text stringlengths 144 682k |
|---|
Another way to write a character analysis
A strong character analysis will:
1. identify the type of character it is dealing with.
2. describe the character.
A different approach to writing a character analysis
If you are having a panic attack, or its milder equivalent, of writing a character analysis, consider treating it as a personnel review. Pretend you are the manager and these three characters (or five or six) are working for you. What would you say about them?
Remember a personnel review will typically cover these items:
quality of work
job knowledge
relationships with others
customer service
work habits
Which of these can best be used (in character analysis of the play Oedipus Rex) to describe Oedipus? Creon? Jocaste?
A problem to avoid:
Many evaluations contain too few facts and too many opinions. What the evaluator believes to be true (opinion) is frequently accepted as truth without question, challenge or reservation. Corroboration backed by facts is often missing.
from How to write better employee evaluations
And how to do a good job from the same source:
Seek input from other observers when appropriate.Base written evaluations on multiple, first-hand observations.Know what you’re looking for. Evaluate the right things. Concentrate exclusively on factors directly related to job performance….Focus on improvement. Use the evaluation to set goals for better performance.
…Be as specific as possible. Use examples. Glittering generalities don’t help much in targeting action or improvement plans.
…Choose words carefully. The goal is clarity.
Just some thoughts for your character analysis on Oedipus.
An example of stock questions asked on an employee evaluation that you might use can be found here. It is from New York.
Another presentation on personnel reviews is this one from New Mexico.
Obviously not all of them will be relevant for the play, but they are still interesting to think about.
4 thoughts on “Another way to write a character analysis”
1. Thank you John, Dr. Davis for this very well represented piece on writing character analysis. The main point ofcourse is the purpose for which it is being done. It could well be for
All the above mentioned purposes and
Matrimonial purposes
Lending or Tenacy purposes
simply literary purposes
Literary criticism in itself is vast in its treatment since the college entry level student cannot be considered at par with the rest of the groups who have been there longer.
Personally speaking as a teacher I would recommend a phased exposure to the different types of characters so that the students don’t get bogged down by the wide range.
The main problem in Indian colleges being faced by the teachers is to get the students to write independently, their own opinions on things they read.
Its easier to borrow from others and present the same market notes as assignments.
They do not want to read the original texts. Its too time consuming and probably they would much rather be doing something else.
2. Dear Dr. Davis,
Thank you for the no-nonsense approach to writing character analysis. I am an English teacher (for 30 years) in a small private school and am teaching Sophomores for the first time in 25 years. Your article/blog has certainly made my job easier.
3. This was very helpful. The interview skills perspective definitely helped me to look for examples throughout the book to back up the analysis.
Leave a Reply
CommentLuv badge |
Indo-Pacific and India’s Prospective Role
Override the digital divide with additional clickthroughs from DevOps nanotechnology immersion.
The term Indo-Pacific travelled a long way from Ocean biology to the political and diplomatic sphere; i.e., from utter clarity to complexity and ambiguity. Indo-Pacific as a geopolitical construct is confirmed with a wide gap as to what Indo-Pacific will comprise of. Interestingly while the mapping of Indo-Pacific is still going on; the stakeholders of Indo-Pacific like the United States, Japan, Australia, ASEAN and India were enthusiastically defining the region focusing on their centrality. With so many vying for centrality, institutionalisation of Indo-Pacific and the conception as a region becomes problematic. Hence to study Indo-Pacific as a construct, a concept or a region individual country’s perspective had to be considered. Certain questions emerge eventually, Is Indo-Pacific essentially a US strategy towards Asia to contain China and to evaluate its declining hegemony? Can Indo-Pacific regionalism take place and sustain? Can the geopolitical construct of Indo-Pacific be socially and culturally constructed in order to become a region? Will Indo-Pacific regionalism resemble East Asian regionalism or will it have unique characteristics contributing to World Order? The attributes of a region is to be collaborative, interactive, cooperative and contributory in nature not necessarily aiming at security and economics alone. Questions galore, nevertheless Indo-Pacific is certainly taking the form of a region with more and more littoral countries acknowledging the region as one entity.
Indo-Pacific has not emerged from a vacuum, the two-ocean theory have been floating in the region from as early as in 1980’s (especially in Australia). Many attempts were made to bring the region together, Mahathir Mohammad, the Prime Minster of Malaysia called for a ‘East Asia Economic Caucus’ in 1997 which was not accepted and later in 2008 Kevin Rudd, Australian Prime Minister had proposed for ‘Asia-Pacific Community’ which was also rejected by the regional countries. Japan had for long initiated the idea to thwart Chinese threat. By 2012 ‘Indo-Pacific’ clicked, it may be due to the fact that US proposed it and also because its purpose to balance China has been acceptable to all. While Australia and Japan are clear as to what their role in Indo-Pacific will be and are even trying to institutionalise the concept; India is still contemplating, and US under Donald Trump and his policies has slowed down ‘Indo-Pacific’. Indo-Pacific can gain momentum only when it is bound by institutions with definite agenda, structure, mode of operation and the will of the rising powers of the region. Indian Ocean Regional Association (IORA) is one such institution which requires being much more effective to the regional demands. India’s effort through Indian Ocean Naval Symposium (IONS) could also be viewed from the same perspective with a maritime focus. Asia-Africa Growth Corridor (AAGC) is another initiative to enhance the sense of regionalism between India and Japan on the one hand and formalising the scope of Indo-Pacific by involving African states in cooperation and development. Institutionalisation is complete only when the region gains a concrete definition and mapping with borders and full conviction of the regional countries. Mark Beeson, in his article on ‘Institutionalisation of Indo-Pacific…” mentioned that “institutions have the capacity to guide and shape behaviour through the logics of appropriateness and consequences.” Such a process to occur requires leadership and the question is which country/s or which existing institution would take the lead.
The quadrilateral arrangement between US, Japan, Australia and India could possibly take the initiative in institutionalisation but ‘Quad’ is still an idea, while Japan and United States were enthusiastic about it India and Australia are apprehensive to their expected role. Malabar exercise sans Australia is a case in point. Both fear Chinese wrath but also want to contain China at the same time. Instead of a quadrilateral alliance, a trilateral cooperation is rather successful ex; India-Japan-US trilateral ever since 2011 and the latest in July 31, 2018, US-Japan-Australia trilaterally signed MOUs to support investment in infrastructure and promote economic development in the Indo-Pacific region. Donald Trump’s domestic and foreign policy approach made the friends and enemies look alike making the future of Indo-Pacific rather bleak. Quad is not moving at the moment in any desirable direction that could have helped Indo-Pacific. Moreover ASEAN is left out of this group which is a natural Indo-Pacific partner. The next best thing could be India taking the initiative to institutionalise the region. Since India was given the role of a ‘net security provider’ of the Indo-Pacific and also because India considers itself to be the protagonist on the Indian Ocean.
India has to acknowledge the role it could play and an opportunity it should not miss. India’s assumption of Indo-Pacific is wider, engulfing the Bay of Bengal on the eastern Indian Ocean and stretching towards Malacca Straits and the Pacific Ocean including the Pacific Island nations and the Arabian Sea on the other side of the Indian Ocean thus bringing forth the countries from the western choke points like Strait of Hormuz and Bab el- Mandeb. This makes the institutionalisation process more complex but then these countries are members of IORA as well and hence bringing all the countries under one banner for cooperation and sustainable development would not be difficult. India’s plurality will help further in bringing the region together. Institutionalising Indo-Pacific will build a strategic and institutional landscape to maintain a code of conduct of the Sea Lines of Communication and work for freedom of navigation and movement on the sea-air spaces and to prevent the region from being dominated militarily and economically by any single country. The concept is not just to understand, check and balance Chinese rise but to enhance regionalism in the world of interdependence. How well India will fair depends upon how fast Indian policy makers respond to ‘India’s role in Indo-Pacific’. India has no official statement or document defining Indo-Pacific strategy till now is a matter of concern.
The Indo-Pacific region is one of the largest entities of growing economies and political perplexities. The tall order for Indo-Pacific is to have its own security regime to thwart civil wars and ethnic cleansing while dealing with hunger. Indo-Pacific is the region where 2/3rd (may be more) of world’s poor living with lack of proper governance mechanisms. Can India frame the security architecture and build a security regime in Indo-Pacific and control arms race, prevent formation of clusters which could hamper Indo-Pacific regionalism? Does India’s material capability and diplomatic capacity allow it to take a leading position for such a big endeavour? Regionalism in the present times involves ‘economic globalisation’ and pluralism while ‘contributing to the World Order’. India’s ‘exceptionalism’ in its foreign policy making could be of help in understanding the region. Though India was one of the founder members and having a leadership position in Non Aligned Movement (NAM) India failed to be a facilitator. India’s role in Indo-Pacific will be quite different from NAM (except for strategic autonomy) with alliances, cooperative security, sustainable developmental measures, economic transactions and educational and cultural exchanges. Once again greatness is thrust upon India and India’s slumberous poise is yet to be deciphered. India has a tremendous potential to be a constructive player of the Indo-Pacific and the policy makers need to take heed of it.
Dr. Shubhamitra Das
Leave a Reply
About us
India is marred with a complex social, economic and political structure, which requires innovative solutions to solve the most difficult problems of today. India is also a land of opportunities despite its challenges, mainly due to its demographic dividend and cultural diversity. The Dialogue is founded with the vision of harnessing the opportunities present in India today by reinventing the policy and political discourse in order to drive a forward looking narrative for the country. |
Wednesday, June 19, 2013
Perpetually searching
The search for a "perpetual motion machine" has a long and dubious history. The idea of self-generating motion that continues on indefinitely has captured the human imagination since time immemorial. But as this fun, short, history-laden article at Real Clear Science explains,
Scientists have accepted that neither wheels nor water will unlock perpetual motion, but that doesn't mean they've given up the hunt. Just last year, Nobel Prize Winner Frank Wilczek proposed the idea of "time crystals," tiny physical structures that could move in a repeating pattern indefinitely. Wilczek admits that the notion is crazy and likely impossible. Many physicists agree. Time, and rigorous scientific scrutiny, will tell.
The story of 18th century clock-maker Johann Bessler's famous perpetual motion machine is pretty cool history....check it and the rest of the article out here. |
Essay gender discrimination china
That is to say that the employees would pay less for the women in the workforce, unlike the males. It is interesting that the women find it very difficult to find work after graduation. This should be after you have a stable income and partner. While there are physical differences between men and women, Chinese women should still not have to encounter discrimination.
Usually in media we often hear that many companies ask only for male applicants and refuse to interview female applicants.
Essay gender discrimination china
Moreover, it is likely that current statistics may be an understatement of the actual discrimination that women encounter in the workplace.
The education setting is no different in encouraging the discrimination of women in the market.
Essay on “Gender Discrimination” in India (750 Words)
In simple terms, it is trying to dictate that there are some differences that exist between women and men and also trying to encourage the thought that women are in so many ways not wired to carry out certain functions.
That is to say that the society expects nothing more than what they are considering the level that is best suited for women. A fact that is considered traditionally as being that women are known traditionally to be caring and family oriented. The policy was introduced to ensure that China, historically prone of famine and floods, was able to feed its people.
Lack of economic and political power. China has a undeveloped social productive forces, this fact lead to an less access for women to get a job.
As a result, they become the victims of domestic violence more frequently. China Daily, 9 August Also, discrimination also takes place in the workplace. Hence, while the law states that genders are equal, which was also earlier proclaimed by Mao Zedong: This impacts the perception that Chinese students have about race, interactions with others, and as a result has a negative impact on their school experience.
Firstly, we feel that the one child policy in China should be abolished. Biblical Perspective The Bible conveys that there should be no gender gap between men and women because they were created equally New International Version, Genesis 1. In relation to how women are viewed in China, it is considered an honor to give birth to a son; however, daughters are regarded as a burden with little to no importance in Chinese culture.
Females also tend to be less educated and have less experience than men due to the lack of educational access as an adolescent.
The larger majority would raise the child. The combination of preference for boys, and the accessibility of sex-selective abortion, created a distinct imbalance in the gender ratio.
In general, men are believed to be physically stronger than women. Presently, China is still facing threats to the well-being of their country, which, in some ways, originated from gender discrimination.
A total of students were surveyed, of which were females and were males. Second, the physical limitation makes some abilities of female workers not as good as male workers. Colleges and universities are being forced to increase the number of international students who attend universities, as a result of the economic crisis and many state and federal level budget cuts.
Social pressures can best be described as systems and notion that are in play in the society to direct the way issues are viewed and controlled in its functions. A view from the bridge essay eddie A view from the bridge essay eddie jane goodall biography essay rsv in adult research paper.
Report on Gender Discrimination in Shanghai, China Essay
Many Chinese students who come to America for their education face the challenge of language and behavior first. Women have menses and need to procreate which not only cost company a lot of money to set health facility, but also cause a lower labor efficiency than men.
Hence, by abolishing the one child policy, we feel that more equal favour will be given to both genders. Third, many of female applicants in job-hunting always suffer from social pressure which is also the main factor causing gender discrimination.
Gender inequality is when people of all gender do not get equal privileges. The biologically natural sex ratio iswhich. As a consequence, those companies that have more female employee will have to spend more money than companies that have less female employee.
Gender equality should be a deserved human right, not a right that women have to earn. Even if a girl is fortunate enough to continue onto a university, she will likely still encounter discrimination there.
An example of these rules would be the labor law with a specification to the regulations on the scope of prohibited labor for female workers. It refers to an unjust situation when women are devoid of their right to be treated equally with their male counterpart.Essay: Gender equality – China The fundamental beliefs of many modern cultures present women and men as equal with the same abilities and functions; however, gender discrimination still seems to persist in some areas of the world.
Paper on Gender Discrimination in China Published under category: Ordering Custom Papers | UTC Context: Gender Equality. Get writing help for an essay on gender discrimination from this online custom writing service.
Gender discrimination is a social vice that is affecting so many societies in the world. This essay has been submitted by a law student.
Free Sociology essays
This is not an example of the work written by our professional essay writers. Discrimination and stereotypes in the workplace. If you are writing a cause and effect essay on Chinese students’ discrimination in the United States, there are many facts that you might want to consider integrating into your work.
Paper on Gender Discrimination in China
Below is a short list of some recent developments, based on many scientific journals and studies. These might be of use to anyone who needs to include useful information into their existing content, or who is. Gender inequality, or in other words, gender discrimination refers to unfair rights between male and female based on different gender roles which leads to unequal treatment in life.
The term gender inequality has been widely known in human history but not until the beginning the 20th century has the transformation of gender relations become “one of the most rapid, profound social changes” (Wright &.
Gender discrimination is a devastating reality, which causes very few people to stand up, take notice and speak out about the issue.
Report on Gender Discrimination in Shanghai, China
Upon examination, the components of this paper will review specific conflict as it relates to biblical, legal and societal implications.
Essay gender discrimination china
Rated 3/5 based on 30 review |
Consumers are so concerned about data privacy that according to the 2017 Consumer Sentinel Network Data Book, data privacy almost beat debt collection in terms of the volume of complaints. This is not surprising since 2017 was a record-high year for cybercriminal activity.
According to a 2017 report from Norton, cybercriminals stole an estimated $1.4 Trillion from consumers. It doesn’t figure to get any better in 2018. A study commissioned by Bronium estimated customer losses from a data breach will hit $1.5 Trillion in 2018.
The growing concern on cybercrime particularly identity theft is understandable. The world has become dependent on the Internet for its needs.
E-commerce has made it easier for consumers to purchase products and acquire services. The Internet has given businesses a cost- efficient conduit to promote their products and services as well as open additional sources of revenue.
However, the transmission of personal data is required in order to process the transaction. Credit card numbers, bank account numbers, and personal identification are some of the data entry fields that need to be filled out.
Data can be intercepted once it is transmitted from browser to server. Even with high-level encryption programs such as SSL or Secure Sockets Layer certificates, data protection cannot be guaranteed.
Passwords are not enough. Your email can be an entry point for cybercriminals who are experts in phishing expeditions.
The reality is hundreds of thousands of websites are hacked every day. For every second that passes, another website becomes a new victim to a hacker. Cybercriminals are staying ahead of the fight to protect customer data.
Thus, data privacy laws are needed to ensure the protection and integrity of all information provided by customers to businesses.
The question is: How will these data privacy laws affect the data that businesses can collect from customers?
Data Protection Is A Global Concern
Cyber criminal
Last May 25, the European Union (EU) introduced the General Data Protection Regulation (GDPR). It was intended to institute sweeping changes on how data would be collected by businesses from consumers. The provisions of the GDPR strongly emphasized the following conditions in data collection:
• Consent from the customer on data to be collected
• Control by the customer on the types of data to be shared.
• Clear explanation of the reasons for the procurement of customer data.
Why is the GDPR so important? For the simple reason that Europe is one of the biggest markets in the world; in a global economy, Europe provides a rich source of consumers. Businesses around the world want to do business in Europe.
The GDPR’s provisions are sweeping. The policy does not consider the size or type of business. If your business involves the procurement of customer data, you are subject to the provisions of the GDPR.
Countries all over the world will have to develop their own data protection policies and will have to make sure they conform to the GDPR.
Australia is another example of a continent that has taken the lead in the battle to protect customer data. Last 13 February 2017, the Australian government passed the Notifiable Data Breach (NDB) scheme and it was officially in effect on 22 February.
Similar to the GDPR, the NDB defined personal data as any type of information about a person that can be linked to another person. The NDB has taken great lengths to introduce a broad definition of a breach. It covers incidents such as the unauthorized disclosure or access to personal information.
This means online activities that lead to the unauthorized disclosure of personal data like phone numbers, bank account numbers, credit card numbers, residential/business addresses, and email addresses will be considered as incidents of a data breach.
What was the impact of the NDB?
During the first six weeks of the NDB’s implementation, the Office of the Australian Information Commissioner (OAIC) reported a total of 63 incidents of data breach.
Australia is a nation of 24 million people. In contrast, the EU has a population of 511 million people. One can only imagine the number of data breaches that have occurred since the implementation of the GDPR.
The point of the discussion is that the GDPR’s provisions are far and wide more sweeping than the NDB. As previously mentioned, the GDPR does not make a distinction on which entity is subject to its provisions.
With the NDB, only businesses that generate an annual income of $3 Million are required to report breaches. Thus, it is possible there have been incidents of unreported breaches notably from smaller businesses. Clearly, Australia has to do more to fortify its stand against data theft.
If data privacy laws will tighten up, these new regulations while beneficial to customers may present challenges to businesses that need to collect personal information.
Data Privacy Laws: Will They Open The Doors To More Personalized Marketing Strategies?
Forward- thinking brands will not view tighter data privacy laws as a hindrance. Instead, they will view it as an opportunity to deliver better quality goods and services to their customers.
Additionally, they will embrace the situation as a way to get closer to their customers by implementing marketing strategies that take a more personalized approach.
Prior to the implementation of the GDPR, many websites used opt-in forms that hardly had any substance. Once a person visited a website, he/she would be greeted by the opt-in form. It was like a key which allowed the person access to the website.
The GDPR and the NDB made the key vanish. Again, the provisions of the GDPR are designed to give the consumer protection in the form of assurances from the business or service provider:
• Consent – Why should the customer provide you with the data? What are the advantages or benefits of furnishing you with personal information? What will the customer get out of it?
• Control – What are the customer’s assurances that the data will be protected? What safeguards are in place to protect customer information? Is there a chain- of- custody in place?
• Clarity – What will you do with the data? What is the purpose of the data? What will the data be used for? How will the company handle or approach any breach in data?
In view of the GDPR and tightening policies on data protection, companies and marketers will have to adopt more detailed approaches to procuring customer information. They have no choice but to be transparent with consumers.
Likewise, there is no longer such a thing as a free ride. If you want access to customer data, you must give something in return.
Websites opt-ins should offer customers high-value products or services in exchange for personal information. Thus, you have websites that offer free e-books, white papers, newsletters, or limited access to special services.
Search engine giant Google has joined the fight versus data theft by requiring all websites, not just those engaged in e-commerce, to secure SSL certificates. Otherwise, your website will be marked “Not Secure” and it will be punished in the search rankings.
The Internet has tilted the balance of power in favour of the consumer by giving everyone easy access to a wide range of information. Businesses can no longer get by with providing substandard products and services.
Heaven help them should they incur the wrath of a customer who posts his/her bad experience with a company on social media.
Even with the growing threat of cybercrime, once again the Internet has been able to evolve and turn a bad situation into a positive development for customers.
With the increasing urgency of implementing air-tight data protection laws, customers should expect a better experience and deeply personalized approaches from businesses that need their information.
The end result from having more detailed data would mean better quality goods and services. |
When you take the leap and attempt writing poetry, you’ll find a multitude of tools at your disposal. Some are self-explanatory, some are surprising, and some are downright strange. All you need is practice. You can arrange rhyme, metaphor, and simile in a variety of combinations to wreak havoc with language. This makes writing fun, in my opinion. When you give animals voices, it’s hard to go wrong. If they start throwing insults, even better.
One such nuanced tool is what we’ll call “personification”: attributing human characteristics to something nonhuman, or representing an abstract concept using human characteristics. To continue the above example of talking animals, you can symbolize society’s degradation with a bunch of squirrels mocking people from the trees. Whatever works to get your point across, don’t be afraid to experiment.
But let’s break down this definition of “personification” a little. For the first part, bring to mind C. S. Lewis’s beloved Chronicles of Narnia. This is a prime example of when an author (admittedly not of poetry) decides to bestow clear human characteristics, such as speech and other associated mannerisms, on distinctly nonhuman beings. Brian Jacques applies a similar effect in his Redwall series. For the second part, think about that Aesop fable where the pot calls the kettle black. Something bigger is happening behind the scenes, and the animals and household objects are simply conduits.
Granting the power of speech to woodland creatures or household objects, however, is only one method of communicating your moral. Moreover, personification has some useful roles in poetry. Here I’ve selected three. Personification can 1) spice up your descriptions, 2) fuel your central idea, and 3) surprise readers.
1. Make It Spicy
If you hope to attract a wide readership as a poet, you must sprinkle your poems with flavor. How else could Mother Goose’s Nursery Rhymes endure the test of time?
Hey, diddle, diddle,
The cat and the fiddle,
The cow jumped over the moon;
The little dog laughed
To see such sport,
And the dish ran away with the spoon.
This is your classic case of happy-go-lucky personification (and we will put aside the fact that this could function nicely as a drinking song). But it also demonstrates how you can mirror human experience in exciting ways via colorful masks such as cats, cows, fiddles, dishes, and spoons. Such beings and items could have a whole host of meanings—and that’s the beauty of it!
That said, while you want to be flavorful, you also want to be tasteful. You could pull off so much lovely tongue-in-cheek here. But be careful not to overuse personification. Pick images only if they fit within the pattern you’ve chosen or created and are relevant to your central idea.
2. Fuel the Flames
So, you have an idea for a poem—an image, a phrase, a theme. Now you have to breathe life into it, to set words on the page that hold significance. But what does it mean to fuel your central idea? Shel Silverstein provides a good example.
Last night, while I lay thinking here,
some Whatifs crawled inside my ear
and pranced and partied all night long
and sang their same old Whatif song:
Whatif I’m dumb in school?
Whatif they’ve closed the swimming pool?
Whatif I get beat up?
Whatif there’s poison in my cup?
Whatif I start to cry?
The poem keeps going, but you get the picture. The Whatifs are like little fairies, giving a physical face to the narrator’s greatest fears and insecurities. You know you’ve struck gold when you can give physical form to a question or internal wondering. This is personification with its best foot forward.
You may, however, run into the problem of being too “preachy.” Another word for this would be “moralistic.” Just as your personification needs to be tasteful, it also needs to be proportional. Too much imagery, or imagery that is overly large or outrageous, could leave readers lost or scoffing at the absurdity. For your moral to be appealing, it needs to be in bite-sized pieces.
3. Look What the Cat Dragged in
Overall, you’re better off having readers laughing with you than at you. You want to share experiences with others instead of becoming the alienated village idiot. Hence, the goal is to surprise rather than annoy readers. This is a balance I do not claim to have the foolproof solution for, but I thought I’d raise the point.
As an example, “Don’t Kill That Fly” by Kobayashi Issa caused me to step back a moment.
Look, don’t kill that fly!
It is making a prayer to you
By rubbing its hands and feet.
I absolutely love the message Issa conveys within the constraints of the haiku form. The fly is doing something abhorrent you probably have seen multitudes of flies do. He lands on your favorite food right before you take a bite. But Issa presents it as an opportunity for sympathy. If you’re unprepared, it’ll catch you off guard.
Much of writing is kindling the power of wonder in the world and its diverse populations. And to jumpstart the “wonder engine,” sometimes you have to be contradictory. To an extent, you need to surrender to your twists and turns and produce something unexpected. I can’t really tell you how to do this, because each of our souls is unique. We all have a special brand of twists and turns. But don’t allow this hurdle to stop you—oftentimes you can accomplish poetic finesse as you revise and tweak your work. None of the “powers” I’ve outlined above (spicing up descriptions, fueling the central idea, etc.) need happen all at once or sequentially. So let’s surprise ourselves, and each other, and give personification a try!
Learn What Readers Want
We compiled and analyzed how 300+ readers answered 18 questions about what they want to see in fiction. Get the free e-book and we'll also regularly send you resources to help you grow as a writer.
Signup Source
You have Successfully Subscribed!
Pin It on Pinterest |
Gender roles and educational traditions - Pedagogical psychology
Gender roles and educational traditions
In the educational traditions, the gender roles are rigidly fixed and explicitly manifested. It is known that the main factor of cognitive development - research behavior mainly develops in conditions of freedom from evaluation, responsibility and stimulated from the outside activities. It unfolds in situations characterized by uncertainty and multiplicity of decisions. It's easy to see that boys are more often trained and educated, while girls usually grow up in conditions that limit their research activity.
Therefore, as noted in the works of many psychologists (NS Leites, LV Popova, TA Repin, AI Savenkov, etc.) than a gifted girl, the closer she is to their socio-psychological characteristics of boys. Unlike girls with ordinary abilities, gifted girls are usually involved in a very wide range of activities, including those that are traditionally considered boyish - active games, sports. They like traditional boyish pursuits, games and toys that are more conducive to the development of independence and the research approach to solving problems. These activities, games and toys stimulate a better understanding of spatial relationships than those that are traditional for girls. The conclusion is simple: if a girl grows up in conditions of freedom from the rigid imposition of a gender role on the part of those around her, this contributes to the formation of the abilities traditionally attributed to the male type of thinking and behavior.
Statistics of inventions and discoveries indicate that men make them more often. Therefore, there is reason to talk about the greater ingenuity of men. A number of researchers are inclined to think that men often act as idea generators, they work better in situations of uncertainty, if it is necessary to show search activity, to solve a fundamentally new task. True, while significantly inferior to women in quality, thoroughness, accuracy of the work performed. Thus, women usually perform better traditional (typical, patterned) tasks, especially when the requirements for thoroughness and elaboration of parts are very high.
It is tempting to ascribe all this to the influence of socio-cultural traditions, which include rigid characteristics of the content of male and female roles, but with an objective examination we have to admit that the biological prerequisites for these roles also exist. Like it to someone or not, they strengthen the influence of the socio-cultural context. According to the biologist V. A. Geodakian, nature has divided all highly organized creatures into two sexes, and she herself experiments on the one that considers the least valuable. Female gender performs the function of carrier "conservative" beginning, it is preserved and through it the whole genotypic spectrum is transmitted to the next generations. Due to the male part of the population, there is usually an evolutionary shift in one direction or another. Men themselves, being for nature a material of research, are pushed by it to research behavior. As a result, the magnitude of the variation of any traits (except for "evolutionally progressive") in men is greater than in women, with the mean values of the characteristics being equal.
Modern psychology, not always clearly understanding the causes of gender differences (biological or socio-cultural), has accumulated quite a lot of facts, indicating that in any activity requiring a search, a fresh non-standard decision, men usually appear to be ahead. Women lead more often where there is need for thoroughness, accuracy, high performing skills. However, the differences in abilities require special consideration, since they have a special value for education.
thematic pictures
Also We Can Offer!
Other services that we offer
How to ...
|
Ask an expert: Genetics and reproduction
31 August 2018, at 12:00a.m.
This month The Pig Site puts some of your questions to Dr Craig Lewis, chair of the European Forum of Farm Animal Breeders and PIC Genetic Services manager
How many litters per year can a sow have and how soon after giving birth can a sow get pregnant?
I think litters per sow per year can depend on individual system and local legislation. As a general rule, gestation length is fixed to about 116 days today, and with increasing litter size we see this extending slightly into the future. To then increase litters per sow per year, the only things an individual farmer can influence is lactation length (there are some legal limits to this in Europe) and keeping non-productive days down. Of course, this number can also be manipulated in some herd recording systems considering when you ‘enter’ gilts into your herd.
In terms of how soon after giving birth can a sow get pregnant, the major driver of this would be wean age: once the sow is weaned we would aim to get her bred back 3-4 days post wean.
How is line breeding and inbreeding different?
How are you defining line breeding? I could define it by ‘within-line breeding’, which, in the context of pig production, is keeping a line ‘alive’. We see this commonly in terms of breeding companies having lines of Landrace or Pietrain, for example, which are kept pure and improving into the future. The other way to define line breeding is using closely related animals in a breeding scheme so that a really outstanding ancestor is represented a great deal in the following generations.
In terms of the second definition, this can be utilised, however breeders do need to control for inbreeding and maintain genetic diversity in base populations. Inbreeding is traditionally thought of as breeding close relatives together and can happen when improving lines of pigs. Inbreeding today however is rapidly moving away from being measured using traditional pedigree methods and is now calculated using degrees of relationship at the level of the genome. Certainly, we embrace this approach as it allows for much more accurate and detailed management of inbreeding while having increased rates of genetic improvement.
My sow will only breed with her son! Will the health and welfare of their progeny be affected by their genetic relation?
I have personally not encountered a situation where a sow will only breed with her son. Also, we would not recommend this considering there is an increased change of potentially deleterious alleles coming together that could compromise the health or welfare of the next generation.
How can I select for lower feed conversion rates when breeding my pigs?
Feed conversion is basically derived from growth and feed intake. In order to maximise true conversion, you want to maximise a balanced selection of multiple traits (lean gain, robustness, carcass value) while limiting associated costs. We use a balanced selection using multiple traits to maximise the profit equation for customers. Within a breeding programme however you can only improve what you measure so detailed data collection on scale is vitally important for improving any metric.
How can gene editing affect the welfare and productivity of my herd as well as the sustainability of my production?
I think there are many ways gene editing can increase welfare and production and today only a few are explored. With just the example of using gene editing to eliminate PRRS from commercial populations, while the economic benefits are obvious, in terms of increased production there are welfare benefits in terms of decreased mortality and morbidity (a possible benefit here is a reduction in antibiotic usage due to generally healthier pigs), as such the system is overall more efficient so there are sustainability benefits in terms of resource usage (energy, feed, and water) and these efficiencies result in a lower carbon footprint per Kg of pork produced. The direct and indirect benefits of new technology could be widespread if these new technologies are adopted into the future.
Craig R G Lewis PhD
Genetic Services Manager
PIC Europe
A native of Hereford, England, Craig Lewis is a member of the PIC Global Product Development team, based in Barcelona, overseeing Genetic Services for the European, Russian, and African region and is active in PIC’s global welfare research programme. Additionally, he is responsible for directly managing the genetic programme for a number of PIC’s key customers and internal multipliers. External to PIC, Craig is currently the chair of the steering committee for the European Forum of Farm Animal Breeders (EFFAB) which is a cross species European political lobby association that represents the majority of animal breeding and reproduction organisations within Europe.
If you’d like your own swine questions answered by an expert, please contact the editor Emily Houghton |
0 10 20 30 40 50 60 70 80 90 100 22213 0
Welcome to type with code
Start typing or press to get going!
The python code you'll be racing to type out is all about:
Not equal to
You can test if two expressions are the same using the equal to or not equal to operator.
An expression can be a variable or combination of variables & data (e.g. 1 + 1)
An operator is a symbol that means add, subtract or something similar.
This example asks the user to enter a temperature of a bath (in degrees Celsius) and then follows the following rules:
Equal to 37 degrees: says "Perfect - that's body temperature"
Not equal to 37 degrees: "Not body temperature" |
Similarities Between The Beatles and Pink Floyd
775 Words Jul 10th, 2018 4 Pages
Pink Floyd and the Beatles had more in common then they’re often credited. Both bands members were raised in the United Kingdom. The original framework for “The Beatles” was conspired by the best friends, John Lennon and Paul McCartney. Likewise, “Pink Floyd” was created by best friends Nick Mason and Roger Waters. By the same token, both bands were founded while the members received their education. World War II was a pin point in each of the band members lives, if not directly affecting them, then they were affected through their parents. Ironically, the two bands were also branded for the sixties, largely the Beatles who were believed to be an instrument, attempted to be used for ending the Vietnam War. As musicians often feel pressured …show more content…
This was the least of the confusion, the two bands matters were in original instrument choice among the members, music style, the band members themselves, and at last the band names. Coincidentally, both bands lost a member who motivated the group; Stuart Sutcliffe for the Beatles, and Syd Barrett mentally handicapped before Pink Floyd’s success. The most common factor for the two United Kingdom, sixties era bands is that they both succeeded. With so many coincidences, the bands also have their contrasting factors. The Beatles on one hand were largely public, acquiring names such as the Quarry Men, instead Pink Floyd was underground and frolicked with names like T-Set or Abdabs. Large differences between the two bands are their rises in popularity. For Pink Floyd’s underground scene, they were not at the peak of their popularity in America until the early seventies; The Beatles were into the Pop Culture which gave them leeway to high popularity. The war and Counterculture provided the Beatles a great opportunity to experiment with their music, while Pink Floyd changed largely because Barrett wanted to try mystique music which suited the culture a smidge better than the blues. Because the controversial rises of fame, the bands trademark movies were created in totally different generations; “Yellow Submarine” was released in 1968, Pink Floyd’s “The Wall” was released in 1982. This presents why their strikingly similar reputations
More about Similarities Between The Beatles and Pink Floyd
Open Document |
The Rights Of The American Revolution
1015 Words Sep 13th, 2016 5 Pages
Prior to the American Revolution, the right to be secure against unreasonable searches and seizures did not exist. (Levy, 1999). The Bill of Rights was introduced and ratified in 1791, it contains the first ten amendments to the United States Constitution. The Bill of Rights define and interpret constitutional rights and protections that are guaranteed under the US Constitution. The Fourth Amendment to the Constitution addresses search and seizure statues, it states ... “Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
According to Leonard W. Levy, a Pulitzer Prize historian, “the Fourth Amendment emerged not only from the American Revolution; it was a constitutional embodiment of the extraordinary coupling of Magna Carta to the appealing fiction that a man 's home is his castle.” (Levy, 1999). There have been challenges to the Constitution and The Bill of Rights since their inception. The Supreme Court has the legal and final authority for rulings on these constitutional rights and challenges. The Supreme Court is responsible for settling disputes that arise out of differing interpretations.
Three significant cases concerning the Fourth Amendment are Weeks v.…
Open Document |
DEFINITION of Canceled Order
A canceled order is a previously submitted order to buy or sell a security that gets canceled before it executes on an exchange. Investors may cancel an order if they enter an incorrect price or quantity or simply no longer want to buy or sell the stock.
Most market orders are executed almost immediately the moment they hit the exchange, providing there is sufficient liquidity. This makes canceling a market order before execution close to impossible. Limit orders that are outside of the current bid/ask spread can usually be canceled online or by calling the broker directly. Good ‘til canceled (GTC) orders, which remain active until purged by the investor or the trade executes, can no longer be directly placed with the Nasdaq and New York Stock Exchange (NYSE). However, most brokerages continue to offer this order type.
BREAKING DOWN Canceled Order
Orders can be canceled on the Nasdaq between 4 a.m. and 8 p.m. EST. For instance, if an investor places a cancellation order on their broker’s trading platform over the weekend, it is canceled on the exchange at 4 a.m. Monday. The NYSE allows investors to cancel orders between 7 a.m. and 4 p.m. EST. Other NYSE markets, such as NYSE American Equities and NYSE Arca Equities, also allow order cancellations in extended trading hours. As a safety check, investors should ensure that a canceled order gets purged from the order book. (To learn more about these exchanges, see: The NYSE and Nasdaq: How They Work.)
Fill or Kill Canceled Order
The fill or kill (FOK) order automatically cancels an order that cannot be filled in its entirety immediately. For example, an investor may only want to buy 1,000 shares of an illiquid stock if he or she can fill the entire order at a specific price. If the investor uses a FOK order, the order would only execute if it can fully complete. If the order cannot be completed, it would be immediately canceled. This type of order prevents small portions of stock from getting executed. Investors might also use an “immediate or cancel" order, which cancels any portion of the order that does not get filled immediately.
One-Cancels-the-Other Canceled Order
A one-cancels-the-other (OCO) order consists of two dependent orders; if one order executes the other order is immediately canceled. Traders who play breakouts could use this order type. For example, if a stock was trading in a range between $40 and $60, a trader could place an OCO with a buy limit just above the trading range and a sell limit slightly below the trading range. If the stock breaks out to the upside, the buy order executes, and the sell order gets canceled. Conversely, if the price moves below the trading range, a sell order executes, and the buy order is purged. This order type helps reduce risk by ensuring unwanted orders get automatically canceled. |
Irish History Quiz 1
Posted in history quizzes
History1. During which years did the Irish Potato Famine take place?
2. In what year did the Phoenix Park murders take place?
3. What was the common name for phytophthora infetans, a major cause of the crisis?
4. Where in Ireland was the last fatal duel fought.
5. Which people from the British mainland came to Ireland when James I was on the British throne?
6. Which Society, also called the Quakers, was at the forefront of famine relief?
7. Which Rule movement was led by Parnell?
8. What was Parnell's first name?
9. Where did most people emigrate to after the Famine of the 1840s?
10. Who was the first High King of Ireland?
11. What was John Barry known as?
12. In Co Mayo in 1798, who landed 1,000 men at Killala?
13. Which famous Irish siege lasted from 18 December 1688 to 28 July 1689?
14. Which Oliver came to Ireland in the mid 17th century?
15. When did Dublin celebrate the Millennium of its birth?
16. Which President of Ireland resigned on 22 October 1976 following the comments of the then Minister for Defence Patrick Donegan?
17. Who was known as the Liberator?
18. On whose tombstone are the words "He is now where fierce indignation can no longer tear his heart"?
19. Which Scandinavians invaded Ireland in the 9th and 10th centuries?
20. Who was the Mayo-born man who became the " Father of the Argentinian Navy "?
1. 1845 - 49
2. 1882
3. Potato Blight
4. Druminderry Bridge. North East of Buncrana, Co. Donegal.
5. The Scots
6. The Society of Friends
7. Home Rule
8. Charles
9. USA
10.Brian Boru
11.'Father of the American Navy'
12. General Humbert, of France
13. Derry
14. Cromwell
15. 1988
16. Cearbhall O'Dalaigh
17. Daniel O'Connell
18. Jonathan Swift
19. Vikings
20. Admiral William Brown
Members Login
Social Networking
T-Shirts & more for Quizmasters
Our T-Shirt Shop
More Resources |
Irish History Quiz 2
Posted in history quizzes
History1. In what year did the Irish Civil War break out?
2. The statues of Fidelity, Mercury and Hibernian top which building in Dublin?
3. Michael Collins was killed in an ambush between Bandon and where?
4. Which British PM (initials W.E.) supported Home Rule?
5. Where is he buried?
6. What marks the spot where he died?
7. In what year was the Easter Rising?
8. In what month was it?
9. Who travelled on 'coffin ships'?
10. Where did Michael Collins fight during the Rising?
11. What was the IRB?
12. Was Catholic emancipation seen in the former or latter half of the 19th century?
13. Who became leader of the Home Rule Party after Isaac Butt in 1879?
14. In 1691, at the siege of Limerick who led the Irish forces?
15. What population count took place in 1851, 1861 and 1871?
16. Which Cumann na Gael Cabinet Minister was assassinated on July 1927?
17. When was Douglas Hyde elected as Ireland's first President?
18. The freedom of Cork City in November 1998 for his role in the Irish Peace Process was awarded to whom?
19. Was Gaelic or English the main language in Ireland in the 19th Century?
20. The English Pale surrounded which city?
21. The Irish Brigade fought for Franco in which war?
22. In which Italian City did Daniel O'Connell die?
23. Where would you find the historical site of Newgrange?
24. In which century was the Battle of the Boyne?
25. The Titanic was built at which Irish shipyard?
26. What was the first name of the 18th century politician Grattan?
1. 1922
2. The GPO, O'Connell Street
3. Macroom
4. Gladstone
5. Prospect Cemetary
6. A Stone cross
7. 1916
8. April
9. Emigrants
10. The General Post Office
11. Irish Republican Brotherhood
12. Former
13. Charles Stewart Parnell
14. Patrick Sarsfield
15. Census
16. Kevin O'Higgins
17. 1938
18. George Mitchell
19. English
20. Dublin
21. Spanish Civil War
22. Genoa
23. County Meath
24. 17th
25. Harland & Wolff
26. Henry
Members Login
Social Networking
T-Shirts & more for Quizmasters
Our T-Shirt Shop
More Resources |
A new study has found that you are more likely to feel financially insecure if you live alone.
The Office for National Statistics (ONS) looked at people who lived alone versus childless couples, finding that people living alone are less likely to own their own homes.
The study also found that people living by themselves reported higher levels of anxiety.
Those living alone spend an average of 92% of their disposable income, compared with 83% in two-adult households in the ONS survey which looked at people aged 25 to 64.
The research did not include those living with dependent children.
Less likely to be on the property ladder
Half of the group polled who live alone owned their own home, compared to 75% of couples.
This means more single people are missing out on the benefit of being home-owners and gaining from rising property values.
Only 51% of those who live alone reported having money left over at the end of the week or month, whereas nearly two-thirds of people living with partners found they had financial surplus.
Savings also proved to be an issue, as people on their own may find it more difficult to build up enough money to cover unforeseen expenses.
Over a third of those living alone reported that they wouldn't be able to make ends meet for over a month, compared to 14% of couples.
More than just financial concerns
The report also found that living alone can have a serious impact on well-being.
Those living alone report lower levels of happiness and increased anxiety levels than those living with a partner.
But it said: “While this may paint a negative picture for those living on their own, it is not clear that people’s living arrangements are directly associated with their personal well-being.
“It may be that some of the characteristics that tend to go with living alone, like being divorced, or renting your home, may have more of an impact.”
In the UK there are more people living alone than ever before, and that figure is only rising.
The report said this growth could be because of changing relationship patterns, such as more couples divorcing.
The number of people living on their own went up by 16% to 7.7 million between 1997 and 2017.
By 2039, the number of one-person households is set to reach 10.7 million, with most of this demographic being older people. |
Uses and Benefits of Fluorotechnology
Why is FluoroTechnology used?
FluoroTechnology provides a wide-range of societal benefits, which include improved safety, durability and fuel-efficiency in applications like cars and airplanes, buildings and electronics. Certain types of advanced semiconductors, tubing, piping and fuel-delivery systems used in the manufacturing, pharmaceutical, automotive and aerospace industries are made with FluoroTechnology.
Fluorinated performance products are used to give products enhanced surface properties, such as water, oil and stain resistance. Many textiles, such as carpeting and fabrics, are treated for stain-resistance with FluoroTechnology, making it easier to clean spills and extending the life of carpets and clothing.
How is FluoroTechnology different from other chemistries and products?
Fluorine chemistries have unique properties and attributes that make them substantially different from other chemistries. The stability of carbon-fluorine bonds makes FluoroTechnology a powerful tool for providing strength, resilience and durability to a variety of products for industry, manufacturers and consumers. The qualities enable products and technologies that benefit individuals, businesses and society at large.
What are the benefits of FluoroTechnology?
FluoroTechnology provides durability and resilience to products large and small. The unique properties of the fluorine-carbon bond make extraordinary manufacturing and industrial achievements possible and extend the life and productivity of products essential to families and businesses.
Products enabled by FluoroTechnology are resistant to high temperatures and interference from other substances, increasing reliability and helping to prevent fires in aircraft and automobiles wiring and gauges – essential to help ensure safe travel. FluoroTechnology used in fuel delivery systems also contributes to increased fuel efficiency and reduced emissions.
In the building and construction industry, FluoroTechnology is widely employed in paints and coatings where properties such as durability, UV resistance, and anti-corrosive properties lengthen the lifetime of infrastructure, facades, and surfaces.
Healthcare settings rely on FluoroTechnology in catheter and needle coatings, providing low-friction, clot-resistant coatings that increase patient comfort and safety; medical garments, providing protection from the transmission of diseases in bodily fluids during medical procedures; and high dielectric insulators, critical to defibrillators, pacemakers and imaging devices.
Fluorinated products also make everyday consumer goods, such as carpeting and clothing, perform better and last longer. That means families and businesses have an improved return on routine investments, helping get more out of modest budgets.
How is FluoroTechnology used today?
The applications of FluoroTechnology are very diverse, contributing to many industries as well as highly beneficial consumer products.
