, Yet Has a Long Way to Run
Nike Inc. located in Beaverton, Oregon is the number one U.S. athletic footwear company and one of the most recognized American brands among foreign consumers. The high degree of recognition is one of the main reasons Nike has been so successful. For the 2005 fiscal year ending May 31, 2005 the company continued to soar, with sales of over $13.7 billion. As of 2006 the company’s trademarks included Nike and Swoosh design and were sold under the brand names Cole Hann, Bauer, and Nike. The company operated 23 distribution centers in Europe, Asia, Australia, Latin America, Africa and Canada.
Perhaps such success could be attributed to its concept based advertising campaigns. The company uses a process that is often called “image transfer”. Nike ads traditionally did not specifically place a product or mention the brand name. A mood or atmosphere is created and than brand is associated with that mood. ”We don’t set out to make ad the ultimate goal is to make connection.” States Dan Wieden, executive at one of Nike’s ad agency. One ad features the Beatles and clips of Nike athletes, Michael Jordan and John McEnroe, Juxtaposed with pictures of regular folk also engaged in sports. It was use to infer that real athletes preferred Nike and that perhaps if general audience buy the brand they will play better, too. Nike’s unpredictable image –based ads have ranged from the shocking, such as its portrayal of real blood and guts in the” search and destroy” campaign used during the 1996 Olympics games, to humors, such as the first ad used to launch Michael Jordan’s brand wear. The latter advertising made the tongue-in-check suggestion that Jordan himself had a hand in the production by sleeping away from a bull’s game at half to run over to his company and than return in time for the games second half.
In 1998 Nike shifted to a new phase in its marketing strategy. Nike emphasized more of its product innovation skills than the jokey, edgy attitude that it displayed in previous year.” We recognize that our ads need to tell consumers that we are about product innovation and not just athletes and exposure. We need to prove to consumer that we are not just slapping a swoosh on stuff to make a buck,” said Chris Zimmerman director of Nike’s U.S. advertising. With the launch of the “I can” campaign, Nike showed fewer of the celebrity athletes who previously usage than in the previous “Just Do It” campaign. Competitors Reebok and Adidas recently featured more product focused ads and were met with a great deal of success. Despite this rearranged focus, Nike did not back away from innovative marketing.
On September 4, 2003 Nike acquired converse Inc. And on august 11, 2004, the company acquired starter properties LLC and Official Starter LLC. On august 4, 2005, Adidas confirmed that it had agreed to acquire Reebok for $3.8 billion. Industry official saw more consolidated ahead.
In 2005, Bill Perez, president and CEO of Nike, stated that developing markets – India, Thailand, Indonesia China, Russia- and the development of Converse , Starter and Nike’s other subsidiary presented big growth opportunity. ”We’ve just scratched the surface in the women’s fitness. In soccer, we have become world’s leading on-field performance brand. And we have been able to leverage that on-field success by creating entirely new category of soccer street foot ware. And we see opportunities like this throughout the portfolio.”
As the company looks ahead of 2010, at the heart of the Nike’s future strategy is the international arena, which could prove to be the most difficult element for Nike to undertake. There seems to be a pretty strong recognition that by 2010, Nike would be largest outside the US than inside. Most recently Nike bought out many of its worldwide distribution centers in order to have greater control of its operation. In the future Nike would like to build up its presence in the key market of India, Thailand, Indonesia, Brazil, China, and Russia. Nike will focus its advertising on sports and will feature sports that are of particular interest in specific region. Nike realizes that while it is ahead of its competition, it still has a long, long way to run.
Questions 1: Should Nike switch a focus on celebrity to a focus on its products in its advertising? Discuss the role of marketing research in helping Nike management take the decision. What kind of research should be undertaken?
Question 2: How would you describe the buying behavior of consumers with respect to athlete footwear?
Question 3: Define the marketing research problem facing Nike, given the management decision problem you have identified?
Question 4: What is the management decision problem facing Nike as it attempt to retain its leadership position?
MBA Assignment C
1. The respondent’s perceptions that their identities will not be discerned by the interviewer or the researcher–
2. Observation bias for mechanical observation–
3. Pretest-Posttest Control Group is which type of Experimental design?
4. The process of correcting data to reduce them to the sample scale by subtracting the sample mean and dividing by the standard deviation–
5. Scale intervals can be used for–
6. The process of recognizing and noting people–
7. Descriptive research is a type of–
8. What is meant by value of research information?
9. The efficiency of OTC products is checked by–
10. An extraneous variable involving changes in the; measuring instrument or in the observers or scores themselves—
11. may be broadly classified as exploratory or conclusive.
12. The time which a respondent takes before answering the question–
13. An extraneous variable attributable to the loss of test units while the experiment is in process–
14. Which one of these is a Market Research Firm?
15. A focus group technique using a telecommunication network is called–
16. In Exploratory research design the methods used are-
17. The research methodology which provides insights and understanding to the problem is–
18. When is the transcribing process of data preparation irrelevant?
19. A scale for measuring attitudes that consists of a single adjective in the middle of an even-numbered range of values, from -5 to +5, without a neutral point,is–
20. Companies that collect and sell common pools of data designed to serve information needs shared by a number of clients is–
21. Which is a type of limited services?
22. Types of syndicated services–
23. The research design which is used to obtain the evidence of cause and effect relationship is–
24. What is list of all units/observations is known as?
25. Promotion of cable TV affects the health of a child 1) strongly agrees 2) agree 3) disagree 4) strongly disagree 5) undecided is an example of–
26. Multiple choice questions for which usually only two responses are given such as: yes -no, male- female is termed as–
27. The summary description of a fixed characteristic or measure of a target population is known as–
28. Which of the following is a technique of exploratory research design?
29. Which of the following techniques is commonly used in social science research?
30. Ranking of a team can de done with the help of–
31. What is the degree of freedom for F-test?
32. Which of the following is the source of secondary data?
33. What is the another name for single cross-sectional designs?
34. Questions to which the respondents can answer in their own words are–
35. Number of units to be included in the study is called–
36. Technique used to motivate respondents to enlarge on, clarify or explain their answers–
37. Non-metric data can be measured on–
38. Which of the following represents the middle value when the data is arranged in the ascending or descending order?
39. Story – telling is an example of
40. “A Local radio station asks people to call in and express their reactions to some controversial issues “is an example of–
Contact for best and lowest cost solution or
Human Resource Management
MBA Assignment A
Question1. What do you mean by Human Resource Management? Also discuss, in brief, both the ‘managerial’ and the ‘operative functions’ of Human Resource Management.
Question2. Define the term ‘Human Resource Planning’. Also explain, in brief, the process of Human Resource Planning.
Question3. Discuss the significance of Job Description, Job Analysis Job, Enlargement &Job Enrichment
Question4. Discuss, in brief, the methods of training.
Question5. What are the skills required by executives? Also explain the methods of developing such skills.
Question6. Distinguish between ‘Performance Appraisal’ and ‘Potential Appraisal’.
Also discuss, in brief, the methods of performance appraisal.
Question7. Distinguish between ‘Monetary Rewards’ and ‘Non – Monetary Rewards’.
Also enlist various types of monetary and non-monetary rewards.
Question8. Write short notes on any three of the following:
1. Emerging HR issues in knowledge industry
2. Incentive plans for operative staff
3. Functions of Trade Union
4. The Expatriate Problems
5. Existing machinery for settlement of industrial disputes in our country
MBA Assignment B
Case Detail :
Please read the case study given below and answer questions given at the end.
Case Study
Suresh Kumar was production manager for Singer Industries Limited; a Noida based electrical appliance company near Delhi. Suresh had to approve the hiring of new supervisors in the plant. The HR Manager performed the initial screening.
On Friday afternoon, Suresh got a call from Anil Dhavan, Singer’s HR Director. “Suresh” Anil said, “I have just talked to a young engineering graduate from a regional engineering college who may be just who you are looking for to fill that supervisor job you asked me about. He has some good work experience in a multinational firm located in Pune, but at a lower salary level. He wants to come over to Noida where his parents live”. Suresh replied, well, Anilji, “I would take care of the boy”. Anil continued, “He is here right now in my office, I am sending him to you, if you are free”. Suresh hesitated a moment before replying, “Great Sir”, “I am certainly busy today but I can’t afford to displease you either. Sir, send him immediately.”
A moment later, Ranga Rao, the new applicant arrived at Suresh’s office and introduced himself. “Come on in Mr. Rao”, said Suresh. “I’ll be right with you after I make a few urgent phone calls.” Fifteen minutes later, Suresh finished the calls and began interviewing Rao. Suresh was quite impressed. The merit certificates, the best suggestion award form previous multinational firm and Rao’s quick responses revealed the candidate’s potential. Meanwhile, Suresh’s door opened and a supervisor yelled, “We have a small problem on line number 5 and need your help.”
“Sure”, Suresh replied, “Excuse me a minute, Rao.” Fifteen minutes later, Suresh returned and the dialogue continued for another few minutes before a series of phone calls again interrupted him.
The same pattern of interruption continued for the next forty minutes. Rao looked at the watch embarrassingly and said, “I am sorry, Suresh, Sir, I have to go now. I have to catch the train to Pune at 9 P.M.”“Sure thing, Rao,” Suresh said as the phone rang again.” Call me after a week”.
Question1. What specific policies might a company follow to avoid interviews like this one?
Question2. Explain why Suresh and not Anil should make the selection decision.
Question3. Is it a good policy to pick up candidates through ‘employee referral method’? Why and why not. Explain keeping the case in the background.
MBA Assignment C
1. The secret of the success of Japanese Companies lies in the fact that:
2. Human resource management does not look after:
3. Which of the following is not a true statement in respect of objectives of HRM ?
4. New concepts like TQM, Kaizen, QWL and Empowerment came into prominence during:
5. The concept of welfare stage in HRM started from:
6. Which of the following is managerial function?
7. HRM is now being considered as:
8. Which is not true:
9. Which of the following is not a stage of the process of HR planning?
10. Once job analysis is conducted, the data reviewed is:
11. Which is true regarding job analysis:
12. Job description does not consist of:
13. Who of the following is not the source of job information in connection with job analysis?
14. Recruitment is:
15. Which of the following is not a stage in the process of selection?
16. Which is not a Psuedo way of selecting applicant?
17. Career planning is:
18. Which of the following is not the step in the career planning and development process?
19. Which of the following is not on-the-job method of training?
20. Which of the following is not off-the-job method of training?
21. Which of the following is not the technique of developing executives?
22. Which of the following is not the principle of training?
23. In the paired comparison technique of performance appraisal, which of the following formulae is applied?
24. Which of the following is not one of the modern methods of performance appraisal?
25. Which of the following statements regarding MBO is not true?
26. Which of the following incentive plans is not for blue collar employees?
27. Which of the following incentive plans is not for white collar employees?
28. Which of the following is not an incentive plan for individuals under blue collar employees?
29. Performance based rewards do not include:
30. The objectives of compensation administration is not to:
31. Which of the following is not a closely related aspect of wage administration:
32. Which of the following is not one of the principles of compensation administration?
33. Which of these is not an internal cause of indiscipline?
34. Which of the following is not the objective of labour relations?
35. Which of the following is not a measure to prevent industrial disputes?
36. Which of the following is not a part of adjudication machinery?
37. Which of the following is not the features of collective bargaining?
38. Which of the following is not a sub part of negotiating stage?
39. Which of the following is not a type of negotiating procedure:
40. Which of the following is not the cause for limited success of collective bargaining in India?
Contact for best and lowest cost solution or
Financial Management
MBA Assignment A
Question1. (a) Should the titles of controller and treasurer be adopted under Indian context? Would you like to modify their functions in view of the company practice in India? Justify your opinion?
(b) A firm purchases a machinery for Rs. 8,00,000 by making a down payment of Rs.1,50,000 and remainder in equal installments of Rs. 1,50,000 for six years. What is the rate of interest to the firm?
Question2. (a) Explain the mechanism of calculating the present value of cash flows.What is annuity due? How can you calculate the present and future values of an annuity due? Illustrate
(b) ”The increase in the risk-premium of all stocks, irrespective of their beta is the same when risk aversion increases” Comment with practical examples
Question3. (a) How leverage is linked with capital structure? Take example of a MNC and Analyze.
(b) The following figures relate to two companies
P LTD. Q LTD.
(In Rs. Lakhs)
Sales 500 1,000
Variable costs 200 300
—- ——-
Contribution 300 700
Fixed costs 150 400
—- ——-
150 300
Interest 50 100
—- ——-
Profit before Tax 100 200
—- ——-
You are required to:
(i) Calculate the operating, financial and combined leverages for the two companies ; and
Comment on the relative risk position of them
Question4. (a) Define various concepts of cost of capital. Explain the procedure of calculating weighted average cost of capital.
(b) The following items have been extracted from the liabilities side of the balance sheet of XYZ Company as on 31st December 2005.
Paid up capital:
4, 00,000 equity shares of Rs.10 each 40, 00,000
16% non-convertible debentures 20, 00,000
12% institutional loans 60, 00,000
Other information about the company as relevant is given below as on 31st December 2005
Dividend Earning Average market price
per share per share per share
7.2 10.50 65
You are required to calculate the weighted average cost of capital, using book values as weights and earnings/price ratio as the basis of cost of equity. Assume19.2% tax rate
Question5. (a) A company has issued debentures of Rs. 50 Lakhs to be repaid after 7 years. How much should the company invest in a sinking fund earning 12% in order to be able to repay debentures? Show the procedure of loan amortization and capital recovery through an example.
(b) A bank has offered to you an annuity of Rs. 1,800 for 10 years if you invest Rs. 12,000 today. What is the rate of return you would earn?
Question6. The proforma of cost-sheet of HLL provides the following data.
Cost (per unit):
Raw materials 52.0
Direct labour 19.5
Overheads 39.0
Total cost (per unit): 110.5
Profit 19.5
Selling price 130.0
The following is the additional information available:
• Average raw material in stock: one month;
• Average materials in process: half month;
• Credit allowed by suppliers: one month;
• Credit allowed to debtors: two months;
• Time lag in payment of wages: one and half weeks;
• Overheads: one month.
• One-fourth of sales are on cash basis.
• Cash balance expected to be Rs. 12,000.
You are required to prepare a statement showing the working capital needed o finance a level of activity of 70,000 units of output. You may assume that production is carried on evenly throughout the year and wages and overheads accrue similarly.
Question7. (a) Through quantitative analysis prove that PI (Profitability Index) is a better technique than NPV (Net Present Value) in Capital Budgeting.
1. (b) A company is considering the following investment projects:
Projects Cash Flows (Rs.)
Co C1 C2 C3
A – 10,000 + 10,000 —– —–
B – 10,000 + 7,500 + 7,500 —–
C – 10,000 + 2,000 + 4,000 + 12,000
D – 10,000 + 10,000 + 3,000 + 3,000
1. Rank the project according to each of the following methods: (1.) Payback, (2.) ARR, (3.) IRR, (4.) NPV assuming discount rates of 10 and 30 per cent.
2. Assuming the project is independent, which one should be accepted? If the projects are mutually exclusive, which project is the best?
Question8. (a) ” Firm should follow a policy of very high dividend pay-out.” Taking example of two organization comment on this statement.
(b) An investor gains nothing from bonus share “Critically analyze the statement through some real life situation of recent past.
MBA Assignment B
Case Detail :
Question1. Give your recommendations about the proposed investment
Question2. You are required to make these calculations and in the light thereof, advise the finance manager about the suitability, or otherwise, of machine A or machine B.
MBA Assignment C
1. The main function of a finance manager is
2. Earnings per share–
3. If the cut off rate of a project is greater than IRR, we may–
4. Cost of equity share capital is —
5. Degree of the total leverage (DTL) can be calculated by the following formula–
6. Risk- Return trade off implies–
7. The goal of a firm should be–
8. Current Assets minus current liabilities is equal to–
9. The indifference level of EBIT is one at which–
10. Money has time value since–
11. Net working capital is —
12. The internal rate of return of a project is the discount rate at which NPV is–
13. Compounding technique is —
14. For determining the value of a share on the basis of P/E ratio, information is required regarding–
15. Tandon committee suggested inventory and receivable norms for–
16. Capital structure of ABC Ltd. consists of equity share capital of Rs. 1,00,000 (10,000 share of Rs. 10 each) and 8% debentures of Rs. 50,000 & earning before interest and tax is Rs. 20,000. The degree of financial leverage is–
17. The following data is given for a company. Unit SP = Rs. 2, Variable cost/unit = Re. 0.70, Total fixed cost- Rs. 1,00,000 Interest Charges Rs. 3,668, Output- 1,00,000 units. The degree of operating leverage is–
18. Market price of equity share of a company is Rs. 25 and the dividend expected a year hence is Rs. 10. The expected rate of dividend growth is 5%. The cost of equal capital to company will be–
19. The dilemma of “liquidity Vs profitability” arise in case of–
20. The present value of Rs. 15000 receivable in 7 years at a discount rate of 15% is–
21. A bond of Rs. 1000 bearing coupon rate of 12% is redeemable at par in 10 yrs. If the required rate of return is 10% the value of bond is–
22. The EPS of ABC Ltd. is Rs. 10 & cost of capital is 10%.The market price of share at return rate of 15% and dividend pay out ratio of 40% is–
23. The credit term offered by a supplier is 3/10 net 60.The annualized interest cost of not availing the cash discount is–
24. The costliest of long term sources of finance is —
25. Which of the following approaches advocates that the cost of equity capital & debit capital remains unaltered when the degree of leverages varies?
26. Which of the following is not a feature of an optimal capital structure?
27. While calculating weighted average cost of capital–
28. Which of the following factors influence the capital structure of a business entity?
29. According to the Walters model, a firm should have 100% dividend pay-out ratio when–
30. Operating cycle can be delayed by–
31. If net working capital is negative, it signifies that-
32. Which of the following models on dividend policy stresses on investors preference for the current dividend?
33. Which of the following is a technique for monitoring the status of receivables?
34. Average collection period is equal to–
35. In IRR, the cash flows are assumed to be reinvested in the project at–
36. In a capital budgeting decision, incremental cash flow mean–
37. The simple EOQ model will not hold good under which of the following conditions–
38. The opportunity cost of capital refers to the —
39. Which of the following factors does not influence the composition of Working Capital requirements ?
40. The capital structure ratio measure the–
Contact for best and lowest cost solution or
Business Laws/ Legal Aspects of Business
MBA Assignment A
Question1. “The fundamental attribute of corporate personality is that company is a legal entity distinct from the members.”Elucidate the statement .Also specify the important features of a company.
Question2. Elaborately explain the essential features of the consumer protection act 1986. Also briefly discuss unfair trade practice and restrictive trade practice as discussed under consumer protection Act?
Question3. What are the characteristics of negotiable Instrument? Discuss the ‘privileges’ of holder in due course as per the provisions of the Negotiable Instruments Act, 1881? Also state the important amendment to be incorporated under sec 138 of the act.
Question4. Discuss the essential elements of a valid contract.
Question5. Write short notes on any three of the following.
(a)“A stranger to the consideration can enforce the contract”. Explain the exceptions in the following.
i- Supervening Impossibility
ii- Novation
(b)Anticipatory breach of Contract
(c) A private company has only 2 shareholders who are also the directors with equal rights of management and voting power. The company has made large profits, but there is a complete deadlock in the management of the company. One of the shareholders applied for the winding up of the company. Decide at what moment does a winding up by the court commence?
(d) What is a ‘Prospectus’? Is it obligatory for a company to file a prospectus or a statement in lieu of prospectus with the Registrar of Companies?
(e) What is meant by the rule of ‘Caveat Emptor’ and what are its exceptions?
Question6. Explain – ‘different modes of crossing of a cheque’ and section 138 as per the provisions of the Negotiable Instrument Act, 1881.
Question7. “A company is a legal person distinct from its members taken individually or collectively”. Comment. Also detail the important features of a company.
Question8. Discuss consumer dispute redressal forums & consumer councils with respect to its pecuniary (Financial) jurisdictions?
MBA Assignment B
Case Study
Aditya Mass Communication Private Limited Vs A.P. state Road Transport Corporation
A.P. State Road Transport Corporation, Hyderabad advertised tender notice on calling for tenders for display of advertisements on the buses owned by it. According to the condition of the Tender Notice, each tender form had to be accompanied by a demand draft for Rs 20 lakhs and tender forms completed in all respects had to be put in the tender box. The accompanying sum of money was the Earnest Money Deposit (E.M.D). Clause (10) of the terms provided that the tender will be opened at 3:00 p.m. on October 31, 1996, in presence of the tenderers or their authorized agents. Clause (14) provided that tenderers will not be permitted to withdraw their tender after the tenders were opened .Clause (15) provided that if the highest tenderer backs out from taking up the agency , for whatsoever reason, the E.M.D. paid by him will be forfeited.
Aditya mass Communication Private Limited submitted its duly filled tender along with demand draft of Rs. 20 lakhs. In relation to this tender, another person approached the High Court and got an order restraining the Transport Corporation from proceeding further with the tender. Following the order, the A.P. State Road Transport Corporation opened the tender box at 3 p.m. and found six sealed covers. In view of the directions of the High Court, the covers were again placed back in the tender box without opening the seals. The signature of the tenderers and their agents was taken to this effect .The tenders were not opened to find out the highest bidder. Aditya Mass Communication Private Limited wrote a letter on November 11, 1996 stating that no reasons were given to him for non-opening of the tenders and that he could not keep the huge amount of Rs 20 lakhs locked in with all the uncertainty associated with the tender. It, thus, requested for return of the Earnest Money Deposit. A.P. State Road Transport Corporation replied on November 14, 1996 that the Aditya Mass communication had signed on the note recording the proceedings of opening the tender box and putting back sealed covers. Thus, it could not put up the argument that no reasons for non-opening of the tender was given on it. The letter notified that the tenders would be opened on November 16, 1996 at 11:30 hrs. Aditya Mass Communication once again wrote a letter on November 15, 1996 that the question of their participation in the opening of tenders did not arise as they asked for the return of E.M.D. The A.P. State Road Transport Corporation went ahead with the opening of the tender, found Aditya Mass Communication to be the highest bidder and awarded the tender to it. Aditya Mass Communication was informed of this but it demanded refund of Earnest Money Deposit. The A.P. State Road Transport Corporation following the terms of tender forfeited the earnest money deposit of Aditya Mass Communication.
Question 1. Elaborately state the important legal issue/s covered under this case.
Question 2. What are the essential features of a tender?
Question 3. Give your reasons in support of your decision for the issue discussed in this case.
MBA Assignment C
1. Annual – general Meeting is required to be held-
2. An acceptance is complete and effective only when it has been-
3. Name of a company can be changed by passing a special resolution and with the approval of-
4. Which of the following is a mode of discharge of contract-
5. Limited liability means liability of its-
6. In a contract of sale, property means-
7. The goods which are yet to be acquired by the seller, are called-
8. A contract becomes voidable if it has been caused by-
9. If the goods have perished, the contract of sale of such specific goods, will become-
10. Articles can be altered by-
11. A contract entered into between the parties by words is called-
12. Acceptance of an offer is complete as against the offeror as soon as-
13. If a company fails to pay its debts suit can be filed against the-
14. A contract with a minor is-
15. Who is liable for the supply of necessaries to a minor-
16. A prospectus is issued-
17. When, before the contract becomes due for performance, the promisor declares his intention of not performing his promise, it is called-
18. A bailment cannot be made about-
19. The damages which arise in the usual course of things happening from the breach of contract, are called-
20. When a person is employed to represent another in dealings with third person, it is a contract of-
21. Which of the following is not an essential element of a contract of sale-
22. In return for a new television, Raju agrees to give his old television valued at Rs. 3,000 and an amount of cash worth Rs. 5,000 to Ganesh. This is a-
23. Which of the following rights is held by an unpaid seller-
24. After exercising the right of lien, the seller can resell the goods of perishable nature-
25. Which of the following is not a remedy for breach of contract-
26. A contract by which one party promises to save the other from loss is called-
27. Surety’s liability is-
28. Crossed cheques payable to bearer are negotiated by-
29. In a contract of sale, which of the following is treated as implied condition-
30. Consideration must move at the desire of-
31. Which of the following does not relate to ‘termination of agency by operation of law’-
32. Which of the following sentence is a valid promissory note-
33. A stipulation collateral to the main purpose of the contract, is called a-
34. A person who receives a negotiable instrument for consideration, before maturity, and in good faith, is called-
35. A director must vacate his office if he fails to obtain qualification shares within-
36. Which of the following rights are available to a finder of goods-
37. A private company has at least-
38. A cheque payable to order may be negotiated-
39. Which of the following endorsements is invalid-
40. When a cheque bears across its face an addition of the words “&” between two parallel transverse lines, it is called-
Contact for best and lowest cost solution or
Marketing Management
MBA Assignment A
Question1. Define Marketing Management. Discuss the various management philosophies. Explain how the marketing and selling are contrasted and briefly explain the societal marketing concept.
Question2. Explain the various factors influencing a company’s marketing strategy with the help of suitable examples.
Question3. What do you mean by media scheduling? Explain the procedure for evaluating advertising programes with the help of suitable examples.
Question4. Define sales promotion and discuss the different elements of promotion-mix with the help of suitable examples
Question5. Discuss the marketing plan for a consumer product of your choice and briefly explain the marketing planning process.
Question6. Write short notes on any three of the following a) Relative Market Potential b) Competitive Parity Analysis c) Basic Elements of a Marketing Strategy d) Product Life Cycle e) Market Segmentation
Question7. What is marketing research? Discuss the marketing research process with the help of an example. Briefly explain the different sources of data.
Question8. What do you mean by productivity analysis? Differentiate between productivity analysis and profitability analysis. What are the different steps in the direct and indirect approaches to marketing budgeting?
MBA Assignment B
Case Study
Market Segmentation—
Man’s Fairness The male fairness segment industry is pitched at around Rs. 250 crore and the industry is growing at a scorching 150 percent per year. The industry evidently has woken up to the fact that the metro-sexual and has a large appetite for beauty (the industry expression is “male grooming”) products, particularly driven by a desire to look as fair as the fairer SEX. ABC Company recently launched ‘GROOM PLUS’ the first men’s fairness cream and claims that the market feedback is highly positive and encouraging. It is now planning an extension of “GROOM PLUS” to products Iike bleaches, shaving creams, Lotions etc. Hitherto men used fairness cream /bleach that were available in parlour packs. Subsequent research showed that men prefer bleach of their own with its own fragrance and specific skin type formulations, especially branded ones.
Question 1: Suggest bases for segmentation of market for groom plus products
Question 2: Discuss the importance of packaging in marketing of the above product range
Question 3: Suggest a suitable promotion mix for creating awareness of the above range of products.
MBA Assignment C
1. The Selling Concept is
A. Products
B. Customer needs
C. Markets
D. None of the above
2. Market Means
A. The set of actual and potential sellers of a product
B. The set of actual and potential buyers of a product
C. Both buyers and sellers
D. None of the above
3. BCG stands for
A. Boston consumer goods
B. Boston credit groups
C. Bosston consultancy groups
D. Both a and b
4. Marketing Mix Elements are
A. Product, price, place, and customers
B. Product, price, place and promotion
C. Product, price, place and physical distribution
D. Both b and c
5. Diversification means
A. A strategy for company growth by starting up or acquiring businesses outside the company’s current products and markets
B. A stage for company growth and starting up or acquiring other companies and their products
C. A unit which deals in many products and services
D. Both b and c
6. SBU stands for
A. State bank of Uttaranchal
B. Strategic business unit
C. Semi brand units
D. None of the above
7. Market Segmentation is
A. The process of classifying customer’s into groups, each with different needs, characteristics or behaviors.
B. The process of classifying the markets into groups each with same needs and characteristics
C. The process of making the dealers and distributors happy about the products
D. None of the above
8. Strategic Control means
A. A critical review of the company’s overall production effectiveness
B. A critical review of the company’s overall financial effectiveness
C. A critical review of the company’s overall marketing effectiveness
D. None of the above
9. Changes in incomes
A. An economic environmental factor
B. A political environment factor
C. A socio cultural environment factor
D. Both b and c
10. Status is
A. The general life style given by the society
B. The general esteem given to a role by society
C. The symbol in the market
D. None of the above
11. The first step in strategic planning is
A. Defining the company’s mission
B. Designing the marketing program
C. Designing the business portfolio
D. None of the above
12. The 4c’s of the marketing mix tactical tool kit are
A. Customer, cost, convienee and curve
B. Customer, cost, convience and coverage
C. Customer, cost, convienence and communication
D. None of the above
13. Promotion mix elements are
A. Price, advertising, publicity and sales promotion
B. Advertising, sales promotion, publicity and personal selling
C. Personal selling, strategy, advertising and publicity
D. Both a and c
14. Marketing productivity audit includes:
A. Products, price and distribution analysis
B. Profitability analysis and cost effectiveness analysis
C. Advertising and sales force analysis
D. Both a and c
15. Demography is
A. The study of human population in terms of size, location, age, gender, race, occupation and other statistics
B. The study of the marketing plans
C. The study of all the activities in the organization
D. None of the above
16. A sample is a
A. Segment of the area in the market
B. Segment of the population selected to represent the population as a whole
C. Part of the data
D. Both a and c
17. The two types of sales forecasts are:
A. Industry and the market sales forecasts
B. Industry and the price forecasts
C. Industry and the company sales forecasts
D. None of the above
18. PVCM stands for
A. Percentage and value cost margin
B. Percentage-variable contribution margin
C. Percentage value cost margin
D. Both a and c
19. Inventory turnover is
A. Gross margin/price
B. Sales/cost
C. Sales/average value of inventory
D. Both a and b
20. The product is now more widely known and the sales grow rapidly is the stage of
A. Introduction stage
B. Maturity
C. Growth
D. Decline
21. The 4 stages of the PLC
A. Growth, introduction, maturity and decline
B. Growth introduction maturity and new
C. Introduction, decline, new product, growth
D. Both a and c
22. The new product development process starts with
A. screening
B. idea generation
C. product development
D. none of the above
23. The process of creating and developing product specifications that optimize the function, value and appearance of the product is
A. Product design
B. Market design
C. Industrial design
D. None of the above
24. Setting a price at or near competitive levels is
A. Penetrating pricing
B. Parity pricing
C. Competition pricing
D. Both a and c
25. In advertising, GRP stands for
A. Grand rating points
B. Growth rating points
C. Gross rating points
D. None of the above
26. Inventory cost is
A. Annual sales/inventory turnover X inventory carrying cost
B. Total sales/inventory carrying costs
C. Total costs/annual cost
D. Both b and c
27. The systematic design, collection analysis, and reporting of data relevant to
a specific marketing situation facing an organization is
A. Market research
B. Marketing research
C. Product research
D. Both a and c
28. In collecting primary data, the two main research instruments are:
A. Mechanical devices and the telephonic conversation
B. Questionnaire and the mechanical device
C. Questionnaire and the telephonic conversation
D. None of the above
29. VMS stand for
A. Vertical marketing system
B. Vertical management system
C. Value marketing system
D. Vertical measuring system
30. A descriptive thought that a person has about something is called
A. Idea
B. Belief
C. Value
D. Description
31. The collection of businesses and products that make up the company is
A. Product portfolio
B. Business portfolio
C. Market portfolio
D. Both a and c
32. Two or more outlets that are commonly owned and controlled are
A. Business stores
B. Chain store
C. Products
D. None of the above
33. The practice of using the established brand names of two different companies on the same product
A. Branding
B. Re branding
C. Co-branding
D. None of the above
34. The set of basic values, Perceptions, wants and behaviors learned by a member of society from family and the important institutions is known as
A. Culture
B. Sub culture
C. Attitude
D. None of the above
35. The total combines lifetime values of all the company’s customers is called
A. Product equity
B. Customer equity
C. Market equity
D. Both a and c
36. CRM stands for
A. Cost recovery management
B. Customer relationship management
C. Customer role in management
D. None of the above
37. Adding a standard mark up to the cost of the product is
A. Differentiated pricing
B. Cost plus pricing
C. Cost only pricing
D. None of the above
38. Human wants that are backed by buying power are called
A. Products
B. Demands
C. Markets
D. Both a and c
39. Stocking the product in as many outlets as possible is called
A. Extensive distribution
B. Inclusive distribution
C. Intensive distribution
D. None of the above
40. In marketing, MIS stands for
A. Management information system
B. Marketing information system
C. Market idea system
D. Major information system
Contact for best and lowest cost solution or
|
Ecole Polytechnique Fédérale de Lausanne
english only
First Steps with the NXT
Robot building guides
Programming the brick
NBC/NXC is a C-like programming language designed for the Lego robots. It comes with a GUI for Windows. However, the command line version is easy to use under Linux.
USB file transfer
Compilation with nbc produces an executable file (.rxe) that needs to be transferred to the brick. Ideally, the compiler should do this for you when you don't specify an output file name; for me, it did'nt work and I used LiNXT instead.
LinXT Installation
1. Install libusb libraries:
sudo apt-get install libusb-dev libusb-0.1-4
2. Install the perl module Device::USB:
sudo cpan
install Inline
install Device::USB
3. Download and extract LiNXT.
4. Create a link to the binary:
sudo ln -s ~/lego/linxt-0.1/linxt /usr/bin/linxt
Uploading files
Now you can upload files to the NXT brick:
sudo linxt -u file.rxe
If the file was already present in My Files>Software files, the transfer fails.
Connecting via Bluetooth
1. Install Bluetooth packages:
sudo apt-get install bluez-utils bluez-pin
2. Make sure Bluetooth on your computer is turned on, then start the services:
sudo /etc/init.d/bluetooth start
3. Now turn Bluetooth on NXT brick on and let your computer scan for it:
hciconfig hci0
hcitool scan
You should get something like this:
00:16:53:04:20:C9 NXT
4. Create a file /etc/bluetooth/pin containing plaintext "1234". (This is the default pin on the NXT, you may change it).
sdptool add --channel=3 SP
rfcomm listen /dev/rfcomm0 3
The NXT should now be able to find your computer (Bluetoot>Search). You need to enter the pin to connect.
5. To view the communication stream enter:
cat /dev/rfcomm0 | od -t x1 -w1 -v -Ax |
1600 ca1643, Aug
a chief of the Narragansett people of New England Indians. He was a nephew of the Narragansett grand sachem, Canonicus (died 1647), with whom he associated in the government of the tribe, and whom he succeeded in 1636. Miantonomoh seems to have been friendly to the English colonists of Massachusetts, Rhode Island, and Connecticut, though he was accused of being treacherous. In 1636, when under suspicion, Miantonomoh went to Boston to prove his loyalty to the colonists. In the following year, during the Pequot War, he permitted John Mason to lead his Connecticut expedition against the Pequot Indians through Narraganset country.
Gallery (1)
|
Difference between Saka Samvat and Vikram Samvat
Key Difference: Saka Samvat and Vikram Samvat are two commonly used calendars in India. Saka Samvat has been adopted as an official civil calendar by India. Saka Samvat starts from 78 AD, whereas Vikram Samvat starts from 57 BC.
Samvat is a term that is used to refer to an era that is described through the Indian calendar. Thus, samvat as a term can be used to refer to any of the various hindu calendars. Shaka samvat and Vikram samvat are based on lunar months and solar years. However, the traditional shaka samvat follows the solar sidereal years, and the modern Shaka samvat follows the solar tropical years.
Both are based on the Chaitra calendar years that are named after the solar months named as: - 1. Chaitra 2. Vaisakha 3. Jyaishtha 4. Ashadha 5. Sravana 6. Bhadra 7. Asvina 8. Kartika 9. Agrahayana or Margasirsha 10. Pausha 11. Magha 12. Phalguna
Saka Samvat is believed to be based on the celebration that took place at the time of crowning Shalivahan king in the 78 AD. Gudi Padao (March-April) indicates the starting of this particular year. Reformulated Saka calendar is officially used in India as a civil calendar. Its year zero begins near the vernal equinox of the year 78 AD. Thus, by adding 78 to Saka year, we get Christian year. e.g. Saka 1752 + 89 = A.D. 1841. It is India’s National Civil Calendar and was accepted by Govt. of India on 22th March 1957. The year in this calendar starts on 1st of Chaitra, meaning 22th March in normal Gregorian calendar years, and on 21 March in a Leap Gregorian year. It is also used in Java and Bali with Hinduism religion in Indonesia.
Vikram Samvat is often associated with Raja Vikramaditya of Ujjain and it is believed that this calendar follows his victory over the Saka in 56 B.C. The New Year in this calendar begins with the first day of Kartik that follows Deewali, an Indian festival. In order to get a Gregorian date corresponding to the Vikram Samwat date, one needs to subtract 57 years from the Vikram Samvat date. For example: 2067 VS = (2089 – 57) AD = 2032AD. This is officially followed in Nepal and is also widely used in the West and North west part of India.
Some of the key differences are listed in the table below:-
Saka Samvat
Vikram Smavat
Epoch of the era with reference to the Gregorian Calendar
AD year –78 from Mar/Apr to Dec AD year –79 from Jan to Mar/Apr
AD year +57 from Mar/Apr to Dec AD year +56 from Jan to Mar/Apr (used in Chaitra calender)
Based on
crowning of Shalivahan king in 78AD.
Believed to be based on the crowning of Vikramaditya of Ujjain in 56BC.
Starting Mark
Gudi Padvo (March - April)
Diwali (Oct - Nov)
Other names
Shaka Samvat
(Vikram Samwat, Vikram Sambt, Bikram Samvat, Bikram Samwat, Bikram Sambat or Vikram's Era
Younger by 135 years
Elder by 135 years
Image Courtesy: en.wikipedia.org, pardaphash.com
Most Searched in Business and Finance Most Searched in Food and Drink
Most Searched in Home and Garden Most Searched in Environment
Passover vs Communion
Epidemic vs Pandemic
Archaeology vs History
Its nice but who was starded this type of calendar is no mentioned
Add new comment
Plain text
|
Question: What happens to radiocarbon dating when an organism dies?
Radiocarbon decays slowly in a living organism, and the amount lost is continually replenished as long as the organism takes in air or food. Once the organism dies, however, it ceases to absorb carbon-14, so that the amount of the radiocarbon in its tissues steadily decreases.
Why can carbon dating not be used on recently deceased organisms?
Carbon dating cannot be used on most fossils, not only because they are almost always too old, but also because they rarely contain the original carbon of the organism. Also, many fossils are contaminated with carbon from the environment during collection or preservation proceedures.
What is the relationship between carbon-14 and the death of an organism?
The radioactive carbon is taken from the atmosphere and incorporated into plant tissues by plant photosynthesis. It is then incorporated into all living organisms by means of the food chain. After an organism dies, its level of carbon-14 gradually declines at a predictable pace, with a half-life of about 5,730 years.
What eventually happens to carbon-14 in once living things when they die?
So after thousands of years, carbon-14 eventually breaks down. One of its neutrons splits into a proton and an electron. When living things die, they stop taking in carbon-14 and the amount thats left in their body starts the slow process of radioactive decay.
Why does the amount of carbon-14 in an organism decrease after death?
The ratio of carbon-12 to carbon-14 is the same in all living things. However, at the moment of death, the amount of carbon-14 begins to decrease because it is unstable, while the amount of carbon-12 remains constant in the sample. Half of the carbon-14 degrades every 5,730 years as indicated by its half-life.
Tell us about you
Find us at the office
Hallaran- Gromley street no. 38, 38408 Dodoma, Tanzania
Give us a ring
Chelci Patoka
+98 278 710 671
Mon - Fri, 9:00-20:00
Reach out |
The word Ayurveda is derived from a Sanskrit word which means the ‘knowledge of longevity”. Though Ayurveda has its roots in India, presently it has spread its wings in Sri Lanka, Malaysia, South Arica, Mauritius, Japan, North America, etc. The aim of Ayurveda is to restore an individual’s innate harmony. Primarily, the treatments of Ayurveda include diet, meditation, medicinal herbs, detoxification treatment, etc.
What Is High Blood Sugar According To Ayurveda?
According to Ayurveda high blood sugar is termed as Prameh. Whenever any medical conditions are related to kidney dysfunction or abnormal changes in the urinary system it is included under Prameh. There are a total of 20 sub-types of Prameh in Ayurveda. 10 out of them are known as kaphaj prameh (a condition with kapha dosha), 6 sub-types are known as pittaj prameh (a condition with pitta dosha) and 4 sub-types are called vataj prameh (a condition with vata dosha).
The kaphaj prameh is the least complicated and totally curable form of prameh. The pittaj and vataj prameh are respectively more acute than the kaphaj prameh. The most complicated and incurable form of prameh is the madhumeh. The ayurvedic acharyas suggest that, if the kaphas prameh and vataj prameh are not treated properly, it may lead to madumeh in Ayurveda.
How Does Ayurveda Treat Diabetes?
According to Ayurveda madhumeh can be treated by the use of ayurvedic medicines for sugar control, combined with lifestyle changes, exercise, dietary changes and detoxification process.
In this article, 8 wonder herbs that are considered as safe ayurvedic sugar medicine would be discussed. These diabetic herbs are beneficial in promoting healthy metabolic function. These sugar medicines in Ayurvedic Science address the blood sugar imbalances and other critical diabetic and metabolic health issues.
1. Aloe Vera
The juice of Aloe Vera plant helps to lower the fasting blood sugar level in the diabetic patients and is considered a good ayurvedic medicine for sugar control. It contains a chemical called phytosterols which are known to antihyperglycemic properties. A study conducted by the Department of Pharmacology and Toxicology at Beni-Sueif University in Egypt in the year 2012 has proved the presence of anti-diabetic chemicals in Aloe Vera extract. An article published in the Journal of Diabetes & Metabolic Disorders in 2015 has reported that Aloe Vera extract has the quality to reverse impaired blood glucose within four weeks of use. It is widely used as an ayurvedic sugar medicine.
Direction for Use
You can prepare Aloe Vera juice by adding 2 teaspoons of Aloe Vera gel in a glass of water and drink it twice a day. It would help you to regularise the flow of insulin and lower the blood sugar level naturally.
2. Oregano
This exotic herb of Spanish and Mediterranean origin contains chemical called glycosides which lower the blood sugar level in the body. It also increases the level of insulin in the blood and thus used as a sugar control medicine in Ayurveda.
Direction for Use
Oregano can be consumed in the dried form along with salads, soups, etc. you can also have a cup of oregano tea in the morning. You can also add 2-3 drops of oregano oil to a glass of water or your favourite juice and have it in the morning.
3. Fenugreek
Fenugreek is an ayurvedic medicine for sugar control which is known to have hypoglycaemic activity by increasing the glucose tolerance level in the blood and thus decreasing the blood sugar level. The high fibre level in this herb slows down the absorption of carbohydrate and sugar.
Direction for Use
You can soak 1-2 tablespoons of fenugreek seeds in a glass of water overnight. You can drink the water and eat the seeds the next morning. Chapattis made with fenugreek powder mixed with wheat flour can also be consumed to lower blood sugar level.
4. Gymnema Sylvestre
Gymnema Sylvestre is known as gurmar in Hindi. This is because this diabetic herb is loaded with a glycoside compound known as gymnemic acid. It also helps to reduce the taste buds sensitivity to sweet products, thus the prediabetic people sweet cravings can be minimised. It also increases the production of insulin by the pancreas. This is the reason why it is considered a good sugar medicine in ayurvedic science.
Direction for Use
Gurmar can be consumed in the powdered form along with a cup of lukewarm water. You can also make tea by boiling gurmar leaves in water.
5. Sage
When sage is consumed in n empty stomach it can reduce the blood sugar level significantly. This diabetic herb increases the insulin formation in the pancreas and thus decreases the blood sugar level. It is beneficial for both the prediabetics and the type 2 diabetics.
Direction for use
Sage can be consumed early in the morning on an empty stomach in the form of tea.
6. Curry Leaves
The aromatic curry leaves help to decrease the blood sugar level and also promotes carbohydrate metabolism. An article published in International Journal of Food and Nutritional Sciences in 2013 has proved the hypoglycaemic properties of curry leaf powder. It is an excellent sugar control medicine in Ayurveda.
Direction for Use
You can chew few leaves of this diabetic herb every day on an empty stomach in the morning.
7. Cloves
Cloves are sugar medicine in Ayurvedic science, which help to lower the blood sugar level and prevent the complication of diabetes. You can simply add it to your food while cooking and consume it to keep the sugar level in the normal range.
8. Ginger
It is a common sugar control medicine in Ayurveda and is used to control the blood sugar level by increasing the secretion of insulin in the pancreas. Ginger can be used to prepare ginger tea or you can chew it in the raw form daily.
So, these were the 8 wonder herbs which lower the sugar level and are effectively used as sugar control medicine in Ayurveda
Related Posts |
George Washington
A Life
Henry Holt and Company
Read the Review
In the normal course of events, George Washington would have become an Oxford don and followed the profession of his English father. As it turned out, he never went to college. He received the least formal schooling of any of the Founding Fathers and remained self-conscious about this lack all his life. What robbed Washington of a university education but spared him the impecunious existence of an Oxford don was a revolution in England in the mid-seventeenth century. Had not the English civil wars of the 1640s intervened, the Washingtons probably would never have left England. George Washington probably would have studied and taught at Oxford until, as a middle-aged bachelor, he gave up the austere existence of the scholar to become an obscure country parson, sitting below the salt at the table of the local lord of the manor.
George Washington was the first of his old English family to oppose a king. All of his English and American ancestors including his mother were staunch royalists. Several Washingtons were courtiers knighted by James I. William Washington married Anne Villiers, half-sister of the first Duke of Buckingham, the corrupt court favorite of King James. His younger brother, Thomas, was a page to Prince Charles I. Henry Washington was a celebrated colonel in Charles I's royalist army. Henry's sister married royalist Colonel William Legge. Their son was created the first Earl of Dartmouth; the second earl was British secretary of state at the outbreak of the American Revolution. Indeed, the first Washington to settle in America had to leave England because his family would not rebel against their king.
There is an enduring myth that Washington's family "was gentle but undistinguished," that "usually the Washingtons married their social betters," that George Washington "did not know his forebears and cared less," but recent research shows that Washington himself contributed to his own log-cabin image. As president, Washington responded to a request for information on his family origins from Sir Isaac Heard, Garter King of Arms in London, averring that he had "no document" to shed light on his English origins. All he would admit was that two brothers, John and Lawrence Washington, had "emigrated from the north of England" but "from whom they descended" he had no written record. But why would he feel the need to produce written records for the royal genealogists at Windsor Castle? He rejected a peerage during the Revolution and a monarch's crown during the constitutional crisis of 1787-1789. To the English, who must have known of his roots and certainly should have known better after a bitter civil war than to ask about them, he gave a short, cold answer. They were "of no moment," he said.
He provided more details in written memoranda to Colonel David Humphreys, his plump, supercilious former aide who started to write Washington's first biography. He required Humphreys to show him a draft of the biography and then "consign them [the original notes] to the flames." He corrected Humphreys on important particulars, but only those he considered noteworthy. Humphreys wrote that Washington came from an "opulent" family in England and that "his ancestors, who transferred a considerable inheritance from their native to their adoptive country, had been in the New World from the year 1657" when two brothers "came to America over the Atlantic from Cumberland in England." If Washington knew more, he refused to cooperate.
Just as he showed his detestation for the trappings of English nobility by refusing to wear a wig during the Constitutional Convention of 1787, Washington opposed the acceptance of any title or honors from any foreign government. His objection became part of the Constitution. But he was also a master diplomat. Many American revolutionaries traced their descent from English Puritans, the persecutors of his family. By the time of his presidency Washington could afford to downplay the importance of his ancestry, but as a young orphan in the deferential status-conscious royalist society of Virginia his ease of access to colonial drawing rooms and his ability to win rapid advancement in the military and in government, coupled with his success at courting a wealthy and socially prominent woman, all depended at least in part on the fact that both sides of his family came from impeccable English stock who were already part of the Virginia ruling class. Several had served in Virginia's House of Burgesses. Many were militia officers. Almost all held rank and status in the country gentry as county court justices and Church of England vestrymen.
The Washingtons today would be called a "county family" in England. Through his paternal grandmother, George Washington was descended from King Edward III and was related to the Churchills. Washington's paternal ancestors came from Sulgrave Manor, a Northamptonshire estate about seventy-five miles northwest of London. The size of the Washington family was its curse. Too often the land was divided and its money parceled out among heirs. George Washington's last English forebear, Lawrence, was fifteen when Sulgrave Manor was sold off in 1616. He had to leave the land and find some other respectable livelihood--the clergy or the military--or, all else failing, become a lawyer or merchant. But most of these required a university education. His great-uncle and uncle had gone to Oxford, where, at seventeen, Lawrence enrolled in Brasenose College.
He arrived at Oxford's high-water mark of enrollment. An unprecedented proportion of young Englishmen, many with little or no money, were matriculating during Oxford's brief democratization. In a boom unsurpassed until the nineteenth century, more Oxonians graduated to Parliament between 1620 and 1660 than at any time before the mid-twentieth century. Lawrence Washington proceeded to the bachelor of arts degree and was elected a Fellow on condition that he could not have an income of more than a few pounds sterling a year. Wealth was considered grounds for disqualification. If he married, he would have to leave. For six years, Washington shared bachelor digs at Brasenose. He bought out the furnishings of his predecessor, and added, for his own sleeping room, a four-poster bed and a large number of leather-bound books. In the basement, he kept hogsheads of beer; in the yard heifers, cows, and a hog for bacon. Students assembling in his chambers around a large table sat on leather chairs or cushions while Washington read and lectured on philosophy and interrogated them.
Lawrence Washington turned out to be a fine young bureaucrat before there was the word for one who climbs relentlessly up through an organization. At twenty-four he was appointed Lector of Brasenose, at twenty-nine the college's disciplinarian, one of two university proctors. He held sway over everyone in town and in gowns in Oxford. He patrolled the streets at night to enforce the curfews, pursuing malefactors into their houses and hauling back young lords from brothels and taverns. He ordered women found in college rooms to be flogged. From his rare perch of clerical and civil power, Washington fell into an intense internal struggle that destroyed him.
The English revolution, so much the precursor of the American Revolution, began in the English universities. Eager college students lined up to read from Bibles chained to churches so they wouldn't be stolen. The universities were thronged with poor students whose scant 10 [pounds sterling] tuition was paid by merchants who were secret Puritans. Lawrence Washington was appointed university proctor by Archbishop of Canterbury William Laud, the king's point man for the suppression of Puritanism, who was also chancellor of Oxford. On August 22, 1631, with King Charles I personally presiding, Laud denounced the principal officers of Oxford as heretics. Lawrence Washington's roommate and closest friend was fired. Four days later, Reverend Lawrence Washington, who was more acceptable to Laud, was appointed to replace his roommate. As Laud's willing agent on the Brasenose faculty, Reverend Washington carried out a thorough purge of Oxford's Puritan clergy.
Father Washington also caught the eye of a wealthy and unusually literate young widow, Amphilis Twigden of Great Tring Manor in Hertfordshire. When nine out of ten women in East Anglia couldn't sign their names, Amphilis wrote long, charming letters. Reverend Washington soon decided that Amphilis was better and more profitable company than Laud's plotting clerics. He risked his position by courting her. In search of a higher-salaried job, he outfitted himself expensively, strapped on a dress sword, and went off to London. He drew on connections at Charles I's court to collect his political debt. Archbishop Laud appointed him rector of the rich parish of Purleigh in Essex. He married Amphilis, and in 1633 she gave birth to their first son, John, the great-grandfather of George Washington and the first American Washington.
John Washington was expected to emulate his father and become an Oxford don. According to custom, Reverend Washington secured the king's recommendation for a "schollers' place" [sic] for eight-year-old John at Charterhouse School in London where he was to prepare for Oxford. But the Puritan backlash during the English civil wars brought a sudden end to Reverend Washington's cozy existence and dashed his son's academic prospects. The Puritans took a dim view of the jovial, amiable cleric who liked to have a pot of ale at one of Purleigh's pubs. The Puritans stripped some 2,800 Church of England curates of their benefices. Lawrence Washington was Puritan Enemy Number Nine on the list of "scandalous, malignant priests." Parliamentary inquisitors in Essex described him as "a common frequenter of ale-houses, not only himself sitting daily tippling there but also encouraging others in that beastly vice. [He] hath often been drunk."
Out of work with six children, the Washingtons were spared from starvation only by their royalist relatives. Lawrence's aunt Margaret was married to Sir Edwin Sandys (connecting the Washingtons with the Churchills). Sandys was treasurer of the Virginia Company and an early investor in the transatlantic tobacco trade. He sheltered Washington's wife and children. Reverend Washington went off alone to Little Brasted in Essex, "a poor and miserable [parish] whose pulpit was only filled with difficulty," and lived in poverty and increasing tipsiness.
Any chance Reverend Washington's sons had for a university education had been dashed. If his father had not been purged John probably would have gone to Oxford where, each year, an increasing proportion of freshmen had been following their fathers into the church. The year John was to matriculate, all known royalists were expelled. Instead, John Washington used his Sandys connections and a small inheritance to become the first Washington to go to sea and seek his fortune as a merchant adventurer. As the Puritan Commonwealth continued to make life precarious for young royalists, John Washington sailed to America, where the colony of Virginia had declared itself a royalist sanctuary.
The father's catastrophe proved good fortune for the son. John Washington became apprenticed to a merchant. He learned to keep accounts in a counting house along the London waterfront where cargoes came from all over England's booming maritime empire. There were wonderful opportunities to make money as the English competed for trade routes with the Dutch, French, and Spanish. John Washington decided to get into the tobacco re-export business: more than 40 percent of all tobacco imported from the English colonies Virginia and Maryland was reshipped to European markets. By 1656, twenty-four-year-old John Washington knew the tobacco trade and navigation well enough to invest his inheritance in the cargo of the Sea Horse, a merchant ketch whose owner signed him on as first mate and junior partner. Young Washington could expect a handsome profit. At each port, he went ashore to trade tobacco. In Denmark, the Sea Horse docked at Copenhagen and Washington traveled alone to the royal city of Elsinore.
As part of his contract, young Washington agreed to cross the Atlantic Ocean to procure a new cargo of tobacco in Virginia. The ship anchored in the Potomac River in February 1657. While John was ashore, the Sea Horse blew aground during a storm and began to sink. Washington managed to repair and refloat the ship, but most of the tobacco was water-logged and had to be jettisoned. His inheritance lost, John Washington decided then and there not to return to England. While ashore, he had met an elderly planter-exporter named Nathaniel Pope who latched on to the young Englishman as just the right bridegroom for his daughter. Here was the son of an Oxford don who knew the European tobacco markets! For father and prospective son-in-law, it was love at first sight. Pope, a rich tobacco planter and member of the Maryland Assembly with extensive landholdings, was the ideal model for a young merchant mariner on the make.
It is hard to tell whether Washington fell in love with Anne Pope or his prospects as heir-apparent, but he suddenly broke his contract with Captain Prescott, who refused to pay him and sailed away. Pope advanced Washington a hefty 80 [pounds sterling] in gold and dangled the bequest of 700 acres of riverfront land. Shortly afterward, John married Anne. Nathaniel Pope appointed Washington to administer his family's lands. In only a few years, John Washington assumed the same second-tier social status in Virginia that his family had long enjoyed in England, even if to settle in Virginia in the 1650s was like deciding today to emigrate to the Brazilian rain forest. After the manor houses of England, the Virginia Tidewater plantation houses were rude shacks in a wilderness.
John Washington's migration added two new elements to the Washington family character. From that time on, they relentlessly pursued money and land. By the age of thirty, John Washington succeeded as a merchant-planter. At a time when frontier land was still cheap and tobacco fetched a high price in England, George Washington's great-grandfather accumulated five thousand acres in ten years. He also received paid emoluments from the royal governor as county coroner, trustee of estates, guardian of children, justice of the county court, and most notably, lieutenant colonel in the Virginia militia, initiating another Washington family tradition.
In September 1659, John and Anne Washington's first son was born at about the same time he began to import indentured servants from England. He received "head rights" of fifty acres for each servant. He put the servants to work for five to seven years clearing, cultivating, and defending his land. In all, he "brought over" sixty-three white servants. His neighbors elected him to the Virginia House of Burgesses for the Northern Neck.
As his wealth increased, so did his family. Anne Pope Washington gave birth to five children in nine years and died. Washington remarried quickly, choosing Anne Gerrard, a woman already twice widowed. The second Mrs. Washington was a shrewd businesswoman who imported servants, something few women did. His second marriage brought Washington a mill and a tavern plus a courthouse and a jail, which he leased to the colonial government. He combined a sharp eye for real estate and a knack for inside trading. When speculators along the Potomac failed to perfect their titles to grants of royal lands by settling them fast enough, the lands reverted to the colony's government. Colonel Washington made a secret pact with the secretary of the colony. They had the land surveyed just before its original grant expired and then quickly patented it for themselves. By this inside trading, the tract where Little Hunting Creek emptied into the Potomac became the future site of Mount Vernon. Colonel Washington's half-share of this 5,000-acre boondoggle placed him squarely among the leading families of the Potomac region.
The first Colonel Washington's militia appointment helped touch off Bacon's Rebellion in September 1675, and cast a shadow over the Washington family name. When Indians raided Virginia from Maryland, Virginia's royal governor, William Berkeley, ordered Washington to call out the militia. The governor of Maryland gave Virginia permission to pursue the natives. Washington crossed the Potomac and learned that Indians had taken refuge in a makeshift fort.
Whether the Indians came out to parley or, seeing that the fort was about to fall, came out to surrender is unclear. According to testimony before an investigating committee of the Virginia House of Burgesses, Washington suggested marching the prisoners to the farm where the fighting had taken place to compare the markings of the Indians killed there with his live prisoners. The Marylanders later contended that Washington grew impatient with Indian denials and ordered his men to club the Indians to death. The surviving Indians gave him the nickname Burner of Towns. The name became hereditary and was later applied to George Washington. Governor Berkeley gave John Washington only a stern reprimand. Undeterred, Washington continued to support the royalists during Bacon's Rebellion and made money by smuggling supplies to the Maryland shore even after Bacon's rebels seized his farms. Once again a Washington had upheld the king's side in an armed rebellion.
Colonel Washington died at forty-four. His estate was divided equally among his wife and three children, two sons and a daughter. The Washingtons traditionally took a dim view of the standard practice of primogeniture. His oldest son, Lawrence, George Washington's grandfather, received most of the land and a share in Washington's mill. Living the life of a young country gentleman, Lawrence made enough money from a string of public offices to support himself. He was elected a member of the House of Burgesses and sheriff of Westmoreland County. He was an aberration among Washingtons; he cared little for land speculation. Social status meant more to him. He married Mildred Warner, daughter of the late Speaker of the House of Burgesses and a member of the governor's council. George Washington's grandparents led a life of ease. They made a long wedding trip to England and had three children. Like his father, Lawrence died young. He was thirty-seven.
Their second son, Augustine, was only three when his father died. Gus, as everyone called him, grew into an amiable blond giant. He very nearly spent his life in England, where his mother and her new husband took him. When Mildred died, her husband plunked Gus into Appleby School in Westmoreland, England. The boy spent nearly four happy years in the English boarding school while his Virginia relatives went to court to break Mildred's will. They succeeded. Brought back to Virginia, Gus was raised by an uncle, John Washington, the sheriff of Stafford County. George Washington's father grew to over six feet tall and became known for his great strength and kindness. Not long after Gus's twenty-first birthday, he married Jane Butler, daughter of a lawyer and planter. Their marriage united 1,740 prime acres, a powerful attraction to Gus, who inherited the Washington acquisitiveness for land. A year after their marriage the young couple bought a fine piece of ground on a neck of land on the south bank of the Potomac. They built a modest one-and-a-half-story house named Wakefield. In this frontier farmhouse, George Washington was born.
Exactly where George Washington was born was for a long time a subject of intense scholarly controversy. Washington's well-meaning adopted grandson, George Washington Parke Custis, evidently erred when he marked the spot in 1815 with a small monument. The federal government bought twenty-one acres around the site in 1882 and erected a 51-foot shaft of granite near where the house had stood before it was destroyed by fire. As the bicentennial of Washington's birth approached, the Wakefield National Memorial Association erected a supposed replica of the house. Memorial House, built on the foundations of a 38- by 14-foot eighteenth-century-style building, became a national park. But further research revealed a much larger U-shaped foundation almost sixty feet long, centrally located on the plantation. For years, the civic group that had built the replica in the wrong place resisted the findings of archaeologists, refusing to tear down the reproduction and build a more authentic structure. Instead, they devoted their efforts to filling the ersatz house with period furniture. Only one small tilt-top table could be obtained that, according to tradition, came from the original house.
What may be an exact replica of Washington's birthplace was built in 1825 several hundred miles to the south in Florence, Alabama, while Washington's heirs still inhabited Mount Vernon. It is a handsomely trimmed, one-and-a-half-story, three-bedroom brick house. Its most striking features are crow-step gables rising on both sides and two full Doric columns and two half-columns in front, making a relatively small house appear gracious and inviting. Like many houses of the era, it has a center hall flanked by living room and dining room. The high-ceilinged master bedroom is off the dining room. Upstairs, there are two more bedrooms under the eaves, separated by a sitting room. The largest room in the house is the kitchen, which is connected to the dining room by a generous pantry.
The original Wakefield was modest by Virginia Tidewater standards because Gus Washington used his money wisely to develop iron-ore mining and build furnaces on his lands. When England went to war with Sweden, English iron imports disappeared. An iron rush ensued in Virginia, and Gus Washington was the first out of the gate. In 1724, Washington discovered rich iron ore deposits about eight miles northeast of Fredericksburg. For half a dozen years, small amounts of iron ore had been mined in the Northern Neck and shipped to England. Through a Virginia partner, London investors offered Gus Washington a one-sixth interest in a new iron-mining and manufacturing works, the Principio Company, in exchange for the rights to his iron ore deposits. Washington went to London to negotiate for himself. He took along his two sons, Lawrence and Augustine, Jr., and enrolled them in his alma mater, Appleby. He returned to Virginia with a generous contract only to discover when he arrived home that his wife, who had stayed behind with their four-year-old daughter, was dead.
Few mothers of American presidents have been praised or vilified more than Mary Ball Washington, the first president's tall, athletic, jut-jawed mother. In the early nineteenth century, early Washington biographer and Methodist clergyman Mason Weems invented the story that young Washington could not tell a lie after he cut down a cherry tree. The Reverend Jared Sparks, president of Harvard College and biographer of the Founding Fathers, sanitized Washington by bowdlerizing his letters (those that he didn't give away to autograph collectors). Both men busily grafted and pruned facts to form a Washington myth. Parson Weems and Jared Sparks deified Mary Ball Washington, or at least made her the mother of a god. As with so much else, the historians of the twentieth century have been busy not only chopping down George Washington but knocking his mother off her pedestal. On the occasion of Washington's bicentennial in 1932 one proclaimed that Mary Ball was "grasping, querulous and vulgar":
She was a selfish and exacting mother whom most of her children avoided as soon and as early as they could, to whom they did their duty but rendered little love. It was this sainted mother of Washington who opposed almost everything that he did for the public good, who wished his sense of duty to end with his duty to her.
Nineteenth-century mythmakers put Washington's mother in the log cabin with her godlike son. Twentieth-century chroniclers diminish her as a crude frontier type. But Washington's legend has become so powerful that another president, Harry S. Truman, wrote glowingly of George Washington as one of his favorite chief executives but put his mother down as "a strange woman" and a "miser" who "although she was really quite rich complained all her life that she was destitute."
According to family records exhumed by Mary Ball Washington's brother, Joseph, Jr., a London barrister of Lincoln's Inn and a court official who left Virginia to live and practice law in England, the first Ball family came to America in 1657, the same year John Washington emigrated. The Balls, also royalists, sailed into exile with their entire household, family and servants. Settling in Lancaster County, William Ball established himself as a major planter and trader. After only two years in the colony he became a justice of the county court. He helped Governor Berkeley put down Bacon's Rebellion. He was rewarded by promotion to lieutenant colonel of county militia and served as a fellow officer of Lieutenant Colonel John Washington. When Colonel Ball died in 1680, he left his wife, Hannah, nine slaves as part of a sizable estate. His son, William II, George Washington's maternal grandfather, assumed his mantle in county politics and served in the House of Burgesses. He had six children. Widowed at fifty-eight, he married again, to a woman who could not write, a condition not uncommon among Virginia frontier women.
The first of William and Mary Ball's children was George Washington's mother, Mary Ball. During his sojourn in England, Gus Washington met Mary Ball, who was visiting relatives in London. At twenty-two she was already considered virtually a spinster--girls in Virginia usually married by eighteen. Mary Ball had gone to London to be introduced into English society. On her illiterate mother's side she was a Montague, a member of a famous landed family. George Washington's mother, Mary Ball, was only three years old when her father died. She was taken to her stepfather's farm at Yeocomico, Virginia. Her mother married again, a fourth time; she died at thirty-five. Her chief gifts to her daughter were a devout Anglicanism and a love of horses.
Each time a parent or stepparent died, Mary Ball received a legacy in land, livestock, furniture, slaves, cash, and, usually, a good horse. When her mother died, she was sent to live with a half-sister. She learned what was expected of a Virginia gentlewoman: sewing, dancing, embroidery, the Anglican catechism (she had already learned to read and write), painting, horseback riding, how to treat her slaves. She also became acquisitive and attached to all her possessions, especially her horses. By the time Mary was eighteen she had enough land and personal property to have been pursued by the usual coterie of Tidewater swains. But if she was, she may not have found anyone she would accept. Could it have been that there was something so strong and independent about her that every suitor seemed to back away?
For one thing, Mary Ball had developed a lifelong disregard for the opinions of others, especially about fashion. She far preferred the company of horses to that of other people. She seemed to be happiest when she was eighteen and a brother-in-law bequeathed her a young dappled gray horse. Throwing a silk plush saddle over its back, she charged over fields and fences and through woods. She remained unconcerned that she was considered "a young woman of a mind that never was orderly." She had thick dark eyebrows, a strong-set jaw, and a high, intelligent-looking forehead. She remained single until Gus Washington's bereavement. The fact that the tall, gray-eyed, fair-haired widower Washington already had three children did not deter Mary Ball. They married in the spring of 1731. Eleven months later, on February 11, 1732, under the existing English calendar (eleven days were later added to catch up with the rest of the world), their first son, George, was born. Into Wakefield, the Washington's modest brick house on Pope's Creek, Mary crowded all the furniture she had inherited, jammed alongside the Washington family's accumulation. When she was pregnant with George Washington, she experienced a shock that may have shaped her relationship with the large child taking shape in her womb. One summer Sunday afternoon, while the family was having dinner with guests from church, a thunderstorm rolled in. A bolt of lightning struck the house and traveled down the chimney and hit a young girl who was visiting the Washingtons for Sunday dinner. The electric current was so strong it fused the knife and fork she was using to cut her meat. She died instantly. The lightning hit with such force that it severely jolted the pregnant Mary Washington, who was sitting only a few feet away. From that time on, Mary Ball Washington cringed and tried to hide whenever lightning passed overhead, burying her face in her hands. For the moment, she recovered, but she became increasingly fearful over the years. She was so happy a few months later when a strong, sound baby was born that she traveled around the Tidewater showing off George Washington to all his cousins for an entire month, before she even had him baptized.
Mary Ball Washington never recovered fully from the shock she had seen and felt. She rarely traveled any farther than church on Sunday and her timorousness touched off a number of clashes with her family, especially her sons, whom she discouraged from taking any risks. In his choice of a military career, George Washington faced a long struggle against a mother who kept him from going to sea as a boy and embarrassed him in front of senior British officers when he was a young aide-de-camp. Even when he became a hero in the American Revolution, she could not understand; in fact she resented his desire to stray from her side and leave the safety of the farm to go off to war. She never understood her own role in shaping his need to act with courage in a very public way. Her step-granddaughter (the wife of Robert E. Lee) passed down the family tradition that Mary Ball Washington "required from those about her a prompt and literal obedience somewhat resembling that demanded by proper military subordination." She had no doubt of her own "mental power that enabled her rightly to judge and wisely to direct." From his boyhood, George Washington knew what an order sounded like--and the pain of disobeying one.
George Washington did not sit down and write of his childhood, as Thomas Jefferson and Benjamin Franklin did. Nor, as Jefferson did, did he ever reminisce in old age for his granddaughter, leaving charming anecdotes to act as homilies for his grandchildren. He seems to have been ashamed of his impoverished childhood and his poor education and his fear of his mother. As soon as he could, he ran away from his boyhood world and fled into the woods, where he remade himself into a brave and tight-lipped young warrior. What little can be deduced about his childhood has to be gleaned from scant evidence. George Washington made himself as elusive as the white-tailed deer that abounded in the forests that he came to love, and he left few footprints in his writings.
What is indisputable is that George Washington grew up on a farm. His childhood world was filled with children, chickens, dogs, pigs, calves, horses, and as many as fifty slaves. From ten thousand woodland acres, most of it uncleared, his father, tall, affable, sandy-haired Gus Washington, harvested a modest living. He reinvested much of the produce of his and his slaves' labor in better land for his tobacco crops and iron-mining venture. By the time little George turned three and could walk unsupervised around the place, the U-shaped brick house on a knoll near present-day Oak Grove in Westmoreland County was becoming seriously overcrowded. The house was fairly spacious for the region, but as more children came and Gus's business and politics brought more guests and Mary crowded in more furniture, it was obvious that the house was inadequate.
To move to a better piece of land closer to his business interests, Gus Washington decided they should rent out the Pope's Creek farm and move forty miles upriver to a 2,500-acre farm he had assembled where Little Hunting Creek emptied into the Potomac. It was called Epsewasson; it would be years before anyone called it Mount Vernon. There were still no roads wider than a horse. For weeks, Gus Washington directed the slaves as they built large rafts, and he told them what furniture and farm implements went into which barrels for the long voyage upriver. On the appointed day, little George watched as the entire farm livestock and barrels went aboard the rafts. The slaves followed Gus's lead as they pushed with long poles out into the river, careful to stay in the shallows as close to the riverbank as they could and still avoid fallen trees.
George was used to playing with children from neighboring farms. At Epsewasson, more isolated than Wakefield, there were no neighborhood boys to play with. His companions were slave children. Most of the excitement at first swirled around the construction of a new house on the high bluff overlooking the Potomac. Gus Washington had designed a large, steeply sloped roof for the one-and-a-half-story brick farmhouse and a wide front porch and center hall to funnel breezes wafting up from the Potomac. Solid and unpretentious like the Washingtons, the house sat screened from the river by tall trees. At the water's edge Gus built a dock where his slaves rolled the thousand-pound hogsheads of tobacco to merchant ships that sailed downriver into the Chesapeake and on into the Atlantic toward London. Here a boy watched all the waterfront activity, daydreamed of ships, and learned to dangle a fishing line. In the distance, through his father's telescope, he could plainly make out an Indian village a mile across the river on the Maryland shore.
At Epsewasson he also began to learn about life and death. When he was scarcely three, his ten-year-old half-sister, Jane, so close to him for his first conscious years, died of one of the fevers that plagued the steaming, mosquito-infested Tidewater in summer. George began to equate the hot season with death and frequent funerals. Soon there was another baby in the house. By the time George was six, along came Betty and Samuel. George's mother always seemed to be bulging with pregnancy or holding a baby at her breast.
When George was five, he met his half-brothers Lawrence and Austin for the first time. Since their mother had died, they had lived in England. At Appleby School they had learned the classics. George was especially fond of Lawrence, who was sensitive, intelligent, and had elegant manners and speech littered with literary allusions. Lawrence had decided it was time to come home to Virginia. A new war for empire, this one called King George's War, loomed between England and France and their allies. Gus Washington turned over to Lawrence the house and farm at Epsewasson. As the firstborn son it would be his one day, anyway.
The boy George was busy learning how to help his mother and how to sit on a horse. At first, his father held him up in front and steadied him with a brawny arm when he needed it. George started out a lifetime on horseback clinging to fistsful of the animal's mane. Soon he could take the reins himself, timorously at first, and ride a horse taller than he was. Even when his father was away he practiced, under the expert eye of his mother. From his father and his brother he learned how to fish and hunt, skills absolutely indispensable to life on the frontier. There was plenty to learn on the new farm, and at day's end when the blistering sun subsided, he could make magic visits down to the river. He imbibed the leisurely excitement of fishing patiently and quietly in the hot sun, learning a lifelong hobby. At night, when the tide came in and there were crabs in the river, he watched how the grown-ups used lanterns to lure the shiny blue crustaceans to the surface and snare them with their nets.
When George was seven years old, the Virginia Gazette for January 11, 1740, carried a story that Admiral Edward Vernon was leading a British fleet to attack Cartagena, a heavily fortified Spanish fortress on the Darien Peninsula seacoast of Colombia. England was determined to break Spanish domination of the Caribbean. A war fever raged. Three weeks later the Gazette reported that Admiral Vernon was sailing with seven men-of-war to attack the Spanish fleet at Porto Bello. Actually the battle had already taken place--Vernon had captured the Spanish port in a bold surprise attack. He would have been content to seize the base at Porto Bello and from there control the Caribbean sea lanes, enjoying the proceeds of the phenomenal loot and prize money paid at auction for ships he had captured, but the British ministry in London wanted to oust the Spanish from Cartagena. It had been captured and ransomed in every British war with Spain since Sir Francis Drake had first sacked it in the 1580s, and after each war the Spanish had strengthened their fortifications until Cartagena became the strongest citadel in New Spain. The British government ordered Admiral Vernon to follow up his easy victory at Porto Bello with a land-and-sea attack on the Spanish settlements in Colombia.
For the first time English settlers in America were ordered to raise troops to serve in a British overseas expedition. Red-coated recruiting officers with drummers and flags marched from town to town. The martial stirrings quickly reached the Washington household. Between them, Virginia and Maryland were to raise a battalion of troops, one-fourth of the 3,000-man American regiment. Lawrence Washington immediately applied for a captaincy. As a third-generation Virginian with two high-ranking militia officers in his family and strong recommendations from members of the royal governor's executive council, Lawrence won the coveted commission. In a matter of weeks, Captain Washington raised his own company of one hundred green-uniformed Virginia troops. Lawrence was resplendent in his new scarlet breeches and navy blue jacket and gold-laced hat. A shiny brass officer's gorget hung from his neck; a crimson sash draped across his shoulder held his silver short-sword. Captain Washington soon led his contingent aboard a British troop transport and sailed south into what one British military historian has called "a howling fiasco" that "accomplished nothing but the strewing of the Spanish Main with English corpses."
The expedition dragged on into the yellow fever season. Most of the Americans who did not die in the assault succumbed to the fetid troop ships. The Americans, blamed by the British for the expedition's failure, were assigned the deadly task of carrying the scaling ladders for the more experienced British storming parties. Captain Washington's company took part in silencing a battery at Cartagena. The bombastic Admiral Vernon praised him in his official report for his bravery, but a place at the officers' mess table aboard his flagship did little to compensate for 90 percent American casualties. These were mostly caused by an array of diseases--scurvy, dysentery, yellow fever, malaria--and beatings and starvation at the hands of British officers, who then pressed-ganged any Americans who had survived the land assault into service on Royal Navy ships to replace dead English sailors. By late October 1742, after an absence of two terrible tense years of waiting, Lawrence Washington returned to Virginia, but he never fully recovered his health.
George Washington clung to scant memories of his father. Gus Washington's days at home at Ferry Farm became rarer as George's boyhood raced on. Far more frequently, George spent his days with his mother. Life in the Washington household revolved around the crowded kitchen and dining room, where an amazing array of meats were served after being roasted in the large fireplace. During Washington's boyhood, the nearby forests were still full of game. In 1739, when George was seven, a botanist visiting the Virginia frontier reported to a friend in England of finding
deer in great plenty, bears, buffaloes, wolves, foxes, panthers, wild cats, elks, hares, squirrels (three or four sorts), raccoons, opossums, beavers, otters, muskrats, polecats, minks ... porcupines, but they are very scarce.... Then, for fowls, wild turkeys very numerous, partridges, wild geese, swans, brants, cormorants, teal duck and mallard, black ducks and another sort we call summer ducks, plover two or three sorts, soris (a delicious eating bird in shape and [in] way of living like your water rails), heath fowls (called here improperly pheasants), wild pigeons in prodigious great flocks, fieldhares, woodcocks, snipes, herons, bitterns, eagles, larks as big as quails.
This abundance not only encouraged George to eat but to learn to hunt--his father taught him to covet the white-tailed deer. As a young boy he practiced the arts of stealth and surprise in the woods and the quick accurate marksmanship that brought back game for the family even if it led to the overeating of meat. Few Virginians ate enough fruits and vegetables. It was game and corn, cornbread and game. Many Virginians ate meat as often as five times a day.
At home, where George's mother spent virtually all her time, the Washingtons enjoyed exceptional comforts for the time and place, especially considering that they lived a day's ride from the edge of the white man's civilization. There were probably framed English prints on the walls. Neighbors had displays of Roman ruins in gilded frames and Hogarth's rollicking prints and flowers. Mary's brother was a connoisseur of fine prints and delighted in sending from London the latest prints from the shops on the Strand. It is inconceivable, given his closeness with his sister, that he left her drawing room and dining room walls barer than those of her socially competitive neighbors.
Yet Gus and Mary Washington were not extravagant. They did not fall into the trap that left so many Virginians in permanent debt to their English factors. There was silver on the table, but it was mostly spoons. When Lawrence came home from England, he brought George's younger sister Betty a gift from Uncle Joseph. This high-water mark of luxury in the household was long remembered: six silver spoons, a chest of tea, a silver strainer and tongs, and a box full of sugar cubes "ready broke." Now the Washingtons could serve tea in the latest English fashion. An inventory of King George County taken in the early 1740s shows how typical the Washington household was among the second rank of Virginia plantations. The walls were painted and a mirror hung in the entry hallway. There were two tables for meals and eleven leather-bottomed chairs arranged around them. There was plenty of china on the tables, but it was not fine. Few glasses had survived Atlantic crossings. Sometimes there was linen on the table, but it was coarse.
What visitors from England noticed more was the sheer quantity of food, all of it homegrown or hunted nearby. Bread and meat were abundant, their consumption ample. An average family and its servants consumed fifty pounds of flour a day as they eagerly cut down forests to make way for wheat fields. The Washingtons had their own mill. They charged one-twelfth of the grain they ground for their hungry neighbors. The slaves were fed cornmeal and pork, receiving fixed rations each year at hog-killing time. In addition to pork, hominy grits, and cornbread, the master's family ate large quantities of game and beef, which cost a penny a pound in 1740. After a prayer of thanks to God, young George could launch into white or corn bread and either hot or (if there were no green vegetables to boil) cold meat, chicken, fish, and oysters. For Sunday dinner, served at noon and often shared with guests invited after the morning Anglican service, there could be greens, fish, roast pig, cheese, puddings--with plenty of liquor (preferably rum or brandy) for the parents. No wonder George grew so tall.
George's father was often away on his restless quest for more land and more ore, and when he was home he pursued more income from his lengthening string of county and colony offices. With the new town of Fredericksburg burgeoning just across the narrow Rappahannock, however, other people were now demanding his son's attention. Seven was the traditional age for a boy in Virginia to begin schooling. There are no records, but he apparently began to learn to read, write, and keep sums from a tutor, a convict indentured servant Gus bought to teach his children. George began to copy out lessons in a beautiful round scroll. By the time his brother Lawrence returned in his red-and-blue uniform, George was already crossing the river each morning to the log schoolhouse in Fredericksburg. There he was preparing for the day when, like his father and stepbrothers, he would cross the Atlantic to Appleby School, to be educated formally as an English gentleman. In all, George Washington received between seven and eight years of schooling. For nearly four years, he took the ferry each morning to Fredericksburg.
When he was not bending over his quill pen and inkstand, George Washington was practicing to become a superb rider and wrestler. He was generally healthy, although the unbalanced diet of the Tidewater, combined with his mother's slavish adherence to the application of herbs, may have given George a case of rickets, a disease associated with malnutrition, which left him with a thin, caved-in chest. His mother became increasingly parsimonious over the years, and even if there were a good doctor around she did not like to pay one. He later resented and rejected his mother's stinginess, and as an adult would rely heavily on doctors while rejecting herbal nostrums.
Whenever his father was home between trips to England and to the western Virginia frontier, George followed him around in the way young boys do. Boys were considered the charges of their fathers and girls were trained by their mothers. He accompanied his father on daily rounds of inspecting the slaves at their labors. He learned the techniques of giving orders and of gaining obedience from men. Little black boys he had once played with now had to carry out his every wish. On special occasions he rode with his father over to the iron furnace to watch the blast. What a thrill for a young boy! Or he would go along to watch the slaves work his father's new grist mill on Does Creek. He learned that free white men as well as slaves and bondservants had to work hard and get dirty if they wanted to prosper. He watched his father load the wagons at the furnace, hauling twice as much as any man who worked for him. He also watched when his father came home after a trip to the west, unstrapped his surveying tools, and locked them safely in a shed. These, his father told him, were the keys George would need to claim the lands to the west that everyone, including his father and all his friends, seemed always to be talking about.
George had just turned eleven on Easter in 1743 and was visiting his Washington cousins at Chotank when a message arrived from his mother to hurry home. His father had been away for months on one of his periodic voyages to England and had returned home seriously ill. Whatever communicable disease had stricken him, the local verdict was "gout of the stomach." Modern medical experts deny there is any such disease, but whatever it was killed Gus Washington. His father's death before the age of fifty and his grandfather's at thirty-seven gave Washington the lasting impression that the Washingtons were not long-lived. Partly because of unhealthy conditions in the Tidewater, where undrained swamps produced malaria and where medicine was exceedingly primitive, few people reached old age. Roughly half the immigrants from England died within the first five years. His grandfather's death at thirty-seven was about average. But his obsession with the ages of dead antecedents gave George a gloomy, diffident manner. Of his eight siblings, two died in infancy and six between the ages of thirteen and sixty-four. George outlasted them all, not succumbing until he hastened his own death at sixty-seven. A robust constitution, inherited as much from his mother as his father, may account for the fact that George Washington outlived all of his male line, but his overriding impression was that he could not expect many years.
Yet Washington's intimations of his own mortality were certainly not a sign of hypochondria. He had the strength to survive, in addition to mumps, a severe case of smallpox, four encounters with malaria, which afflicted him from age sixteen to his dying day, as well as serious and protracted bouts of dysentery. He endured smallpox and malaria simultaneously. He had a brush with tuberculosis, suffered from typhoid fever, twice suffered near-fatal bouts of influenza, and, as president, was crippled for months by a staphylococcus infection of the hip and a serious attack of pneumonia. He was dosed with quinine so much for recurring malaria that he suffered marked hearing loss and was nearly deaf by the time he left the presidency. Only his mother lived to an age today considered old. Unimpressed that her son was by that time the first president of the United States, she died at eighty-two. But all the illness, death, and dying seemed to have some good side effects on Washington. From his boyhood he grew in patience, self-control, courage, and determination. War seemed to come as a relief for him. His adrenaline pumping, he was never healthier than when under the crushing responsibilities of command during the Revolutionary War. Here, at least, he could see his enemies.
(C) 1997 Willard Sterne Randall All rights reserved. ISBN: 0-8050-2779-3
Return to the Books Home Page
Help/Feedback | Classifieds | Services | New York Today
Copyright 1997 The New York Times Company |
2nd extract of my book in Ars Technica — The essence of the ‘Net
Chapter 3 of my book A History of the Internet and the Digital Future has just been published by Ars Technica. This is one of the 3 chapters (of the 13 in the book) that are being published for free. Here it is, or read at Ars.
Johnny Ryan’s A History of the Internet and the Digital Future has just been released and is already drawing rave reviews. Ars Technica is proud to present three chapters from the book, condensed and adapted for our readers. You can find Chapter 1 here. The current installment is adapted from Chapter 3, “The Essence of the Internet,” and it tells the story of the development of some of the fundamental technologies and protocols that underlie the Internet.
Chapter 3: The Essence of the Internet
The Internet is a loose arrangement of connected but autonomous networks of devices. Each device, a “host” in networking jargon, uses a “protocol” to communicate with other devices on the network. These protocols tie together diverse networks and govern communication between all computers on the Internet. Not only are the protocols elemental to the Internet and how it works, but the unique collaboration between their designers was the formative event of Internet culture. In as much as any single element of the whole can be, these protocols are the essence of the Internet. The remarkable manner in which a team of young collaborators developed these protocols set the tone for the future development of Internet culture. As their work on the protocols proceeded they began to establish the informal conventions that would characterize the tone of collaboration and discussion on the Internet thereafter. The process began in a bathroom, late on the night of April 7, 1969.
As BBN started building the IMPs for the ARPANET in 1969, an important piece of the network was missing: the software that would govern how computers would communicate. Graduate students at various facilities funded by the US Department of Defense Advance Research Projects Agency (ARPA) had been given the task in 1969 of developing the missing communication protocols. They formed an informal “network working group.” Finding themselves working in a vacuum, the students connected to ARPANET, who had been given the task in 1969 of developing the technical protocols, also began to establish the informal protocols that would influence interpersonal communications on the Internet in general.
Uncertain of their positions within the hierarchy of the ARPANET project, the students issued notes on their protocols under the title “Request for Comments” (RFC). Steve Crocker, a graduate student who had received his bachelor’s degree at UCLA only a year before, used the title Request for Comments to make the invitation to participate as open as possible, and to minimize any claim to authority that working on so crucial an aspect of the network as its protocols might imply. The first RFC document, which set the tone for the next half century of Internet culture and initiated the process to define the protocols that govern virtually all data exchange on the planet, was composed in humble circumstances. Its author recalls: “I had to work in a bathroom so as not to disturb the friends I was staying with, who were all asleep.” The tone in which the RFCs were typed was distinctive.
Crocker was the de facto leader of the small group of six. He and two others of the group had been at the same high school in Los Angeles, Van Nuys High, and were graduate students of Leonard Kleinrock. (Kleinrock was under contract with ARPA to run the network measurement center at UCLA.) Crocker was writing a document that outlined some broad ideas on how the students would pass around ideas through “temporary, informal memos.” Even as he drafted the document, the prospect of disapproval from far above in the academic hierarchy weighed heavily upon him:
In my mind, I was inciting the wrath of some prestigious professor at some phantom East Coast establishment. I was actually losing sleep over the whole thing.
Crocker was eager to open up the process to as many of his peers as possible:
Closely related to keeping the technical design open was keeping the social process around the design open as well. Anyone was welcome to join the party.
Vint Cerf, an early participant in the informal networking group (and now vice president of Google), sums up the approach and context:
Keep in mind that the original developers of the host level protocols were mostly graduate students. We adopted a humble and inclusive posture and a mantra that Dave Clark ultimately coined as “rough consensus and running code”—that means we don’t really vote exactly, we just try to assess rough consensus among the group trying to agree on proposed standards.
RFC 3, released in April 1969, elaborated on the character and objectives of the RFCs (note that the word “Host” here refers to a connected computer):
These standards (or lack of them) are stated explicitly for two reasons. First, there is a tendency to view a written statement as ipso facto authoritative, and we hope to promote the exchange and discussion of considerably less than authoritative ideas. Second, there is a natural hesitancy to publish something unpolished, and we hope to ease this inhibition.
RFC 3 continues in the counter-hierarchical vein, establishing the principle that no text should be considered authoritative and that there is no final edit. This is a pivotal element of the “perpetual beta” described in the next chapter. Also implicit was that authority was to be derived from merit rather than fixed hierarchy. A later elaboration of this principle was:
We reject kings, presidents and voting.
We believe in rough consensus and running code.
Crocker’s RFC, though penned in humble circumstances, set the open, inviting tone of the next half century of Internet culture and initiated the process to define the protocols that govern virtually all data exchange on the planet. Since Crocker’s RFC there have been almost six thousand RFCs published, which maintain an open, collaborative approach in Internet-engineering circles. The meritocracy of the RFCs was exemplified by a generation of delinquent programmers at MIT from the late 1950s to the late 1960s, who in turn created the “hacker” culture that influenced much of what was to follow. The first fruit of the graduate students’ labour was the NCP, the Network Control Protocols, which governed communications between machines on the Internet. The NCP, however, was merely the first protocol that allowed communications on the ARPANET. An “internetworking” protocol that could tie different machines and networks together was yet to come.
Radio and satellite networks
San Francisco features disproportionately in the history of the digital age. Little attention, however, has been given to one of its acknowledged landmarks: a public house called Zott’s. Zott’s (named “The Alpine Inn” since the mid 1950s) is a small, wood-panelled tavern and a historic focal point for the ne’er-do-wells of Silicon Valley. Its founder was Felix Buelna, a Mexican, who moved from Santa Clara in the wake of the gold rush when that area became crowded by would-have-been gold diggers in the mid 1800s. He built the inn on the site of a pony trail that had been used by rancheros and settlers to reach the coast. Buelna’s inn was a place of gambling with a colorful clientele and, in the words of the US National Park Service’s official survey, “a long string of colorful owners.”
Regulars in the 1880s included the construction workers building Stanford University, whose entrepreneurs and technologies would propel the dot-com boom a century later. The inn also became the regular haunt of the new university’s students. In 1908 the editors of the Stanford Sequoia lambasted their immoderate peers, writing that the student body had been “held up to the world as a community composed largely of drunkards.” In January the following year the president of the university wrote in vexed mood to the county supervisors requesting that they not renew the inn’s liquor licence because it was “unusually vile, even for a roadhouse, a great injury to the University and a disgrace to San Mateo County.” Yet the humble wood-panelled structure remained a landmark through the twentieth century as the digital industry evolved around it. By early 2001 its car park accommodated the expensive sports cars of the young Silicon Valley millionaires. It was fitting, then, that more than a century after its establishment Zott’s should be the site for an important event in the history of the Internet.