FluoroTechnology plays an important role in the aerospace industry, helping to create semiconductors, tubing and piping that empower space exploration as well as commercial and defense aircraft.
In the automotive industry, FluoroTechnology improves engine fuel-delivery systems and prevents gas seepage, leading to better fuel efficiency and less emissions. It also helps make wires and other parts used in high temperature environments more flame resistant to prevent vehicle fires.
Special types of industrial tapes and wiring are made with FluoroTechnology to serve important purposes in manufacturing, building and other areas. High-tech electronics and certain types of circuit boards are made stronger with FluoroTechnology, and high performance solar panels employ FluoroTechnology in photovoltaic films and coatings.
Beyond industry and manufacturing, FluoroTechnology makes important contributions to consumer goods and even has a role in first response and emergency services. Advanced firefighting equipment, including the protective clothing firefighters wear, is made with FluoroTechnology. Certain types of outdoor equipment that is waterproof, stain-resistant and moisture wicking contain FluoroTechnology. Many textiles, such as carpeting, and fabrics treated for stain-resistance are done so with FluoroTechnology, making it easier to clean spills and extending the life of carpets and clothing.
What products rely on FluoroTechnology?
Fluorochemicals are essential to many important products and vital industries, including wire and cable insulation for computer and cell phone circuits to enable high-speed data transfer; high reliability hoses for aircraft and cars to reduce emissions; firefighting foams for extinguishing aircraft and oilfield fires; processing chemicals for semiconductor manufacture; high durability paints and coatings for building facades; medical garments that help prevent the transmission of diseases; and outdoor apparel that keeps users dry and warm in extreme conditions.
Why are PFASs added to or used in paper or cardboard food packaging?
Per- and polyfluorinated substances (PFASs) (sometimes mistakenly referred to as “PFCs”) can be used in food packaging materials to prevent oil and grease from seeping through the packing material. This is useful for paper and paperboard packaging for high-oil content and high-grease content foods, such as popcorn bags, food wrappers, pizza boxes and disposable plates. Treatment prevents oil and grease from leaking through food packages onto clothing, furniture or car interiors; increases the shelf life of some foods; and, reduces the amount of plastic packaging required. In heated food applications, such as popcorn bags, the treatment prevents the migration of hot oil through the package to help prevent burns. Other methods to deal with oil and grease seepage, such as foil or plastic lining, may prevent waste paper recycling or use in microwave or other heating devices.
Do government agencies regulate the use of PFASs in food packaging materials?
Food contact materials are reviewed and approved by relevant food safety authorities before they are available in the market. Regulatory agencies globally [e.g., the U.S. Food and Drug Administration (FDA), Germany’s Federal Institute for Risk Assessment (BfR), China, U.K. Food Standards Agency, Canada] have determined that several short-chain PFASs meet their stringent requirements set for food contact applications.
Is PFOA used in food packaging materials?
PFOA is not, and has never been, used for food packaging materials or oil and grease repellent coatings. PFOA is a degradation product of a long-chain PFAS (C8 based), which used to be – but is no longer – used in food packaging materials. Short-chain PFASs that are currently used cannot form PFOA.
Can PFASs migrate out of food products and expose people to the chemicals?
Studies by and for regulatory agencies around the world show that dietary exposure to chemicals which may migrate from food packaging is very low. An estimate was published in 2008 by the German Federal Institute for Risk Assessment (BfR) and the European Food Safety Authority (EFSA) regarding the potential risks of PFASs in food materials for human health, reasoning that adverse effects for the general population were unlikely, based on the known PFAS concentrations in food materials and serum samples and the present state of scientific knowledge.
What is PFOA; what is its relationship to FluoroTechnology?
PFOA is used as a processing aid in the manufacture of certain fluoropolymers. FluoroCouncil member companies are phasing out the use of PFOA by the end of 2015 and have developed alternative processing aids that do not contain or use PFOA.
C8/long-chain fluorotelomer-based products can also contain PFOA as an impurity or degradation product. FluoroCouncil member companies have developed alternatives -C6/short-chain fluorotelomer-based products. C6 chemicals do not break down to PFOA.
Is PFOA used to make nonstick cookware?
Fluoropolymers are used to make traditional nonstick cookware coatings that facilitate healthy cooking. PFOA can be used to manufacture fluoropolymers that are used to make these nonstick cookware coatings. However, under the EPA PFOA Stewardship Program, members of FluoroCouncil have introduced alternative technologies that enable the manufacture of fluoropolymers without the use of PFOA.
Is PFOA used to treat textiles?
Fluorotelomer chemistry is used to provide surface protection for textiles, providing benefits such as ease of care, reduced maintenance and extended life. While PFOA is not used to manufacture fluorotelomers, PFOA and related chemicals can be produced in trace amounts when certain fluorotelomers break down in the environment. Under the EPA PFOA Stewardship Program, members of FluoroCouncil have introduced alternative fluorotelomer technologies that cannot break down into PFOA in the environment.
Can FluoroTechnology be replaced with non-fluorinated alternatives?
FluoroTechnology offers exceptional performance with clear societal benefits, allowing industry to create unique products developed to meet the most demanding challenges. While non-fluorinated products are available for some current uses of LCPFCs, e.g. certain surfactants, they are generally not suitable for the majority of applications because they do not provide the required performance in use.
For example:
• Fluoropolymer wire and cable insulation provides unique electrical performance and fire safety for the data communication industry, in a way that is unattainable with other materials.
• Fluorotelomer fabric treatments provide unique stain and oil resistance and durability for the textile and medical textile industry unattainable with other materials.
• Fluorochemical oil additives provide unique life and lubricity for the aircraft engine industry.
• Fluoropolymer high-purity tubing and valves allow for the production of computer and semiconductor chips unattainable with other materials.
Additional Topics |
The Daily Parker
Politics, Weather, Photography, and the Dog
M is for Modes
Blogging A to ZToday's Blogging A-to-Z challenge entry goes back in time a little bit. Before there were keys, there were modes: the original scales used in Ancient Greece that still pertain today.
Our C-major scale roughly corresponds with the Ionian mode. (I say "roughly" because while the fifth, octave, and probably fourth notes would have sounded the same back then as they do now, the rest of them probably would have sounded slightly out of tune to modern ears. This is a topic for next week.)
If you start on D, you get the Dorian mode:
It's not quite D minor, because instead of a flat 6th and natural 7th as in a minor key, we have a natural 6th and flat 7th. You can hear Dorian mode in Deep Purple's "Smoke on the Water."
Next comes Phrygian mode, starting on E:
If you start on F, you get Lydian; G, Mixolydian; A, Aeolian (corresponding closely to natural minor); and B, Locrian.
I mentioned Deep Purple because everything old is new again. A lot of modern popular music has reached back to modes, mainly (I think) because they sound cool. Lydian mode has a tritone instead of a perfect 4th; Locrian just
In fact, while Ionian, Dorian, Phrygian, and Aeolian pop up a lot, there aren't many examples of the others. But they're out there.
Homework assignment: Find modal pop songs (LMGTFY). Then listen to them.
Add comment |
India has a lot of cuisine. India is known to the world for associated with spices in food. The “Indian Curry” is famous world over. India can be a vast country; therefore could possibly difference in the cuisine in different parts of India. The south Indian food has its own distinct flavor, while meals in north is different and spicier. The cuisine in different parts of India is influenced via the local culture prevailing several. It is also dependent upon the vegetation present a particular geographical destination.
Indian cuisine has evolved over a period of their time and it is influences by various cultures. As India came into along with the outside world, in addition, it influenced the cuisine of India.
The Middle East and Europe brought its flavor to Indian cuisine that’s why blended beautifully without the pain . Indian cuisine. Indian food has been influenced by religious beliefs. India is home to many belief systems. Jainism, Buddhism, Sikhism and Hinduism were born here. Islam and Christianity also came Jains and Buddhists are strict vegetarians while Muslims and Christians use a lot of meat product in their food. All these influences have together with the present day cuisine in Of india.
Today when anyone visits India can expect all types of food in India. Apart from the Indian food, Chinese, Continental and other involving food are abundant in India. Today you can expect all sorts of restaurants in China. But still people who visit India want to taste the Indian food and love.
The ingredients of Indian food: Common ingredients of Indian food are wheat, pulses, rice, gram, potatoes, various epidermis vegetables, meat give up. These are cooked in ‘ghee’, mustard oil, sunflower oil and other vegetable oils. Different styles of spices are designed to cook these foods like cumin, turmeric, chilly pepper, fenugreek, ginger and garlic. Indian curry made with the use of varied spices is celebrated. Chicken curry is a popular Indian food.
Some popular Indian foods: The main food items which form a regular staple diet for Indians are various types of bread made mainly out of the wheat flour. Some of the popular breads are “roomali roti, missi roti, aloo parantha, naan etc. The non-vegetarian food mainly comprises of various sort of preparation from chicken, goat meat, fish etc. In the vegetarian food, some of the most popular curries are “Shahi Paneer, Matar Paneer, Navratan Korma etc”. In snacks “samosas and aloo tikkis are very trendy. India is also very popular for treats. Some of the popular sweets are “Ras gulla, Rasmalai, barfi, gulab jamun etc”. Kebabs are famous as well. It’s mainly liked using the Muslim population. In the southern part of India, the main emphasis is on rice. Rice may be the staple food right. Coconut is used in most of meals items. “sambar, rasam, dosa, idli, vada etc.” are some other very popular food.
Sabor – All Day Dining, World Cuisine
|
Chapter 8 Insulation
8.1 Insulation.
Insulation between information elements increases the time required for interaction between them. Without insulation, there could not be any difference between two information elements, there could be no diversity, there could be no information at all.
This illustrates the very deep relation between insulation and information.
Imagine a country as breeding ground for culture. Suppose there is no insulation between the people of the country and thoughts coming up in the mind of one person are at the same time in the minds of all persons. Such lack of insulation would cause the entire country to evolve as one person. When there is insulation, several persons can try out different thoughts at the same time and people can specialize themselves.
Suppose there is a wide river cutting a country in two parts. The extra insulation between the two parts can cause the development of two different cultures in the country.
Modern communication techniques and the wide spreading of world languages facilitate the communication. By this, the cultural differences are threatened. When the insulation is reduced, the interaction increases and the differences reduce (there are exceptions which will be discussed in later chapters).
We would never be able to memorize or consider contradictory information without a mechanism of internal insulation between information in our mind. This kind of insulation inside our mind allows us also to understand information coming from a slightly different mind without losing our proper nature.
8.2 Nature of information, nature of induration.
Two information elements interact faster or slower depending on the insulation between them. Complex information structures are composed out of a number of elements. These elements are also information and interact of course with each other spontaneously.
This interaction causes a reduction of the differences between the components. This leads necessary to the collapse of the information structure (death).
The speed of this interaction and by this the life time of the structure depends on the internal insulation between the elements. Building this internal insulation requires energy. The more energy is spend in the internal insulation structure, the longer the information can survive before it will collapse by internal deterioration. This is how energy is used for induration.
8.3 Pairs of opposites.
Information can be described as an organization of insulation between smaller information elements. The smaller information elements are again such organizations. This goes on down to the smallest information elements which are pairs of opposites.
A pair of opposites is "nothing" separated by insulation. The poles of the pair have only a meaning because of the difference of insulation between each pole and some external elements. This difference of insulation is a mapping of the abstract element to concrete elements of the environment.
From this point of view, information can entirely be described as an organization of insulation.
8.4 Insulation and time.
Insulation and time are very closely related.
The survival of an information structure depends on the amount of insulation between its components. In this context, we can consider the insulation as some packed time between the elements. After expiring of the time, the structure collapses.
Insulation increases the time required for an interaction between information structures.
Nations develop different cultures. The more insulation between the nations, the less interaction between the cultures exist and the larger the differences can be.
8.5 Vertical insulation.
Abstract information is linked to its instantiation through the mapping. However, it is essential for the abstract information to keep some distance from the instantiation. Because this is an insulation between different levels of abstraction, I have called it "vertical insulation."
Abstract information abstracts experience from different instantiations. Vertical insulation, protects the abstract information from a too profound impression of one particular instantiation.
During the existence of an instantiation, the vertical insulation varies. In later chapters we will return several times to the use of this. In a number of cases, the vertical insulation increases for a longer time or permanently. The instantiation becomes then a mechanism separated from its origin. In many cases, the separated instantiation can survive for some time.
A machine built by an engineer can function for some time without contact with the engineer. As long the external conditions do not change, or the internal deterioration does not destroys the mechanism, it can go on operating.
When an abstract element propagates while it is instantiated to a concrete form, the form propagates without copying all abstract information. This offspring is (vertically) insulated from its abstract origin.
An engineer has a mathematical problem and asks a mathematician for help. The mathematician finds a solution by applying a very abstract theory. Because the application requires only an instantiation of the theory in the context of the problem, the mathematician explains only the instantiated form of the theory. Later on, the engineer can apply the instantiated theory as much as he likes. The theory of the engineer is insulated vertically from its abstract origin.
8.6 Gaining experience.
Vertical insulation allows different instantiations of the same abstract origin to gain experience in different circumstances at the same time without affecting each other permanently via the common abstract origin.
8.7 Short circuit effects.
A sudden reduction of the insulation between information can cause drastic changes which look more like a short circuit rather than the usual interaction.
Imagine two nations separated by an ocean insulating them in an almost perfect way. The two cultures evolve separately. Suddenly one of the cultures develops ships to sail over the ocean. Communication becomes possible. The history of colonization has shown us that such short circuit between cultures can cause very drastic changes.
8.8 Information organization.
Arranging the insulation between elements of information results in an organization of information. The arrangement involves increase or decrease of insulation. By arranging elementary information elements in this way, more complex information structures can be constructed.
An organization of people is a structure defined by a number of communication channels. These channels can be seen as a reduction of the information distance (insulation) between the connected members. Except for the channels, there is a relatively strong insulation between the members.
A classification is an arrangement in which the insulation between some elements is reduced and the insulation between other elements is increased.
Our body can be described as a complex arrangement of insulation between smaller elements. The reduction of the insulation between elements which are not physically close to each other results in pipe alike structures. Such structures like blood vessels, trachea, throat, intestine, nerve fibers, etc. show clearly the decrease of insulation between the connected elements while the insulation from the other elements is maintained by the membranes around the pipe structures.
A pair of opposites can be created by insulating the opposites. The more insulation between the pair of opposites, the stronger the new information element.
8.9 Communication channels.
Because of the active aspect of information and the fact that interaction between information elements depends on the insulation between them, a reduction of insulation between two information elements can be imagined as a communication channel between the elements.
8.10 Mapping.
The mapping of an abstract element on more concrete elements is caused by a reduction of insulation between the abstract elements and the elements upon which it is mapped. These reductions of insulation form intensified communication channels between the abstract element and the elements on which the abstract element is mapped.
Imagine a new pair of opposites separated by some insulation. As long the new pair is well insulated from all concrete elements, it has no concrete meaning.
Reduction of the insulation between one pole and a concrete element and the other pole and another concrete element causes an instantiation of the abstract element. At this time, the abstract element represents the difference between the two concrete elements.
An abstract element which instantiates to concrete elements can be imagined as a being grasping concrete elements. When not instantiated, the abstract element keeps its abstract meaning because the grabbing hands are selective in grabbing information elements with a particular structure.
More in next chapter on Energy
This is Chapter 8; Insulation of Behavior of Information
Last updated on Nov 12, 1997 |
Mobiles for Non-Communicable Diseases
Posted on October 13, 2015
Here’s a first post for the new website! An Oldie, but a Goldie!
Non communicable diseases (heart diseases, strokes, cancers, diabetes, and chronic lung disease) cause an estimated 36 million deaths every year, including 9 million people dying prematurely before the age of 60. mHealth solutions can provide solutions such as improving glycaemic control in type 2 diabetes as well as improving outcomes among patients with obesity and cardiovascular diseases. Furthermore, mHealth is a cost-effective solution that can improve the quality of care among underserved populations, in turn promoting equity in access to healthcare. For example, research by the Telenor Group showed that mHealth can reduce the costs of medical care among the elderly by 25 percent, double access to physicians by those living in rural areas, and improve chronic disease treatment compliance by 30-70%.
Here are some of the ways mHealth can achieve these results:
Medication Adherence: Only 50% patients with chronic diseases comply with their medication regimen with over 40% reporting intentional non-adherence in just 10 days of therapy. When additional drugs are added into the equation, adherence can be as low as just 10%. In addition to waste of costly drugs, non-adherence leads to more hospital visits, hospitalizations and re-admissions. Provider-patient mis-communication, forgetfulness, unwanted side effects, treatment anxiety have all been listed as reasons for lack of medication adherence. Several apps now exist to remind patients to take appropriate doses of their medication at the correct times, set up appointments and track compliance with medical instructions. Some examples of these apps include MedCoach, DoseCast, Pill-Reminder, On-Cue compliance, HealtheTrax, txtalert etc.
Supply chain management: mHealth apps can be used to reduce delays in medicine shipments by reporting shortages of medicine and other products. One such campaign, the Stop Stock-Outs campaign encouraged both consumers and pharmacists to use SMS through FrontlineSMS systems to report shortages and were able to monitor medicine availability, lobby for increasing national budgetary allocations for purchase of medicines and improve the supply/distribution chain. Additionally, mHealth can be used to authenticate that drugs purchased by consumers are not counterfeit. Furthermore, effective record management and patient updates allows for quicker and more accurate dispensing of medication.
Lifestyle Compliance: Lifestyle factors play a huge role in chronic diseases and apps can easily help patients regulate and monitor their diets, exercise, smoking and other behavioral factors that directly influence health outcomes. Apps for monitoring risk areas for persons with asthma, Crohn’s diaries, dietary guidance, fitness motivation etc. can all account for huge cost savings in the healthcare industry. Virtual coaching apps provide advice on a range of issues, tracking activity and making suggestions based on a person’s goals.
Education: mHealth can be successfully used to properly educate patients on their conditions, treatment regimens, follow-up instructions, long term prognosis etc. One such example was recently was evaluated where users in 60 central Ugandan villages to text questions on sexual and reproductive health to a server and receive pre-prepared responses from a database. There is a lot of room to re-design these mHealth systems for best results. Furthermore, several countries are now using games, quizzes, social media and similar non-traditional mechanisms to deliver vital health information. For example, Project Masiluleke, a collaboration between PraekeltFoundation, iTeach, PopTech and MTN in South Africa, has sent out 1 million messages/day since 2009 encouraging people to call HIV/AIDS and TB helplines for information.
Clinical Use and Decision Making: mHealth is advancing in providing low cost tools for diagnosis, monitoring and treatment. You can read about some of these advances in diagnosis here. Physicians are also able to use these tools for vital decision making in patient management. One such app used in Botswana aimed at residents in training and provided them with medical references and applications that allow them to consult with specialist supervisors on difficult cases.
Remote Monitoring: mHealth technology can be used to manage diseases and improve patient care by alerting healthcare workers on significant changes to patient health. This is particularly useful for reaching patients in underserved or hard to reach rural areas. One such application in China deployed an electrocardiogram sensing handset that records 30 seconds of heart data which is transmitted 24-hour care facility. The facility, staffed with over 40 physicians monitor this information from patients in underserved areas and provide real-time feedback to those with cardiovascular diseases. Another is example is LifeScan which created the OneTouch® Verio®Sync Blood Glucose Monitoring System, the first FDA approved meter to automatically send blood glucose results wirelessly via Bluetooth technology to an iPhone, iPad or iPod touch using a mobile app. The app produces reports, simple visual analytics on data collected and allows user to easily share their information with caregivers and healthcare providers. The app can store up to 2,500 blood glucose results and events and up to one year of results and events.
Financing options: Mobile technology can help reduce the overall cost of care in treating and managing chronic diseases by allowing easy deposition of funds to saving accounts, micro health insurance plans as well as using mobile money to pay for treatment and medication. For example, in Kenya, the Changamka Medical Smart Card allows people who have no access to medical plans or insurance cover to save money using mobile money transfers. Another project, also in Kenya, uses mobile banking, public information, and free treatment in order to give women access to fistula repair.
mHealth applications are growing at a rapid rate, creating a potential for major improvements to the healthcare sector in developing countries. At the same time, there is the issue of duplicative work, wasted efforts and funding as well as confused healthcare workers. Evaluations of existent programs with an eye on effective application design can create mHealth systems of value that can then be mainstreamed into health systems.
1 Reply to "Mobiles for Non-Communicable Diseases"
• Chris
November 25, 2015 (3:16 pm)
Thanks. Just getting into a mHealth project and this validates my thought process.
Got something to say?
Some html is OK |
A Natural Bridge is the Natural Place to Make Musket
Natural Bridge VirginaNatural Bridge in Virgina was once an entire cavern, a mile(ish) long. A sinkhole formed, and the limestone collapsed, leaving behind only this portion. This “tiny” portion, which is 36,000 tons of pressure, 215 feet tall (which is 55 feet taller than Niagara Falls), and 90 feet wide. Right, tiny?
Now, Highway 11 crosses over it and you can’t hear traffic from below, and from above, it’s just another street.
Making Musket off Natural Bridge VirginiaWhat’s this about Musket?
During the Revolutionary War (and other times, too), they went to the nearby caves to collect bat guano for its nitrates to make gun powder. Combine with molten lead, drop from atop the bridge into the creek below, and it naturally forms a ball in the air and cools in the water. Tada! Musket.
Do you know any tricks for making artillery?
One Response
Loved the picture and drawing and the history. Musket love!
Leave Your Response
* Name, Email, Comment are Required
This is ad number one.
|
Data Mining Discussion 4 b
Full article
-What is the Apriori property and how is it employed to improve the efficiency of the algorithm?
The Apriori property states that "all nonempty subsets of a frequent itemset must also be frequent". To elaborate, if an itemset called I does satisfy the minimum support threshold then I is said to be not frequent. If an item called A is added to I, then the resulting itemset cannot be more frequent than I. This means that I ∪ A must therefore not be frequent either. This property belongs to the antimonotonicity category of properties, which means that if a set cannot pass this property's test, then all of its supersets will also fail that test. Furthermore, the Apriori property uses two steps to improve the efficiency of the algorithm using join and prune actions.
-What are some of the techniques that are used to improve the efficiency of the Apriori algorithm?
Some techniques used to improve efficiency include the hash-based technique and transaction reduction. In the hash-based technique, during the scanning of each transaction in the database to create the 1-itemset, a hash table is formed using the 2-itemsets of each transaction while increasing the bucket count. A 2-itemset hash table where the bucket count is below the support threshold cannot be frequent and therefore should be removed from the possible candidate set.
Transaction reduction, is the removal of transactions that do not contain any frequent k-itemsets because they cannot contain (k+1)-itemsets as well. This removes all the unrelated itemsets from consideration. |
Once you had tenure, what incentive was there for you to continue working hard? Why couldn’t you abandon all original research, publish little or nothing, and teach boring classes? Theoretically, one could do that. Tenure protected you unless you were shown to be incompetent or behaved in an unprofessional manner, so if you continued to meet your classes, assign grades, and perform a few administrative tasks, and if you avoided scandals, you could count on continuing to be a member of the faculty.[1] But faculty members are almost always intellectually ambitious. They enjoy discovering things, they are eager for others to recognize the quality of their work, and they tend to be competitive, so there was ordinarily no danger that they would stop working hard. Even so, there developed over time a number of ways in which the dean could observe the work of each department and the chair could assess the work of each faculty member in the department. Some of these had been in existence for decades.
Course evaluations and the observation of teaching. From at least the 1970s on, faculty were expected to have their students in each course fill out anonymous course evaluations at the end of the semester. The students’ ratings of their instructors were compiled by the department staff and made available to the chair. Once an instructor had turned in the final grades for all of the students in a course, the evaluation forms were returned to the instructor so that he or she could read the students’ comments.
As for sections of courses taught by graduate teaching assistants (TA’s), they were all visited and observed at least twice each semester by one or two full-time faculty members. After observing the class, the faculty member would meet with the teaching assistant and provide feedback, including recommendations for improvement and encouraging comments, and the faculty member and TA would discuss teaching techniques and strategies. The faculty member then wrote up his or her observations and sent them to the chair of the department.[2]
Annual reports. Each year, in the spring, all full-time faculty members wrote out a list of their professional activities and accomplishments over the previous twelve months. This written report would include lists of publications, courses taught, professional papers delivered, field work (such as archaeological excavations) and administrative and service appointments: everything, that is, that the faculty member had done of a professional nature. The chair of the department would in turn assemble a report on the work of the department, both as a whole and as individuals, and that report would go to the dean, who was thus provided each year with a detailed statement of the activities and productivity of every department.
Self-study. Every department in the College of Arts and Sciences undertook an extensive self-study once every ten years. The self-study involved the gathering and analysis of information that included a detailed description of the department, an assessment of its strengths and weaknesses, and projections of future opportunities and initiatives. The information thus gathered covered all aspects of the department’s resources and work: its faculty, staff, students, facilities and equipment, degree programs, teaching, advising, research, publications, public service, and budget. A committee of three faculty members from peer institutions came to campus, interviewed the members of the department, and assessed the department’s efforts in the past and plans for the future.[3] The external review committee presented a written report, with recommendations, to the dean, and the department, after discussing those recommendations, gave the dean a written response to them. In addition, the department forwarded to the dean all of the information it had gathered and its own assessment of its place in the college, its responsibilities, and its past and projected contributions to the university and the state.
In the aggregate, these assessment procedures and evaluations provided a clear and regularly updated picture of what the department and its faculty were doing. There was powerful motivation for faculty to keep the quality of their work at a high level: their salaries. Faculty salaries could be raised once each year, on July 1. The state legislature usually allotted a certain percentage of the state budget for raises for state employees and teachers.[4] The legislature often directed that a particular portion of the raise money be used to provide across-the-board raises–that is, that every state employee would get, say, a raise of 2 percent–but it also frequently specified that all or part of the raises should be based on merit.
How was an individual faculty member’s “merit” determined? Some departments assigned the task to a committee, but in classics it fell to the chair of the department. The chair would need to take into account all of the given faculty member’s professional accomplishments over the previous year before deciding how large a raise, if any, to recommend for that person. In this process, the faculty member’s own annual report was a crucial source of information for the chair. Having reviewed the available information, the chair made recommendations on salaries to the dean, and the dean either approved them or rejected them, in the latter case asking for further information or justification before final decisions were made. This relatively simple system held each faculty member accountable and provided a strong motivation for all faculty to perform at the highest level they could. The series of reviews, evaluations, reports, observations, and self-studies had evolved over the course of many decades, beginning well before our period, but it was in place more or less as described here all through the second half of the twentieth century.
Change, however, was on the way. In the 1960s and 1970s, higher education in America came under increasingly critical scrutiny. There were repeated calls for more systematic evaluations of the universities and for greater “accountability” and “transparency” in their management. The reasons for this were many and complex. Some colleges and universities were in genuine financial trouble, either because of mismanagement or due to external factors. Costs were rising rapidly.[5] In the social unrest of the late 1960s and later, students and faculty had generally taken a liberal view that annoyed or alienated many conservatives. There was a resultant struggle (still in progress as I write) for control of institutions of higher learning: who would determine what universities did and what they taught in their courses?
A kind of narrative, critical of American universities, evolved and was widely accepted: universities, some people believed or alleged, were being administered irresponsibly. Public money was being wasted, and faculty were overpaid and not held accountable for what they did. It was hard, critics claimed, to tell how universities spent their money.
American universities were, in this view, being poorly managed. American business, on the other hand, was believed to be efficient and productive. Obviously, the narrative concluded, the thing to do was to apply the techniques of business to the university; and that is exactly what a variety of people, for a variety of reasons, proposed and, over the course of time, tried to do, with varying degrees of success.
This book is not the place for a detailed discussion of these phenomena, which were far more complex than I have indicated here, but a few comments may be useful.[6] Already by 2000 there was a considerable literature encouraging college administrations to adopt management techniques drawn from business, and a corresponding literature pointing out the problems in such an approach.[7] It always seemed to me wrong-headed to employ business techniques in universities. The differences between the two (business and education) quickly became apparent. It was noticed early on that it is very difficult to define “product” in a university context. This led to much discussion and the eventual development of concepts such as “value added” to the student: this, it was argued, was the “product.”[8] It is also difficult to transfer to a university the idea of the “customer.” Is this the student? The student’s parents? Or the society that will benefit from educated young people? Or is it perhaps the potential employers of the students? Businesses, of course, exist to make a profit. What would a public university’s “profit” be?[9] To put it briefly, it seemed to me that universities and businesses are different in fundamental ways. We might recall Professor Higgins’s complaint, in My Fair Lady: “Why can’t a woman be more like a man?” They are different, and for good reason.
However this may be, the university at Chapel Hill, like most colleges and universities, was certainly affected by these external developments. In Murphey Hall, we first began to be aware of them through our budget and the information we were asked to provide each year in anticipation of the budgeting process. There were directives and mandates that came down from the dean’s office or some other administrative unit and that required information, or some course of action, or self-analyses, that had not been required before, or that asked for the information to be provided in new, generally numerical, form. In addition, through our conversations with colleagues at other institutions we learned of new policies and procedures that were being instituted elsewhere and that might be expected to come our way.
Course evaluations. The department had long used course evaluations, which students completed at the end of each course. The students would rate the effectiveness of the instructor, the value of the assigned materials (both written and visual), and the overall value of the course. In the 1970s, the department adopted a brief standardized form, designed by our chair, George Kennedy, of about five questions plus comments. Later, beginning perhaps in the 1980s, we were encouraged to use machine-readable course evaluations. These had some twenty-five questions in the form of statements (“The amount of assigned reading was suitable”; “The instructor was easy to understand,” or the like), and the student would fill in a box for each statement: “strongly agree”; “agree”; “disagree”; or “strongly disagree.” There was room also for comments. We were encouraged, but not required, to use these forms; they were attractive to deans because they allowed for numerical values, so that one instructor could easily be compared to another, and one department to another. Their shortcomings are as obvious as their convenience: a course and even a single class is a complex event, and one that can hardly be captured through a set of numbers. But they were useful to chairs and deans and continued in use. Later still, the evaluations could be filled out online, with the results then available almost instantly. But there was still no absolute requirement that such forms be used, and if my memory is correct there was always some provision for written comments in addition to, or in place of, the numerical ratings; there was always, in Chapel Hill, a certain sanity in the application of such things.
Outcomes assessment. Toward the end of the twentieth century, or in the very first years of the twenty-first, departments were asked by the administration to design a suitable method of measuring “student learning outcomes” and then to propose “measurable” ways to improve those outcomes. The students whose learning was thus to be measured were classics majors and other students in advanced courses, not those undergraduates who took just one or two courses in our department. In accordance with this mandate, we designed a method of tracking our students over time, to see the degree to which certain skills (their knowledge, for example, of Greek or Latin) improved. We appointed a committee; the committee gathered, read, and assessed our students’ work. We could then adjust our methods of teaching, change textbooks, and so on, to improve the outcome.
The wording of the “outcomes assessment” requirement came, of course, from the business world. The requirement meant that several members of the faculty–the committee–devoted a good deal of time in a given year to reading papers and exams written by students they had never taught, and it thus subtracted from the time they had for teaching their own courses and advising their own students. It also meant a good deal of record-keeping and organization on the part of the department’s staff, because the exams students wrote when they were first-year students needed to be kept and compared to the ones those same students wrote two, three, or more years later. I was not enthusiastic about outcomes assessment. It took much more time than was justified by what we learned about our students and our program.
Electronic annual reports. Just as the course evaluations filled out by students gradually migrated to electronic forms, so the annual reports of faculty too became, over time, fully electronic and standardized. This made it easier for faculty to complete their annual reports, because now they could easily add or correct items right up until the moment they submitted the report. It also meant that a good deal of the annual report was quantifiable, allowing the dean, say, to make numerical comparisons, one faculty member to another or one department to another.
Post-Tenure Review. In 1998, the Board of Trustees approved a requirement for post-tenure review. Every tenured member of the faculty was to undergo an extensive review at least once every five years. The review was to cover all aspects of the faculty member’s professional work: teaching, research, and service. In classics, and I assume in other departments, the review involved several steps. The chair appointed a review committee of three senior faculty. The members of the committee visited the faculty member’s classes, read his or her dossier, and noted the faculty member’s work on committees and administrative assignments. The committee then wrote a report and submitted it to the chair. The chair ranked the faculty member’s work as superior, above average, satisfactory, or deficient. If the chair found the performance to be deficient, then he or she was to devise a development plan for the faculty member. The goal of this review was to promote faculty development, ensure faculty productivity, and provide accountability. The practical effect of it was to involve four members–nearly a third–of the department in a good deal of work: the person being reviewed had to assemble a considerable dossier, including a current CV, copies of publications, a research statement, and a teaching statement. The three members of the committee had to read and assess all of this material and visit the faculty member’s classes. Thus hours that might have been spent advising a student on an Honors thesis, say, or preparing a new course, were siphoned off and used for a practice that originated in the business world.
Strategic Planning. The department as a whole had long undergone periodic self-studies, as we saw above. In the late 1990s, a new periodic analysis of the department was added: the strategic planning document, another procedure imported from the business world. In brief, a strategic plan involved a careful self-assessment of the department as it was at the time of the study; an identification of the department’s strengths and weaknesses; and a look outside the department and into the future to identify coming challenges and opportunities. In simple terms, for example, the department might note that there was a shortage, nationwide, of field archaeologists, and propose that our archaeology program, already strong, should be strengthened further to fill the need for archaeologists.
None of this self-assessment was unusual. It was what we did constantly, talking to colleagues at other institutions and to former students, and it formed the basis of the ten-year self-studies. But the vocabulary changed, to take on the formidable terms common in business, and the production of documents increased.[10] And, of course, faculty energy and a great deal of staff time went to the preparation of the strategic planning document: information had to be gathered; there were meetings and discussions; committees and subcommittees turned out drafts of reports and recommendations; and the department had to produce and agree on a final text. Time that in previous decades would have gone to advising students, teaching classes, research, and service, was increasingly devoted to the production of documents for the use of administrators.
Back Next
[1] A faculty member could also be dismissed if his or her department had to be dissolved, or if the school found itself in serious financial difficulty. But these had nothing to do with the individual’s professional activity.
[2] I do not know when the department first began to have the classes of TA’s observed by faculty members. When I taught as a TA in 1964 and 1965, there was no such system in place. Probably the systematic observation of classes taught by TA’s began with the appointment of Jane Phillips Packard as supervisor of the elementary Latin program in about 1970. Cecil Wooten took over as supervisor in 1980 and developed the program further; it is that fully developed program that I describe above. Wooten himself visited each elementary Latin section twice; but by 1990 other faculty too were visiting the courses taught by graduate students. In Latin courses, that meant that each TA was observed and mentored by both Wooten and another faculty member. In other courses, such as Greek myth, a faculty member was assigned to work with, observe, and advise each of the graduate student instructors.
[3] In our case, the “peer institutions” tended to be other large public research universities, including Virginia, Michigan, Texas, and California (Berkeley), or private universities with strong liberal arts programs such as Vanderbilt.
[4] The amounts varied greatly from year to year. In some years, when the state was not doing well financially, no money at all was budgeted for raises.
[5] See, for details, George Keller, Academic Strategy: The Management Revolution in American Higher Education (Baltimore and London, 1983), 4-11. By costs, I mean here primarily the costs of operating a college or university, but of course rising operational costs led to rising tuitions, or cost to students, too.
[6] George Keller’s book (above, n. 2) was a call for the employment of business techniques in the management of colleges and universities, and one of the most influential such texts. For a skeptical account of the suitability of business techniques in academia, see, e.g., Robert Birnbaum, Management Fads in Higher Education: Where They Come From, What They Do, Why They Fail (San Francisco, 2000). For a perceptive account of the power struggle underlying the call for accountability, see Richard Ohmann, “Historical Reflections on Accountability,” Academe 86, No. 1 (Jan.-Feb. 2000), 24-29.
[7] Birnbaum, Management Fads, 24, provides a list of books whose titles show the rapid movement of business techniques into the academic world.
[8] That is (if I understand correctly), the student is viewed as a tool, to be employed after graduation. What the university was selling–that is, its “product”–was the student’s increased knowledge or skill, which was to be measured by calculating how much more he made, in lifetime salary, than he would have made had he not gone to college.
[9] I am concerned here with traditional non-profit institutions. The various “for profit” schools, of which there are now (in 2017) about 175, are an entirely different matter. The product they are selling is clear enough: it consists of certain specific skills and degrees attesting to those skills. Their profit is clear, too: the funds paid by students as tuition minus expenses of operating the institution; those remaining funds go to the people who have invested in the institutions.
[10] There is an instructive list of the jargon associated with the importation of business techniques in Ohmann, “Historical Reflections on Accountability,” 26. It is drawn mostly from the journal University Business, and includes terms such as “stakeholders,” “brand,” “strategic partners,” “resource base,” and many others, all of which were then (in 2000) quite new to academia. |
English Quiz for NDA & Other Defence Exams: 13th April
Direction (1-10): Each of the following sentences has a black space and four words are given below it. Select the word you consider most appropriate for the blank space.
Q1. Best friends have a deep ____________ which is often inexplicable to others.
(a) camaraderie
(b) bland
(c) veneer
(d) facade
Q2. After receiving a windfall, the foolish man showed his ____________ by spending every dime on frivolous purchases.
(a) liturgy
(b) fatuity
(c) sagacity
(d) custom
Q3. The new comer was quickly promoted when his employers saw how ______________ he was.
(a) indigent
(b) indifferent
(c) assiduous
(d) lethargic
Q4. She did it ______________ her will.
(a) beyond
(b) against
(c) contrary
(d) oppose
Q5. A good teacher should __________ responses from the students.
(a) elicit
(b) provoke
(c) command
(d) infer
Q6. William Shakespeare is also famous for his ___________wit.
(a) natty
(b) nondescript
(c) morbid
(d) mordant
Q7. I am still paying off debts _________during the marriage of my daughter.
(a) accrued
(b) occurred
(c) tedium
(d) piled
Q8. The separate details ____________ to form a single body of scientific thought.
(a) coalesce
(b) raiment
(c) largesse
(d) megalith
Q9. Because I wanted to ____________ my favourite actor at the movie premiere, I stood outside in the rain for seven hours.
(a) forage
(b) starry
(c) descry
(d) impute
Q10. He was ____________ at being excluded from the meeting.
(a) vanguard
(b) peeved
(c) upfront
(d) savant
S1. Ans.(a)
Sol. Camaraderie: Mutual trust & friendship among people who spend a lot of time together.
Bland: Lacking strong features or characteristics and therefore uninteresting.
Hence option A is the correct choice.
S2. Ans.(b)
Sol. Fatuity: Pointless foolishness and stupidity.
Hence option B is the correct choice.
S3. Ans.(c)
Sol. Assiduous: one who works hard or does things very thoroughly.
Hence option C is the correct choice.
S4. Ans.(b)
Sol. Option B is the correct choice.
S5. Ans.(a)
Sol. Elicit: evoke or draw out (a reaction, answer, or fact) from someone.
Hence option A is the correct choice.
S6. Ans.(d)
Sol. Mordant: (especially of humor) having or showing a sharp or critical quality; biting.
Hence option D is the correct choice.
S7. Ans.(a)
Sol. Accrue: accumulate or receive (payments or benefits) over time.
Hence option A is the correct choice.
S8. Ans.(a)
Sol. Coalesce: Come together to from one mass or whole.
Hence option A is the correct choice.
S9. Ans.(c)
Sol. Descry: Catch sight of.
Hence option C is the correct choice.
S10. Ans.(b)
Sol. Peeved: Aroused to impatience or anger.
Hence option B is the correct choice.
No comments |
Although a litter is borne from one mother, it is possible there are multiple fathers involved. This means that the genetic predisposition of each puppy in terms of behavior, illness, colorings and all things biological may be difficult, if not impossible, to determine. The good news is that no matter who the father is, the puppy’s minds will develop in the same way.
img-26 Significant behavior changes take place as the mother begins weaning her pups, from one of caregiver and dependent, to one of leader and subordinate. This is the relationship the dog will continue to encounter and learn from during its life with a human pack.
As weaning begins, the mother may get up and walk away from her pups as they try to nurse, or she may growl and snap at them. Puppies will encounter vocal threats, nipping and pawing from the mother when she wants to be left alone or if they are misbehaving. This is the puppies’ first exposure to learning communication with other dogs.
Interestingly, the severity of the mother’s behavior has been found to play a direct role on the puppy’s behavior when interacting with humans. Although the dog’s mind can be quite malleable, critical periods such as this can affect long-term behavior.
Playing with littermates provides another arena of learning. As with human children, play teaches a puppy certain social skills they will need as adults: communication, improved coordination and problem solving. Getting along with others, dominance, submission, and bite inhibition are other important lessons learned from play. Bite inhibition is learned when a puppy discovers that if it bites too hard a strange response is elicited from its playmate, a loud high-pitched yelp, “Ouch! You hurt me!” The biter is so startled it immediately lets go. This gives the bitten dog a chance to either walk away or continue playing. The biter learns that if the game is to continue, his bites must be softer. An inkling of social structure also becomes apparent to the puppy during play. Some dogs will naturally be more dominant, others more submissive. Puppies learn how to read and respond to these traits during play and use those lessons when unfamiliar dogs or humans are encountered in the future.
By the time the puppy is taken from the litter to live with its human pack, responses and behaviors, innate and or learned, are becoming hard wired into their brains. |
Climate change at the global and local levels is reducing water flow in the Mahanadi River, severely impacting agriculture. Tackling that together is far more important than fighting over the sharing of its waters
The construction of the Hirakud dam in the 1050s started the decline of the Mahanadi River basin, experts say (Photo by Ranjan K Panda)
The construction of the Hirakud dam in the 1950s started the decline of the Mahanadi River basin, experts say (Photo by Ranjan K Panda)
The provincial governments of Odisha and Chhattisgarh have locked horns over the sharing of waters of the Mahanadi, India’s sixth largest river. Odisha, the lower riparian state, has seen a constant decline in flow from to Hirakud dam, which lies on the inter-state border with most of its catchment area in Chhattisgarh.
Odisha’s complaint is that Chhattisgarh has built many dams and barrages, most of them without its consent. The conflict that erupted in July 2016 has already been referred to a tribunal formed by the federal government under the Inter-State River Water Disputes Act (IRWDA) of 1956. However, political parties heading both state governments have been continuing their fights on the streets.
The fight so far is about the remaining water that flows in the river, and the tribunal may come up with a formula for sharing water. The Mahanadi and its people, however, are facing challenges that go beyond the water obstruction and reduction due to construction of dams and barrages in Chhattisgarh. Climate change is one such challenge that has been affecting the river and common people in the basin for years now, and is a major cause of distress to the farmers and decaying of the river.
Farmer distress
Uddhaba Sabar, a smallholder farmer in one of the poorest districts of the basin in Odisha, has nothing to lose from the Chhattisgarh barrages. He has no assured irrigation and has to depend on the monsoon to farm. He is worried about the late arrival of monsoon showers and the failure of predictions by the India Meteorological Department (IMD).
“Last year, I had sown seed on June 18. It [the monsoon] is delayed this year and will negatively impact farming activities. Rain is still uncertain. It rained in Gandabaheli village last night, which is hardly 15 km away, but not here,” a worried Sabar told
Nuapada district, to which his village belongs, is among the eight districts of the state that have faced a severe rainfall deficit — between 39% and 59% in June. Most of these districts are in the western region and in the Mahanadi basin, as per the data available with the government of Odisha.
Overall, Odisha received an average rainfall of 161.1 mm in June this year against the long-term average (LTA) of 216.5 mm, registering a deficit of 25.6%. According to government statistics available by the third week of June, the state had already experienced more than 25% deficit in sowing of lentils.
Uddhaba Sabar, a stressed farmer in poverty stricken Naupada district in Odisha, has been facing recurring droughts (Photo by Ranjan K Panda)
Uddhaba Sabar, a stressed farmer in poverty stricken Nuapada district in Odisha, has been facing recurring droughts (Photo by Ranjan K Panda)
“The rain-dependent farmers are reluctant to sow as they are not sure about the monsoon rains. The farmers from western districts of Odisha may still wait for one more month before deciding to migrate in search of alternative jobs,” Ajit Panda, a researcher and social activist in Nuapada, told “Millions migrate out each year from this region due to the distressed condition of agriculture.”
Sabar’s worry stretches far beyond this year’s situation. He is experiencing a change in climate and an increase in frequency of droughts in the area. “Drought is not new to us, but the frequency in the last two decades is alarming,” he said. “Things started to change from 1965 and frequency of droughts has increased gradually. Between the seventies and nineties, we faced a drought in every eight to ten years, but in the last two decades, droughts are occurring in every 2-3 years.” If the crops fail this year, it will be a consecutive fourth year of drought for Sabar and most other farmers.
A dam can change the game
The Hirakud dam, which is at the centre of controversies in the current dispute between Odisha and Chhattisgarh, might have played a big role in altering local climatic conditions, thereby exposing this region in the basin to more droughts. Arttabandhu Mishra, a retired professor of Sambalpur University and an expert on ecology and climate change issues of the state for long, believes this.