On 27 August 1976 a van parked in Zott’s beer garden. It was part of the Stanford Research Institute’s (SRI) packet radio experiment, conducted under contract for ARPA. The SRI team removed a computer terminal from the van and placed it on a wooden table in Zott’s beer garden. A wire connected the terminal to the van, and radio equipment in the van connected it to ARPA’s new packet radio network, PRNET, which in turn was connected to ARPANET. The team at Zott’s sent a message from their terminal across the PRNET and thence to a distant machine connected to ARPANET. This was one of the more momentous events to have happened in any beer garden: it was the first ever packet data transmission across two networks using the new “internet” protocol.
The discoveries that made this transmission possible arose as part of an earlier project at the University of Hawaii in 1970. Norman Abramson, the Professor of Electrical Engineering and Computer Science, had faced a difficult problem. He wanted to network the University of Hawaii’s seven campuses. This posed three problems. First, the campuses were physically spread across four islands. Second, the leased telephone lines that connected ARPANET facilities to each other were too expensive for his budget. Third, the line quality of the Hawaiian telephone system was too poor to carry networking data. The answer, Abramson decided, was to use radio. Thus from 1970 ARPA began to fund Abramson’s attempt to develop a packet radio network.
Radio signals travel differently to electric signals across telephone lines. While telephone signals travel from point to point in an orderly sequence, radio transmits indiscriminately to all receivers within its broadcast range. Signals broadcast by different nodes to the receiver at the same time can collide and be destroyed. Abramson’s team developed an elegant solution to this problem: when any node sent a packet but did not receive confirmation of successful delivery from the receiving node it would wait for a random period and then resend the message. Since all nodes would wait a random period before resending, the odds of repeat collisions were slight. Thus the network would quickly correct itself when it lost packets. Using this method Abramson’s team built a functioning network called the AlohaNet that linked Hawaii University’s campuses to each other and to the ARPANET. This method of dealing with collision between messages was called the “Aloha method,” and ARPA used its example to build its own packet radio network, PRNET.
The discovery of the Aloha method for packet radio networking was particularly timely since the political tides in which ARPA swam had become slightly more turbulent. In 1969 Senate Majority Leader Mike Mansfield had signalled his intention to cut $400 million from the defence research budget. He was the author of Section 203 of the Military Procurement Authorization Act for Fiscal Year 1970, the so-called “Mansfield Amendment,” which stipulated that all funded research must have a “direct and apparent relationship to a specific military function or operation.” Packet radio was just such a project. The power of massive, expensive mainframe computers could be relayed to the battlefield by networks of radio, cable and, as ARPA was beginning to prove, satellite.
The launch of Sputnik in October 1957 had forced the United States to dramatically accelerate its space program. Its first successful satellite, Explorer I, entered orbit on 31 January 1958. The space program had advanced considerably by the 1970s. Between January 1971 and May 1975, for example, a civilian program launched a series of “Intelsat IV” communication satellites from Cape Canaveral, each over forty times heavier than Explorer I. Yet though the space race had prompted this acceleration of US satellite technology, it would be the nuclear arms race that would in part create the conditions for the expansion of ARPANET to its first international node by satellite.In 1957 the US had conducted the “Rainier” test, its first underground nuclear detonation. The blast was detected by seismic devices across the globe and proved the value of seismology in nuclear detection. The Limited Test Ban Treaty of 1963 banned open-air testing in favor of safer underground tests and made the speedy processing of seismic data critically important. In June 1968 the US and Norway concluded an agreement to cooperate in building a large seismic detection facility at Kjeller, near Oslo. The facility, called NORSAR, was built in 1970 and began sending seismic data to the US Seismic Data Analysis Center in Virginia via the Nordic satellite station in Tanum, Sweden. ARPA decided to “piggy-back” on the original NORSAR satellite link, connecting the NORSAR facility to ARPANET20 in June 1973. University College London (UCL) was connected to the ARPANET the following month via landline to NORSAR. The ARPANET connection at UCL was used by researchers at centers across the UK working on diverse subjects including computer aided design and network analysis.International interest in packet-switched networking was growing. Robert Kahn, now at ARPA, believed that satellite networking could support the connection of US and international networks. ARPA began to investigate the possibility of creating an Atlantic satellite network. In 1974 the UK Post Office agreed to cover the UK’s costs for a satellite connection to the US, and in September 1975 ARPA initiated the SATNET Atlantic networking program using civilian Intelsat IV earth stations in the US and the UK. In late 1977, Norwegian Defense Establishment was also linked via a separate earth station in Tanum. By May 1979 ARPANET access from the UK was provided almost exclusively over SATNET and the landline connection via Tanum was removed at the end of the year.
Thus by the mid 1970s ARPA had built three functioning networks: ARPANET, PRNET and SATNET, using cable, radio and satellite. Now it remained to network the different networks.
By 1973 a new protocol was required to internetwork the ARPANET, PRNET and SATNET. After organizing the 1972 International Conference on Computer Communication at which the ARPANET was demonstrated in Washington, Robert Kahn had joined ARPA (now named DARPA) where, following some unrelated projects, he resumed his work on packet networking. In the spring of 1973 he approached Vint Cerf, one of the group of graduate students that had developed the NCP protocol for the ARPANET, and outlined the need for a new internetworking protocol that would allow computers to communicate together across cable, radio and satellite networks. Cerf had just become an Assistant Professor at Stanford and ran a series of seminars to tease out the problem. He drew together a group of researchers who would later hold key positions in the networking and computer industries. Participants included Robert Metcalfe, who was representing the Xerox PARC research center, and Gerard Lelann, who was visiting Cerf’s lab from Cyclades, the French packet network project. Cerf’s group continued the inclusive, open approach of drafting RFCs.
They were influenced by the example of Cyclades, which had adopted a centrifugal approach in which data transmission was not regulated by the equipment of the network itself but by the computers sending and receiving the data at its edges. At the Xerox company’s PARC research center, Robert Metcalfe was working on something similar. Xerox had just unveiled a revolutionary new computer called the Alto. The Alto had a mouse, graphical display, a desktop and system of windows and folders for storing files. The machine was two decades ahead of its time and represented a paradigm shift in computing that the senior management of Xerox failed spectacularly to capitalize upon. Metcalfe was working on a network to connect many Altos in an office, developing “Ethernet” and Local Area Networking (LAN). He grew impatient with the consensus approach that Cerf, Lelann and others were taking and decided to move ahead on his own. In 1973 Metcalfe’s PhD thesis had refined the Hawaiian Aloha method. He now applied these mathematical improvements to develop a system informally named Alto Aloha, which became PUP (PARC Universal Packet). PUP adopted the same centrifugal datagram approach of Cyclades, and its network was dumb to the extent that it was merely a system of cables. Unlike the ARPANET, where the IMP machines controlled many of the network’s functions, the PUP network had no capability to control transmission or flow of data, or to verify delivery or repeat transmission of lost or partially delivered packets. Instead the software protocols running on the connected host computers would control the network. As a later PARC memo on the specifications of the PUP noted:
Pup communication is end-to-end at the packet level. The inter-network is required only to be able to transport independently addressed Pups from source to destination. Use of higher levels of protocol is entirely the responsibility of the communicating end processes.
This moved control over the operation of the network from the connecting infrastructure to the actual devices participating in the network themselves. This was a centrifugal approach, and it suited the requirements of the network of networks that ARPA had in mind.
The NCP (Network Control Protocol) that controlled communications on the original landline ARPANET was not appropriate for radio and satellite networking. Instead, a new internetworking protocol would give each connected “host” computer a far greater degree of responsibility for control of the network. The new protocol, which would run on each host computer connected to the network, would not only establish connections between hosts, it would assume the functions that the dedicated Interface Message Processor (IMP) computers had performed: verifying safe delivery of packets, retransmitting them where necessary and controlling the rate of data flow. Simply put, to allow data to flow across a network that included landline, satellite and radio connections, a new protocol would take a much more flexible approach to communication control. In May 1974, Cerf and Kahn published an outline of the new Transmission Control Protocol (TCP):
a simple but very powerful and flexible protocol which provides for variation in individual network packet sizes, transmission failures, sequencing, [and] flow control.
This internetworking protocol is, in a technical sense, the essence of the Internet, and in its priorities and functions can be discerned the cardinal characteristics of the new medium.
TCP is centrifugal by necessity, as one of its designers notes:
We wanted as little as possible at the center. Among other reasons, we knew quite well that it’s much easier to scale a system that doesn’t have choke points in the middle.
Some of the enthusiasm for the centrifugal approach of relying on the host computers themselves and abandoning the IMPs may have arisen from social rather than technical reasons. The IMP machines connecting host computers at each participating facility to the ARPANET were controlled by BBN, ARPA’s main contractor, which gave BBN control over the network itself. From their central offices BBN engineers could remotely update, repair and monitor the use of IMPs across the network. Increasingly, researchers preferred the idea of a dumb network controlled by a community of computers using a common protocol without the IMP standing between the host and the network. It is a small irony that the IMPs were originally introduced in 1969 not to control the network but to convince the ARPA-funded researchers that connecting to the ARPANET would not directly impose a burden on the processing power of their host computers. Support for the removal of the IMPs only five years later was a sign of how far networking had come.
Much as Paul Baran’s original, decentralized network prioritized survivability over other considerations, the TCP prioritized robustness over accountability and control. Billing and accounting, which would have been foremost in the minds of commercial designers, were entirely absent from the ARPA internetworking protocol. TCP was also heterogeneous by nature. It was designed so that machines on different networks using different technologies could seamlessly communicate as though they were on the same network. Various networks were bridged by so-called “gateway” machines that maintained routing tables with the addresses of computers on their own local networks. TCP underwent several revisions, and following a meeting in January 1978 between Cerf and two researchers, Jon Postel and Danny Cohen, at the University of South California, it was split into two parts to streamline the functions of the gateway computers. TCP would handle communication between computers and an additional Internet Protocol (IP) handled internetwork connections between networks. The combination of TCP and IP would avoid the gateway computers from duplicating functions already performed by host computers within local networks. What remained was to make sure that internetworking actually worked in real world conditions.
Cerf, who had joined ARPA in 1976, oversaw a series of practical internetworking tests. A particularly ambitious test was conducted on 22 November 1977. As the SRI packet radio van drove along the California freeway, the radio equipment onboard broadcast data packets via PRNET to a gateway machine that connected to ARPANET. Travelling across the ARPANET by cable, the packets sent from the van reached a gateway machine on the East Coast of the United States that connected to SATNET. From this point the packets were relayed by orbiting satellite to Goonhilly Downs in the UK, and thereafter back via ARPANET to California. To monitor the fidelity of the network’s transmission, a screen in the van generated patterns from the data it was receiving. Errors in the data transmission would be immediately clear from flaws in the pattern. Yet the system performed so well that whenever the signal was blocked by bridges and other objects that the van’s radio could not penetrate the pattern would only pause and then resume when the signal returned. There were no errors. This test had spanned three networks and two continents. Cerf recalls, “the packets were travelling 94,000 miles round trip . . . We didn’t lose a bit!” Another test put network computers aboard aircraft from the Strategic Air Command to simulate wartime conditions:
. . . airborne packet radio in the field communicating with each other and to the ground using airborne systems to sew together fragments of the Internet that had been fragmented by nuclear attack.
Here was proof that internetworking was possible between radio, satellite and landline networks across the globe and under adverse conditions. An optimistic observer might have thought that now, after proof had been offered, the telephone companies would embrace TCP/IP and bring the Internet to the masses. Instead, however, the telephone industry rushed to develop its own standard. It was keen to maintain its central control over the network.
How the TCP/IP Internet suite of protocols differed from and eventually overcame the alternative put forward by the telephone companies says much about the character of the Internet and the nature of enterprises that are best suited to prosper upon it.
Centrifugal defeats Centripetal (TCP v X.25)
ARPA’s networking endeavors, like those at RAND previously, were totally at odds with the ethos of the telephone industry. The reason for this conflict extended back to the industry’s very origins. In 1877 Alexander Graham Bell was granted a second patent for his telephone and formed the Bell Telephone Company. For a brief period, only Bell Telephone and its licensees could legally operate telephone systems in the United States. Then, when his patent expired at the end of 1893, a glut of competitors rushed into the market. Between 1894 and 1904, over six thousand independent telephone companies went into business in the country. This had two effects. First, it dramatically accelerated the proliferation of telephone systems across the United States. Second, it resulted in a chaotic mess of incompatible telephone networks. Telephone subscribers might indeed find themselves newly connected, but they were also unable to use their telephones to communicate with people who did not happen to be on the same system they subscribed to. In the 1908 annual report of AT&T (as Bell was known from 1899 when it came under the ownership of its subsidiary, AT&T), the president of the company, Theodore Vail, warned that only through universal and consistent service could reliable telephony be assured. The solution, AT&T argued, was monopoly. As its 1908 marketing slogan put it: “one policy, one system, universal service.” Vail’s argument prevailed and in 1913 AT&T became a government-sanctioned monopoly under the regulation of the Federal Communications Commission (FCC).
From this point on, AT&T’s control over the United States’ telecommunications network was so absolute that, until the late 1960s, homeowners in the United States were even forbidden from modifying their telephone sets in any way. While Bell Labs, a research unit within AT&T, was a hive of innovation, the company had no strategic interest in transforming its network. AT&T was firmly wedded to the orthodoxies of central control and knew with the benefit of long experience that the circuit switching of telephone calls, the technology that Alexander Graham Bell had patented in the late 1870s, worked as it was. Thus Paul Baran had been rebuffed in the mid 1960s when he approached AT&T with the opportunity to use the packet-switched networking concept he had developed at RAND. Even so, in 1968 ARPA had anticipated that the successful demonstration of four functioning nodes in a data network would convince a telephone company of the merits of digital networking. The original planning document for the ARPANET project included the optimistic objective of transferring the technology so that a utility could provide “digital message transmission as a tariffed service.” Yet even in 1975, after proof of concept and extensive testing of the packet-switched distributed network concept had been successfully conducted at the taxpayers’ expense in the form of the ARPANET, AT&T refused to pursue the Internet idea.
Shortly thereafter, in the mid to late 1970s, telecommunications companies in Europe, Canada, Japan and the US did begin to appreciate that the potential of digital packet-switched networks should no longer be overlooked. While some public data networks had been established in the late 1960s and early 1970s, such as the Broadband Exchange Service in Canada from 1969, many telephone companies found the digital network revolution challenging. This was not least because they had been beaten to this conclusion by the computer manufacturers. While the ARPANET used open, non-proprietary standards to which any manufacturer’s devices could connect, the commercial computer manufacturers began to offer proprietary equipment and networks that were incompatible with machines supplied by their competitors. Thus telephone companies would not be able to choose suppliers on the basis of competitive prices if they built a network using proprietary equipment from IBM, Digital Equipment Corporation (DEC) or some other supplier’s technology. Thus, even as they became interested in data networks, the telephone carriers grew concerned that they might become in thrall to the equipment manufacturers.
The solution, the telecommunications giants realized, was to create an open standards network, the equipment for which could be produced by a plurality of suppliers, but over which they could retain the strict central control that they had always exercised over the traditional telephone and telegraph networks. Though they were keen to avoid monopolies in networking equipment, many of the telecommunications carriers were monopolies themselves. Outside the United States, telecommunications services were often offered either by regulated monopolies along the AT&T model or by the so-called “PPTs” (governmental ministries of posts, telegraph and telephone) or by nationalized companies. Within the US, as ARPA and the networking researchers it funded were veering off in the direction of multiple networks, decentralized control and open standards, AT&T remained fixed to the Vailian ideas that had helped to make it one of the largest corporations in the world. In the late 1970s, J.C.R. Licklider had cautioned that different networks would be unable to communicate with one another unless common standardized protocols were introduced. This is indeed what began to happen.
Between the mid 1970s and the late 1980s, a pivotal period in the expansion of networking to the public, ARPA and its allies fought a standards war against the telecommunications industry. Representing the interests of the telephone industry was the Consultative Committee on International Telegraphy and Telephony (CCITT), a body of the International Telecommunications Union (ITU). Within the CCITT a group began working on the question of standards in 1975. The resulting protocol, X.25, was adopted by the CCITT in September the following year. Despite their dawning awareness of data networks as an emerging market, the telephone companies had not fully made the leap to the concept of distributed networking that lay at the heart of Baran’s work at RAND in the early 1960s. Nor had the telephone companies embraced ARPA’s approach towards diversity. Foremost among Baran’s considerations had been the need to provide a robust communications infrastructure using unreliable, redundant equipment. The telephone companies took the view that digital networks, like the analogue networks for telephone and telegraph before them, could only offer reliable service if every aspect of the network were controlled by the operating company. The imperative for ARPA had been to enable “a very broad class of interactions” between a diverse array of incompatible computers and networks that served different purposes. Thus where TCP/IP enabled diversity, X. 25 required consistency and conformity.
In contrast, TCP/IP, like the French network Cyclades, used “datagram” packets. Datagrams are simple, elemental packets that can be combined as needed by host computers to scale up or down the level of complexity in their communications. X.25, however, was built to provide consistently high-quality communication in all cases—whether necessary or not—which made it inappropriate for many uses. This distinction between TCP/IP, which used datagrams, and X.25, which rejected them in favor of consistent and rigidly controlled communications, was an ideological division between two generations of engineers, centripetal on one hand and centrifugal on the other, as much as it was technical. Vint Cerf, one of the chief architects of TCP, recalls that he had offered TCP/IP to the CCITT but had been rebuffed because the protocol had come from the Department of Defense, and because “they thought they could not ‘sell’ datagrams.”
TCP/IP did not only accommodate different devices, but accommodated many different types of networks too. TCP/IP could be used inside a network, or to connect many networks, or both. Not so for the telephone companies. Their interest was in national public data networks. The diverse array of networks of varying sizes, architectures and purposes that TCP/IP could support, and which the Internet eventually became, was beyond their view. According to Cerf, TCP/IP “eventually won out because it was so general.” Ultimately, homogenous X.25, the expression of the centripetal bent of the telephone industry, was defeated by TCP/IP, the open, diverse and untidy offering of the research community. As TCP/IP spread across the globe, communications began to take on the centrifugal character that had previously been the preserve of participants on the ARPANET. Moreover, new opportunities beckoned for underground, amorphous communities drawn together by common interest rather than proximity. The growth spurt that the early Internet enjoyed in the late 1980s was partly due to the ability of TCP/IP to work at both the macro and micro levels. This proved to be enormously fortuitous for the development of the Internet.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
Join Us
Understanding Breast Cancer Research
Save as Favorite
Sign in to receive recommendations (Learn more)
Understanding breast cancer research can be hard for someone who isn’t a scientist. The language in research papers is very technical and complex. The point of the research may not seem clear at first glance. And you may be left wondering if the study was successful or not.
Our Breast Cancer Research News program provides summaries of the latest breast cancer studies that could make a difference in your treatment, follow-up care, or general health and lifestyle habits. Our goal in sharing breast cancer research is to help empower you with the information you need to get the best care possible.
Understanding the latest research on breast cancer can help you:
• better communicate with your doctors
• play a more active role in your treatment decisions
• be more aware of the possible benefits and side effects of a treatment
• make a more informed decision about being part of a clinical trial testing a new treatment
On this page, you can learn about the types of research studies we cover in Breast Cancer Research News, key terms you’ll see in breast cancer research, and important concepts that can help you read a research paper and understand what the findings mean for you.
Types of breast cancer research studies
There are many different types of research studies. The type of study done depends on the question the research is trying to answer. The following list summarizes the main types of studies done on breast cancer and its treatments, as well as the advantages and disadvantages of each.
Randomized controlled trials
Randomized controlled trials are considered the gold standard when studying new treatments. These types of studies provide the best answers when doctors want to know how effective a new treatment or test is.
In a randomized controlled trial, a new treatment can be compared to no treatment or to the treatment people usually receive (called “standard of care”). A new test can be compared to a different test or no test.
“Randomized” means the people in the study are divided randomly into different groups. One group may get the new, experimental medicine. Another group may get the current standard of care. A third group may get the current standard of care plus a placebo — a harmless substance that looks exactly like the treatment being studied and is given exactly the same way, but contains no medicine.
“Controlled” means there is a control group for comparison. In a study looking at a new cancer treatment, the control groups would receive the standard of care or the standard of care plus the placebo. The results of the control groups are compared to the results of the group getting the new treatment.
When planning a randomized controlled trial, the researchers need to figure out several things before the study starts:
• how long the study should last
• how many people need to be in the study
• how the effect of the treatment or test will be measured
• the characteristics of the people in the study
Many randomized controlled trials are double-blinded. This means neither the researchers nor the people in the study know who is in each group. This is done to help reduce bias and improve the accuracy of the results. For example, if the researchers know who got the study medicine, they might expect those people to have better outcomes, and that could influence their findings.
Advantages of randomized controlled trials:
• They can measure of the effect of a new drug or test and offer results that are unbiased and consistent.
• The statistical significance of the results is relatively easy to calculate. Statistical significance is a math calculation that shows the difference in results between groups in the study is actually because of the difference in treatments and not just due to chance.
Disadvantages of randomized controlled trials:
• The new drug is tested under conditions that may be different from the real world. For example, a study may find that a new treatment works better than the current standard of care. Still, after the drug is approved, side effects may mean that most people don’t take the new drug as prescribed. This can mean the new drug won’t be as effective as it was in the study.
• The goals or endpoints of most randomized controlled trials of cancer treatments are overall survival or progression-free survival. Overall survival is how long a person lives, whether or not the disease comes back. Progression-free survival is how long a person lives without the disease becoming worse or growing. Goals that may be just as important to people taking a new drug, such as quality of life and side effects, may not be part of the results.
Observational studies
Observational studies let researchers look at the effect that a risk factor, treatment, or test has on a group of people without trying to change who is or is not exposed to it. Cohort studies and case-control studies are two types of observational studies.
Cohort studies: A cohort is a group of people who are followed and observed for many years. For example, the Women’s Health Initiative (WHI), which has been following more than 161,600 postmenopausal women since they joined the study between 1993 and 1998, is an example of a cohort study. The WHI is looking for links between health, diet, and lifestyle factors and diseases such as cancer.
In a cohort study, researchers compare the health outcomes of two or more groups of people who have been exposed to different things. For example, one group may smoke and the other may not. Or one group may have taken a certain medicine and the other has not.
Cohort studies can have a forward-looking design, which researchers call prospective, or a backward-looking design, which researchers call retrospective.
In a prospective study, the result the researchers are interested in, such as cancer diagnoses, hasn’t happened when the study starts — all the people are healthy. So the researchers follow the healthy people and see how the differences between the groups affect the outcomes.
In a retrospective study, the result has already happened when the study starts. So the researchers look at people’s health history — usually through medical records or self-reporting — to find risk factors.
Advantages of cohort studies:
• Cohort studies, especially prospective cohort studies, reduce the risk that the results will be affected by selection bias. Selection bias means that the sample of people in the study do not accurately represent the larger population. Because all the people are healthy when the study starts, it’s unlikely that they would be more or less likely to develop the disease being studied.
• Cohort studies allow researchers to calculate the rate of disease in people exposed to something, so they can then calculate absolute risk and relative risk. Absolute risk is one person’s risk of developing a disease, such as breast cancer, over a certain period of time. Relative risk is the risk of a disease happening in one group of people compared to a different group of people. In most cases, the two groups of people have been exposed to different risk factors, such as smoking cigarettes vs. not smoking cigarettes, for example.
Disadvantages of cohort studies:
• Large numbers of people may have to be studied for very long periods of time.
• Cohort studies can be expensive and time-consuming.
• Cohort studies aren’t very helpful for learning about rare diseases.
• Cohort studies aren’t good for diseases that have a long latency period, meaning that a person contracts the disease, but no symptoms show up until years later.
Case-control studies: These types of observational studies compare people who have a medical condition, such as cancer, with people who don’t have the condition. But the two groups are otherwise as similar as possible, including age, ethnicity, and sex. The people are interviewed or their medical records are analyzed to look for things that may be risk factors for the medical condition.
Advantages of case-control studies:
• They can be good for learning about rare diseases.
• They are less expensive and less time-consuming than randomized controlled trials and cohort studies.
Disadvantages of case-control studies:
• It can be difficult to figure out which people are the most similar to each other.
• Most case-control studies are retrospective, which means the researchers ask about things people did or may have been exposed to in the past. If people don’t remember things correctly, it can affect the accuracy of the results.
Cross-sectional studies
Surveys are the most common type of cross-sectional study. A representative group of people are interviewed to find out their opinions or facts about their lives. Representative means the group is diverse enough in age, sex, race, or other factors so that the researchers can make conclusions about a bigger population of people based on the study. The strongest cross-sectional studies use randomly selected groups of people.
Advantages of cross-sectional studies:
• Cross-sectional studies only collect information once, so they’re quick and inexpensive compared to other types of studies.
• They can provide information on how common a particular health condition is.
Disadvantages of cross-sectional studies:
• They don’t provide information on the cause of an illness or what the best treatment is.
• The accuracy of cross-sectional studies depends on how truthful people are when they answer the survey questions.
Qualitative studies
Qualitative studies gather information on people’s opinions, motivations, or how they perceive their lives. For example, a study asking people receiving a specific cancer treatment about their quality of life is a qualitative study. Qualitative research doesn’t rely on numbers and data. Qualitative studies use diaries, questionnaires, and in-person interviews to collect information from people who have a particular medical condition and possibly their loved ones.
Advantages of qualitative research:
• The results can offer a detailed picture of people’s experiences and help researchers understand why people act the way they do.
Disadvantages of qualitative research:
• Because qualitative research is generally more time-consuming, the studies usually involve fewer people.
• The quality of the information collected depends on the skills and observations of the researcher.
A meta-analysis is a study that combines and analyzes the results of a number of earlier studies. Researchers do meta-analyses to increase the statistical power of the results and to resolve controversy when the results of individual studies disagree.
Advantages of a meta-analysis:
• Meta-analyses can offer a tidy review of a large, complex, and sometimes conflicting body of research.
Disadvantages of a meta-analysis:
• The results of a meta-analysis are only as good as the studies included in it.
• The researchers must do a thorough and detailed search for existing research. If some relevant studies aren’t included, the results of the meta-analysis are weaker.
Back to top
Phases of clinical trials
Clinical trials looking at new breast cancer treatments and tests are conducted in a series of four steps, or phases, from phase I to phase IV. Each phase builds on the one before it:
• Phase I trials look at the best way to give a new treatment, as well as the safest dose.
• Phase II trials look at how effective the new treatment is.
• Phase III trials compare the safety and effectiveness of a new treatment to the current standard of care.
• Phase IV trials look at whether the treatment has benefits or long-term side effects that were not studied or seen in the phase II and phase III trials.
To learn more about each clinical trial phase, read What Are the Different Stages (Phases) of Clinical Trials?
Back to top
How to read breast cancer research journal articles
At first glance, reading an article in a research journal such as the Journal of Clinical Oncology or JAMA (formerly known as the Journal of the American Medical Association) can be a little intimidating. Even the titles can be filled with unfamiliar, very long words. The body of the paper is likely to have many abbreviations for words that aren’t usually abbreviated.
It also can be frustrating when you can’t read the full text of a paper unless you pay for it. You might be able to access full journal articles through your local library. Most libraries have online subscriptions to many scientific journals.
Still, getting to the library and spending a couple of hours scanning journal articles can be difficult for some people. But you can get a basic understanding of a paper and decide whether it applies to your unique situation by reading the abstract, which is the first section of a scientific paper.
The abstract gives you a summary of the entire paper.
Reading a study abstract
Here are the most common sections in an abstract and what they will tell you. It’s important to know that different journals may have different names for the sections of a paper covered in the abstract. In JAMA, specific sections are called “objective” and “interventions.” In the Journal of Clinical Oncology, similar sections are called “purpose” and “patients and methods.”
The purpose or objective of the paper tells you why the study is being done and may include background information on why the study is important.
In most cases, the objective of the study will tell you whether the research applies to you because the researchers will say which type of breast cancer — early-stage, hormone-receptor-positive disease, for example — is included in the study.
Patients and Methods
Some journals split this section, so you may see methods, participants, and design as individual sections. This section (or sections) tells you how many people were in the study and gives you information about the type of breast cancer being studied.
For example, “This trial enrolled 476 women with HER2-positive early or locally advanced breast cancer,” lets you know the study applies to women diagnosed with early-stage HER2-positive disease or HER2-positive breast cancer that has spread to tissue near the breast, but not to parts of the body away from the breast.
Methods/design will tell you the type of study that was done and any treatments the researchers used in the study.
The results section tells you the results of the study. While this section seems like it would be the easiest to understand, the results also may include quite a bit of statistical and mathematical information, including terms such as “mean,” “median,” “hazard ratio,” “standard deviation,” “confidence interval,” and “P value.” Those terms are explained in detail under “Reading the full paper” below. In most cases, it’s easier to skim the results section and move on to the final section of the abstract to learn what happened in the study.
The conclusion or relevance section summarizes the results of the study in a few sentences, leaving out all the math and statistics. This section also may explain how the results support, build on, or conflict with earlier research.
Reading the full paper
Some scientific journals may offer free access to full papers. The full paper has many more sections than the abstract. In many cases, it may make sense to read the sections in a different order than they are presented in the paper.
For example, you may want to read the “Conclusion” section first to see if the research applies to your situation. If it doesn’t, then you may not want to read the paper.
Here are the most common sections in a research journal article and what they will tell you.
As explained above, the abstract is the first section of research papers and gives you a summary of the entire paper.
The introduction of a research paper gives some history of the problem the research is trying to solve and explains how the paper fits in with other research that has been done. The last part of the introduction usually explains why the researchers wanted to do the study.
The methods section of a research paper will likely have a number of subsections that explain exactly how the research was done:
• Study design tells you how people were assigned to treatment groups, the types of treatments that were given to each group, and the type of breast cancer being looked at in the study. This section also will tell you which institutional review boards and ethics committees approved the study and that the people in the study gave written consent to be in the study.
• Study population tells you exactly who was in the study, including:
• the age of the people
• the type of cancer they have
• any previous treatments they received
• any other specific characteristics that are important to the study, such as brain metastases or time before treatment started
Note: In some journals, details about the study population may be in the results section of the paper.
• Data collection tells you what information the researchers collected about each person in the study and when they collected it. For example, if the researchers wanted to see if a new treatment was effective at stopping metastatic breast cancer lesions in bones from growing, they might have imaging done on all the people in the study before the new treatment starts, again 3 months after the new treatment started, and again 6 months and 1 year after the treatment started.
• Statistical analysis is likely to be the most complex section and probably the one that is most difficult for non-scientists to understand. This is where the researchers explain the statistical methods they used. You may see terms such as “Kaplan-Meier method” and “Cox proportional hazards regression model.”
The Kaplan-Meier method is a statistical tool often used to measure the percentage of people living for a certain amount of time after a treatment.
A Cox proportional model is a statistical tool that links the survival time of a person to another factor. In breast cancer research, this other factor is usually a treatment. Cox models also allow researchers to adjust for other factors that may affect survival. So if researchers wanted to know how a new treatment improved survival, but wanted to take out the effects of another factor — say, whether the people in the study smoked or not — they would use a Cox model.
If the statistical analysis section of the paper is hard to understand, don’t worry. The important information is explained in the results section of the paper.
The results section of a research paper is where the most important information is, including:
• how many people were in the study
• the treatments being studied
• which treatments the people received
• when the people received the treatments
• when information on the effectiveness of the treatments was collected
• the outcomes or endpoints the researchers used to figure out how effective the treatments were, such as progression-free survival or overall survival
• how effective the treatments were
• side effects the treatments caused
In many cases, the results section will include a written summary of the results and more detailed information will be presented in tables and figures.
For example, the text may say that “the disease characteristics were well balanced between treatment arms (Table 1).” When you look at Table 1 you see:
• the number of people in each treatment group
• the median age of the people in each treatment group
• specific cancer characteristics in each treatment group, such as previous treatments, stage at diagnosis, and whether the cancer is hormone-receptor-positive or not
The results section will likely include many terms that are commonly used in research, but may not be familiar to you. Here are definitions of some of key terms you’re likely to see:
• Median: First, it’s important to know that median does not mean average. The median is the middle of a list of numbers. So if the median age of the people in the study is 62, that means that half the people were older than 62 and half the people were younger.
• Mean: Mean is the average of a group of numbers. So if the mean age of the people in the study is 55, it means that the researchers added up the age of everyone in the study and then divided that total by the number of people in the study.
• Disease-free survival: How long a person lives without the cancer coming back.
• Progression-free survival: How long a person lives without the cancer growing.
• Overall survival: How long a person lives whether the cancer comes back or grows.
• Hazard ratio, often abbreviated HR: How often a particular thing happens in one group of people compared to how often it happens in another group of people, over a certain period of time. Hazard ratios are commonly used to measure survival at a point in time in a group of people who have been given the treatment being studied compared to another group of people, called the control group, who are given a different treatment (usually a placebo). A placebo is a harmless substance that looks exactly like the treatment being studied and is given exactly the same way, but contains no medicine.
• A hazard ratio of 1 means there is no difference in survival between the two groups.
• A hazard ratio greater than 1 means survival was worse in the people given the treatment being studied compared to the control group.
• A hazard ratio less than 1 means survival was better in the people given the treatment being studied compared to people in the control group.
• Confidence interval, often abbreviated CI: How likely a statistical result would happen if the same study and calculations were done on a different sample of people with the same disease. In other words, if the confidence interval is 95%, it means that if the study were done 100 times, the results would be the same 95 times.
• P value: The probability value, abbreviated as P value, is a number that shows how statistically significant the results are. If a result is statistically significant, it means that it was likely the result of the differences in treatment and not just because of chance. If a result is not statistically significant, it means that it was likely due to chance and not because of the difference in treatment.
Most researchers consider a P value of less than 0.05 as being statistically significant, which means that the result has less than a 1 in 500 chance of being wrong.
When breast cancer research results are reported, most results are survival statistics. Nearly all studies will report the percentage of people surviving in each treatment group and then also give hazard ratio, confidence interval, and P value information.
For example, in a study on adding Xeloda (chemical name: capecitabine) to standard chemotherapy after surgery for early-stage triple-negative breast cancer, the results showed that 5-year disease-free survival rates were 86.3% for women treated with Xeloda and chemotherapy compared to 80.4% for women treated with chemotherapy alone. The hazard ratio was 0.66, the confidence interval was 0.99, and the P value was 0.044.
The hazard ratio means that disease-free survival was 34% better in the group treated with Xeloda and chemotherapy compared to the group treated with chemotherapy alone.
The confidence interval means that the results are 99% certain to be accurate.
The P value means that the results are statistically significant. A P value of 0.044 means that the difference between the groups was due to chance only 44 times out of 1,000. So, there is less than a 1 in 22 chance of the researchers’ conclusion being wrong.
The discussion section of a research paper is where the researchers summarize the results of the research. They also may talk about the history of research on the topic and why the study is important.
The researchers also may talk about any strengths or limitations of the study. If the strengths of the study outweigh the limitations, it’s likely that the results are accurate.
The conclusion is often the shortest section of the paper. The researchers summarize the results in one or two sentences and say why they’re important.
Disclosures and affiliations
Here, the authors of the paper disclose if they have received money from any companies or organizations that may be interested in the results of the research and detail any conflicts of interest they may have. For example, if one of the authors has received money from the company that is making the medicine being studied, that could be a conflict of interest.
The affiliations detail each author’s title and home institution.
Back to top
Considering all aspects of research results
Let’s say you’ve read the article on adding Xeloda to standard chemotherapy after surgery for early-stage triple-negative breast cancer. The results seem very promising, but there are still a few questions to consider as you make sense of the results.
What journal published the study?
It’s important to know some things about the journal that has published the paper:
• Is the journal peer-reviewed? This means that the paper is reviewed before publication by scientists who are experts in the paper’s subject matter. These reviewers look to see if the methods are sound, the data are factual, and the statistical analysis is accurate. In many cases, a paper may go through several rounds of peer review before it is published. Peer-reviewed journals are considered more scientifically valid than other publications. You can figure out if a journal is peer-reviewed by going to its website and looking at the “about” information. If that’s not clear, you also can look at the information for authors, which will explain the peer-review process, if one exists.
• What is the journal’s impact factor? The impact factor is a measure of how often the articles in a journal are cited by other papers. The idea is that important papers are cited more often, which influences the research on a topic. So the higher the impact factor, the more prestigious a journal. An impact factor of 6 or higher is considered a good score.
• What is the journal’s reputation? A journal published by a reputable professional association or society, such as the American Medical Association or the American Society of Clinical Oncology, is considered of higher quality than many other publications. Also, the reputation of the journal’s editor or editorial board can be a good indicator of the journal’s quality. You can usually find this information on the journal’s website in the “about” information.
Are the results statistically significant?
While the results may seem promising, if they’re not statistically significant, it means they could have happened by chance and not because of a difference in treatment.
How many people are in the study and how were they chosen?
The number of people in a study, called the sample size, can tell you how applicable the results may be in the real world. For example, a study that includes 600 women diagnosed with early-stage triple-negative breast cancer would have stronger results than a study including only 20 women with the disease.
It’s also important to know how the people in the study were chosen. In a perfect world, the people in a study would be a randomly chosen representative sample of people with a specific illness. So people in a study on a new treatment for early-stage triple-negative breast cancer would represent, on average, people who are diagnosed with that particular type of breast cancer. The sample of people in the study would be of the same age ranges, ethnicities, and insurance status as people in the real world.
Selection bias means that the sample of people in the study do not accurately represent the larger group. So if the study were on early-stage triple-negative breast cancer and every person in the study had stage I disease, that would be selection bias because early-stage disease includes stage I to stage III. And since stage I breast cancer is more likely to have better outcomes than stage III breast cancer, the results of the study could be biased.
What type of study is it?
Randomized controlled trials are considered the gold standard when studying new treatments. If people are not randomly assigned to either the new treatment or the placebo, the results could be biased if more people with less aggressive disease are assigned to get the new treatment.
Studies on certain topics, such as people’s diets and how what they eat could be linked to cancer risk, have inherent bias. In these studies, people are asked to recall what they ate, sometimes more than 2 or 3 years ago. It’s really unlikely that people can accurately recall how much milk they drank in elementary school or how many servings of vegetables they had when they were in high school.
So the results of any studies that ask people to recall what they ate or what they did in the past should always be considered biased.
Back to top
News coverage of research results and tips for wading through the hype
You may see news coverage of research results that make it sound like a vaccine for breast cancer or a cure for breast cancer is right around the corner. Sadly, neither is true.
What is true is that scientists are studying cancer vaccines using cells in petri dishes, and some of these extremely early results are promising. But it can take 15 or 20 years for a petri dish study to move up to a study in people, if at all.
So how does this distortion between the results in a scientific paper and the story you see in the media happen?
In most cases, the distortion happens in part because the aim of the news media is to sell papers or magazines or get eyeballs on their websites and clicks on stories. A sensational headline usually attracts more interest. So a headline like, “Scientists close in on cure for breast cancer,” is guaranteed to get more readers than a headline that reads, “Mouse cells seem to respond to cancer vaccine.”
Another factor is the speed of the news cycle. We live in a 24-hour society, and news websites must constantly develop new content. So journalists often don’t have time to read the entire scientific paper. They look at the headline and rely on a media release from the research institution to fill in the details. And institutions know that the punchier the media release, the more likely the story is to get picked up. It becomes a vicious cycle of overhyping research results to get media attention.
So how can you make sure that the breast cancer research you’re reading about in the media is accurate? Here are some tips:
• Read more than the headline. See if the story actually explains the research.
• Search the topic of the research for other news stories. If they all have the same wording, it’s likely the stories are based on a single media release and not much work has been done to verify its accuracy.
• Find the original paper and read the abstract yourself. Do the original paper’s conclusions match the media stories? If not, it’s likely the story has been overhyped.
• Check our Breast Cancer Research News section for our coverage of the research. Our aim is to give you accurate, easy-to-understand summaries of the latest research that can make a difference for you and your unique situation. If we haven’t summarized a study, it’s probably because the results are too early to be put into practice.
Back to top
Take our survey
After reading this article, we invite you to take a brief survey to let us know what we did well and how we can improve. Your feedback helps us determine the best ways to support and inform people with breast cancer. We appreciate your time.
Back to top
Written by: Jamie DePolo, senior editor
This content was developed with contributions from the following experts:
Jenni Sheng, M.D., assistant professor of oncology, Johns Hopkins University School of Medicine, and research member of GRASP (Guiding Researchers and Advocated to Scientific Partnerships)
Brian Wojciechowski, M.D., medical oncologist at Riddle, Taylor, and Crozer hospitals in Delaware County, PA, and medical adviser to
This content made possible in part through generous support from Lilly Oncology.
Was this article helpful? Yes / No
Rn icon
Can we help guide you?
Create a profile for better recommendations
How does this work? Learn more
Are these recommendations helpful? Take a quick survey
Fy22oct sidebarad v02
Back to Top |
Task 4, option 3
Option 3: Exploring past and present technologies: Share a lesson idea that involves exploring past and present technologies. You might prepare a resource, a lesson plan or some online content that accompanies your lesson. Share your idea with the community. If you are a teacher trainer, you might consider an idea for a professional development session.
For my lesson I would create a powerpoint that also acts as a class game. Each slide will be split in half, one with an image of some form of old technology (eg the first ever phone), and on the other side it would have an image of the new technology (eg latest iPhone). The class will take turns in comparing the two phones and other technologies based on both physical appearance, as well as the technology used in each one and how it advances over time. They will conclude by stating which one they would rather use and why.
+ There are no comments
Add yours
|
Software Programs Is So Famous, Yet Why?
Software programs, computer system software program, or computer system software packages are programs or treatments for a particular computer system or component of the system. Software program of different kinds is produced for different users having different objectives. Many classifications typically made use of for them are education and learning and training software program, service and audit software application, clinical software program, network monitoring software application, hobby as well as entertainment software application and software. They are available in different forms as well as are written to work on different os. They can be found as stand-alone programs or components.
Computer system software programs feature directions, sustain information as well as customer manuals. They can likewise include various other materials such as diagnostic devices, benchmarking utilities and also recommendation product. Major producers of computer software programs use extended guarantee strategies. In many cases, the maker gives assistance for a minimum of one year after the day of acquisition.
The instructions consisted of in software programs give in-depth directions on just how the program must be used. As an example, a guideline to multiply is just one of the directions while other guidelines define how to carry out calculations. Instructions for one function typically need various guidelines for another function. A few of these features are multiply, separate and increase. Directions for various other functions have the exact same directions yet the specifics may vary.
Computer system software application are separated right into two groups, particularly desktop computer software program and embedded applications. Desktop software application is created to run on a personal computer that uses the same system software that a personal computer usages. Embedded applications (likewise called software) are created to operate on a mobile tool that is connected to the computer system by means of a USB or Bluetooth wire. Examples of ingrained applications are cellular phones, handheld computers and also electronic video cameras. Desktop software and embedded software can be made use of with each other for generating applications that run on a range of computers. On the other hand, mobile phones such as cellular phones, handheld gadgets and also cars can just be made use of with mobile software application.
Computer application software programs are used in service, education and learning as well as entertainment. The content in business software programs may vary from accountancy, medical and also finance to manufacturing, transportation, personnels management, sales, circulation and also infotech. Business application software programs may be made use of to handle stock, goods as well as solutions on the retail and wholesale market, supply tracking, budgeting and also human resource management. Some examples of business application software programs are Intuit Quick Books, Quicken Premier and Microsoft Cash.
Computer system operating systems give customers the capability to carry out computer program guidelines. The computer os controls the execution of guideline by the computer, software application and also motorists. Instance of operating systems consist of Windows, Linux, UNIX, Macintosh OS and SunOS. Individuals execute guidelines in the form of commands stored in software program files accessed by a command line user interface (CLI). For example, Windows provides the Windows Server, a layer on top of Microsoft Windows that makes it possible for the software program to interact with the os, and Linux on the computer user’s computer system communicates with a Linux OS with a setup data. software trucking
System software is computer program software that offers individuals accessibility to integrated features of a computer system, such as the os, memory, hard disk drive, printer, Ethernet cord, video card, hard drive, sound card, wireless network adapter, CD/DVD drive, and also Internet service provider. It also provides security and also gain access to control. Instances of system software include Windows Info Security, Windows XP Solution Pack 2, Windows View Solution Pack 2, as well as MacAfee VirusScan 2021. System software program refers to software on various other devices such as web servers and also digital indicators. It allows the individual control the server or digital indication. Examples of platform software application consist of Citrix Netware, cPanel SSL, FastStone Free Version, MyPCBackup Pro, NetIQ Home Server, Pareto Logic Web Safety, PresteXoft Web Security, Sun Staroffice 9 Expert, Uconnect Protection for the Computer, as well as Sybase Open Database Management.
Some computer system software program consists of a series of resource codes. Resource code (also called “resource documents”) are written in a programming language (for example, C++) and also are read and executed by a computer system throughout implementation. Due to the fact that resource code is typically saved within a program and also reads several times by the computer, it can trigger an efficiency slowdown. To avoid performance problems, programs created using cost-free software application have resource code that are compiled right into the initial machine language, making it possible to execute only the original program and its components.
Software application are a collection of directions that tell a digital tool how to perform a particular function. These software application are typically utilized by computer applications in a computer system. For example, if you want to play computer games, you would certainly first need to download video game software application to your computer system. This is opposed to hardware where the tool is currently constructed and also just executes the function when it is made use of. So, what software application are best to utilize?
To compare 2 software programs, the first thing that you ought to do is make a checklist of all the tasks that you desire the device to carry out. Maybe arranging your e-mail, surfing the internet, printing documents, calendar occasions, running applications, recording sound and video clip, or practically anything else. After that, you will have a checklist of software programs that meet these needs. In comparison to the listing that you made earlier, you must now see which one can do the work much better than the other. In this instance, it is equipment that is the powerlessness contrasted to software application.
Let us currently continue to the following contrast. This moment, allow us use a monitoring system rather than a software program engineering layout. If you are implementing a software engineering design, then your emphasis should be on the technical information. Nonetheless, if you are executing an administration system, then you should pay even more attention to the non-technical details such as the design of the device, monitoring approach, training, as well as quality assurance. oil and gas data management software
When comparing software programs and also monitoring systems, one interesting comparison you need to consider is whether the two can be flawlessly incorporated. Some software programs that can be integrated with a management system include accountancy software application, consumer partnership monitoring, circulation administration, and inventory administration. If these are consisted of in the system, after that all you have to do is configure the software programs to do their jobs instantly when required. Furthermore, with the administration system, you will certainly need to configure it to do calculations automatically.
Leave a Reply
|
Internet age
Religion in the Internet Age
In a previous article on this website, we have looked at how major religions spread across the globe to recruit the high numbers of worshippers that they have today. Faiths such as Christianity, Islam and Buddhism spread far and wide thanks to travellers teaching people about them wherever they went and instructing new people on how to conduct the practices involved in that particular brand of worship. This meant that, whenever these original distributors moved on, they left converted worshippers behind who could carry on their work, spreading the word about a new religion.
Fast forward several thousand years and human beings have invented the internet. Once you’re online, information can be transmitted and distributed in seconds, reaching millions of people at once and spreading messages faster than ever before. This has meant that people can communicate with others about faith and religion across geographical and temporal divides, leading devotees to discover new faiths or rediscover beliefs they thought that they’d lost. It can be used as a great tool for bringing people together, and for communication between different religions. So, what exactly does religion look like in the internet age? And how will it learn to thrive during this era of connectivity and global networking?
Religion in the internet age
How does religion look like in the internet age?
The initial way in which religions, faiths and belief systems can benefit from the internet is through the dissemination of information. Religions are, by nature, multi-faceted and have been interpreted in many different ways by different communities. The curious can now use an internet search engine to find out the fundamentals about any set of beliefs within seconds, doing away with the sometimes harmful mystery that can surround them. Rather than being afraid of what they don’t recognise or don’t understand, people can now conduct their own research about a religion and see that most have the same core values.
Worshippers themselves can connect with people outside of their community by posting information about their faith on blogs, websites, social media and forums; the most reliable material will always come straight from the horse’s mouth, as it were, and so this is a great opportunity to set some records straight.
A direct consequence of this act is increased conversation between people. This can take place between those of the same faith, people of differing faiths or between people who choose to worship and those who choose not to. Every conversation is valid and has the potential to be constructive. Speaking with those who are different to us gives us a greater appreciation for our differences and how much connection can be found there; speaking with those people who are already in our community can help to strengthen our ties to that group and gain a better understanding of what it means to be a part of it.
Surprisingly enough, getting involved with religion on the internet can be fun. One of the primary ways in which we use an online space is for entertainment purposes. Just think of platforms like Teach, Skyvegas and NowTV – all of these websites give us the opportunity to access something online that we would ordinarily have had to gain admission to via a ‘real world’ building or object. The same is true of religion’s online presence.
If you’re a Christian that’s interested in Bible study, then there are apps, YouTube videos, online courses and Instagram hashtags that you can plug into to make your study more engaging and exciting. If you are a Muslim searching for conversation and debate with fellow followers of your faith, then there are chat rooms, social media pages, hashtags and other online communities that you can follow and participate in. If you identify as non-religious, then there are still plenty of great documentaries, movies, TV shows and vlogs that you can watch to find out more about a certain religion, or about all of them. The possibilities are endless and, due to the nature of Internet 2.0, many of them are entertaining as well as educational.
Dissolving borders
One of the greatest outcomes of all of these things combined – increased information, contemporary conversation and engaging entertainment – is the dissolution of borders between different religions, faith groups, belief systems and those who subscribe to none of them. Ignorance can be the root of animosity and, as the world grows smaller, the population grows bigger and we all become more connected, an understanding of other people’s lifestyles is imperative.
Theoretically, the internet is accessible to anybody regardless of age, gender, religion or any other feature and therefore represents perhaps the greatest excuse we’ve ever had as a species to break down borders and get to know each other better. Whether that’s through brushing up on your Hindu gods and goddesses, researching the impact of Christian missionaries or simply finding your own faith, the internet is the best tool we currently have at our disposal and one that has had a significant impact on religion on a global scale.
We all become more connected
We all become more connected |
Joy, folklore and celebration in the “Mama Negra”
También disponible en español.
The “Mama Negra” (Black Mother in spanish) is a traditional festivity that takes place in the city of Latacunga, in the Cotopaxi province. Thousands of domestic and foreign travelers gather on the squares and parks to enjoy the folklore and traditions that parades through the streets of the city. Dressed characters, music and cultural expressions are the main elements for this celebration which will be held on November 23.
Two celebrations
The Black Mama festivity is a relevant cultural phenomenon, representing a symbiosis of indigenous, Spanish and African cultures in Latacunga. It takes place twice a year. The first date is in September, and it is a great parade organized by local merchants. The second one comes in November and it is arranged by the Mayor’s office this second celebrations matches the Latacunga’s independence celebrations.
The central figure of La Mama Negra festivity is always interpreted by a man who dyes his face in black and paints his lips with an intense crimson red. It has a curly hair decorated with color ribbons and artificial pearls, of his ears has golden earrings and a beautiful fine choker necklace.
The Mama Negra characterizes the African slaves released free in Ecuador by mercenaries in 1218. The doll he carries on his hand is a black baby Jesus because the celebration leads to the Virgin of Mercy who becomes the nurse of the child.
Popular festivity
Known as the Feast of the Most Holy Tragedy or Captaincy, the celebration honors the Virgin of Mercy, who protects and cares for the residents of Latacunga. The festival unites indigenous, Spanish and African traditions thus, it was declared an Intangible Cultural Heritage on October 31, 2005.
Shampoos, the drinks
There is no party without a representative meal or drink, and in the Mama Negra the “shampoos” are the ones to try, a drink prepared with ground corn, hominy and sugar cane. On the parade that runs through the city, the “shampooers” are the ones who distribute the beverage to spectators. The drink refreshes and energizes the dancers.
Living characters
Curiquingues, characters that dance; the Angel of the Star, a child or adult who wears an angel costume and sits on a horse; the Moorish King symbolizes the nobility and solemnity, so it wears a long cape; the Flagman, a character that waves a multicolored Moorish flag that represents the interculturality of the aboriginal people; the Captain leads the parade waving a sword; he wears a military suit full of decorations.
Band Music
Parties and folk celebrations throughout the country have an ingredient that makes them unique and special, the local village bands that gives the compass to the dancers steps. They are skilled musicians with percussion and wind instruments. The rhymes, verses and songs urge everyone to live a feast of joy that exposes the indigenous, mestizo, Afro-descendants and Spaniard expressions.
Entradas relacionadas
Deja una respuesta
|
Église Notre-Dame-des-Marais
The Church of Notre Dame of the marsh is a remarkable building from the late Middle Ages and the Renaissance. It is mentioned in many works of art historians and architects as Viollet le Duc, Emile Male, Henri Zerner. She is known for its Renaissance-style choir, stained glass, his organ at the bas reliefs buffet bird's nest. It was built in 4 phases: 1450-1480 nave towards the bell tower from 1480 to 1500, the choir from 1500 to 1596 and became the Sepulchral Chapel vestry 1616-1624. It is a simple parish church that was located in the heart of the city from the late Middle Ages, but its size and beauty show the richness of La Ferte-Bernard and the region around 1500 and the piety of the people. It also favors the fruit of the monarchy who wanted to thank this city, located on the borders of the royal estate and possessions of the Plantagenets and his loyalty to the kings of France during the Hundred Years War. Accordingly, the Kings have allowed the use of a portion of taxes for restoration of the ramparts to finance the construction of the church. Francis I intervened to ensure that members of the Brotherhood Saint Sebastian who collected funds to build the choir receive in exchange for indulgences.
Accommodation nearby
Latest news onÉglise Notre-Dame-des-Marais |
So What Was It Like to Live Like a King?
During the medieval times, a king was the figurehead of the state. In the early medieval times, the king’s authority was less because the Church and the Pope have more influence and authority. But in the middle medieval times, the authority of the king augmented and he had the absolute power over … Read more |
What Does a Manager Do Really? (6 common manager personality traits)
6 min min read
Updated on August 29, 2021
by Niki Giovanis
Key Takeaways
• Managers play an essential role in all companies
• The three types of managers are line managers, product managers, and project managers
• To be a successful leader, one must be communicative, organized, collaborate with others, and be great problem-solvers
• A manager is both a leader and performs administrative tasks such as hiring, budgeting, helping employees throughout the day, and help businesses with their short- and long-term goal achievement
Within any business or company, there are several employment positions. Each has a different role in ensuring the business operates appropriately. A popular employment position is that of a manager. While a managerial employment position is widely known by name, you may be wondering, what does a manager do? Therefore, if you want to learn more about this job, keep on reading!
Okay, so what Does a Manager Do?
As you know, every business works in a hierarchal format. This can include a CEO at the top, a vice president who is just below, and then directors and managers. Each individual will perform an important task that helps the business succeed and make a profit.
With that being said, managers are in a vital job role in any company. They are both leaders and administrations. Additionally, managers are also responsible for relaying information from higher levels of management to employees. In essence, a manager is there to help guide employees throughout the day. They are in charge of keeping others motivated and are there to offer support.
However, there are also many administrative roles that a manager does:
• Managers are in charge of hiring new employees
• They oversee the training of new employees
• Managers play a crucial role in helping employees grow within a company
• They are in charge of finding solutions to problems
• Managers are vital players in making important decisions
• They ensure to uphold company culture and make sure employees work in a positive work environment
• Managers help make sure a business stays within their budget
• Managers also help businesses achieve short- and long-term goals
Types of Managers
Now that we’ve asked the question of “what does a manager do?” let’s take a look at some of the types of managers.
While a manager’s job is relatively the same, you may be surprised to know that there are different types of job positions.
A-Line Manager
The first type of specialized manager is called a line manager. The most common type of manager is what we will call a Line Manager. They manage employees by creating goals for employees, monitoring their progress, and providing feedback. Line managers are typically responsible for what employees do on a day-to-day basis (Lussier, et al., 2015). They directly oversee the functions of other employees and ensure that a business operates smoothly throughout the day.
A Project Manager
On the other hand, there is also what is known as a project manager. A project manager is in charge of overseeing the production of any project a business takes on. From prioritizing and assigning tasks to planning schedules and dealing with budgets, this manager is a great leader.
A Product Manager
Next on our list of the types of managers is a product manager. This type of manager is typically found in tech companies or any company that has a digital product. The role of a product manager is to identify what consumers need and help ensure their business or product can fulfill those needs. This is usually done by identifying new features and coordinating with multiple teams (engineering, data analytics, senior management) to make sure those changes get implemented. They are also in charge of monitoring changes in the market and provide analyses about market competition. Additionally, product managers help align stakeholders with the products their company is selling.
Qualities a Manager Should Have
what does a manager do
(Source: https://www.theladders.com/career-advice/of-the-4-types-of-managers-only-this-one-is-truly-effective)
Being a manager is a challenging job. And sometimes, this job is not suited for everyone. Managers are critical leaders in a company. Therefore, they should have specific qualities that help them guide employees and succeed. Here are some of the top qualities a manager should have:
Great Communication Skills
One of the most essential qualities a good leader can have is excellent communication skills. As managers are the point of contact between employees and higher management, they need to communicate effectively. Moreover, they should also be an active listener, who allows their employees to speak and feel heard.
Effective Organizing Skills
Another essential quality is organization. As managers are in charge of overseeing the tasks of all employees, they must be able to prioritize tasks accordingly. Managers with this personality trait are good at keeping their team productivity high and achieving their goals.
Innovative Problem-Solving Skills
As it is common for businesses to face challenges, a manager must be able to problem-solve effectively. This means they should be confident in analyzing the circumstances to form innovative solutions that benefit the business.
A manager’s job is to lead a team. Therefore, a successful manager must encourage collaboration amongst their employees. Working together can help develop new ideas and improve productivity. It can also help create strong connections amongst employees, which will also aid a business in achieving success.
Encouraging and Understanding
Furthermore, another quality manager’s should have is the ability to encourage and understand their employees. The job of a manager is to make sure employees succeed. Therefore, managers must understand their employees and encourage them to be the best versions of themselves.
Reliable Individuals
Lastly, a successful manager is also someone reliable. They should be role models for other employees. This means they should set a positive example for their employees and contribute to positive company culture. This way, employees feel motivated to do their job to the best of their ability and help the company achieve success.
Final Thoughts
As you can see, there are many portions to the question “what does a manager do?” Managers are an integral part of all companies. This is why hiring a good manager is just as important as leading a company to success. Managers are more than points of contact in a company. They are essential in helping employees and ensuring that a business runs optimally.
Related Resources
Certificate in Leadership Fundamentals Starts at $499
Access to 10 of Getting People Right’s Flagship Courses:
• Discovering and implementing core values
• Enhancing your career through delegation
• Building a one-page strategic business plan
• Coaching based performance reviews
• Using DISC Personality testing at work and home
• Dealing with under performers
• Learning the process to hire a-players
• How to fire with minimum pain and drama
• Objectively assessing your team
• Building your personal annual plan
Start Learning Today |
Feb 10 , 2021
Amher Delancel
The lungs are an essential organ of the human body and the most vulnerable to air pollution damage. Chronic obstructive pulmonary disease (COPD), lung cancer, and acute lower respiratory tract infections in children are no strangers. It is a serious topic that deserves attention for lung health.
Once the lung function is imbalanced, it will weaken the respiratory position. Over time, it will cause the body to be in a chronic hypoxic state, forming a qi-deficiency physique, becoming fatigued quickly, and general weakness and other symptoms. The obstruction of lung qi can also affect the nose, mouth and skin, causing symptoms such as nasal congestion, runny nose, cough, thirst, phlegm, skin itching, and rash.
To maintain the health of the body, we must first know how to protect our lungs. The focus is on strengthening the respiratory tract to construct the body's firewall and keep pathogens out of the body to reduce diseases.
In this industrialization age, we inevitably exposed to the air full of polluting gases: smog, car exhaust, factory exhaust, second-hand smoke. It is essential to raise the lungs in spring. Taking advantage of the excellent air and warm weather, you must let your lungs get enough relaxation.
Nourishing the lungs can start from three aspects:
• Nurturing the lungs by spirit.
• Nourishing the lungs by diet.
• Nourishing the lungs by exercise.
Follow these five tips for healthier lungs.
Tip one: take a bath
Please don't underestimate the effect of bathing, it is conducive to blood circulation, allowing the lungs and air to circulate blood. Health experts reminded that the bathwater temperature is preferably 25 degrees Celsius, and you can drink a cup of light saltwater 30 minutes before the bath to supplement. Bathing is better, can be controlled the time within 10-30 minutes.
Tip Two: Long Laugh
Laughing can expand the chest and increase lung capacity, to nourish the body's Qi machine. When exercising in the morning, laughter will make the lungs inhale enough natural air and exhale exhaust gas, speed up blood circulation, harmonize the heart, lungs and blood, and keep people's emotions stable.
Tip Three: Exercise
The main methods for exercising health care and lung nourishment are rubbing the nose, breathing deeply, sitting upright with the back beating, and cold-resistant exercise. Rubbing the nose is to massage the wing of the nose with your thumb, and you can choose to wash your face with cold water, wash your feet, or even take a bath in cold-resistant exercise.
Tip Four: Diet
Lemon and honey, White fungus, pear juice, lotus root juice, ginger juice, and radish juice can moisturize the lungs, clear away heat, relieve cough and reduce phlegm. You can eat more.
Tip five: drinking water
Drinking water seems ordinary, but many people fail to do it. Health experts believe that slow, repeated hydration can replenish the evaporated water in time. It would help you drank 200ml of water before exercise in the morning and before going to bed at night, and about 500ml between meals in the morning and afternoon. The five methods of nourishing the lungs above can play a useful role in nourishing yin and nourishing the lungs.
May Improve Breathing and Oxygen Use
Compounds in cardamom may help increase airflow to your lungs and improve breathing. When used in aromatherapy, cardamom can provide a refreshing odour that enhances your body's ability to use oxygen during exercise. Cardamom extract could relax the throat air passage. It may prevent inflamed airways from restricting and improve breathing.
Upper Respiratory Tract Infections
Research published clinical trials found that Andrographis appears to be beneficial for relieving acute upper respiratory tract infections symptoms compared to other herbs, standard care, or a placebo.5 Andrographis also shortened the duration of cough, sore throat, and sick days compared to usual care.
Acts on Receptors
Thyme has long used as a home remedy for cough, bronchitis, and other respiratory conditions and sometimes taken orally to treat a chest infection or inhaled to open airways. There is some clinical evidence of these effects. Thymol acts on receptors on the tongue, mouth, throat, and nasal passages in a way that may suppress coughs.
Licorice Root's
Anti-inflammatory and Antimicrobial Effects
Due to their anti-inflammatory and antimicrobial effects, both licorice root extract and tea may aid upper respiratory conditions. Glycyrrhizin extract from licorice root helps relieve Asthma, especially when added to modern asthma treatments. Licorice root tea and extract may protect against strep throat and prevent sore throat after surgery.
Angelica Polymorpha
Dang Gui
Angelica polymDang Gui, orpha, also known as is a herb native to China, Japan, and Korea. A member of the celery family, it's long been used in traditional Chinese medicine. Since dong Quai (specifically, the root) is rich in compounds with anti-inflammatory and immune-stimulating effects, dong Quai praised in treating headaches, premenstrual syndrome, and menstrual cramps, fibroids, nasal and sinus congestion, and rheumatoid arthritis.
Enhance Respiratory Health
Anise seeds enhance respiratory health. They've got moderate expectorant property so that they often utilized in tablets as well as cough mixtures. Likewise, Anise oil helps to slacken phlegm within the lungs and throat. Additionally, it is valuable to manage common cold, Asthma, bronchitis, influenza, pneumonia, and sinusitis.
Mullein's Leaves
Certain compounds in mullein's leaves and flowers thought to act as demulcents or expectorants. Demulcents are substances that calm irritation or inflammation in the skin or internal parts of the nose, mouth, or throat. Expectorants are agents for stimulating the production or secretion of phlegm. Herbalists typically use mullein to address the following health problems:
• Upper respiratory tract infections
• Coughs
• Bronchitis
• Asthma
Rifold Lung Cleanser
Rifold Lung Cleanser assists in the management of mild upper respiratory tract infections, supports the health and function of the immune system. to assist in the relief of catarrh. Rifold Lung Cleanser contains antioxidants, which may assist in protecting the body from the damaging effects of free radicals due to stress, alcohol, cigarettes and pollution. These factors may increase free radicals in the body and the potential for oxidative damage. |
Nutrients Essay
Tags: Literature Review On Mobile PhonesOutline Four Guidelines For Effective Business Report WritingBehavioural Finance Research PapersBusiness Plan For A Food TruckReflections EssaysHamlet'S First Soliloquy Analysis EssayFreshman Essay PromptsN Essay Within A BookThesis Statement For Persuasive Speech On Abortion
As the main sources of fats, carbohydrates, energy, and proteins are usually interchangeable in part or proportion to their content of energy.Vitamins and trace minerals are usually known as the micro nutrients.The vitamins are usually classified as water soluble, and this includes eight members of the vitamin B complex and the vitamin C, or fat soluble which includes the vitamins D, A, E and K.The macro nutrients including fats, carbohydrates, proteins and some minerals are usually required daily in large quantities.They usually make up the bulk of supply and diet, the energy and building blocks required for the growth, activity and maintenance.These nutrients include amino acids which are found in proteins, minerals and proteins and certain fatty acids.From the 20 amino acid nutrients, nine of them are known as the essential nutrients.If the essential or necessary nutrients are not supplied in the quantities that are required, deficiencies disorders of nutrition can be the outcome.To determine as to whether the person is getting the right amount of nutrients a doctor usually examines and asks about the diet and the eating habits, performs a physical assessment to examine the composition (the amount of muscle and fat), and the body functioning.They usually include linolenic acid, linoleic acid, eicosapentaenoic acid, arachdidonic acid and docosahexaenpoic acid.The linolenic and the linoleic acid are usually found in the vegetable oils, docosahexaeoic and eicosapentaenoic acid are necessary for the development of the brain and are usually found in the fish oils.
Comments Nutrients Essay
The Latest from © |
Skip to main content
Inclusive Lectures: How Often Do We See Them Across Anatomy and Medical Education?
Dear Editor,
The association between medical students’ learning styles and views on the value of attending lectures has been recently investigated by Mokahal et al. [1]. While the authors thoroughly investigated how students’ learning styles affect their views on the value of lectures, they did not receive any student feedback on how well designed and structured the lectures’ content has been and whether that had a negative impact on students’ motivation to attend lectures. In the recent years, it has been observed that anatomy and medical educators are individuals who come from diverse academic backgrounds and do not necessarily hold a degree in medical education. Hence, that raises questions in terms of the extent that anatomy and medical educators are aware of the various learning theories that fall under the broad chapter of medical education such as the cognitive load theory, and how these should be integrated in their daily practice. From my personal experience as an alumna and anatomy educator as well, there have been several times that I either received or observed a lecture that contained an enormous amount of written information in a single PowerPoint slide. If PowerPoint slides or student worksheets are not designed effectively, this can result in an extraneous load for students, therefore having a negative impact on their cognitive load [2]. Additionally, I have also observed that a great amount of PowerPoint presentations and lecture handouts are usually not inclusive, meaning that they often have a white background and black text on it that is often too dazzling and too small to read, therefore making it difficult for individuals with dyslexia to read it. According to the British Dyslexia Association it is preferred for individuals who prepare PowerPoint presentations to use a dyslexia friendly style guide part of it which includes using single-color backgrounds such as a cream color, a readable font style such as Arial, and font size of around 12–14 [3, 4]. Additionally, by avoiding using green and red colors that makes slides accessible to individuals who have green–red color blindness [3, 4]. While some may argue that green and red colors are very frequently used to illustrate lymph nodes and arteries, respectively, it is important for anatomy and medical educators to use these two colors only when it is deemed necessary. Overall, it is the educator’s responsibility to ensure that their teaching material is as inclusive and accessible as it could be.
1. 1.
Mokahal AE, Ahmad A, Habib JR, Nasrallah AA, Francis G, Sabra R, Zgheib NK. Do medical students’ learning styles and approaches explain their views and behavior regarding lecture attendance?. Med Sci Educ. 2021.
Article Google Scholar
2. 2.
Van Merriënboer JJ, Sweller J. Cognitive load theory in health professional education: design principles and strategies. Med Educ. 2010;44:85–93.
Article Google Scholar
3. 3.
British Dyslexia Association. Dyslexia style guide 2018: creating dyslexia friendly content. 2018. Accessed 20 Aug 2021.
4. 4.
University of Sheffield. Creating accessible PowerPoint presentations. University of Sheffield. 2021. Accessed 20 Aug 2021.
Download references
Author information
Corresponding author
Correspondence to Eleni Patera.
Ethics declarations
Ethical Approval
Informed Consent
Conflict of Interest
The author declares no competing interests.
Additional information
Publisher's Note
Rights and permissions
Reprints and Permissions
About this article
Verify currency and authenticity via CrossMark
Cite this article
Patera, E. Inclusive Lectures: How Often Do We See Them Across Anatomy and Medical Education?. Med.Sci.Educ. (2021).
Download citation |
What is linear photography?
What is linear photography?
Linear perspective photography offers an impression of depth to the viewer by utilizing actual world parallel strains and making them converge within the aircraft of the {photograph}. This is additionally achieved by scaling the topic within the foreground towards the background components of the image.
Maintaining this in view, what is the attitude of a photograph?
Perspective in photography might be outlined because the sense of depth or spatial relationships between objects within the picture, together with their dimensions with respect to the perspective (digital camera lens or the viewer).
Additionally, how is linear perspective used? Linear perspective is a way utilized by artists to create the phantasm of depth and area utilizing relative dimension and place of a bunch of objects. To realize this impact, there are three important parts wanted in making a portray or drawing utilizing linear perspective: Orthogonals (also called parallel strains)
Maintaining this in consideration, what is framing in photography?
The position of any rule of composition is to attract the attention into {a photograph}. Framing refers to utilizing components of a scene to create a body inside your body. For instance, you would possibly shoot by a doorway, pulled again curtains, branches, fences, tunnels, or arches to spotlight your topic.
What is perspective and composition in photography?
Briefly, perspective refers back to the relationship of objects in a picture — the area between them, their relative dimension, their placement inside the scene. If you happen to’re pondering that this is finally only a fancy approach of speaking about composition, you then’re proper.
38 Associated Query Solutions Discovered
What is a vantage level in photography?
In photography, vantage factors confer with the attitude (excessive angle, low angle, straight angle and many others.) during which pictures are taken. Vantage factors are a good way to follow perspective and make us conscious on how our physique is place throughout a photograph shoot.
What is rule of thirds in photography?
One of many fundamentals of portray and photography, the Rule of Thirds is a way designed to assist artists and photographers construct drama and curiosity in a chunk. The rule states {that a} piece ought to be divided into 9 squares of equal dimension, with two horizontal strains intersecting two vertical strains.
What is overexposed in photography?
By Vangie Beal In conventional photography, overexposure is a time period used to explain the method of exposing movie to an excessive amount of mild, which leads to the {photograph} being too vibrant. In digital photography, the place there is no movie, overexposure refers to a white-looking or washed-out picture (overexposed picture).
What are the principles of photography?
When you have your personal important photography guidelines/pointers, do share them with us within the feedback part under. Fill The Body / Cropping. Do not Lower Off Limbs. Perceive The Rule Of Thirds. Use Frames. Make The Most Of Lead In Strains / Shapes. Simplify – Know Your Focus. Watch The Background. Look For Symmetry/Patterns.
What is an instance of a perspective?
noun. Perspective is the best way that one appears at one thing. It is additionally an artwork approach that modifications the gap or depth of an object on paper. An instance of perspective is farmer’s opinion a few lack of rain. An instance of perspective is a portray the place the railroad tracks look like curving into the gap.
What is regular perspective in photography?
Perspective in photography is outlined because the sense of depth or spatial relationship between objects in a photograph, together with their dimensions with respect to what viewer of the picture sees. By altering perspective, topics can seem a lot smaller or bigger than regular, strains can converge otherwise, and far more.
Why perspective is necessary in photography?
Perspective in photography is necessary as a result of it creates an phantasm of a three-dimensional scene. As a result of your digital camera is solely able to capturing a two-dimensional picture you need to use completely different strategies to get the 3D impact our eyes are able to seeing.
What are the 7 components of photography?
The seven primary components of photography – line, form, type, texture, sample, coloration and area – all confer with the best way you arrange your picture. Composition helps you signify any of those components in the best way you select.
What is the golden rule of photography?
In photography, the concept is that by utilizing the golden ratio, you might be creating a picture that is naturally extra pleasing to the attention. The Rule of Thirds is one of many first compositional guidelines most new photographers be taught—and for good purpose. The grid is a easy approach to immediately carry concord into your pictures.
What is backlighting shot?
Backlighting is a way that you need to use when capturing your topics that permits you to shoot your topic straight in entrance of the sunshine.
What are the various kinds of framing?
Framing consists of sunshine, heavy, and expedient framing. There are three principal sorts of framing for mild buildings: western, balloon, and braced. Determine 6-1, web page 6-2, illustrates all these framing and specifies the nomenclature and placement of the assorted members.
Why is framing necessary?
Framing is an necessary strategy of focusing the eye of individuals inside a broad context. How one thing is offered (the ‘body’) influences folks’s attitudes and opinions. Framing is a type of agenda-setting – the method by which a communication supply defines and constructs a public difficulty.
What are framing strategies?
Probably the most generally adopted superior framing approach is 2×6 wooden framing spaced 24 inches on middle. Different generally used strategies embrace single prime plates, two-stud corners, sin- gle headers, minimal use of jack studs and cripples, and the elimination of redundant studs and pointless blocking and bridging.
Ask Photography |
Cain and Abel | A Parable on Jealousy
What is in your heart?
That is the question the story of Cain and Abel in the Old Testament seeks to answer. The narrative does not tell us why God chose Abel’s offering over Cain’s. Only that it was so.
In life, we face rejection for reasons that are not known to us. We only know that we were not chosen. Do we succumb to bitterness, jealousy and hatred? Or do we find forgiveness in our hearts?
Theological debates of blood sacrifice aside, we offer what we can offer.
Abel was a herdsman and offered the first of the flock and the fat. Cain was a farmer and offered fruits from the ground. We give what we can provide.
But do we do it with our hearts or is there some ulterior motive hidden behind what we do?
Sometimes the events and circumstances that occur in our lives bring forth our inner demons. We may feel what we feel, but do we choose to act on those feelings?
In Cain’s case, the answer was yes. He was so enraged, so incensed that he saw it fit to kill his own brother.
According to the Hebrew Bible, Adam and Eve were the first man and woman. They knew how to kill animals for bodily sustenance and to clothe themselves.
But they did not know murder.
Cain was the first murderer. He killed in cold blood.
The First Mourning (Adam and Eve mourn the death of Abel). Painting by William-Adolphe Bouguereau
The seed of envy that was planted in his heart grew into an uncontrollable rage. It is that which led him to kill Cain.
Perhaps by accepting why people–and even God–have the preferences that they do, would be the first step towards understanding how to overcome rejection and not allow it to plant a seed of bitterness in our heart.
I would like to end by asking the same question I started with. What is in your heart?
By G. Michael
G. Michael | Editor-in-Chief | Mith Books
1. Interesting analysis on the story of Cain and Abel. It is easy to blame others (even God) for who we become. But it is our choices that reveal who we are in our hearts.
2. What would the world look like if Cain had never acted on that seed of hatred and envy? These bible stories provide powerful allegories into the nature of human beings. We are given choices and we do terrible things with it. I had a thought–imagine what would have come of Abel’s bloodline? Destroyed before it could even manifest.
Oh my brain is full of ‘what if’ hypotheses.
1. There are consequences for our actions. By creating imbalances, there will be a price to pay somewhere down the line. And Cain does have a price to pay… Maybe Michael can cover that in his next post!
3. Wow, that was an wonderful analysis of the mythical story. True enough, so many thoughts pass our mind but the way we act upon those feelings that makes the difference. And sure enough, rejection is a part of our journey, we should just learn to deal with it and move on, instead of allowing it to plant bitterness in our heart. I guess, this is one of the most important lesson that we must all remember while embarking on our life’s journey.
4. While I think there is a very good reason why one was labeled a farmer and the other a herdsman as it relates to their sacrifices, I think the main meaning is as you say…..a matter of the heart. I often wondered what the story would have been like if Cain simply repented.
Leave a Comment |
Litter Size
How many babies does a Bushpig have at once? (litter size)
How many baby Bushpigs are in a litter?
A Bushpig (Potamochoerus larvatus) usually gives birth to around 2 babies.
Each of those little ones spend around 121 days as a fetus before they are released into the wild. Upon birth, they weight 1.65 kg (3.63 lbs) and measure 2 cm (0′ 1″). They are a member of the Suidae family (genus: Potamochoerus). An adult Bushpig grows up to a size of 89 cm (3′ 0″).
To have a reference: Humans obviously usually have a litter size of one ;). Their babies are in the womb of their mother for 280 days (40 weeks) and reach an average size of 1.65m (5′ 5″). They weight in at 62 kg (137 lbs), which is obviously highly individual, and reach an average age of 75 years.
The average litter size of a Bushpig is 2
“Bush pig” may also refer to the red river hog.The bushpig (Potamochoerus larvatus) is a member of the pig family that lives in forests, woodland, riverine vegetation and reedbeds in East and Southern Africa. Probably introduced populations are also present in Madagascar. There have also been unverified reports of their presence on the Comoro island of Mayotte. Bushpigs are mainly nocturnal. There are several subspecies.Adult bushpigs stand from 66 to 100 cm (26 to 39 in) at the shoulder, and weigh from 55 to 150 kg (121 to 331 lb). They resemble the domestic pig, and can be identified by their blunt, muscular snouts, small eyes, pointed, tufted ears and buckled toes. Their colour varies from reddish brown to dark brown and becomes darker with age. Both sexes have a lighter-coloured mane which bristles when the animal becomes agitated. The upper parts of the face and ears are also lighter in colour. Their sharp tusks are fairly short and inconspicuous. Unlike warthogs, bushpigs run with their tails down. Males are normally larger than females.The bushpig is closely related to the red river hog (Potamochoerus porcus), with which it can interbreed. The bushpig is distinguished by its less colourful markings, coarser hair, and larger size. Many pig populations display physical characteristics intermediate between the two species.Bushpigs are quite social animals and are found in sounders of up to 12 members. A typical group will consist of a dominant male and a dominant female, with other females and juveniles accounting for the rest. Litters of three to four young are born in summer after a gestation period of approximately four months. Bushpigs can be very aggressive, especially when they have young.They are omnivorous and their diet can include roots, crops or carrion. They grunt softly while foraging, and make a long, resonant growl as an alarm call. They are a significant nuisance in the agricultural regions of South Africa, and are hunted fairly extensively. However, the population of bushpigs in the farming areas continues to grow despite the hunting efforts, due to the largely inaccessible terrain, abundance of food, lack of predators, and their rapid ability to adapt to hunting methods. In Islamic parts of East Africa, it is a further nuisance because, as it is a pig, it is not permitted to be eaten. Its meat is considerably leaner than pork.Still distributed over a wide range, the bushpig occurs from Ethiopia and Somalia to eastern and southern DR Congo and southwards to Cape and KwaZulu-Natal Province in South Africa. It also occurs on Madagascar and possibly the Comoros archipelago. It is not known how it reached these islands, but it was probably taken there by humans, possibly after a period of domestication.Subspecies include:Potamochoerus larvatus larvatus (Madagascar bushpig)Potamochoerus larvatus edwardsi (Edwards’ bushpig)Potamochoerus larvatus hassama (White-faced bushpig)Potamochoerus larvatus koiropotamus (Southern bushpig)Potamochoerus larvatus nyasae (Nyasan bushpig)Potamochoerus larvatus somaliensis (Somalian bushpig)
Other animals of the family Suidae
Bushpig is a member of the Suidae, as are these animals:
Animals that share a litter size with Bushpig
Those animals also give birth to 2 babies at once:
Animals with the same weight as a Bushpig
What other animals weight around 68.91 kg (151.92 lbs)? |
Identify Violet Webcap
Violet Webcap/ Summer/ Autumn/ Inedible
Common Names
Violet Webcap
Botanical Name
Cortinarius violaceus
Meaning of Botanical Name
Cortinarius refers to the cortina or the web-like threads that join the cap to the stem when young, violaceus referring to the violet colour of these mushrooms.
Scientific Classification
Kingdom: Fungi,
Division: Basidiomycota,
Class: Agaricomycetes,
Order: Agaricales,
Family: Cortinariaceae
Genus: Cortinarius
Known Hazards
Bitter taste, easily confuses with other purple Cortinarius which are deadly toxic.
Could be confused with
Wood blewit, other violet coloured webcap mushrooms
Food Of
Insect larvae.
Range and Distribution
Rare throughout Britain and Ireland Also found Europe, North America and Aisa.
Deciduous woodland especially on alkaline soils
Physical Characteristics
When young this mushroom has a deep purple cap, developing an umbo (lump) in the centre with age, the edge of the cap is enrolled. The gills are also purple becoming rusty brown with spore deposits with age, they’re widely spaced and adnate. The stem is purple and fibrous with a club shaped base. The spores are almond shaped and rusty brown, often you will see spore buildup on any remaining cortina on the stem.
Edible Uses
This mushroom is classed as edible, but due to the nature of this family being very difficult to identify between the species and the deadly toxic nature of the look alikes we don’t recommend eating this mushroom, unless under the guidance of a trained mycologist who’s done microscopic investigation on the spores of every specimen you plan to consume. |
Python Variables
Python Variables are used to store some data or values in the program. These variables are actually reserved memory locations whose values can be changed later during program execution.
Unlike other programming languages, there is no need of extra keyword or command to declare the Python variables. The Syntax of the Python variable is x = 123 . Here, x is a variable name and it stores a number 123.
Example of Python Variables:
We can store different types of value in the variables such as integer, float, string, complex etc.
Let’s see a simple example to store some values. After that, we will display those variables using the print function.
student_name = "Robin" # variable of type str
student_age = 15 # variable of type int
user_height = 5.4 # variable of type float
Key points about Python Variables:
Here is the list of important points to remember while giving the name to the variables.
1. We can’t use special characters anywhere in the name of variables, except underscore _.
2. Space or Indents are not allowed in the variable naming such as var 1 is invalid variable.
3. We can use digits (numbers) at the middle or at the end of the variable’s names. But digits are not allowed at the starting of the variable naming such as 12sum is invalid variable.
4. We recommend to use the meaning name for the variables so that it is easy to understand.
Example of valid numbers:
variable1 = 12
user_15 = "abc"
EmployeeSalary = "10345"
Example of invalid numbers:
22131 = 334
$variable = 'xyz'
int 23 = '345'
user-name = ""
Variable names in Python is case sensitive. So, using Salary, salary will be treated as two different variables.
Assigning multiple values to variables in a single line
We can assign multiple values in a single line to the different variables kike other programming languages. Let’s see a simple example of it.
var_1, var_2, var_3 = "value_1", "value_2", "value_3"
Assigning a same value to the multiple variables
We can also assign the same value to multiple variables. Let’s see a simple example now.
var_1 = var_2 = var_3 = "value"
Printing multiple variables using a single print statement
We can print multiple Python Variables using a single print statement. Here is a simple example.
var_1, var_2, var_3 = 12, 23, 43
print(var_1, var_2, var_3)
12 23 43
Congratulations! Chapter Finished. Learn more about the similar topics:
Exercises & Assignments
No Content Found.
Interview Questions & Answers
No Content Found. |
Pepper, Black
Pepper, Black (Piper nigrum)
Origin: India
Description: This climbing woody vine uses trees or other supports to grow to about twenty feet high, but is normally kept to about 12 feet for commercial purposes and has a lifespan of about twenty years.
Common Uses: Black Pepper Essential Oil can be used in the treatment for pain relief, rheumatism, chills, flu, colds, increase circulation, exhaustion, muscular aches, physical and emotional coldness, nerve tonic, and fevers. The therapeutic properties include the following: analgesic, antiseptic, anti-spasmodic, anti-toxic, aphrodisiac, digestive, diuretic, febrifuge, laxative, rubefacient, tonic (especially of the spleen).
Consistency: Thin
Blends well with: Bergamot, Clary Sage, Clove, Coriander, Fennel, Frankincense, Geranium, Ginger, Grapefruit, Lavender, Juniper, Lemon, Lime, Mandarin, Sandalwood and Ylang-ylang.
Aromatic Scent: Black Pepper Essential Oil has a strong, sharp, spicy smelling oil. It is faintly reminiscent of clove oil.
History: The word pepper is derived from the Latin word piper, which in turn is taken from the Sanskrit word pippali. It has been used since the times of the Ancient Romans and Greeks and even the Turks levied a tax on pepper, while the French, Portuguese and Dutch often went to war in the middle ages to fight for this lucrative trade from the Far East.
Cautions: Black Pepper Essential Oil may cause irritation to sensitive skins and using too much could over-stimulate the kidneys and should be avoided in pregnancy due to its possible skin sensitizing effect.
Pepper, Black (ml) |
What is a camera’s field of view and does it differ on Arlo wire-free cameras?
A camera’s field of view, sometimes called angle of view, is the measurement of the viewing area that the camera can capture. It is measured in degrees.
A wider field of view means that a camera has fewer blind spots and captures more area in every shot. It also means that you can mount the camera more easily, because you don’t have to do as much fine-tuning to capture exactly the right area.
The following table compares the field of view for all Arlo wire-free cameras: |
web analytics
10 Signs and Symptoms of Peptic Ulcer You Should Not Ignore
A peptic ulcer is a lesion that occurs within the inner lining of your stomach. It’s a type of lesion that is caused by the excessive production of stomach acids, which can be triggered by a variety of factors.
The main cause is an infection by H. pylori bacteria, a microorganism that proliferates under certain conditions. It can also be the result of certain medications and digestive disorders.
Although the intake of alcohol, irritating foods, and smoking are not direct causes of peptic ulcers, regular consumption of these items can worsen the severity of your symptoms and increase the likelihood of suffering from complications.
Although the symptoms of peptic ulcer might not be very obvious at first, timely diagnosis and treatment are key to keep other problems from developing.
Signs and Symptoms of Peptic Ulcer
That’s why today we want to share ten of the warning symptoms of peptic ulcer with you so you’ll be able to identify it in the future.
Find out what they are!
1. Abdominal inflammation
There are multiple causes of abdominal inflammation. Don’t overlook the fact that this is one of the initial symptoms of peptic ulcer.
You’ll have noticeable swelling of your stomach, almost always accompanied by feelings of heaviness or discomfort.
This occurs due to the inflammatory response of your body to combat the acid production in your stomach.
2. Burning and abdominal pain
An uncomfortable burning sensation in your stomach could indicate an ulcer in development. This may also be interpreted as pain and is a result of an injury to the gastric mucosa.
You’ll feel discomfort between your sternum and belly button. Depending on the location of the ulcer, it is sometimes felt along the sides of the body.
It usually gets worse after eating spicy or very hot foods.
3. Loss of appetite
Many patients with peptic ulcers lose their appetite, thanks to the digestive system effects that occur when they do eat.
Burning and swelling after eating causes them to stop wanting to consume normal amounts of food.
This can become a chronic problem that leads to nutritional deficiencies.
4. Nausea or vomiting
Just like many other digestive disorders, ulcers can lead to nausea and vomiting.
The excessive production of gastric juices irritates the mucus lining of the stomach and triggers a defense mechanism that you’ll perceive as the need to vomit.
Sometimes the ulcer can become so severe that it causes you to vomit when you eat certain foods.
5. Indigestion
Eating too much food or certain types of food can cause indigestion. When ulcers appear, however, the problem happens more often.
Sores in the stomach lining produce irritation and pain when you eat acidic or difficult to digest foods.
You may experience gas, an upset stomach, and other symptoms with this condition.
6. Changes in your stool
Changes in the color or consistency of your stool should never be overlooked. This might not indicate a peptic ulcer, but plenty of digestive system diseases can cause this problem.
In this case, be sure to notice any dark or sticky stools. When an ulcer becomes more severe, there could be blood in your stool.
7. Food intolerance
Because your stomach becomes more sensitive when you have an ulcer, you could experience certain food intolerances, even when you’ve never had such a problem before.
Certain foods can worsen inflammation, causing the pain and discomfort to intensify.
Typically, people will have trouble eating fatty, spicy, or very sugary foods.
8. Definite weight loss
When an ulcer isn’t treated in time, the sufferer will experience obvious and alarming weight loss.
This is usually related to a lack of appetite, which prevents you from eating well.
It may require a deeper analysis, as chronic diseases like cancer also have this side effect.
9. General malaise
Ulcer symptoms can often be confused with the flu. Although there’s no relationship whatsoever, many people think that their general malaise is caused by a respiratory illness.
Typically, you will experience feelings of fatigue and muscle weakness, with a mild fever.
10. Hunger pain
While an ulcer can cause a lack of appetite in some patients, it often causes hunger pains in others, even after you’ve just finished a meal.
This is not actual hunger, but your body’s response to the increase in stomach acid production.
If you have several of the symptoms we mentioned today, it’s a good time to seek medical help. It’s important to treat a peptic ulcer as soon as possible, especially if the pain returns after your initial treatment.