The Hirakud reservoir, completed in 1957, had initiated the process of desertification around the dam, Mishra said. Hirakud reservoir, like many other large reservoirs in the tropical and sub-tropical regions, is home to one of the biggest contributors of greenhouse gas (GHG) emissions. The reservoir submerged a vast stretch of rich and diverse forest, which included Jamda reserve forest and a large portion of the present Debrigarh reserve forest.
“At least 58,200 hectares of forest, rich in teak and sal species, got submerged in the reservoir water,” Mishra told The trees were never cut and left to decay under the water, which caused huge methane emission, according to him.
Until recently, it was believed that dams and reservoirs contributed nearly 20% of the total man-made methane emissions. However, more recent research says that they contributed 25% more methane emissions than previously estimated.
Microclimatic changes
The woes did not end there. Besides desertification, the Hirakud dam has caused massive microclimatic changes in the region, asserts Mishra. “As a result of the forest submergence and creation of such a huge man-made water body, a lot of moisture gathers around the clouds. So, when the monsoon clouds pass over the reservoir in the northeast, there is a lot of rain. This causes severe and recurring droughts on the other side of the reservoir, that is in the KBK (Kalahandi-Balangir-Koraput) region,” he maintained. Nuapada, Sabar’s district, is in this region that has now become synonymous with drought.
Global climate change, inducing erratic rainfall, is also affecting the Mahanadi basin in a big way. Several scientific studies have been pointing out how global warming is causing severe distress to the basin. A 2010 study, which was conducted using various scientific models, presents a decreasing trend in monsoon rainfall and the flows of the Mahanadi at Hirakud dam.
An earlier study on the Mahanadi also observed a decrease in monsoon stream flow over a long time. One of the possible reasons for such a decreasing trend is the significant increase in temperature due to global warming. Analysis of instrumental climate data has revealed that the mean surface temperature over India has increased at a rate of about 0.4 degree Celsius per century, which is statistically significant.
The reduced flow in the Mahanadi River is causing widespread farm distress (Photo by Ranjan K Panda)
The reduced flow in the Mahanadi River is causing widespread distress to farmers (Photo by Ranjan K Panda)
The state government’s own sources find a substantial increase in temperature in the Mahanadi basin. While in the year 1999-2000, the minimum and maximum temperature of the basin ranged between 7 and 45.5 degrees Celsius, it went up to a range between 13 and 48.8 degrees by 2012. It would have certainly impacted the water retention capacity of the basin in the negative.
A recent study finds that the water yields of major surplus basins, such as Mahanadi and Godavari, have exhibited decreases in recent periods. The water yields show decreases of more than 10% for the Mahanadi. This is mainly because of a significant decrease in rainfall.
Dispute resolution
There is an urgent need to integrate climate resilience models in the river basin management planning of the nation. For Mahanadi, the need is urgent because drought is expanding its grip, marginalising millions of farmers and forcing millions to migrate seasonally. Both Odisha and Chhattisgarh have climate change action plans that need to work in sync with each other to save Mahanadi River, its farmers and other dependent communities from climate impacts.
While the dispute between the two states has been fuelled by apprehension and experience of reduced water flow in the basin due to dams and barrages, the state governments need to recognise that climate change has an equally important effect and its impacts are going to grow manifold. Instead of waiting for the tribunal to come up with a water-sharing formula, the two governments will do far better by initiating joint activities to make the basin more climate resilient, as was recommended by the recently concluded Odisha River Conference, which was attended by community members and experts from across the nation.
Share This |
Official Information
Karaganda 14°C
Virtual reception
Geographical position
Karaganda region is the largest region in the territory (15.7% of the total area of Kazakhstan) and is located in the heart of the continent of Eurasia, almost equidistant from the Arctic and Indian, Atlantic and Pacific Oceans. The region occupies the most elevated part of the Kazakh small mountain area - Saryarki, which is a peculiar, highly heterogeneous in geomorphological terms, highly elevated territory (absolute height of 400-1000 meters).
In the west, it is adjacent to the Torgay Hollow and the northeast of the Turan Lowland, in the south, the clay desert of Betpakdala and Lake Balkhash. The relief is complicated by low-slope depressions, river valleys, dry beds of watercourses, ravines with outlets to the surface of groundwater, closed drainage, lake hollows, steppe saucers.
In the west of the region are the Ulytau mountains (1133 m), in the eastern part of the Karkaraly mountains (Zhirensakal mountain, 1403 m), Kent (1469 m), Ku (1356 m), Kyzyltas (1283 m), Kyzylarai (Aksoran mountain, 1565 m, the the highest point of Saryarka), Keshubai (1,559 m) and others; in the south-western and southern parts of the region there are sandy massifs of the Aral Karakum, two Moyinkum, Zhetykonyr and others.
The region borders in the south with South Kazakhstan and Zhambyl, in the north with Akmola, in the north-east with Pavlodar, in the north-west with Kostanay, in the east with East Kazakhstan, in the west with Aktobe, in the south-west with Kyzylorda, on southeast with Almaty regions of Kazakhstan.
The territory of the region is equal to 428 thousand square km, which is equal to the area of such states as Belarus, Lithuania, Estonia and Latvia taken together. In the region there are 9 rural districts, 11 cities, 9 settlement administrations, 187 rural administrations, in them 421 rural settlements. The population of the region as of January 1, 2018 was 1 million 380.3 thousand people or 7.6% of the total population of the Republic of Kazakhstan. The average population density in the region is 3.2 people.
Representatives of more than one hundred nationalities live in the region. The share of Kazakhs in the total population was 51.3%, russians - 35.8%, ukrainians - 3%, germans - 2.3%, tatars - 2.2%, koreans - 1%, belarusians - 0.8%. The share of persons of other nationalities is 3.6%.
The center of the region is located in the city of Karaganda, founded in 1934. As of January 1, 2018, 501.3 thousand people or 36.3% of the total population of the region live in the city. The regional center of Karaganda is located at a distance of 222 km from the capital of the Republic of Kazakhstan - the city of Astana. The largest region of the region by area is the Ulytau district - 122.9 thousand sq. Km.
Дата cоздания: 29 July 2007 06:00
Дата редактирования: 20 November 2018 14:56
The President of Kazakhstan Address to the Nation of Kazakhstan.2017
Official site of the president of the republic of kazakhstan
Kazakhstan Strategy 2050
The Prime Minister of Kazakhstan
Show the entire site map |
How Is Bitcoin’s Future Value Calculated?
Analysts use different models based on certain assumptions to calculate the possible future value of Bitcoin. Depending on the assumptions they choose, and the general likelihood of the model they make, the more success they’ll have predicting the right price.
For example, one can choose 4 assumptions and create a model. The following model is just a basic explanation of how this works and it is not an actual model that would be used by an analyst.
The first assumption could be that bitcoin will derive its value both from its use as a medium of exchange and as a store of value (a store of value refers to any form of wealth that maintains its value without depreciating, like gold for example).
The second assumption could be that the supply of bitcoin will approach 21 million as specified in the current protocol.
The third assumption could be that as bitcoin gains legitimacy, larger scale investors, and adoption its volatility will decrease to the point that volatility is not a concern that would discourage adoption.
The fourth assumption could be that the current value of bitcoin is largely driven by speculative interest. One can assume a speculative interest in bitcoin will decline as it achieves higher adoption rates.
The simplest way to approach the model would be to look at the current value of all mediums of exchange and stores of value that are comparable to bitcoin and calculate the value of bitcoin’s projected percentage. The next steps would include adding other variables mentioned in the above scenarios. The final product will be a model with parameters that could estimate the price of bitcoin in the future.
So far, there is no right model for predicting bitcoin’s future value but a wrong model is better to have than to not have a model at all. Of course, there are both relatively good and bad models. The better models are those that have smaller aberrations from the actual price. An experienced analyst would probably make a better model than some beginner.
Leave Your Comment
Leave a Reply |
To help prevent sensitive data in VMDK files from being read off the physical disk after it is deleted, write zeros to the entire contents of a VMDK file ("zero out") before you delete it, overwriting the sensitive data. When you zero out a file, it is more difficult for someone to reconstruct the contents.
Shut down or stop the virtual machine.
On the ESXi host, locate the VMDK file by running vmware-cmd -l to list all virtual machine configuration files.
By default, the virtual disk file has the same name as the VMX file but a .vmdk extension.
On the ESXi host, run the command vmkfstools --writezeroes filename.vmdk.
Here, filename.vmdk is the name of the VMDK file.
Delete the file from the datastore.
For more information about initializing a virtual disk using vmkfstools, see the vSphere Storage documentation. |
Site Loader
Rock Street, San Francisco
First of all, how can trade lower down costs of production? As developing countries open up their markets, industrialized countries relocate their companies or its parts to new locations, because the benefit will include cheaper labour and a reduction or even absence of tariffs and tax exemptions offered by host countries. At the same time, it gives employment opportunities to host countries. A good example might be a move of the telecommunication industry to India: we get cheap phone calls, cheap internet, etc. , while Indians get their jobs. May look like two targets with one shot.
However, here the question comes how does it affect labour in developed countries? There are two main issues to be considered: first, what happened to the jobs in case of companies moving outside the country and, second, do cheap imports (may be from the same company that lowered its cost of production and thus, reduced its prices for consumers) cost jobs? Let’s look at the problem from the theoretical side and assume that industrialised countries produce two types of products: financial services (human capital intensive) and basic manufacturing (low-skilled labour intensive).
“Opening up for trade with the developing countries increases the supply of low-skilled labour intensive goods”13. This means, in order to compete (have an absolute advantage) industrialized countries must keep their costs of production low by cutting down wages or increasing productivity. But increased productivity leads to higher wages. This is confirmed by Figure1 below. The figure shows a strong tendency for the average wage to be higher in countries with higher average labour productivity (relative to the United States).
Figure 1 Average Labour Productivity and Average Wage in Manufacturing, 1995 14 !Debate! Global Policy Forum (GPF) claims absolutely contradictory statistics for the US: “In 1998, weekly wages were 12 percent lower than in 1973 on an inflation-adjusted basis. Productivity rose 33 percent over that period. Had pay kept pace with productivity, the average hourly wage would now be $18. 10, rather than $12. 77. That translates into a difference in annual pay of $11,000 for a full-time, year-round worker. “15
Thus, there are two ways: either protect domestic jobs by imposing different tariffs, quotas ; barriers on imported goods or simply allow cheap imports. In first case, is it worth to raise up tariffs ; non-tariff barriers? How much does it cost to protect a job? For example, it was estimated that it costs US consumers $60,000+ to buy US made clothing for each job “saved” by protectionism. However, the total gain in wages and profits is far less than $60,000. Krugman estimated that US consumers spent an additional $110,000 for each job saved in the auto industry.
16 According to Patrick A. Messerlin’s (professor of economics at the Institut d’ Etudes Politiques de Paris, 2001) examination, he estimated similar effects for 22 highly protected industries in the EU for 1990 (Figure2 below). He found that, the EU “consumers pay an average of about $191,000 per job maintained. Per year, this is over 6 times the average compensation for manufacturing worker in each country”. 17 Figure 2 Costs of jobs saved by protectionism in the EU for 1990. 18
Relaying on the data above, we can say that protectionism is expensive. While the Globalisation and Outsourcing Conference in New York, June 15, 2004, the first Deputy Managing Director of International Monetary Fund (IMF) Anne Krueger asserted that the important reason why protectionist pressure so often succeeds “is that it is easy to see where a job, or jobs, might be lost because of change, but virtually impossible to see where new jobs might have been created because of the new opportunities that technology or trade might bring”.
She also agreed that some jobs will be lost through trade, “just as some firms lose out because they are not sufficiently competitive. That this is so is not a new development, of course. Some skills inevitably become obsolete. That is where social safety nets come in, to help those affected get financial assistance, job retraining, and so on. Expensive job protection is not the answer”.
So from a choice of two, the cheapest, and probably, the best way for industrialized countries is just to liberalize trade20 and allow cheap imports and shift from “mass” labour to the generation of “elite” (knowledge, skilled) labour force (Comparative advantage, HO theory). Figures 3;4 21 present the empirical evidences of this shift: Figure3 shows a steady decline of proportion of manufacturing employment in selected countries between 1970 and 1996, while Figure4 illustrates a constant rise in service employment in that countries during the same period of time.
Figure 3 Figure 4 However, trade liberalisation may result in a permanent reduction in relative demand for low-skilled labour in the industrialized countries22; that in turn leads to a relative fall in low-skilled wages (Stolper-Samuelson Theorem23). The debate here is that on the other hand, it also might result in an increase in relative demand for skilled-labour, leading to a relative rise in skilled wages. So this is where an increasing wage inequality takes place.
For example, Business Week reports that in 1999 top executives earned 419 times the average wage of a blue-collar worker, up from 326:1 in 1998. In 1980, the ratio was 42:1 24 However, the importance of the above is that it may not let low-skilled unemployment to rise significantly even though it lowers down wages; and on the contrary, if wages are stable or rising, it will lead to an increased low-skilled unemployment, and this is what practically happened in Germany between 1970 and 1995 (see Figure5 below).
Figure 5 Relative Employment and Relative Wage of Low-skilled Employees in German Manufacturing Industries 1970-199525 Referring back to the question what happened to the jobs if companies re-locate partly or fully abroad, from the total employment level perspective, nearly all workers who lose their jobs will be re-employed sooner or later, even if sometimes for less paid jobs. As mentioned before, this may push them into thoughts about getting a higher education, go for training and qualify for a skilled job.
Relaying on the theory above and the position of labour in industrialized countries, let’s turn our attention to developing countries. As we have already seen that developed countries are turning towards producing human capital intensive goods and demand for low/unskilled labour has lowered there. Thus, according to the Stolper-Samuelson theorem, this will raise demand for low-skilled labour in developing countries and they will specialise in labour intensive goods (manufacturing goods), that in order will decrease unemployment and increase wages.
Does the theory prove in the real word? According to the Asia Regional Information Centre (ARIC) which provides an array of regularly updated information about the economic performance & prospects of 16 Asian nations, there is no evidence to support the theory. Table 2 below illustrates unemployment rates from 1990 to 2003 in some of the nations. The general trend of rising unemployment is clearly visible.
Post Author: admin
Leave a Reply
|
Can Machine Learning Ensure Better Smart Home Security?
Check out Deals of Today! Grab the Special Discounts Now.
Who in their wildest dreams could have thought of smart homes? Imagine of residences with appliance and systems that can communicate with each other, or can be controlled remotely by a time schedule, from one area in the house, or even from any place on the globe through the internet or by phone. Isn’t this awe-inspiring? Well, certainly it is but it is today a reality thanks to technology.
Machine Learning for Smart Home Security
Many people nowadays have a grasp of how smart homes can be. However, even with the great benefits one can derive from them- energy conservation, security, comfort, convenience and others- most of the people are yet to take up the concept.
So, why are many not yet living in the futuristic homes, once only seen in childhood cartoons and science fiction movies? A sizeable portion of people who have indicated they would hesitate to have smart homes were mainly concerned about security and data privacy.
If data privacy and security are the issues, what can then be done to raise the confidence levels in smart homes? Among the solutions, machine learning is one of them and could cause a positive shift in the perception of a smart home.
Machine learning technology and artificial intelligence are constantly growing
With the Internet of Things (IoT), smart homes are fitted with technologies like thermostats that can be controlled by your phone. It is projected that by 2020 the IoT industry will surpass $1.7 trillion in revenue. Numerous devices are connected to the Internet, meaning that more and more data is being collected on a daily basis.
The only concern is that there is a potential for wrongful exploitation of the data by criminals. With machine learning and artificial intelligence, this data can be brought into correct use, with the processing carried out in the manner that the users prefer.
How machine learning and artificial intelligence can be of use
As noted above, data is being collected daily from several platforms. With several connected devices to the Internet, the possibility of gathering huge sample sizes of data that can be of great use is high. With the aid of machine learning, computer systems can access data and then learn to identify patterns when it comes to identification of security threats.
At the moment, the devices that have been created by manufacturers cannot educate machines, but with machine learning and artificial intelligence concepts, experts are working on devices to address the issues. Machine learning comes with numerous possibilities. With collected data, you can use machine learning to make predictions. For a business, predictions on consumer patterns can be made. Machine learning is a game changer in every sector. You can get experts from a reliable service provider like ActiveWizards to help sort all your machine learning needs.
How machine learning can improve smart homes
The IoT allows people to collect huge amounts of data. This data can be analyzed and then used to create devices that suit the needs of the user. With machine learning, the data that has been gathered can be analyzed with the aid of strong algorithms to help draw useful insights from the data.
These insights can be acted upon to create smart homes devices that can address all security concerns that the current devices do not address. These devices can even learn from the data that has been collected with the aid of machine learning. People’s preferences keep on changing as time goes by. This can even happen to those who own smart homes. With machine learning, the smart devices can adapt to suit these new preferences.
Machine learning and artificial intelligence allow these devices to make their own decisions without needing manual input from the users. Sensors in the house can help adjust the room temperature accordingly to suit your preferences. Additionally, you can automatically turn on the lights when you are in a room and then adjust the brightness depending on what you will be doing at that time.
Potential risks
Machine learning can help customize smart home devices in accordance with user needs, but it still poses a security risk to the user. For instance, if a person with malicious intent were to access your smart home devices, it would be potentially dangerous. Those people would not only be able to tamper with the devices, but they could even manage to gain some access into the house.
You could end up being robbed of your personal belongings, or your intimate personal data could be stolen and used in a harmful manner. Research indicates that a good number of smart home devices can be hacked into. Hackers can thus have remote access to the devices and reset the security system settings in a manner that they prefer.
Mitigating the risks
Smart home owners are advised to encrypt their systems by setting passwords to help limit the number of third party individuals accessing the system. Remember to use stronger passwords that nobody can easily guess. It is important for every smart home owner to follow all the common security protocols in order to keep both their homes and data safe.
Without following these simple protocols, regardless of the type of machine learning you are using, your data can still be accessed by third-party individuals. It is also important to have all your applications updated so that all security patches can be installed. An alternative method is to disconnect your devices when you are not using them.
The role manufacturers play to improve smart home security
Device manufacturers also have a role to play in ensuring that the smart home devices are secure. They are required to use encryption technologies that cannot be accessed. Manufacturers can work together and share information through machine learning on how smart home gadgets can be made more secure and inaccessible to hackers. Keeping the transmitted data safe is crucial. After all, smart homes are not secure if unauthorized individuals can easily access them.
It is apparent that machine learning along with big data and artificial intelligence can help make smart homes more secure. However, all the stakeholders—ranging from the users to the manufacturers—must work hard to ensure that the systems cannot be compromised in any way. If the data security is improved, several people will be ready to adopt the smart home technology.
Leave a Comment |
Bees are crucial for the global economy.
Reuters/Suhaib Salem
In a Whole Foods in Fremont, California, the dessert section is gutted. Shelves once filled with crème brulee, chocolate chip cookies, and squares of tiramisu are empty now, save for the occasional soy-based vegan "cheesecake" and coconut macaroon.
This is not the casualty of an overzealous kids' birthday party, but the consequence of a large and pernicious trend: the decline of pollinators. Shrinking populations of bees, butterflies, and other species "is the most pressing biodiversity issue of our time," says Eric Mader, the pollinator program co-director for The Xerces Society, an organization dedicated to insect conservation.
The impact of pollinators, Mader says, is much broader than people realize; the dessert aisle is just one tangible way to illustrate it. The demonstration in the Fremont grocery store is part of the Xerces Society and Whole Foods' "Share the Buzz" campaign, designed to show what our food system looks like without pollinators and engage people with sustainable practices and conservation efforts.
The reality of pollinator decline, Mader says, is often mistakenly conflated with the status of one particular species: the honeybee. "There's been no shortage of media around the decline of the honeybee in recent years," he says. New pests and parasites, loss of habitat, and pesticide overuse, coupled with an aging population of beekeepers, have resulted in a 50 percent reduction in the population since the middle of the last century.
But despite these challenges, "the honeybee is relatively secure from a global conservation standpoint," Mader says. In the U.S., the honeybee isn't one of the most crucial pollinators from an economic standpoint, since it isn't native to the country and it didn't co-evolve with some of the nation's highest-value food plants.
No pollinators, no delicious dessert.
TheRealMichaelMoore / Flickr
But native pollinators—which are more crucial to edible crops—are succumbing to the same environmental factors shrinking the more-publicized honeybee populations. "In North America, we have roughly 4,000 species of wild bees," Mader says. "They play an incredibly important role in crop pollination, yet as a society we know nothing about them and place very little value on the species, despite the fact that they contribute billions of dollars a year to our national economy."
At this point in time, one in four bumblebees is at risk of extinction. These bees, Mader says, are among our most economically significant native wild pollinators. They pollinate crops like blueberries and cherries early in the season, and increase the yield of certain tomato plants by up to 30 percent. "From a food security standpoint, their decline puts us in a really vulnerable position," Mader says.
Take, for example, that dessert aisle. Native pollinators play a vital role in dairy production, fertilizing the clover seeds and alfalfa seeds that feed livestock. They are also involved in the production of oil stock like canola. "The absence of pollinators would not only take the most delicious things out of our diet, but also the most nutritionally significant parts as well," Mader says.
What's especially troubling, Mader says, is a 300 percent increase, over past 50 years, in global cropland that depends on pollinator involvement. Around 85 percent of the plant species on earth require the assistance of animals to grow; that comes out to about one in every three bites of food taken.
The shrinking pollinator populations mirror a larger global loss: the London Zoological Society estimates that 50 percent of all wildlife on earth has disappeared over the past 40 years.
But in the case of disappearing bees and butterflies, this is not a difficult problem to solve. "Every single person can create a pollinator landscape in their own space," Mader says. Through the Xerces Society, he's been involved with developing pollinator habitats at airports; green building rooftops can provide a similar platform. "There are all kinds of ways you can engineer habitats into the built environment, as well as natural spaces," Mader says.
Honey bees.
Even if your only garden is a flowerpot on a tiny city balcony, there's room to support these species. "Imagine if every person in an apartment building plants a sunflower on the balcony," Mader says. "Suddenly that entire building is a field of sunflowers. What an interesting and elegant solution to this devastating issue." |
Composing for Theremin
A technical overview for composers
The theremin is an early electronic monophonic instrument invented in 1920 by Léon Theremin (1896-1993, b. St Petersburg, d. Moscow). The following technical note is intended to assist composers and arrangers. Though it relates specifically to the Moog Etherwave Pro, it could be used as a general guide for the capabilities of any high-quality instrument.
The theremin has several unique features that can be used in a musical way: it has an unending tone which can be shaped into phrases of unlimited length; it can be made louder and softer at any moment, without the requirement to change bow or draw breath; it has an enormous range enabling portamento over several octaves; it can create unusual and otherworldly sounds unlike any acoustic instrument.
Its most striking feature lies in its tonal character and capability for expression. Its tone usually falls somewhere between a stringed instrument and a human voice (although this can be adjusted); its tremendously sensitive pitch and volume controls allow player to translate movement immediately into musical expression unconstrained by keys, frets or strings; almost all expression derives from nuances in pitch (especially vibrato and portamento) and volume; it is capable of a wide range of inflections and expressions but overall has proved best suited to lyrical and expressive lines.
Of course, the theremin’s most obvious unique feature is that it is controlled without physical contact. but this serves no musical purpose. After an audience has grown accustomed to the novelty value of the theremin, they quickly begin to focus on other aspects of the performance, such as phrasing, tone quality, expression and overall musicality.
The theremin has a playable range of approximately five octaves, from C2 to C7. The most comfortable playing tessitura overlaps with the human voice and the common stringed instruments. With some adjustments, the overall range of the instrument can be extended to cover eight octaves, from A0 to A7. The very highest and lowest ranges of the instrument are quite difficult to play; if a large or unusual range is required, this should probably be discussed with the musician.
Notation is traditionally on a single stave, with clef changes as required (bass and treble). This can include specific indications for dynamics and expression, such as glissandi/portamenti, phrase marks, slurs, articulation etc., as one would use for any other monophonic instrument, or these can be left to the player’s discretion. Other indications could include specific timbres (e.g. voice-like, string-like, flute-like, sinusoidal, buzzy…), evocations of specific genres (e.g. B-movie vibrato, vibrato a la Clara Rockmore), or anything else the composer can imagine. A number of composers (including Percy Grainger and Jorge Campos) have also produced graphic scores for the theremin.
Since the theremin is played entirely by ear, it is also helpful for a performer to have access to a recording or reference track of the composition (as an audio or MIDI file) in addition to a notated score.
Volume on the theremin is governed by movement of the left hand above a looped volume antenna. As the hand moves higher and away from the antenna, a tone can be heard and grows gradually louder. The volume antenna is extremely sensitive and can produce a huge spectrum of dynamics, from extremely soft pianissimo to the loudest fortissimo. It is also capable of unlimited sustain, and the player can change dynamics at any point while sounding a note, unconstrained by the need to draw breath or change bows.
Since the theremin is electronic, the maximum volume of the instrument is determined before the performance begins, by the overall levels of any amplifiers and speakers. It is therefore critical to have a soundcheck to determine the instrument is the appropriate volume for the player, other musicians, and the audience relative to any other instruments.
The theremin produces a continuous tone and all articulation (apart from portamento) is consciously “performed” by the player. The natural decay and attack of a string or a voice is not natural to the instrument and if desired, has to be imitated. All types of articulation are theoretically possible including legato, détaché, portato, staccato, accents, and percussive sounds. Legato is the most natural mode of expression, achieved either by changing pitch as rapidly as possible to minimize the duration of audible slides, or else by dipping the volume hand to “conceal” slides between notes as best as possible. These two techniques suffice for almost all expressive playing. Staccato is rather trickier, achieved by rapidly flicking the hand to trigger a tone. With less time to find and correct each pitch, it comes at the expense of pitch accuracy and comes with certain limitations: faster runs of staccato notes have to have the notes placed close together; the faster the staccato, the larger the intervals, and the longer the passage, the more likely it is that something will go wrong.
Other forms of articulation that are possible include trills, appogiaturas, pronounced glissandi, and vibrato (used naturally for expression, but can be exaggerated for special effect).
It is also possible to imitate certain aspects of vocal technique (e.g. vocal vibrato, scoops, taking breaths) and string technique (e.g. faster vibrato, simulated string position changes).
Melodic Writing
Since theremin is played entirely by ear, the most suitable repertoire tends to be lyrical, flowing melodies with stepwise movements and intervals of up to an octave. Ideas of comfortable melodic shapes can be gleaned from the transcribed repertoire regularly played on theremin. Intervals of up to an octave are usually no problem to play, but the larger the gap between one interval and the next, the higher the risk becomes of missing a note, and playing off key. Successive large intervals, rapid arpeggios, jumps of much more than an octave or compound melodies are very difficult. Also, atonal and avant-garde melodies are much harder to play (and take longer to prepare) than those which can be easily sung, as everything has to be played by ear.
A further point to consider is that before beginning to play a passage, the player has to find their starting note, either by means of quietly hunting for it (by very quietly raising the left hand to hear what note will sound, before beginning to play), by means of a visual tuner (which I tend to use when playing in ensemble), or a combination of both techniques. This note-searching should be taken into account in any composition, especially when quick changes in register are involved.
Extended Techniques
The theremin allows for numerous unusual extended techniques: touching the pitch antenna produces a unwavering tone of high but unpredictable pitch; a register switch on the front of the instrument allows rapid octave switching (only really as a special effect, as touching the metal dial also changes the pitch); the very lowest registers recall a Geiger counter or revving car engine; the highest registers recall string harmonics or birdsong.
Charlie Draper |
Beaver Ridge Elementary in Norcross, Georgia thought including slavery in a math problem for eight-year-olds was the best way to execute a "cross-curricular activity." Believe it or not, "Each tree had 56 oranges. If eight slaves pick them equally, then how much would each slave pick?" was actually a problem given to these kids to solve.
This was all part of a Frederick Douglass lesson, which explains why "If Frederick got two beatings per day, how many beatings did he get in one week?" was another question. The school claims it just wanted inject some social studies into its math problems; they call it social studies, we call it social irresponsibility.
[via Gawker]
Follow @ComplexGuide for more failures in alternative methods of education. |
How Etna's Neolithic hiccup set off a tsunami
Earth 6 December 2006
When the east flank of Mount Etna collapsed into the sea around 8500 years ago, it triggered a tsunami that devastated the Neolithic villages of the eastern Mediterranean. If it were to happen today the wall of water would clobber coastal cities from southern Italy to parts of Israel. Watch a simulation here.
The largest active volcano in Europe, Etna towers 3.3 kilometres above eastern Sicily. When the east flank collapsed in the eruption all those years ago the resulting landslide left a depression now called Valle del Bove.
Earlier this year, Maria Pareschi of the Italian …
To continue reading this premium article, subscribe for unlimited access.
Quarterly by Direct Debit
Inclusive of applicable taxes (VAT) |
Zocdoc Answers
Medical questions & health advice by licensed doctors
"What does it mean if the color of my mucous is orange?"
I blew my nose today and the mucous that came out was kind of an orange color. What does that mean? Is something stuck in my nose like some kind of a fluid?
I would suggest that you go to see your primary care doctor about this issue. It sounds like you may be at risk of an infection, such as sinusitis; your doctor can examine your ears, nose, throat, and lungs closely and help you figure out what is going on. The most common causes of nasal congestion and drainage is a common viral infection of the nose and sinuses.
See a doctor who can help
Find a Primary care-doctors near you
The symptoms of a viral infection include congestion and clear nasal discharge. However, sometimes other, more stubborn, bacterial infections of the nose and sinuses can occur - often these infections take hold after you having been suffering already for several days for a common viral infection. Nasal discharge that is not clear is potentially concerning for one of these infections. Your doctor will take a close look in your nose, looking for evidence of sinusitis. If the evidence is clear, you may need to take oral antibiotics, to help clear up the infection. On the other hand, if you have no symptoms of nasal congestion or discharge at hall, then in may be that the 'orange' color you saw in the mucus was actually a small nose bleed. Your doctor should also be able to tell if there is any evidence of nasal bleeding when they examine you.
|
Medical News Today: Why narcolepsy is an autoimmune condition
By | March 20, 2019
man asleep on his desk
Narcolepsy involves ‘sleep attacks’ that can interfere with daily activities.
Narcolepsy is a chronic neurological condition that affects a person’s sleep-wake cycle.
The condition makes people feel excessively tired during the day. It may also cause them to experience sudden “sleep attacks,” during which an overwhelming desire to sleep can interfere with daily activities.
Some of these people also experience cataplexy — that is, “a sudden loss of muscle tone” that usually occurs in response to strong emotions such as laughter or surprise.
Previous studies have found that a class of immune cells called CD4 T are autoreactive in narcolepsy. This means that they see the body’s own hypocretin-producing neurons as if they were “foreign” bacteria or viruses and attack them.
Studying immune cells in narcolepsy
“We have found autoreactive cytotoxic CD8 T cells in the blood of narcolepsy patients,” reports Rahbek Kornum. “That is, the cells recognize the neurons that produce hypocretin, which regulates a person’s waking state.”
“It does not prove that they are the ones that killed the neurons, but it is an important step forward. Now we know what the cells are after,” says Rahbek Kornum.
Toward more effective, precise treatments
Such a theory may inform the search for better treatments, she explains. “Now there will probably be more focus on trying to treat narcolepsy with drugs [that target] the immune system.”
Birgitte Rahbek Kornum
Featured Health News from Medical News Today |
Joseph DeSimone Image Map
Mar 172010
Figure 1. Biodistribution of 125I-labeled 200 nm particles over 24 hours in healthy mice.
Definitive biodistribution maps that establish the interdependency of the size, shape, deformability and surface chemistry of nanoparticles in vitro and in vivo over length scales ranging from cells to tissues to the entire organism are needed by many different research communities. Environmental regulators, pulmonologists, oncologists, pharmaceutical scientists, toxicologists, cell biologists and dermatologists all need definitive answers related to particle biodistributions, particle permeability and transport using “calibration quality” particles. For example, fungal and bacterial pathogens are first and foremost recognized by their form or shape; however, the complete understanding of the role and significance of that form and shape is largely lacking. Indeed, some rod-like bacterial pathogens, including the gram-negative bacteria Salmonella, Shigella, and Yersinia and the gram-positive bacterium Listeria monocytogenes can induce their entry into non-phagocytic mammalian cells. Likewise, red blood cells and neutrophils are able to deform and undergo over 100 % strain (double in length) in order to navigate through various biological barriers that would prevent non-flexible objects from crossing. As such, nanofabricated tools (e.g. precisely defined particles) hold significant promise to provide insight into the fundamentals of cellular and biological processes. These tools can also yield essential insights into the design of effective vectors for use in nanomedicine, especially for the design of nanoparticles for use as targeted therapeutics and imaging agents. Indeed, very little is known about how the interdependency of size, shape, deformability and surface chemistry can influence the biodistribution, cell-uptake, and intra-cellular trafficking of micro- and nanoparticles. Beyond understanding the biodistribution of particles delivered via parenteral routes, particle size, shape, deformability and surface chemistry should play a very significant role for understanding the mechanisms associated with particles that are inhaled, either intentionally for use as a therapeutic or during environmental exposure. Understanding the role that mechano-biology plays as a function of size, shape and surface chemistry certainly lies at the core of how biological particles like neutrophils and red blood cells navigate their barriers. Ascertaining definitive biodistribution maps through the use of precisely defined particle probes containing appropriate imaging beacons useful for quantification will undoubtedly lead to a set of rules that will be of immense use to science and to the application of nano-carriers to improve human health, treatment and diagnosis.
March 17, 2010 |
Document Design and Production
Create a poster, designed for the workplace, that explains how to effectively use graphs in written material.
Your boss wants the poster to address the problem of too many people are creating graphics with Excel, using the defaults, and/or picking cool-looking graphs rather than thinking about how they are perceived. There are problems like people using unreadable 3D graphs or creating the Christmas tree graph we discussed a few weeks ago. The result is that customer and internal presentations are not going well because important information is not being communicated.
I realize that many of the readings for this week dealt with presenting research results, but the same basic principles of poster design apply.
Microsoft Publisher will probably be the easist software for you to get access to, but you can use any product. Word will not let you create a page this size, you'll have to use some sort of layout program. PowerPoint will work, but it's a pain to deal with.
Turn in
PDF of your final poster at full size. (watch out that the print process doesn't reduce it to 8.5x11).
Assignment details
Must be a minimum of 48 in long and 30 inches high and a maximum size of 72 inches long and 36 inches high.
Should use color.
Needs images which contribute to the message. (clip art for clip art's sake is not appropriate)
No bleed edges. The poster must be designed to be printed on white paper.
You will not be standing by the poster to explain it. It must stand alone.
It will end up hanging in a break room or hall way at work.
Since it will be hanging in a hallway, handouts are not relevant.
Potential problems
Lack of audience consideration and meeting what the boss wants you to create. This results in answering the wrong problem. The boss is not interested in a "should you a pick a bar, line, or pie" poster. He wants something to keep people from just accepting Excel defaults and overusing cool effects. What questions does the boss want answered and how is the poster addressing those questions.
Font is too small. It must be easily readable from 5-6 feet away. Yes, you can read 14 point font at 5 feet, but you would you really want to? Also, you can read text you write much further away than something you didn't write....you already know what it says.
Includes too much text. Dense posters are a turn off.
Trying to say too much. Pick the 2-3 most important points and make sure it communicates them. The other 50 important points have to be let go.
Graphics that look cool but don't communicate anything.
Main points are hard to distinguish. The reader must be able to easily see what the main 2-3 points are.
This not a "when to use a bar versus line graph" design.
Don't put the course number, your name, or other class labels on the poster. Design it so that it is ready hang in a hallway at work.
Turn off hypenation
Avoid orphans.
Create the graphs yourself. All of the examples should look like they came from the same designer. Or at least all of the good examples.
If you are going to cut & paste graphics from the readings, make sure they don't have any extraneous markup in them. Stuff like arrows pointing out a graph problems, etc. when you are not talking about that arrow. Sort of like people who grabbed a book cover for the recommendation report from Amazon and it has a big "Look Inside" arrow on the image.
Avoid centered text paragraphs.
GIF files can be transparent. JPG have white backgrounds. Be consistent.
Be consistent on the white space around text frames
You can't just tell people to "stop using Excel defaults" You must tell them what to do to instead of using the defaults and which default to ignore.
The 2D and 3D Senate graphics are not good examples to use. They cannot be produced in Excel.
Design by Michael J. Albers Copyright 2016. All rights reserved.
Send me an email. |
Rāmāyana | Sundara Kaṇḍa | Chapter 47
Chapter: 47
Akṣa Kumāra’s Death
[This chapter deals with the ferocious war of Akṣa Kumara, the second son of Rāvaṇa and Hanuman, in which Aksha Kumar is ultimately killed.]
Then that King Rāvaṇa, seeing that Hanuman has killed five army-commanders and army along with vehicles, saw in front of him, with affection, his son Akṣa who was enthusiastic for war. 1
Enthused by the eye examination of Rāvaṇa, he stood up in the assembly holding a special bow made of gold and appeared as if he was the sacrificial fire kindled by the offerings of Brahmins. 2
Afterwards he, who was a valorous Rākṣasa hero climbed up a huge chariot which was covered all over with gold and which had the lustre of young sun and departed to fight the great monkey. 3
He who was equal to Devas climbed in the fully complete chariot, which was got by him by rigorous prayers, which was pretty because of the covering by molten gold, which had flag poles, which had flag inlaid by precious stones, which was pulled by eight very fast moving horses, which could not even be attacked by devas or asuras, which could travel anywhere without being blocked, which was shining like sun, which could travel in the sky, which had several quivers, which had a platform in which eight swords were hung, which had been stored properly with spears and thomaras, which was equipped with all necessary things, which was shining like sun and which was pulled by golden rope similar to sun and moon and departed from there. 4-6
He who filled the sky and the mountain clad earth, with the sound made by horses, elephants and very big chariots along with a unified army neared the intelligent monkey, who was sitting on the tower gate. 7
That Akṣa who had lion like stare, nearing that monkey who had the stability of the fire during deluge in killing people, out of respect to him because of wonder, raised his head and looked at the monkey with respect. 8
That very strong prince, understanding the great monkey's speed and valour towards his enemies and estimating his own strength, started increasing in size like the sun at the end of winter. 9
Akṣa who was standing opposite the monkey, well understanding his stable valour which cannot be prevented from any one, became angry but set his attention properly and kindled Hanuman by three sharp arrows. 10
Taking the arrows in his hand and holding the bow, that Akṣa seeing that the monkey is not tired at all and that he was capable of defeating his enemies, started thinking with a perturbed mind. 11
That great warrior, wearing medallions, armlets and pretty ear studs made of gold attacked the monkey. The fight between those two was unequal and made even the Devas and Asuras nervous. 12
Witnessing the fight between the prince and the monkey, the earth rattled, sun faded, wind did not move, mountains trembled, sky roared and ocean churned. 13
Then that hero, who knew how to find proper aim, how to place the arrows on the bow and how to send them, sends again three arrows which had very sharp points, which had golden handle, which were dipped in poison and which were guided by feathers aimed at the head of the monkey. 14
That Hanuman, not in the least affected by those arrows sent at the same time aimed at his head, which was decorated by the ray like arrows, with eyes from which blood was dripping and with the luster of just emerged sun, appeared as if he was really the sun along with its rays. 15
Afterwards Hanuman, who was the minister of the King of monkeys, staring at the darling son of the King who was in the field of war armed with several sharp weapons as well as several bows, got ready for the war and roared greatly. 16
Then that strong and valorous Hanuman with increasing anger and appearing like the Sun atop the Mandāra Mountain burnt Akṣa Kumara, who was accompanied by the army and who was having several vehicles to ride, by the fire of his eyes. 17
Because of that, he who was a Rākṣasa cloud along with a rainbow like bow used to shoot arrows, rained several arrows like a cloud raining on a mountain, on the mountain like monkey chief. 18
Seeing Akṣa kumara as of great valour in the war and as increasing heroism and power with passage of time, the monkey who was as powerful as the cloud roared with happiness in the war. 19
That Akṣa becoming proud of his valour, because of childishness, became very angry and with red shot eyes, fell on the monkey who does not have any one equal to him as if he was falling on a well covered with grass. 20
(He fell for him out of ignorance of real facts.)
That Hanuman hurt by the arrows sent with great force by him (Akṣa) roared like a royal thunder. That son of wind god spreading his palms and thighs jumped on to the sky in his fearful form. 21
He who is very strong, who is the best among Rākṣasas, who is filled with fame and who is the greatest among those who drive in the chariot, ran and opposed him showering arrows at Hanuman, who was jumping and this was like a rain of stones on the mountain. 22
That monkey chief, who was a great warrior and who had the speed of the mind, kicked off the arrows and entered within the arrows, like wind and came out and travelled in the sky and was in the path of the sky like the wind. 23
That son of Wind God stared with respect at Akṣa, who was using the bow, who was desirous of war and who was covering the sky with sharp and great arrows and thought in his mind thus: 24
That monkey, who was capable of analysing the result of actions and having a chest severely wounded by the arrows shot by the valorous prince who was great, roared and thought in his mind about the actions to be done in the war. 25
"This one is very strong and he has the lustre of the baby sun and does all great deeds like a grown up man. My mind does not allow to kill him (Akṣa) who is an expert in all aspects of war, now itself." 26
"There is no doubt that he is extremely strong, great in his valour, does not get rattled in adversity, patiently opposes even in war and not only that he is fit for praise by the efficiency of his work by Nagas, Yakṣas and even sages." 27
"He is the one whose mind is elated by enthusiasm and valour and he opposes me and stares at me. His valour which is fast paced would even make the minds of Asuras and Devas tremble." 28
"Even if he is disregarded, there is no guarantee that he will not oppose, for in war his valour increases greatly. I feel it is proper for me to kill him now itself for the spreading fire should not be disregarded." 29
That very strong abode of valour thinking and estimating the great speed of the enemy and the need to complete his work took an important decision and decided in his mind in killing the bad souled one. 30
That monkey hero, who was the son of wind god, killed the eight horses, which were having great speed, which never knew tiredness and which could carry the chariot easily in the windy sky by hitting them with his open palm. 31
Then his big chariot having hit by the palm, having been broken by the minister of the monkey King, having its horses killed, having its roof broken and having its axis separated fell in to the ground from the sky. 32
That great hero and the great charioteer Akṣa left the chariot and holding the bow and with sword in his hand rose in to the sky, like a sage raising to the heaven after leaving his body because of the power of his penance. 33
Then that monkey, who was equal in valour to the God of Wind, neared him who was moving in the sky, which was used by Garuda, wind and sages and caught him strongly between his two legs. 34
That monkey who was one of the greatest monkeys and who was equal in valour to his father, caught him in the battlefield like Garuda, the King of Birds catching a snake, rotated him thousands of times and threw him on the floor with lot of force. 35
Because of this that Rākṣasa fell dead on the earth with broken hands, thighs, waist and neck, with eye balls coming out due to shattered bones, with blood flowing all over, with joints separated and with unsettled ties. 36
Due to this, that great monkey created great fear to the King of Rākṣasas. 37
Once that prince was killed, he was seen with great awe, by sages who travel in the sky and who do great penance, by Bhūtas who included Yakṣas and Pannagas and Devendra surrounded by Devas. 38
After killing Akṣa Kumara, who had the dazzle of the son of Indra and who had blood red eyes, that hero Hanuman, started waiting for suitable occasion like the God of death waiting for the death of the beings and again reached the gate of the tower. 39
Thus ends the forty seventh chapter of Sundara Kanda in the Rāmāyaṇa which is the first epic written by Vālmīki. |
Dr. Brett Fritsch - Orthopaedic Knee Surgeon : 9411 7166
ACL Reconstruction
ACL Reconstruction Hamstring Tendon
ACL Rehabilitation Protocol
What Is The Acl?
The Anterior Cruciate Ligament is one of the major stabilising ligaments of the knee. It is a strong, rope like structure in the centre of the knee that helps to prevent the knee from slipping out of joint while performing sports and other activities that require pivoting or sudden changes in direction.
When this ligament is torn it does not heal, and this results in a feeling of instability, or giving way, when the individual attempts activities that require pivoting or sudden changes in direction. This giving way can result in further damage to other structures within the knee joint such as the meniscus or articular cartilage.
ACL reconstruction is a commonly performed surgical procedure to create a new ACL to replace the damaged ligament. With recent advances in arthroscopic techniques it can now be performed with a high level of success, minimal incisions, and low complication rates.
How Do You Know It's Torn?
Typically the injury occurs with a twisting movement or sudden change in direction, and is accompanied by a painful "pop" and/or sensation of the knee giving way. Generally the patient is unable to continue playing at the time of the injury. The knee frequently swells, often within a few hours, and there is a sensation that the knee is unstable or weak.
An ACL tear can usually be diagnosed by taking a detailed history of the injury and performing a thorough physical exam. Knee instability can be detected by a skilled examiner by applying specific stresses to the joint.
An Xray will rule out fractures or dislocations, and an MRI will confirm the exact nature of the ligament tear and reveal any associated damage to the cartilage or meniscus within the knee.