Via: MedicineNet | WebMD
Print Friendly, PDF & Email
Subscribe to Our
Join Our Mailing List and Receive the Latest Healthy Tips
Thank you for subscribing.
Something went wrong. |
Skip to main content
Infographic Elements from Scratch in Illustrator
Lesson 13 of 25
How to Create a Dotted Line
Jason Hoppe
Infographic Elements from Scratch in Illustrator
Jason Hoppe
Starting under
• 24/7 access via desktop, mobile, or TV
• New classes added every month
• Download lessons for offline viewing
• Exclusive content for subscribers
Lesson Info
13. How to Create a Dotted Line
Class Trailer
Now Playing
1 Class Introduction Duration:06:47
2 Basic Shapes Overview Duration:05:55
3 Start Creating Basic Shapes Duration:13:36
4 Edit Basic Shapes Duration:07:58
5 How to Use Corner Widgets Duration:16:39
6 Get Creative with Shapes Duration:15:32
7 Add Lines to Shapes Duration:05:57
8 Shapes with Offset Path Duration:06:38
9 Create Custom Lines Duration:06:01
10 Add Curves Into Shapes Duration:21:49
11 Curvature Tool Duration:08:35
12 Width Shape Tool Duration:14:25
13 How to Create a Dotted Line Duration:06:00
14 How to Segment a Circle Duration:05:50
17 How to Create a Slip Shadow Duration:08:50
18 Tips & Tricks for Chart Tools Duration:12:34
19 Combine Shapes Together Duration:19:27
20 Create Perspective in Shapes Duration:11:34
23 Create Implied Shading Duration:17:02
24 How to Make Graphics 3D Duration:16:29
25 Q & A Duration:05:02
Lesson Info
How to Create a Dotted Line
One trick with Illustrator, how do you get a dotted line? There is no dotted line feature in Illustrator. I'm gonna show you how to make a dotted line. This makes no sense whatsoever, and if you ever figure this out on your own, good for you, you definitely have a profession in nuclear physics, because how convoluted this is. Here it is folks, this is how I'm gonna create a dotted line. I've got my line, and what I want to do is I want to create a dotted line, but in my stroke panel, I don't have any dotted line feature. I have a dashed line here, but when I do that it's like, okay it just give me dashes right here. I'm just gonna use blunt ends right here for now. With the dash line feature I can control how long each dash is, and the gap between. If I want a staggered line I could do a different dash, a different gap, and like that, which gives me a kind of like a Morse Code kind of line here, and this is how I set it up. How I do a rounded line is this, Again, makes no sense whatsoe...
ver. First of all, you hotdog the ends. That's gonna be the start of getting a dotted line, make this happen. And then, the key to this is, you want to make sure that the gap is going to be consistent so the gap, I'm gonna make sure it's all the same number. I don't care what the number is, but it's just got to be, you know, consistent. Then the dash part here, what you have to do in order to make these rounded, is the dash has to be the perfect length. The perfect length is zero. You're like, "What?" Yeah, it's zero. When you make the dash length of zero that's when you get a dotted line. You're like, "Wait a second." Well, let me show you. Because if I had a dotted line, and I have the dash length of one, what happens is, it's going to start to make that line, or those little dots, a little bit longer. I'm going to un-hotdog the ends here and basically, this is what a dotted line looks like. It looks like a dash of nothingness followed by a space of 36 points. We get that little, thin hairline there. What we're actually doing, is we're creating a dash that is zero units wide, and on both sides of that little point, we're putting a hotdog end on each end. It's two half-round circles coming together with a distance and a length of zero. Right, no. But yeah, that's how you do it. You want a dotted line, it's basically two half hotdog ends of a line put together with a zero length. Mm-hm, right. I know. Wouldn't it just be easier to have a dotted line drop down menu? I know, it isn't. You know that, you definitely know Illustrator. When you have this though, as you go in and you stretch the line, the cool thing is, is that it does reproduce that line over the distance. Unlike when I go in I put the effect on here, when I stretch it, it just stretched the effects over the line, and same if we use the width/shape tool, it just stretches the effect over that line, but with a dotted line, it just simply keeps repeating itself, repeating itself, repeating itself, without actually stretching it out over the distance. You're like, "How am I supposed to remember that?" I have no idea folks. I can only tell you to remember so much. We have a question? Yeah, just so for a different kind of, you know, the lines that are dashed- Yes -so similar to what you have on the bottom, would we just slice like the scissor, or is there a different way to do that? This is the tedious way of doing it, but if I wanted to have a dashed line here, I could use the same method here. The difference would be, I wouldn't hotdog the ends, and then the dash length, I would go in and I would control the length of the dash here and here, so that I could have lines that are 12 points long and this does get affected by the height of my line. If I go in and I do this, this looks like a dashed line, but it looks substantially different when I up the stroke here a whole lot, now it looks like a picket fence. Then I'd have to go in to my stroke here and I would have to make substantially long dashes with substantially larger gaps in order to compensate for the height. That's like, who thought of this? Yeah, so it's not easy. The height of a dashed line really does affect the look and feel of it. That's what you get, but it's funny, because once you hotdog the ends there, all of a sudden that's what it looks like, because it literally caps the end of each line. In essence, really what it is, is these are all separate lines and with that, if you have no length to the dash you're gonna get that. Question from Tanya who says, "Can you save that dotted line as a tool?" No. No. I'm sure you could save that as a graphic style though. We could go under the window menu, call up the graphic styles here. I've never tried to save that, but if I do that, and I bring that in there as a graphic style, yeah, it can. I can just drag that object right in there, so then I could go in and I could apply a graphic style to it, and then put that as a stroke around anything. Makes it kinda nice, but if you want a different size, you will have to create another one and then drag into your graphic styles panel to capture that ability to do that.
Class Description
Infographics are an effective way to provide a visual representation of information. In this beginner-friendly class, Jason Hoppe will take you through image-making techniques in Illustrator to use when building Infographics.
You'll learn about:
• Common icons used in infographics and how to create them
• Creating patterns and effects
• Using the shape builder tool
You’ll then use the elements you created in a simple info graphic that is flexible enough to use in multiple ways. This class comes with an Illustrator file containing all the graphics created in the class. A great bonus that you can customize and use in your projects, in addition to what you create on your own. Get started today!
Software Used: Adobe Illustrator CC 2015
Patricia Green
This class is so much fun! I gobbled it up because I enjoyed every minute. It begins my journey into infographics, something I intend to put in my portfolio. Jason Hoppe is a great instructor who really knows his stuff. If you want to have fun with Illustrator, this is the class for you!
I bought the first version of the course of Infographics and I strongly recommend it to anyone who wants to learn how to use Illustrator. Exactly as he explains in the video, this is not a course just to learn how to make graphics. At the end of the course you will be able to develop just about anything in Illustrator. Really! All the knowledge I have today of this tool, started from this course of Infographics to which he refers. Not only the content is comprehensive, but Jason is a great teacher, explaining everything very, very simply. I'm looking forward to watching this update.
Jason, you ROCK! I learned a lot of things during this class. Thank you for being such a great teacher and taking time to share your knowledge. Will continue to purchase your classes. Sandra |
2003 Invasion of Iraq
From dKosopedia
(Redirected from Iraq War)
Jump to: navigation, search
Gulf War II or the second Gulf War refers to the war ensuing from the U.S. invasion of Iraq in 2003. (The construction of the Iran-Iraq War as the "first Gulf War", and thus of 2003 as part of a "third Gulf War", can usually be discounted completely.)
In the second Gulf War, a bi-partisan Congress ordered Iraq invaded in order to depose its dictator, Saddam Hussein, who the administration alleged was possession of weapons of mass destruction and was conducting an WMD program. Some of the most hysteric rhetoric asserted that Iraq might soon be capable of attacking the United States homeland with nuclear weapons. No such weapons or weapons programs were ever found. Iraq had been effectively disarmed of its capacity to make chemical weapons by the United Nations long before the start of the conflict.
After a relatively easy invasion, the American armed forces became bogged down in a markedly under-planned post-war occupation, with little reassuance coming from Bush-administration predictions of relief via quick Iraqization. A connection betwen the goverment of Saddam Hussein and al-Qaeda was used as an explanation for the invasion; however, a 2008 Pentagon study found no link between Saddam's regime and the Al-Qaeda terror network. (Source: Exhaustive review finds no link between Saddam and al Qaida, by Warren Stroebel, March 10, 2008.) After the WMD and terrorism pretexts were shown to be deceptions, the administration deployed democratization as a post-hoc explanation for the invasion.
The U.S. has detained tens of thousands of Iraqis suspected of aiding rebel groups. Relevations of abuse at Abu Ghraib prison badly damaged America's reputation for upholding human rights, and greatly aided militias who seek to overthrow the elected government of Iraq. At present, U.S. forces are holding more than 14,000 people in four jails in Iraq. More than half are at Camp Bucca, in the south, while most of Abu Ghraib's prisoners will move to Camp Cropper.
Vigils to Honor 2,000 Killed in Iraq
2000 + 1 Candle Light Vigil Honoring Fallen Soldiers, SF Peninsula
2000 + 1 Candle Light Vigil Honoring Fallen Soldiers, SF Peninsula
On Wednesday evening October 26 2005, 1,354 candlelight vigils were held in all 50 states and the District of Columbia to remember and honor our fallen soldiers of the Iraq War. Some honored the fallen soldiers by lighting one candle for each solder killed and sadly added one more candle for a soldier that was killed that day bringing the total to 2001.[1] Politics aside it was a sad day as it took close to an hour to read all the names of the fallen men and women killed in this war.[2]
Quotes from Democrats Leading Up to the War
"One way or the other, we are determined to deny Iraq the capacity to develop weapons of mass destruction and the missiles to deliver them. That is our bottom line." - President Clinton, Feb. 4, 1998.
"If Saddam rejects peace and we have to use force, our purpose is clear. We want to seriously diminish the threat posed by Iraq's weapons of mass destruction program."
- President Clinton, Feb. 17, 1998.
"Iraq is a long way from [here], but what happens there matters a great deal here. For the risks that the leaders of a rogue state will use nuclear, chemical or biological weapons against us or our allies is the greatest security threat we face."
- Madeline Albright, Feb 18, 1998.
"He will use those weapons of mass destruction again, as he has ten times since 1983."
- Sandy Berger, Clinton National Security Adviser, Feb, 18, 1998
"[W]e urge you, after consulting with Congress, and consistent with the U.S. Constitution and laws, to take necessary actions (including, if appropriate, air and missile strikes on suspect Iraqi sites) to respond effectively to the threat posed by Iraq's refusal to end its weapons of mass destruction programs."
- Letter to President Clinton, signed by Sens. Carl Levin, Tom Daschle, John Kerry, and others Oct. 9, 1998.
- Rep. Nancy Pelosi (D, CA), Dec. 16, 1998.
"Hussein has ... chosen to spend his money on building weapons of mass destruction and palaces for his cronies."
- Madeline Albright, Clinton Secretary of State, Nov. 10, 1999.
"There is no doubt that . Saddam Hussein has reinvigorated his weapons programs. Reports indicate that biological, chemical and nuclear programs continue apace and may be back to pre-Gulf War status. In addition, Saddam continues to redefine delivery systems and is doubtless using the cover of a licit missile program to develop longer-range missiles that will threaten the United States and our allies."
The effort by many Democratic politicians to appear every bit as bellicose as their Republican counterparts generated some irresponsible rhetoric. Their failure to take a more principle, more critical view of miltiarism eliminated the most improtant obstcle to the imperialist adventure in Iraq that the second Bush administration was determined to launch even before it had defeated the Taliban in Afghanistan. That means that Democrats own a share, albeit far less than the Republcians, of the responsibility for the quagmire in Iraq and the unfinished war in Afghanistan.
- Letter to President Bush, Signed by Sen. Bob Graham (D, FL,) and others, Dec, 5, 2001.
"We begin with the common belief that Saddam Hussein is a tyrant and a threat to the peace and stability of the region. He has ignored the mandate of the United Nations and is building weapons of mass destruction and the means of delivering them."
- Sen. Carl Levin (d, MI), Sept. 19, 2002.
"We know that he has stored secret supplies of biological and chemical weapons throughout his country."
- Al Gore, Sept. 23, 2002.
"Iraq's search for weapons of mass destruction has proven impossible to deter and we should assume that it will continue for as long as Saddam is in power."
- Al Gore, Sept. 23, 2002.
"We have known for many years that Saddam Hussein is seing and developing weapons of mass destruction."
- Sen. Ted Kennedy (D, MA), Sept. 27, 2002.
"The last UN weapons inspectors left Iraq in October1998. We are confident that Saddam Hussein retains some stockpiles of chemical and biological weapons, and that he has since embarked on a crash course to build up his chemical and biological warfare capabilities. Intelligence reports indicate that he is seeking nuclear weapons..."
- Sen. Robert Byrd (D, WV), Oct. 3, 2002.
"I will be voting to give the President of the United States the authority to use force — if necessary — to disarm Saddam Hussein because I believe that a deadly arsenal of weapons of mass destruction in his hands is a real and grave threat to our security."
- Sen. John F. Kerry (D, MA), Oct. 9, 2002.
"There is unmistakable evidence that Saddam Hussein is working aggressively to develop nuclear weapons and will likely have nuclear weapons within the next five years . We also should remember we have alway s underestimated the progress Saddam has made in development of weapons of mass destruction."
- Sen. Jay Rockerfeller (D, WV), Oct 10, 2002,
"He has systematically violated, over the course of the past 11 years, every significant UN resolution that has demanded that he disarm and destroy his chemical and biological weapons, and any nuclear capacity. This he has refused to do."
- Rep. Henry Waxman (D, CA), Oct. 10, 2002.
- Sen. Hillary Clinton (D, NY), Oct 10, 2002
"We are in possession of what I think to be compelling evidence that Saddam Hussein has, and has had for a number of years, a developing capacity for the production and storage of weapons of mass destruction. "[W]ithout question, we need to disarm Saddam Hussein. He is a brutal, murderous dictator, leading an oppressive regime ... He presents a particularly grievous threat because he is so consistently prone to miscalculation. And now he has continued deceit and his consistent grasp for weapons of mass destruction ... So the threat of Saddam Hussein with weapons of mass destruction is real..."
- Sen. John F. Kerry (D, MA), Jan. 23. 2003.
Key Players
Minor Figures
Contractor Fraud
• Roughly 50 cases have been filed alleging fraud by American contractors in Iraq. Due to a loophole in the False Claims Act, the administration has been able to delay most of them indefinitely; however, one case has gone to trial, and the firm Custer Battles LLC was acquitted of submitting false claims and fraud.
Civilians killed
A medical study in the journal Lancet, found that 650,000 people have died in Iraq, since the invasion in March 2003. (Source: Study Claims Iraq's 'Excess' Death Toll Has Reached 655,000, by David Brown, Washington Post, October, 11, 2006, p.A12.)
Coalition Casualties
• Coalition Casualties
Quagmire prediction
In 1994, then Defense Secretary Dick Cheney predicted that invading Baghdad would lead the US into a quagmire. He reiterated these views in 2000. (Source: On Iraq Regime Change, 2007 Cheney Contradicts 2000 Cheney While Dismissing 1994 Cheney, Thinkprogress.org, August 17, 2007)
Quagmire extrication
Having fallen into bin-Ladin's trap, aided by "intelligence" reports as reported by the Bush regime, we have grabbed the Tar Baby. I guess Uncle Remus knew something about oil. Now many of the same individuals who repeated the "intelligence" as facts are falling into Bush's trap and he can say, "Cut and run! Cut and run! Nya, nya, nya, nya, nya; nya nya nya!" We are given a false dichotomy: either we stay in and watch Halliburton grow fat on corpses, or we bomb out and watch totalitarians who use religious ideologies to unite Muslims against "crusaders" take over Iraq.
How can one let go of a tar baby? If you've only touched it with one finger then maybe you can get loose somehow. But thrashing around wildly will not work. We are already going to walk home with some tar stuck on us. In fact, the tar may have preceded us.
Up to this point nobody has come forward with a coherent plan. Bush can claim he knows how to fix things, and he can ask his opposition, "What is wrong with you that you cannot tell everyone how to solve the problem you claim to see? All you can offer is: 'Cut and run!'"
Plans for extrication include:
• Decide to leave and immediately put plans for withdrawal into operation. Our first open movements would serve as notice to the Iraqis that we are leaving. Let them deal with the rapidly shifting situation as they will.
Disadvantages to that approach:
• Such an act would be regarded as a betrayal, probably even by the people who most want us to leave. It would remind the world of how we left Vietnam and strengthen the impression that the U.S. is an immoral ally and an inconstant friend.
• Chaos would surely follow such a move, and chaos favors opportunists.
• A chaotic state would attract interventionist moves by other powers in the area, primarily Iran. U.S. interests would not be served if Iraq were conquored by Iran.
• Set a "date certain," warn the Iraqis that they'll be on their own. Then leave. If they can't handle it, T.S.
Disadvantages to that approach:
• If civil war results in a Shi'a victory, the balance of power in the region could swing strongly in the favor of Iran.
• If civil war results in division of Iraq into a Kurdish north a Sunni center and a Shi'a south, both Iran and Turkey could be drawn into interventionist activities.
Is there a rational argument that can convince all three sides to remain a single nation, perhaps with three semi-autonomous parts?
• Conduct a phased withdrawal by which the most fully secured areas in Iraq would be turned over to Iraqi army and police control while U.S. troops moved into the background and reorganized as lightning "cavalry" emergency response teams on call to the Iraqi authorities. Continually increase the area given over entirely to Iraqi control and move U.S. troops as rapidly as possible to sealing off the border with Iran.
Disadvantages to that approach:
• Domestic U.S. response might be tepid or negative, and our decades old resistance to any public funds being devoted to promoting interests outside the "homeland" might see a resurgence.
See Also
dKos diaries and discussions
• Why we HAD to invade Iraq Wed Jan 12th, 2005 at 17:21:47 EST by Lestatdelc - proposes that the real reason for the invasion was the potential consequences of sanctions being lifted, once the UN inspectors concluded that Saddam was in compliance with relevant resolutions.
• http://news.yahoo.com/s/ap/20060513/ap_on_re_mi_ea/iraq_wmd_trailers
• IGTNT - I Got the News TodayDiary series of those we are losing in war intended to honor, respect and remind.
Further reading
• William R. Clark. 2005. Petrodollar Warfare: Oil, Iraq, and the Future of the Dollar. Gabriola Island, British Columbia: New Society Publishers. ISBN 0865715149.
• George Packer. 2005. Assassins' Gate. New York: Farrar, Strauss and Giroux. ISBN 0374299633.
Personal tools |
Why Do People Kiss The Blarney Stone?
International tourism is big business. While much of the world was forced to stay home during the global COVID-19 pandemic, prior to the outbreak of the coronavirus international tourism was thriving.
A report from the World Tourism Organization in January 2020 found that 1.5 billion international tourist arrivals were recorded across the globe in 2019. That marked a 4 percent increase over the previous year.
Ireland is a popular tourist destination for people across the globe. A country with a rich history that is steeped in tradition, Ireland annually welcomes people from all over the globe.
Tourist attractions abound throughout the Emerald Isle, and few are as popular as the famed Blarney Stone. When visiting the Blarney Stone, which is located on the grounds of Blarney Castle, visitors are urged to kiss the stone. But why?
The exact origins of the tradition of kissing the Blarney Stone are unknown, but notes the practice dates back several centuries. Legend suggests kissing the stone helps people become more eloquent and persuasive, and indeed numerous accomplished orators, including former British Prime Minister Winston Churchill, are among the millions of people who have kissed the stone over the centuries.
Kissing the stone is no small feat, though it has become easier to do so in recent years. Prior to 2000, visitors to Blarney Castle who wanted to kiss the stone had to pull off an acrobatic feat without much support, leaning over backwards while lying down on their backs as the upper part of their bodies hung over the parapet’s edge. However, guardrails were installed in 2000 to give visitors something to grab onto as they lean over the edge and kiss the stone.
Visitors to Ireland who want to kiss the Blarney Stone can expect to wait to do so. While the Blarney Castle gardens remained open to visitors during the pandemic, the tradition of kissing the stone was closed. And when that tradition is allowed once again, visitors should expect a line, as an estimated 400,000 people kiss the stone each year. |
Space weather forecast: Solar storm to hit TODAY causing stunning aurora borealis
A SOLAR storm is expected to hit Earth today as our planet gets in the way of a stream of solar winds, scientists have confirmed.
Comment section Share on LinkedIn Share on Pinterest Copy link Link copied
Solar storm: NASA captures the moment a sunspot 'explodes'
The Earth is set to be blasted with solar winds as our planet has entered a co-rotating interaction region (CIR), with northern lights due the following day. A CIR is an region where different solar winds are travelling at fast and slow speeds. This could mean parts of the northern hemisphere could be treated to dazzling aurora borealis on March 28.
Cosmic forecasting website Space Weather said: “Later today, March 27th, a co-rotating interaction region (CIR) is expected to hit Earth's magnetic field.
“CIRs are transition zones between slow- and fast-moving streams of solar wind. They contain shock-like density gradients and compressed magnetic fields that often do a good job sparking Arctic auroras.
“A high-speed stream of solar wind following behind the CIR could cause G1-class geomagnetic storms on March 28th.”
Auroras, which include northern lights – aurora borealis – and southern lights – aurora australis, are caused when solar particles hit the atmosphere.
solar storm
Space weather forecast: Solar storm to hit TODAY causing stunning aurora borealis (Image: GETTY)
As the magnetosphere gets bombarded by solar winds, stunning blue lights can appear as that layer of the atmosphere deflects the particles.
The solar storm could cause northern lights (Image: GETTY)
Additionally, a surge of particles can lead to high currents in the magnetosphere, which can lead to higher than normal electricity in power lines, resulting in electrical transformers and power stations blow outs and a loss of power.
The higher amounts of radiation also leave people vulnerable to cancer. |
• slide10
• slide13
• slide21
• slide41
• slide92
• slide93
Latest Vision News
May is Healthy Vision Month
May is Healthy Vision Month
What does that mean for you? It means that now is the time to schedule a comprehensive eye exam.
While these are one of the exams we may often let fall by the wayside, they are extremely important to maintain our eye health. Comprehensive eye exams serve several purposes. During these exams, pupils, the circular black area in the center of the eye where light enters, are widened with eye drops or viewed without dilation through a special camera. This allows your Eye Doctor to check for vision problems and eye diseases, verify what stage of diseases your eyes may be in, and helps determine if you need glasses, contacts or other treatments.
Comprehensive eye exams are crucial for all ages, here’s why:
Pediatric exams test for visual acuity, lazy eye, color vision, ocular health, and more. These are extremely important to test for the school years ahead.
For older children and teenagers, myopia (nearsightedness) is one of the biggest concerns that comprehensive eye exams detect. Myopia affects the eye’s ability to see distant images clearly. It is important to identify and treat early with glasses or contacts as children and teens begin to learn in larger spaces, play sports, and drive.
Adult exams are recommended at least every two years, or as recommended by your eye care specialist. Exams for adults are necessary to catch eye conditions that can cause vision loss and even lead to blindness. Some of these conditions are cataracts, diabetic retinopathy, glaucoma, and age-related macular degeneration.
There are several other conditions that comprehensive eye exams can expose that may not be found without a visit to your optometrist.
Outside of eye exams, here are 5 ways you can help protect your vision:
1. Healthy eating. You know this! Healthy eating helps every part of your body. For your eyes, make sure to add dark, leafy greens and seafood that is high in omega-3 fatty acids to your plate. A great excuse to treat yourself to sushi! We’re adding a spicy sake maki roll to our cart… for delivery.
2. Protective eyewear. Whether you’re chopping wood for the bonfire pit, mowing the lawn, painting your bedroom walls, or riding your motorcycle around town, protective eyewear is key. Blue-light protection glasses should also be considered to protect your eyes from all the time spent in front of computer screens.
3. Sunglasses. Much like protective eyewear, sunglasses help protect your eyes from ultraviolet radiation delivered by sun. Not all sunglasses provide the same level of protection. Let us help you pick the best pair!
4. Clean hands. Wash your hands before putting your contacts in and before taking your contacts out, simply to avoid infection.
5. Stop smoking. Smoking is known to cause several diseases, but it can also lead to vision loss. It can increase the risk of age-related macular degeneration, cataracts, and more. Mark your calendar for your comprehensive eye exam and mark it as the day to stop smoking.
Happy healthy vision month! Get your appointment in the books with us today.
Providing the New River Valley
with Quality, Comprehensive Eye Care...
Begin Booking an Appointment
There are many things that can cause your eye to become red.
The eye looks red when the blood vessels that are in the conjunctiva (the mucous membrane that covers the white of your eye and the backside of your eyelids) becomes dilated.
Those blood vessels often dilate when the eye gets irritated. This irritation can originate from a problem occurring inside the eye or factors from outside the eye.
The most common external factors that can cause the eye to become red are exposure to infectious organisms (mostly viruses and bacteria), environmental irritants (smoke, chemicals, sunlight), or allergens.
Infectious organisms can cause infectious conjunctivitis, or what is more commonly referred to as “pink eye.” Infectious conjunctivitis often presents with the eye being red and a mucous discharge being produced, often to such a degree that the eyelids are crusted closed upon awaking in the morning. Infectious conjunctivitis can be extremely contagious and it is often advised that you severely limit your exposure to others while the problem is active. Infectious conjunctivitis caused by bacteria can be treated with antibiotic eye drops but viral conjunctivitis currently has no treatment and must run its course like the common cold.
Environmental irritants can make the eye red for a short period of time during and immediately after exposure. The irritation is usually self-limited but may resolve more quickly with the use of over-the-counter lubricating drops or artificial tears. It is very important to understand exactly which irritant you were exposed to because there are some chemicals (acids and bases) that can cause extreme damage to the eye. So if you’re exposed to a caustic chemical you need to immediately rinse your eye out with water and seek emergency medical attention.
Allergens can cause allergic conjunctivitis, which can look very similar to pink eye but usually has significantly less mucous discharge and is usually accompanied by fairly severe itching. Allergic conjunctivitis is not contagious and can usually be treated with anti-allergy eye drops.
Infectious and allergic conjunctivitis can cause mild discomfort and itching but they rarely cause significant pain or loss of vision. A red eye with significant pain, especially when accompanied by severe light sensitivity and vision loss, often indicates more significant problems such as iritis, angle closure glaucoma or a corneal ulcer, all of which require quick medical attention. If your eye is red and there is significant pain do not assume you have pink eye, see your ophthalmologist or optometrist immediately.
Article contributed by Dr. Brian Wnorowski, M.D.
The content of this blog cannot be reproduced or duplicated without the express written consent of Eye IQ
© Infinity Eye Care | 7350 Peppers Ferry Blvd. | Radford, VA 24141 | (540) 731-1010 | Email Us | Site Map |
Lots of people have heard of therapy, but what are the different types?
What is Cognitive Behavioural Therapy?
Cognitive behavioural therapy is a type of therapy that looks at our thoughts, our emotions, our behaviour and our bodies physical responses. It looks at the way these four areas interact and how this can and does impact on the way we experience things. These interactions can create a vicious cycle that maintains our negative thoughts feelings or behaviour.
EXAMPLE A young man decides he is going to ask the girl he likes at work out for a coffee. When he gets to work she uncharacteristically ignores him and is very withdrawn. He thinks she must have anticipated I was going to ask her out, she is embarrassed, doesn’t want to go out with me, she’s never really liked me, how could I have got it so wrong, I bet everyone in the office knows, she’s probably told everyone and now they all think I’m an idiot. He feels worried, anxious and low in mood. He changes his usual behaviour at work, he doesn’t mix with others at lunch time for fear of what they think of him, he doesn’t visit his friend on the way home because he feels so awful. He physically feels his body is heavy and tired, his concentration is poor which makes him think how awful he has done at work today and how this will confirm to people he is stupid and can’t do his job, let alone ask a girl out. He feels more and more low and worried, he feels Physically sick and shaky.
The following day the girl greets him with a smile and says ‘sorry I was off yesterday I had a terrible tooth ache and had to go home. I asked the guys to tell you at lunchtime when you went to the canteen’.
Cognitive behavioural therapy seeks to help you to identify what the difficult cycles might be for you. Helps you to understand this process better and then to adapt and create new more positive and productive ways of coping with these challenges using skills and techniques taught throughout the therapy sessions.
Cognitive Behavioural therapy is usually time limited and focuses on particular goals set by you at the beginning of the sessions.
What is Counselling?
Counselling is a type of therapy that enables people to explore aspects of their life and feelings by talking openly and freely in a way that is often not possible with family and friends. Family and friends can frequently be emotionally invested in your life and therefore have their own opinions and biases which can affect the way they respond to you and your situation. Counselling neither judges, nor offers advice. Counselling gives you an opportunity to express difficult feelings such as anger, resentment, guilt and fear in a confidential environment. This can include examining parts of your life that you may have found difficult or impossible before. There may be some exploration of early childhood experiences in order to illuminate why you might react or respond in certain ways in given situations. This is often followed by considering ways in which you may make changes.
EXAMPLE - A young woman starts a new job. She has great previous experience, wonderful qualifications and settles quickly and confidently into her new role. However a work colleague is frequently critical of her work and undermines her efforts at every turn. This has caused the young woman to become withdrawn at work, depressed and anxious about her abilities. In turn her friends begin to get frustrated by her constant complaints. They can’t understand why their normally confident friend doesn’t stand up for herself and why she is so affected by this woman.
Exploring this situation in counselling the young woman talked of how her parents were quite critical of her with high expectations. She always worked hard to please them and feared their look of disappointment and critical comments. She never challenged their critical comments, she was a child and they knew best.
This young woman began to understand how she might be responding to her a colleague in a similar way. This enabled her to reflect on this and approach the situation at work with greater adult confidence and to be more assertive. She was also able to reflect that often these comments by her colleague were of a helpful and professional nature and not always as personally critical as she had previously experienced them.
Effective counselling reduces confusion, allowing you to make effective decisions leading to positive changes in attitude and/or behaviour. It is not advice-giving and it is not acting on someone else's behalf. The ultimate aim of counselling is to enable you to make choices, reach decisions and to act upon them accordingly.
Counselling or Cognitive Behavioural therapy?
As you can see from the examples above both approaches can have great merit in helping you to achieve understanding and change. Which approach might be best for you? You may already have a clear idea and that is great, but you might feel that both have some merit for you in your situation? In the first session we will discuss this in greater detail and together come to a decision about what approach or combination of approaches might best meet your needs. |
Synthetic devices that include tooth or its parts that are connected to teeth are called tooth prosthesis. Prosthesis are separated to two parts. Missing teeth are replaced according to the amount of loss with prosthesis.
Fixed Prosthesis:
-Porcelain-fused-to-metal dental crowns and bridges
-All-porcelain dental crowns, bridges and laminate veneers
-Postcore prosthesis
Removable Prosthesis:
-Complete dentures
-Partial dentures
-Prescision attachment dentures
Implant supported prosthesis:
-Implant supported removable prosthesis
-Implant supported fixed prosthesis |
Bench TalkBench Talk for Design Engineers | The Official Blog of Mouser Electronics EV Charging with SiC,Automotive,PowerFri, 11 Jun 2021 21:14:14 GMT<figure class="easyimage easyimage-full"><img alt="" src="/blog/Portals/11/ON SEMI-mouser-1200x630-LinkedIn_600.jpg" width="600" /> <figcaption></figcaption> </figure> <p><span style="font-size:10px"><em>(Source: Mouser Electronics)</em></span></p> <p>Electromobility still has quite a lot of challenges to overcome. Global environmental issues such as battery production, recycling, and power generation intertwine with individual and practical aspects like cost, battery capacity, and charging infrastructure. State-of-the-art semiconductor technology help solve at least some of the problems.</p> <p>Silicon carbide (SiC) has been used as a semiconductor material for a long time. SiCwas first patented in 1906 as a radio detector diode and is commonly used in naval receiving technology. Similarly, the first commercial LEDs were based on SiC, and the material became renowned for creating yellow and blue LEDs. Because of difficulties in manufacturing, its application in power electronics happened only recently, over the past 20 years.</p> <p>Eliminating crystal defects has turned out to be a major obstacle to SiC development. Edge dislocations, screw dislocations, triangular defects, and basal plane dislocations initially caused poor reverse blocking performance in devices made of SiC crystals. Apart from crystal quality, problems with the interface of SiC with silicon dioxide have hampered the development of SiC-based power MOSFETs and insulated-gate bipolar transistors. Only the still poorly understood nitridization has dramatically reduced the defects causing the interface problems. This cleared the way for JFETs, MOSFETs, and Schottky diodes from 2008 on. SiC, as a semiconductor material, has great advantages in speed, high temperature, and high voltage.</p> <p>That’s exactly what’s needed in the harsh automotive environment. Electric cars use batteries with capacities of up to 100kWh, and the goal is to charge those in the least possible time. Charging an electric vehicle (EV) using public charging stations takes longer than refueling a fossil fuel vehicle. The speed at which a vehicle can recharge depends on the charging station’s charging speed and the vehicle’s capacity to receive a charge. Connecting a vehicle that can accommodate very fast charging to a charging station with a very high rate of charge can refill the vehicle’s battery to 80 percent in 15 minutes. Vehicles and charging stations with slower charging speeds can take as long as an hour to refill a battery to 80 percent. As with a mobile phone, the final 20 percent takes longer because the systems slow down to fill the battery safely and avoid damaging it.</p> <p>Alternating current (AC) charging stations connect the vehicle’s onboard charging circuitry directly to the AC Supply. AC Level 1 connects directly to a 120V residential outlet, capable of supplying 12A to 16A (1.4kW to 1.92kW) depending on the capacity of a dedicated circuit. AC Level 2 utilizes 240V residential or 208V commercial power to supply between 6A and 80A (1.4kW to 19.2 kW).</p> <p>In direct current (DC) fast charging, grid power is passed through an AC/DC inverter before reaching the vehicle’s battery, bypassing the onboard charging circuitry. DC Level 1 supplies a maximum of 80kW at 50V-1000V, and DC Level 2 delivers a maximum of 400kW at 50V-1000V. A standard for larger commercial vehicles is under development, with a theoretical maximum power of 4.5MW.</p> <p>Diodes, MOSFETs, and drivers are the major components of such high-power charging circuitry. With their increased switching speed and decreased power losses, the Wide Bandgap SiC Device Portfolio from ON Semiconductor delivers the right components for every part of modern solutions. The need for protection circuits is reduced by implementing galvanically isolated <a href="" style="font-family:"Arial Unicode MS",sans-serif; color:#0099ff; text-decoration:underline" target="_blank">High-Current Gate Drivers</a>.</p> <p>On Semiconductor’s NCx57200 is a high-voltage gate driver with one non-isolated low-side gate driver and one galvanic isolated high- or low-side gate driver. The devices can directly drive two insulated-gate bipolar transistors (IGBTs) in a half-bridge configuration. The galvanic isolation for the high-side gate driver ensures reliable switching in high-power applications for IGBTs that operate up to 800V at high dv/dt. The optimized output stages provide a means of reducing IGBT losses. The features include two independent inputs with deadtime and interlock, accurate asymmetric undervoltage-lockouts (UVLOs), and short and matched propagation delays. With a bandwidth range of 270kHz to 3MHz, operational amplifiers with typical I<sub>Q</sub> of 17µA to 405µA allow for safe sensing circuits in the charging networks.</p> <p>However, circuit protection is still necessary. The AEC−Q100-qualified: <a href="" style="font-family:"Arial Unicode MS",sans-serif; color:#0099ff; text-decoration:underline" target="_blank"><span style="font-family:"Arial Unicode MS",sans-serif">NCID9211 Dual-Channel Digital Isolator</span></a> achieves high insulation and high noise immunity, characterized by high common-mode rejection (100KV/s minimum) and power supply rejection. As ON Semiconductor’s Protection & Small Signal Discretes demonstrate, fuses and filters take care of the rest.</p> <div> <h2>Conclusion</h2> </div> <p>ON Semiconductor has put extra effort into solving some of the challenges related to SiC previously mentioned, such as crystal defects or gate oxide reliability. By adding additional quality control steps in the manufacturing process like wafer screening or burn-in tests, the intrinsic crystal defects in SiC can be better filtered. Moreover, the reinforced gate oxide in the SiC MOSFETs enables dynamic negative gate bias without a drift in R<sub>DS(ON) </sub>or Vth. The outcome is reliable SiC devices ready to be used in the most challenging applications such as EV charging.</p> 1840Passives: The Essentials for Electronic Circuit Design,Computing,GeneralFri, 02 Oct 2020 22:02:05 GMT<p><img alt="" src="/blog/Portals/11/Wurth_Consee_Passives_Theme%20Image-min_1.jpg" style="width: 600px; height: 400px;" title="" /></p> <p style="font-size:10px;"><em>(Source: Oskars Bormanis/</em></p> <p>Designing with fast processors, microcontrollers with enormous computing power, and network devices using the newest wireless communication standards is a significant undertaking. Still, sound system design requires the use of both active and passive components.</p> <p>You may ask yourself why passive components are essential in modern designs. As most of us take wireless communication for granted, radio waves with frequencies in the gigahertz range are ubiquitous. Moreover, our demand for enormous computing power in ever-shrinking space leads to embedded high clocking frequencies in our everyday devices. In the end, we have radio frequency (RF) radiation in our pockets and everywhere around us. Considering the sensitivity of electronic circuits to RF noise, interference should be quite common, leading to malfunction.</p> <p>So why do modern electronics work at all? The answer: Modern updated passives help shield sensitive electronics and mitigate the undesirable effects of Electromagnetic Interference (EMI), also called Radio-frequency Interference (RFI), to acceptable levels. Passive components have evolved with improvements in manufacturing technologies and a better understanding of the underlying physics to support modern electronics' demands.. In conjunction with various electromagnetic devices, passives allow the high-powered (active) processors, memory, and transmitters to dwell in their glory.</p> <p>Strangely, it is common practice for many engineers to select passive devices as an afterthought. They just pick them from a list of standard components. This practice does not suffice in the demanding world of high-frequency amplifiers, data converters, or other challenging circuits. It is crucial to select the requisite passive components to obtain a specified level of performance. Here, we will detail how to select the right passive components for your design.</p> <div> <h2>Role of Passive Components</h2> </div> <p>Passive devices, such as resistors, inductors, capacitors, ferrite beads, and transformers, neither generate energy nor require power to operate. By definition, they don’t amplify electrical signals and can’t control circuits. Those components can attenuate or control signals, cause a phase shift, or produce feedback.</p> <p>At the heart of any modern electronic system is a printed circuit board (PCB) that carries connectors as well as passive and active components. Devices are connected via conductive paths embedded into the board material ( non-conductive stuff such as resin) or placed on the surfaces. Here are a few basic PCB design rules that minimize noise and their adverse effects:</p> <ul> <li>Signal traces should be as thin as possible. To reduce capacitive coupling, a common source for noise, paths are supposed to be less than 8mm thick.</li> <li>The separation between adjacent traces should be greater than the width of the traces; otherwise, significant cross-talk can occur between them.</li> <li>Sharp bends, such as 90-degree turns, cause interference and should be avoided.</li> <li>It should be avoided to run any traces underneath oscillators.</li> <li>As the high-frequency digital noise produced by digital circuitry can induce errors on all kinds of circuits, digital and analog components should be sufficiently separated.</li> </ul> <p>Most common PCB design tools will point out violations of those rules and offer alternatives.</p> <div> <h2>Selecting Passive Components</h2> </div> <h3>Resistors</h3> <p>Arguably the most common passive component is the resistor. It is used for impedance matching and biasing, be it wire-wound, carbon-composite based, or a film resistor. At high frequencies, wire-wound resistors—basically coils of wire—become inductive. Even though film resistors consist of thin metallic film loops that also become inductive at high frequencies, they can still be used in some high-frequency circuits. As the end caps of a resistor are parallel to each other, they also generate capacitance. High-ohm resistors can have a capacitance that appears to exist in parallel with its resistance. At high frequencies, a high-value resistor can have lower impedance.</p> <h3>Capacitors</h3> <p>Capacitors themselves electrostatically store energy as a charge across two or more conducting plates separated by a dielectric. An electronics designer uses capacitors for filtering and to decouple at supply and signal lines. However, at high frequencies, they also tend to behave strangely. Parasitic inductance and resonance can occur with electrolytic and film capacitors, and thus harm RF performance. They can actually cause an equivalent series resistance (ESR) when the parasitic resistance combines with the capacitor plates’ resistance. To accomplish ripple and noise rejection, decoupling capacitors must have a low ESR. Ceramic capacitors with their smaller plate size have less self-inductance. Besides, they provide stability in the high-frequency ranges and offer a suitable solution for decoupling integrated circuits. A good example of these features is the High-Frequency MLCC series <a href="" target="_blank">WCAP-CSRF</a> by Würth Elektronik that features a 0.20pf to 33pF capacitance range and a 25V<sub>DC</sub> to 50V<sub>DC</sub> voltage rating. Because high-temperature grade aluminum/tantalum capacitors, such as the <a href="" target="_blank">H-Chip Aluminum Polymer Capacitors</a> by Würth Elektronik, have stable temperature and bias characteristics, the devices work well for decoupling supply lines.</p> <h3>Inductors</h3> <p>A different type of energy storage device is the inductor, basically a wire coil. An ideal inductor stores indefinitely and doesn’t lose heat; the device is called lossless. In reality, inductors have non-ideal characteristics. Each wire has a specific resistance, and as the turns of wire touch, parasitic resonant capacitances form and limit the upper frequency. A thermally very stable kind of inductor with practically no variation in inductance over its temperature range from -40°C to +120°C is the series of multilayer inductors <a href="" target="_blank">WE-MK</a> by Würth Elektronik.</p> <div> <h2>Conclusion</h2> </div> <p>The right combination of active and passive components is the key to good system design. Using capacitors connected in parallel from power supply pins to ground minimizes noise. Different capacitor values set in parallel allow for a low AC impedance across a wide frequency range. Because at lower frequencies larger value capacitors present a low-impedance path to ground, low impedance over the frequency range can be obtained by using other values. With proper consideration given to selecting passive and active components, it is possible to eliminate any unnecessary parasitics in a high-frequency design.</p> 1549Remote Sensing Fosters Healthier Lives,Dev ToolsGeneral,IoT,Medical,Sensors,WirelessWed, 09 Sep 2020 04:42:18 GMT<p><img alt="" src="/blog/Portals/11/Consee_Remote%20Health_Theme%20Image.jpg" style="width: 600px; height: 400px;" title="" /></p> <p style="font-size:10px;"><em><small>(Source: Andrey_Popov/</small></em></p> <p>Billions of sensors monitor patients in hospitals and clinics around the world. Even before the COVID-19 pandemic hit, healthcare had extended, up to a point, beyond medical facilities and to homes and workplaces. The slow shift to more remote monitoring, care and treatment, rapidly accelerated in the notorious spring of 2020.</p> <p>From a design and development perspective, companies developing applications for first responders, seniors and fitness face the same challenges and requirements. One of the major product groups for collecting health or fitness data are smartwatches or fitness wristbands. The Apple Watch is equipped with a built-in heart-rate sensor, which uses infrared and visible light LEDs and photodiodes. It also uses a position and acceleration sensor for detecting movement. Other manufacturers employ similar technology. Here’s a look at the various sensor solutions designed for healthcare monitoring.</p> <div> <h2>Developing a Wearable Health Monitor</h2> </div> <p>Designing power circuitry for smartwatches and other wearables can be a challenge because of today’s consumer expectations, which include additional functionality, longer battery life, and smaller size.</p> <p>The <a href="" target="_blank">SmartWatch Solution</a> by <a href="" target="_blank">Toshiba</a> provides a reference design based on Toshiba discrete components, selected to get more performance in a smaller package (<strong>Figure 1</strong>). Toshiba offers an extensive portfolio of components such as tiny MOSFETs, diodes, and transistors in addition to feature-rich integrated circuits such as low dropout regulators (LDO) regulators, load switches, and the smart <a href="" target="_blank">eFuse IC</a>, all designed to increase available board space, reduce passive current consumption, and to ensure long battery life.</p> <p> </p> <p><img alt="" src="/blog/Portals/11/Figure%201_1.png" style="width: 600px; height: 296px;" title="" /></p> <p><em><small><strong>Figure 1</strong>: Block diagram of Toshiba’s Smart Watch solution, a reference design based on Toshiba discrete components, selected to get more performance in a smaller package. (Source: Mouser Electronics)</small></em></p> <p>It doesn’t have to be a full-featured smartwatch. Whatever the final design should look like, sensor fusion is the key to wearable health monitors. A good starting point for developing is a <a href="" target="_blank">MikroE sensor Click board</a>, such as the <a href="" target="_blank">ECG 6 Click</a> used for the development of electrocardiogram (ECG) and heart-rate applications (<strong>Figure 2</strong>). The click features the <a href="" target="_blank">Maxim Integrated</a> <a href="" target="_blank">MAX86150</a> Reflective Heart-Rate Monitor and Medical-Grade Pulse Oximeter. The board contains an integrated ECG, pulse oximeter, heart-rate monitor sensor module. The ECG 6 Click is suitable for fitness assistant devices, wearable devices, smartphones, and tablets.</p> <p><img alt="" src="/blog/Portals/11/Figure%202_1.jpg" style="width: 600px; height: 282px;" title="" /></p> <p><em><small><strong>Figure 2</strong>: The MikroE ECG Click board is used for the development of electrocardiogram and heart-rate applications. (Mouser Electronics)</small></em></p> <p>The Bio-Sensor Module MAX86150 by Maxim Integrated delivers both photoplethysmogram (PPG) and ECG measurements in a single integrated package. It combines internal LEDs, photodetectors, and an ECG Analog Front-End (AFE) to provide FDA-certifiable PPG and ECG performance in compact, power-saving designs. The ECG functionality is optimized for Dry Electrode Operation.</p> <p>Two different functions–pulse oximetry, and heart-rate monitoring–integrate on the <a href="" target="_blank">MAX30102</a> sensor. The device includes internal LEDs, photodetectors, optical elements, and low-noise electronics with ambient light rejection.</p> <p>The sensor can be evaluated using the MAX30102 Evaluation Kit , a combination of the motherboard USBOSMB and the daughterboard MAX30102DBEVKIT that includes the MAX30102 and an accelerometer (<strong>Figure 3</strong>). The evaluation kit is powered by the USB supply to generate +1.8V for the sensor and +4.5V for the internal LEDs of the MAX30102, and +3.3V for the accelerometer.</p> <p><img alt="" src="/blog/Portals/11/Figure%203_1.png" style="width: 600px; height: 232px;" title="" /></p> <p><em><small><strong>Figure 3</strong>: MAX30102 Evaluation Kit is powered by the USB supply to generate +1.8V for the sensor and +4.5V for the internal LEDs of the MAX30102, and +3.3V for the accelerometer. (Mouser Electronics)</small></em></p> <div> <h2>Medical Data in the Cloud?</h2> </div> <p>Collecting data is only the first step. To make use of them, it needs to be transmitted and interpreted, either by a human doctor or artificial intelligence. As in many other applications, cloud-based solutions can be the way to go. There are advantages, but also considerable barriers to the adoption of cloud computing in healthcare. The most significant setback to cloud adoption is the possible security risk associated with it. Patient data is inherently sensitive, and cloud-hosted healthcare data needs to be safeguarded. Encryption of data, use of security keys for access, and using blockchain for securing data are ways healthcare organizations can ensure the security of sensitive patient data.</p> <p>Healthcare data and related applications have to comply with several data regulation laws such as HIPAA, HITECH, and GDPR. Healthcare providers have to ensure compliance with cloud-hosted data, which is not an easy task.</p> 1527The Future of IIoT Connectivity,General,IoT,WirelessWed, 05 Aug 2020 07:23:33 GMT<p><img alt="" src="/blog/Portals/11/Amphenol%20ICC_Consee_Future%20of%20IIoT_Theme%20Image-min.jpg" style="width: 600px; height: 397px;" title="" /></p> <p style="font-size:10px;"><em>(Source: </em>Suwin<em>/</em></p> <p>The <em>Connector Market Report: Trends, Forecast and Competitive Analysis</em> suggests that the future of the connector market holds great promise with opportunities in the automotive and transportation, telecom/datacom, computer, and peripheral, industrial, and consumer electronics industries. According to this report, the major growth drivers for this market are growing 3C applications (Computers, Communications, and Consumer Electronics), miniaturization of electronic devices, and demand for products with advanced features, convenience, and connectivity.</p> <p>Emerging trends, which the report identified as having a direct impact on the dynamics of the connector industry, include greater demand for high-speed connectors, further movement toward compact and thinner connectors, as well as the development of high-power connectors.</p> <p>Regarding industrial applications, especially the Industrial Internet of Things (IIoT), smaller form factors and increased ruggedness are the critical drivers for the development of new connector technologies. With the standards of Industry 4.0 being deployed in almost all production environments and the unique challenges of Industry 5.0 looming on the horizon, connector manufacturers have to design and develop with new solutions in mind.</p> <p>As those endeavors require an enormous amount of effort and standardization throughout the industries, competitors are working together to create new standard solutions. A current example for such a co-operation is the joint development of the ix Industrial<sup>™</sup> series of connectors by <a href="" target="_blank">Amphenol ICC</a> that are fully intermateable with products from other authorized vendors.</p> <h2>ix Industrial<sup>™</sup> Delivers Next-Generation Industrial IoT Connectivity</h2> <p>The <a href="">ix Industrial<sup>™</sup> connector series</a> is IEC 61076-3-124 compliant and designed to meet the needs of next-generation high-speed ruggedized Industrial Ethernet requirements. Typical applications of the ix Industrial<sup>™</sup> series can be found in factory and process automation, machine to machine communication, robotics, sensors, human interface devices, and all devices requiring Ethernet IIoT connectivity in a highly automated industrial environment.</p> <p>Amphenol ICC’s ix Industrial<sup>™</sup> connectors enable IoT connectivity for Ethernet and other industrial protocols through all levels of an operation from the Enterprise/Cloud to the sensors/actuators at the factory floor. These 10mm pitch connectors feature 2-point metal latches and are just 25 percent of the size of an RJ45 connector. Thus, they allow much higher port density and mating security. They are PoE capable, provide data performance to Cat6A level (10GBASE-T), and feature 360° shielding through the mated pair for superior EMI protection.</p> <p>This mechanically robust 10-position connector is designed to meet the growing demands in industrial automation. The ix Industrial<sup>™</sup> comes in a package 70 percent smaller than the size of a typical RJ45 connector currently used in many Industrial Ethernet applications, thus providing robust performance with a smaller footprint.</p> <p>Offered as PCB mount receptacles in right-angle and vertical orientations, the connector series comes with multiple keying options and mating field terminable plugs for easy on-site installation. The Amphenol ICC products are currently available in IP20 versions for MICE1 environments with IP67 versions for MICE2 and MICE3 harsh environments coming soon. These are designed to be intermatable with products from other authorized vendors of the ix Industrial<sup>™</sup> series of interconnect products.</p> <div> <h2>Conclusion</h2> </div> <p>The Amphenol ICC ix Industrial<sup>™</sup> IP20 connector series consists of IEC 61076-3-124 compliant 10-position connectors capable of Cat6A performance. With 10mm connector pitch, robust 2-point metal latching, 360-degree shielding for EMI immunity, and a package 70 percent smaller than the size of a typical RJ45, these connectors are poised to meet the needs of new higher density Industrial Ethernet communication designs.</p> 1495The New, Autonomous Embedded World,Industrial,IoTWed, 28 Mar 2018 19:04:35 GMT<p style="margin: 0in 0in 0pt;"><img alt="" src="/blog/Portals/11/consee_The%20new%20autonomous%20embedded%20world.jpg" style="width: 600px; height: 450px;" title="" /></p> <p style="margin: 0in 0in 0pt;"> </p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">While the first day of a trade show usually begins slowly, this year seemed to be different: The amount of visitors was quite high from Tuesday morning on. The 16<sup>th</sup> annual Embedded World conference has maintained its reputation as the leading exhibtion for the international embedded community. </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2"> </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">Hardware is the basis for electronics, as Mouser’s partners </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Analog Devices</font></span></a><font color="#000000" size="2">, </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Basler</font></span></a><font color="#000000" size="2"> and </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Pycom</font></span></a><font color="#000000" size="2"> demonstrated, but software is the key to unlock possibilities. Analog Devices’ </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Software-Defined Radio demo</font></span></a><font color="#000000" size="2">, </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Pycom’s IoT boards</font></span></a><font color="#000000" size="2"> and, of course, </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Basler’s facial recognition system</font></span></a><font color="#000000" size="2"> showed the neccesity of hardware and software engineers cooperating. Actually, it’s troubling that this fact still needs to be mentioned; the merits of collaborative design and hardware/software co-design have been well known for decades. </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2"> </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">Still, there’s a long way to go. System development is more complex than ever, and modeling platforms complementing traditional programming languages are gradually beginning to dominate design. While requirements engineering has proven itself to be a solid set of methods, it turned out to make the process even more difficult due to long analysis stages in the beginning. Regardless, it’s the best we have at the moment, even though its promise to shorten testing time at the end rarely is fulfilled.</font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2"> </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">Back at the convention, there were no huge technological breakthroughs to see, but there was a steady consolidation of established technologies, combined in new ways. One of the triggers of this is the establishing of Internet of Things approaches, which hardly require huge computation power. This development also allows breathing time for small- and medium-sized exhibitors that used to be under pressure by large global companies with one-size-fits-all solutions. Many IoT applications, be it in the consumer space or for industrial uses, require tailor-made hardware and software solutions that are way too intricate and detailed for large solution providers. This explains why there were 1021 companies exhibiting in Nuremberg.</font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2"> </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">A clear indication of the way the industry is taking gave the conference part with the main topic “Embedded goes Autonomous.” And, indeed, the exhibition floor was full of semi-autonomous system approaches, from automotive and robotics to healthcare and security designs. Various conference speakers made it clear that fully autonomous systems will be around in many of those areas in a short period of time.</font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2"> </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">The theoretical knowledge communicated during the conferences was not only presented to the conference participants, but also to the 32,217 visitors; special areas devoted to M2M, electronic displays, and safety and security made information available to all.</font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2"> </font></p> <p style="margin: 0in 0in 0pt;"><font color="#000000" size="2">Mouser supplier </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Antenova</font></span></a><font color="#000000" size="2"> has received a special keepsake: One of the renowned embedded awards has been dedicated to their </font><a href=""><span style="font-family: "Arial Unicode MS",sans-serif; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi;"><font color="#0099ff" size="2">Robusta Antenna SR4G031</font></span></a><font color="#000000" size="2">. And one of the uncontested highlights of the show turned out to be Mouser’s game “Pick Pack Ship.” The visitors didn’t just play to win a prize but for the fun of it!</font></p> <p style="margin: 0in 0in 0pt;"> </p> 564How To Start A Hardware Startup,Maker,Open SourceMon, 09 Oct 2017 16:01:04 GMT<p><i>“Little particles of inspiration sleet through the universe all the time traveling through the densest matter in the same way that a neutrino passes through a candyfloss haystack, and most of them miss.”</i> –from Terry Pratchett’s book, <i>Sourcery</i></p> <p style="text-align: center;"><span style="font-size:x-small;"><img alt="Is this the beginning of a game-changing application?" src="/blog/Portals/11/MRB-hardware-startup.png" style="width: 600px; height: 234px;" title="Is this the beginning of a game-changing application?" /><br /> <strong>Image: </strong>Is this the beginning of a game-changing application?</span></p> <p>A one-inspiration particle hit: The game-changing, industry-revolutionizing idea that won’t just make you rich but solve most of today’s first-world problems as well as many of those of other worlds. And it’s neither a smartphone app nor another social network. It’s… Oh, that’s bad…. It requires special hardware. Even if you don’t know much about electronics, there’s one thing you do know: Hardware design is difficult and expensive, and it takes a lot of time.</p> <p>Luckily, you are living in the 21<sup>st </sup>century, when easily configurable electronic boards, <a href="">open source hardware</a>, <a href="">YouTube tutorials</a>, and user-friendly component distributors like <a href="">Mouser</a> are available, as are 3-D printers, “maker spaces,“ and peer-to-peer communities like Hardware Pioneers. The latter brings together true beginners with various founders of hardware startup companies who offer sound advice. How does one start the next game-changing hardware application?</p> <h2><strong>Remain Enthusiastic</strong></h2> <p>This is very crucial, especially when you start with naught. Convincing established companies and investors that your idea is feasible and profitable requires stamina to overcome the many challenges ahead. Hardware and software challenges are perhaps expected, but the business side can be terrifying. Passion for your project is going to help.</p> <h2><strong>Do It Now</strong></h2> <p>Or someone else will. Get started and get your hands dirty. And don’t be afraid of asking for help and making big decisions; there are people out there who answer all kinds of questions. Even professional contract manufacturers, especially in China, are accessible today; their design specialists may help you without payment up front.</p> <h2><strong>Be Patient</strong></h2> <p>That’s hard when you’re passionate about your idea. However, there will be delays. It will likely take a few—or many—attempts until you get your design right, and every step of a manufacturing process, even for small volumes, can be delayed for any number of reasons.</p> <h2><strong>Focus On What Your Hardware Solves</strong></h2> <p>Inspiration doesn’t often trigger a single, identifiable invention but a larger array of possibilities that are exciting to explore. But at least initially, focus on what issues your hardware solves because identifiable solutions are what will make your design marketable. From a business point of view: Is anybody out there going to pay for your solution?</p> <h2><strong>Use Open Source Opportunities</strong></h2> <p>There’s a wide range of well-documented, affordable hardware platforms with huge ecosystems out there, including <a href="">Beagleboard</a>, <a href="">Arduino</a>, and <a href="">Raspberry Pi</a>. Maker spaces and Fabrication Labs (FabLabs) in almost every town make it easy to create individual mechanical parts and to differentiate the product.</p> <h2><strong>Access Mouser’s Extensive Technical Content</strong></h2> <p>Mouser distributes electronic components from more than 600 of the world’s leading manufacturers, which affords us a broad and deep perspective on the electronics industry. We share this unique perspective through a variety of resources online:</p> <ul class="bullet"> <li>Mouser’s <a href="">Applications & Technologies website</a> publishes high-quality articles, eBooks, eZines, webinars, and more, developed by leading design engineers and industry experts.</li> <li>Mouser’s <a href="">Bench Talk blog</a> is another great resource with new content published several times per week.</li> <li>Mouser’s <a href="">YouTube channel</a> is home to our <a href="">Bench Talk video series</a> and a variety of other technical and product-related videos.</li> <li>Mouser’s <a href="">Empowering Engineering Together series</a> features some of the most interesting and far-reaching topics, technologies, and issues facing today’s design engineers.</li> <li>Mouser’s <a href="">Technology Newsletter</a> arrives in your email inbox with the most timely and timeless articles and related products. </li> <li>Mouser’s <a href="">New Product Introduction (NPI) Newsletter</a> arrives in your email inbox and features the best new products available. You can also access new products at our <a href="">Newest Products site</a>.</li> </ul> <p>So what are you waiting for? The next big hardware application is just around the corner and has your name on it!</p> 480The Embedded Mood, 29 Mar 2017 19:09:46 GMT<p style="text-align: center;"><img alt="" src="/blog/Portals/11/MC_EW_01.jpg" style="width: 600px; height: 450px;" title="" /></p> <p style="text-align: center;"><span style="font-size:x-small;">At any given time, dozens of engineers take advantage of Mouser’s specific know-how at embedded world 2017</span></p> <p>The day starts off way better than expected: On entering the hall, your nose is caressed with the scent of good coffee. You have no choice but to delay your first meeting of the day – after all, it is a trade show and no one is actually expecting you to be on time – and to queue at the source of this invigorating smell. Even though the queue is long, you are not bored: On the way to your coffee, you grab a lottery ticket and – Yeay!– win a dev kit. One of their tech-savvy guys explains what you can do with it and – you’re welcome, Madam – you’re holding your Cappuccino. Oh, and a mug for your lab, that goes really well with the cloth bag you picked up at the entrance.</p> <p>Now you’ve got to hurry, but there’s so much to see. The first of many flashy cars grabs your attention. Oh, and there’s a sausage grilling robot over there. And another one – no, wait… It’s a drone hovering just above your head. That’s too much. You call your appointment and tell him to meet you here, at the huge slot car racing set. While you wait, the cute technician talks about the <a href="" target="_blank">TI power management development kit</a> that facilitated the development of the octocopter. He actually acquired it at the distributor you just got the coffee from and the bag with the big blue M.</p> <p>While you explain that the engineering team you lead works in a totally different field, you see your appointment waiting awkwardly at the slot racing booth.</p> <blockquote> <p>This year’s embedded world show broke its own record again. The organizers report 30,017 visitors (38% from outside Germany) and 1017 exhibitors from 40 countries.</p> </blockquote> <p>In the meantime, the single long queue at the Mouser booth has split into three even longer ones. The dev kit lottery is becoming increasingly popular, for a self-respecting engineer coffee is the elixir of life anyways, and people are waiting to have a virtual reality tour through Mouser’s warehouse. The stand is so busy, there is hardly any time to take a breath. A middle-aged man, who looks a bit forlorn in his checked sports jacket, musters all his courage, pets his greying beard one last time, and courteously asks the helpful lady behind the coffee counter if it would be possible to talk to a ‘technical person’. Of course it is. Turns out, the academic-looking gentleman is an inventor looking for an opportunity to bring his invention to market. It’s fascinating how there still are unexplored niches in the embedded business. What an exciting time!</p> <p>Many more unexpected discussions ensue during the three days, with academics or industry representatives who have found new solutions to old problems, are carving out business opportunities of their own, or invented simpler, more elegant ways to deal with connectivity, programming, or electronics assembly. People like this are the reason the embedded world show is such a special event: The focus is on innovation.</p> <blockquote> <p>You will find the Mouser logo on almost every photo taken at the trade show. Not surprising, since more than half the visitors picked up a Mouser bag and more than a third have been registered at our stand. Mouser seems to be in the right place at the right time for many, many people.</p> </blockquote> <p>Since its early days, embedded world – as well as its predecessor Embedded Systems – has been able to master the right mixture of small engineering start-ups, renowned semiconductor manufacturers, board suppliers, and component distributors. The conference ties the trade fair closely to academia and research facilities. Thus, exhibitors as well as visitors are fairly heterogeneous, as is the show floor. Displays of PC/104 boards can be seen alongside nerdy gadgets (yes, someone actually invented a “Pong” playing robot. Not on screen, with real paddles and a puck. Against visitors. The 1970s go cyberphysical!), pimped cars close to demonstrations of 64-bit assembler code. See you again next February in Nuremberg!</p> <p style="text-align: center;"><img alt="" src="/blog/Portals/11/MC_EW_02.jpg" style="width: 600px; height: 450px;" title="" /></p> <p style="text-align: center;"><img alt="" src="/blog/Portals/11/MC_EW_03.jpg" style="width: 600px; height: 450px;" title="" /></p> 377Industrial Automation,IoTTue, 28 Feb 2017 14:57:32 GMT<p><strong>Networking the industry</strong></p> <p>While the term „Internet of Things“ first turned up in 1985 (when the Internet as we know it today was not even a prospect yet), the need for an „industrial“ subset has been recognized only in the early 2000s. Today, Industrial IoT is being implemented far more rapid than a more generic IoT, and – believe it or not – the key drivers for that came out of Europe.</p> <p>When the term „Industry 4.0“ (Industrie 4.0) was coined back in 2011 at the Hannover Messe, the initiative was widely viewed as a buzzword creation project. Even more so, since Networking had become a key issue in industrial automation in the 1990s. Furthermore, a „high-tech strategy“ launched by the German government didn’t seem to be something that had to be taken seriously.</p> <p>We will probably never know how much of its success was due to thorough planning and how much was sheer luck, but… well, it worked. Obviously, there was a need in Germany’s manufacturing industries for guidelines regarding this issue, and thanks to their global ecosystems of suppliers and subcontractors, the concepts spread to many parts of the world.</p> <p>Similar activities in other key regions – e.g. „Industrie du futur“ in France, IVI in Japan, China’s 2015 5-year-plan or the IIC in the USA, most of them incorporated the Industry-4-0-approach – have turned the „Industrial Internet of Things“ (IIoT) from concept to reality in a short time. Not as a subset of a general IoT, as used to be predicted, but as the pioneering technology. In fact, IIoT is actually here while IoT is still more of an idea.</p> <p>France’s Industrie du futur has been conceived in close cooperation between French and German industry associations, acccompanied by both governments and the European commission, and became a model for Italy’s strategy „Fabbrica Intelligente“, Spains „Industria Conectada 4.0“ and, more general, an EU-wide incentive for industrial digitization.</p> <p>Actually, this approach is recognized worldwide as a locational advantage for the European Manufacturing Industries. The USA and China joined the effort of standardizing industrial digitization only in 2014/2015. The Industrial Internet Consortium IIC as well as China’s tech strategy in it’s five-year-plan are very closely related to the European specifications. Obviously, the organizations have learned from mistakes of the past and are trying to avoid proprietary solutions.</p> <p><strong>Connecting robots</strong></p> <p>From an technical point of view, the interesting parts of Industry 4.0 are not the „cyberphysical systems“ – industrial robots and PLCs have been around for decades. What matters is the connectivity.</p> <p>The major changes in connections between automation equipment have actually happened in the late 1990s/early 2000s, when many more or less proprietary fieldbus solutions became obsolete. Ethernet connections expanded from the administrative areas into factory floors, which opened up the automation market. However, Fieldbusses were there for a reason – Ethernet couldn’t cope with real-time requirements, it just was not designed for predictability. Nevertheless, the trend toward simpler, more standardized connections turned out to be unstoppable, and so Ethernet and fieldbus features were combined. Specialized industrial protocols and topologies include Profinet, EtherNet/IP, SafetyNET, SERCOS and EtherCAT.</p> <p>For the sake of interoperability, Ethernet standard connectors are in use everywhere today, even if they come in ruggedized housings and multiple formfactors.</p> <p>With the propagation of wireless connectivity, industrial robots are becoming more mobile. Many of the protocols mentioned work also with Wireless LAN, even though other transmission protocols and standards like LoRa, ZigBee or Industrial Bluetooth profiles are gaining foothold. However, most players in the manufacturing industries are aware of the danger that comes with the introduction of new, „smaller“ communication standards. After all the trouble the industries went to when standardizing wired industrial communications, hardly anyone wants to risk a new fragmentation of the market on the wireless side.</p> <p> </p> <table border="1" cellpadding="1" cellspacing="1" style="width:600px;"> <caption>Design principles of Industry 4.0</caption> <tbody> <tr> <td> <p>• Interoperability: The ability of machines, devices, sensors, and people to connect and communicate with each other via the Internet of Things (IoT) or the Internet of People (IoP).</p> <p>• Information transparency: The ability of information systems to create a virtual copy of the physical world by enriching digital plant models with sensor data. This requires the aggregation of raw sensor data to higher-value context information.</p> <p>• Technical assistance: First, the ability of assistance systems to support humans by aggregating and visualizing information comprehensibly for making informed decisions and solving urgent problems on short notice. Second, the ability of cyber physical systems to physically support humans by conducting a range of tasks that are unpleasant, too exhausting, or unsafe for their human co-workers.</p> <p>• Decentralized decisions: The ability of cyber physical systems to make decisions on their own and to perform their tasks as autonomously as possible. Only in the case of exceptions, interferences, or conflicting goals, are tasks delegated to a higher level.</p> </td> </tr> </tbody> </table> <p style="text-align: center;"><a href="/blog/Portals/11/MC_IA_01.jpeg" target="_blank"><img alt="" src="/blog/Portals/11/MC_IA_01.jpeg" style="width: 600px; height: 423px;" title="" /></a></p> <p style="text-align: center;"><span style="font-size:x-small;">Picture credit: European Commission (click to enlarge)</span></p> <p> </p> <p> </p> 374Embedded Espresso, 02 Feb 2017 21:40:55 GMT<p>A few years ago, a renowned manufacturer of high-class coffee machines decided to exhibit at the embedded world show. It was the first time a consumer goods company used the show as a platform, and it definitely was high time, since it used to be difficult to obtain good coffee in Nuremberg. However, the smell in the trade fair halls clearly improved and indulging acceptance quickly replaced the general astonishment about the company’s presence.</p> <p>Soon it became clear why the espresso brewer needed to settle in the embedded industry: Quite a few of their coffee makers with internet connection turned out to be vulnerable. It didn’t need much coding experience to gain access from anywhere in the world. Luckily, the hackers at that time were just having fun turning on the cappuccino foam maker at inconvenient times and grinding coffee beans to a rhythm.</p> <p>Nevertheless, for IT people in offices using those machines in the kitchen, a nightmare came true: There was a real danger an attacker could enter business networks via the coffee maker.</p> <p>Since then, we’ve seen many examples of harmless networked devices acting as a gateway to critical systems. While espresso makers are secured today, there are building automation systems, surveillance cameras, children’s toys, refrigerators, radiators, even power plants connected to the internet without state-of-the-art security precautions. The built-in standard passcode “1234” still allows access to countless systems all around the world.</p> <p>IoT—the “Internet of things” —is the buzzword for one of the main global industry trends encompassing more than networking. Security is one of the main technology challenges in both, communications between systems as well as between individual modules.</p> <p>Today, designing an embedded system ought to mean designing a secure system. And if you want to develop a secure system, the safest way is to rely on Mouser’s know-how and on Mouser’s incredibly large product portfolio – because you can’t design the future with products from the past!</p> <p>Join us at embedded world 2017 and find out how Mouser can support your new secure embedded designs! By the way, we even have good coffee on the stand.</p> 370 |
Publish date:
Scarce dates emerge in Jeffersons
When it first came out in the 1938, the Jefferson nickel could buy a bottle of Pepsi. Many collectors in the circulation finds era of the 1950s and early 1960s spent a lot of time looking for the elusive key 1950-D.
However, in 1965 when the U.S. government took silver out of the dime and quarter and reduced it in the half dollar, instead of benefiting the nickel, the denomination went to sleep along with the higher denominations.
You might be inclined to say that the removal of mintmarks caused interest to lapse, but that would only be true if every nickel collector of the time had all of the prior issues right back to 1938.
While the set was fairly easy to complete in the 1960s, it wasn’t a gimme and there were many collectors with incomplete sets. Collectors could expect to have to buy the 1950-D and perhaps several of the lesser scarce dates like the 1938-D and 1938-S and the 1939-D and 1939-S. The war nickels containing some silver also got harder to come by as the 1960s came to an end.
But even with the silver coins gone by the end of 1968, collectors who wanted to continue the circulation finds tradition could still regularly encounter Jefferson nickels in their change all the way back to the first few years of issue. In fact, the 1939, 1940 and 1941 Philadelphia coins were downright common in change.
Dates spanning roughly 30 years could regularly be encountered while dimes, quarters and halves could be found only back to 1965. Cents found in change, because the Lincoln Memorial design was introduced in 1959, had roughly 10-years’ worth of dates in widespread use.
Why then did not Jefferson nickels become the center of interest of the circulation finds practitioners? That will be an eternal mystery. The simple fact is, they didn’t. The whole series went to sleep. The circulation finds era came to an end.
In 2004, with the introduction of some new designs, the government gave the nickel another chance.
The arrival of some new collectors since then is already seen in some higher prices, but can they last?
The Westward Journey nickels started in 2004 and were really designed as circulating commemoratives. That produced the Peace Medal and Keelboat reverses. They were followed by even more dramatic changes in 2005 with a new and dramatic obverse inspired by the marble bust of Jefferson done in 1789 by French sculptor Jean-Antoine Houdon. The dramatic obverse was paired with a bison reverse or an Ocean in View reverse and once again the impact was to create additional interest in a denomination that had not see a design change in over 60 years.
A new obverse design portrait was introduced in 2006 and the traditional Monticello reverse returned, though it was touched up a bit.
All in all, the traditional Jefferson nickel series came to an end in 2003, but where is the clamor by individuals looking to finish their sets?
If there is any current denomination that seems to have more pronounced cycles of popularity than any of the others it would have to be the Jefferson nickel. We can clearly see that the Jefferson nickel was very heavily saved when the Felix Schlag design was introduced in 1938. It was probably a case of good timing as about the time the Jefferson nickel was introduced the nation’s collectors were also acquiring their first real holders to house their collections. That seemed to create a great deal of interest especially in lower denominations as there is evidence of unusual saving even of uncirculated rolls of later date Buffalo nickels and that extended to the new Jefferson nickel as well.
In fact there is evidence of real activity in 1938 as the collectors and dealers appear to have been very busy. Suddenly aware and interested in branch mint coins there was a heavier than normal saving of the low mintage 1938-D Walking Liberty half dollar.
In the case of the new Jefferson nickels there is solid evidence that they were being saved and in some numbers. The mintages of the 1938 Jefferson nickels were actually relatively low with the Philadelphia 1938 having a mintage of less than 20 million while the 1938-D was at 5,376,000 and the 1938-S was at 4,105,000.
The evidence of heavy saving is very clear from current prices. The 1938 Philadelphia Jefferson nickel is still just $7.50 in MS-60 and $18 in MS-65 while the much lower mintage 1938-D and 1938-S still sit at less than $20 each in MS-65. The quality of strike has to play a role in the MS-65 pricing as mintage totals would indicate either the Philadelphia coin should be much cheaper or the branch mint coins should be more expensive.
The prices simply confirm what many have known for years and that is that the collectors and dealers of the day were apparently very interested in the new nickels. Although the numbers are certainly decreasing there have still been appearances of original uncirculated rolls of all the 1938 coins in the past few years and until that supply is completely exhausted it seems unlikely that the 1938 dates no matter how low the mintage will be climbing significantly in price.
It would appear that the following year there was a decline in interest as the novelty of the new design was gone. That decline was also potentially increased by what was a record 1939 Philadelphia mintage. Suddenly the Jefferson nickel, which would have not been all that common in circulation in 1938 would have increased dramatically in numbers.
The Philadelphia mintage of over 120 million might have masked the fact that the Denver and San Francisco totals remained low. The San Francisco 1939 mintage was up slightly to 6,630,000 pieces, but that would still be historically low for a nickel of the past century. The 1939-D, however, actually declined over the already low 1938 mintage with a total of just 3,514,000. The real difference between the situation in 1939 and 1938 is that the low mintages of 1939 were not saved in large numbers and that has produced higher prices than might be expected.
The 1939-D has historically been the key Jefferson nickel in Mint State followed by the 1939-S and the rising star in the form of the 1942-D, which while having a mintage of nearly 14 million, was simply not saved at the time perhaps because the special war year nickels were introduced that year, taking interest away from a somewhat lower mintage date of the copper-nickel composition.
The big three are interesting and in recent times the 1939-D as is usually the case had been leading the way. The 1939-D in MS-65 was just $42 in 1998 but that price has been steadily increasing going to $75 in 2002 and now to $160 and $105 as collectors now distinguish Type I and Type II reverses. Type I is the reverse of 1938 and Type II is the reverse of 1940. The 1939-D has also increased in MS-60 going from $30 back in 1998 to $75 and $55, respectively, today. The others have followed with the 1939-S now at $45 and $250 for Type I and Type II, respectively, in MS-65 while the 1942-D is at $65.
One of the interesting questions is just how elusive are the three in MS-65. The NGC totals have the 1939-D at 535 pieces in MS-65 followed by the 1942-D at 340 and the 1939-S at 291. At PCGS the totals show the 1939-D at 750 examples while the 1939-S is at 450 and the 1942-D at just 204. Before dashing out and trying to buy the 1942-D or the 1939-S a few factors have to be considered. The first is that the two grading services split as to which date is tougher in MS-65 and that fact alone tends to suggest caution in drawing conclusions.
Another factor has to be considered as well and that is that the totals are likely to be in a state of transition as the Type I and Type II counts mount up. Realistically, the grading services count every coin they have seen, but equally realistically the 1939-S and 1942-D were not expensive enough to justify being graded for many years. As a result, their total numbers graded in all grades are well behind the 1939-D, which for many years was perhaps the only Jefferson nickel most would have sent in for grading. Consequently, with far few coins graded it should not be surprising that there are more MS-65 1939-D Jeffersons than there are of the other dates. That said, if you equalized the total numbers and called all of the added examples of the 1939-S and 1942-D MS-65 in some cases their totals would still be safely below the 1939-D.
It is a complex set of considerations and it really leaves us with no absolutely clear picture. The probability is that the 1942-D and 1939-S in MS-65 are closer in numbers to the 1939-D than their current prices indicate. Whether they are tougher than the 1939-D, however, remains unclear and at least until there are greater numbers graded it seem unlikely that the 1939-D will lose its historic position as the key Mint State Jefferson nickel.
Also nearly lost in the shuffle was the most significant Jefferson nickel error. We must remember the 1939 mintage from Philadelphia was very high and most collectors at the time were not prone to check closely especially when there was a large mintage. In his book American Coin Treasures and Hoards Q. David Bowers recounts the one exception in 1939 which was the 1939 with a doubled MONTICELLO. Bowers explained, “Boston dealer Malcolm O.E. Chell-Frost discovered this dramatic variety about 1939, and forthwith began searching for them in circulation. Others were advised to keep on the lookout, and from these and other sources more were acquired, until he had several hundred pieces. Virtually all of these – 95 percent or more were worn.” Today the 1939 with a doubled MONTICELLO lists for $60 in F-12 but $300 in MS-60 and $1,250 in MS-65.
War nickels soon followed. It is hard to know just how much interest was created in 1942 when a new alloy of 56 percent copper, 35 percent silver and 9 percent manganese was used in an effort to conserve on copper and nickel for the war effort. To mark the new composition the mintmarks were enlarged and moved to a place above Monticello on the reverse. Even Philadelphia for the first time on a U.S. coin would be represented by a large “P.”
The wartime silver composition would continue in use through 1945, creating something of a mini-set of 11 coins within the regular Jefferson nickel set. The war year nickels actually vary widely in mintages, ranging from just over 15 million for the 1943-D to over 271 million for the 1943.
The group, however, is readily available in Mint State with the most expensive non-error date in MS-60 at $14 while the most expensive regular date in MS-65 is at $28. The one exception to generally low prices is the 1943/2-P which is an interesting coin as it may well reflect the pressure of the times as it was allowed to reach circulation in some numbers resulting in prices today ranging from $50 in F-12 to $650 in MS-65.
The next true Jefferson nickel frenzy came around 1950 when the 2,630,030 mintage of the 1950-D was announced. Even today it is hard to truly appreciate or understand the frenzy that followed.
Realistically, the 1950-D was the lowest mintage regular date Jefferson nickel. That said, it was not so low as to potentially create speculation. There had been at least seven regular date Buffalo nickels with lower mintages and all were available back in 1950 at virtually no premium above their face value unless they were uncirculated.
Somehow that did not seem to matter back in 1950. The 1950-D developed a life of its own. The hoarding was perhaps the highest in U.S. history. In his book Bowers points to A.J. Mitula of Houston, Texas, who apparently acquired over 1 million examples of the 1950-D while a dealer in Milwaukee reportedly had 320,000 pieces. Just those two combined would have been in a position to control nearly one-half of the entire mintage if Bowers is correct. Moreover, there were others involved, making the 2.6 million mintage seem more like 600,000.
The 1950s were a classic time for collectors assembling sets from circulation and the 1950-D emerged as a significant problem as with more than one-half of the mintage sitting in hoards it was far tougher than its mintage suggested.
Frustrated collectors attempting to buy examples found that there were no circulated examples to be had of the 1950-D. One dealer at the time explained to me that they seemingly only came in uncirculated.
Collector demand rose and that caused the price to rise, which simply created even more demand, as everyone wanted to have their one 1950-D or their roll or bag before the price went even higher.
By 1964 it reached about $25 for an uncirculated example and it might have gone even higher were it not for the government stepping in 1965 and eliminating mintmarks. That caused a significant drop in collector interest in coins generally and with it the 1950-D.
In terms of price, the 1950-D went into something perilously close to coma. By 1969 it was $12.50. By the middle 1980s you could get one for $5 or $6. Nowadays a little life has returned, carrying it to $10 in MS-60 and $20 in MS-65.
Perhaps it was disappointment in the 1950-D price that led so many collectors to abandon the series.
There may be no actual relationship, but when the 1950-D is moving, Jefferson nickels in general seem to move in terms of price and we have seen that recently as other dates have also posted gains. The 1951 is now at $18 in MS-65 and the 1951-D is at $14. Those are historically high prices for Jefferson nickels from the 1950s and they may be just the start if the supply of top grade Jefferson nickels is really tested.
We have also seen price movements from more recent dates. As is the case with a number of other denominations the 1982 and 1983 pieces have been especially active as those dates are under strong pressure simply because those were the years of no mint sets. Without the yearly 1 million or so mint sets, the supply of Mint State examples for those years is basically whatever collectors and dealers saved when the coins were issued. With most collectors and dealers at the time concentrating on the new and exciting modern commemoratives that were being introduced, the amount of rolls and bag saving was apparently not good and that has seen the 1982-P jump from $4.50 in MS-65 to $12.50. Others have increased as well with the 1982-D now at $3.50, the 1983-P at $4 and the 1983-D at $2.50.
If the Jefferson nickels follow the trend of some other denominations the 1982 and 1983 dates are far from finished in terms of prices. Moves like that seen in the case of the 1982-P could become fairly commonplace with the dates of the 1982 and 1983 simply because once people realize their prices are rising that creates further supply problems as we have learned that the 1982 and 1983 dates are simply not available in any significant numbers to meet new demand.
Other Jefferson nickels should be watched as well. In 1971 the Jefferson nickel became the fourth denomination to have proof-only San Francisco coins in each year’s proof set. (In the year 1968-1970 there were S-mint coins struck for circulation.
At first collectors were probably uncertain how to treat the new proof-only San Francisco dates, but over the years some collectors have chosen to collector only the proof dates while some have chosen to ignore proofs completely by focusing solely on circulation strikes. Collecting both is something the circulation finds generation would have done without hesitation.
Whatever the approach, it is creating demand and with a supply limited to the number of sets people are willing to break up, the prices have been rising. The key date so far has been the 1986-S, which is now $7 in Proof-65.
Much of the action in recent years in the Jefferson nickel has been in top grade MS-65 with full steps and the market for such top-grade coins has been increasing each year. The 1953-S has emerged as the key date in MS-65 with full steps with a price of $1,750 followed by the 1954-S, which is currently at $1,000.
There are many other interesting and sometimes surprising dates including a number from Denver in the 1960s, which are not normally considered tough, but when you demand MS-65 and/or full steps, those sometimes seemingly ordinary dates can become extraordinary with prices above $500 in MS-65 with full steps. If anything the prices may go higher as grading services right now report relatively few examples of many dates. The grading service totals, however, must in this case be taken with a grain of salt as there is reason to doubt that many coins have been submitted simply because if they do not come back with an MS-65 with full steps designation, the cost of the grading would in many cases be far higher than the value of a regular MS-65 or an MS-64 with full steps, so there is a very large financial risk and that probably keeps the numbers of coins submitted down.
It is risky to predict the future. Jefferson nickels show promise. If enough collectors decide that now is the time to compete or upgrade their Jefferson nickel set, it will then be a matter of a self-fulfilling phenomenon, because supply cannot possible keep up with any significant new demand.
It might be said that the only thing keeping prices down is collector attitudes to the series. Can they be changed? Perhaps not for someone who has waited 40 years for the series to wake up again. But collectors who come to Jeffersons with a fresh approach and no memories of the 1960s might just discover what a pleasure the series can be.
More Coin Collecting Resources:
State Quarters Deluxe Folder By Warmans
• Subscribe to our Coin Price Guide, buy Coin Books & Coin Folders and join the NumisMaster VIP Program
Strike It Rich with Pocket Change, 2nd Edition |
To Prepare Fumigating Powder
April 24th, 2018
Take equal parts of cascarilla bark, in coarse powder, camomile flowers, and anise-seed, powdered and well mixed together. Two ounces of each will be sufficient to use for several times. Take up some hot coals upon a shovel, and sprinkle the powder over them very slowly; and as the smoke arises, carry the shovel into all parts of the room, and fumigate the air thoroughly. It destroys all disagreeable odors, and is said to prevent contagion in infectious diseases, such as diphtheria, scarlet fever, and the like.
Source: Household Hints and Recipes, Henry T. Williams
November 12th, 2016
Place red-hot coals in a vessel and throw upon them a handful of corn meal. Hold the feet in the dense smoke, renewing the coals and meal till the pain is relieved. This has been known to make very marked cures, when all other remedies have failed.
Source: 76: A Cook Book
To Cure Earache
June 15th, 2016
Take a bit of cotton batting, put on it a pinch of black pepper, gather it up and tie it, dip it in sweet oil, and insert it in the ear; put a flannel bandage over the head to keep it warm; it often gives immediate relief.
Tobacco smoke, puffed into the ear, has often been effectual.
Another remedy: Take equal parts of tincture of opium and glycerine. Mix, and from a warm teaspoon drop two or three drops into the ear, stop the ear tight with cotton, and repeat every hour or two. If matter should form in the ear, make a suds with castile soap and warm water, about 100° F., or a little more than milk warm, and have some person inject it into the ear while you hold that side of your head the lowest. If it does not heal in due time, inject a little carbolic acid and water in the proportion of one drachm of the acid to one pint of warm water each time after using the suds.
Source: The White House Cookbook, F.L. Gillette
December 6th, 2015
There are various ways of treating earache: the most old fashioned are the appliance of a roasted onion, or a hot bag of salt to the ear, and putting in the ear a small piece of cotton wet with camphorated oil, or simple olive-oil with a drop of chloroform; better still, to puff tobacco smoke into the ear. This remedy is very soothing and effective.
Or, take a small wax taper, pare one end quite small, envelop it in a dry linen rag, insert it into the ear; then light the taper. Odd as this remedy may seem, it is wonderfully rapid and effective; it is practised by all Italian sailors and fishermen.
In Kentucky, a cockroach is drowned in whiskey, then wrapped in hot cotton, and applied to the ear.
Source: The Unrivalled Cook-Book and Housekeeper’s Guide, Mrs Washington
Preservatives against the ravages of Moths
September 19th, 2015
Moths are very apt to eat woollen and fur garments early in the summer. To keep them from the garments, take them late in the spring, when not worn, and put them in a chest, with considerable camphor gum. Cedar chips, or tobacco leaves, are also good for this purpose. When moths get into garments, the best thing to destroy them is to hang the garments in a closet, and make a strong smoke of tobacco leaves under them. In order to do it, have a pan of live coals in the closet, and sprinkle on the tobacco leaves.
Source: The American Housewife
For Asthma
August 12th, 2015
For asthma soak blotting paper in strong saltpeter water; dry, and burn at night.
Source: Audel’s Household Helps, Hints and Receipts
Cure for Lockjaw
August 4th, 2015
Twenty minutes in the smoke of wool or woolen cloth will take the pain out of the worst case of inflammation arising from any wound. All danger from lock-jaw will be removed if this remedy is resorted to.
Source: Mrs Owens’ Cook Book and Useful Household Hints, Frances Owens
For Morphew, or Freckles, and to clear the Skin
June 29th, 2015
Take the Blood of any Fowl or Beast, and wipe your Face all over with it every night when you go to bed for a fortnight together, and the next day wash it all off with White Wine, and white Sugar Candy, and sometimes hold your face over the smoke of Brimstone for a while, and shut your eyes, if you add the Juice of a Limon to the white Wine, it will be the better.
For a Dry, Irritating Cough
May 3rd, 2015
Smoke in a common clean pipe equal quantities of ground coffee and rich pine saw-dust. My husband finds almost instant relief when his throat and lungs are sore. Swallow all the smoke you can.
Rusty Nail Wound, Simple Guard Against Serious Results from
April 18th, 2008
“Every little while we read of someone who has run a rusty nail in his foot or some other part of his person, and lockjaw has resulted therefrom. All such wounds can be healed without any fatal consequences following them. It is only necessary to smoke such wounds or any wound or bruise that is inflamed, with burning wood or woolen cloth. Twenty minutes in the smoke will take the pain out of the worst case of inflammation arising from any wound I ever saw.” Put on a poultice of bread and milk, changing every five or ten minutes. After this bind on salt pork and keep on for several days.
|
WHO says ‘no conclusive evidence’ that coffee causes cancer
The World Health Organization’s research agency reversed its warning that drinking coffee causes cancer, citing “no conclusive evidence for a carcinogenic effect” from coffee drinking.
The International Agency for Research on Cancer explained that this ruling “does not mean that a substance has been proven to be safe. It means that the existing scientific data do not enable a conclusion to be made about whether it causes cancer.”
The agency panel previously described coffee as “possibly carcinogenic” in a 1991 report and linked it to bladder cancer.
But the agency also says that drinking “very hot” beverages, including coffee, mate and teas heated to as much as 160 degree Fahrenheit, was “probably carcinogenic” because of the harm it poses the throat.
Dana Loomis, deputy head of the IARC program, told the Associated Press that there is limited evidence that suggests very hot beverages may cause “thermal injury” in the throat which could produce tumors.
So, does this mean that the agency made the wrong conclusion in its previous research? In a June 15 statement, the international agency said, “No.”
Since 1991, the agency explained it has collected more data and conducted better studies, saying, “[S]cientific knowledge is always evolving.”
Support PBS NewsHour: |
Accounting Course
Best Tricks On How To Study An Accounting Course In College
Accounting has been alive and well from as far back as the pre-2000 BC when the barter trade system was in place. This makes...