Initial treatment consists of simple steps to limit further damage to the knee ie :
• Rest
• Ice
• Compression
• Elevation
Following this initial period, further treatment depends upon several factors including the activity profile of the individual and the extent of instability they experience. Not everyone requires surgery as some people can compensate for the injured ligament by strengthening the muscles around the knee and avoiding activities which cause the knee to give way. If you have an ACL injury which is not reconstructed it is advised to give up activities which require twisting or pivoting as repeated episodes of giving way that these movements can cause can result in further damage to other structures within the knee such as the meniscus or cartilage. With repeated injuries to these structures arthritis may develop. In those who wish to remain active it is advised to reconstruct the ACL in order to return stability to the injured knee.
Indications for surgery
• Young patients who wish to remain active
• Anyone who wishes to participate in sports requiring pivoting or twisting
• Those with occupations that require a stable knee, or where the knee giving way could be dangerous (eg builders, roofers, etc)
• Those who are experiencing knee giving way during their day to day activities
The aim of surgery is to return the knee to its normal motion, and to prevent it from slipping or giving way. This is to allow the individual to participate in all their normal sporting activites (including those at the highest level), and to avoid further damage to other structures within the knee that can occur with repeated giving way.
When Should Surgery Be Done?
ACL reconstruction is an elective (not emergency) surgery and does not have to be performed immediately. In fact, it is generally advisable to wait for several days or weeks until swelling has resolved and range-of-motion has returned to normal. This will make recovery from surgery much easier and reduce the risk of complications. Physical therapy may be recommended prior to surgery. If the knee is "locked" due to cartilage tears or if there is other ligament damage, the surgeon may advise earlier surgery.
What Does Surgery Involve?
Improvement in surgical techniqes for ACL reconstruction in the past 10 years have resulted in surgery that is more successful, less painful, and with shorter recovery times than in the past.
The majority of the surgery is performed arthroscopically (“key hole”) using specialized instruments to access the centre of the knee. Firstly a small incision is made adjacent to the knee to identify the hamstring tendons which will be fashioned into the ligament graft that will be used to reconstruct the damaged ACL. Occasionally the central part of the patella tendon at the front of the knee may be utilized instead. Tunnels are drilled in the femur and tibia where the old ACL was attached and the replacement graft is then pulled through these tunnels and attached to the bone at each end. Depending on the type of graft, it may be attached using screws, staples or other fixation devices. These act to hold the graft solidly whilst it heals into the tunnels.
At the time of the surgery the arthroscope allows the entire knee to be clearly visualized, and any other damage, such as cartilage or meniscus tears will also be repaired at the same time.
Click here to see Dr Fritsch perform an ACL reconstruction.
Surgery is performed either as a day only procedure, or with a single overnight stay. You will be able to walk immediately taking the full weight on your leg. Crutches are used for the first 7-10 days in order to help regain your normal walking pattern at the fastest possible rate. A brace is generally not required, and simple tablet painkillers are usually sufficient to control any discomfort. You will begin physiotherapy few days after surgery and continue this for between 3 and 6 months after surgery. Please refer to Dr Fritsch’s ACL rehabilitation protocol for more specific instructions regarding rehabilitation.
What Are The Risks Or Possible Complications Of Surgery?
Although rare, complications or adverse reactions can occur with any surgical procedure. These may include:
Adverse or allergic reactions to medications or anaesthetics.
Infection (<1% risk)
If this occurs it can be treated with either tablet or IV (through a drip) antibiotics. Rarely a further operation is required to wash the infection out of the joint. You will be given an antibiotic through the IV during your surgery to reduce the risk of infection.
Blood clots in the leg.
These are rare but if they develop will cause severe calf pain & swelling. IN some instances it is possible that the clot detaches from the leg vein and travels to the lungpossible embolus. Though extremely uncommon after ACL surgery this can cause serious consequences including death. Early mobilization to encourage circulation in the leg will help prevent this and if a blood clot does occur, you would need to take a "blood thinner" medication for several months.
Nerve damage
Some temporary skin numbness is normal around any incision as there are tiny fibres in the skin which cannot be avoided. Permanent nerve damage is rare and if it does occur post ACL surgery it is most often a small area of numbness that does not cause any significant disability. Very rarely there can be injury to the more important nerves or blood vessels of the leg resulting in weakness.
Joint stiffness
Scar tissue can form inside the knee (arthrofibrosis) leading to loss of motion. Advances in surgical technique and early physical therapy generally prevents this, but stiffness can still be a problem in a small percentage of cases.
Graft rerupture
In the same way the normal ACL can be ruptured, the reconstructed ligament can also retear. The retear rate is approximately 1% per year per knee, and if it does occur it can be reconstructed again using alternative tendon grafts.
Donor site pain
This refers to pain from the area where the graft tissue was obtained from (hamstrings/patella tendon). It is generally minimal and settle over time, though it is slightly more common when the patella tendon is used (thus the hamstring tendons are the first choice in most cases).
Whilst these complications are quite uncommon after ACL reconstruction it is important to realize that all surgery does have inherent risks. This list gives an outline of the possible complications, but please feel free to ask as many questions regarding your surgery as you need to be comfortable with the procedure. All care is taken to avoid these complications and in most cases the outcome is very successful
When Can I Return To Sports?
With normal progress, you can expect to return to sports activity 4 to 5 months after your surgery with a return to full sporting activites between 6 and 9 months post-op.
Anterior Cruciate Ligament reconstruction is a common and successful procedure which can return the majority of patients with this injury to full activity. Success is a combination of precise surgical technique and appropriate rehabilitation, and in the hands of an experienced surgeon the vast majority of patients can expect an excellent outcome.
The above information gives an overview of the common issues relating to this procedure. It is aimed at educating you about what is involved in ACL reconstruction. If you have any further questions please consult with your treating surgeon.
Click here to see Dr Fritsch perform an ACL reconstruction.
Dr. Brett Fritsch
View Profile
Robotic Surgery
ACL Reconstruction
Arthroscopic Surgery
Cartilage Transplantation
Knee Replacement
Patella Stabilisation
Limb Realignment
Practice Locations
Patient Forms
Multimedia Patient Education
© Dr. Brett Fritsch Orthopaedic Knee Surgeon Chatswood NSW
YouTube Linkedin
Your Practice Online |
Achilles Tendinopathy
The muscle group at the back of your lower leg is commonly called the calf. The calf comprises of 2 major muscles called the gastrocnemius and soleus. Both of these muscles insert into the heel bone via the Achilles tendon. During contraction of the calf, tension is placed through the Achilles tendon. When there is too much force, the Achilles tendon can tear, this is referred to as a tendinopathy. A tendinopathy can therefore be caused by trauma of a sudden excessive force places though the tendon, repetitive forces placed through the tendon or general degeneration with age or wear and tear. Tears to the Achilles tendon can range from a small partial tear, to a complete rupture.
What are the symptoms of an Achilles Tendinopathy?
An Achilles tendon rupture often presents as a severe sudden pain in the Achilles region, an inability to bear weight on the injured leg. Some individuals may describe an audible ‘snap’ or ‘tear’ sound, or the sensation of being kicked or hit in the back of the leg at the time of injury.
A partially torn Achilles tendon, will involve a sudden onset of Achilles pain during an activity. Symptoms may increase during activities which place strain on the Achilles tendon such as walking (especially uphill), going up and down stairs, running, jumping, hopping, or when performing heel raises or calf stretches. It is also common for patients to experience pain after these activities with rest, for example waking in the morning after. Swelling in the Achilles region and pain on firmly touching the Achilles tendon are also common.
Patients with Achilles tendonitis or a degeneration of the Achilles may experience swelling, tenderness on firm touch to the Achilles tendon, weakness and palpable thickening of the affected Achilles tendon when compared to the unaffected side. They may experience noticeable stiffness and pain in the night or mornings especially after performing aggravating activities such as walking, hopping, jumping.
How can physiotherapy help?
A physiotherapist can massage the area to realign the tendon fibres whilst increasing blood flow to enhance the healing process. Rest is important in the early stages and the physiotherapist may provide some support such as strapping or bracing. Furthermore, with healing progress the physiotherapist may advise on stretching & strengthening exercises. Further treatment options are also available such as acupuncture to promote natural healing of the tendon or mobilisation to encourage a return to mobility of the joint. |
GrassBase - The Online World Grass Flora
Eriochloa punctata
HABIT Perennial; caespitose. Culms erect, or geniculately ascending; 60–100 cm long. Culm-nodes glabrous, or pubescent. Leaf-sheaths hispid; with tubercle-based hairs. Ligule a fringe of hairs. Leaf-blades 20–40 cm long; 4–10 mm wide. Leaf-blade surface smooth, or scaberulous; glabrous.
INFLORESCENCE Inflorescence composed of racemes.
Racemes 10–15; borne along a central axis; unilateral; 2–6 cm long. Central inflorescence axis 8–18 cm long. Rhachis angular; glabrous on surface; scabrous on margins. Spikelet packing adaxial.
Spikelets solitary. Fertile spikelets pedicelled. Pedicels oblong; unequal; scabrous.
FERTILE SPIKELETS Spikelets comprising 1 basal sterile florets; 1 fertile florets; without rhachilla extension. Spikelets lanceolate; dorsally compressed; acuminate; 4–5 mm long; falling entire. Spikelet callus globular; incorporating lowest rhachilla internode with adnate lower glume; glabrous.
GLUMES Glumes one the lower absent or obscure; reaching apex of florets; thinner than fertile lemma. Upper glume ovate; 1 length of spikelet; membranous; without keels; 5 -veined. Upper glume surface pubescent. Upper glume apex acuminate; awned; 1 -awned. Upper glume awn 1 mm long.
FLORETS Basal sterile florets barren; without significant palea. Lemma of lower sterile floret similar to upper glume; ovate; 1 length of spikelet; 5 -veined; pubescent; acuminate; muticous. Fertile lemma elliptic; 1–1.5 mm long; indurate; without keel. Lemma margins involute. Lemma apex obtuse; awned; 1 -awned. Principal lemma awn 1–1.5 mm long overall. Palea involute; indurate.
FLOWER Anthers 3.
DISTRIBUTION Asia-tropical: Malesia. Pacific: north-central. North America: south-central USA, southeast USA, and Mexico. South America: Mesoamericana, Caribbean, northern South America, western South America, Brazil, and southern South America.
NOTES Paniceae. Gr Texas 1993.
|
Text boxes
A text box is intended for viewing, entering, and editing data of various types. To provide a value for a text box, click it and then enter or select a value.
Fig. 23. A form with text boxes
Text boxes with a red underline cannot be left blank.
Text boxes with pale borders either are filled automatically or should not be filled (for example, the Box # text box in fig. 23 is filled automatically when the form is saved). If you attempt to edit such a field, the application displays a warning.
To open a list of selectable items (see fig. 24) or a drop-down list (if supported by the application), press F4.
Fig. 24. Selecting a group of contractors from the list
Fig. 25. Opening a form of a selected item from a text box
A pale border around the text box (as around Code in fig. 25) means that a value in this box should not be edited.
Add comment |
Five years ago, a group of fishers discovered Yu, a loggerhead sea turtle, off the coast of Japan.
She was severely injured, having lost both her front limbs. But an intrepid group of scientists, including members of industry and University of Tokyo researcher Katsufumi Sato, one of National Geographic’s 2009 emerging explorers, has developed and tested a pair of prosthetic limbs for Yu to help her swim better. (National Geographic News is part of the National Geographic Society.)
Now 25, Yu was recently fitted with her 27th pair of prosthetic flippers at her home, the Suma Aqualife Park in Kobe, Japan.
The molded plastic limbs are attached to a jacket that fits over Yu’s shell. The stubs of her existing front limbs are inserted into the prosthetics so that Yu can swim using the same motions and muscles that she did before her attack. (See related pictures: “Fake Limbs, More Help Animals Heal.”)
Karin Hayashi, one of the scientists who helped test the prosthetics and who just completed her master’s degree at the University of Tokyo, sat down with National Geographic to share more about how she built the turtle’s artificial limbs and what’s next for Yu.
Q: How did the turtle get injured?
A: The turtle was probably injured by a shark attack. When it was found, there were many marks of shark bites on its carapace [back of its shell].
How did it come to your attention?
I was studying about behaviors of sea turtles, using an animal-borne recorder, which could record behaviors of animals under natural conditions at the University of Tokyo. The Sea Turtle Association of Japan, who established a project to create artificial fins for the injured turtle, asked my supervisor, Dr. Sato, to measure the swimming ability of the injured turtle using the animal-borne recorder. And Dr. Sato gave me the opportunity to join the project.
Yu swims after receiving her 27th pair of prosthetic flippers at the Suma Aqualife Park in Kobe, Japan, on February 11. Photograph from Suma Aqualife Park via Reuters
What made you think of creating prosthetic limbs for the turtle?
Dr. Kamezaki, the head of the Sea Turtle Association of Japan, thought of releasing the injured turtle to the ocean at first. However, one [school]boy entreated Dr. Kamezaki to help the turtle because he was worried that the turtle could not survive another shark attack with the injured limbs. Being provoked by the boy’s passion to help the injured turtle, Dr. Kamezaki started the artificial-fins project that purposes to recover [her] swimming ability by attaching artificial fins, which have been developed by Kawamura Gishi Co., Ltd [a Japanese company that designs prosthetics].
Have there been an increasing number of animals getting prosthetics recently? If so, why?
Yes, I think so. I think the reason for that could be an improvement of techniques to create prosthetics for humans so that they could also apply the techniques to injured animals. Another reason could be that because people were more interested in animal conservation. (See sea turtle pictures.)
How do the limbs work?
Sea turtles generate thrust to swim forward by moving their forelimbs up and down like wings of birds. Also, female turtles use their forelimbs to move on land for breeding. Thus, the functions of forelimbs are important for sea turtles’ locomotion. (Also read about Digital Nomad Andrew Evans’s experience with a turtle with a fake flipper.)
What were you hoping to accomplish by giving the turtle artificial limbs?
We were hoping that the injured turtle became able to swim and move on land like healthy turtles with the artificial fins.
How does the turtle seem to like its new limbs?
When the artificial fins are applied to the injured turtle, she stays calm and seems not to care about [being] attached to the fins. However, her swim speed has not been improved, unfortunately, with the artificial fins so far.
What’s next for the turtle?
The most recent artificial fins were attached to a jacket-like suit slipped over the head of the injured turtle. However, we [were] concerned that she could not swim efficiently because of the increased drag produced from the jacket. The members of the artificial-fins project are working on a new method of attaching the artificial fins to her.
This Q&A has been edited for length and content.
Changing Planet
Meet the Author |
Delanceyplace eclectic excerpts delivered to your email every day from editor Richard Vague Wed, 24 Apr 2019 04:13:08 -0400 en-us dna can store an astonishing amount of information -- 4/24/19 <p><strong>Today's selection -- from <em>Evolution 2.0</em> by Perry Marshall. </strong>DNA is a trillion times more dense than any computer hard drive:</p> <p>"We need to pause and consider just how smart cells ... really are.</p> <p>"Headphone cords tangle, DNA strands don't. Here's why. One cell can hold a gigabyte of data; plant and animal tissues have a billion cells per cubic centimeter. One juicy bite of steak (5 cubic centimeters) contains over 1018 bytes of data, an exabyte -- more than all the videos downloaded on the entire internet in a single day.</p> <p>"If you stretched a strand of human DNA end to end, it would be 6 feet (1.8 meters) long. But it is folded into a space so small that it is literally a trillion times denser than any hard drive. Plus the cell easily reads it whenever necessary. How is this possible?</p> <p>"The folding of DNA inside the nucleus of the cell is fractal. A unique mathematical pattern places folds within folds within folds so that, unlike your headphone cord, DNA strands don't tangle.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/f3938725-04fb-42f6-b1cc-56de54c8cdad.png" width="233" height="433" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>A section of DNA. The bases lie horizontally </strong></span><br /><span style="font-size: x-small;"><strong>between the two spiraling strands.</strong></span></td> </tr> </tbody> </table> <p>"Unused DNA is kept in a high-density area, using the folding pattern within a pattern. This storage pattern is called a <em>fractal globule</em>. It enables the cell to store DNA in amazingly little space, avoiding tangles and knots that would destroy the cell's capacity to read its own instructions. The DNA quickly unpacks and repacks during gene activation and cell replication.</p> <p>"'Nature's devised a stunningly elegant solution to storing information-a super-dense, knot-free structure,' says senior author Eric Lander, director of the Broad Institute, who is also professor of biology at MIT and professor of systems biology at Harvard Medical School.</p> <p>"The globule is a lattice, a pattern known to mathematicians, in which every point is only visited once and no paths intersect. This prevents knots from forming.</p> <p>"The <em>Harvard Gazette</em> reports, 'The human genome is organized into two separate compartments, keeping active genes separate and accessible while sequestering unused DNA in a denser storage compartment ... the information density in the nucleus is trillions of times higher than on a computer chip.' Cells move chromosomes back and forth between the two compartments as needed."</p> Wed, 24 Apr 2019 03:20:00 -0400 japan closes its doors to the world -- 4/23/19 <p><strong>Today's selection -- from <em>A Short History of The World</em> by Christopher Lascelles.</strong> For more than 200 years, Japan succeeded in closing its doors to the world:</p> <p>"While Europeans were busy exploring the world, the Japanese were being forbidden to travel outside their country unless accompanying an army. In the 16th century, Japan had only just emerged from a lengthy period of anarchy and civil war, in which military governors -- or Shoguns -- managed the country in the name of the emperor. Under the last and most powerful Shogunate -- founded by Tokugawa Ieyasu in 1603, and based in the city of Edo (present-day Tokyo) -- Japan enjoyed some 250 years of peace.</p> <p>"The Portuguese had been the first Europeans to visit Japan in 1543. They were followed by other Europeans who were successful in introducing trade and Christianity to the islands, not to mention firearms. However, fearing military conquest by the Europeans and considering them a potential threat, the Japanese expelled them in the early 17th century. By 1635, Japanese citizens were forbidden from leaving the country, and those already abroad were not permitted back. In 1641, all trade with Europeans was limited to the port of Nagasaki, all foreign books were banned, and the country effectively locked out foreign interference for the next 200 years. ...</p> <p>"The Tokugawa shogunate oversaw a period of relative peace for the country, but a growth in population and a number of natural disasters in the 19th century led to increasing unrest. Having witnessed China's treatment by the West, the Japanese had sought to protect themselves against foreign interference by isolating themselves. Nevertheless, as had happened with China, trade was forced upon them, in this instance by the Americans.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/meijijoukyou.jpg" width="600" height="424" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><strong>Emperor Meiji moving from Kyoto to Tokyo, end of 1868, as imagined by <em>Le Monde Illustre</em></strong></td> </tr> </tbody> </table> <p>"In 1853 a heavily armed American fleet sailed into Tokyo Bay, and forced the country to abide by the trade terms it stipulated. 'The ignominy of these terms led directly to the collapse of 700 years of shogun rule, and to the emperor's restoration to the Japanese throne in 1868. 'The period came to be known as 'the Meiji restoration', or period of enlightened government. Despite attempts by traditional isolationists to prevent any change to the status quo, huge efforts were made to modernise and industrialise the country so that it could regain its independence from the Europeans and Americans.</p> <p>"Where China failed, Japan succeeded: universal conscription was introduced, with the Samurai replaced by a regularly conscripted army modelled on that of the Prussians. The British navy served as the model for the new Japan's new navy. Japanese scholars were sent abroad to study Western science; railways were built, and a European-style parliament was introduced. Class distinctions were abolished, education was improved, and Western dress was adopted. Within a few decades, the country succeeded in turning itself from an agrarian and feudal society into a powerful industrialised nation -- one which, to everybody's surprise, succeeded in defeating both China and Russia in two wars at the turn of the century."</p> Tue, 23 Apr 2019 03:20:00 -0400 henry clay's children -- 4/22/19 <p><strong>Today's selection -- from <em>Heirs of the Founders</em> by H.W. Brands. </strong>Henry Clay, speaker of the house, senator, presidential candidate, was a man considered one of the giants of the American legislature in the early 19th century. He and his wife had eleven children. Seven of them died:</p> <p>"[Once retired, Henry Clay] didn't mind the visitors [to his Kentucky home] much. They flattered his ego. They listened to his stories and laughed at his jokes. They filled the house with human voices. When they left, the house was very quiet. The footfalls of the children had long since ceased. Their memory brought deep sadness. Lucretia had given him eleven children; death had taken seven of them. Their six daughters all were gone, claimed as infants, girls or young women. The sons had fared better, with four of the five growing into young men. But the eldest son, Theodore, had demons that wouldn't let him go; at a loss for his sake and theirs, Clay and Lucretia had placed him in a mental hospital, where he remained. One heartbreak was still fresh. Henry junior, the son to whom the father was closest, had been a brilliant student at West Point and, after fulfilling his obligation to the army, had launched a promising career in law and politics. When the war with Mexico began, he raised a regiment of Kentucky volunteers and joined the force of Zachary Taylor. He had served gallantly in the invasion of northern Mexico, but he had been killed at Buena Vista.</p> <table border="0" align="center"> <tbody> <tr> <td><a href=""><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/0581cbaf-f412-4676-adf7-bc8a848056fc.jpg" width="700" height="1082" class="img-responsive" /></a></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>Henry Clay and his wife, Lucretia (née Hart)</strong></span></td> </tr> </tbody> </table> <p>"Henry Clay had opposed the war. He distrusted James Polk and the purposes for which the war was fought. He knew that disposing of any territory taken from Mexico would require reopening the debate over slavery. He wasn't sure the country could survive it. But he had not known that the costs of the war would be so personal and painful. He had hoped that the sons left to him and Lucretia would outlive their parents; he had hoped to be spared yet another reprise of that most excruciating task of a parent, the burying of a child. Fate had decreed otherwise.</p> <p>"He had meant to leave public affairs to the younger generation. He had done his part; let them take up the task. But the death of his son made him reconsider. In his old work he might find solace. And he might give meaning to Henry's death. Henry had died beneath the flag of the Union. His father sensed that the Union was in greater danger than ever. He could make a final effort to save it. He wasn't sure his health could stand it. But what his son had given, he could give too, if it came to that.</p> <p>"He let his friends in Kentucky know he was willing to serve once more. The legislature made him senator again, and he followed the familiar route to Washington. New faces occupied the old seats; of his generation of lawmakers only John Calhoun, Daniel Webster and a few others remained. Yet the newcomers deferred to him; in the crisis that faced the country, well-wishers to the Union hoped Henry Clay could summon his magic one last time and prevent the states from flying apart."</p> Mon, 22 Apr 2019 03:20:00 -0400 john lennon and the fbi -- 4/19/19 <p><strong>Today's selection -- from <em>The Walrus & The Elephants: John Lennon's Years of Revolution</em> by James A. Mitchell. </strong>In the years following his departure from the Beatles, John Lennon searched for an outlet for his interests and creative energy. In one notable example, he held a concert to benefit John Sinclair, an individual given a long prison sentence for the possession of a small amount of marijuana. The concert was considered a great success since Sinclair was freed shortly afterward. But that success earned Lennon the attention of the FBI:</p> <p>"Lennon's associations with political activists -- under any name -- stirred considerable interest: the combination of the radical leaders' history and Lennon's wealth and influence could very well be a political force in the forthcoming election. A bureau summary described Lennon's recent activities, along with the reports by undercover agents at the Ann Arbor concert. John Sinclair's near-immediate release from prison was duly noted. In New York Lennon kept company with [Jerry] Rubin, [Rennie] Davis, [Jay] Craven, and assorted 'New Left leaders,' known advocates of a 'program to "dump Nixon"' through a series of rock concerts; people who had been 'instrumental in disrupting the 1968 Democratic National Convention in Chicago.'</p> <p>"Plans that involved the Chicago Seven -- who'd been found guilty of riot-inciting --qualified as a matter of national security. As such, copies were sent to ranking defense officials including the chairman of the Senate Armed Services Committee, longtime South Carolina lawmaker Strom Thurmond.</p> <p>" 'This appears to be an important matter,' Thurmond wrote in a February 4 cover letter sent with the report to William Timmons, legislative affairs assistant to President Richard Nixon; another copy went to Attorney General John Mitchell. These youth rallies against Nixon might work -- certainly with the rookie eighteen-to-twenty-year-old voters -- now that they had 'John Lennon as a drawing card.' The Chicago Seven seemed able to make use of Lennon's name for a show guaranteed to 'pour tremendous amounts of money into the coffers of the New Left.'</p> <p>"Thurmond advised that the information be strongly considered 'at the highest level,' and that something should be done about it. 'As I can see, many headaches might be avoided if appropriate action be taken in time.'</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/yoko_ono_and_john_lennon_at_john_sinclair_freedom_rally.jpg" width="700" height="528" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>Yoko Ono and John Lennon at the Freedom Rally</strong></span></td> </tr> </tbody> </table> <p>"For 'appropriate action,' Thurmond suggested the obvious solution to a trouble-making foreigner, although it should be done carefully: 'If Lennon's visa is terminated it would be a strategy counter-measure. The source also noted the caution which must be taken with regard to the possible alienation of the so-called 18-year-old vote if Lennon is expelled from the country.'</p> <p>"The goal for which Lennon's deportation would be good 'strategy' was not specified, but referencing eighteen-year-old voters -- a real wild card in the upcoming election rather than merely a demographic -- strongly suggests that the motivation was the election, not security.</p> <p>"The FBI investigation of John Lennon stands apart, rare if not unique for several reasons: the plan to monitor and deport Lennon came from within the government; the allegation was of what he might do, not anything he'd already done; and the threat was not of potential attacks on America. It was all about the job security of the president. The hippies and Yippies believed that Lennon could influence the election, and so did the politicians holding elected office.</p> <p>"In a report entitled 'New "New Left" Group Formed' in the February 11 <em>FBI Current Intelligence Analysis</em>, Lennon was described as more than just a concert participant casually helping the Election Year Strategy Information Center and its opposition to Nixon, but perhaps its driving force: 'Lennon's money and name have placed him in a position of considerable influence in EYSIC. No key planning sessions are held without Lennon.'</p> <p>"An image of John Lennon dominated the cover, an illustration rather than a photograph. Apparently, the FBI still couldn't seem to find a picture of one of the world's most photographed men."</p> Fri, 19 Apr 2019 03:20:00 -0400 the war of the worlds -- 4/18/19 <p><strong>Today's selection -- from <em>Area 51</em> by Annie Jacobsen.</strong> Most have heard of <em>The War of the Worlds</em>, the famous 1938 broadcast by Orson Welles that was a radio drama of an invasion of earth by UFOs. Such was the pervasiveness of radio that the broadcast was mistaken for an actual invasion and sent thousands of Americans into panic and hysteria. What is less well known is the impact on the U.S. military, and that Hitler and Stalin both took note of the broadcast's effect:</p> <p>"Although the 8:00 p.m. broadcast had opened with a brief announcement that the story was science fiction and based on the novel by H. G. Wells, huge numbers of people across America believed it was real. Those who turned their radio dials for confirmation learned that other radio stations had interrupted their own broadcasts to follow the exclusive, live CBS Radio coverage about the Mars attack. Thousands called the station and thousands more called the police. Switchboards jammed. Hospitals began admitting people for hysteria and shock. Families in New Jersey rushed out of their homes to inform anyone not in the know that the world was experiencing a Martian attack. The state police sent a Teletype over their communications system noting the broadcast drama was 'an imaginary affair,' but the hysteria was already well beyond local law enforcement's control. Across New York and New Jersey, people loaded up their cars and fled. To many, it was the beginning of the end of the world.</p> <p>"The following morning, the <em>New York Times</em> carried a page-1, above-the-fold story headlined 'Radio Listeners in a Panic Taking War Drama as Fact.' Across the nation, there had been reports of 'disrupted households, interrupted religious services, traffic jams and clogged communications systems.' All through the night, in churches from Harlem to San Diego, people prayed for salvation.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/picture-14_001.png" width="292" height="400" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"In the month that followed, more than 12,500 news stories discussed <em>The War of the Worlds</em> broadcast. The Federal Communications Commission (FCC) opened an investigation but in the end decided not to penalize CBS, largely on the grounds of freedom of speech. It was not the FCC's role to 'censor what shall or shall not be said over the radio,' Commissioner T.A.M. Craven said. 'The public does not want a spineless radio.'</p> <p>"The 1938 <em>War of the Worlds</em> broadcast tapped into the nation's growing fears. Just two weeks before, Adolf Hitler's troops had invaded Czechoslovakia, leaving the security of Europe unclear. Rapid advances in science and technology, which included radar, jet engines, and microwaves, left many Depression-era Americans overwhelmed by how science might affect a coming war. Death rays and murderous Martians may have been pure science fiction in 1938 but the concepts played on people's fears of invasion and annihilation. Man has always been afraid of the sneak attack, which is exactly what Hitler had just done in Czechoslovakia and what Japan would soon accomplish at Pearl Harbor. The weapons introduced in World War II included rockets, drones, and the atomic bombs -- were all foreshadowed in Wells's story. Advances in science were about to fundamentally change the face of war and make science fiction not as fictional as it had once been. World War II would leave fifty million dead.</p> <p>"From the moment it hit the airwaves, <em>The War of the Worlds</em> radio broadcast had a profound effect on the American military. The following month, a handful of 'military listeners' relayed their sanitized thoughts on the subject to reporters with the Associated Press. 'What struck the military listeners most about the radio play was its immediate emotional effect,' the officials told the AP. 'Thousands of persons believed a real invasion had been unleashed. They exhibited all the symptoms of fear, panic, determination to resist, desperation, bravery, excitement or fatalism that real war would have produced,' which in turn 'shows the government will have to insist on the close co-operation of radio in any future war.' What these military men were not saying was that there was serious concern among strategists and policy makers that entire segments of the population could be so easily manipulated into thinking that something false was something true. Americans had taken very real, physical actions based on something entirely made up. Pandemonium had ensued. Totalitarian nations were able to manipulate their citizens like this, but in America? This kind of mass control had never been seen so clearly and definitively before.</p> <p>"America was not the only place where government officials were impressed by how easily people could be influenced by a radio broadcast. Adolf Hitler took note as well. He referred to the Americans' hysterical reaction to <em>The War of the Worlds</em> broadcast in a Berlin speech, calling it 'evidence of the decadence and corrupt condition of democracy.' It was later revealed that in the Soviet Union, Joseph Stalin had also been paying attention."</p> Thu, 18 Apr 2019 03:20:00 -0400 the small chapel at the end of the world -- 4/17/19 <p><strong>Today's selection -- from <em>Horizon</em> by Barry Lopez. </strong>The eloquence of the small chapel in Port Famine (Puerto del Hambre), on the Strait of Magellan, Chile:</p> <p>"In March 1584, the Spanish explorer Pedro Sarmiento de Gamboa founded a settlement on Chile's Brunswick Peninsula, about halfway between Cape Froward and what would later become the town of Punta Arenas. He called it Ciudad del Rey Don Felipe. His purpose was to establish a military presence in the Strait of Magellan, to prevent the British from entering the Pacific, as Drake had in 1578, an ocean the Spanish regarded as their own.</p> <p>"Gamboa landed about three hundred soldiers and settlers and departed as winter was coming on. The settlement faltered. When the English navigator Thomas Cavendish visited the site three years later, he found everyone had perished from starvation and exposure. He renamed the place Port Famine. Today local people call it Puerto del Hambre (Port Famine, Port of the Starving, Port Hunger). ...</p> <p>"In 1831 [British Lieutenant Robert] FitzRoy was given command of the <em>Beagle</em> ... to continue the British survey of the coasts of South America. On December 27 he sailed from Plymouth with a young naturalist, Charles Darwin, aboard.</p> <p>"After surveying the southeastern coastal waters of South America, the <em>Beagle</em> anchored again at Port Famine in midwinter, on June 1, 1834. Darwin wrote of the place that he 'never saw a more cheerless prospect; the dusky woods, piebald with snow, could be only seen indistinctly, through a drizzling hazy atmosphere.' After a visit ashore, during which he attempted to force his way through dense thickets of heavy brush, he described the surrounding area as a 'death-like scene of desolation exceed[ing] all description.'</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/phipa-fuerte-bulnes-puerto.jpg" width="550" height="364" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>Capilla Fuerte Bulnes</strong></span></td> </tr> </tbody> </table> <p>"I'd always thought of Port Famine as a profoundly desolate place, a negative monument to human efforts to seize and possess on a monumental scale. ... What had come to interest me most about the site was a small chapel there, built, I believe, in the 1950s. Individuals disabled by despair regularly make pilgrimages to this chapel. Its walls, I'd heard, were thickly crowded with <em>milagros</em>, the corsage-like assemblages of fresh flowers, religious medals, holy cards, ribbons, and handwritten notes imploring the saints, especially the Blessed Mother, to intercede for them in heaven. (<em>Milagro</em> is the Spanish word for miracle.)</p> <p>"Small folk chapels like this one, their walls and sometimes even their ceilings crowded with milagros, can be found all over South America, their interiors lie by hundreds of votive candles. For me these chapels transcend religion. They speak to a fundamental human need, the need to be reassured. Whatever we may say to each other about living well, about enjoying the fruits of our labors and the closeness of our families and friends, these chapels insist that the experience of human suffering known to us all, the universal suffering that takes more lives than anyone would have the stamina to hear about, not be ignored.</p> <p>"The chapels are as eloquent about deep-seated human fears as they are about deep-seated faith. I find it impossible to visit such places and not feel compassion.</p> <p>"To regard the milagros there as evidence of superstition, or to describe these out-of-the-way chapels as backward, seems to me to dismiss what it means to be human, which is to live in fear in a world in which one's destiny is never entirely of one's own choosing."</p> Wed, 17 Apr 2019 03:20:00 -0400 for churchill, war did not mean forgoing comfort -- 4/16/19 <p><strong>Today's selection -- from <em>Hero of the Empire</em> by Candice Millard. </strong>Young Winston Churchill traveled with the British Army to South Africa for the Boer War as a news correspondent. Though he was serious about war, and had himself been a soldier, he was not going skimp on comfort. He was, after all, a descendent of the legendary General John Churchill, the Duke of Marlborough:</p> <p>"Churchill understood that the work of a war correspondent was among the most dangerous he could find, but although he was willing to risk his life in South Africa, he could not see any point in being uncomfortable while he was there. He had gone shopping for his wartime equipment not in army supply stores or back-alley bargain bins but on Bond Street, the most famous and expensive shopping district in London. Churchill had purchased what seemed to him to be the necessities for war. At the famous optical shop W. Callaghan & Co., he had chosen a compass set in bronze and a carefully crafted saddleback leather case with a pigskin lining, spending, or pledging to spend -- because it was a transaction between gentlemen, payment was to be delivered at some unspecified time in the future -- £3.15.6, approximately $500 in today's money. That bill, however, paled in comparison to his tally at Randolph Payne & Sons, where he had ordered a dizzying array of fine wines, spirits and liqueurs: six bottles each of an 1889 Vin d'Ay Sec, a light port, French vermouth and very old eau-de-vie landed 1866; eighteen bottles of St.-Émilion; another eighteen of ten-year-old scotch whisky and a dozen of Rose's cordial lime juice. The final order, which cost more than £27 (roughly $4,000 today), had been packed and delivered directly to the <em>Dunottar Castle</em>.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/winston.jpg" width="400" height="639" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>Winston Churchill</strong></span></td> </tr> </tbody> </table> <p>"Although he had little money to spare, Churchill would not even have considered traveling without his valet, Thomas Walden. Walden, who had once worked for Randolph Churchill and had enlisted in the army as a private, was to be Winston's soldier-servant, or batman, a term that derived from the French <em>bât</em>, or packsaddle. More officers had their own batman to press their uniforms and deliver their orders to subordinates, but few had highly trained professional valets who had traveled the world with a single aristocratic family, as Walden had."</p> Tue, 16 Apr 2019 03:20:00 -0400 the great native american warrior black hawk -- 4/15/19 <p><strong>Today's selection -- from <em>Black Hawk </em>edited by Donald Jackson. </strong>The great Native American warrior Black Hawk (1767-1838) told of his victories in battle in an autobiography:</p> <p>"Soon after [my fifteenth year], a leading chief of the Muscow nation came to our village for recruits to go to war against the Osages, our common enemy. I volunteered my services to go, as my father had joined him; and was proud to have an opportunity to prove to him that I was not an unworthy son, and that I had courage and bravery. It was not long before we met the enemy, when a battle immediately ensued. Standing by my father's side, I saw him kill his antagonist, and tear the scalp from his head. Fired with valor and ambition, I rushed furiously upon another, smote him to the earth with my tomahawk -- run my lance through his body -- took off his scalp, and returned in triumph to my father! He said nothing, but looked pleased. This was the first man I killed! The enemy's loss in this engagement having been great, they immediately retreated, which put an end to the war for the present. Our party then returned to our village, and danced over the scalps we had taken. This was the first time that I was permitted to join in a scalp-dance. ...</p> <table border="0" align="center"> <tbody> <tr> <td><a href=""><img style="margin-left: auto; margin-right: auto; display: block;" src="/cmsAdmin/uploads/c6ca5a41-b876-4a20-9b17-1c7ae82489c5.jpg" width="271" height="390" class="img-responsive" /></a></td> </tr> <tr> <td style="text-align: center;"><strong>An illustration of Black Hawk, from History of the Indian Tribes of North America.</strong></td> </tr> </tbody> </table> <p>"[In my nineteenth year I succeeded] in recruiting two hundred efficient warriors, and took up the line of march early in the morning. In a few days we were in the enemy's country, and had not travelled far before we met an equal force to contend with. A general battle immediately commenced, although my braves were considerably fatigued by forced marches. Each party fought desperately. The enemy seemed unwilling to yield the ground, and we were determined to conquer or die! A large number of the Osages were killed, and many wounded, before they commenced retreating. A band of warriors more brave, skilful, and efficient than mine, could not be found. In this engagement I killed five men and one squaw, and had the good fortune to take the scalps of all I struck, except one. The enemy's loss in this engagement was about one hundred men. Ours nineteen. We now returned to our village, well pleased with our success, and danced over the scalps we had taken." ...</p> <p>"[Later], determined on the final extermination of the Osages, for the injuries our nation and people had received from them, I commenced recruiting a strong force, immediately on my return, and started, in the third moon, with five hundred Sacs and Foxes, and one hundred Ioways, and marched against the enemy. We continued our march for several days before we came upon their trail, which was discovered late in the day. We encamped for the night; made an early start next morning, and before sun down, fell upon <em>forty lodges</em>, and killed all their inhabitants, except <em>two squaws</em>! whom I captured and made prisoners. During this attack I killed seven men and two boys, with my own hand."</p> Mon, 15 Apr 2019 03:20:00 -0400 beethoven's late string quartets -- 4/12/19 <p><span style="color: #000000; font-size: small;"><span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;"><strong>Today's selection -- from <em>Stradivari's Genius</em> by Toby Faber.</strong> Ludwig von Beethoven's later quartets:<br /> <br /> "Joseph Böhm was a Hungarian violinist, inspired and briefly taught by Pierre Rode, one of [Giovanni] Viotti's most distinguished pupils. ...<br /> <br /> "Böhm began his career in Vienna at a time when that of its presiding musical genius was coming to an end. Ludwig van Beethoven was by now almost totally deaf, yet he was turning his sublime talent toward the compositions that are to many his life's masterpieces: the late string quartets. Böhm and the <em>Khevenhüller</em> [Stradivarius violin] turned out to be in the right place at the right time. The first of Beethoven's late quartets, the E-Flat Opus 127, was premiered on March 6<em>, </em>1825, by the quartet led by Ignaz Schuppanzigh. It was far from satisfactory. Beethoven had subverted the classical form with surprises, introducing unprecedented textures and sonorities. The audience scarcely knew what to make of it, and the players themselves were probably underprepared for such difficult music, having received the score only two weeks before.</span></span><br /> <br /><span style="color: #000000; font-size: small;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Beethoven blamed Schuppanzigh's excessive stoutness for the failure, and insisted that the next performance should be given by the same quartet but led by Böhm. The violinist later remembered the commission:</span></span><br /> <br /><span style="color: #000000; font-size: small;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">" 'Beethoven could have no peace until the disgrace was wiped off. He sent for me the first thing in the morning -- in his usual curt way, he said to me, "You must play my quartet" -- and the thing was settled. Neither objections nor doubts could prevail, what Beethoven wanted had to take place, so, I undertook the difficult task.'</span></span><br /> <br /><span style="color: #000000; font-size: small;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Böhm found rehearsals a disquieting experience:</span></span></p> <p><span style="color: #000000; font-size: small;"><span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;"><iframe width="425" height="350" style="display: block; margin-left: auto; margin-right: auto;" src="" frameborder="0"></iframe></span></span></p> <p><span style="color: #000000; font-size: small;"><span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">" 'It was studied industriously and rehearsed frequently under Beethoven's own eyes. I said "eyes" intentionally for the unhappy man was so deaf that he could no longer hear the heavenly sound of his compositions. And, yet, rehearsing in his presence was not easy. With close attention, his eyes followed the bows and therefore he was able to judge the smallest fluctuations in tempo or rhythm and correct them immediately.'<br /> <br /> "Even so, Böhm was able to exert some influence:<br /> <br /> " 'At the close of the last movement of this quartet there occurred a <em>meno vivace </em>which seemed to me to weaken the general effect. At the rehearsal, therefore, I advised that the original tempo be maintained, to the betterment of the effect. Beethoven, crouched in a corner, heard nothing, but watched with strained attention. After the last stroke of the bows he said laconically. "Let it remain so," went to the desks and crossed out the <em>meno vivace </em>in the four parts.'<br /> <br /> "Another story tells how at an early run -- through of one quartet (almost certainly this one) Böhm was brave enough to declare a passage to be unplayable. 'Böhm! He's an ass!' was Beethoven's immediate rejoinder. Nevertheless the composer responded with alterations, coming back at the next rehearsal with a 'Na, Böhmerl, are you satisfied now?'</span></span><br /> <br /><span style="color: #000000; font-size: small;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"It may have been the extra rehearsal time, or Böhms natural affinity with the music -- and the 'powerful, mellow and sweet' <em>Khevenhüller </em>no doubt played a part -- but the second and subsequent performances of the quartet were all huge successes. Böhm led four of them: once in front of a small audience, twice in one evening at a public concert, and once at a well-deserved benefit for Böhm himself. Encouraged, Beethoven was to devote the remainder of his life to producing the four further quartets that make up the group. Posterity could scarcely owe any violinist or violin a greater debt."</span></span><br /><span style="font-size: small;"> </span></p> Fri, 12 Apr 2019 03:20:00 -0400 don't stare at a macaque -- 4/11/19 <p><strong>Today's encore selection -- from <em>Emergent Ecologies</em> by Eben Kirksey.</strong> There is a colony of macaques, an "old world" monkey, living in Florida:</p> <p>"Large groups of free-ranging monkeys, some 130 individuals all told, live in swamplands and riparian woodlands along the Silver River, about two hours north of Dade City, [Florida]. ... Movies like <em>The Yearling</em> (1946) and <em>Creature from the Black Lagoon</em> (1954) were filmed here along with the 1930s <em>Tarzan</em> classics featuring Johnny Weissmuller, which have a strong grip on the local and national imagination. ...</p> <table border="0" align="left"> <tbody> <tr> <td><a href=""><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/silver_river_monkey.jpg" width="271" height="381" class="img-responsive" /></a></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"Four rhesus macaques were introduced to a small island on the Silver River in 1936, according to a local investigative reporter, in hopes of attracting more tourists. Colonel Tooey, 'a big heavy fellow with a red face and sandy hair' who operated a jungle cruise boat tour, purchased them from a circus sideshow based in Rochester, New York. After creating Monkey Island in the middle of the Silver River, by dredging a short canal and outfitting the islet with houses and swings, he turned them loose. But, unbeknownst to Colonel (that is his first name, not a military title), rhesus macaques are very capable swimmers. They quickly escaped from the island and began to populate the woodlands of central Florida. Colonel Tooey and the glass-bottom boat captains from Silver Springs began feeding the monkeys as a regular part of their tours, in hopes of keeping some near the river. ...</p> <p>" 'John Daniels' (a pseudonym), a former park ranger and proud National Rifle Association member [describes the macaques]. ... Pointing to a big cypress with a distinctive Y-fork of branches where the original Tarzan, Johnny Weissmuller, once swung, John said that this tree likely sprouted in the fifteenth century, based on the slow-growth habit of this species. ...</p> <p>"When we encountered the monkeys during [John's] tour, he showed us how they were entangled in social and ecological networks (occasionally involving humans) while keeping their capacity for flight.</p> <p>"Rhesus macaques are attentive students of human behavior and technology. John told us that they would be indifferent to our approach in kayaks but would materialize out of the woods with the sound of crinkling plastic wrappers. Illustrating his point, John quickly produced a small crowd of monkeys just by opening and closing an empty snack wrapper he had on hand. The crowd eventually dispersed since no actual food was on offer. John told us, 'I might be in my boat, forty feet back, and as soon as I unzip my cooler, they are gonna look, they are gonna chatter. That's just being conditioned like ole man Pavlov said.' He added, 'Hear zipper. See food. Come to edge of water. Get reward. Okay. Good behavior.' Monkey mothers teach their babies how to live in the world, John said. 'Infants riding around on Momma's belly or her back know that every twitch means something. When they get older, and start venturing off on their own, Momma will slap baby's hand, or bark, saying, "Don't touch that." When the baby really steps out of line, Big Red the alpha male will intervene and put it back in line.' ...</p> <p>"John recounted some monkey behaviors as evidence of higher-order learning -- an awareness of the context of their interactions with people. 'If you meet one of these monkeys on land, when you are walking and they are up in the trees, and you stare directly at them, they will raise hell and come at you,' he said. 'But if you are in a boat and you stare at them, they will just sit there on the bank looking back, waiting for a hand-out.' Thus they clearly distinguish between kinds of beings in the world: boat people are distinct from land people. Boaters with food are beings of active interest, while boaters with none are of little concern. Macaques understand human ontologies in terms of our actions. Boaters who are feeding are beings that they are actively trying to generate. Monkeys try to transform stingy boaters into feeding boaters by cooing and even staring.</p> <p>"In macaque societies, it is impolite to stare. Eye contact is threatening. 'Direct eye to eye contact means, "I challenge you," "I am boss around here," or it can mean "stop that,"' according to Bob Gottschalk, a retired engineer from Iowa, who studies the Silver River monkeys as a citizen scientist. 'In most cases eye contact between humans and monkeys means "I challenge you." Of course, that wouldn't be wise,' he wrote in a report about the monkeys for local officials. 'The wise action is to look away, which means 'I don't want any trouble,' or 'I accept the fact that you are the boss.' 'Mouth open, corners of the mouth forward, and ears back are signs of a serious threat,' he adds. Primatologists, who have authored extensive inventories of macaque behaviors called ethograms, generally refer to this as an 'open mouth threat.' Standard inventories of aggressive behavior also include 'branch shaking,' the 'yawn threat,' and 'head bob threat.' More subtle behaviors include the 'eyelid flash,' the 'silent bared-teeth display' or 'fear grimace,' and the 'lip smack.' ...</p> <p>"Power dynamics in macaque societies have been extensively studied by primatologists. Female rhesus macaques obtain rank based on the position of their mother within the matriarchy, with each new daughter getting a higher rank than her older sister. Males generally join new groups of unrelated individuals as adults and constantly jockey for position. They usually follow a 'seniority rule' where they rise in rank as other males leave or die. The alpha male, who is dominant over all other members of the group, usually does not hold this rank very long. The top-ranking female is dominant over all other females and males (with the exception of the alpha male). Nested hierarchies produce one counterintuitive result: the third-highest ranking member of a rhesus macaque society is the alpha female's youngest daughter."</p> Thu, 11 Apr 2019 03:20:00 -0400 capturing an octopus -- 4/10/19 <p><strong>Today's selection -- from <em>The Soul of An Octopus</em> by Sy Montgomery. </strong>Sy Montgomery describes the process of getting a new seven-pound, ten-month-old octopus to her aquarium, one that was notably missing one arm:</p> <p>" 'Catching an octopus is fairly involved,' [the shipper] Ken [Wong] told me, when I called him. 'They're elusive. And you've got to find one appropriate for display. Thirty- and forty-pound octopuses, you don't want. You should leave them there to breed. Then there are some that are too small, and aren't appropriate.' Another problem is that, this time of year, most of the octopuses are missing from one to four arms. Lingcod, voracious predators that grow to 80 pounds, with eighteen sharp teeth, are spawning, and will bite and bully octopuses to evict them from their dens and claim the holes as their own. This is likely how our octopus lost her arm.</p> <p>"On his first few dives, Ken had not found a suitable octopus. Sometimes he saw no octopus at all. 'Sometimes you just get skunked,' he said. But Ken was determined. It took him six dives, but finally he found the octopus that would be destined for Boston.</p> <p>"He spotted her at a depth of about 75 feet, hiding in a rock formation, with just her suckers sticking out. Ken had touched her gently and she had jetted from her crevice-directly into his waiting monofilament net.</p> <p>" 'The net is so soft you wouldn't feel its abrasion on your face,' Ken told me. 'You have to treat these animals with kid gloves. You can't yank them to the surface. You don't want to shock them.' The water temperature at that depth may be more than 15 degrees F colder than the water at the surface, so he had transferred her from the net to a closed container in about 50 gallons of water, and hauled everything slowly to the surface. She never struggled or inked.</p> <p>"She had lived in a 5 x 5 x 4-foot, 400-gallon tank, equipped with rocks and pipe elbows to hide in, for the past six weeks. Within the first three weeks, she learned to come to him when he slapped the water, bearing food. She especially enjoyed salmon heads and crab. She was fed on a random schedule, rather like in the wild. One day she might eat a single prawn, and two days later, she might feast on two large crabs. 'She put on weight at a good clip,' he told me. When he caught her, he estimated she weighed about seven pounds. Now he thought she weighed about nine.</p> <table border="0" align="center"> <tbody> <tr> <td><iframe width="425" height="350" src="" frameborder="0"></iframe></td> </tr> <tr> <td style="text-align: center;"><strong>Feeding the Giant Pacific Octopus</strong></td> </tr> </tbody> </table> <p>"How, then, did he entice the octopus into the plastic bag for shipping? 'You have to convince the animal to get in the bag,' he said. 'You can't force someone that smart, with eight arms. It's not quick and easy.' He drained some of the water out of the tank to ease his task, but still, it took about an hour to convince her to enter the bag. ...</p> <p>"In some cases, Ken has to hold out for better weather to ship an animal. Airports close for snow or heavy fog, and he won't send an octopus out if it looks like it might be kept waiting because of weather delays. ...</p> <p>"How does he feel about capturing animals in the wild and sending them to a life in captivity? He has no regrets. 'They're ambassadors from the wild,' he said. 'Unless people know about and see these animals, there will be no stewardship for octopuses in the wild. So knowing they are going to accredited institutions, where they are going to be loved, where people will see the animal in its glory -- that's good, and it makes me happy. She'll live a long, good life -- longer than in the wild.'</p> <p>"I share all Ken told me with [my colleagues] as we lean over the barrel, looking at the new octopus. She is a deep, chocolate brown at first, then changes to red veined with pink and brown, and finally fades to a mottled fawn color, her raised papillae flecked with white, almost like snow."</p> Wed, 10 Apr 2019 03:20:00 -0400 the portuguese foil napoleon -- 4/09/19 <p><strong>Today's selection -- from <em>A Short History of The World </em> by Christopher Lascelles.</strong> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">The Portuguese support for the British foiled Napoleon's plans for domination:</span></p> <p><span style="color: #000000;"><span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"The British continued to frustrate Napoleon's ambitions, however. Most notably, at the Battle of Trafalgar -- off the coast of south-west Spain -- in 1805, they destroyed or cap cured two thirds of the combined French and Spanish fleet, without losing a single vessel, although Admiral Nelson, who again led the British fleet, was mortally wounded. Despite chis defeat at sea, the French continued to have great success on land, defeating Austrian, Russian and Prussian armies in quick succession.</span></span><br /> <br /><span style="color: #000000;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Increasingly concerned by the possibility of Europe becoming unified under a hostile power, the British organised a new anti-French coalition -- an act which naturally infuriated Napoleon. Unable to invade Britain while the British navy commanded the English Channel, Napoleon sought to implement a blockade of British goods, forbidding their import into any pare of Europe either under his control or in alliance with him, and declaring open season on all British ships. He hoped that this action would force Britain to sue for peace.</span></span></p> <p><span style="color: #000000;"><span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Most countries fell into line, bur the Portuguese -- long standing allies of Britain -- proved intransigent. This provided Napoleon with a reason to invade the Iberian Peninsula in 1808, and place his brother, Joseph, on the Spanish throne. The king of Portugal fled to his colony in Brazil, which he established as the temporary capital of the Portuguese Empire. To Napoleon's dismay, the Spanish did not accept a French king and, aided by the British, the entire Iberian Peninsula became a persistent problem for him, successfully distracting his attention when it needed to he focused elsewhere.</span></span></p> <p><span style="color: #000000;"><span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Despite these setbacks, however, by 1812 Napoleon controlled a quarter of Europe's population, and members of his family occupied thrones in Spain, Naples and Holland, creating a new dynastic family in Europe. He even took as his wife Marie Louise, the Habsburg daughter of the Austrian emperor, Francis I, and niece of Marie Antoinette, the murdered queen of France.</span></span><br /> <br /><span style="color: #000000;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Yet it was not only the Portuguese who refused to cooperate; the Russians also continued to trade with Britain. Suspecting Russia's imperial intentions, Napoleon invaded the country in the summer of 1812 with approximately half a million men, hue the Russians adopted a scorched-earth policy, depriving Napoleon of the ability to feed his army. The effects of disease and desertion were exacerbated by an inconclusive battle at Borodino, just outside Moscow, in which some 50,000 of his soldiers were<strong> </strong>killed. When Napoleon succeeded in reaching Moscow, only 100,000 of his men remained.</span></span><br /> <br /><span style="color: #000000;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Worse still, when it finally became dear to Napoleon that the Russians had no intention of surrendering, his army was forced into a retreat during the Russian winter. Where desertion and hunger had failed, 'General Winter' and 'General Typhus' succeeded. Of the half a million men who had set out, only some 20,000-40,000 returned. Huge numbers of horses were also lost -- some estimate as many as 200,000 -- contributing directly to Napoleon's defeats over the coming years, in a world in which a strong cavalry could make or break a battle.</span></span><br /> <br /><span style="color: #000000;"> <span style="font-family: helvetica neue,helvetica,arial,verdana,sans-serif;">"Like that of the Habsburgs before it, Napoleon's growing empire was a threat to other European powers. Encouraged by his defeat in Russia, these powers formed yet another alliance against him, advancing together on Paris, where, in 1814, Napoleon was forced to surrender. He was sent to exile on the Mediterranean island of Elba."</span></span></p> Tue, 09 Apr 2019 03:20:00 -0400 u.s. grant's famed world tour -- 4/8/19 <p><strong>Today's selection -- from <em>Late Victorian Holocausts </em>by Mike Davis.</strong> Immediately after completing his second (and scandal-filled) term in office, President U.S. Grant embarked on a world tour:</p> <p>"It was the most famous and perhaps longest family vacation in American history. 'Under a crescendo of criticism for the corruption of his administration,' the newly retired president of the United States, Ulysses S. Grant, his wife Julia, and son Jesse left Philadelphia in spring 1877 for Europe. The ostensible purpose of the trip was to spend some time with daughter Nellie in England, who was married (after the fashion that Henry James would celebrate) to a 'dissolute English gentleman.'</p> <p>"Poor Nellie, in fact, saw little of her publicity-hungry parents, who preferred red carpets, cheering throngs and state banquets. As one of Grant's biographers has put it, 'much has been said about how Grant, the simple fellow, manfully endured adulation because it was his duty to do so. This is nonsense.' Folks back home were thrilled by <em>New York Herald</em> journalist John Russell Young's accounts of the 'stupendous dinners, with food and wine in enormous quantity and richness, followed by brandy which the general countered with countless cigars.' Even more than her husband, Mrs. Grant -- but for Fort Sumter, a drunken tanner's wife in Galena, Illinois -- 'could not get too many princely attentions.' As a result, 'the trip went on and on and on' -- as did Young's columns in the <em>Herald</em>.</p> <table border="0" align="center"> <tbody> <tr> <td><a href=""><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/de5412d6-d35a-4d29-ba77-64ca5f915d65.jpg" width="500" height="605" /></a></td> </tr> <tr> <td style="text-align: center;"><strong>Grant (front row, center) and family at Karnak, January 1878</strong></td> </tr> </tbody> </table> <p>"Wherever they supped, the Grants left a legendary trail of gaucheries. In Venice, the General told the descendants of the Doges that 'it would be a fine city if they drained it,' while at a banquet in Buckingham Palace, when the visibly uncomfortable Queen Victoria (horrified at a 'tantrum' by son Jesse) invoked her 'fatiguing duties' as an excuse to escape the Grants, Julia responded: 'Yes, I can imagine them: I too have been the wife of a great ruler.' In Berlin, the Grants hovered around the fringes of the great Congress of Powers as it grappled with the 'Eastern Question' as a prelude to the final European assault on the uncolonized peoples of Africa, Asia and Oceania.</p> <p>"Perhaps it was the intoxication of so much imperialist hyperbole or the vision of even more magnificent receptions in oriental palaces that prompted the Grants to transform their vacation into a world tour. With James Gordon Bennett Jr. of the <em>New York Herald</em> paying the bar tab and the US Navy providing much of the transportation, the ex-First Family plotted an itinerary that would have humbled Alexander the Great: up the Nile to Thebes in Upper Egypt, back to Palestine, then on to Italy and Spain, back to the Suez Canal, outward to Aden, India, Burma, Vietnam, China and Japan, and, finally, across the Pacific to California."</p> Mon, 08 Apr 2019 03:20:00 -0400 paint is colored glue -- 4/5/19 <p><strong>Today's selection -- from <em>Liquid Rules</em> by Mark Miodownik. </strong>The secret of oil paint, as mastered by our greatest artists:</p> <p>"Paint is effectively a colored glue. Thus, a paint's job is to turn from a liquid into a solid and then stay in place permanently. Different paints achieve this in different ways. Watercolor paint does it by drying, releasing water into the air through evaporation and leaving only the pigments on the page. Oil paint is made of oils -- usually poppy, nut, or linseed oils. It doesn't dry. Instead, it has another trick up its sleeve: it reacts with oxygen in the air. Normally, this type of reaction is to be avoided, because oxidation turns butter and cooking oils, for example, rancid and bitter-tasting. But in the case of oil paint it is an advantage. Oils are composed of long hydrocarbon-chain molecules. The oxygen grabs a carbon atom from one chain and joins it to another through a reaction, in the process opening that molecule to further reactions. In other words, oxygen acts as a hardener (just as water acts as a hardener in superglue) -- and yes, this is yet another polymerization reaction.</p> <table border="0" align="center"> <tbody> <tr> <td><a href=""><img style="margin-left: auto; margin-right: auto; vertical-align: middle; display: block;" src="/cmsAdmin/uploads/d7b20cc1-6c71-49f8-8c98-2aca999f783b_001.jpg" width="840" height="444" class="img-responsive" /></a></td> </tr> <tr> <td> <p style="text-align: center;"><strong>"Bacchus' cloak in the famous Bacchus and Ariadne was brilliantly executed and created by using juxtaposition of multiple opaque and transparent layers." ... </strong></p> <p style="text-align: center;"><strong>Click image to read more about Titian's technique.</strong></p> </td> </tr> </tbody> </table> <p>"This reaction is extremely useful because it produces a hard, waterproof finish of plastic on the canvas (oil painting could more accurately be referred to as plastic painting); it's incredibly resilient and holds up very well with age. The polymerization takes time, though, since oxygen has to diffuse through the top, hard layers of paint before it can get to the unreacted oil underneath. This is the downside of oil paint -- you have to wait a long time for it to harden. But the great masters of oil painting, like Van Eyck, Vermeer, and Titian, used this to their advantage. They overlaid many thin layers of oil paint, which one by one chemically reacted with oxygen and hardened, building up a number of layers of semitransparent plastic, one on top of another, a complex encasing of many differently colored pigments.</p> <p>"Layering paint gradually like this allows the artist to create wonderfully nuanced work because when the light hits the canvas, it doesn't just bounce off the top layer -- some of it penetrates through to the layers below, interacting with the pigments deep in the painting and rebounding as colored light. Or, alternatively, it is fully absorbed by the different layers and thus produces deep blacks. It's a sophisticated way of controlling color, luminosity, and texture, which is exactly why the Renaissance artists adopted oil paint. Analysis of Titian's painting <em>Resurrection</em> reveals nine layers of oil paint, all working to create complex visual effects. It's exactly the intricate expressiveness of oil paint that made Renaissance art so sensual and passionate. The effect of layering is so powerful that it has transcended its roots in painting with oils and is now incorporated into all professional digital illustration tools. If you use Photoshop, or Illustrator, or any other computer graphics tools, you'll be making images in layers.</p> <p>"Linseed oil is also used for many applications beyond oil paint, such as treating wood, to create a transparent, protective plastic barrier -- just as oil paint does, but this time, without color. Cricket bats are just one of many wooden objects traditionally given an outer coating using linseed oil. You can also go whole hog and use linseed oil to make a solid material called linoleum, again through a polymerization reaction. Linoleum, a plastic, has been used by designers and interior decorators as a waterproof floor covering. Artists use linoleum too. They carve images into it just as they do with woodcuts, to create prints. Here again, layers are the primary way of building up complexity in the final work."</p> Fri, 05 Apr 2019 03:20:00 -0400 the ratio of negative to positive behavior in relationships -- 4/4/19 <p><strong>Today's encore selection -- from <em>Awkward</em> by Ty Tashiro, PhD.</strong> Research on positive and negative behavior in relationships:</p> <p>"John Gottman of the University of Washington and his colleagues have conducted observational studies of positive and negative behaviors with married couples and grade-school children for decades. The focus of many relationship scientists has been on negative behaviors such as resentment or withdrawing from conflict, but the trick to understanding interpersonal behavior is about the ratio of negative to positive behaviors. It turns out that positive behaviors can be as small as telling someone he looks handsome, attentively listening to a friend's small triumph of the day, or surprising a coworker with her favorite cupcakes.</p> <table border="0" align="left"> <tbody> <tr> <td><img src="/cmsAdmin/uploads/c80a521fc1e25e10cf240499b0a8972e.jpg" width="276" height="274" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"Gottman has found that people keep an informal count of behaviors. He calls this ratio of positive to negative behaviors an emotional bank account. To stay in good standing with others, people need to keep a balance of about four or five positive behaviors to every one negative behavior. Imagine that you do four good things during an interaction with a friend: give an enthusiastic greeting, compliment his outfit, share some french fries, and respond empathically to a concern. Then you inadvertently insult this friend by forgetting that today is his birthday. You would probably come out of this interaction with $0.00 in your emotional bank account with him, which is not bad considering that you could have left the interaction in the red had you not been so nice at the start of the interaction. It's good to think about leaving interactions without a negative balance because people's emotional bank accounts charge interest.</p> <p>"Gottman finds that negative balances are not wiped from other people's minds at the end of the day, but instead carry over to your next interaction. This is bad news if you end the day in the red with someone, but good news if you end the day with money in the bank. When people leave interactions with a negative balance, it has a way of building corrosive resentment in others' minds, which essentially adds interest to their emotional debt. The good news is that leaving interactions with a positive balance tends to build trust, which is like gaining interest on your deposit.</p> <p>"One strategy is to avoid mistakes, but a focus on trying not to make a mistake has a way of creating persistent anxiety, which is both unpleasant and unhelpful. The best way to leverage the concept of the emotional bank account is to commit to making small deposits of positive behaviors on a consistent basis. Instead of viewing the dozens of social situations and hundreds of cues that one encounters every day as an opportunity for failure, the mindset shifts to capitalizing on routine situations by contributing a little more than expected. Sometimes others view heroic efforts as a disproportionately large contribution, but typically positive efforts both big and small have about the same effect.</p> <p>"When you become the kind of person who first thinks about how to help people rather than how to get something from people, it builds a positive balance in your emotional bank account with others. Over time, that positive balance begins to build trust and eventually faith that you are a good-natured person. The key is to be subtle about your contributions. Most people feel tremendous gratitude when their grandparents slip a ten-dollar bill into their birthday card, but if their grandparents slipped a check for $10,000 into their birthday card, it would actually feel awkward for most people. Subtle deposits could be as small as being more specific when you say thank you or letting others go first when a line forms at a buffet. As a supplement to face-to-face deposits, it's easier than ever to make 'mobile deposits' through a kind text the day of someone's big test or a follow-up message after dinner to say, 'That was fun, thanks for getting together.'</p> <p>"The reality is that awkward people are more likely to make small withdrawals from their emotional bank accounts with others because they are prone to mishandling minor social expectations. Awkward people may not notice that their large backpack swung into their friend's head as they turned to sit down on the bus or they may accidentally disclose the surprise birthday party to the birthday boy. These awkward moments are done without premeditation or malice, but they are still negative and even if people do not say anything, their automated mental accounting system deducts a little bit from the emotional bank account.</p> <p>"These unexpected or accidental withdrawals make it imperative that awkward individuals make a concerted effort to maintain a positive balance through consistently making small deposits that move their balance farther to the positive side in others' minds. It's like contributing a little bit every month for social insurance.</p> <p>"Awkward individuals should not let their clumsiness with minor social expectations define them. As both awkward and nonawkward people get older, most of them will care less about surface qualities and instead evaluate people on their willingness to be fair, be kind, and be loyal. So long as good people feel as if you are trying your best to consistently contribute, then they are willing to overlook a little awkwardness. Whether it's a commitment to a familial relationship, friendship, or romantic relationship, when awkward people make sure that they find a way to contribute to the broader good, it is the best strategy for creating sustainable social capital."</p> Thu, 04 Apr 2019 03:20:00 -0400 the spanish flu devastates DC -- 4/3/19 <p><strong>Today's selection -- from <em>Pandemic 1918</em> by Catherine Arnold. </strong>In 1918, a Spanish flu epidemic, sometimes referred to as "la grippe" or the "Spanish lady," careened around the world, taking 20 to 50 million lives in its path, including 675,000 Americans. The excerpt below tells what happened as it first reached Washington, DC:</p> <p>"When Louis Brownlow, City Commissioner for Washington, DC, was informed that forty patients had been admitted to one hospital with '<em>la grippe</em>' on 2 October, he took instant action. Brownlow knew that 202 Bostonians had died of influenza the day before; he was anxious to prevent a similar epidemic in Washington. Commissioner Brownlow shut down Washington, DC, closing schools, theaters, pool halls and bars. Medical centres were opened in empty schools and an emergency hospital in a store on F Street, supervised by Dr James P. Leake, an epidemiologist. With no shortage of resources in wealthy Washington, Model T Fords and chauffeur-driven limousines were pressed into service as ambulances. Brownlow, with his two fellow commissioners already sick, took responsibility for the city, as Dr Noble P. Barnes of the American Therapeutic Society publicly declared: 'Persons at large sneezing and coughing should be treated as a dangerous menace to the community, properly fined, imprisoned, and compelled to wear masks until they are educated out of the 'Gesundheit!' and 'God Bless You' rot.' The Red Cross distributed gauze face masks, and advertisements<br />warned the public:</p> <p><em>Obey the laws</em><br /><em>And wear the gauze</em><br /><em>Protect your jaws</em><br /><em>From septic paws.</em></p> <p>"But the Spanish Lady was not so easily defeated. The sick-list swiftly rose to over ten thousand. Hundreds of police officers and trolley drivers fell ill. So many firemen were sick that the capital's Fire Marshall feared 'the whole city'd burn to the ground if a fire ever got started'. The Federal government was paralysed and the courts went into recess. At Herbert Hoover's Food Administration, half the employees went off sick. Congress dosed its public galleries and at the State Department staff were 'aired' for twenty minutes every day, taken outside and instructed to breathe deeply. As he studied Washington's mortality figures at the Vital Statistics Bureau, a clerk named W. E. Turton collapsed and died. <em>The Washington Evening Star</em> ran a regular column entitled 'Prominent People Who Have Died of Influenza'.</p> <p>"One famous person who refused to die of influenza or even entertain the notion of falling victim to the disease was humourist James Thurber. Writing a letter in reply to a concerned friend on 15 October 1918, Thurber described the mood in Washington in his typically irreverent style: 'All one sees here is nurses & hearses and all he hears is curses and worse. And such a heroic thing to pass out with, Influenza!' Dying of influenza in these times of brave, poetical deaths ... I'd just as soon go with house-maid's KNEE.' Thurber maintained he was in 'chipper' condition, with the correct psychological attitude towards all flu. 'The influx of Enza will have to select a clever rapier and twist an adroit write [sic] to pink me, altho' I am in the pink of condition.'</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/spanishfluwardwalterreed.jpg" width="800" height="600" /></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>The influenza ward at Walter Reed Hospital during the Spanish flu pandemic of 1918 (Library of Congress)</strong></span></td> </tr> </tbody> </table> <p style="text-align: left;">"Eleanor Roosevelt, who had returned to Washington with Franklin and their family, witnessed the horror at first-hand:</p> <p><em>As soon as we returned to Washington the 'flu epidemic, which had been raging in various parts of the country, struck us with full force. The city was fearfully overcrowded, the departments had had to expand and take on great numbers of clerical workers. New bureaus had been set up, girls were living two and three to a room all over the city, and when the 'flu hit there were naturally not enough hospitals to accommodate those who were stricken. The Red Cross organized temporary hospitals in every available building, and those of us who could were asked to bring food to these various units, which often had no kitchen space at all.</em></p> <p><em>Before I knew it, all my five children and my husband were down with the 'flu, and three of the servants. We succeeded in getting one trained nurse from New York ... this nurse was put in charge of Elliott [aged eight years old] who had double pneumonia. My husband was moved into a little room next to mine, and John, the baby, had his crib in my bedroom, for he had bronchial pneumonia. There was little difference between day and night for me, and Dr Hardin, who worked as hard as he possibly could every minute of the time, came in once or twice a day and looked over all my patients. He remarked that we were lucky that some of us were still on our feet, for he had families with nobody able to stand up.</em></p> <p>"Despite the constant anxiety for her own family, Eleanor tried to take the opportunity to do some good in Washington: 'If all the children were asleep I went in the car and visited the Red Cross."</p> Wed, 03 Apr 2019 03:20:00 -0400 the vikings -- 4/2/19 <p><strong>Today's selection -- from <em>The Vikings</em> by Lance Hightower. </strong>The Vikings of Scandinavia were great traders and warriors whose reach extended to Spain, Constantinople and beyond. Here are accounts of the Vikings from Islamic contemporaries circa 1000 CE:</p> <p>"One man who observed the Vikings with interest was Ibn Fadlan, who gave an account of the funerary rituals of the Vikings, and another, geographer Ibn Rustah, traveled to Novgorod with the Rus [Vikings] and noted his impressions of the people and their home.</p> <p>"'I have seen the Rus as they came on their merchant journeys and encamped by the Volga. I have never seen more perfect physical specimens, tall as date palms and with ruddy complexions. They do not wash themselves after defecating, urinating or having sexual intercourse. Their day begins with a slave girl bringing them a pitcher of water in which each washes his hands, face and hair, then clears his nose into the water. The process is repeated until all have used the same water in the same fashion. With the Volga flowing nearby, it is a wonder at the necessity of this economy.'</p> <p>" 'Perhaps it is a bonding ritual to strengthen the loyalty among them, for if one group of them is challenged to war, they all join in force. They stand firm as one man against their enemies until they have won the victory over them.'</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/viking-grave.jpg" width="931" height="697" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><strong>A Viking Grave</strong></td> </tr> </tbody> </table> <p>"Ibn Rustah wrote:</p> <p>'<em>The friends of a dead warrior dig him a grave resembling a large house and place him in it, along with his clothes, his gold arm bands, food, drink and coins. His favorite wife is buried alive with him before the grave is closed.</em>'</p> <p>"This is a practice called <em>sati</em> or <em>suttee</em>, in which a widow throws herself on her dead husband's funeral pyre, but there is no evidence in any of the Scandinavian texts that the Vikings practiced this. The Arab writer likely confused the slave girl, who volunteered to be sacrificed with her master, for a wife."</p> Tue, 02 Apr 2019 06:56:00 -0400 the terrors of a lynch mob -- 4/1/19 <p><strong>Today's selection -- from <em>Atticus Finch: The Biography</em> by Joseph Crespino.</strong> In 1934, A.C. Lee, the father of Nelle Harper Lee and the inspiration for her 1960 novel <em>To Kill a Mockingbird</em>, learned about lynch mobs: </p> <p>"The danger of the lynch mob and the threat it posed to civilized society was no abstraction for A. C. Lee. One of the most gruesome mob lynchings in the entire history of the practice hit close to home for Lee, literally. It took place in 1934 outside Marianna, Florida, the county where A. C. Lee was raised, where his mother and father were buried, and where all of his brothers and sisters still lived. In a scene similar to the one that Harper Lee would imagine in <em>Mockingbird</em>, a group of men traveling in four or five cars abducted a black prisoner from the jail in Brewton, Alabama, just forty miles south of Monroeville near the Florida state line. The black man, Claude Neal, was accused of having raped and murdered a white woman, Lola Cannidy, in a rural area in Jackson County, Florida. Neal, along with his mother and aunt, was initially taken to the jail in the nearby town of Chipley, A. C. Lee's hometown. Neal confessed to the crime, although investigators would later suspect that he had been coerced. In a detail that was similar to how in <em>Mockingbird</em> Tom Robinson testified that he had encountered Mayella Ewell on the day of the alleged rape, Claude Neal told how he had been walking along the fenced border of the Cannidy farm when Lola Cannidy saw him and asked if he would come across the fence and clean out a hog trough that she had been struggling with (Mayella Ewell asks Tom Robinson if he would bust up a chiffarobe for her).</p> <p>"The men who took Claude Neal from the jail in Brewton carried him back to the Cannidy family farm outside Marianna. A crowd estimated at several thousand people had gathered there, stoked by radio announcements and newspaper headlines earlier in the day. The horde became so large and unruly that Neal's abductors worried that they couldn't control it. So they took Neal to an alternative location and murdered him, but not before subjecting him to two hours of sadistic torture, including castration, forced autocannibalism, stabbing, burning with hot irons, and dismemberment of toes and fingers. They tied Neal's body to the back of a car and dragged it to the Cannidy family home, where the remnants of the mob performed their own barbaric acts. Eventually Neal's mutilated corpse was hung from a tree on the northeast corner of the courthouse square in Marianna.</p> <table border="0" align="center"> <tbody> <tr> <td><img src="/cmsAdmin/uploads/ep-308049690.jpg" width="746" height="417" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"The <em>Monroe Journal</em> ran a story about the grand jury investigation into Neal's abduction from the Brewton jail, though it included none of the sickening details of the lynching. That was the first news about the lynching to appear in the <em>Journal</em>, yet it was unlikely lo have been the first time that A. C. Lee had heard of the incident. The <em>Monroe Journal</em> office received wire reports from the major news agencies. On October 21, the Associated Press sent a dispatch from Lee's hometown of Chipley that reported that hundreds of men swarmed the streets all night threatening to destroy the jail if the sheriff didn't hand over Neal and the other prisoners.</p> <p>"Or perhaps Lee learned directly from his brothers or sisters about the mayhem in Marianna the day after the lynching. Neal's body was cut down from the tree on the courthouse lawn early on a Saturday morning. The rest of that clay, a busy Saturday when rural whites and blacks customarily came into town to shop and do business, was, according to one local white man, 'a day of terror and madness, never to be forgotten by anyone.' Mobs of whites began attacking blacks around the town square who were there buying or selling goods, or who worked for white store owners. Marianna's mayor searched for policemen but couldn't find any; apparently members of the mob had already found them and threatened them with reprisals if they came to the square. The mayor attempted to deputize special officers, but could find no volunteers. One black man who was assaulted on a sidewalk raced across the street into the courthouse where a group of friendly white men, armed with a machine gun, offered protection for him and another black man. The mob attacked a black porter helping a customer. The porter had to slash his way through the crowd with a knife to make it back to his employer's store, where the owner locked the door and held the mob"</p> Mon, 01 Apr 2019 03:20:00 -0400 andy warhol and pop art -- 3/29/19 <p><strong>Today's selection -- from <em>1965: The Most Revolutionary Year In Music</em> by Andrew Grant Jackson.</strong> Andy Warhol and pop art, circa 1965:</p> <p>"Pop art was both a cheeky middle finger to pretension and a way to find beauty in the consumer-industrial society we were drowned in, whether we liked it or not. Roy Lichtenstein reproduced the panels of romance comic books with the newsprint dots plainly visible. Thought balloons expressed the soap opera angst of his troubled women. James Rosenquist applied his skill at painting billboards to the massive <em>F-111</em> collage of A-bombs, hair dryers, babies, airplanes, and spaghetti. Ed Ruscha depicted a burning Standard Oil gas station from a low cinematic angle and rendered it epic. Wallace Berman made a collage of Muhammad Ali, James Brown, and the Rolling Stones dubbed <em>Papa's Got a Brand New Bag</em>.</p> <p>"Andy Warhol surpassed his rivals by turning his own persona into a cartoon. With silver wig, shades, black leather jacket, striped T-shirt, and nail polish, he transformed from a balding mid-thirties nerd into a Pop (art) star who would eventually guest on <em>The Love Boat</em>. When he did interviews, he'd come on both fey and moronic. He'd make the questioner squirm with his airy, monosyllabic answers, partly because he really was shy, partly because it was some sort of Zen koan, partly because it was the pre-punk aggression of being deliberately vapid, pretty vacant -- the ultimate put-on. 'If you want to know all about Andy Warhol,' he said, 'just look at the surface of my paintings and films and me, and there I am. There's nothing behind it.' He sent an impersonator out on the college lecture circuit.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/andy_warhol_by_jack_mitchell.jpg" width="600" height="480" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"The post-beatniks and folkies and proto-hippies all hewed the party line against mainstream Middle America. Pete Seeger dismissed the 'little boxes' of suburbia that all looked just the same. But Warhol rebelled against the rebels by saying he <em>liked</em> plastic. Warhol tossed off the aphorism 'In the future, everyone will be famous for 15 minutes' for the program of one of his exhibits, yet it prophesized the rise of reality TV and YouTube. He made no bones about wanting money and fame, all the things the Village folkies crucified Dylan for chasing. The 1960s were the peak for strident, self-righteous artists to proclaim art as a tool to stop the war and end racism (and thus save the world). Warhol was the ultimate counterprogramming. He denied that 'depth' and 'substance' were worth pursuing. With his rejection of hippie idealism, he was the forefather of punk.</p> <p>"Warhol had used assistants when he manufactured ads in the 1950s, and continued to use them as he moved into painting, as indeed many masters had over the centuries. Like Berry Gordy with Motown, he appreciated the efficiency of the assembly line. His assistants would make his silkscreens and lithographs by day in his loft space on Forty-Seventh street while Warhol popped Obetrols (a 1960s version of Adderall) and kept the R&B hit 'Sally Goes Round the Roses' on constant repeat, like Tom Sawyer convincing others to whitewash his fences for him. Naming his loft the Factory was another rejection of bohemia orthodoxy, as he embraced capitalism's ability to mass-produce product.</p> <p>"He painted the Factory silver and lined it with aluminum foil to go with his wig. By night, it became a legendary salon to rival that of Gertrude Stein, who in the 1920s opened her Paris apartment to artists such as Picasso and Hemingway. Warhol's place had a much more liberal open-door policy. His guests ranged from the rich and glamorous to skid row outcasts. In the former category were rock stars such as the Stones and models such as Anita Pallenberg, wealthy debutantes and European socialites; free-thinking bohemians, movie stars, and gay icons such as Judy Garland, Montgomery Clift, Rudolf Nureyev, Tennessee Williams, Truman Capote, and Allen Ginsberg.</p> <p>"On the seedy side were the porn stars, drag queens, speed freaks, junkies, gay hustlers, and general weirdos. In the middle were the Factory regulars, such as Warhol's assistant Gerard Malanga, who helped with the silkscreen and sculpture. Billy Name was the speed freak photographer who 'silverized' the Factory and lived in the dark room. Warhol befriended the catty actor Ondine after he had Warhol thrown out of an orgy for not participating. Andy's own mother lived downstairs, cooking roasts covered with radishes and applesauce. And soup, of course. His mother had always fed him the soup, which was why he'd painted Campbell's Soup cans three years before."</p> Fri, 29 Mar 2019 03:20:00 -0400 harvard college -- 03/28/19 <p><strong>Today's selection -- from <em>Emerson: The Mind on Fire</em> by Robert D. Richardson Jr..</strong> Ralph Waldo Emerson attends Harvard in 1821. Boston-born Emerson (1803-1882) was a distinguished philosopher, poet, essayist and lecturer. His father, a Unitarian minister, died when Emerson was eight years old, and his mother struggled to raise five boys—including a mentally retarded son. With the aid of several grants and part-time work, however, Emerson was able to enter Harvard College when he was fourteen:</p> <p>"Emerson's Harvard was a small nondescript place, half boys school, half center for advanced study. It had fewer than two hundred fifty students. Emerson's class had sixty, with most of the boys coming from Massachusetts and New England, and with 27 percent of the students coming from elsewhere. There was a marked southern presence ... 18 percent were from South Carolina alone. In Emerson's day, a student commonly entered college at thirteen or fourteen, graduating at seventeen or eighteen. As a result, college life had at times a certain rowdiness. In Emerson's sophomore year, an epic food fight broke out on the first floor of University Hall. The fight quickly got beyond the throwing of food and almost all of the school's crockery was smashed. But it would be a mistake to assume this was the dominant tone of college life. Young people grew up faster then. Emerson could read before he was three; he taught his first class at fourteen. Girls were little women, boys were little men. The curriculum shows that Harvard was not like either the high school or college of today; it offered a combination of basic and advanced studies, functioning as a sort of early college.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/ralphwaldoemerson1.jpg" width="149" height="246" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"Emerson took the same set of required courses that everyone else did. He learned enough Greek to read both the <em>Iliad</em> and the New Testament. In Latin, he read Livy, Horace, Cicero, Juvenal and Persius, as well as Hugo Grotius's <em>De veritate religionis Christianae</em>. He studied algebra, plane geometry, analytical geometry, and spherical geometry. He took Roman history in his freshman year, and in his senior year he studied the principles of American constitutional government, reading the <em>Federalist Papers</em>. In science, he did physics and astronomy as a junior, chemistry as a senior. ...</p> <p>"Back in the college yard, there was class football every day at noon. ...</p> <p>"Emerson himself said later that even though you knew the university was hostile to genius, you sent your children there and hoped for the best."</p> Thu, 28 Mar 2019 03:20:00 -0400 the quest for immortality -- 3/27/19 <p><strong>Today's selection -- from <em>What the Future Looks Like</em> by Jim Al-Khalili. </strong>The quest for immortality:</p> <p>"The desire to radically extend our lifespan is probably as old as humanity itself, yet not much progress has been made toward this goal. At the time of writing, a French woman, Jeanne Calment, still holds the record for the longest human life at 122 years ( 1875-1997). Medical science hasn't yet been able to do much about the <em>maximum</em> lifespan, since we have good evidence that there have been a handful of people throughout history who have lived longer than a hundred years. However, it has done much to help the average age of humans, mostly by reducing infant mortality.</p> <p>"Radical life extension is the idea of using science and technology to push beyond this biological wall of just over a hundred years to allow humans, or post-humans, to live hundreds, if not thousands, of years. One way this might be achieved is to use the same strategy my neighbor uses to keep his old truck going: Simply replace worn parts. So, while the average car lasts about eight years or so, my neighbor has an immaculate truck five times that age. In theory, it will be possible to keep a human body going indefinitely so long as we repair and replace ageing cells and organs, perhaps by using advanced stem cell technology. Using a patient's own stem cells, scientists have already demonstrated that it is possible to grow new organs, like bladders, on a lab bench. The idea is to 'cut and paste,' for example removing an old bladder and replacing it with an organ grown in a lab. And it may not be necessary even to do this; in clinical trials, stem cells have been used to repair damage to heart muscles suffered during a heart attack.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/stem-cells-heart.jpg" width="544" height="346" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"Part of the difficulty in reversing ageing and death is that there are numerous causes involved. The SENS foundation, a nonprofit organization devoted to advancing radical life extension, has identified seven causes of ageing (cellular atrophy, cancerous cells, mitochondrial mutations, death-resistant cells, extracellular matrix stiffening, extracellular aggregates, and intercellular aggregates). Each cause will require its own biomedical or engineering solution. Still, the fact that we are making progress, as demonstrated by some remarkable techniques to extend the lives of animals, suggests that science and technology will allow us to radically extend our own lifespans. Recently, scientists were able to extend the lifespan of mice by 25 percent simply by developing a cellular 'kill switch' that removes a certain class of old cells (senescent cells). Not only are the mice living longer, they are also healthier, with fewer age-related diseases.</p> <p>"None of the technologies described so far will help in the case of catastrophic injury; all the stem cell technology in the world won't help you when a piano falls three stories and lands on your head. But transhumanists have envisioned technological fixes for even these contingencies, which -- though futuristic -- might well be possible within the twenty-first century. The idea is, in effect, to create a backup: a possibility would be scanning and recording your brain down to the micro-level and then reconstructing a new brain from the data. One version of this proposal envisions a small army of nanobots -- molecular size robots -- recording the molecular structure of your brain. In the event of traumatic injury, the nanobots could be activated to repair a brain crushed by a piano or to create a new brain based on the saved blueprint.</p> <p>"Another possibility is to upload this information about your brain to a computer platform. In effect, this would be like moving your mind from biological 'wetware' (your brain) to computer hardware. This raises a number of thorny metaphysical questions about whether it is really 'you' who survives this migration, or whether this is simply an exercise in making a copy of you. Transhumanists (and philosophers) are deeply divided on this question. I side with those who say that we can survive such migration. Indeed, I go so far as to argue that there could be multiple versions of one's self; if you survive the transfer from a biological platform to a computer platform, then there is no principled reason why you could not be uploaded to multiple computers. In this way, immortality, or at least something very close to it, might be achieved."</p> Wed, 27 Mar 2019 03:20:00 -0400 venezuela seized eighteen corn flour plants from private companies -- 3/26/19 <p><strong>Today's selection -- from <em>Crude Nation</em> by Raúl Gallegos.</strong> Through years of profligacy and mismanagement, Venezuela suffers from increasing levels of hyperinflation. A surreal and sometimes nightmarish life is the result:</p> <p>"The arepa, a thick, round, tortilla-like patty made from corn flour, is traditional fare in every Venezuelan meal. People eat arepas for breakfast, lunch, and dinner and as a snack after a late night out. Venezuelans stuff arepas with cheese, pork, chicken, avocado, and a host of other ingredients, and they've given names to each variation, the most famous of all being the Reina Pepiada -- loosely, 'voluptuous queen' -- in honor of a Venezuelan who was crowned Miss World in 1955. Arepas are to Venezuela what hamburgers are to the United States, a part of the country's cultural identity. They also happen to be big business.</p> <p>Venezuelans make arepas from Harina P.A.N., a brand of flour so popular it is used as a neologism to refer to all corn flour, like calling all copy machines Xerox. The company responsible for such a successful product branding is Empresas Polar, a food giant that produces dozens of other products like mayonnaise, ketchup, and margarine, as well as the country's most popular beer brands and soft drinks. Polar also handles the bottling for Pepsi-Cola. Yet Harina P.A.N. has been the company's most emblematic product line for decades. Lorenzo Mendoza and his family own the company that began as a brewery in the early 1940s and has since grown to become the country's biggest private sector employer. The Mendozas also ranked number 690 in the 2015 Forbes list of the world's billionaires, with a net worth of US $2.7 billion.</p> <p>"Polar's Harina P.A.N. came out in 1960, and for the first time made it easy for Venezuelans to make arepas. Before that, making the staple was a labor intensive process that involved grinding corn into thick dough. Polar's flour just needed some water, and presto, the dough was ready. In 2015, however, Polar was losing money on every bag of Harina P.A.N. it produced. In fact, Polar began losing money on Harina P.A.N. in 2006, three years after Hugo Chavez imposed price controls on corn flour and other basic foodstuffs. In other words, the country's most emblematic food product produced losses for Polar for nearly a decade.</p> <p>"Manuel Larrazábal, the CEO for Polar's food unit, walked me through the numbers in a glass-walled conference room at Polar 's headquarters. The cost to Polar of producing a one-kilogram bag of flour was 16 percent higher than the price it could charge for the product. By Larrazábals estimates, the company lost US $13.7 million annually from the sale of Harina P.A.N. in Venezuela. 'This is the moment when we're losing the most money, no doubt about it,' he told me. The price for Polar's flour sat frozen for so long, and the government sanctioned price adjustments have been so meager, that the product has become almost worthless. 'They have turned arepa flour into the new gasoline,' Larrazábal said, referring to Venezuela's world-famous subsidized gas, the difference being that the state pays for the gasoline subsidy, but with Harina P.A.N., the money comes out of Polar's pocket.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/arepas_2.jpg" width="800" height="450" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><strong><em>Arepas</em> at a street stall</strong></td> </tr> </tbody> </table> <p>"Harina P.A.N.'s price of 19 bolivars (or ten U.S. cents) per bag, made the flour cheaper than practically anything for sale in Venezuela. For the price of a cup of coffee, a consumer could buy two kilos of Harina P.A.N., enough to make forty arepas. For a more mind-bending example, the price of an arepa with cheese sold on the streets bought four kilos of Harina P.A.N., enough to make eighty similar arepas in the first place. That's because the law does not regulate prices for a cup of coffee or cheese arepas, so they rise with inflation. To show the public its predicament, in 2015 Polar released a television spot pointing out these distortions. 