Bank and SSC Exams
How to Prepare for Computer GK for Bank and SSC Exams
General Knowledge is an important rank deciding subject in competitive exams. You might score well in other practical subjects like Maths, Reasoning, and English-...
PMI Certification
Know About PMI Certification and chose the right one for you:
Project Management Institute (PMI) Being the largest certifying body is popularly known for its PMP Certification. This certifying body PMI offers several Certification Project Management...
What is Perimeter in Triangles?
What is Perimeter in Triangles?
Geometry is the field of study that deals with properties of plane figures such as points, lines, planes, and solids. Geometric figures come with...
Study MBA
Why Study MBA AT CGC Landran
Management degrees have always been the top priority for college students. Among these degrees, MBA tops the chart. It is a two-year post-graduate degree...
What is Z-Library?
What is Z-Library? How do I use Z library?
Since the internet has evolved one very good thing that has happened to net surfers is the Z-library website, about which we will talk...
Coding and Programming
Are Coding and Programming Same or Different?
"Coding" and "Writing computer programs" are the two most significant methodologies in Software Development Industries. Both coding and programming may have been utilized reciprocally...
difference between python vs. Go
Go vs Python: Comparison between Python and go language
Python is an object-oriented programming language, and Go, also known as Golang, is a programming language derived from C. Go is used for programming...
Recent Posts |
How to Get Some Emotional Distance in an Argument
Getting angry? Try a practice called 'self-distancing' to help resolve conflict
By Zaid Jilani
Zaid Jilani
Zaid Jilani
October 17, 2019 Updated: October 17, 2019
Your heart races. Your blood pressure soars. You can feel the adrenaline pumping.
Are you being attacked by a bear? No. You’re just arguing with your uncle on Facebook. The comments fly fast and furious.
In conflict situations, writes professional mediator Teresa Frisbie in a 2018 article, our bodies often react like we’re being physically threatened by a predator when in reality we might be having a disagreement about politics or the dishes or our favorite movie.
The roots of the confusion go back to our early history when danger came from every direction. But as human lives have grown more complex and multi-faceted, we still often default to very simplistic fight, flight, or freeze reactions during conflicts in our everyday lives. “The brain perceives social threat similarly to how it senses physical threat,” Frisbie writes.
And in these polarized times, we may encounter intense social threats when we glance at the news or scan our Facebook or Twitter feed—anytime we encounter someone voicing an opinion that challenges our identity and worldview. One response could be to disengage from those debates altogether, lest we get too worked up and flip our lid. That might help keep our blood pressure down, but it may also prevent us from understanding other points of view.
Recent research suggests a different approach, a skill that may actually help us keep a level head at times of conflict and disagreement. It’s called self-distancing. Instead of creating some distance from a perceived adversary, self-distancing actually encourages us to get some distance from ourselves.
How does it work? The main trick involves shifting your perspective on a situation from the first person to the second- or third-person. For example, if your name is Bob, instead of asking, “Why do I feel this way?” you can instead ask, “Why does Bob feel this way?”
That might sound odd, but research suggests it can help you effectively regulate your emotions and keep your cool in challenging situations. There’s a reason we’re often better at giving advice to our friends and colleagues than to ourselves—our calmer emotional state and distance from the problem allows us to reason things through in a way that we often can’t when it’s personal. Managing your feelings can help you constructively respond to perceived threats and worries.
Couple talking seriously outdoors in a park.
Couple talking seriously outdoors in a park. (Shutterstock)
“The first prong of self-distancing is calming yourself down,” says Frisbie, who serves as director of the Dispute Resolution Program at Loyola University’s School of Law. This, in turn, can help calm your antagonists—which can open the door to resolving the conflict.
The Benefits of Getting Some Distance
University of Michigan psychologist Ethan Kross has studied the impact of self-distancing on reasoning, attitudes, and behaviors—and has found that all three can be enhanced by encouraging individuals to create psychological distance from their problems.
In one paper, originally published in 2011, Kross and co-researcher Igor Grossman used the backdrop of the Great Recession to examine whether self-distancing would improve the reasoning skills of college seniors and recent graduates facing a dire job market.
They specifically picked senior students and recent graduates who weren’t successful in obtaining a job post-graduation and asked them about how the recession would influence their future careers.
The participants were told to “take a few minutes to think about how the current economic climate will impact you personally,” and then were asked to explain how the recession would affect their careers from either an “immersed perspective”—such as imagining the “events unfolding before your own eyes as if you were right there”—or from a “distanced perspective,” which would involve imagining the “events unfolding as if you were a distant observer.”
The researchers then analyzed the participants’ responses and looked for intellectual humility and dialectical thinking, which recognizes that the world is constantly changing. Taken together, these two components form what the researchers dub “wise reasoning.” With wise reasoning, we are able to understand that our own narrow view of the world may have its own limitations and shortcomings.
What they found is that “participants in the distanced group were significantly more likely to recognize the limits of their knowledge … and recognize the future was likely to change.” They were more easily able to shift into wise reasoning that de-personalized the impact of the recession in a way that would allow them to attain a calmer emotional state.
Essentially, by engaging in self-distancing, the participants were better able to produce a mental state that allowed room for healthy optimism about their economic futures.
Self-Distancing Makes Arguments Better
Kross and Grossman also performed a second study that has hopeful implications for those of us who get anxious about the state of politics in our country.
In the three weeks prior to the 2008 presidential election, researchers asked participants who identified as strong liberals or strong conservatives to “think about how various foreign and domestic issues would play out over the next four years if the candidate that they did not endorse wins the election,” from either a distanced perspective or an immersed perspective.
Indeed, participants who used the distanced perspective were more likely to use wise reasoning; they also endorsed their own political views less strongly. The distanced participants also signed up to join a bipartisan political group at a higher rate than participants who weren’t encouraged to look at things from a distance. This suggests that distancing can be a potent tool for escaping political polarization.
When dealing with “emotionally fueled” situations, says Kross, we tend to fall back on the default: fight, flight, or freeze. When that happens, we tend to see things only from our own point of view, and empathy becomes more difficult. “And so the theory is that getting people to take a step back and adopt a more detached, big-picture perspective could be helpful to people [in seeing] that it’s not just their own view that exists, that there are alternative viewpoints,” he says. “It can make people recognize the limits of their own understanding.”
It can be difficult to adopt a distanced perspective when you are facing an anxious situation, such as when you’re involved in a political argument or if you have just been laid off. But, as Kross’s research shows, doing so will help you engage in wiser reasoning that may help you be less anxious and pessimistic.
Frisbie emphasizes that we can all practice self-distancing without anyone even knowing. You don’t have to refer to yourself in the third person during a verbal dialogue with another person—changing your perspective in your inner monologue is more than enough to practice this skill. Self-distancing might sound weird, but, as Frisbie notes, “It’s invisible.” No one will hear you talk about yourself in the third person.
So, if you’re in a heated political argument, and someone tells you that you’re a heartless conservative or a loony liberal, pause and take a second before you respond. Give yourself some breathing room by reframing the situation with some self-distancing. Instead of asking himself, “How should I respond?” Bob can instead ask, “How should Bob respond to what was just said to him?”
Bob may be surprised how much of a difference it makes in slowing him down, calming his body, and allowing him to respond in a wiser and more thoughtful way.
Zaid Jilani is Greater Good‘s Bridging Differences Writing fellow. This article was originally published on Greater Good Magazine online.
Zaid Jilani
Zaid Jilani |
beautiful dialogue between Dighanaka and Gautama the Buddha is the
teaching that Buddhism is neither
or ‘doctrine’
and to think otherwise is to
mistake ‘
the finger pointing at
the moon for the moon itself
This story is retold by Master Thich Nhat Hanh
[1] originally found in the Dighanaka Sutta (MN 74):
asked the Buddha, “
what is your teaching? What are your doctrines? For my part, I
dislike all doctrines and theories. I don’t subscribe to any at
Buddha smiled and asked, “
you subscribe to your doctrine of not following and doctrines? Do you
believe in your doctrine of not-believing?
taken aback, Dighanakha replied, “
whether I believe of don’t believe is no importance
Buddha spoke gently, “
Once a
person is caught by belief in a doctrine, he loses all his freedom.
When one becomes dogmatic, he believes his doctrine is the only truth
and that all other doctrines are heresy. Disputes and conflicts all
arise from narrow views. They can extend endlessly, wasting precious
truth open.
asked, “
But what of your own
teaching? If someone follows your teaching will he become caught in
narrow views?”
teaching is not a doctrine or a philosophy. It is not the result of
discursive thought or mental conjecture like various philosophies
which contend that the fundamental essence of the universe is fire,
water, earth, wind, or spirit, or that the universe is either finite
or infinite, temporal, or eternal. Mental conjecture and discursive
thought about truth are like ants crawling around the rim of the bowl
— they never get anywhere. The things I say come from my own
experience. You can confirm them all by your own experience
goal is not to explain the universe, but to help guide others to have
a direct experience of reality. Words cannot describe reality. Only
direct experience enables us to see the true face of
exclaimed, “
wonderful Gautama! But what would happen if a person did perceive
your teaching as a dogma?
must state clearly that my teaching is method to experience reality
and not reality itself, just as a finger pointing at the moon is not
the moon itself. An intelligent person makes use of the finger to see
the moon.
[1] Thich
Nhat Hanh (1991).
Old Path
White Clouds: Walking in the Footsteps of the Buddha
Berkley, California: Parallax Press. |
Monday Morning Tai Chi Training Tip # 315
Tai Chi and Nerves
The body and mind are interrelated, and at the core, one and the same. Both developed from one cell that was a combination of an egg and a sperm cell. It is convenient to talk about a human as composed of various elements, like muscles, bones, nerves, organs, etc. – yet of course, it is all one.
Let’s look at the nervous system for a moment. The nerves are the link between the mind and body. The nerves are the communication system of the body, and possibly the worst thing that can happen to a person is to have the communication system damaged, through, for instance, a stroke.
All parts of the body are linked to the brain via nerves, and the main trunk line is the spinal column. The brain is constantly receiving messages from all over the body and tries to deal with as many messages as possible. When there are too many messages at the same time, the brain deals with the most important first.
For instance, you see a gold ring lying in the street. The eyes send the message to the brain, and the brain sends back the message to the legs to move and go get it. As you start, you hear a car approaching at a fast speed. The ears send the message to the brain and the brain says it is more important to get out of the way of the car, than to pick up the ring, so your body stops in mid step and you pull back.
All of this requires strong nerve currents, good communication between nerves and muscles, and a healthy brain. All of these are trained through internal arts practice. The harmonious use of muscles results in harmonious use of nerves and a reduction of nervous tension.The reduction allows relaxation and calmness so important to our over-all health. |
RAID, which stands short for Redundant Array of Independent Disks, is a software or hardware storage virtualization technology that enables a system to use several hard drives as one single logical unit. Put simply, all drives are used as one and the info on all of them is the same. This type of a setup has 2 key advantages over using just a single drive to store data - the first one is redundancy, so in the event that one drive breaks down, the information will be accessible from the others, and the second is better performance since the input/output, or reading/writing operations will be spread among multiple drives. There are different RAID types in accordance with how many drives are employed, if reading and writing are both executed from all of the drives simultaneously, whether data is written in blocks on one drive after another or is mirrored between drives in the same time, etcetera. Based on the exact setup, the fault tolerance and the performance may vary.
RAID in Hosting
The revolutionary cloud Internet hosting platform where all hosting accounts are created uses super fast SSD drives as an alternative to the standard HDDs, and they operate in RAID-Z. With this configuration, multiple hard drives work together and at least one of them is a dedicated parity disk. Simply put, when data is written on the other drives, it's copied on the parity one adding an extra bit. This is performed for redundancy as even if a drive fails or falls out of the RAID for some reason, the info can be rebuilt and verified thanks to the parity disk and the data saved on the other ones, therefore practically nothing will be lost and there will not be any service disorders. This is another level of security for your data together with the state-of-the-art ZFS file system that uses checksums to make sure that all the data on our servers is intact and is not silently corrupted.
RAID in Semi-dedicated Servers
The data uploaded to any semi-dedicated server account is saved on SSD drives which work in RAID-Z. One of the drives in type of a configuration is used for parity - every time data is cloned on it, an extra bit is added. If a disk turns out to be problematic, it will be taken out of the RAID without interrupting the work of the sites since the data will load from the rest of the drives, and when a brand new drive is added, the info that will be copied on it will be a mix between the info on the parity disk and data kept on the other hard drives in the RAID. That is done to ensure that the data that is being duplicated is accurate, so the moment the new drive is rebuilt, it could be included in the RAID as a production one. This is an extra warranty for the integrity of your info because the ZFS file system that runs on our cloud hosting platform analyzes a unique checksum of all the copies of your files on the separate drives in order to avoid any possibility of silent data corruption.
RAID in VPS Servers
If you employ one of our VPS server solutions, any content that you upload will be saved on SSD drives that operate in RAID. At least one drive is intended for parity to ensure the integrity of the information. In simple terms, this is a special drive where data is copied with one bit added to it. In the event that a disk in the RAID stops working, your websites will continue working and when a new disk replaces the defective one, the bits of the data that will be cloned on it are calculated by using the healthy and the parity drives. This way, any probability of corrupting data during the process is avoided. We also employ ordinary hard disks which work in RAID for storing backups, so should you add this service to your VPS package, your site content will be kept on multiple drives and you won't ever have to worry about its integrity even in the event of multiple drive failures. |
Request a Quote
Message / Order details:
Amac Amac
How To Properly Use And Care For Your Pull Tape
How To Properly Use And Care For Your Pull Tape
April 13, 2020
Pull tape can often be mistaken with fish tape, which is actually a different kind of tool used when working with cables through a conduit, a tube that helps protect cables from getting exposed and from interference. It is often mistaken for fish tape because it also has a flat woven shape that mostly serves as a replacement to polypropylene rope. With its design, pull tape offers a lower coefficient of friction that drastically reduces the chance of burn, which commonly happens with ropes.
Due to the wide range of pulling tape available, as well as the myriad of variables involved, there is no one size fits all pulling tape that will fit all kinds of projects.
In addition to selecting the right size and length, you have to also pay attention to its proper care and use.
Here are some ways on how to do it:
Avoid excess loading and other extreme conditions
Excess loading can often lead to damage as well as sudden or extreme stress, high temperatures, and too long loading periods. Other factors that can cause the problem are incorrect usage and improper storage.
Store it properly
Most pulling tapes have a lower tensile strength at elevated temperatures and prolonged exposure can cause permanent damage. This is why it is very important that you store it in a secure, dry location away from direct heat or sunlight.
Avoid exposure to chemicals
Just like fish tapes, pull tapes are also prone to damage when exposed to certain acids and alkalis. So, extra caution is needed when using the tape around locations where chemicals are possible to cause damage.
Prevent abrasion
Abrasive surfaces and sharp edges can damage your pulling tape and when there are worn areas, the tensile strength of the tape would be compromised. So, in order to keep the safety of using pulling tape, you can protect it by using chafing gear around the tape.
No comments yet...
*** Your email address will not be published. |
Home Art And Culture How Death Is Viewed In African Culture.
How Death Is Viewed In African Culture.
Africa is a very large expanse and vast continent in the world.
Indeed, Africa is noted as one of the largest and populous continent in this lithosphere (earth).
Africa is divided into five main subregions namely Northern Africa, Eastern Africa, Western Africa, Southern Africa, and middle Africa.
Clearly, Africans are people who are very loving and always ready to welcome people without hesitation.
With that, people travel from many parts of the world to Africa to observe things expecially Africans culture while others come for schooling.
Undoubtedly, people in different continents on this earth have their own culture and how it’s been celebrated or performed.
Therefore, Africans also have their own culture which is very nice, interesting, loving, peaceful, and tolerant.
People across the world with specific and unique cultures view death in different ways and understanding.
Base on Africa they have a unique way of viewing death which is the total transmission of a person from the physical world to the spiritual world.
Sincerely, Africans view death as a transmission of a person from the physical realm to the spiritual realm and for that matter when somebody dies it doesn’t mean that the person is gone forever, but has moved from the physical to the spiritual realm.
Therefore, the above view on death implies how Africans view or see death to be.
Please enter your comment!
Please enter your name here |
Lately I have been thinking a lot about the Byzantine Empire and the long webs of connections which the Eastern Empire cast across western culture. We will talk more about this later, but, for now, let’s check out a world famous Byzantine treasure! This is the porphyry head of a Byzantine Emperor (tentatively, yet inconclusively identified as Justinian). In Venice, where the stone head has been located since the very beginning of the 13th century (as far as anyone can tell) it is known as “Carmagnola” (more about that below). Sadly, most Byzantine art objects were scattered to the four winds (or destroyed outright) when the Turks seized the city in AD 1453, however Constantinople, city of impregnable walls, had also fallen once before in AD 1203 as a part of the misbegotten Fourth Crusade (a tragicomic series of blunders and Venetian manipulation which we also need to write about). This porphyry head escaped the latter sack because it was carried off during the former!
Based on its style and construction, Carmagnola was originally manufactured by Byzantine sculptors at an unknown date sometime between the 4th and 6th centuries (AD). The diadem worn by the figure is indisputably the headdress of a late Roman Emperor who ruled a vast Mediterranean and Middle Eastern empire out of Constantinople (I guess we need to talk about the diadem of the basileus at some point too). Scholars have speculated that the original statue may have been located in the Philadelphion, a central square of old Constantinople. The figure’s nose was damaged at some point (perhaps during the iconoclasm movement or as a political statement) but has been successfully polished flat. Speaking of statue breakage, it is possible that the head goes with a large headless Byzantine trunk made of porphyry which is now located in Ravenna (although such a provenance would make it seem unlikely that the sculpture was originally located in the Philadelphion). Whatever the original location might have been, the statue was installed upon the facade of Saint Mark’s Basilica in Venice (the all-important main location of Venice) after it came to the City of Canals. The head is arguably the most important object among the strange collection of cultural objects which the Venetians arranged along the Saint Mark’s facade over the centuries like an Italian grandmother putting important knickknacks on a mantle. The head’s nickname Carmagnola originates from a Venetian incident and is not some ancient Byzantine allusion: a certain infamous condottiero, Francesco Bussone da Carmagnola was beheaded on 5 May 1432 on the Piazzetta in front of Saint Mark’s after the rascally mercenary tried to trifle with the Council of Ten (who had employed him to fight his former master Duke Visconti of Milan). The red imperial head perhaps resembled the severed head of the angry squash-nosed mercenary and locals began to jestingly call it by the same name. Isn’t history funny? Anyway, in case you were trying to find it on a picture of Saint Mark’s, I have marked its location on the picture below.
Today’s post is about archangels! Glistening in the sky above us they are the most…wait…archangels the pigeon breed??? Who is choosing these topics? Sigh…ok. Well, in addition to being quasi-divine winged warriors of insane ferocity second in might only to godhead, archangels are also apparently a breed of fancy pigeon. Germans call them “gimpels” which strikes me as a less dramatic but somehow more appropriate name.
Like other domesticated pigeons, archangels are descended from the rock pigeon (Columba livia). The archangel is a small pigeon with featherless legs. Its claim to distinction is an extremely iridescent head which glistens like burnished metal! Why does nobody ever say stuff like that about me? In England, “archangel” refers only to black and copper color birds, but here in America we have thrown off such tyrannically narrow definitions and archangels can be any color (and they can have crests or not).
archangel pigeon (from
Clearly we are having a bit of fun at the expense of pigeon breeders and the grandiloquent names they give their feathered darlings, but these birds really are cool. Look at those metallic heads!
Statue of Decebalus (completed 2004, carved stone)
Statue of Decebalus (completed 2004, carved stone)
It’s possible that I made a few economic missteps over the years (although, judging by the news, I am not the only one) and, as a consequence, I won’t be spending this August traveling the world. However, even if I am literally trapped in angry sweltering New York, my mind is free to roam the rugged Carpathians and take in the robust forested splendor of Romania. This land was long known as Transylvania (the “crossing forest”) and the modern world has not changed the wooded character of the land. I started to do some research online and in my virtual travels I was stunned to come upon this colossal stone head carved in the living rock of Dacia. This is a carving of Decebalus a king who ruled from 87 AD – 106 AD. Decebalus was a client king of Rome, one of the many annoying and interesting minor sovereigns whom the empire propped up around its borders to act as buffers. Much of Roman history concerns their perennial struggles with these vexatious vassals and the history of Decebalus is no different. Indeed he ended up being the last king of Dacia. His cleverness and pride went too far and Rome crushed him like a bug and absorbed Dacia.
This statue however is presumably meant to evoke Decebalus’ pride and independence (not his defeat and suicide). The head is 40 meters tall (120 feet)—it may be the largest monumental head in Europe. It was crafted by a team of 12 sculptors over 10 years at the behest of an eccentric Romanian businessman, Constantin Drăgan (1917-2008). The statue was completed in 2004 and stares balefully out over the Danube. I love Decebalus’ stony features—which seem little different from an actual rock. I am also predictably impressed at the way the natural rock looks like a crown. Dragan had some curious nationalistic misconceptions about Dacia’s place in history, and it seems this great head was meant to explain/popularize some of the millionaire’s ideas. As often happens with art, the actual work is more ambiguous and interesting…hinting at both greatness and ruin.
Ancient Egyptian mythology can seem like a baffling tangle of multi-faceted gods who subsume each others’ identities, roles, and symbols. Perhaps the best way to understand the mutable nature of Egyptian deities is to recognize that the pantheon reflected the changing political realities of Ancient Egyptian culture. The drawback with this methodology is that the culture of Ancient Egypt lasted for approximately 3000 years (!), so it is still not easy to summarize Egyptian mythology.
Statues of Amun rams from the great forecourt of the Temple of Karnak
Consider the deity Amun Ra. Amun Ra ended up as the king of the gods of Egypt—the emperor of heaven who created all things. There were times in the New Kingdom, when worship of Amun Ra bordered on monotheism and the other gods were regarded as flickering extensions of Amun Ra. However it did not start this way. Originally Amun and Ra were separate. In the Old Kingdom Amun was a mysterious god of hidden magical breath. The Old Kingdom ended in 2181 BC in a dark age of war and strife which lasted for a century (a time now known as “the First Intermediate Period”). At the end of this period, Amun had grown in importance and become the god of the winds and the patron god of Thebes. The Middle Kingdom was a glorious age for Egyptian civilization, but it too came to an end in stagnation, civil war, and invasion—”the Second Intermediate Period”–which lasted from 1786 BC to 1550 BC. During this Second Intermediate Period, a mysterious group of heterogeneous invaders—the Hyksos—took over Egypt and created their own dynasties. The Hyksos were finally driven from Egypt by nobles from Thebes who founded the 17th dynasty (the first of the New Kingdom). Since Thebes was politically ascendant, the Theban patron god Amun merged with Ra and became ruler of the gods. Before being combined with Amun, the deity Ra had long been worshiped as the sun god.
Ra on the the Mesektet with Apophis below (from the Tomb of Ramses I, ca. 1290 BC)
Ra traveled through the firmament on two solar boats. By day he traveled through the sky on the Mandjet (the Boat of Millions of Years). At night he took on his form as a great ram and traveled through the underworld on the Mesektet (the evening boat). Ferrebeekeeper has touched on the Mesektet before, but we were concentrating on giant evil snake deities back in those days, so ram-headed Ra didn’t really get his due in the earlier post.
Amun Ra in his splendid towering crown
Amun Ra in his splendid towering crown
Amun Ra had several forms which reflected his diverse origin, but he was most often portrayed as a mighty ram or as a pharaoh with a distinctive towering headdress…or sometimes as a falcon with the sun on his head. When I started writing this article I had hoped for some explanation of why Ra was called “Ram of the Underworld” or why the ram came to prominence over other animals to wind up as the favored animal head for the king of the gods, but if such explanations exist, they have eluded me. You’ll have to be content with the fact that the king of the gods of Egypt was most often a ram. I’m not even sure if I said that right: but I guess I don’t need to worry about literalistic ancient Egyptian priests and worshipers showing up in the comments to berate me (a consideration which crossed my mind when I decided to write about Amun Ra as opposed to other supreme sheep gods whom I could name).
The Head of Medusa (Peter Paul Rubens, ca. 1617-1618, oil on canvas)
Here is a dark Baroque masterpiece. Using a polished shield as a mirror, Perseus has just severed the dreadful head of Medusa, a gorgon capable of turning anyone who sees her into stone. Medusa’s head was subsequently used by Perseus as a weapon to slay the sea monster sent to devour Andromeda–but the weapon proved too dangerous for him to keep so he gave the head to Athena, goddess of victory and wisdom. She set it on her shield (or sometimes her breastplate) and the Gorgoneion thus became a symbol of divine protection and luck as well as a charm for warding off evil.
Through the artist’s imagination, we are allowed to see what Perseus is not: the horrible head of the demigoddess with her countenance contorted in mortal outrage. Despite her death, the many serpents which make up her hair remain alive and infuriated. One even bites her forehead in pique. Where her blood pours on the ground, serpents and worms spring to life. Spiders, scorpions and lizards appear in order to abet the general creepy horror of the scene (as do the stormy clouds and desolate landscape.
Rubens was the master of using color and motion to express the sensual and the grotesque. The full dynamism of his style is evident in this grisly tableau which simultaneously evokes the drama of earlier Medusa paintings by Da Vinci & Carravagio while also bringing some of the detail and imagination of Flemish still life composition to play.
An Inkanyamba flying prior to a storm (artist unknown)
An Inkanyamba flying prior to a storm (artist unknown)
Kindly forgive the last few weekdays without a post–I was on a winter solstice vacation from the internet. To cut through the holiday treacle, let’s concentrate on one of my favorite subjects—giant snake monsters! More specifically, after this year of horrible storms, I am writing about the fearsome inkanyamba, a mythical serpent-like being from South Africa. Inkanyambas are said to dwell in the pools beneath waterfalls. They have the bodies of great serpents and horselike heads. Inkanyambas are associated with powerful seasonal storms—particularly tornadoes. Such powerful local cyclones were thought to be caused by male inkanyambas out looking for mates.
Inkanyamba linocut by Kate Rowland
Inkanyamba linocut by Kate Rowland
The creatures are said to live in the Pietermaritzburg area of KwaZulu-Natal . The Inkanyamba is particularly associated with the 95 meter tall (310 feet) Howick Falls, South Africa. For a while the Inkanyambas of Howick Falls even had a bit of Loch Ness Monster style fame attracting tourists, photojournalists, and cryptozoologists (insomuch as that is a real thing). Lately though, the moster is fading back to the proper realm of myth and art.
Howick Falls, South Africa
Howick Falls, South Africa
In ancient Greece, one of the most universally popular symbols was the gorgoneion, a symbolized head of a repulsive female figure with snakes for hair. Gorgoneion medallions and ornaments have been discovered from as far back as the 8th century BC (and some archaeologists even assert that the design dates back to 15 century Minoan Crete). The earliest Greek gorgoneions seem to have been apotropaic in nature—grotesque faces meant to ward off evil and malign influence. Homer makes several references to the gorgon’s head (in fact he only writes about the severed head—never about the whole gorgon). My favorite lines concerning the gruesome visage appear in the Odyssey, when Odysseus becomes overwhelmed by the horrors of the underworld and flees back to the world of life:
And I should have seen still other of them that are gone before, whom I would fain have seen- Theseus and Pirithous glorious children of the gods, but so many thousands of ghosts came round me and uttered such appalling cries, that I was panic stricken lest Proserpine should send up from the house of Hades the head of that awful monster Gorgon.
In Greco-Roman mythology the gorgon’s head (attached to a gorgon or not) could turn those looking at it into stone. The story of Perseus and Medusa (which we’ll cover in a different post) explains the gorgon’s origins and relates the circumstances of her beheading. When Perseus had won the princess, he presented the head to his father and Athena as a gift—thus the gorgon’s head was a symbol of divine magical power. Both Zeus and Athena were frequently portrayed wearing the ghastly head on their breastplates.
Ancient Electrum belt buckle in the form of a gorgoneion
A Gorgoneion decoration on an Attic ceramic vessel from approximately 490 BC
Although the motif began in Greece, it spread with Hellenic culture. Gorgon imagery was found on temples, clothing, statues, dishes, weapons, armor, and coins found across the Mediterranean region from Etruscan Italy all the way to the Black Sea coast. As Hellenic culture was subsumed by Rome, the image became even more popular–although the gorgon’s visage gradually changed into a more lovely shape as classical antiquity wore on.
Hellenic Gorgoneion ornament
Gorgoneion from the House of Mosaics in Eretria (4th c. B.C.)
Roman Gorgon Mosaic from the first century AD
In wealthy Roman households a gorgoneion was usually depicted next to the threshold to help guard the house against evil. The wild snake-wreathed faces are frequently found painted as murals or built into floors as mosaics.
Gorgoneion mosaic found in Pompeii's House of the Centenary
Not only was the wild magical head a mainstay of classical decoration–the motif was subsequently adapted by Renaissance artists hoping to recapture the spirit of the classical world. Gilded gorgoneions appeared at Versailles and in the palaces and mansions of elite European aristocrats of the 17th and 18th centuries.
Rodela de la Medusa de Carlos V (Filippo y Francesco Negroli, Milán, 1541)
Carved Gorgon's head at Versailles
Gorgoneion (Thomas Regnaudin, ca. 1660, Carved wood)
Even contemporary designers and businesses make use of the image. The symbol of the Versace fashion house is a gorgon’s head.
Synodontis schoutedeni catfish (Credit: Oliver Drescher)
So what’s so amazing about catfish? So far, Ferrebeekeeper has describing all sorts of different variations of these fascinating fish. From the giant truck-sized catfish of the Mekong, to the infinitesimal (yet horrifying) candirus of the Amazon, to the deadly poisonous schooling catfish of coral reefs, to catfish that live underground or in gardens, we have seen a seemingly impossible variety of the irrepressible whiskered creatures. But, aside from their variety, hardiness, and interesting appearance, catfish represent an extraordinary apogee in sensory ability. They are able to apprehend their watery realms in ways that might as well be supernatural or alien to us. Catfish have honed familiar senses—taste, smell, touch, hearing, and sight–to outrageous extremes. Yet they have additional senses—electroreceptivity, pressure sensitivity, and possibly other senses–that we are only starting to understand.
Channel catfish, Ictalurus punctatus
Let’s start with catfish’s sense of taste: catfish, unlike us, are not limited to tasting things with their tongues. Their entire bodies are covered with taste buds. To quote catfish expert Dr. John Caprio of Louisiana State University, “Catfish are swimming tongues…You can’t touch any place on a catfish without touching thousands of taste buds. To use an analogy, it’s as if the tip of your tongue grew out and covered your body.” Catfish can literally taste the water all around their bodies and the mud they are swimming over.
Red-tailed Catfish, Phractocephalus hemioliopterus (Photo by Chad Cullen)
Beyond their powers of taste, catfish have a bloodhound-like sense of smell. With astonishingly sensitive olfactory pits near their nostrils, Catfish can smell certain compounds at one part per 10 billion parts of water. The sense of smell does not merely help them while hunting and seeking food, catfish use smell to identify other individual catfish and to maintain a social hierarchy. A catfish has an elaborate picture of its watery realm, the denizens thereof, and of the history and interaction of these inhabitants based on smell.
Catfish Barbels
Catfish’s scale-free skin is unusually sensitive to touch but that is not the end of catfish’s ability to feel what is going on around it. The most distinctive feature of catfish—their 8 barbels (whiskers) are literally organs for touching. Like a blind man’s cane, each of these barbels can touch the substrate or whatever is moving in front of the catfish. Not only are the barbels covered with taste buds and feeling nerves, the whiskers also vibrate with water disturbance and provide a sense almost like hearing—although catfish also have multiple hearing organs.
Black Bullhead Catfish (notice the prominent lateral line)
Vibrations travel well under water and most fish have excellent abilities to sense sound, but catfish have evolved some additional auditory features. The swim bladder of a catfish (which the fish uses like a submarine ballast in order to rise and fall through the water column) is connected by a series of small bones (the Weberian apparatus) to the hearing apparatus (otoliths) inside the head. Catfish are therefore able to hear sounds of a higher frequency than other freshwater fish. Catfish can also sense extremely low-frequency sounds thanks to a different hearing system—a series of small pores running along the fish’s lateral lines. Within the pores are infinitesimal hair-like sensing apparatuses which respond to the slightest water displacement. Using lateral line hearing, a Catfish can sense animals scuttling across the rocks on the bottom of a river, predators swimming above them, and even fishermen walking on the shore. Perhaps most remarkably, the low frequency sensors which catfish have in their lateral lines seem to give the fish the ability to detect seismic activity. The Chinese and Japanese are said to have used the creatures as advanced earthquake detectors (which probably gave rise to the myth of Namazu, the Japanese earthquake catfish).
Although some catfish have small or underdeveloped eyes, the majority of catfish species can see extremely well. Additionally catfish possess a tapetum lucidum—a layer of reflective tissue at the back of the eyes which allows them to see keenly in low-light conditions (cat owners will recognize the tapetum lucidum as the flashing green glow of feline eyes).
Catfish in an Aquarium (further documentation required)
Finally catfish can sense the electrical discharges within the nervous and electrical-muscular systems of living things (in fact the electrical catfish goes a step beyond and uses electricity for hunting and self-defense). The cells responsible for electroreception are found grouped together in tiny pits along the catfish’s head and along its lateral line. Although electroreception has limited range, it is a powerful sense which can allow the fish to sense animals hidden beneath the mud or otherwise camouflaged.
A catfish’s life must be exciting—awash as they are in complicated overlaying sensory perceptions. Their abilities to perceive the world have taken them farther than other fish. According to the Tree of Life web project:
Several hundred more species of catfish have been discovered since the above paragraph was written. Paleontologists have even discovered fossils of catfish on Antarctica (the only continent where they can not currently be found living). Catfish are basically sentient sense-organs. They have diversified and thrived by being able to discern what is going on in the world around them (and they have probably enjoyed the experience).
Ancistrus Bristelnose Catfish
Pomelos and Mooncakes
Once again it is the mid-autumn festival (also known as the mooncake festival), one of the most important festivals of the Chinese calendar. I hope you and your friends get together to drink rice wine while looking at the jade rabbit who mixes magic herbs on the moon!
Last year Ferrebeekeeper explored the mid-autumn festival through poetry but this year we will concentrate instead on food. The quintessential foodstuff of the mooncake festival is the mooncake, a cake which is crafted to look like the moon [Ed. this is some fine work you’re doing here], however an equally lunar-looking foodstuff is nearly as important for celebrating the holiday. The pomelo is a beloved citrus fruit which has come to be integrally associated with the mid-autumn festival. The fruit is like a giant green or chartreuse grapefruit with a yellow-white or pinkish-red interior (depending on the variety). Pomelos can be quite large with a diameter that runs between 15 and 30 centimeters (6 to 12 inches) and they can weigh up to 2 kilograms (about 4 and a half pounds). The fruit is segmented like that of an orange (albeit with a great deal more pith) and tastes like a mild sweet grapefruit. In some varieties of southern Chinese cooking, the pomelo skin is used as an ingredient in its own right.
Because of its shape, its harvesting schedule, and its delightful taste, the pomelo is a mainstay of the mid-autumn moon festival. To quote, a Chines culture blog:
In Mandarin, pomelos are called 柚子 (you zi), a homophone for words that mean “prayer for a son.” Therefore, eating pomelos and putting their rinds on the head signify a prayer for the youth in the family. In addition, the Chinese believe that by placing pomelo rinds on their heads, the moon goddess Chang’e will see them and respond to their prayers when she looks down from the moon.
The pomelo has long been cultivated in China: the first allusions to the fruit date to 100 BC, but cultivation may go back further. Many of the citrus fruits we are most familiar with, such as oranges, lemons, and limes, are the end result of centuries—or even millennia–of hybridization and selective breeding. Pomelos are an exception. Native to Malaysia and Southeast Asia, the pomelo is one of the ancestral citrus fruit and the pretty trees grow wild in the jungles of Southeast Asia. It is believed that the first sweet oranges were probably a hybridization of pomelos and mandarins. Grapefruits are probably a descendant (it is hard to tell what the exact relations are since citrus trees hybridize so readily). What is certain is that the pomelo fruit is lovely and sweet and will enhance your ability to appreciate the moon tonight!
Pomelos on the Tree
Happy lunar viewing!
Pallas Athena (Rembrandt Harmenszoon van Rijn, ca. 1655)
Athena of Piraeus (detail)
Ye Olde Ferrebeekeeper Archives
October 2021 |
When was the first mine in South Africa?
When did mining start in South Africa?
Mining in South Africa started when the first copper mine was established in the Northern Cape Province in the early 1850s. In 1867, the first diamond was discovered in Hopetown, after which diamond mines were established in Kimberley, also in the Northern Cape.
Who discovered mining in South Africa?
When did Mining first begin?
The earliest known mine for a specific mineral is coal from southern Africa, appearing worked 40,000 to 20,000 years ago. But, mining did not become a significant industry until more advanced civilizations developed 10,000 to 7,000 years ago.
IT IS INTERESTING: Was South Africa a French colony?
Who owns mines in South Africa?
Which is the richest mine in South Africa?
AngloGold Ashanti’s Mponeng mine is located in Gauteng province of South Africa. It is mined to an average depth of 2,800m-3,400m below surface and is one of the world’s deepest and richest gold mines with grades at over 8g/t.
What is the biggest mine in South Africa?
The Mponeng gold mine located in the Gauteng province of South Africa is the deepest operating mine in the world.
Which province has the most mines in South Africa?
Where can I dig for diamonds in South Africa?
The primary sources of all of South Africa’s diamonds are kimberlites in ancient, vertically dipping volcanic pipes, mostly located in the vicinity of the city of Kimberley and initially amenable to opencast.
Which mines in South Africa also produce silver?
One of 7 major producing silver mines in the Pretoria area, yielding 20,000 tons of ore, 2280 kg of silver and 2000 tons of copper between 1892-1893.
Regional Level Types
Albert silver mine Mine
Nkangala District District
Mpumalanga Province
South Africa Country
What is the oldest mine in the world?
The oldest mine in the world is the chert (silica) mine at Nazlet Sabaha, Garb, Egypt. It is estimated to have first been in use around 100,000 years ago.
IT IS INTERESTING: How did World War 1 contribute to the African American Great Migration?
Who found the first mineral?
Georgius Agricola is considered the ‘father of mineralogy’.
Where was the first mine in the world?
The Ngwenya Mine is located on Bomvu Ridge, northwest of Mbabane and near the northwestern border of Eswatini (Swaziland). This mine is considered to be the world’s oldest.
Where is the biggest gold mine in South Africa?
Which mining industry is the best in South Africa?
During that time, Anglo American Platinum was South Africa’s leading mining company with a market capitalization amounting to 318 billion rand.
Market capitalization of the leading mining companies in South Africa in 2020 (in billion rand)
Characteristic Market capitalization in billion rand
How many mines does South Africa have?
As of November 2019, there are 526 mines in South Africa, all of them listed on Africa Mining IQ. South Africa is a mineral-rich country and listed as the largest producers of platinum (1st), coal (3rd), gold (6th) and diamonds (7th).
Across the Sahara |
What is the purpose of choke in motorcycle?
A choke valve/cable is designed to restrict the flow of air in the carburettor of an engine. This helps enrich the fuel-air mixture, improving the ability to start an engine in low temperature conditions.
When should I use choke on motorcycle?
The choke restricts airflow into the engine, making it easier to start and run when cold. Once the engine is warm, unchoke it. The choke chokes airflow to the carb, which means fuel-air ratio to the engine is richer in fuel.
Is it bad to ride a motorcycle with the choke on?
Anyway, you can ride off with choke, just turn it off after about a minute. The engine will warm up faster while riding. … Either way, keep the choke as low as possible, just so the bike won’t stall, and sneak away, you should be able to pull the choke off as soon as the bike gets just a little heat in it.
IT IS INTERESTING: Is clutchless shifting bad for your motorcycle?
Is it bad to leave the choke on?
Leaving the choke on for too long will cause unnecessary engine wear and waste fuel. This is also bad for the environment. … One a cold day, the engine can need more fuel than usual to get running – this makes the mixture ‘rich’, and this is what the choke does.
What does the choke do?
The choke is usually located towards the upper end of the carburetor, and provides this mixture by stopping the carburetors air supply. When it does that, it also creates low air pressure inside the carburetor to get more fuel to flow through the main circuit.
How often should you start your motorcycle?
Is it necessary to warm up a motorcycle?
Why does my motorcycle die when I turn the choke off?
However, you start it up on choke and everything is fine until you turn the choke off, and the engine dies. What gives? This is a classic symptom of a partially or fully clogged pilot jet. Fuel goes bad after time, and the first circuit/jet to clog with varnished up fuel is the pilot jet.
IT IS INTERESTING: How long do Yuasa motorcycle batteries last?
How long should I leave the choke on?
The choke usually “chokes” the air supply into the engine so it gets more petrol than usual. Hence it’s name. You should start the bike from cold with half or full choke depending on how cold it is. After 30 seconds is usually enough for most bikes.
Should the choke be open or closed?
The choke is only used when starting a cold engine. When doing a cold start, the choke should be closed to limit the amount of air going in. … Once the car has warmed up, if the choke does not open fully, the restriction in air may result in reduced power.
Why do I have to choke a warm engine?
The choke ‘chokes’ air going into the engine through the carburetor, effectively increasing the amount of fuel in the cylinder. In cold weather, this increases the chances of ignition. … In warm weather, a richer mix (more fuel in mix) is simply wastage of fuel as unburnt fuel is simply expelled.
Why does engine only run with choke on?
If a motorcycle or ATV only runs with the choke on, it’s because the richer “choke on” mixture is actually closer to the engine’s normal operating fuel mixture than the leaner “choke off” mixture. So when the choke is turned off, the engine gets too little fuel and too much air for it to run and it stalls.
How does an electric choke work on a carburetor?
Automatically – An automatic choke uses a metal spring to open and close the choke plate. The spring is wound in a housing and attached to the choke linkage on one end. As the engine warms up, it warms the metal spring. … Electric Choke – An electric choke uses electricity to warm the spring and gradually open the choke.
IT IS INTERESTING: Your question: What causes a motorcycle to run rich?
What does full choke mean?
Full: This choke has tight constriction and a dense pattern, delivering approximately 70 percent of a shell’s total pellets in a 30-inch circle at 40 yards. It’s often used for trap shooting, waterfowl pass shooting, turkey hunting and buckshot loads.
What are the 3 types of carburetors?
• Types of Carburetors.
• Constant Choke Carburetor:
• Constant Vacuum Carburetor:
• Multiple Venturi Carburetor:
29 авг. 2016 г.
Do you need a choke on a carburetor?
The choke is only used for warm up. Once you’re going down the street, the choke isn’t needed. It will be harder to start and you may have to hold the gas pedal down a little until it does warm up.
Types of transport |
Exercise is important to prevent osteoporosis, but how much do you really understand about when and how much?
Building good strong bones starts from a young age. Naturally you need a well balanced diet, but exercise plays a vital role. To begin with, you need to develop maximum bone strength from a young age through to adolescence. This is then boosted by building muscle and maintaining bone strength during your adult-life, until finally in older age, minimising bone loss.
For the elderly, your focus needs to be on maintaining or building muscle bulk and strength. It needs to be a combination of weight-bearing exercises [such as walking, jogging, dancing] and resistance exercises [ weights, bands etc]. You also need to focus on keeping good balance to avoid falls.
But with all of this, you need to be doing the right amount of intensity and frequency for your exercises program to be effective in keeping those bone strong. Not sure how much? We can guide you through this, or alternatively start you on a program in our onsite gym which you can continue on at home. |
What is Ketosis?
Pamela Zink
You might have heard of the term Ketosis”. The Keto diet is named after it.
Eating a strict Keto diet will induce Ketosis in your body. But what does that mean, exactly?
What is Ketosis, and how does it feel?
Medical Definition
Technically speaking, Ketosis is what happens when your body doesnt have enough carbs to burn to make energy.
Instead, your body makes ketone bodies”, which are produced from fatty acids.
Think of it like this: instead of eating that jelly donut you ate for lunch yesterday, once you reach Ketosis, your body will start eating the fat around your belly, or the fat from the juicy steak you ate for lunch.
There are many ways to get to Ketosis.
Eating a strict Keto diet is not the only way to induce Ketosis.
Ketosis is a natural phenomenon that occurs whenever the body is very low on carbs.
You can enter Ketosis by fasting for a long time, or by actually starving (although this might not be the most fun option). Also, pregnant women sometimes enter Ketosis due to an increased demand for calories from their growing babies.
In any case, the amount of carbs eaten per day has to be very low. The maximum amount varies from person to person, but is usually between 20 and 50 grams (about one to three slices of bread). For comparison, you could eat 20 servings of KBosh’s Cauliflower Keto Crusts and stay within that limit.
Many Keto dieters choose to eat exactly zero carbs, so they can be sure they dont go over their daily limit.