'The effort of the Venezuelan workers who produce your favorite brand deserves a fair price,' the ad said.</p> <p>"Demand for Harina P.A.N. continues to rise because its low price makes it a target for smugglers but also because Polar's flour is the only brand Venezuelans seem to find in stores. Harina P.A.N. production usually supplies half of the 1,250 million tons of flour Venezuelans consume every year. But Larrazábal pointed out that at the time the latest customer pantry check surveys showed that more than 70 percent of households carried Harina P.A.N., which means Polar's share of the market dramatically increased. Polars competitors are producing far below capacity, and there's a very good reason for that: they are all controlled by the government. The state now owns eighteen corn flour industrial plants it seized from various companies. The government also controls Monaca, a corn flour producer owned by Mexican tortilla maker Gruma that used to satisfy 2.0 percent of flour demand. Government-controlled plants are plagued by slowdowns, shutdowns, and the lack of raw material. To the government's embarrassment, Polar's Lorenzo Mendoza has often publicly asked president Maduro to let Polar run the flour factories the government can't seem to run on its own. Maduro has never responded to that offer.</p> <p>"Polar's competitors don't produce enough because they also lose money. Polar did increase Harina P.A.N. production capacity in 2014 because the state promised to raise the price of flour enough to make it profitable if Polar brought new capacity online. When the company did so in August 2014, the state increased the price of flour roughly 50 percent, making the product profitable again for the first time in years. But corn growers then demanded a price increase for their crop too, and two months later the state increased the price of corn -- Harina P.A.N 's main ingredient -- by 218 percent, making Harina P.A.N. unprofitable again. 'The only way to increase installed capacity is allowing for profitability. There's no other way,' Larrázabal argued."</p> Tue, 26 Mar 2019 03:20:00 -0400 the legend of the 54th massachusetts -- 3/25/19 <p><strong>Today's selection -- from <em>A Short History of Charleston</em> by Robert Rosen.</strong> The Civil War had begun with a Confederate attack on Charleston's Fort Sumter, and with the fall of that fort into Confederate hands. The legend of Robert Gould Shaw and the 54th Massachusetts would be indelibly written on the pages of that war's history in a July 1863 attempt by the Union Army to retake that fort:</p> <p>"The Union fleet's attack on Fort Sumter began on April 7, 1863, and continued on and off throughout the remainder of the war. There were eleven major and minor bombardments of the fort, attacks by small boats, and shelling from land and sea. Fort Sumter never surrendered. It was held tenaciously until February 1865 when the end of the war was certain.</p> <p>"But during the spring and summer of 1863, Charlestonians still thought they might win the war. They and the Confederacy had determined that Charleston would never surrender. And the siege of Charleston, which had begun in April with the attack on Fort Sumter continued. In July 1863, after weeks of secret preparations on Folly Island and Coles Island, the Union Army attacked strategically important Morris Island, which protected both Fort Sumter and Charleston Harbor. The island was really a sandbar, but, in terms of lives, it was an expensive piece of real estate in 1863. The goal of the attack on Morris Island was Battery Wagner, a fort near the tip of Morris Island that commanded part of the harbor and a main ship channel. With Wagner intact, no base would be available to the Union Army from which to launch an attack against Charleston.</p> <p>"The assault on Battery Wagner lasted from July 10 to July 18, 1863.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/600px-the_storming_of_ft_wagner-lithograph_by_kurz_and_allison_1890.jpg" width="600" height="448" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"Losses were heavy on both sides, but Union losses were especially heavy. Some of those killed belonged to the 54th Massachusetts, a regiment of black troops led by white officers and commanded by the aristocratic Bostonian Robert Gould Shaw.</p> <p>"The 54th Massachusetts had been organized in the wake of the Emancipation Proclamation in 1863 by Governor John A. Andrews of Massachusetts, a zealous abolitionist who promoted the then unpopular idea of using black troops. It was to be 'a model for all future Colored Regiments.' Shaw, the 25-year-old Boston Brahmin and battle-seasoned veteran of Cedar Mountain and Antietam, accepted command. The regiment departed from Boston's flag draped streets in May, arrived in Hilton Head in June, and arrived on James Island in July.</p> <p>"The soldiers of the 54th Massachusetts were chosen to lead the final assault on Battery Wagner on the night of July 18. Six thousand Union troops stormed the battery, some invading the fort itself before being repulsed. There were 1,500 Union casualties, including Shaw. Nearly half of the 54th Regiment was killed. The attack failed. Historians disagree about the effectiveness of the 54th, but the loss at Battery Wagner had a large impact in the North. 'Hardly another operation of the war,' Dudley T. Cornish has written in The Sable Arm, 'received so much publicity or stirred so much comment. Out of it a legend was born. As a result of it Robert Gould Shaw came as close to canonization as a new England Puritan can. '</p> <p>"The significance of the actions of the 54th Massachusetts was just this: African-American troops could and would fight and die for their country. It was a simple proposition, but one which most whites -- North and South -- did not believe before that battle. 'It is not too much to say that if this Massachusetts 54th had faltered when its trial came,' said the New York Tribune, 'two hundred thousand troops for whom it was a pioneer would never have put into the field ... But it did not falter. It made Fort Wagner such a name for the colored race as Bunker Hill has been for ninety years to the white Yankees.'</p> <p>"Robert Gould Shaw was buried by the Confederates on Morris Island, with the dead of his regiment, or, as the Southern press described it, in a ditch 'with his niggers.' Northern reaction was vehement, and many insisted Shaw's body be buried with dignity elsewhere. Shaw's father, however, wrote General Quincy Adams Gillmore, the Union commander, that 'a soldier's most appropriate burial-place is on the field where he has fallen.' "</p> Mon, 25 Mar 2019 03:20:00 -0400 billie holiday and lady sings the blues -- 3/22/19 <p><strong>Today's selection -- from <em>Billie Holiday</em> by John Szwed. </strong>Legendary jazz singer Billie Holiday's autobiography is considered an American classic. Co-written with author and journalist William Dufty at a point when much had already been written about her, it is titled <em>Lady Sings the Blues</em>:</p> <p>"When Dufty asked her if she had ever read anything written about her that was accurate, she recalled 'The Hard Life of Billie Holiday' -- an article based on an interview she had done with journalist Frank Harriott for <em>PM</em> newspaper in 1945. Dufty discovered that the material in it was rich enough to be the basis for the first three chapters of the book, often using what had been written verbatim or changing it slightly to standardize the narrative. When she read what she had said ten years before, it set Billie to recalling things long forgotten. Dufty went on to find other interviews she had done for <em>PM</em>, <em>Metronome</em>, <em>Down Beat</em>, and elsewhere that he could draw on.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/440px-(portrait_of_billie_holiday_and_mister-_downbeat-_new_york-_n-y-_ca-_feb-_1947)_(loc)_(5020400274).jpg" width="440" height="456" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><strong>"Portrait of Billie Holiday and Mister, Downbeat, New York, N.Y., ca. Feb. 1947".</strong></td> </tr> </tbody> </table> <p>"The opening line of the book, 'Mom and Pop were just a couple of kids when they got married,' was reshaped from the 1945 <em>PM</em> article. In it Billie was asked to talk about her life, and she began by saying that she was born in Baltimore in 1915 of parents who were 'just a couple of kids.' When asked what she meant by that, she replied:</p> <p>" 'Mom was 13 ... and Pop was 15.' She paused. 'Mom's and Pop's parents just about had a fit when it happened. They'd never heard of things like that going on in our part of Baltimore. But they were poor kids, Mom and Pop, and when you're poor you grow up fast.'</p> <p>"Billie turned her eyes to us, smiled, and her frown disappeared. She lighted a Chesterfield, and began speaking rapidly, between short, reflective pauses.</p> <p>" 'Mom and Pop didn't get married till I was three years old,' she said ...</p> <p>"The British magazine the <em>New Statesman</em> later reprinted those sentences and offered prizes for the best 'similarly explosive first or last sentences from a real or imagined biography.' Over a hundred readers gave it a try, but the <em>New Statesman</em> awarded only consolation prizes and declared that the contest was more difficult than they had imagined:</p> <p>"Miss Holiday's explosiveness ... is no simple formula. In 23 superbly chosen words, she has established her background, recorded at least five relevant facts, illustrated (by her method of doing so) one facet of her own character and made firm friends with the reader by a breathtaking and slightly naughty denouement. Too many of her imitators felt that vulgarity or sheer improbability were satisfactory substitutes for the artfully conjured impudence and shock which characterized the original."</p> Fri, 22 Mar 2019 03:20:00 -0400 the adverb is not your friend -- 3/21/19 <p><strong>Today's encore selection </strong>from <em>On Writing</em> by Stehen King.<em> </em>In his book, <em>On Writing</em>, prolific fiction writer Stephen King argues for simplicity. Here he attacks the adverb:</p> <p>"The other piece of advice I want to give you before moving on to the next level of the toolbox is this: The adverb is not your friend.</p> <p>"Adverbs, you will remember ... are words that modify verbs, adjectives, or other adverbs. They're the ones that usually end in <strong>-ly</strong>. Adverbs, like the passive voice, seem to have been created with the timid writer in mind. ... With adverbs, the writer usually tells us he or she is afraid he/she isn't expressing himself/herself clearly, that he or she is not getting the point or the picture across.</p> <p>"Consider the sentence <strong>He closed the door firmly</strong>. It's by no means a terrible sentence (at least it's got an active verb going for it), but ask yourself if <strong>firmly</strong> really has to be there. You can argue that it expresses a degree of difference between <strong>He closed the door</strong> and <strong>He slammed the door</strong>, and you'll get no argument from me...but what about context? What about all the enlightening (not to say emotionally moving) prose which came before <strong>He closed the door firmly</strong>? Shouldn't this tell us how he closed the door? And if the foregoing prose does tell us, isn't firmly an extra word? Isn't it redundant?</p> <p>"Someone out there is now accusing me of being tiresome and anal-retentive. I deny it. I believe the road to hell is paved with adverbs, and I will shout it from the rooftops. To put it another way, they're like dandelions. If you have one on your lawn, it looks pretty and unique. If you fail to root it out, however, you find five the next day . . . fifty the day after that . . . and then, my brothers and sisters, your lawn is totally, completely, and profligately covered with dandelions. By then you see them for the weeds they really are, but by then it's -- GASP!! -- too late.</p> <table border="0" align="center"> <tbody> <tr> <td><a href=""><img src="/cmsAdmin/uploads/stephen-king-on-writing.jpg" width="561" height="421" class="img-responsive" /></a></td> </tr> </tbody> </table> <p>"I can be a good sport about adverbs, though. Yes I can. With one exception: dialogue attribution. I insist that you use the adverb in dialogue attribution only in the rarest and most special of occasions . . . and not even then, if you can avoid it. Just to make sure we all know what we're talking about, examine these three sentences:</p> <p><strong>"Put it down!" she shouted.</strong><br /><strong>"Give it back," he pleaded, "it's mine."</strong><br /><strong>"Don't be such a fool, Jekyll," Utterson said.</strong></p> <p>"In these sentences, <strong>shouted</strong>, <strong>pleaded</strong>, and <strong>said</strong> are verbs of dialogue attribution. Now look at these dubious revisions:</p> <p><strong>"Put it down!" she shouted menacingly.</strong><br /><strong>"Give it back," he pleaded abjectly, "it's mine."</strong><br /><strong>"Don't be such a fool, Jekyll," Utterson said contemptuously.</strong></p> <p>"The three latter sentences are all weaker than the three former ones, and most readers will see why immediately. <strong>'Don't be such a fool, Jekyll,' Utterson said contemptuously</strong> is the best of the lot; it is only a cliche, while the other two are actively ludicrous. Such dialogue attributions are sometimes known as 'Swifties,' after Tom Swift, the brave inventor-hero in a series of boys' adventure novels written by Victor Appleton II. Appleton was fond of such sentences as <strong>'Do your worst!' Tom cried bravely</strong> and <strong>'My father helped with the equations,' Tom said modestly</strong>. When I was a teenager there was a party-game based on one's ability to create witty (or half-witty) Swifties. <strong>'You got a nice butt, lady,' he said cheekily</strong> is one I remember; another is <strong>'I'm the plumber,' he said, with a flush</strong>. (In this case the modifier is an adverbial phrase.) ...</p> <p>"Some writers try to evade the no-adverb rule by shooting the attribution verb full of steroids. The result is familiar to any reader of pulp fiction or paperback originals:</p> <p><strong>"Put down the gun, Utterson!" Jekyll grated.</strong><br /><strong>"Never stop kissing me!" Shayna gasped.</strong><br /><strong>"You damned tease!" Bill jerked out.</strong></p> <p>"Don't do these things. Please oh please. The best form of dialogue attribution is <strong>said</strong>, as in <strong>he said, she said, Bill said, Monica said."</strong></p> Thu, 21 Mar 2019 03:20:00 -0400 the extraordinary phenomenon of musical savants -- 3/20/19 <p><strong>Today's selection -- from <em>Musicophilia</em> by Oliver Sacks. </strong>The extraordinary phenomenon of musical savants:</p> <p>"The first adult musical savant I met was a retarded man who had been admitted to a nursing home where I worked. Martin had been normal at birth, but at the age of three he contracted meningitis, which caused seizures and a spastic weakness of his limbs and voice. It also affected his intelligence and personality, so that he became impulsive, 'odd,' and unable to keep up with his classmates at school. But along with these problems, he developed curious powers: he became fascinated by music, would listen to it intently, and would then sing the melodies he had heard or play them on the piano, as best he could with his spastic limbs and voice. He was greatly encouraged in this by his father, who was a professional opera singer.</p> <p>"Along with his musical abilities, Martin also developed a prodigious rote memory. Once he was fitted with glasses for the very severe visual problems he had been born with, he became an avid reader, retaining (though often not understanding) everything he read. And this, like his musical memory, was auditory -- whatever he read he heard in his mind's ear, sometimes in his father's voice. As some people may be said to have a photographic memory, Martin had a phonographic one.</p> <p>"Though solitary in his habits, Martin was able to live independently and to do simple, unskilled work. His only pleasure, seemingly, was to sing in church choirs; he could not be a solo singer with his hoarse, spastic voice. But by the time he was sixty-one, his increasing physical disabilities (arthritis and heart disease among them) brought him to the nursing home.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/music-brain.jpg" width="700" height="495" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"When I met him in 1984, he told me that he knew more than two thousand operas, as well as the <em>Messiah</em>, the <em>Christmas Oratorio</em>, and all of Bach's cantatas. I brought along scores of some of these, and tested him as best I could; I found I was unable to fault him. And it was not just the melodies that he remembered. He had learned, from listening to performances, what every instrument played, what every voice sang. When I played him a piece by Debussy that he had never heard, he was able to repeat it, almost flawlessly, on the piano. He then transposed it into different keys and extemporized on it a little, in a Debussyan way. He could grasp the rules and the conventions of any music he heard, even if it was unfamiliar or not to his taste. This was musicianship of a high order, in a man who was otherwise so mentally impoverished.</p> <p>"What was the origin of Martin's musical powers? He had an intensely musical father, and musical ability is often inherited, as with the seven generations of the Bach family. He was born into and grew up in a musical household. Was this enough, or did his auditory and potentially musical powers also gain strength from the poorness of his vision? (Darold Treffert, in his remarkable book on savantism, <em>Extraordinary People</em>, notes that more than a third of all musical savants are blind or have very poor vision.) Martin was born with very severe visual problems, but this was not recognized and corrected until he was almost three, so in these early years he must have been nearly blind and dependent on hearing to orient him and make sense of the world. Or was it the meningitis, which, while stripping him of some of his cortical controls and higher powers, also stimulated or released previously unsuspected savant powers?</p> <p>"The term 'idiot savant' was introduced in 1887 by Langdon Down, a London physician, in reference to 'feebleminded' children who had special and sometimes remarkable 'faculties.' Among these were exceptional powers of calculation, drawing, mechanical aptitude, and, above all, of remembering, playing, and sometimes composing music. Musicality is the most common and perhaps the most dramatic form of savant talent, for it readily comes to public notice and commands attention. The case of Blind Tom, an American slave who exhibited prodigious musical powers from an early age, attracted worldwide attention in the 1860s. Darold Treffert devoted a large part of <em>Extraordinary People</em> to musical savants, and Leon K. Miller wrote an entire book about a single musical savant, Eddie. Detailed studies of savant talents and especially of musical savant skills have been carried out by Beate Hermelin and others in London, and these confirm that such skills depend on the recognition (which may be implicit and unconscious) of essential musical structures and rules, as is the case with normal musical skills. The anomaly is not in the skill itself, but in its isolation -- its unusual and sometimes prodigious development in a mind that may otherwise be markedly underdeveloped in verbal and abstract thought."</p> Wed, 20 Mar 2019 03:20:00 -0400 china overtaking the u.s. in scientific research -- 3/19/19 <p>Today's selection -- from "Technology: From Copycats to Innovators" by Richard Vague. China may soon lead the world in scientific research and development. My recent article in the Democracy Journal, <a href="">Technology: From Copycats to Innovators</a>, examines this phenomenon. Below is an excerpt from the article:</p> <p>"In 2014, China awarded 34,000 PhDs in the natural sciences and engineering, as compared to 40,000 in the United States. More telling, China awarded 1.4 million undergraduate degrees in the natural sciences and engineering, almost four times as many as the 377,000 awarded in the United States. And while the number of these degrees has been increasing in both countries, that growth has been far faster in China. In ten years, PhDs awarded in China have increased by 146 percent as compared to 55 percent in the United States. China increasingly boosts its rate with expanded scholarship support, particularly for degrees like pharmaceutical science.</p> <p>"One result has been that China now leads the world in scientific papers published, with 426,000 studies in 2016 as compared to 409,000 in the United States. According to the World Intellectual Property Organization (WIPO), China is now the second largest source of international patent applications behind the United States and 'is projected to overtake the U.S. within three years as the largest source of applications filed under WIPO's Patent Cooperation Treaty.' It already leads the world in digital communications patent applications. ...</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/lab.png" width="799" height="295" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"Examples of Chinese innovation and genuine breakthroughs abound:</p> <p>"China produces more electric cars than anywhere else in the world, and it is already the world's leader in battery technology, leading <em>The Financial Times</em> to headline one article from September 2018, 'Why the future of electric cars lies in China: Tesla grabs the limelight, but the real story is elsewhere.' ...</p> <p>"Chinese progress is just as pronounced in the most highly complex arenas. CRISPR-Cas9 is an astonishing new technology that can be used to edit genes within organisms. It holds seemingly unlimited promise (and risk) as a tool for enabling cures for diseases and for modification of life forms. Though developed in the United States, there is now more experimentation in China using this new technology than there is here at home, thanks to the greater availability of government funding and a more liberal regulatory environment. Dr. Carl June of the University of Pennsylvania, who is the leading immunotherapy researcher in the world and an early user of CRISPR, has stated, 'We are at a dangerous point in losing our lead in biomedicine [to China].'</p> <p>"In addition, China aims to take the lead in artificial intelligence (A.I.). It envisions a $1 trillion A.I. industry, as CNBC reported in May 2018. ... Just as notable is the lead China may already have in the race for 5G, the next generation of mobile communications, according to a U.S. National Security Council memo. As the memo states, 5G is 'by no means simply a faster 4G . . . [but instead is] a change more like the invention of the Gutenberg Press.' As <em>The Financial Times</em> noted, with its much larger capacity for data, significantly reduced lag times, and greatly enhanced speeds, 5G is expected to extend well beyond phones and permeate every aspect of factories, automobiles, smart homes, robots, and more."</p> Tue, 19 Mar 2019 03:20:00 -0400 the mexican-american war of 1846-- 3/18/19 <p>T<strong>oday's selection -- from <em>Heirs of the Founders</em> by H.W. Brands.</strong> After three short years under presidents John Tyler and James Polk, the United States doubled in geographic size, primarily as an outcome of its war with Mexico:</p> <p>"[In 1846,] James Polk made prophets of Henry Clay and Daniel Webster by commencing a war with Mexico. Polk's war was a land grab wrapped in self-defense. Texas entered the Union with its southern boundary in dispute. The United States claimed the Rio Grande as the border; Mexico claimed the Rio Nueces, more than a hundred miles to the north. Mexico nominally claimed the rest of Texas as well, never having acknowledged the loss of its rebellious province. But though it responded to the American annexation of Texas by severing relations with the United States, it took no military action to challenge the new regime on its northern frontier.</p> <p>"This frustrated Polk. The president's expansionist appetite grew with the eating; not content with depriving Mexico of Texas, Polk coveted California as well. He attempted to purchase California, but the Mexican government rebuffed him. Polk then sought a pretext for declaring war on Mexico. He sent troops to the disputed strip between the rivers, hoping to goad the Mexicans to attack. Weeks went by and the Mexicans refused to take the bait. Polk, more vexed than ever, prepared a war message for Congress, in which he blamed the Mexicans for insults and injuries against American honor and interests. It was a flimsy document, as Polk himself recognized, but he was determined to have California and its Pacific harbors, by whatever means necessary. Then, just as he was about to transmit his message to Congress, he received news that Mexican troops had finally engaged the Americans. 'After reiterated menaces, Mexico has passed the boundary of the United States, has invaded our territory and shed American blood upon the American soil,' Polk told Congress. 'War exists, and notwithstanding all our efforts to avoid it, exists by the act of Mexico itself.' For emphasis the president added, 'The two nations are now at war.'</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/mex-war-map.jpg" width="772" height="583" class="img-responsive" /></td> </tr> <tr> <td></td> </tr> </tbody> </table> <p>"John Calhoun begged to differ. Polk wanted Congress simply to endorse his assertion that war existed and give him authority to prosecute it. Calhoun wasn't going to be stampeded into anything. 'The question now submitted to us is one of the gravest character, and the importance of the consequences which may result from it we cannot now determine,' he told the Senate. 'The president has announced that there is war; but according to my interpretation, there is no war according to the sense of our Constitution.'</p> <p>"Calhoun didn't challenge Polk's account of the attack on American forces. Nor did he question Polk's authority to resist and repel such attacks. But he distinguished hostilities from war. 'It is <em>our</em> sacred duty to make war,' he told his fellow senators, 'and it is for <em>us</em> to determine whether war shall be declared. If we have declared war, a state of war exists, and not till then.'</p> <p>"Calhoun succeeded in slowing the rush to war, but not by much. Congress debated the president's request, with most of the negative comments coming from the Whigs. Some asked whether Polk had done all he could to avoid armed conflict; their strong implication was that he had not. A few went so far as to charge Polk with provoking the war. 'This war was begun by the president,' Garrett Davis, a Kentucky Whig, told the House. Some inquired whether the Mexican attack, if it indeed had occurred as the president said, had been authorized by the Mexican government. Still others rejected Polk's assertion that the soil on which the blood had been shed was American. Some said flatly that it was Mexican; others remarked that ownership was still in dispute.</p> <p>"But Polk knew the American political mind better than the dissenters did. He understood that the shedding of American blood --under whatever circumstances -- created an irresistible impulse toward war. A negative vote could be characterized as an unpatriotic vote, and no lawmaker lightly risked that. The few surviving former Federalists remembered how their party had wrecked on its opposition to the War of 1812. In the end scarcely a dozen Whigs refused the president's request. John Calhoun haughtily abstained.</p> <p>"Daniel Webster dodged. His conscience and his constituents opposed the war, but as one of those Federalist refugees, he recalled how the winds of war could blow popular sentiment in unexpected directions. When the vote was taken, he was not in the Senate chamber."</p> Mon, 18 Mar 2019 03:20:00 -0400 church edicts to destroy the violin -- 3/15/19 <p><strong>Today's selection -- from <em>Stradivari's Genius</em> by Toby Faber. </strong>It took the influence of Catherine de Medici, queen of France and member of Italy's powerful Medici family, to secure the place and reputation of the violin:</p> <p>"[In the early 1500s] the violin had a distinctly questionable reputation. The accepted view was that it might provide a good accompaniment for dancing, but it was not something in which true musicians should take an interest. In parts of ltaly there were even church edicts directing the destruction of this licentious object. Viols, another recent invention, were considered far more suitable for both courtly and religious music. With fretted fingerboards like the lute and guitar, but played with a bow, the various members of the viol family were softer-voiced than their violin equivalents. Ultimately this was to prove their undoing, but initially it was an advantage. In 1556 Philibert Jambe de Fer, writing in Lyon, praised the viol, expressing only opprobrium for the 'harsher sound' of the violin, which (the ultimate insult) 'few persons use save those who make a living from it through their labor.'</p> <p>"For the violin to flourish, the support of someone as influential as Catherine de Medici was crucial. An Italian dance band of violinists, headed by the marvelously named Balthasar de Beaujoyeux, had first arrived at the French court around 1555, before Henri's death but under Catherine's patronage. The band's original instruments have not survived, but some of their immediate successors do. Soon after Charles IX reached his majority, he and his mother set off for a tour of the kingdom, one that would last two years. At around the same time Catherine ordered a set of thirty-eight string instruments from Italy. Whatever her faults as a ruler, she knew how to buy. The entire set was made in the northern Italian town of Cremona. It included that small violin from 1564 that now lies on the floor of its case in the Ashmolean Museum, the earliest surviving violin in the world. And all the instruments were made by Andrea Amati. He and his family would dominate violin-making for the next one hundred years.</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/main-image_001.jpg" width="800" height="1067" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><strong>ex "Kurtz" Violin, ca. 1560 -- This violin may have been part of a set of instruments presented upon the marriage of Philip II of Spain to Elisabeth of Valois in 1559. </strong></td> </tr> </tbody> </table> <p>"The violin is one of the great products of the late Renaissance, the result of a process of evolution, rather than a moment of inspiration.</p> <p>"At the end of the fifteenth century there were only primitive instruments, good for providing dance music or accompanying voices but not for carrying their own tune. By 1535 Gaudenzio Ferrari was painting the ceiling of Saronno Cathedral to show not just violins (or possibly what we would now regard as violas) but also a cello, although both have just three strings. A workshop serving the courts of Mantua and Ferrara in northern Italy had probably made the crucial breakthroughs, combining the pegbox of the <em>rebec</em>, a lute-like instrument of Moorish origin, with the soundbox of the <em>lira da braccio</em>, itself a development of the Renaissance fiddle. Although he cannot have been the violin's inventor, Andrea Amati's delicacy and awareness of geometric principles established the blueprint for others to follow; everything of the instrument's form and function can be seen in that 1564 violin....</p> <p>"By the end of the sixteenth century the power and the versatility of the violin were undeniable. In 1581 Balthasar de Beaujoyeux composed the first music specifically for the new instrument, a ballet to celebrate the marriage of Catherine de Medici's daughter. From about 1600, paintings by Caravaggio and others depict the full beauty of the violin: it had emerged from the shadows, a work of art, but also the most advanced technology of the age."</p> Fri, 15 Mar 2019 03:20:00 -0400 niccolo machiavelli -- 3/14/19 <p><strong>Today's encore selection -- from <em>Niccolo's Smile: A Biography of Machiavelli</em> by Maurizio Viroli.</strong> Niccolo Machiavelli (1469-1527) was a statesman, author and source of the term 'machiavellian,' which has come to mean 'unscrupulously cunning, deceptive or expedient' in seeking to achieve some end, and comes from the ideas he put forward in his book, <em>The Prince</em>. Niccolo was an able and eager political functionary renowned for his good humor and wit, but was banished from political life when the Republic of Florence he served fell, and was replaced by the returning Medici and the old form of autocracy. Though he wrote passionately in advocating republics above autocracies, <em>The Prince</em> was his attempt to show that he could nevertheless be a worthy counselor to the Medici—a notably unsuccessful bid to win a job, since the Medici disregarded him. With this book he was saying, 'If you want to be a powerful autocrat here's how to do it right':</p> <p>"In his brief work [<em>The Prince</em>] are contained the results of his studies of ancient history and everything he learned during his years as secretary of the Florentine Republic. ... Above all, he wished that his short work might be read and understood by the Medici ... [and] if they read it, they would realize that he knew better than anyone else what a prince should do to consolidate power. ...</p> <p>"When <em>The Prince</em> began to circulate ... it found a host of enemies who saw it as an evil work, inspired directly by the devil, in which a malevolent author teaches a prince how to win and keep power through avarice, cruelty, and falseness. ... What had Machiavelli written to stir up such indignation? He had explained that the ideas set forth by thinkers who had written advice books for princes before him were simply wrong. ... These writers maintained that a prince who wishes to keep power and win glory must always follow the path of virtue. ... Machiavelli [who had just seen Florence fall under such a 'virtuous' leader] stated that a prince who followed such advice in all circumstances not only would not conserve his power, but would surely lose it and be scorned and soon forgotten. ...</p> <table border="0" align="center"> <tbody> <tr> <td><img style="margin-left: 10px; margin-right: 10px;" src="/cmsAdmin/uploads/portrait_of_niccolo-_machiavelli_by_santi_di_tito.jpg" width="800" height="1029" class="img-responsive" /></td> </tr> <tr> <td style="text-align: center;"><span style="font-size: x-small;"><strong>Portrait of Niccolò Machiavelli by Santi di Tito.</strong></span></td> </tr> </tbody> </table> <p>'It is necessary' [he wrote] for a prince, if he wants to maintain his realm, 'to learn to be able not to be good' and to use or not use this, 'according to necessity.' ... A good prince, it has been said for centuries ... should try not to instill fear in but to win the love of his subjects. ... Machiavelli argues instead that a prince ... should 'know well how to use the beast and the man.' ... With similar daring, he discarded the doctrine that a good prince must be generous, lavishing gifts and favors on his friends, [writing that he] will succeed only in flattering a few hangers-on and bankrupting his estate. ... Machiavelli [writes that] a prince should certainly hope to be considered merciful and kind but that cruelty [could be] 'well-used.' ... It is difficult to be loved and feared at the same time, but 'it is much safer to be feared than loved if one has to lack one of the two.' ... [Further] princes who have readily broken their word have, 'done great things', and have triumphed over princes who have kept their word. ... In short, he wants a prince who knows how to win.</p> <p>"When Francesco Vettori who had become Lorenzo [de Medici, Duke of Urbino]'s most authoritative adviser presented Lorenzo with Niccolo's masterpiece, Lorenzo barely glanced at it, showing much more interest in two stud dogs that someone had sent him."</p> Thu, 14 Mar 2019 03:20:00 -0400 |
Using Transport Layer Security (TLS) to Secure QUIC Mozilla
Transport QUIC This document describes how Transport Layer Security (TLS) can be used to secure QUIC. Discussion of this draft takes place on the QUIC working group mailing list (, which is archived at Working Group information can be found at; source code and issues list for this draft can be found at
QUIC provides a multiplexed transport. When used for HTTP semantics it provides several key advantages over HTTP/1.1 or HTTP/2 over TCP . This document describes how QUIC can be secured using Transport Layer Security (TLS) version 1.3 . TLS 1.3 provides critical latency improvements for connection establishment over previous versions. Absent packet loss, most new connections can be established and secured within a single round trip; on subsequent connections between the same client and server, the client can often send application data immediately, that is, zero round trip setup. This document describes how the standardized TLS 1.3 can act a security component of QUIC. The same design could work for TLS 1.2, though few of the benefits QUIC provides would be realized due to the handshake latency in versions of TLS prior to 1.3.
QUIC assumes responsibility for the confidentiality and integrity protection of packets. For this it uses keys derived from a TLS 1.3 connection ; QUIC also relies on TLS 1.3 for authentication and negotiation of parameters that are critical to security and performance. Rather than a strict layering, these two protocols are co-dependent: QUIC uses the TLS handshake; TLS uses the reliability and ordered delivery provided by QUIC streams. This document defines how QUIC interacts with TLS. This includes a description of how TLS is used, how keying material is derived from TLS, and the application of that keying material to protect QUIC packets. shows the basic interactions between TLS and QUIC, with the QUIC packet protection being called out specially.
| | | |<---- Handshake -----| | | QUIC | | TLS | | |<----- 0-RTT OK -----| | | |<----- 1-RTT OK -----| | | |<-- Handshake Done --| | +------------+ +------------+ | ^ ^ | | Protect | Protected | | v | Packet | | +------------+ / / | QUIC | / / | Packet |------ Get Secret ------' / | Protection |<------ Secret ----------' +------------+ ]]>
The initial state of a QUIC connection has packets exchanged without any form of protection. In this state, QUIC is limited to using stream 1 and associated packets. Stream 1 is reserved for a TLS connection. This is a complete TLS connection as it would appear when layered over TCP; the only difference is that QUIC provides the reliability and ordering that would otherwise be provided by TCP. At certain points during the TLS handshake, keying material is exported from the TLS connection for use by QUIC. This keying material is used to derive packet protection keys. Details on how and when keys are derived and used are included in . This arrangement means that some TLS messages receive redundant protection from both the QUIC packet protection and the TLS record protection. These messages are limited in number; the TLS connection is rarely needed once the handshake completes.
TLS provides two endpoints a way to establish a means of communication over an untrusted medium (that is, the Internet) that ensures that messages they exchange cannot be observed, modified, or forged. TLS features can be separated into two basic functions: an authenticated key exchange and record protection. QUIC primarily uses the authenticated key exchange provided by TLS; QUIC provides its own packet protection. The TLS authenticated key exchange occurs between two entities: client and server. The client initiates the exchange and the server responds. If the key exchange completes successfully, both client and server will agree on a secret. TLS supports both pre-shared key (PSK) and Diffie-Hellman (DH) key exchange. PSK is the basis for 0-RTT; the latter provides perfect forward secrecy (PFS) when the DH keys are destroyed. After completing the TLS handshake, the client will have learned and authenticated an identity for the server and the server is optionally able to learn and authenticate an identity for the client. TLS supports X.509 certificate-based authentication for both server and client. The TLS key exchange is resistent to tampering by attackers and it produces shared secrets that cannot be controlled by either participating peer.
TLS 1.3 provides two basic handshake modes of interest to QUIC: A full, 1-RTT handshake in which the client is able to send application data after one round trip and the server immediately after receiving the first handshake message from the client. A 0-RTT handshake in which the client uses information it has previously learned about the server to send immediately. This data can be replayed by an attacker so it MUST NOT carry a self-contained trigger for any non-idempotent action. A simplified TLS 1.3 handshake with 0-RTT application data is shown in , see for more options and details.
ServerHello {EncryptedExtensions} {ServerConfiguration} {Certificate} {CertificateVerify} {Finished} <-------- [Application Data] (EndOfEarlyData) {Finished} --------> [Application Data] <-------> [Application Data] ]]>
This 0-RTT handshake is only possible if the client and server have previously communicated. In the 1-RTT handshake, the client is unable to send protected application data until it has received all of the handshake messages sent by the server. Two additional variations on this basic handshake exchange are relevant to this document: The server can respond to a ClientHello with a HelloRetryRequest, which adds an additional round trip prior to the basic exchange. This is needed if the server wishes to request a different key exchange key from the client. HelloRetryRequest is also used to verify that the client is correctly able to receive packets on the address it claims to have (see ). A pre-shared key mode can be used for subsequent handshakes to avoid public key operations. This is the basis for 0-RTT data, even if the remainder of the connection is protected by a new Diffie-Hellman exchange.
QUIC reserves stream 1 for a TLS connection. Stream 1 contains a complete TLS connection, which includes the TLS record layer. Other than the definition of a QUIC-specific extension (see Section-TBD), TLS is unmodified for this use. This means that TLS will apply confidentiality and integrity protection to its records. In particular, TLS record protection is what provides confidentiality protection for the TLS handshake messages sent by the server. QUIC permits a client to send frames on streams starting from the first packet. The initial packet from a client contains a stream frame for stream 1 that contains the first TLS handshake messages from the client. This allows the TLS handshake to start with the first packet that a client sends. QUIC packets are protected using a scheme that is specific to QUIC, see . Keys are exported from the TLS connection when they become available using a TLS exporter (see Section 7.3.3 of and ). After keys are exported from TLS, QUIC manages its own key schedule.
The integration of QUIC with a TLS handshake is shown in more detail in . QUIC STREAM frames on stream 1 carry the TLS handshake. QUIC performs loss recovery for this stream and ensures that TLS handshake messages are delivered in the correct order.
: ClientHello + QUIC Extension --------> 0-RTT Key => @0 @0 QUIC STREAM Frame(s) : Replayable QUIC Frames --------> QUIC STREAM Frame <1>: @C ServerHello {TLS Handshake Messages} <-------- 1-RTT Key => @1 QUIC Frames @1 <-------- @1 QUIC STREAM Frame(s) <1>: (EndOfEarlyData) {Finished} --------> @1 QUIC Frames <-------> QUIC Frames @1 ]]>
In , symbols mean: ”<” and “>” enclose stream numbers. ”@” indicates the key phase that is currently used for protecting QUIC packets. ”(“ and “)” enclose messages that are protected with TLS 0-RTT handshake or application keys. ”{“ and “}” enclose messages that are protected by the TLS Handshake keys. If 0-RTT is not attempted, then the client does not send packets protected by the 0-RTT key (@0). In that case, the only key transition on the client is from unprotected packets (@C) to 1-RTT protection (@1), which happens before it sends its final set of TLS handshake messages. The server sends TLS handshake messages without protection (@C). The server transitions from no protection (@C) to full 1-RTT protection (@1) after it sends the last of its handshake messages. Some TLS handshake messages are protected by the TLS handshake record protection. These keys are not exported from the TLS connection for use in QUIC. QUIC packets from the server are sent in the clear until the final transition to 1-RTT keys. The client transitions from cleartext (@C) to 0-RTT keys (@0) when sending 0-RTT data, and subsequently to to 1-RTT keys (@1) for its second flight of TLS handshake messages. This creates the potential for unprotected packets to be received by a server in close proximity to packets that are protected with 1-RTT keys. More information on key transitions is included in .
As shown in , the interface from QUIC to TLS consists of three primary functions: Handshake, Key Ready Events, and Secret Export. Additional functions might be needed to configure TLS.
In order to drive the handshake, TLS depends on being able to send and receive handshake messages on stream 1. There are two basic functions on this interface: one where QUIC requests handshake messages and one where QUIC provides handshake packets. A QUIC client starts TLS by requesting TLS handshake octets from TLS. The client acquires handshake octets before sending its first packet. A QUIC server starts the process by providing TLS with stream 1 octets. Each time that an endpoint receives data on stream 1, it delivers the octets to TLS if it is able. Each time that TLS is provided with new data, new handshake octets are requested from TLS. TLS might not provide any octets if the handshake messages it has received are incomplete or it has no data to send. Once the TLS handshake is complete, this is indicated to QUIC along with any final handshake octets that TLS needs to send. Once the handshake is complete, TLS becomes passive. TLS can still receive data from its peer and respond in kind that data, but it will not need to send more data unless specifically requested - either by an application or QUIC. One reason to send data is that the server might wish to provide additional or updated session tickets to a client. When the handshake is complete, QUIC only needs to provide TLS with any data that arrives on stream 1. In the same way that is done during the handshake, new data is requested from TLS after providing received data. Until the handshake is reported as complete, the connection and key exchange are not properly authenticated at the server. Even though 1-RTT keys are available to a server after receiving the first handshake messages from a client, the server cannot consider the client to be authenticated until it receives and validates the client’s Finished message.
TLS provides QUIC with signals when 0-RTT and 1-RTT keys are ready for use. These events are not asynchronous, they always occur immediately after TLS is provided with new handshake octets, or after TLS produces handshake octets. When TLS has enough information to generate 1-RTT keys, it indicates their availability. On the client, this occurs after receiving the entirety of the first flight of TLS handshake messages from the server. A server indicates that 1-RTT keys are available after it sends its handshake messages. This ordering ensures that a client sends its second flight of handshake messages protected with 1-RTT keys. More importantly, it ensures that the server sends its flight of handshake messages without protection. If 0-RTT is possible, it is ready after the client sends a TLS ClientHello message or the server receives that message. After providing a QUIC client with the first handshake octets, the TLS stack might signal that 0-RTT keys are ready. On the server, after receiving handshake octets that contain a ClientHello message, a TLS server might signal that 0-RTT keys are available. 1-RTT keys are used for both sending and receiving packets. 0-RTT keys are only used to protect packets that the client sends.
Details how secrets are exported from TLS are included in .
Handshake Received 0-RTT Key Ready Get Handshake 1-RTT Keys Ready <--- send/receive --- Handshake Received 1-RTT Keys Ready Get Handshake Handshake Complete --- send/receive ---> Handshake Received Get Handshake Handshake Complete <--- send/receive --- Handshake Received Get Handshake ]]>
QUIC packet protection provides authenticated encryption of packets. This provides confidentiality and integrity protection for the content of packets (see ). Packet protection uses keys that are exported from the TLS connection (see ). Different keys are used for QUIC packet protection and TLS record protection. Having separate QUIC and TLS record protection means that TLS records can be protected by two different keys. This redundancy is limited to a only a few TLS records, and is maintained for the sake of simplicity.
As TLS reports the availability of keying material, the packet protection keys and initialization vectors (IVs) are updated (see ). The selection of AEAD function is also updated to match the AEAD negotiated by TLS. For packets other than any unprotected handshake packets (see ), once a change of keys has been made, packets with higher packet numbers MUST use the new keying material. The KEY_PHASE bit on these packets is inverted each time new keys are installed to signal the use of the new keys to the recipient (see for details). An endpoint retransmits stream data in a new packet. New packets have new packet numbers and use the latest packet protection keys. This simplifies key management when there are key updates (see ).
QUIC uses a system of packet protection secrets, keys and IVs that are modelled on the system used in TLS . The secrets that QUIC uses as the basis of its key schedule are obtained using TLS exporters (see Section 7.3.3 of ). QUIC uses the Pseudo-Random Function (PRF) hash function negotiated by TLS for key derivation. For example, if TLS is using the TLS_AES_128_GCM_SHA256, the SHA-256 hash function is used.
0-RTT keys are those keys that are used in resumed connections prior to the completion of the TLS handshake. Data sent using 0-RTT keys might be replayed and so has some restrictions on its use, see . 0-RTT keys are used after sending or receiving a ClientHello. The secret is exported from TLS using the exporter label “EXPORTER-QUIC 0-RTT Secret” and an empty context. The size of the secret MUST be the size of the hash output for the PRF hash function negotiated by TLS. This uses the TLS early_exporter_secret. The QUIC 0-RTT secret is only used for protection of packets sent by the client.
These secrets are used to derive the initial client and server packet protection keys. After a key update (see ), these secrets are updated using the HKDF-Expand-Label function defined in Section 7.1 of . HKDF-Expand-Label uses the the PRF hash function negotiated by TLS. The replacement secret is derived using the existing Secret, a Label of “QUIC client 1-RTT Secret” for the client and “QUIC server 1-RTT Secret” for the server, an empty HashValue, and the same output Length as the hash function selected by TLS for its PRF.
= HKDF-Expand-Label(client_pp_secret_, "QUIC client 1-RTT Secret", "", Hash.length) server_pp_secret_ = HKDF-Expand-Label(server_pp_secret_, "QUIC server 1-RTT Secret", "", Hash.length) ]]>
This allows for a succession of new secrets to be created as needed. HKDF-Expand-Label uses HKDF-Expand with a specially formatted info parameter. The info parameter that includes the output length (in this case, the size of the PRF hash output) encoded on two octets in network byte order, the length of the prefixed Label as a single octet, the value of the Label prefixed with “TLS 1.3, “, and a zero octet to indicate an empty HashValue. For example, the client packet protection secret uses an info parameter of:
The complete key expansion uses an identical process for key expansion as defined in Section 7.3 of , using different values for the input secret. QUIC uses the AEAD function negotiated by TLS. The packet protection key and IV used to protect the 0-RTT packets sent by a client use the QUIC 0-RTT secret. This uses the HKDF-Expand-Label with the PRF hash function negotiated by TLS. The length of the output is determined by the requirements of the AEAD function selected by TLS. The key length is the AEAD key size. As defined in Section 5.3 of , the IV length is the larger of 8 or N_MIN (see Section 4 of ).
Similarly, the packet protection key and IV used to protect 1-RTT packets sent by both client and server use the current packet protection secret.
= HKDF-Expand-Label(client_pp_secret_, "key", "", key_length) client_pp_iv_ = HKDF-Expand-Label(client_pp_secret_, "iv", "", iv_length) server_pp_key_ = HKDF-Expand-Label(server_pp_secret_, "key", "", key_length) server_pp_iv_ = HKDF-Expand-Label(server_pp_secret_, "iv", "", iv_length) ]]>
The client protects (or encrypts) packets with the client packet protection key and IV; the server protects packets with the server packet protection key. The QUIC record protection initially starts without keying material. When the TLS state machine reports that the ClientHello has been sent, the 0-RTT keys can be generated and installed for writing. When the TLS state machine reports completion of the handshake, the 1-RTT keys can be generated and installed for writing.
The Authentication Encryption with Associated Data (AEAD) function used for QUIC packet protection is AEAD that is negotiated for use with the TLS connection. For example, if TLS is using the TLS_AES_128_GCM_SHA256, the AEAD_AES_128_GCM function is used. Regular QUIC packets are protected by an AEAD . Version negotiation and public reset packets are not protected. Once TLS has provided a key, the contents of regular QUIC packets immediately after any TLS messages have been sent are protected by the AEAD selected by TLS. The key, K, for the AEAD is either the client packet protection key (client_pp_key_n) or the server packet protection key (server_pp_key_n), derived as defined in . The nonce, N, for the AEAD is formed by combining either the packet protection IV (either client_pp_iv_n or server_pp_iv_n) with packet numbers. The 64 bits of the reconstructed QUIC packet number in network byte order is left-padded with zeros to the size of the IV. The exclusive OR of the padded packet number and the IV forms the AEAD nonce. The associated data, A, for the AEAD is an empty sequence. The input plaintext, P, for the AEAD is the contents of the QUIC frame following the packet number, as described in . The output ciphertext, C, of the AEAD is transmitted in place of P. Prior to TLS providing keys, no record protection is performed and the plaintext, P, is transmitted unmodified.
QUIC has a single, contiguous packet number space. In comparison, TLS restarts its sequence number each time that record protection keys are changed. The sequence number restart in TLS ensures that a compromise of the current traffic keys does not allow an attacker to truncate the data that is sent after a key update by sending additional packets under the old key (causing new packets to be discarded). QUIC does not assume a reliable transport and is required to handle attacks where packets are dropped in other ways. QUIC is therefore not affected by this form of truncation. The packet number is not reset and it is not permitted to go higher than its maximum value of 2^64-1. This establishes a hard limit on the number of packets that can be sent. Some AEAD functions have limits for how many packets can be encrypted under the same key and IV (see for example ). This might be lower than the packet number limit. An endpoint MUST initiate a key update () prior to exceeding any limit set for the AEAD that is in use. TLS maintains a separate sequence number that is used for record protection on the connection that is hosted on stream 1. This sequence number is not visible to QUIC.
As TLS reports the availability of 0-RTT and 1-RTT keys, new keying material can be exported from TLS and used for QUIC packet protection. At each transition during the handshake a new secret is exported from TLS and packet protection keys are derived from that secret. Every time that a new set of keys is used for protecting outbound packets, the KEY_PHASE bit in the public flags is toggled. The exception is the transition from 0-RTT keys to 1-RTT keys, where the presence of the version field and its associated bit is used (see ). Once the connection is fully enabled, the KEY_PHASE bit allows a recipient to detect a change in keying material without necessarily needing to receive the first packet that triggered the change. An endpoint that notices a changed KEY_PHASE bit can update keys and decrypt the packet that contains the changed bit, see . The KEY_PHASE bit is the third bit of the public flags (0x04). Transitions between keys during the handshake are complicated by the need to ensure that TLS handshake messages are sent with the correct packet protection.
The initial exchange of packets are sent without protection. These packets are marked with a KEY_PHASE of 0. TLS handshake messages that are critical to the TLS key exchange cannot be protected using QUIC packet protection. A KEY_PHASE of 0 is used for all of these packets, even during retransmission. The messages critical to key exchange are the TLS ClientHello and any TLS handshake message from the server, except those that are sent after the handshake completes, such as NewSessionTicket. The second flight of TLS handshake messages from the client, and any TLS handshake messages that are sent after completing the TLS handshake do not need special packet protection rules. This includes the EndOfEarlyData message that is sent by a client to mark the end of its 0-RTT data. Packets containing these messages use the packet protection keys that are current at the time of sending (or retransmission). Like the client, a server MUST send retransmissions of its unprotected handshake messages or acknowledgments for unprotected handshake messages sent by the client in unprotected packets (KEY_PHASE=0).
Once the TLS key exchange is complete, keying material is exported from TLS and QUIC packet protection commences. Packets protected with 1-RTT keys have a KEY_PHASE bit set to 1. These packets also have a VERSION bit set to 0. If the client is unable to send 0-RTT data - or it does not have 0-RTT data to send - packet protection with 1-RTT keys starts with the packets that contain its second flight of TLS handshake messages. That is, the flight containing the TLS Finished handshake message and optionally a Certificate and CertificateVerify message. If the client sends 0-RTT data, it marks packets protected with 0-RTT keys with a KEY_PHASE of 1 and a VERSION bit of 1. Setting the version bit means that all packets also include the version field. The client removes the VERSION bit when it transitions to using 1-RTT keys, but it does not change the KEY_PHASE bit. Marking 0-RTT data with the both KEY_PHASE and VERSION bits ensures that the server is able to identify these packets as 0-RTT data in case the packet containing the TLS ClientHello is lost or delayed. Including the version also ensures that the packet format is known to the server in this case. Using both KEY_PHASE and VERSION also ensures that the server is able to distinguish between cleartext handshake packets (KEY_PHASE=0, VERSION=1), 0-RTT protected packets (KEY_PHASE=1, VERSION=1), and 1-RTT protected packets (KEY_PHASE=1, VERSION=0). Packets with all of these markings can arrive concurrently, and being able to identify each cleanly ensures that the correct packet protection keys can be selected and applied. A server might choose to retain 0-RTT packets that arrive before a TLS ClientHello. The server can then use those packets once the ClientHello arrives. However, the potential for denial of service from buffering 0-RTT packets is significant. These packets cannot be authenticated and so might be employed by an attacker to exhaust server resources. Limiting the number of packets that are saved might be necessary. The server transitions to using 1-RTT keys after sending its first flight of TLS handshake messages. From this point, the server protects all packets with 1-RTT keys. Future packets are therefore protected with 1-RTT keys and marked with a KEY_PHASE of 1.
The first flight of TLS handshake messages from both client and server (ClientHello, or ServerHello through to the server’s Finished) are critical to the key exchange. The contents of these messages determines the keys used to protect later messages. If these handshake messages are included in packets that are protected with these keys, they will be indecipherable to the recipient. Even though newer keys could be available when retranmitting, retransmissions of these handshake messages MUST be sent in unprotected packets (with a KEY_PHASE of 0). An endpoint MUST also generate ACK frames for these messages that are sent in unprotected packets. The TLS handshake messages that are affected by this rule are specifically: A client MUST NOT restransmit a TLS ClientHello with 0-RTT keys. The server needs this message in order to determine the 0-RTT keys. A server MUST NOT retransmit any of its TLS handshake messages with 1-RTT keys. The client needs these messages in order to determine the 1-RTT keys. A HelloRetryRequest handshake message might be used to reject an initial ClientHello. A HelloRetryRequest handshake message and any second ClientHello that is sent in response MUST also be sent without packet protection. This is natural, because no new keying material will be available when these messages need to be sent. Upon receipt of a HelloRetryRequest, a client SHOULD cease any transmission of 0-RTT data; 0-RTT data will only be discarded by any server that sends a HelloRetryRequest. TLS handshake data that needs to be sent without protection is all the handshake data acquired from TLS before the point that 1-RTT keys are provided by TLS (see ). The KEY_PHASE and VERSION bits ensure that protected packets are clearly distinguished from unprotected packets. Loss or reordering might cause unprotected packets to arrive once 1-RTT keys are in use, unprotected packets are easily distinguished from 1-RTT packets. Once 1-RTT keys are available to an endpoint, it no longer needs the TLS handshake messages that are carried in unprotected packets. However, a server might need to retransmit its TLS handshake messages in response to receiving an unprotected packet that contains ACK frames. A server MUST process ACK frames in unprotected packets until the TLS handshake is reported as complete, or it receives an ACK frame in a protected packet that acknowledges all of its handshake messages. To limit the number of key phases that could be active, an endpoint MUST NOT initiate a key update while there are any unacknowledged handshake messages, see .
Once the TLS handshake is complete, the KEY_PHASE bit allows for refreshes of keying material by either peer. Endpoints start using updated keys immediately without additional signaling; the change in the KEY_PHASE bit indicates that a new key is in use. An endpoint MUST NOT initiate more than one key update at a time. A new key cannot be used until the endpoint has received and successfully decrypted a packet with a matching KEY_PHASE. Note that when 0-RTT is attempted the value of the KEY_PHASE bit will be different on packets sent by either peer. A receiving endpoint detects an update when the KEY_PHASE bit doesn’t match what it is expecting. It creates a new secret (see ) and the corresponding read key and IV. If the packet can be decrypted and authenticated using these values, then the keys it uses for packet protection are also updated. The next packet sent by the endpoint will then use the new keys. An endpoint doesn’t need to send packets immediately when it detects that its peer has updated keys. The next packet that it sends will simply use the new keys. If an endpoint detects a second update before it has sent any packets with updated keys it indicates that its peer has updated keys twice without awaiting a reciprocal update. An endpoint MUST treat consecutive key updates as a fatal error and abort the connection. An endpoint SHOULD retain old keys for a short period to allow it to decrypt packets with smaller packet numbers than the packet that triggered the key update. This allows an endpoint to consume packets that are reordered around the transition between keys. Packets with higher packet numbers always use the updated keys and MUST NOT be decrypted with old keys. Keys and their corresponding secrets SHOULD be discarded when an endpoint has received all packets with sequence numbers lower than the lowest sequence number used for the new key. An endpoint might discard keys if it determines that the length of the delay to affected packets is excessive. This ensures that once the handshake is complete, packets with the same KEY_PHASE will have the same packet protection keys, unless there are multiple key updates in a short time frame succession and significant packet reordering.
@N @N QUIC Frames --------> QUIC Frames @M New Keys -> @N QUIC Frames @N <-------- ]]>
As shown in and , there is never a situation where there are more than two different sets of keying material that might be received by a peer. Once both sending and receiving keys have been updated, A server cannot initiate a key update until it has received the client’s Finished message. Otherwise, packets protected by the updated keys could be confused for retransmissions of handshake messages. A client cannot initiate a key update until all of its handshake messages have been acknowledged by the server.
Implementations MUST NOT exchange data on any stream other than stream 1 without packet protection. QUIC requires the use of several types of frame for managing loss detection and recovery during this phase. In addition, it might be useful to use the data acquired during the exchange of unauthenticated messages for congestion control. This section generally only applies to TLS handshake messages from both peers and acknowledgments of the packets carrying those messages. In many cases, the need for servers to provide acknowledgments is minimal, since the messages that clients send are small and implicitly acknowledged by the server’s responses. The actions that a peer takes as a result of receiving an unauthenticated packet needs to be limited. In particular, state established by these packets cannot be retained once record protection commences. There are several approaches possible for dealing with unauthenticated packets prior to handshake completion: discard and ignore them use them, but reset any state that is established once the handshake completes use them and authenticate them afterwards; failing the handshake if they can’t be authenticated save them and use them when they can be properly authenticated treat them as a fatal error Different strategies are appropriate for different types of data. This document proposes that all strategies are possible depending on the type of message. Transport parameters and options are made usable and authenticated as part of the TLS handshake (see ). Most unprotected messages are treated as fatal errors when received except for the small number necessary to permit the handshake to complete (see ). Protected packets can either be discarded or saved and later used (see ).
This section describes the handling of messages that are sent and received prior to the completion of the TLS handshake. Sending and receiving unprotected messages is hazardous. Unless expressly permitted, receipt of an unprotected message of any kind MUST be treated as a fatal error.
STREAM frames for stream 1 are permitted. These carry the TLS handshake messages. Once 1-RTT keys are available, unprotected STREAM frames on stream 1 can be ignored. Receiving unprotected STREAM frames for other streams MUST be treated as a fatal error.
WINDOW_UPDATE frames MUST NOT be sent unprotected. Though data is exchanged on stream 1, the initial flow control window is is sufficiently large to allow the TLS handshake to complete. This limits the maximum size of the TLS handshake and would prevent a server or client from using an abnormally large certificate chain. Stream 1 is exempt from the connection-level flow control window.
Accepting unprotected - specifically unauthenticated - packets presents a denial of service risk to endpoints. An attacker that is able to inject unprotected packets can cause a recipient to drop even protected packets with a matching sequence number. The spurious packet shadows the genuine packet, causing the genuine packet to be ignored as redundant. Once the TLS handshake is complete, both peers MUST ignore unprotected packets. From that point onward, unprotected messages can be safely dropped. Since only TLS handshake packets and acknowledgments are sent in the clear, an attacker is able to force implementations to rely on retransmission for packets that are lost or shadowed. Thus, an attacker that intends to deny service to an endpoint has to drop or shadow protected packets in order to ensure that their victim continues to accept unprotected packets. The ability to shadow packets means that an attacker does not need to be on path. This would not be an issue if QUIC had a randomized starting sequence number. If we choose to randomize, we fix this problem and reduce the denial of service exposure to on-path attackers. The only possible problem is in authenticating the initial value, so that peers can be sure that they haven’t missed an initial message. In addition to causing valid packets to be dropped, an attacker can generate packets with an intent of causing the recipient to expend processing resources. See for a discussion of these risks. To avoid receiving TLS packets that contain no useful data, a TLS implementation MUST reject empty TLS handshake records and any record that is not permitted by the TLS state machine. Any TLS application data or alerts that is received prior to the end of the handshake MUST be treated as a fatal error.
Due to reordering and loss, protected packets might be received by an endpoint before the final handshake messages are received. If these can be decrypted successfully, such packets MAY be stored and used once the handshake is complete. Unless expressly permitted below, encrypted packets MUST NOT be used prior to completing the TLS handshake, in particular the receipt of a valid Finished message and any authentication of the peer. If packets are processed prior to completion of the handshake, an attacker might use the willingness of an implementation to use these packets to mount attacks. TLS handshake messages are covered by record protection during the handshake, once key agreement has completed. This means that protected messages need to be decrypted to determine if they are TLS handshake messages or not. Similarly, ACK and WINDOW_UPDATE frames might be needed to successfully complete the TLS handshake. Any timestamps present in ACK frames MUST be ignored rather than causing a fatal error. Timestamps on protected frames MAY be saved and used once the TLS handshake completes successfully. An endpoint MAY save the last protected WINDOW_UPDATE frame it receives for each stream and apply the values once the TLS handshake completes. Failing to do this might result in temporary stalling of affected streams.
The QUIC version negotiation mechanism is used to negotiate the version of QUIC that is used prior to the completion of the handshake. However, this packet is not authenticated, enabling an active attacker to force a version downgrade. To ensure that a QUIC version downgrade is not forced by an attacker, version information is copied into the TLS handshake, which provides integrity protection for the QUIC negotiation. This does not prevent version downgrade during the handshake, though it means that such a downgrade causes a handshake failure. Protocols that use the QUIC transport MUST use Application Layer Protocol Negotiation (ALPN) . The ALPN identifier for the protocol MUST be specific to the QUIC version that it operates over. When constructing a ClientHello, clients MUST include a list of all the ALPN identifiers that they support, regardless of whether the QUIC version that they have currently selected supports that protocol. Servers SHOULD select an application protocol based solely on the information in the ClientHello, not using the QUIC version that the client has selected. If the protocol that is selected is not supported with the QUIC version that is in use, the server MAY send a QUIC version negotiation packet to select a compatible version. If the server cannot select a combination of ALPN identifier and QUIC version it MUST abort the connection. A client MUST abort a connection if the server picks an incompatible version of QUIC version and ALPN.
QUIC defines an extension for use with TLS. That extension defines transport-related parameters. This provides integrity protection for these values. Including these in the TLS handshake also make the values that a client sets available to a server one-round trip earlier than parameters that are carried in QUIC packets. This document does not define that extension.
QUIC implementations describe a source address token. This is an opaque blob that a server might provide to clients when they first use a given source address. The client returns this token in subsequent messages as a return routeability check. That is, the client returns this token to prove that it is able to receive packets at the source address that it claims. This prevents the server from being used in packet reflection attacks (see ). A source address token is opaque and consumed only by the server. Therefore it can be included in the TLS 1.3 pre-shared key identifier for 0-RTT handshakes. Servers that use 0-RTT are advised to provide new pre-shared key identifiers after every handshake to avoid linkability of connections by passive observers. Clients MUST use a new pre-shared key identifier for every connection that they initiate; if no pre-shared key identifier is available, then resumption is not possible. A server that is under load might include a source address token in the cookie extension of a HelloRetryRequest.
QUIC uses TLS without modification. Therefore, it is possible to use a pre-shared key that was obtained in a TLS connection over TCP to enable 0-RTT in QUIC. Similarly, QUIC can provide a pre-shared key that can be used to enable 0-RTT in TCP. All the restrictions on the use of 0-RTT apply, with the exception of the ALPN label, which MUST only change to a label that is explicitly designated as being compatible. The client indicates which ALPN label it has chosen by placing that ALPN label first in the ALPN extension. The certificate that the server uses MUST be considered valid for both connections, which will use different protocol stacks and could use different port numbers. For instance, HTTP/1.1 and HTTP/2 operate over TLS and TCP, whereas QUIC operates over UDP. Source address validation is not completely portable between different protocol stacks. Even if the source IP address remains constant, the port number is likely to be different. Packet reflection attacks are still possible in this situation, though the set of hosts that can initiate these attacks is greatly reduced. A server might choose to avoid source address validation for such a connection, or allow an increase to the amount of data that it sends toward the client without source validation.
There are likely to be some real clangers here eventually, but the current set of issues is well captured in the relevant sections of the main text. Never assume that because it isn’t in the security considerations section it doesn’t affect security. Most of this document does.
A small ClientHello that results in a large block of handshake messages from a server can be used in packet reflection attacks to amplify the traffic generated by an attacker. Certificate caching can reduce the size of the server’s handshake messages significantly. A client SHOULD also pad its ClientHello to at least 1024 octets. A server is less likely to generate a packet reflection attack if the data it sends is a small multiple of the data it receives. A server SHOULD use a HelloRetryRequest if the size of the handshake messages it sends is likely to exceed the size of the ClientHello.
The portion of the QUIC error code space allocated for the crypto handshake is 0xB000-0xFFFF. The following error codes are defined when TLS is used for the crypto handshake: Crypto errors. Handshake failed. Handshake message received out of order. Handshake message contained too many entries. Handshake message contained an invalid value length. A handshake message was received after the handshake was complete. A handshake message was received with an illegal record type. A handshake message was received with an illegal parameter. An invalid channel id signature was supplied. A handshake message was received with a mandatory parameter missing. A handshake message was received with a parameter that has no overlap with the local parameter. A handshake message was received that contained a parameter with too few values. A demand for an unsupported proof type was received. An internal error occured in handshake processing. A handshake handshake message specified an unsupported version. A handshake handshake message resulted in a stateless reject. There was no intersection between the crypto primitives supported by the peer and ourselves. The server rejected our client hello messages too many times. The client rejected the server’s certificate chain or signature. A handshake message was received with a duplicate tag. A handshake message was received with the wrong encryption level (i.e. it should have been encrypted but was not.) The server config for a server has expired. We failed to set up the symmetric keys for a connection. A handshake message arrived, but we are still validating the previous handshake message. A server config update arrived before the handshake is complete. ClientHello cannot fit in one packet.
This document has no IANA actions. Yet.
QUIC: A UDP-Based Multiplexed and Secure Transport Google Mozilla Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations. The Transport Layer Security (TLS) Protocol Version 1.3 This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. Key words for use in RFCs to Indicate Requirement Levels In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. HMAC-based Extract-and-Expand Key Derivation Function (HKDF) This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes. An Interface and Algorithms for Authenticated Encryption This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK] Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection. A Transport Layer Security (TLS) ClientHello Padding Extension This memo describes a Transport Layer Security (TLS) extension that can be used to pad ClientHello messages to a desired size. Limits on Authenticated Encryption Use in TLS Hypertext Transfer Protocol (HTTP) over QUIC Microsoft QUIC Loss Detection and Congestion Control Google Google Hypertext Transfer Protocol Version 2 (HTTP/2) This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged. Transmission Control Protocol Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK] Transport Layer Security (TLS) Cached Information Extension Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.
Ryan Hamilton was originally an author of this specification.
Changed bit used to signal key phase. Updated key phase markings during the handshake. Added TLS interface requirements section. Moved to use of TLS exporters for key derivation. Moved TLS error code definitions into this document.
Adopted as base for draft-ietf-quic-tls. Updated authors/editors list. Added status note. |
A Brief History Of Music: From Grunts To Guitars
Where did music begin, where can it be going? How did we reach the type of music we have today? Is radio and recorded music improving music? This piece examines a history of music, while offering predictions for the sorts of music you may anticipate afterwards.
Where did music begin, where can it be going? The solutions are surprising. There is a contemporary movement leading humanity to the music activity it first created 1000’s of years back. A conflicting movement is creating increasingly more complex sounds, and creating a whole lot of smaller sized sized audiences for further musicians.
Before humanity could write, in addition to before they may speak, rhythm and single tones were chosen to talk. The song from the bird may have inspired a prehistoric man to mimic and boost the noise. Evidence of prehistoric music is sparse, concerning had not been language to describe the appear to descendants. Drumming objects and mimicking are considered as the initial “music”. This ongoing with words being added as speech was discovered.
After the development of writing, music increased to get more refined. Crafted instruments were added. Harmonies were created. Pipes, flutes, fundamental stringed instruments, and other tools were chosen to create the initial sounds that modern man could easily recognize as music. The first known song is finished 4000 years old, developed in cuneiform, and uses the diatonic scale. Today is known as “ancient” music.
Further developments created more regional appear, as different technology breakthroughs in a variety of areas introduced to unique instruments. While “classical music”, you understand, individuals our folks familiar with listen on individuals old record players is generally assumed may be the sounds of composers like Bach or Beethoven, it truly describes any music from the period. The music activity was usually religiously inspired or supported, generally trained formally just like a skill rather of developed through experimentation. As musical notation unified regionally, the composed masterworks in the area were generally performed in line with the rigid written work.
Folk music ongoing immediately after. It had been normally the appear in the unlearned classes, individuals that won’t write or read. Learned orally, this music was learned and modified over and over to reflect the non-public artistry in the artist. This sort of music frequently portrayed the troubles from the illiterate class. It absolutely was not frequently supported, but tolerated, nevertheless the government and spiritual leadership. The tradition of individuals music still continues just like a genre of music to this day all over the world. Classical music resulted in a less rigid modern kind of music, mixing with the thought of personal artistry from folk music. Performers would still use either written or learned pieces, but would add their personal touch. The music activity would appear different each time it absolutely was performed, even when performed using it . artist.
The invention of recorded music and radio began the slide backwards. Recorded music is very rigid. It never changes. Audiences began you may anticipate live performances to get as near the recorded music they have been hearing as you can. Written music allowed amateurs to softly mimic the first artist. To draw in a larger audience, music started to obtain less a symbol from the products the artist preferred to state, plus much more just what the audience would pay to hear. This trend continues today by way of ever simplifying music. Music must be easy and quick to acknowledge. Complexity would lead to missed sales. Many modern styles forgo either the lyrics or perhaps the tune completely. Recycling previous music by way of sampling provides a painter an instantaneous audience, while restricting the artistry possible.
Fortunately, the net enables for almost any artists in the styles to combat losing music artistry. The lower cost of entry enables almost anybody to attain an audience. The lower cost also enables artists to complete whatever they wish, rather of pander with a bigger audience.
Comments are closed. |
Custom Similarities and Differences between Poussin’s and Ruben’s Art essay paper sample
Free EssaysArtSimilarities and Differences between Poussin’s and Ruben’s Art
← Modernist Cinema 1963-1976Western Art History →
Buy custom Similarities and Differences between Poussin’s and Ruben’s Art essay paper cheap
Nicolas Poussin was a French painter. His work served as a substitute to the Baroque style of the 17th century. His work mainly exuded themes of tragedy and death. His style is distinct in Baroque art. Unlike the exciting vivacity of Rubens, Poussin's style of painting is cerebral, cool, detached and intellectual as compared to any other artist of the Baroque. Nicolas Poussin's style of painting was characterized by warm, sensual colors imbued with the classical Baroque dynamism and energy. His paintings have notable strong contours revealing his interest in antique and draftsmanship. In addition to this, his paintings were theatrical and, every rhetorical gesture and expression was necessary in order to give the artwork meaning. He also used cool colors in his paintings. He believed color set the mood of the painting an also affected the light that hit and reflected from the painting. His use of color to give a calculated specific effect to his paintings intrigued many. His paintings incorporated a frieze like the composition and, he believed that each element of a painting psychologically influenced the viewer’s perception of the art piece. His preparatory sketches were unfinished and voluminous, and then he would sketch other dozen or so versions of the final product theme. This would vary the composition used; the light and poses.
Ruben was a Flemish Baroque painter who emphasized on the presence of movement, sensuality and color in paintings. His paintings were not just mature, but also realistic and very reflective. He clearly understood classical art as well as the transition art underwent from Renaissance art to classical art and finally Baroque art. His art also represented aspects of action and emotion. He usually combined this with a very strong contrast of both the dark and light colors. For preparation, he used oil sketches. His drawings were extremely forceful; however, he paid little attention to detail. Therefore, he used drawings and oil sketches to perform his preparatory studies. This was contrary to what Poussin believed in doing. In addition to this, he was one of the last artists to use of wooden panels consistently as a medium of support. Medium this was applicable to very large works as well. However, he used canvas occasionally.
Related essays
1. Western Art History
2. Artist Biography
3. Modernist Cinema 1963-1976
4. Art History Assingnment
Chat with Support |
Ellen Foster Study Guide
Ellen Foster
Ellen Foster by Kaye Gibbons
Ellen Foster is the story of the titular girl, Ellen, whose life in the home of her abusive and predatory father is followed by a string of terrible living situations within her dysfunctional family. Shunted from home to home, Ellen struggles with her history of sexual, corporal, and emotional abuse as her family dies around her from alcoholism, old age, and disease. Eventually she overcomes her difficulties and finds solace in a foster home.
Ellen is an only child who does not have a real home, even at the time when both her parents are still alive. Her father is "trash" and has a drinking problem, and the whole atmosphere is one of domestic violence. Her mother has a heart condition caused by "Romantic" Rheumatic fever and, when the novel opens, has to stay in the hospital. From an early age on, Ellen's thoughts center on how she could get rid of her father—she imagines killing him one way or another. When her mother is released from hospital Ellen's father treats her as badly as before, and it is up to Ellen to protect her mother from him. Soon, however, she takes an overdose of pills and dies while Ellen is lying next to her.
After her mother's premature death, Ellen, who is only eleven years of age, takes charge of the meager household finances. She starts accumulating money, as she realizes she will need money to have a better start later in life. In spite of her unhappy childhood Ellen is a smart girl; she borrows books from the library and is rather creative when it comes to spending her spare time. Her best friend, Starletta, is a young black girl who has poor, but kind parents. She is attracted to them although she has been brought up detesting "niggers" and although she herself cannot overcome all the racial prejudice that has been inculcated in her mind all her life. Ellen says she would never sleep in a "colored house". Also, she refuses to eat or drink anything when she is at Starletta's, remembering the myth that if you use the same glass or cup as "coloreds", the germs they have left on it will spread onto your lips and you will turn as dark as them.
On the other hand, her father himself has his "colored buddies" with whom he drinks. Ellen's odyssey (almost in a picaresque vein) starts the night Ellen's father mistakes her for her mother.
• At Starletta's parents' : After the first instance of abuse to her (not sexual), Ellen goes to Starletta's house, where she stays for the night.
• At Aunt Betsy's : On the following morning, having decided to leave her father for good, she packs all her belongings into a box and goes to Aunt Betsy, who has no children and whose husband has recently died. Betsy treats Ellen well, but she misunderstands Ellen about the permanence of Ellen's stay. Accordingly, when the weekend is over, Betsy turns her out again, and Ellen has to return to her father.
• At Julia's : When he starts beating her, her bruises are noticed at school and as a temporary solution, her free spirited art teacher invites Ellen to live with her and her husband, Roy. Ellen accepts, leaving with her few belongings and the money she has saved up over the past few months. Despite not completely understanding Julia and Roy's way of life, Ellen feels loved and happy. During the period of separations, her father tries to get her back by bribing her with money, but fails.
• At her grandmother's : Sooner or later the question of custody has to be settled in court. Ellen learns that her grandmother ("my mama's mama") is going to take care of her. A wealthy woman who can even afford two black household helps, her grandmother turns out to be a grumpy and bitter old woman who does not really love her granddaughter. She is referred to as the "bosslady" by her workers and she even makes Ellen work in the cotton fields during the summer. She also permanently reproaches Ellen for being her father's daughter and for taking after him, and claims Ellen is responsible for her own daughter's death. Furthermore, she says she knows that Ellen had sex with her father's colored friends (although this is not true). What is more, she suffers from persecution mania, believing that people around the house, even her doctor, are stealing things from her. When she becomes ill she expects Ellen to nurse her, which Ellen dutifully does up to the time her grandmother dies.
• At Aunt Nadine's : Ellen's life does not improve when she is taken up by another of her mother's sisters, her aunt Nadine Nelson, who lives with her daughter Dora. Dora, who is the same age as Ellen, and Nadine are a self-sufficient pair who consider Ellen an intruder. The big quarrel occurs, of all days, on Christmas Day, when Dora gets all kinds of presents (toys mainly) and Ellen receives a single pack of white drawing paper, which she throws at Nadine's feet. Furthermore, Ellen takes a lot of effort to paint a picture for her aunt and her cousin, but she overhears them describing her painting as "silly" and "cheap-looking". As an act of revenge, Ellen pretends she has a boyfriend who has given her a microscope for Christmas. Nadine calls her an "ungrateful little bitch" and tells her she does not want to see her again in her house.
• At her new mama's : In church Ellen encounters a nice and friendly woman, who she believes is called Mrs Foster, and her well-behaved children. She carefully plans to get in touch with them, and after her argument with Nadine she just packs her things together and goes to the house of the "Foster family". In reality, the "family" is a home for disadvantaged adolescents—a kind of foster family rather than a "real" family with the surname Foster . Orphaned after her father's death (of an aneurysm), Ellen does not tell us about the formalities she has to go through to be accepted, but the most important thing for her is that for the first time in her life she is given a warm welcome. Throughout the novel, the reader learns how beautiful her new home is. Ellen also overcomes her racial prejudice and is very glad that her new mama allows Starletta to spend the weekend with her at her new home.
You'll need to sign up to view the entire study guide.
Sign Up Now, It's FREE |
View Paper
Pages: 5
(approximately 235 words/page)
Essay Database > Literature > English
Throughout the play Arcadia by Tom Stoppard there is a distinct difference between the characters who have a science background and those who do not. One of the recurring themes is that those characters and actions of those characters which are against science often lead to conflict and disaster. Even those characters that are of logical thinking for the most part are prone to disaster when they let go of this rational thinking and give …
showed first 75 words of 1422 total
showed last 75 words of 1422 total
…tragedy occurred. In the play Arcadia there is a distinct split between those characters that act rationally and those who do not. For the most part this split can be seen on the basis of scientific background of each character. Those characters with little science knowledge act more irrationally and those with science background act rationally. It even showed how those characters that usually act rationally can those that rationality with the lose of science. |
Breached pipeline causes big oil spill in southern Israel
The spill occurred when the pipeline, linking Eilat to the port city of Ashkelon on the Mediterranean Sea, burst.
The pipeline opened in the 1960s to facilitate the movement of Iranian oil from the Persian Gulf to European markets but since the rupture in Israeli-Iranian relations in 1979 has mostly been used to move oil and oil products from Eilat to different parts of Israel.
The spill occurred in a dramatic desert landscape featuring steeply rising cliffs near Israel's border with Jordan. |
One of the most asked questions of main street when it comes to Obama’s stimulus programs is: how many jobs were created with all that money?
The Obama administration gives thanks to the Reinvestment and American Recovery Act for helping American citizens survive through the current economic crisis and look forward to a brighter future. They believe without it the US economy would have been much worse.
Many people, especially congressional Republicans, believe that the stimulus plan has helped the US economy very little since the program started. It is the 10% US unemployment rate and the failed government programs that have made many individuals feel this way.
According to the White House, there have been 640,000 jobs that were either created or at risk of being terminated and saved through September 30, 2009. This number only reflects the amount of jobs that were funded directly through stimulus funds. The administration is counting the total number of jobs saved every three months, the next report is due at the end of this month.
However, the criteria the White House uses for counting jobs has recently changed. Initially, funding recipients were asked by the administration to keep tally of the jobs that were either created or saved through stimulus funding. Now the administration has told recipients that they only want them to add the number of jobs funded by the program.
The White House has also came to say that there have been more than two million jobs created by the Recovery Act, this includes all positions that were touched by stimulus funding.
These numbers that the White House announced brings another question to mind: Why does the unemployment rate continue to rise even with these amazing amount of jobs created through the stimulus program?
Share This |
Dwarfs found in colliding galaxies' wake
作者:漆洒翳 | 日期:2019-02-28 08:19:02
By Maggie McKee (Image: NASA/JPL-Caltech/Cornell Univ) A new method to detect small, faint galaxies that spring up in the wake of violent galactic collisions has been devised by astronomers using the Spitzer Space Telescope. The method could shed light on how most of the galaxies near our own formed. The vast majority of local galaxies are “dwarfs” – our galaxy, the Milky Way, has 1000 times more mass in stars. But it is not clear how these dwarfs form. Some may have condensed directly from primordial gas soon after the big bang. But astronomers are not sure these lightweight galaxies would have been able to survive unscathed the relatively common galactic smash-ups that occurred in the early universe. Now, a team of astronomers from Cornell University in Ithaca, New York, US, is trying to answer that question by studying a population of dwarf galaxies that were definitely born when two larger galaxies slammed into each other. “It’s important to compare the properties of the ones we know [came from mergers] with those that may have lasted since the big bang,” says team member Jim Higdon. The objects studied by the team are called tidal dwarf galaxies (TDGs), because they are created when two galaxies interact gravitationally. They form in long, tail-like structures but are so small and faint that only about a dozen had previously been observed. But now the Cornell team has used Spitzer’s exquisite sensitivity at infrared wavelengths to identify 15 TDGs around a pair of merging galaxies, together called NGC 5291, that lie 200 million light years from Earth. The galaxies are strung along two arcs of stars and gas stretching about 240,000 light years behind each of the two larger galaxies. Previous ultraviolet measurements had suggested these arcs contained “knots” of star formation. Spitzer confirmed this, revealing these modest TDGs are actually powerhouses of star formation – boasting about 200 million sun-like stars that are just a few million years old. The researchers also discovered the merger-induced dwarf galaxies have a telltale infrared spectrum. They are now searching for this signature in large infrared sky surveys to understand what fraction of other dwarf galaxies formed this way. “We want to understand how the universe was built up, |
Briquetting Plant Plays Aggregate Role in Improving Corporate Sustainability
The fuel briquetting plant is an important technology which plays pivotal role in improving the corporate sustainability. By manufacturing a high density coal called bio briquettes for the industrial and commercial applications, briquetting plant suppliers contribute to their nation’s global economy supply.
The biomass briquetting plant technology is defensible renewable technology which offers the reliable and cost effective energy resource for making green economy. The briquette plant involves conversion of agricultural and forestry devastates having loose density into the higher energy fuel briquettes. By using only pressure and heat, the briquette machine plant India manufactures the white fuel briquettes from available biomass waste materials. Hence, this green technology helps in improving environmental as well as corporate sustainability.
Green briquetting plant project
The use of coal briquettes in the households and corporate industries can make global changes for the sustainable rural development. As the biomass briquetting press technology provides cheapest alternative from the bio waste materials available in very huge quantity which have no profitable use. So, the waste materials are reused by this sustainable plant technology, hence the waste management and other problems of pollution and soil degradation through this residues is solved out easily.
The briquette plant is a highly developed and the most demanded energy technology suitable for the environment also. As the briquette press manufacturer provides the highly developed eco-friendly binder less briquetting machines which able to manufacture green briquettes in huge quantity without harming or we can say that without polluting the nature. The smoke and ash free production of coal briquettes without need of binding agent through the briquetting machine shows the eco pleasant nature of briquetting plant technology.
This wide-ranging energy briquetting plant technology aimed to provide the eco fuel to the rural areas at very affordable rate in the developing nations. So, the biomass briquette press technology is energy efficient technology through which we can save energy as well as our natural energy resources. Use the renewable briquette plant for making green globe and protecting our nature as well as global economy. |
Malaya Roses
Of all society’s injustices, this is perhaps the greatest: Children in the poorest households are nearly twice as likely to die before the age of five than those from the richest. Two regions: Southern Asia and Sub-Saharan Africa known for the majority deaths case happens. Whereas in Madagascar, prostitution among children is common and less expansive business and its considered as "small issue" due to their poverty. The United Nations Children's Fund (UNICEF) estimates that nearly a million children in Asia (primarily girls, and some boys) are involved in the sex trade industry, whether by force and coercion or as a pragmatic alternative to dire poverty. On the other hand, a country like Spain, prostitution is accepted as common and United Nations study reports that 39 percent of all Spanish men have used a prostitute's services at least once.
Modern civilization is not ready to engage at full force to protect our younger generation ( the most vulnerable group who cannot afford, not knowing how, and not capable to reach a functioning legal system and are easily subjugated by parts of the global economy that profit from it. The conclusion made is harsh in sound but looking onto the fact from a study made in few countries such Cambodia, Haiti, Kenya, Malawi, and Nigeria by UNICEF; children are at greatest risk of exposure to sexual violence within the context of close relationships. In the 28 countries with available data, 9 in 10 adolescent girls who have reported forced sex say it occurred for the first time at the hands of someone close or known to them, with current or former boyfriends, partners or husbands the most commonly reported perpetrators. Adolescent boys, too, face sexual abuse from those close to them: Friends, classmates and partners were among the most frequently cited perpetrators. Sexual violence has a profound impact on physical and mental health. As well as causing physical injury, it is associated with an increased risk of a range of sexual and reproductive health problems, with both immediate and long-term consequences. Sexual violence is defined as any sexual act, attempt to obtain a sexual act, unwanted sexual comments or advances, or acts of traffic, or otherwise directed, against a person’s sexuality using coercion, by any person regardless of their relationship to the victim, in any setting, including but not limited to home and work. Belligerence against the children is almost coming from the closest people in their life.
Cruelty also happens in places where children are intended to study and socialize. In 2016 alone, close to 500 attacks or threats of attacks on schools were documented or verified in 18 conflict-affected countries or areas. Children attending schools in countries that are not affected by conflict can also be at risk. Between November 1991 and December 2016, 59 school shootings that resulted in at least one reported fatality occurred in 14 countries across the world. Nearly 3 in 4 of these happened in the United States.
Around 300 million of children aged 2 to 4 worldwide are repeatedly subjected to violent discipline (physical punishment and/or psychological aggression) by their parents or other caregivers at home, and around 6 in 10 (250 million) are subjected to physical punishment. Many children are also indirectly affected by violence in the home: Worldwide, 1 in 4 children (176 million) under the age of 5 live with a mother who has been a recent victim of intimate partner violence.
You Might Also Like
Leave A Reply |
CCD Photometry with Mathematica
Introduction Reduction Conversions Dates Display Image Headers Image Load Image Save Photometry
Table of Contents
This Mathematica package can be downloaded from the Wolfram Research Information Center
History and Uses
CCD photometry is a fairly new method for measuring the brightness of astronomical objects. Older methods employed the use of photometers which require a significant amount of calibration. CCD cameras are much easier to use and the results are easier to visualize. The drawback is that CCD cameras suffer from a lower time resolution than photometers which can be problematic if the light variations of the astronomical source occur over short time intervals.
This package provides a number of useful tools for reducing and processing CCD image data stored in FITS format. FITS is a standard data format used in the astronomical community. Unlike many other formats, FITS data contain headers and data sections. The header contains information that is often vital to the interpretation and identification of the data contained in the file. FITS stands for Flexible Image Transport System. This name can be a bit confusing if the FITS file contains only a header and no data. Additionally, unlike other bitmap formats such as GIF or JPEG, the data in a FITS file is not a bitmap, but typically contains tensors of data. Multiple data sets and header can exist in a single FITS file.
Since FITS supports so many different structures, this makes it difficult to create an automated package to handle all FITS files. Certain assumptions must be made, such as the name of the fields in the header. For CCD photometry of variable stars, the time that the image was started is vital to the analysis. In the examples provided, the start time of the image is kept in a filed called "UT" for Universal Time. The code in this package specifically looks for this filed and parses its value to construct a more standard Mathematica time expression. If a FITS file from a different observatory were used, the field may be named "STARTTIME", in which case this package would not work without modifications. Proper analysis of FITS data requires some knowledge of the contents of the file.
The examples used here make use of a few FITS files created at the NURO (National Undergraduate Research Observatroy) facility in Flagstaff, AZ. These images were used in the construction of the code for this package so they should work fine.
CCD Image Reduction
CCD image reduction is a vital step in process of data acquisition. To get good results, you need equipment that is free of irregularites and uncontaminated data. Neither of these occur in reality, at least not completely. The best that can be hoped for is that the error can de detected and compensated for. This is where CCD image reduction comes in. CCD chips are like any other electronic device, they can get dirty and they have inherent noise associated with moving electrons. Also, the chip itself may suffer from irregularities in the sensitivity across the surface. Some areas of the chip are more sensitive to light than others. Also, dust can settle on the chip and along the image plane which can block light. These all need to be accounted for.
The first step is to realize that a CCD chip is basically an array of photoelectric electron counters. Since the chip has an applied voltage, there is a bias voltage that must be subtracted from all measurements. Failure to account for this would result in measured electron counts that are higher than the actual signal. Second, CCD chips can also detect thermal electrons which result in random noise that increases with exposure and temperature. Failure to account for this will also result in artificially heightened electron counts. Lastly, since the chip is an array of discrete components, it should be expected that not every component will be as sensitive to light as another. As mentioned before, dirt and dust can also block light from efficiently hitting fixed areas of the chip. What can we do?
Bias Voltage - The Zero Frame
Since the chip has a voltage applied to it, or bias, this effect needs to be measured. This can be accomplished with a "zero frame". This is an "image" taken with the CCD with a zero-length exposure. This means it receives no signal from the sky and is so short that there is no measurable thermal noise to account for. A series of such frames can be taken and then averaged, thus giving the average bias across the CCD. This frame will be subtracted from every frame during the reduction process.
Thermal Noise - The Dark Frame
Since CCD chips are sensitive to electrons, random electrons can contaminate the data. Only electrons generated from the photoelectric effect of photons hitting the chip are desired. So, for a given exposure length, we need to know how much thermal noise builds up across the chip. If we expose the chip for a finite time period, but leave the shudder closed, we should be able to measure this effect. Thermal noise has a random nature so an average of such "dark" frames is typically needed. Of course this will also contain the bias voltage signal, but this will be subtracted. A final step that reduces the effect of thermal noise is to cool the chip as much as possible to limit the presence of such noise as much as possible. The images used in examples in this package were taken with a liquid nitrogen cooled CCD camera, operating at about -110 Fahrenheight. The result was a nearly negligible thermal noise count so no dark frame was acquired.
Chip Irregularities - The Flat-Field Frame
The final source of error that can be accounted for is the fact that the chip is not uniformly sensitive to light across its surface. Some "pixels" are simply not as efficient at converting photons to electrons as others. Dirt or dust grains lying on the chip or on filters in the light path reduce the sensitivity of some pixels. If we had a map of these sensitivity variations, we could measure the variation and raise or lower the pixel values to compensate. The flat-field frame is used for this purpose. Typically, the camera is pointed at an area of the sky that is uniformly illuminated and is called a "sky-flat". This is best done just after sunset, but before the stars appear. If a short exposure is taken, the you would expect a uniformly illuminated image or field. Instead, you get an image with small "doughnut-like" artifacts and large areas that look darker than others. We can take this image, subtract the bias frame, and then normalize all of the pixel values. Then, we can divide the bias-subtracted image frame by the flat-field frame and get a result free of irregularities in chip sensitivity. In effect, we are multiplying each pixel by a factor necessary to bring its sensitivity to the same level as the others.
CCD Photometry
Once the image frame has been reduced, it is now ready for data extraction. With old photometers, a photoelectric tube with a fixed aperture is pointed in the direction of the light path. Any light coming through the aperture falls on photoelectric pads and causes a cascading effect of electrons which eventually count high enough to be measured. The current is measured and later converted to a brightness measurement by comparing the current to that generated by a known "standard" star that is preferably non-variable. If this "standard" star is located relatively far from the star of interest, then the amount of atmosphere the light has travelled through will be different than the light from the star of interest. An extinction coefficient must be calculated. Also, what about differences in the cloud coverage between these stars. There is almost always some level of clouds in the air, even if it can't be seen easily.
CCD photometry has an advantage in that the comparison star is typically in the same field as the star of interest and so the extinction coefficient is not necessary. One common method employed by CCD astronomers is differential photometry with a star in the same field. This has two advantages. The first is that no extinction coefficient is needed. Secondly, any clouds that affect the image will effectively affect all stars in the frame by the same amount since the field of view is typically small. It is not the brightness of the star itslf we are interested in, it is the difference in brightness between the star of interest and a comparison star. Even if thin clouds do roll in, as long as both stars are visible through them, the difference between them should remain unaffected.
Brightness measurements are calculated based on the sum of the pixels of interest, also known as the signal. In all forms of photometry, the signal-to-noise ratio (S/N) of the data is often good to know. A low S/N ratio means that the remaining random noise in the background is now on the order of the signal. The signal may have random fluctuations that contribute more and more significantly to the measurement.