Ketosis may feel uncomfortable at first, but it gets better.
The experience of Ketosis varies from person to person. It would feel very different to one person who eats a ton of sugary junk food, than it would to someone who already has a fairly healthy and low carb diet.
Typically, when you first enter Ketosis, it is a bit of a shock, and you might feel some very unpleasant symptoms:
• Low appetite
• Bad breath
• Fatigue
• Diarrhea
• Constipation
• Insomnia
Together, these are sometimes called the Keto Flu.
But heres the good news: if you stick with it, the negative symptoms usually go away within days to weeks.
Once the body adjusts to its new state, it is common to feel much more focused and alert, and also to rapidly lose weight.
Of course, this is typical for people who deliberately induce Ketosis. If you are starving to death on a desert island somewhere, your body will never adjust to Ketosis!
Those who are prone to epilepsy will often find that they have fewer strokes, or none at all, under Ketosis. Thats why the Keto diet was first invented: to treat epilepsy patients.
Also, some people who have Type 2 diabetes may find that Ketosis helps them manage blood sugar.
Ketosis is what your body does when you stop eating carbs.
It makes your body switch from burning carbs, to burning ketones, which are made from fatty acids.
Ketosis is experienced by anyone who is fasting or eating a Keto diet. It may feel uncomfortable for a few days to weeks, but eventually the body adjusts to Ketosis.
If you or any other person has a medical concern, you should consult with your health care provider or seek other professional medical treatment immediately. Never disregard professional medical advice or delay in seeking it because of something that you have read on this blog, website or in any linked materials. |
Chemistry of nicotine
The half-life of nicotine after inhalation or injection administration is about 2 hours. Nicotine and Tobacco Research. Tobacco is a member of the deadly nightshade or belladonna family of flowering plants, a family that also includes potatoes, tomatoes, eggplant, and capiscum pepper plants -- a family rich in alkaloids.
Most smokers use tobacco regularly because they are addicted to nicotine. Gateway drug theory In animals, it is relatively simple to determine if consumption of a certain drug increases the later attraction of another drug. This effect may actually become the basis of medical treatments intended to improve blood flow to tissues damaged by atherosclerosis.
Among the gaseous phase components are carbon monoxide, carbon dioxide, nitrogen oxides, ammonia, volatile nitrosamines, hydrogen cyanide, volatile sulfur containing compounds, volatile hydrocarbons, alcohols and aldehydes and ketones.
Relationship between tobacco use and chronic illnesses A dose response relationship exists between the number of cigarettes smoked per day and particular illnesses. While there are thousands of chemicals in the tobacco plant not to mention those added by cigarette manufacturersone, nicotine, produces all the good feelings that draw people back for another cigarette or plug of tobacco.
Early accounts by European explorers describe Native Americans carrying glowing sticks from which they inhaled, and many pipes are found among Native American artifacts. The nicotine content of popular American-brand cigarettes has slowly increased over the years, and one study found that there was an average increase of 1.
Crude nicotine was known byand the compound was obtained in purified form in ; the correct molecular formula was established inand the first laboratory synthesis was reported in Nicotine is also excreted in the milk of lactating women who smoke.
Tobacco plants are also used in plant bioengineering, and some of the 60 species are grown as ornamentals. In low doses an average cigarette yields about 1 mg of absorbed nicotinethe substance acts as a stimulant in mammals, while high amounts 30—60 mg can be fatal.
Respiratory infections are also more prevalent and more severe among smokers than nonsmokers. Sullivan Bibliography Brautbar, N. Every day teens under 18 smoke their first cigarette.
Tobacco, Nicotine, and E-Cigarettes
Patterns of tobacco use in the United States Every day young people become regular smokers. Visit these other interesting sites.
Nicotine (Molecule of the Month for November 2004)
More recent cases of poisoning typically appear to be in the form of Green Tobacco Sickness or due to accidental ingestion of tobacco or tobacco products or ingestion of nicotine-containing plants.
About 5 percent by weight of the tobacco plant is nicotine C10H14N2a naturally occurring liquid alkaloid. To explain why dopamine levels remain high after direct nicotine stimulus ends, researchers looked at two other neurotransmitters in the brain, glutamate and GABA.
The morning cup of coffee you enjoy, for instance, contains another type of alkaloid: All these drugs are of course rewarding, so it is perhaps not too surprising, for all their differences, that they work the limbic reward pathways.
How Nicotine Works
For many people who smoke, the feel, smell, and sight of a cigarette and the ritual of obtaining, handling, lighting, and smoking the cigarette are all associated with the pleasurable effects of smoking and can make withdrawal or craving worse.
In its psychoactive effects, nicotine is a unique substance with a biphasic effect; when inhaled in short puffs it has a stimulant effect, but when smoked in deep drags it can have a tranquilizing effect.
The kidney eliminates both nicotine and its by-pruducts. Nicotine is a colorless, and volatile liquid alkaloid found in smoking and smokeless tobacco which turns brown and acquires the odor of tobacco upon exposure to air.
The idea of nicotine as relatively benign goes against the negative image of the drug that built up over the decades when smoking rose to become an undisputed health threat. The Chemistry of Caffeine, Nicotine, and Sleep Caffeine and nicotine side effects can include insomnia.
Cutting back on coffee and smoking will ultimately help, but be prepared for withdrawal. Chem1 All about Chemical Bonding is the index page for a lesson segment of the General Chemistry Virtual Textbook, a free, online reference textbook for General Chemistry by Stephen Lower of Simon Fraser University.
erties. Nicotine readily combines with certain of the dye acids to form water- insoluble compounds, but their practi- cal application is yet to be determined.
Nicotine can be oxidized rather readily with certain oxidizing agents to nicotinic acid and nicotinonitrile, the nitrile of nicotine acid, which have become important as antipellagra vitamins.
You didn't specify the stereochemistry of the nicotine you wanted, so I'll just put everything below. Alright, so the most common synthesis appears to be Loh et al.'s use of 3-bromopyridine. Chapters describe the history, pharmacology and toxicology of nicotine, the biosynthesis of nicotine and other alkaloids in the tobacco plant, the general chemistry of nicotine and the analytical methodologies that have been used to measure nicotine and related alkaloids in biological specimens, in tobacco and pharmaceutical products and in Manufacturer: Elsevier Science.
Chemistry of nicotine
Rated 0/5 based on 48 review
The Nicotine Buzz: The Smoker’s High and Its Effects on Your Body |
What is High-Velocity Oxyfuel Spray ?
( HVOF )
High-Velocity Oxyfuel Spray
( HVOF )
The principle for HVOF is that high-volume combustible gases are fed into a combustion chamber. The combustion takes place internally at very high chamber pressures. It is then fed into a long confining nozzle or barrel through which the combusting gases exit the device generating a supersonic gas jet with very high particle speeds. The sheer volume of gas flow, coupled with the high temperature of combustion, creates gas velocities in the 1525 to 1825 m/s (5000 to 6000 ft/s) range at the nozzle exit. The combustion jet temperatures ranges between 2500 to 3100 °C (4500 to 5600 °F). High-velocity oxyfuel gases used include hydrogen, propylene, propane, acetylene, and kerosene etc.
The process results in extremely dense, well bonded coatings, making it attractive for many applications. The high gas velocity generated by HVOF, much higher than in conventional flame or plasma spray, has been shown to increase particle velocity, with a corresponding increase in coating density and coating adhesion.
Generally, HVOF processes are used to deposit dense, hard cermet coatings of WC/Co or Cr2C3/NiCr. Many uses have been found, however, for HVOF sprayed metallic coatings. MCrAlY coatings are being applied to aircraft turbine blades by oxykerosene HVOF spray.
Components of HVOF System
Coating Characteristics
High-velocity oxyfuel coating properties are reported to be comparable to those of detonation gun coatings, particularly for carbide and oxide coatings. High Velocity Oxyfuel sprayed coating density, adhesion, and oxide contents also compare favourably with high-energy, plasma sprayed coatings. Porosity is typically reported at less than 1%. Compositional analysis of HVOF WC/Co coatings have shown that, compared to plasma spray, only a small amount of WC decomposition (to W2C) occurs, preserving the intrinsic high hardness values of the material.
Typical coatings |
Best answer: What are the two core beliefs of Hinduism quizlet?
Karma – governs what happens to people’s soul after death. Samsara – continuous cycle of life birth, death, rebirth. One of the major beliefs of Hinduism. Dharma stands for law, obligation, and duty.
What are the two main beliefs of Hinduism?
Hindus believe in the doctrines of samsara (the continuous cycle of life, death, and reincarnation) and karma (the universal law of cause and effect). One of the key thoughts of Hinduism is “atman,” or the belief in soul. This philosophy holds that living creatures have a soul, and they’re all part of the supreme soul.
What are the 2 beliefs that lie at the heart of Hinduism?
EXPLANATION: The first basic belief that lies at the heart of Hinduism is that there is one supreme God called Brahman. The second basic belief is that every person is born with a soul that is part of Brahman.
IT\'S FUN: Quick Answer: How can I move to Bangalore?
What is the Hindu belief in karma quizlet?
Hindus use Karma as a way to tell. With good karma, you can get one life closer to moksha while with bad karma, it could ruin it. Social groups that people are born into and can rarely can be changed.
What core belief does Hinduism and Buddhism share quizlet?
What are three main beliefs of Buddhism that are shared in common with Hinduism? Often connoting a sense of duty and righteousness, and both Hindus and Buddhists believe it is of central importance for correct living. Both Buddhists and Hindus believe in reincarnation. Both believe that there are many different paths.
What is not allowed in Hinduism?
The majority of Hindus are lacto-vegetarian (avoiding meat and eggs), although some may eat lamb, chicken or fish. Beef is always avoided because the cow is considered a holy animal, but dairy products are eaten. Animal-derived fats such as lard and dripping are not permitted.
Why did Hinduism not spread?
One of the major reasons because of which Hinduism did not spread to countries outside the Indian subcontinent is the lack of effective translation of the Vedas, Upanishads, etc to languages outside India and a great dependence on Sanskrit during the revival after 10th Century AD.
What are the six key concept of Hinduism?
This article explains the Hindu concepts of Atman, Dharma, Varna, Karma, Samsara, Purushartha, Moksha, Brahman, Bhagavan and Ishvara.
What are the 4 main beliefs of Hinduism?
The purpose of life for Hindus is to achieve four aims, called Purusharthas . These are dharma, kama, artha and moksha. These provide Hindus with opportunities to act morally and ethically and lead a good life.
IT\'S FUN: How many Mirzapur are in India?
Which religion is best in the world?
Adherents in 2020
Religion Adherents Percentage
Christianity 2.382 billion 31.11%
Islam 1.907 billion 24.9%
Secular/Nonreligious 1.193 billion 15.58%
Hinduism 1.251 billion 15.16%
What is the religious text of Hinduism?
The Vedas, or “Books of Knowledge,” are the foremost sacred texts in Hinduism. These books, written from around 1200 BCE to 100 CE, began with four vedas, or mantras: Rig Veda, Sama Veda, Yajur Veda and Atharva Veda.
What are the major beliefs in Hinduism?
Here are some of the key beliefs shared among Hindus:
• Truth is eternal. …
• Brahman is Truth and Reality. …
• The Vedas are the ultimate authority. …
• Everyone should strive to achieve dharma. …
• Individual souls are immortal. …
• The goal of the individual soul is moksha.
What are some of the basic beliefs of Hinduism quizlet?
Terms in this set (30)
• Brahman. Name of the supreme god. …
• Multiple Gods. Hindus worship many gods/goddesses but the god Brahman is the most important. …
• Dharma. 1. ” …
• Karma. Total good and bad actions in a human soul (atman) carries with it from life to life. …
• Atman. Human soul.
• Samsara. …
• Moksha. …
• Varnas.
What are the similarities and differences between Buddhism and Hinduism?
Hinduism and Buddhism Comparison Overview
Hinduism Buddhism
Similarities Share common concepts such as samsara, karma, and dharma
Recognize symbols such as Dharmachakra and Mudra
Practice meditation, yoga, and mantra (although in different ways)
Differences Not founded by a single person Founded by Gautama Buddha
What are the similarities and differences of Hinduism and Buddhism?
Buddhism and Hinduism are similar because their architecture is vibrant and colorful. They both have dharma and believe in reincarnation. Both of them also believe in karma. Due to Buddhism’s connection and origination within the Silk Road, merchants carried philosophies and faiths along the journey.
IT\'S FUN: You asked: When did Mughals invade India?
What beliefs did Hinduism and Buddhism have in common?
Buddhism and Hinduism agree on karma, dharma, moksha and reincarnation. They are different in that Buddhism rejects the priests of Hinduism, the formal rituals, and the caste system. Buddha urged people to seek enlightenment through meditation.
About India |
The dielectric properties of water-saturated rock and soils are strongly dependent on the amount and nature of their porosity; interpretation of these geophysical data requires petrophysical models that incorporate both of these elements. The differential effective medium approximation (DEMA) is used to develop a dielectric permittivity model for clean (i.e., clay free) media that divides the pore spaces into elements corresponding to three categories of relative size scale: microscopic porosity (e.g., intergranular cracks), mesoscopic porosity (e.g., main pore volumes), and macroscopic porosity (e.g., vugs and fractures). The hierarchical size-scale structure imposed by the DEMA iterative embedding process is used to assign each pore space category its role in model construction. Use of this model demonstrates that the relationship between dielectric permittivity and porosity is significantly affected by the size scales of pores present in the rock models. A region of realizable permittivity-porosity values is obtained by varying the pore structure in the scaled-porosity model. The bounds of this region correspond to end-member porosity models. Analysis of experimental permittivity data for water-saturated sandstones and carbonates that cover a substantial range of porosity values found that the scaled-porosity models account for a significant part of the variability in experimental data.
You do not currently have access to this article. |
What Happens If You Don’t Brush Your Teeth?
What Happens If You Don’t Brush Your Teeth?
We recommend that you brush your teeth for two minutes twice a day at 30 seconds per quadrant with a soft-bristled brush..
That’s what’s recommended in the UK and Canada.
There are certainly other countries that have different recommendations.
For example, Korea recommends that you brush your teeth three times a day for three minutes within three minutes of eating.
But that is not what is advised in Canada.
If you want to, you can brush your teeth for longer than two minutes but two minutes should be the minimum.
You should brush your teeth twice a day. So, once definitely at night time, the last thing before you go to sleep and one other time during the day as well. If you go to your dentist, you may have your personalized regime for how to brush your teeth and how many times a day. But, generally, as a rule, we recommend two minutes twice a day.
Brush Your Teeth
What Happens If You Don’t Brush Your Teeth?
Restore your smile and your health with the help of dr. Laleh and her associates visit www.silverhilldental.com to schedule your appointment today.
Can You Brush Your Teeth Too Much?
You can brush your teeth too many times a day, and you can brush your teeth too hard. over-brushing can lead to damage to your teeth. in the long term so it can lead to tooth surface. loss brushing your actual guns away, and brushing your teeth away. we recommend that you brush your teeth with the correct technique. brush your teeth twice a day and for two minutes at a time. in some instances for example if you have braces or gum disease you may have a personalized plan as to how often you’re meant to brush your teeth, so for example if you had braces you would have to brush your teeth after every time you eat, or he had gum disease. you have increased brushing, but your dentist will go over how many times is correct for you. but generally speaking most of the population should be two minutes twice a day.
What Happens If You Don't Brush Your Teeth
Skipping one brushing session is not a major problem as long as you resume your normal brushing on the following days.
30% of Canadians don’t brush their teeth the recommended two times a day and 2% don’t even brush their teeth at all.
If you continue not brushing your teeth you’ll have a buildup of plaque, debris, food debris, calculus around your teeth, which will then lead to bleeding gums, tooth decay, bad breath and several other problems.
It can also be enough time to allow some of the soft plaque to harden into the calculus that you cannot remove by brushing.
For the patients who haven’t been brushing their teeth or haven’t brushed their teeth for a few years, essentially in the end they may end up losing their teeth and they may have to go for things like dentures or implants.or implants.
What Happens If You Don’t Brush Your Teeth?
How To Brush Your Teeth Properly With A Manual Toothbrush
Using a manual toothbrush is completely fine. You can use a bamboo brush, as well, if you want to. It’s a bit more eco-friendly, rather than the plastic ones.
Electric toothbrushes can be a bit more efficient, but with a manual toothbrush, you can reach really good oral hygiene, as well, as long as you’re using the correct technique.
We recommend that you use the bristles of your toothbrush, and you come in at a 45-degree angle to the actual gum margin, and then you rotate the toothbrush so that you are removing all the debris from around the tooth. So, it’s a 45-degree angle, rotate it, a nice circular motion.
And then, you slowly sort of gradually move forward. Each tooth you should do, so probably about five rotations, just to make sure that you do it enough time to catch all the debris.
First of all, recommend that you do the outside surfaces of the tooth, and then you go on to the bite surfaces. Same thing in a rotational manner.
You must try and get the bristles of the toothbrush to go into all the nooks and crannies of all the teeth. And then, the inside surfaces of the teeth.
Same thing, 45-degree angle, so almost the bristles of the toothbrush are almost sort of poking right into the gum margins, removing any bits of debris that might even be underneath the gum margins Circular motion, each tooth, about five times. And then you gently move forwards. You do it to the front.
I would recommend that you spend 30 seconds per quadrant.
A quadrant is from your front tooth to the back tooth, on saying the upper-right-hand side, then the upper-left-hand side, lower-left, and then the lower-right.
So 30 seconds per quadrant would make it up to two minutes all together brushing your teeth. And I recommend you do that twice a day, morning time and night time.
Replace your toothbrush every three months, or sooner if you’re looking at the toothbrush bristles and you find that they’re worn, misshapen, or flat.
Should You Rinse After Brushing?
When you brush your teeth with toothpaste, be sure to spit out your toothpaste but not rinse your mouth after it.
The toothpaste has to have contact with your tooth over a long period for it to work, and for the chemicals inside the toothpaste to have the benefits.
Make sure that you don’t use mouthwash straight after as well.
You can use mouthwash, but at a different time to brushing your teeth.
This way you get the best benefits from your toothpaste and your mouthwash.
When you rinse your mouth after using your toothpaste, you’re removing the fluoride and you’re removing all the goodness of the toothpaste away from your mouth.
If you don’t rinse your mouth out and you just spit the excess toothpaste out, and you leave the rest of the toothpaste in contact with your teeth, you’ll have greater benefits from using that toothpaste.
After you’ve brushed your teeth, try and leave it at least half an hour before you have anything to eat or drink, that way you’ve got the best chance of the toothpaste having a good effect on your teeth.
The other thing we’d recommend is that if you brush your teeth at night time, try and brush it last thing at night, so you then just go straight to bed. You don’t have anything to eat or drink afterwards, that way you’ve left the toothpaste contact in your teeth for the longest time.
Is Chewing Gum Bad For Your Teeth?
Many people may think that chewing chewing gum is bad for your teeth.
Chewing gum can help prevent tooth decay, as long as you choose a sugarless gum. This may not be the case if it’s sugar-free chewing gum, and you have it 20 minutes after having your meal.
Chewing chewing gum can stimulate saliva in your mouth, and it can help to neutralise the acids in your mouth to give a healthy environment.
Most chewing gums actually have artificial sweeteners such as aspartame, xylitol, and sorbitol, which don’t actually cause cavities, and make the chewing gum quite sweet, as well.
Brush Your Teeth
Leave a Reply
Subscribe weekly news
Join our newsletter and get 20% discount
Promotion nulla vitae elit libero a pharetra augue |
Airports were shut down for drone threats and have been all over the news. Heathrow and Glasgow were shut down by eco-activists using drones to gain attention. Other airports, Newark, Dubai, Dublin have been shut down for security concerns over drone sightings close to the airport.
The British government is moving to approve more strict restrictions over drone use, as well as giving the police and law enforcement more powers to seize, search and control civilian drones.
Are concerns well-founded? Is the government overreacting to threats of tiny drones? Do we need more regulation and police power or civil voluntary policies?
Today we’ll discuss many of these topics, and try to shed some light on some important issues involved.
Drones getting more popular
Drones are getting more popular, and rightfully so. They have many legitimate uses. From farming to photography, amateur recreation to ecological conservation, they provide many benefits that no other technology can. According to drone deploy industry report, construction site safety is improved by 55%, using drones. So far, 133 lives have been saved, thanks to drones. 1000 acres of farmland can be inspected in a single day by a drone. Surveying time for a 12-acre property is reduced to 2 hours from 100 hours, using a single drone. And homes with aerial pictures are sold 68% faster. And as the demand increases, and so do the number of drones flying in the sky.
In the US alone, according to the FAA, there were around 1.1 million drones by the end of 2017. That number is estimated to reach 2 million by the end of 2019. With this growth rate, by the end of 2022, FAA estimates there will be 2.4 million drones in the skies of USA.
Globally, there were already more than 3 million drones in 2017, and FAA estimates there will be more than 7 million drones, all over the world, by 2020.
To put things into perspective, there are 23,000-39,000 airplanes in the world today.
Of course, as numbers grow, so do concerns. Drones can invade privacy, mess with radio waves, cause property damage, and even, cause aircraft to crash.
In this article, we will mostly be focusing on the last risk, damage to aircraft and risk of crashing aircraft.
Drone damage vs bird damage
But aren’t aircraft already designed to withstand birds crashing into airplanes? Birds in the air can reach a mass of 4-8 pounds, and many times, planes fly into birds, sometimes even flocks of birds at full speed. And most consumer drones are much smaller than that, and a small drone in a big sky doesn’t really pose too much of a risk, does it?
Well, the reality is more complicated than that. First of all, drones are much different than birds. Birds are made of feathers, meat, and bones, drones are made of plastic and metal. Drones, therefore, have a more concentrated mass and have a more rigid structure. Further, there is always a possibility that radio signals from drones can mess with electronic or communication systems of a plane. Also, birds do have senses that generally makes them avoid large and noisy planes. While drones also have collision avoidance systems, they usually are designed to detect stationary objects or other drones, and not planes flying at full speed.
While there has been no reported plane crashes due to drones yet, as the numbers increase, so do the risk of collusion. Even if a small drone is unlikely to cause a large airliner to crash, a drone hitting the engine can still cause millions of dollars of material damage. Windscreens can be another vulnerable area.
However, there are 10 billion birds in the USA airspace alone, with thousands of collisions with aircraft reported each year, and none yet with a drone. So far, drone collision with aircraft is only a hypothetical risk, while bird damage is the #1 actual risk factor for planes.
Rules and regulations
Rules and regulations have already been around for a long time. Main FAA guidelines are simple:
• Fly your drone at or below 400 feet.
• Keep your drone within line of sight at all times
• Never fly around other aircraft, esp around airports
• Do not fly over groups of people
• Do not fly over group events such as over stadiums or concerts
• Do not fly over emergency response events such as fires or earthquakes
• Do not fly under the influence of alcohol or other drugs
• Be aware of airspace requirements, such as no-fly zones.
Now, some of these are common sense. Some others, create debate among users. For example, hobby pilots flying using first-person view cameras argue the line of sight rule is unnecessary. Some other rules, change according to country and local laws, such as how far away from an airport you must be to fly a drone. These make things difficult to manage, as the number of drones and drone pilots increases over time. Not everyone drone pilot can be %100 aware of all the requirements, and where the boundaries lie.
Drone Apps
Now, of course, technology also brings solutions to such problems. There are smartphone and drone apps that make a simple task out of being aware of the guidelines, rules and regulations in your area. In the USA, the B4UFLY app is a free app that is developed according to FAA and government guidelines and is freely available.
Different apps also exist for different countries and locations, like AirMap, OpenSky, and Drone Assist, as well as apps specific to each manufacturer.
While there are a lot of concerns about the increasing number of drones in the sky threatening public safety, so far all concerns about drone collision with planes are hypothetical, while birds crashing planes are very real and still #1 cause of real concern.
As with any public policy decision, making a rational decision about drones and safety will require more data, more input from everyone involved, and time to see which policies result in the desired results. |
Everybody’s Doing It. Or, Are They?
Everybody’s Doing It. Or, Are They?
October 25, 2017
Jill Royston, student assistant specialist for NEWESD 101
Guest Contributor
As a substance use counselor in a local high school, I hear daily about the ways youth are using marijuana and the reasons they use. I have also heard an array of myths about the drug. Curious about what youth are saying? Here’s what I hear most often:
“Marijuana is an herb, it’s all natural, and it won’t hurt me.”
“Marijuana helps people with anxiety.”
“Everyone does it, so what’s the big deal?”
First and foremost, it’s important to remember that talking to the youth in your life about substance use is important – and it makes a difference. Research supports that youth who think their parents and community believe that marijuana use is wrong are less likely to use it. Talking about it, sharing your expectations and concerns, and making sure youth know they can talk to you are important steps to helping prevent youth marijuana use. You can use these conversations to make sure they know everybody isn’t doing it.
“Marijuana is an herb, it’s natural, and it won’t hurt me”
Marijuana is a a different kind of herb in that it contains a psychoactive ingredient that causes people to feel “high” and impacts the brain in other critical ways. Marijuana can have negative effects for young, developing brains. Separate parts of the brain develop at their own rates and become fully functioning over time, not reaching full development until around age 26. One effect on a still-developing brain includes decreased motivation, which can impact grades and relationships with peers and family. Marijuana use may also affect memory and attention span, making concentration difficult. Other impacts of marijuana use include impaired judgement while driving, leading to a DUI or risky sexual activity. There’s also risk for addiction. Compounding these risks are steadily increasing amounts of tetrahydrocannabinol, or THC, the main mind-altering ingredient found in marijuana—impacts of using higher concentrations of THC are still being researched.
“Marijuana helps me focus, sleep, and helps me with anxiety.”
Marijuana can impact people in different ways and many factors influence what a person experiences including how much a person uses, potency, and a person’s tolerance. Immediate effects of marijuana can include euphoria, physical changes, and in some cases, adverse mental reactions including anxiety, fear, distrust, and panic. Some users may also experience psychosis that may include hallucinations, delusions, paranoia and loss of the sense of personal identity. For some users, marijuana may make a person feel more relaxed and sleep easier. However, some studies have shown that frequent marijuana use shortens REM sleep, the valuable time our bodies use to store information. When a person who frequently uses marijuana stops using, they can find sleep difficult, signifying that the person may be going through withdrawal. If you are talking with youth about marijuana use, encourage other, healthier strategies they can use to manage anxiety. High school counselors, therapists, and primary care providers are excellent resources for this information and so is the Listen to Your Selfie website, created to promote avoiding marijuana in pursuit of other goals.
“Everyone does it, so what’s the big deal?”
The big deal is that everyone doesn’t do it. When it comes to youth, they commonly overestimate the number of their peers who participate in a behavior (this is also true for alcohol and tobacco). In Spokane County, among 10th grade youth, one in six youth self-report that they have used marijuana in the past 30 days. One in six 10th grade youth self-report that they have used marijuana in the past 30 days - this means that most students aren’t using marijuana. When a youth tells you that “everyone is doing it,” you can explain to them that their perception is wrong. If you need the data to support it, check out Healthy Youth Survey for more information. It’s also important that youth understand the law. Using marijuana is against the law for people under age 21. You can find out more about the law by going to the Liquor and Cannabis Board’s website. |
How to Choose an Electric Bike
Electric bikes come in a wide range of designs and prices. Choosing one means matching bike weight, motor power, and battery life to where and how the bike will be ridden.
Motorized bicycles, commonly referred to as e-bikes, are relatively new in the US and Europe although they have been popular in China for many years where sales actually out-strip motor cars. A single speed e bike is an ideal option for cyclists wanting a little help on hill climbs and for commuters looking for a sweat-free economical mode of transport.
Before rushing out to buy an electric bike that in theory does all the hard work for you, it is important to understand that an electric bike is designed to offer assisted pedaling as opposed to totally motorized cycling. Whilst the motor can do much of the hard work, especially on hills, the rider is still required to pedal.
In order to keep electric bikes within the bicycle category, speed is limited to between 15–20 mph, dependent on a country’s motor vehicle classification laws. Riders may want to go faster than this which is where pedaling without using the motor comes in. Bicycle weight then becomes very important.
Electric Bicycle Weight
The heaviest parts on an electric bike are the motor, frame, and battery. Cheaper e-bikes tend to have heavier motors and batteries which are fine for petite Chinese commuters weighing around 50 kg but not so great for the average 70–90 kg Western adult. The heavier the electric bike, the harder it is to pedal unassisted. This results in increased use of the motor with the possibility of overheating if used for too long and reduced range as the battery runs down more quickly.
Whilst manufacturers are constantly working on ways to reduce frame weight, the average electric bike still weighs around 30 kg, more than twice the weight of an ordinary bicycle. Those looking for a lighter option, therefore, need to look closely at the type of motor and battery used.
Electric Bike Motors
Motor power determines how fast the bike will go. Speed varies according to rider weight and wheel size as the same motor attached to a 20” wheel has to turn faster when attached to a 24” wheel to reach the same speed.
Most electric bikes use hub motors which are self-contained, largely maintenance-free, and are directly attached to the wheel hub which adds considerable weight to the rear wheel. As they are mass-produced, however, they are cheap.
More expensive electric bikes use brush motors, offering higher speeds and better torque which translates into more power. Brushless motors are a cheaper hybrid offering reduced maintenance as they are less likely to overheat.
Electric Cycle Batteries
The battery supplies power to the electronic motor. A fully charged average battery’s range is normally between 12 to 30 miles with gentle pedaling, the actual distance varying according to the weight and size of the rider, and the terrain being ridden. Smooth, dry pavement, for example, will give a much higher range than wet grass or loose dirt.
A rider must be prepared to pedal when moving off or on hills otherwise battery power is severely drained.
Electric battery types vary from the common, heavy lead-acid types used in cars to lightweight and expensive Lithium-Ion batteries.
An important factor when looking at electric bike batteries is their recharging time. Cheaper lead-acid batteries can take 8 hours to fully recharge whilst more modern Lithium batteries take just a few hours.
Cost of Electric Bikes
Prices range from as little as $200 for cheap Chinese designs with heavy lead-acid batteries up to $3,500 for lightweight designs using the latest battery technology. A reasonable quality e-bike will cost around $2,500 so it’s important to look at all the variables before making a decision. While some mainstream bicycle brands like Trek, Schwinn, and Giant produce e-bikes, most models are produced by niche brands, specializing in motorized scooters and mopeds.
Buying an Electric Bike
With so many variables in motor power, battery type, rider weight, and actual bike design, the only real way to tell if an electric bike is right for an individual rider is to take it for a test ride, preferably on the terrain most likely to be used.
Compare motor power, battery life, recharging times, and overall bike weight and, above all, be prepared to put a little effort in on hills and start-up before deciding to join the next revolution in eco-friendly transport.
Join the discussion
Please note
|
Fast Fashion vs. Sustainable Fashion and Design
Today I would be talking about Fast Fashion vs. Sustainable Fashion and Design. We all know that fast fashion shows garments made with machines, produced in high quantities, priced lowly, and then would have a deficient quality. They are the type of products that ends up in landfills.
Slow fashion garments are those that are made using hand. They consume a lot of time, and they are done using a high level of talent. They have high prices and have very high quality.
These slow fashion clothes are comfortable and warm even after washing them over a while. They could last for a lifetime.
Sustainable fashion is concerned with making use of upcycled, repurposed, organic materials. The selection is made by opting for materials with a reduced amount of chemicals, minimal impact, less waste, less resource, energy, and dyes.
Slow fashion
The author of Sustainable Fashion, Kate Fletcher, explained the essence of shifting to a more sustainable fashion industry. This word was coined when she followed the prolonged movement of food. The main property of slow fashion is that it is produced with high quality and not in bulk. This is done with a high emphasis on craftsman skills. The raw materials are gotten locally as products are made with hands. All steps are checked gently, which makes the entire process very expensive.
This slow fashion serves as an ethical bond between raw materials, the environment, and the labor force. The traditional and classic design methods of creating clothes and fabric are parts of it. This languid fashion is not seasonal. It doesn’t work as a trend, though. They all take time to produce and prepare, and they all have purposes with high levels of intention. This approach looks at the complete life cycle of the entire product. These are targeted and sustainable to serve for a very long period. These are available in tiny stores and not available in large retail outlets. Annually there are limited collections.
What choices do people have?
Different people choose to purchase high-quality things; bio is degradable, limited edition, organic, primarily natural too. This is the result of the high amount of awareness caused by the harmful effects of speedy fashion.
My thoughts on Fast Fashion Vs. Sustainable Fashion and Design
The thing is, the way everyone lives presently, we wear clothes for different reasons. Sustainable fashion and design are essential if you have essential places to go to, like a wedding or graduation or a classic dinner. Do you get it? But if you are staying at home. Not going anywhere special, there is no need for you to wear fancy cloth. That way, you can quickly wear something that was created massively. In other words, fast fashion has its time to shine; sustainable fashion and design also have their time to shine. The important thing is that you wear them when appropriate. |
Every year as soon as I start using Frayer Models because that vocabulary I have to teach what non-examples room to my students. College student are provided to working in a human being of developing examples and also rationales behind their learning but not defining what their learning isn’t.
You are watching: What is a non-example
What is a Non-Example?
A Non-Example is simply helps define a new term in it’s whole using the attributes that room given and determine what the ax is not.
Let’s take words proportional…
Based ~ above the an interpretation and characteristics given by my students it is really easy to watch that to create something the is proportional both sides have to be equivalent. As you have the right to see in creating a non-example the students created a proportion that did not become equal once cross-multiplied.
Starting lessons v examples and also non-examples help to build a foundation and clear up concepts prior to you gain too deep right into the learning. When students don’t begin with a foundation of what a ax or concept is lock can continue to focus on that term and miss out on other crucial material. Because that my teaching this was a an essential comprehension action for many of mine students.
While speaking v some various other teachers about using Non-Examples in their classrooms I got some great opinions.
As you can see from these teachers, as well as my experiences, using non-examples is something the we should do in our classrooms. Non-examples don’t constantly have to be excellent in the type of a vocabulary definition. Another way to use them is through a ide sort or Venn diagram. What is one thing? What is another thing? Why is it the way? acquire students talking about why lock think something can be classified in one area and also why no in another.
How execute you usage non-examples in her classroom? do you struggle with student’s knowledge of what miscellaneous isn’t? Let’s comment on in the comments.
See more: Flick Fact: How Many Baseballs Used In A Game ? How Many Balls Are Used In A Baseball Game
And, if you are looking for further ways to usage Examples and also Non-Examples in her classroom, inspect out the Examples and Non-Examples article over at It’s scholastic Tutoring Center’s blog together they give some great insight on exactly how using these methods can aid the structures of learning.
Join the VIP List now to gain immediate accessibility to the cost-free Resource Library solely for VIPs as with you! |
Call Us:- +91-9090131385
All You Need to Know About Malaria
All You Need to Know About Malaria
Most of us do know that USA eliminated malaria in 1950. While the same year, in 1950, about 20% of the Indian population was infected with malaria. We do need to know the basic facts about malaria.
“Does anybody know that malaria is the number one killer in the history of mankind killing up to 50 billion people till now? In other words, 5000 crore people have died because of malaria.”
When we went to medical school in 1980s, most of the malaria was caused by Plasmodium Vivax or Plasmodium Ovale. But now malaria is mostly caused by Plasmodium Falciparum which is actually very dangerous.
Back in our time in 1980s, Plasmodium Falciparum was only in Africa and obviously it has started coming to India now. While practicing for last several years in India, I have come to a conclusion that most of the fevers are mainly caused by 4 conditions either by flu, or by dengue, or typhoid, or malaria.
In malaria, we mostly have chills and shivering. The fever spikes every second or third day. But what we have to understand is that plasmodium falciparum can really be fatal unlike other plasmodium or malarial parasites back in 1980s and 1990s. So, we have to take it very seriously.
I am sure everybody knows that malaria is transmitted by the mosquito and that too only very specific mosquito which is a female Anopheles mosquito. It needs human blood, or it needs blood for the maturation of its eggs.
We have written two books for the people who travel from advanced countries – where there is no malaria, to India or Africa – where they really need to take precautions for not getting malaria. And, how to do that, is mentioned in our books on Malaria.
• Book 1: Add 15 Years | Why Do We Need to Know About Malaria?
• Book 2: Add 15 Years | Are You Travelling to High Risk Places of Malaria?
In less than 10 minutes, these books give you the basic medical facts about malaria and malaria bug.
Now, we live in advanced countries or developed countries which have very excellent public healthcare like US, Germany, France, England, etc. Like mentioned above, USA eliminated malaria in 1950s whereas malaria is very prevalent in countries like Africa and India. They still have a long way to go.
In this globalized environment now, we travel right and left to different countries for different reasons. Our Indian community is everywhere, almost in all the developed countries and they obviously go back and forth to visit their families in India and in such a situation, they really need to prepare themselves to take medications which prevent from getting malaria during their visit to India.
There are only 3 medications, all over the world which we use for malaria prevention. These are as below:
1. Atovaquone-Proguanil
2. Mefloquine
3. Doxycycline
I have given the recommendations about how to take them, and what are pros and cons of each medications. These medicines are for prevention of malaria and not for the treatment of malaria. These medicines are still the prescription medications but at least you can decide which medication is the best for you if you are travelling from a country with no malaria to any country which has prevalence of malaria.
Corona Books |
Giant Ibis
Giant Ibis by AFC
Thaumatibis gigantea by Kathryn Weisberg
(8 in. x 8 in. | Oil on Canvas | ID#4218)
Family: THRESKIORNITHIDAE | Conservation Status: Critically Endangered | Population Trend: decreasing
Artist Statement
The Giant Ibis is a huge version of the lesser ibis seen in the Florida wetlands and elsewhere. It has declined in its native South-East Asian range and is now critically endangered, known to breed only in northern Cambodia. Because Giant Ibis prefers to nest away from villages in deciduous forest areas. It selects large tall trees for nesting and success is usually around 50% with losses due to predation by civet or marten. Researchers and conservationists have placed predator baffles on trees improving nesting success significantly and the solution was amazingly cheap. Giant Ibis prefers foraging further away from villages, at larger pools with larger mud areas where there are greater abundances of frogs and mole-crickets. Frogs are the species's main prey, followed by unidentified 'insects', mole-crickets, larvae and eels. Fire reduces the abundance of mole-crickets, and draining reduces the abundance of eels as local human pressures increase. Maintaining water in pools throughout the dry season is crucial to maintaining prey abundance. Nest protection should increase productivity and play a key role in recovering numbers. We need so desperately to make room on the planet for our dwindling non-human neighbors. Just knowing they are there enriches our lives enormously.
Ship to:
Find a Mural Print |
Editorial Feature
Sustainability in the Aerospace Industry
Airbus A350 XWB flying at the Paris air show, supposedly the World's most efficient aircraft.
Image credit: Frederic Legrand - COMEO / Shutterstock.com
The aviation industry has a strong history of commitment to the environmental impact of all aspects of aerospace manufacturing, and civil aviation travel. Over the last 50 years there has been a 70% reduction of fuel-burn/passenger-Km, and the aviation industry continues to have a commitment to achieve further emissions reduction and production impact and costs.
As part of this, in 2012 the International Civil Aviation Organisation (ICAO) produced a briefing document for the United Nations Rio+20 conference on Sustainable Development in Rio, Brazil. This outlined ICAO's ongoing commitment to sustainable development in all areas of the aerospace industry.
The briefing committed ICAO to development of global solutions for the continued sustainable future for international civil aviation in partnership with industry, interested UN agencies and relevant NGO's. To achieve this the aviation industry has, and continues to, develop sustainable aviation fuels and manufacturing practices.
The Road to a Sustainable Future for International Aviation
The Road to a Sustainable Future for International Aviation.
Video credit: ICAOvideo / YouTube
Sustainable Aviation Fuel
The ICAO briefing document makes clear how much the aviation industry is committed to sustainability. The UK aerospace industry is the largest in Europe and its ambition in achieving sustainable fuel production, includes measures to reduce carbon emissions that will contribute to a reduction of the CO2 produced by 2050, of 24%.
This will result in the creation of between 90 and 160 operational fuel plants worldwide, and in the UK alone developments in the sustainable fuel industry that could contribute up to £265M by 2030. This would support 3,400 jobs, with a further 1,000 jobs generated in global exports.
The necessary R&D needed to achieve this focuses on the possible use of sustainable biofuels, and the contribution which their use by UK aviation alone could contribute to CO2 emission levels by 2050 is of the order of a 15 to 24% reduction.
British Airways and Virgin Atlantic are 2 UK companies which are making use of developments in this area. BA plans to use by 2015, fuel manufactured from Europe's first sustainable jet-fuel plant that will generate a biofuel that has been converted from a variety of carbon-based feedstocks that were destined for landfill.
Virgin, from around 2014 will be using a jet-fuel that has been chemically converted from ethanol using a naturally occurring microbe. The ethanol having been fermented from various C-O gases captured from steel production.
An aerial view of a modern biofuel production facility.
Image credit: Stockr / Shutterstock.com
This process recycles carbon and the biofuel produced has a carbon footprint approximately half or less that seen with kerosene. There is a recommendation within the industry that a 50% reduction in life-cycle greenhouse gas emission is currently the yardstick for a sustainable biofuel.
The impact of sustainability measures for aviation fuel must go further than just emission levels. The aviation industry has committed to ensuring that the manufacture of biofuels must not displace or compete with food crops or cause deforestation, minimise the impact on biodiversity, produce substantially lower life cycle emissions than fossil fuels, be sustainable with respect to land, water & energy use, and deliver positive socioeconomic impacts.
Regular commercial use of aviation biofuels must become economically viable and cost-competitive over the long term. There are many that are not in the short term. This is an area where government policy is needed to target reduction of investment risks.
In the long term though biofuels for aviation are expected to become competitive because of projected increases in fossil fuel prices and the application of carbon pricing in global economics, with increasing costs of carbon.
Sustainable Manufacturing Practices
Present and future sustainable aerospace R&D involves not only research into sustainable biofuels but also manufacturing practices. This focuses on production modification and facility practices.
The aerospace industry trend has seen a gradual but clear shift to fuel efficient vehicles and future generations of planes incorporate new materials that have lower processing costs and using more composite materials which do not require environmentally harsh metal surface finishers and product improvement which improve existing aerospace products when the cost of new products becomes too high.
For example, Boeing are working on using parts in their early versions of the 767 which improve lift and the environmental burdens encountered during use. There are also a number of facility level practices being undertaken, which can be divided into two categories - regulatory and general.
Boeing 767 S7 air undergoing a maintenance procedure.
Image credit: aapsky / Shutterstock.com
Regulatory initiatives ensure environmental legislation is adhered to and the relevant certification status, or external or internal code of conduct is met. The general practices are on the whole voluntary open ended. Also they do not require certification.
Regulatory Compliance
All facilities used for aerospace manufacturing must follow guidelines made by the applicable governing body. These are designed to maintain and ensure levels of quality for air, land, and water. Typical guidelines include legislation to ensure a comprehensive environmental response compensation and liability; clean air; and safe drinking water.
The Aerospace industry also work to attain certification which demonstrates their progress with implementing environmental policies.
One such certification is the Leadership in Energy and Environmental Design (LEED) certificate. This certificate reflects the specific sites' commitment to the implementation of environmental policies.
There are also company specific internal initiatives. These vary from company to company, but a typical example can be seen within Boeing, who introduced a workshop that ensured the company was helped to streamline the company and reduce inefficiencies and waste which benefited the company right down to the manufacturing floor level.
General Initiatives
These are very wide ranging in their scope and how they are implemented. However they are generally common practice for the aerospace industry leaders. To cover the extent of the variety of these initiatives would require a separate article but they cover areas such as recycling drives, awareness campaigns, outreach programs and public transportation promotion initiatives.
Specifically companies can implement improvement in plumbing for employee facilities; use of more efficient light and heating & cooling controls. These initiatives are also used in the application by companies seeking some of the certificates mentioned earlier.
We have seen in this article the extent of the aerospace industry's commitment to sustainability, and what it has already achieved in this area. This is making an important contribution particularly as we move towards the UN conference on Climate Change in Paris at the end of this year, where 196 countries will be signing up to binding commitments to reducing CO2 levels.
1. Eric Fisher Eric Fisher United States says:
Ethanol probably not a good path. Should consider liquid hydrogen made with solar panels. Solar panel are 15 times more efficient than corn crops in energy conversion.
Tell Us What You Think
Leave your feedback |
Jesus Christ
Jesus of Nazareth, commonly referred to as Jesus Christ or simply as Jesus or Christ, is the central figure of Christianity. Most Christian denominations venerate him as God the Son incarnated and believe that he rose from the dead after being crucified. The principal sources of information regarding Jesus are the four canonical gospels, and most biblical scholars find them useful for reconstructing Jesus' life and teachings. Some scholars believe apocryphal texts such as the Gospel of Thomas and the Gospel of the Hebrews are also relevant. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.