One remaining issue that affects all forms of photometry and is difficult to account for is the cosmic ray. Cosmic rays are high energy particles that penetrate the atmosphere and originate in events such as supernovae, quasars, and other high energy events. Cosmic rays are very evident in a CCD image frame and usually appear as very bright pixels or very narrow sets of bright pixels that are not in preceding images or images that follow. They are quite frequent and are randomly distributed. However, they can create a significant "artificial" signal spike if they fall on one of the pixels being measured. One method of decreasing the effect of cosmic rays is to run a median filter over the image, but this actually blurs and alters the data so it should be used with care.
Created by Mathematica (October 24, 2004) Valid XHTML 1.1! |
the dictionary of norse mythology
SCANDINAVIA A region in northwestern Europe. norway and sweden form the great peninsula once known as Scandia and now known as the Scandi-navian peninsula. denmark's Jutland peninsula and the islands the lie between it and the Scandinavian peninsula, as well as the Faeroe Islands and iceland, which lie in the Atlantic Ocean to the west and northwest of Norway, are often considered part of the region.The people of Scandinavia share similar lan-guages, histories, and cultures. Norwegian, Swedish, Danish, and Icelandic all share roots with the Ger-manic languages. Their ancestors spoke Old norse, a name that has often been used to refer to the people of Scandinavia as well as the ancient language. In 400 b.c., the Germanic peoples of north central Europe began moving northward and building settle-ments in Scandinavia, living next to or pushing aside the native people of those lands. By a.d. 600, nation-states had begun to take shape in these regions, and language changes separated these immigrant peoples from the cultures of their origins. Around this time the vikings, a powerful people, began centuries of conquest across northern Europe, including England, Finland, and parts of eastern Russia.Much of the information of the mythology of the Norse has survived in the records and manuscripts of the Scandinavian nations and on the intricate and complex stone carvings found throughout the region. Scholars have pieced together the stories of the gods, goddesses, enemies, and kingdoms of this mythology from scattered sources. From Iceland to the west and Finland to the east, the Arctic Circle to the north and the bogs of low-lying Denmark to the south, archaeologists have for almost two centuries uncov-ered the story of Scandinavia's past, including the spectacular finds of ships and ship burials near Oseberg, Norway, in 1904 and at Sutton Hoo in East Anglia, England, first excavated in 1939.
We invite to see Polish painters, Digital Art or Candlesticks in the our art gallery. |
#Techfugees: Ending the Invisibility of Refugees
A tech community response to the European refugee crisis
Michael Harrington once wrote in 1962 ‘That the poor are invisible is one of the most important things about them. They are not simply neglected and forgotten…What is much worse, they are not seen.’
While this is certainly true today, the internet and technology have managed to break barriers by supporting people, including refugees, who are struggling to have their voices heard. Technology has affected their invisibility by providing them with empowering tools that allow them to achieve social justice.
Addressing the importance of technology, Techfugees was launched as a ‘tech community response to the European refugee crisis.’
This newly formed community consists of a series of non-profit ‘Techfugees’ conferences, hackathons and cooperation with a global network of interested volunteers. The community aims to find ways to tackle the refugee crisis through technology. This ranges from providing communication tools to refugees and ensuring access to the ‘outside world’, to facilitating access to aid and support.
Watch #TechfugeesLIVE above.
Providing a platform for refugees |
1 Introduction
Dementia affects more than 35 million people worldwide, and the number is still growing dramatically. Dementia includes the symptoms of declining in cognitive capabilities including memory and thinking skill due to various reasons. Dementia damages people’s ability to live independently, thus many dementia patients face the prospect of being institutionalized. As home care is often costly, we are investigating the development of an affordable socially assistive robot to support cognitively impaired older adults with daily living activities, which will potentially extend their time living at home.
To facilitate effective personalized treatment, a caregiving robot should be able to communicate effectively with people who it interacts with, including both the patients and their family members. To communicate effectively, a caregiving robot should tailor its interactions to its interlocutors, taking into account the nature and degree of cognitive impairment, other health issues, and individual preferences.
2 Approach
We equipped the robot with a knowledge base embodying “best practices” for communicating with different classes of individuals [1, 2, 3, 4, 5, 6]. Upon delivery, the knowledge base can be augmented with (some) information about the people with whom the robot is expected to interact. When communicating with an individual, the robot uses the knowledge base to determine a customized strategy.
People with dementia often have difficulty completing daily tasks. In this work, we customized the interactions of the robot with users of the COACH system, which provides assistance to complete the task of handwashing [7]. COACH tracks the user’s hand positions to ensure that he or she is following a proper sequence to wash their hands. If COACH determines that the user is having difficulty, it will provide audio or video instructions, called prompts. These prompts are then customized by our system.
3 Implementation
COACH uses a POMDP-based Task Manager to estimate the user’s progress and determine the next prompt. The prompt is then processed by the Executor which plays a pre-recorded audio or video clip (see Fig. 1).
To customize the behaviour of COACH, we deployed a Prompter which reasons using features stored in the knowledge base to adapt the prompt for the user. These facts of the user are input into the knowledge base when the robot is delivered to the home by family members. We also modified the Executor so that it could use the output of the Prompter to dynamically generate an appropriate audio clip, rather than simply using a pre-recorded one (see Fig. 2).
Figure 1: The original COACH system.
Figure 2: COACH system with customization
Universal parameters — such as prompt detail level, volume, voice type, and speed — are determined using the knowledge base. Using these parameters, the prompt from the Task Manager, and other relevant information (e.g., how the user likes to be addressed, what kind of soap is in the environment), the Prompter generates a customized prompt and mode of delivery. This allows for different types of prompts for different users and situations. The Executor then uses IBM’s Watson to synthesize the audio clip (see Fig. 3).
Figure 3: The architecture of the Prompter
4 Illustrative Examples
The original COACH system does not take the individual condition of the user and the environment into consideration. Consider the following example prompt, in which the Task Manager decides the user should turn on the tap.
Original COACH Pre-recorded Prompt
“Try pulling the silver lever towards you.”
Now, we show three examples of prompts that our system generates instead, depending on individual circumstances, via the knowledge base. Note that both the content and prosodic features vary according to the individual.
Customized Prompts Based on Context entered by user
Scenario 1: The user is an elderly woman that has severe dementia and hearing difficulty.
“Ms. Marth, now turn on the tap.”
The user is addressed formally (as desired) using a short sentence. This prompt is generated using a low-pitched voice, high volume, and slow speed.
Scenario 2: The user is an elderly Spanish-speaking woman with mild dementia and mild hearing difficulty.
“Señora Abar, saque un poco de agua.” (“Ms. Abar, get some water.”)
The user is addressed formally in Spanish (as desired) using a short sentence. This prompt is generated using normal volume and normal speed.
Scenario 3: The user is a 4 year-old girl.
“Vivian, now turn on the tap. Be careful with the hot water.”
The user is addressed by first name using multiple sentences, with a high-pitched voice, normal volume, and normal speed. Being a child, she was also reminded of potential danger.
5 Evaluation
To evaluate the effectiveness of the customizations, we propose using the following criteria.
Effectiveness: Effectiveness measures how successful our approach is at helping users complete the handwashing task. We plan to evaluate effectiveness in trials by measuring how often patients can complete the handwashing task successfully when assisted by our system. We also plan to measure the number of prompts used per handwashing session.
Satisfaction: Satisfaction measures how satisfied users feel with the help provided by the robot. We would use a questionnaire completed by the user(s) and/or expert observers to provide feedback on individual satisfaction with the robot’s behaviour.
These kinds of evaluations require human trials. Due to the need for ethics approval, the evaluation is left for future work.
6 Conclusion
We customized the COACH’s prompts for assisting people with handwashing to demonstrate how human-robot interaction can be tailored. The prompts are customized using a knowledge base embodying best practices, taking into account individual circumstances and preferences. Our customizations adapt the robot’s interactions to the nature and degree of cognitive impairment, other health issues, as well as personal preferences, such as language choice. Ultimately, these customizations aim to help dementia patients to complete the daily living tasks and hence improve their quality of living.
7 Future Work
We plan to explore the use of Reinforcement Learning to adapt customizations through interaction with the user. Since people’s preferences and impairments can change over time, and the initial knowledge base may require some tuning, the robot should be able to learn about its users and incorporate the new knowledge into its interactions.
As our goal is to create a socially assistive robot to support cognitively impaired older adults with daily living activities, the robot may need to help with different kinds of activities, such as tea or meal preparation. The system can also be expanded to use other languages than English or Spanish. Finally, our customization techniques should undergo evaluation. We have discussed some strategies for evaluation above, and would use them to evaluate the system.
We would like to thank our collaborators: CrossWing Inc.; Professor Alex Mihailidis and team at the Toronto Rehabilitation Institute; Professor Goldie Nejat and team in Mechanical and Industrial Engineering at the University of Toronto; and Professor Franc ̧ois Michaud and team at the University of Sherbrooke. We also wish to thank Dr. Elizabeth Rochon from the Toronto Rehabilitation Institute for her expert advice on suitable strategies for communicating with persons with dementia. Computations were performed on the SOSCIP Consortium’s Cloud Data Analytics computing platform. SOSCIP is funded by the Federal Economic Development Agency of Southern Ontario, the Province of Ontario, IBM Canada Ltd., Ontario Centres of Excellence, Mitacs and 15 Ontario academic member institutions.
[1] Rozanne Wilson, Elizabeth Rochon, Alex Mihailidis, and Carol Leonard. Examining success of communication strategies used by formal caregivers assisting individuals with alzheimer’s disease during an activity of daily living. Journal of Speech Language and Hearing research, 55(2):328–341, 2012.
[2] Rozanne Wilson, Elizabeth Rochon, Alex Mihailidis, and Carol Leonard. Quantitative analysis of formal caregivers use of communication strategies while assisting individuals with moderate and severe alzheimer’s disease during oral care. Journal of Communication Disorders, 46(3):249–263, 2013.
[3] Elizabeth Rochon. Personal communication, 2017.
[4] Alzheimer’s Association. Communication and alzheimer’s, 2017.
[5] Alzheimer Society Canada. Ways to communicate, 2017.
[6] Family Caregiver Alliance. Caregiver’s guide to understanding dementia behaviours, 2017.
[7] Jesse Hoey, Axel von Bertoldi, Pascal Poupart, and Alex Mihailidis. Assisting persons with dementia during handwashing using a partially observable markov decision process. The 5th International Conference on Computer Vision Systems, 2007. |
Szilveszter Matuska, who became known as the train killer of Biatorbágy, was born in Čantavir on 29th January 1892. He had been enrolled in I/b form of the Jesuit grammar school in Kalocsa. Because of his poor school progress, he was later transferred to the grammar school in Subotica. Here he decided to be a village schoolmaster and cantor, so he continued his studies in the archiepiscopal teachers training school in Kalocsa. After graduation, he was appointed as a teacher to three different places, but Szilveszter Matuska chose the appointment in Püspökhatvan. After his military service, he returned to his native village during World War I, where he took up teachership and he organised civil guard there. The teachers wage was not sufficient for his debauched lifestyle, so he also dealt with trade, importing huge quantities of salt, petroleum, sugar, matches and paint, from Novi Sad, Subotica, Belgrade and Bulgaria. In June 1922, he received Hungarian citizenship and moved to Budapest to Rottenbiller Street, together with his family. He sold his estate and bought another houses in the Visegárd Street, and then in the Szabolcs Street, but he also wanted to buy several houses in Vienna, from the price of his flat sold in Budapest. He also dealt with wine-trade, trying to sell a sweet kadarka called “Tigris tej” (Tigerns Milk). While he lived in Vienna, he also occupied with selling his own patents. He finally settled in Vienna in May 1928. He committed his crime in Biatorbágy in the night between 12th and 13th September 1931, at 0:20 a.m. Blowing up a portion of the viaduct caused the engine and the first six coaches forming the train to plunge into a ravine. 22 people died and 17 others were severely injured in this tragedy. They could find the home-made explosive and a letter that made the communists suspected. Because of this, it way introduced a summary court until October 1932. However, during the investigation it was revealed that a mad merchant and industrialist from Vienna, Szilveszter Matuska committed the crime; and he was also the perpetrator of another crime of derailing a train between Austria and Germany. The Austrian court sentenced him to six years of imprisonment, while the Hungarian court condemned him to death. But since there was no penalty of death in Austria, the sentence was commuted to life imprisonment in the National Royal Prison in Vác. In November 1944, when the Soviet troops marched in Vác, the prison remained ownerless for a few hours, thus Szilveszter Matuska escaped in this disorder and disappeared. He was last seen in his native village, Čantavir.
Árpád Papp
Bozsik, Péter (2005): Az attentátor. Kalligram Kiadó, Budapest. |
Pre-Life Group Study Questions for January 27, 2019
Mark 6:6b-13
What does it mean?
1. What are the big ideas that we have seen in Mark (Chapters 1-6) thus far?
2. Why does Mark follow Jesus’ rejection with his sending out of the twelve?
3. Why do you think Jesus sends the disciples out two by two?
4. When Mark tells us that Jesus gives authority to the disciples, what exactly is that
authority he is giving them?
5. What is the significance of Jesus giving the disciples such specific instructions for
their journey in vv. 8-9? How do you think the disciples felt about taking
nothing with them?
6. In v. 10 when Jesus says, “Whenever you enter a house, stay there until you depart.”
What does he mean by this?
7. Jesus seems to be implying that the disciples will experience rejection. How does
he instruct them to respond to rejection in v. 11? Does this instruction surprise
you? Explain.
8. In vv. 12-13 describe what the ministry of the disciples looked like. Is their
ministry the same as Jesus’?
9. Is Mark intending his readers to think they are or will be given the same authority
as the apostles? Explain.
10. Does the ministry Jesus called the disciples to in this passage mirror what he
taught about in the parables in Chapter 4?
11. How would you paraphrase Mark's big idea in 6:6b-13?
How does it apply?
1. How would you apply the disciple’s mission to your sphere of influence?
2. Are we required to leave our homes and preach on the road? Why or why not?
Are we to go with no resources and not prepare for potential needs? Explain.
3. In light of that, have you ever felt Jesus inviting you to “take nothing for your
journey” (v. 8)? Explain.
4. What is it about our food, money, and possessions that can weigh us down?
5. How can we determine whether or not someone has or has not received us and
whether we should shake the dust off our feet? What might that look like?
6. More than anything, Mark has made it obvious that this gospel is totally different
from what everyone expected - and to follow Jesus, it will cost you and the
journey will be difficult. What encourages us personally to move forward in our
journey with Christ? How can we call and encourage others into this journey
with us? |
All Steam Is Not Created Equal
Published: July 5, 2018 - by Dan Holohan
Categories: History Lesson, Troubled Heating Systems
the lost art of steam heating
Wet steam? Dry steam?
Take a pound of water (that's about a pint), and heat it from 32° F to 212° F. That will cost you 180 Btu because one Btu will raise one pound of water one degree on Gabriel Fahrenheit's scale. But you still don't have steam. That's just very hot water. To get the steam magic to happen, to get those water molecules so excited that they leap into space, you need to add an additional 970 Btu for each pound of water. Do that and the water will instantly expand 1,700 times and charge toward the radiators.
But is that good steam? You know, the sort that will heat the radiators and make the people smile? Is the steam dry? Or is it wet?
Did you know there were two types?
Back in the day, we were all about the dry stuff. Steam boilers were tall and had had large steam chests, the hydronic auditoriums where the escaping steam could gather, leaving the liquid water behind. Those boilers also had wide sections, which allowed the steam to be polite as it rose through the liquid water toward the steam chest. Hey, no shoving allowed!
And since the sections where wide, the exit holes could also be wide. That was great because those wide doorways to the supply pipes kept the steam's exit velocity down. If the steam goes too fast it will suck the liquid water out of the boiler and that means wet steam, which is steam that contains more than 2% liquid water. It's tough to heat a building with this sloppy stuff because the steam wants to condense in the liquid water its dragging along rather than in the radiators. You wind up burning lots of fuel and the building still won't heat well.
The boiler manufacturers used to test for dry steam, and they wouldn't give a boiler their seal of approval if it couldn't produce steam with less than 2% liquid water. But then came the movement to make boilers with greater combustion efficiencies, and the only way they could do that with steam boilers was to make them smaller. That led to narrower sections, cramped steam chests, choked exit holes, higher steam velocities, and wet steam.
So during the '80s, the manufacturers stopped testing for dry steam, which was good for them because you can't fail a test you're not taking. So there.
In place of the dry-steam test they gave us really good near-boiler piping instructions. It then became the installer's responsibility to pipe the boiler in such a way that the near-boiler piping would separate the liquid water from the steam as it left the boiler.
So pipe that replacement boiler like a professional and it will heat the building. Or cut corners and wrestle with water hammer, uneven heating, high fuel bills, and customers who won't want to pay you. It's good to have a choice, right? Make the right one.
Dry humor
You can be laughing all the way to the bank with dry steam if you go a bit beyond the boiler manufacturer's instructions by doing this:
• Use more risers out of the boiler to the header. If the manufacturers says use one, use two. You'll cut the steam's exit velocity in half and get drier steam. Manufacturers compete with each other, and if one says their steam boiler will work well with one riser to the header, the competitor will be reluctant to recommend two risers for their boiler, even though we all know that physics rules. Use as many risers as you can and the steam will slow and get dry.
• Increase the size of the header. The larger the header is, the lower the steam velocity will be, and that's good for both you and your customer. The steam will leave the boiler very quickly; that's a given these days. A larger-than-required header will slow it and give the carry-over water a chance to flow back into the boiler rather than up into the system piping.
• Use a drop-header. This is where you come out of your boiler with risers as high as you can before turning through two elbows to drop into your horizontal steam header at a lower level. The rise out of the boiler will leave much of the water behind. Drop-headers are a Dead Men trick and they work wonders when it comes to quieting the system and lowering the fuel bills.
There's a third type of steam we call superheated, and no, it doesn't wear a cape. This is the steam that runs turbines. It's under very high pressure and it's hotter than it's supposed to be. They make that happen by running normal steam through a superheater, where it picks up more heat than it should be holding. It becomes absolutely, positively dry. That makes the turbine very happy. Imagine a very large turbine spinning at, say, 3,600 rpm. Now toss some water in there and see what happens. Whoa!
Superheated steam can cool as it passes through the turbine without turning to water. We don't use superheated steam for heating because saturated steam, which is always in equilibrium with liquid water at that same temperature, has a higher useful heat content. You can see all of this on a Saturated Steam Table, should the spirit move you.
Did you know?
• We don't use bucket traps near steam pressure-reducing valve stations, because there will be some momentary superheated steam on the low-pressure side of the PRV. That excess heat can enter the traps prime and cause it to boil away. And when that happens, the trap will stop trapping.
• Those who work in power plants where there is high-pressure steam will often carry a broom in front of themselves while walking the pipes. These plants are very noisy and you can't see high-pressure steam leaks. You can see the broom's bristles disappear, though. Which means you should stop walking NOW, or suffer the broom's fate.
Want to learn more about steam-heating systems? Check out The Lost Art of Steam Heating Revisited. |
How security flaws work: SQL injection
Love is accused of participating in the #OpLastResort initiative through SQL injection attacks, an increasingly common tactic. SQL injections have recently been detected against state electoral boards, and these attacks are regularly implicated in thefts of financial info. Today, they’ve become a significant and recurring problem.
As with buffer overflows, SQL injection flaws have a long history and continue to be widely used in real-world attacks. But unlike buffer overflows, there’s really no excuse for the continued prevalence of SQL injection attacks: the tools to robustly protect against them are widely known. The problem is, many developers just don’t bother to use them.
One of Microsoft’s less valuable innovations
The earliest description of these attacks probably came in 1998, when security researcher Jeff Forristal, writing under the name “rain.forest.puppy,” wrote about various features of Microsoft’s IIS 3 and 4 Web servers in the hacker publication Phrack.
IIS came with several extensions that provided ways to generate webpages based on data from databases. Then and now, most databases use variants of a language called SQL (Structured Query Language) to manipulate their data. Databases using SQL organize data into tables built up of rows and columns. Each table represents a particular kind of thing. Each column of the table represents a particular fact about that thing, and each row of the table is an instance of that thing. So, for example, a table named “people” might have columns for “age” and “name,” with each row in the table representing a specific person. SQL is used for both defining these tables and columns and for manipulating the rows within them.
IIS had several different ways of writing SQL commands—”queries”—to find and retrieve information in an SQL database. The best-known and longest-lived of these is ASP (Active Server Pages), a system for writing webpages with embedded programming (usually using JavaScript or VBScript) that typically include substantial amounts of database access. At the time, IIS also included something called IDC (Internet Database Connector) that was a less flexible way of sending an SQL query to a database and tabulating the results.
Sometimes, the SQL query that these IDC and ASP files used for grabbing information from the database was hardcoded; that is, the same query was used every single time the webpage was loaded. But because the query was often written to take one or more parameters, the data shown on that page could change as those parameters changed.
For example, an online store might have a page named order.asp to display the contents and status of an order. Each order is identified by an order ID, with the order ID passed as a parameter to the page as part of the URL: order.asp?orderID=1234, say, to view the order with ID 1234. The ASP page would take the parameter from the URL and combine it into an SQL query, which was then sent to the database for lookup.
What Forristal noticed was that the way these parameters were combined to build the query meant that an attacker could force the database to execute other queries of the attacker’s choosing. This act of subverting the application to run queries chosen by an attacker is called SQL injection.
A popular tool to this day
Since their initial discovery, SQL injection flaws have routinely been discovered in the wild and used to compromise vast quantities of data. While Forristal looked at Microsoft’s software first, SQL injection was an industry-wide problem; sites using Java, PHP, ColdFusion, Ruby, and Python have all had SQL injection flaws. Virtually every technology that can be used to build dynamic, database-driven websites is susceptible to SQL injection.
And attacks using SQL injection are abundant. Earlier this year, a Florida man was charged with felony hacking after using SQL injection to read sensitive data from an election site. SQL injection vulnerabilities in the Joomla CMS and popular WordPress plugins have put hundreds of thousands of blogs at risk of attack. Security firm HBGary was devastatingly attacked in 2011 after members of the Anonymous collective discovered SQL injection flaws in a custom-developed content management system. The group responsible for that attack would later go on to call itself Lulzsec.
But they could also add their own data. In a well-designed system, passwords, for example, won’t be stored as plain text but instead will be irreversibly transformed into a hashed value. Merely reading the database therefore won’t be sufficient to let an attacker log in and snoop around; while the database will contain the necessary username, it won’t reveal the password. The ability to write to the database, however, means that an attacker can simply create additional user accounts—ones for which they do know the passwords—and log in with those.
To understand how these attacks happen, we need to understand how Web applications use databases. Basic SQL queries have a fairly simple structure. For example, a call to search for a particular order might look like
Author: Amanda Walker
Share This Post On
Submit a comment
Submit a Comment |
Illustrated alphabet book is deliberately difficult
Silent letters are celebrated in P is for Pterodactyl, a funny new picture book that describes itself as 'the worst alphabet book ever'. Instead of relying on the traditional 'a is for apple', this book explores "all the words that misbehave and make words nearly impossible to pronounce," so expect to find lots of Czars, tsunamis, and mnemonics.
Given that the English language is notorious for its contrary rules and counter-productive etiquettes, it's amazing that we haven't seen a mischievous book like P is for Pterodactyl on our list of 31 books graphic designers should read. And even though the words it uses to represent letters have a very limited use, they aren't technically wrong.
A Czar urging the reader to be quiet with a finger on his lips
Learn the A, B, Czs with this book
The brainchild of Raj Haldar, AKA rapper Lushlife, and computer programmer Chris Carpenter, P is for Pterodactyl features illustrations by Maria Tina. Published by Sourcebooks, the book has become a surprise runaway success with the first print run of 10,000 selling almost immediately.
This didn't do anything to slow down the book's popularity though as it was soon picked up and shared by Facebook group Imagination Soup. At the time of writing, Sourcebooks reports that more than 100,000 orders for the book have gone unfulfilled, but the good news is that it's busy working on reprinting another 210,000 copies.
A baffled teacher point to mnemonic written on a blackboard
Although not technically wrong, this alphabet book has comparatively limited use
P is for Pterodactyl is currently sitting pretty at number 8 on the New York Times bestseller list, not bad for a book that started out as a joke about a Q is for Quinoa flashcard.
Want a copy of P is for Pterodactyl to call your own? More copies are expected to become available this month.
Related articles: |
Wiki | M | Mysql
MySQL is open source and easily the most popular and preferred relational Database Management System (RDBMS) for web-based applications. It uses the Structured Query Language (SQL) and is written in C and C++. It gets its name MySQL by adding "My" (name of Michael Widenius's daughter) to SQL. Michael is one of the co-founders of MySQL along with David Axmark in 1994. MySQL is pronounced as My Ess Que Ell. It supports all major operating systems like Linux, Windows, UNIX. It is powerful, reliable, quick in processing, flexible and an easy to use the database.
MySQL was first released in 1995 by a Swedish company My SQL AB. The company is now owned by Oracle Corp. who purchased the company in 2008. It is a free software database engine and is a part of the LAMP architecture (Linux operating system, Apache web server, MySQL database, and PHP or Perl or Python scripting language). Some of the popular MySQL/PHP based scripts include osCommerce, Joomla and phpBB. It boasts of running as a back-end database for some high-end websites like Facebook, Twitter, Wikipedia, Google, and YouTube. MySQL source code is freely available project getting its GNU public License since 2000 June. It can be used freely within a website without any license fee.
Some of the MySQL offshoots popularly called forks include Percona Server, MariaDB, and Drizzle. Percona server is created by Percona as a drop-in backward-compatible replacement for MySQL databases and is much faster, highly scalable, easier to monitor and offers superior performance. Drizzle built by Brian Aker is an open source database management system redesigned version of MySQL version 6.0 written in C++ script. MariaDB is developed by the MySQL co-founder Michael Widenius and the name Maria comes after his second daughter. MariaDB server is a high performing reliable, the secured server keeps websites running 24/7 without much fuss.
Designed & Developed by Cyfuture India Private Limited |
What to Do for Cedar Trees That Appear to Be Browning?
There are several reasons why cedar trees might be browning. Until you know the cause, it's hard to know how to treat the problem. Often, browning is a sign that the tree is dying. There might not be a singular issue that is causing the tree distress. Factors to consider are soil, environmental problems, insect infestations and diseases.
What to Check
Figure out what species of cedar you have. Various species attract different problems. Examine your cedar. Check to see if the entire tree has died or if it's just a few branches. If the entire tree is affected, it may be a root problem. Some browning is natural, so if only a few branches are affected, don't worry. This is especially common on western red cedar and in dry, hot weather.
Cedars are shallow-rooted and prone to drought stress. Make sure you water the trees during dry periods and mulch to help maintain moisture in soil. On the other hand, overwatering can kill roots, so use sprinklers at short intervals during the day to keep soil constantly damp. Water for about 30 to 40 minutes two or three times a week.
The problem could also be with the soil. Perform a pH test and make sure the soil's pH level is from 6 to 7.5. To increase the amount of pH, add dolomitic lime. Too much fertilizer can burn roots. Don't use too much.
There are several insects that can cause cedar browning. The cypress tip moth's larvae affect young twigs in spring. Look for white, spun cocoons in early June. This pest doesn't affect western red cedar.
The root weevil can also result in brown foliage. These insects feed at night but watch for evidence of notching at the stem near brown areas, especially between March and June. If you want to prevent adult damage, place a sticky band around the tree trunk.
Mites usually aren't a big problem except in dry, hot weather. They are tough to see; you might need a magnifying glass. Use a miticide if they are out of control. Check for rodent damage. Chewing evidence can be seen below dead foliage. Also look for chewed bark. And damage can happen pretty high up, not just at the tree's base.
Root rot is the most common disease that causes cedars to brown. Watch for white fans under the bark at the base of dead trees and black string shapes that spread the fungus. There is no cure for root rot. Remove dead trees. To prevent it, plant resistant species.
T.L. Chancellor
|
White blood cells have a nucleus, but red blood cells do not. White blood cells play protect the body from disease and infection. More »
The presence of white blood cells in the urine is typically evidence of a urinary tract infection, according to Urinary tract infections usually involve the bladder or kidneys, although the ureters or ur... More » Science Human Anatomy
B cells are white blood cells that differentiate into plasma B cells and produce antibodies specified for certain antigens. These cells can produce many antibodies in order to eradicate the foreign antigens from the huma... More »
|
Dec. 11, 1932: Chilliest temp ever recorded in Sacramento
The recent cold snap is nothing compared to what happened 81 years ago this Wednesday in Sacramento.
On that day, the coldest temperature ever recorded in Sacramento occurred. The mercury dipped to 17 degrees downtown.
The record low was part of a frigid period that lasted from Dec. 9 to Dec. 15, according to the National Weather Service History books. Low temperatures dropped to the teens and low 20s every night.
Crops suffered, park ponds froze, radiators ruptured, water stopped flowing through pipes, a sheepherder froze to death and goldfish outside in a block of ice came miraculously came back to life.
Read: Freezing temperatures continue in Sacramento area
Here are snippets from The Bee around the time of the Big Freeze of ’32, when weather was news, along with the Great Depression.
“Smudge pots sent up a pall of smoke over orchards in the citrus areas of the Sacramento Valley as the growers made a desperate effort to save their crops from the worst December freeze in the history of California.”
“Meteorologist (E.H.) Fletcher said the cold wave was due to a rare example of ‘importation of cold air’ from Alaska and Western Canada.”
“Firemen found themselves compelled to face the wintry blasts with an avalanche of calls to put out fires resulting from overheated chimneys and stoves.”
“Gardeners in the state capitol grounds found the fountain between the two extension buildings frozen solid, and the pool still was sheeted with ice at noon.”
“One death was directly attributed to the cold in Superior California. Frederick Wilder, 73, a sheepherder, froze to death while watching a herd of sheep near Arboga, Yuba County.”
“The all-time record for chilliness was established yesterday morning, when the mercury dropped to 17 degrees, two degrees under the previous low mark set in January, 1888. The highest temperature yesterday was 34 degrees.”
“Fair Oaks, in the heart of Sacramento County’s citrus belt, registered a temperature of 15 degrees yesterday morning, and it was felt there was little likelihood the orange crop could have escaped general injury from the unprecedented cold.”
“Plumbers and radiator repair men were the busiest people. There was no depression in their business.”
“Hundreds of Sacramento residents experienced frozen water pipes and motorists who called on friends Saturday night went out to find their radiators frozen.”
“At the city zoo in William Land Park attendants scurried about with oil stoves and other means of heating the cages of animals.”
“For the first time in history ice thick enough for skaters formed on the lake in McKinley Park.”
“Mrs. Stephen L. Kyle…forgot to dress the gold fish on the back porch in their heavy flannels…the fish were firmly encased in solid block of ice. Upon expert advice from friend husband, the gold fish were carefully thawed out. And believe it or not, the fish are as good as new.”
The weather service notes that the record-breaking cold snap halted on Dec. 16, 1932 when a warm and moist storm from the mid-Pacific moved into Northern California.
Another cold weather period, this one memorable to more Sacramento residents, occurred Dec. 20, 1990 to Jan. 1, 1991. Downtown Sacramento had a record number of consecutive days with minimum temperatures 32 degrees or lower: 13.
The Bee’s Jason Coughran contributed to this story. |
Provided by: Universidad Politecnica de Madrid
Topic: Mobility
Format: PDF
Energy is a scarce resource on battery-powered wireless sensor nodes, and wireless communication represents the major consumer of electric energy on most current platforms. Reducing the number and size of radio transmissions thus represents a viable approach to save energy and extend a node's operational time. In the domain of pervasive computing, where a periodic reporting of data (e.g., a user's vital parameters) is often being used, packets cannot always be simply omitted from transmission. Even if the contained data have not changed, these periodically transmitted message double as beacons to indicate that the sensor node has not run out of energy.
Find By Topic |
I became aware of the environmental impacts of the conversion of forests to oil palm several years ago, when large numbers of orangutans were suddenly being reported in distressed situations throughout Kalimantan, Indonesia. These orangutans were often the victims of severe human-wildlife conflict, having been targeted as “pests” in the newly-planted oil palm plantations in the region around the Borneo Orangutan Survival Foundation’s Nyaru Menteng Project, who rescued hundreds of them. The graphic images of these orangutans were seen around the world, and prompted international outrage at the situation. The orangutan became the symbol of the environmental impact of large-scale monoculture developed with little regard to sustainability.
Since that time, I have been heavily involved in the issue of palm oil, helping to initiate the Palm Oil Working Group of the Ape Alliance and the Palm Oil Action Group in Australia, and serving on several working groups to develop solutions with the Roundtable for Sustainable Palm Oil (RSPO). In doing so, I learned a great deal about the complexity of the issues, and this continuous learning process guides my position.
First, I think everyone can agree that palm oil is here to stay, whether we like it or not. It is a commodity used in countless applications the world over, and there will always be a market. Given this, I believe it is our duty to do all we can to ensure that the palm oil that is produced is produced in the most sustainable way possible. Calling for a boycott of all palm oil in places like the EU or America would have negligible impact on the production of it, as the greatest take-up is from countries like India and China, who have less insistence for sustainability. Better we develop a demand for Certified Sustainable Palm Oil, because only if there is a demand, will producers take the effort to move towards certification. And while no monoculture could ever be considered truly sustainable, I think we must consider that there is a spectrum of sustainability, and sustainable palm oil (for example that which is not grown as a result of forest clearance) is an infinitely better option than non-sustainable palm oil. We also must remember that palm oil is the highest-yielding edible oilseed crop, with yields nine times that of other oilseeds like soya and rapeseed. If we were to replace palm oil with other oilseed crops in order to meet worldwide demand, then we will have to be prepared to have at least nine times as much land given over to grow these crops. And the social and environmental impacts will be multiplied.
Second, because we had the luck to be born into a developed country, I believe we need to acknowledge the right of lesser-developed countries to develop. We simply have no right to tell a country like Indonesia to forgo economic development, but we can help to steer that development in a sustainable direction. Many millions of people world-wide have employment in the palm oil industry, and although issues of low pay for some of these workers remain, more and more companies are becoming certified, thereby ensuring fair conditions and wages for their employees.
While far from perfect, the RSPO is proving effective, as now over 1 million hectares of palm oil has been certified. The spirit of the RSPO is to have a multi-stakeholder approach to addressing the issues of sustainability, and as such, the RSPO is only as strong as the participation of these stakeholders. I encourage more NGOs to become members of the RSPO and to become part of this journey to more sustainable palm oil. Cooperation between the industry and the NGOs can make a real difference. For example, in Kalimantan, this kind of cooperation has resulted in a sharp decline in the number of orangutans in need of rescue by Borneo Orangutan Survival Foundation in recent years.
The responsibility for the addressing the issues surrounding palm oil lie with all of us: consumers, industry, government and NGOs.
See Saving Orangutans Through Habitat Protection: An Interview With Michelle Desilets
A version of this article first appeared on www.betterpalmoil.org/
Main image: By Daniel Kleeman via flickr |
Top definition
Same as "duck, duck, goose" except the word duck is replaced with beach and the word goose is replaced with bitch.
Basic rule explanation: Everyone sits in a circle except for the person chosen to be "it". They walk around the circle tapping the heads of the people saying "beach" or "bitch". The person claimed to be bitch then chases the person chosen to be "it" and, if "it" gets back to the bitch's old spot before the bitch, the bitch becomes "it".
This game has advantages over duck, duck, goose as a game because, unlike duck, duck, goose, the words beach and bitch sound somewhat similar to each other. The chosen bitch will have to take slightly more time to realize that they were chosen to be bitch, giving "it" a higher advantage in the chasing portion of the game. It also allows the person chosen to be "it" to call people a bitch and get away with it by saying, "I would have never called you a bitch if we weren't playing beach, beach, bitch."
I played Beach, Beach, Bitch with a group of 50 people once.
by CancerAndEbolaPatient May 01, 2018
Get the mug
Get a Beach, beach, bitch mug for your Aunt Beatrix. |
Christianity in Vietnam
When European explorers began to search for new territories they took with them their religion, Christianity, often Roman Catholicism. In the case of Vietnam, the Europeans were the French, Spanish and Portuguese, all Catholic peoples and the first contact they had with South East Asia was in the 16th Century. An early visitor to Vietnam was a Jesuit, Alexandre de Rhodes, who met and impressed the Trinh Lords who reigned in the North. The result was that he was allowed to set up permanent missions in three cities, Hanoi, Danang and Hoi An, a coastal city often included in Vietnam tour packages which dates back to the early Middle Ages.
christianity in vietnam
Alexandre de Rhodes produced the first written form of the Vietnamese language and to that extent he still has a profound effect on Vietnam even today. That did not save him from being thrown out of the country by the Lords who began to feel that he and other Christians had introduced beliefs that were actually threatening the basis of their power. The script that he had produced had been used within the Church but not elsewhere; that was not to happen for centuries, the 20th Century to be precise even though the French controlled Vietnam throughout the 19th Century.
Catholicism did not disappear with de Rhodes expulsion and the Societe des Mission Etrangeres which he created continued to preach and seek converts throughout Indochina. The period just before the arrival of the French was an awful period for Christianity. There was an uneasy peace between Catholics, of which there were many thousand, and rulers. The problem was the doctrine of equality in the eyes of God. That was very unpopular with King Ming Manh at the beginning of the 19th Century. He was a strict Confucian whose suspicion turned to something more ‘’positive.’’
Oppression came in the form of executions and churches being destroyed. That gave the French an excuse to invade, and they did. The Church was reinstated with schools and missions opened throughout the country. The Catholic Church became a major landowner while local Catholics found favour and became an educated class, the elite of the country.
Vietnam began to change in the 20th Century and just as elsewhere in the world there was a movement for independence from colonial masters. In the case of Vietnam, the growth of communism was partly at the expense of Christianity. Communism spread in the north and a communist government took control in the 1950s; Catholics headed south to places like Saigon, today’s Ho Chi Minh City. Those Catholics remaining in the north were tolerated but strictly controlled.
When the country was unified after the Vietnam War under the Hanoi Regime, there were restrictions put on the Catholic Church but these have gradually been relaxed as the Government’s confidence increased; relations with the Vatican have warmed though there is little chance of a Papal visit at this time.
Protestantism was introduced by the Americans in the South and there are thought to be around half a million in Vietnam today. Many live in the Central Highlands though this has been a region of unrest at times.
The Catholic Churches are worth a visit during a Vietnam travel package. The Gothic Church in Hanoiis certainly a landmark in the Capital with others in Hue and Da Lat, replicas of European cathedrals. However, they do not take precedence over the local temples on Vietnam tour packages. The ‘’Stone Church’’ of Phat Diem and its bell tower blends Christianity with the orient, as do many of the religious buildings in the Central Highlands. |
Zombie physiology
Could a zombie escape its grave?
coming out of grave, Hocus Pocus gif, www.thescottsmithblog
By Chris Post
It’s a common zombie trope: the undead creature bursting forth from their grave, having clawed its way to surface. But could they really do it?
In a word, no. While the image is a great one for film, the truth of the matter is that being buried is a pretty permanent scenario, especially today. In the end, it boils down to two factors: burial practices and weight.
Although not required by law, many cemeteries require the use of burial vaults. Although they can take a variety of forms, from plain to elaborate, all vaults are essentially the same thing: a concrete box to house the casket.
Vaults are used for several reasons, both pragmatic and emotional. First and foremost, the vault keeps the surface of the grave from becoming concave when the coffin at the bottom rots and collapses. Vaults also give the living peace of mind that their loved ones aren’t becoming an all-you-can-eat worm buffett.
Regardless, the presence of a vault would make it all but impossible for a reanimated corpse to escape its casket. But what if there wasn’t a vault? Even then it would be very difficult.
Because human hands are not designed to claw and dig, it would be hard for a zombie to scratch its way out of the casket, even if it was just of the plain pine box variety. A modern casket would be even more difficult given the reinforced nature of their construction.
By the time the casket would be rotten enough to aid in the escape, infiltration of water and the aforementioned worms and insects would mean there would likely be little left of the zombie.
A body buried without a casket might be able to escape the grave but even this would likely be impossible. Assuming that the zombie is not granted some sort of super strength, the weight of dirt alone would likely be enough to keep it in place.
Topsoil free of rocks and other large debris weighs between 1,700 and 2,000 per cubic yard, depending on moisture content. A standard grave plot contain about 2.6 cubic yards of dirt above the casket, meaning the weight pressing down on the zombie would be somewhere in the neighborhood of 4,250 to 5,000 pounds.
Obviously, the shallower the grave, the less dirt and therefore less weight will be pressing down on the zombie. So the lesson here is double tap and burry them deep.
Categories: Zombie physiology
Tagged as: , ,
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
A brownish smog occurring in urban areas receiving large amounts of sunlight, caused by photochemical (light-induced) reactions among nitrogen oxides, hydrocarbons and other components of polluted air that produce photochemical oxidants.
Latest Articles
• Interesting facts about metals
• Gas of rotten eggs
• Use of diamonds
Most Popular
Open Sextet
Refers to species that have only six electrons in the highest energy level of the central element (many Lewis acids).
The process by which solvent molecules pass through a semipermable membrane from a dilute solution into a more concentrated solution.
Bronsted-Lowry Acid
A proton donor.
Chemical Bonds
The attractive forces that hold atoms together in elements or compounds.
The dispersing medium of a solution.
Discovered : by Sir William Ramsay in London, and independently by P.T. Cleve and N.A. Langlet in Uppsala, Sweden in 1895.
Origin : The name is derived from the Greek ‘helios’,sun.
Description :A colourless, odourless gas that is totally unreactive. It is extracted from natural gas wells, some of which contain gas that is 7% helium. It is used in deep sea diving for balloons and, as liquid helium, for low temperature research. The Earth’s atmosphere contains 5 parts per million by volume, totalling 400 million tons, but it is not worth extracting it from this source at present.
Atomic No:2 MAss No:4
The ability of one liquid to mix with (dissolve in) another liquid.
Alpha (a) Particle
Helium ion with 2+ charge, an assembly of two protons and two neutrons.
Graham's Law
The rates of effusion of gases are inversely proportional to the square roots of their molecular weights or densities.
Forbidden Zone
A relatively large energy separation between an insulator's highest filled electron energy band and the next higher energy vacant band. Beginning in the fourth energy level, a set of seven degenerate orbitals per energy level, higher in energy than s, p, and d orbitals of the same energy level. |
Janey Lindau
Feet Trouble Data Base
Alleviating Fallen Arches
Flat Feet
A quarter of Americans have flat feet. While most people with flat feet don't have serious problems as a result, for some, flat feet can cause disabling foot pain as well as knee pain, shin splints, Achilles tendinitis, and plantar fasciitis. A person with foot or leg pain should pay particular attention to whether one foot is flatter than the other.
There are many different causes of flat feet, which can be separated into two main categories. The first category, congenital flat foot, is a condition that one is born with or is predisposed to at birth. This type includes the completely asymptomatic, pediatric flexible flat foot-by far the most common form of congenital flat foot. Flexible means that an arch is present until weight is put on the foot, at which time the arch disappears. This foot type is a result of the fact that all people are born with different physical features. Some people have bigger noses than others, just as some people have flatter feet (of course, there is no known correlation between the two). Any alteration in the many building blocks of the foot can influence its shape. At the other end of the spectrum, yet within the same category of congenital flat foot, exist several rare, more severe forms of flat foot. These severe conditions include Vertical Talus, Congenital Calcaneal Valgus, and Tarsal Coalitions - all of which are more rigid (no arch with or without weight on the foot) and definitely symptomatic. Luckily, these are much less common, but can usually be identified by specialists at the time of presentation and treated appropriately. The second category, acquired flat foot, develops over time, rather than at birth. Many different factors can contribute to the development of flat feet. These include the types of shoes a child wears, a child's sitting or sleeping positions, compensation for other abnormalities further up the leg, or more severe factors such as rupture of ligaments or tendons in the foot. Very commonly, the reason for flat feet is that the foot is compensating for a tight Achilles tendon. If the Achilles tendon is tight, then it causes the foot to point down, or to plantarflex (as occurs when stepping on the accelerator of your car). Even minimal amounts of plantarflexion can simulate a longer leg on that particular side, assuming that the other foot is in the normal position. The body therefore tries to compensate by pronating, or flattening out the arch, thereby making up for the perceived extra length on the affected side.
pes planus orthotics
Non Surgical Treatment
Treatment for flat feet and fallen arches depends on the severity and cause of the problem. If flat feet cause no pain or other difficulties, then treatment is probably not needed. In other cases, your doctor may suggest one or more of these treatments. Rest and ice to relieve pain and reduce swelling, stretching exercises, pain relief medications, such as nonsteroidal anti-inflammatories, physical therapy, orthotic devices, shoe modifications, braces, or casts, injected medications to reduce inflammation, such as corticosteroids. If pain or foot damage is severe, your doctor may recommend surgery.
Surgical Treatment
Flat Feet
|
Case Study: Linking dictionaries
Introduction: If you have two dictionaries in the same language or in different languages, they can be very complementary in that some dictionaries might have a lot of syntactic information, while others have more information about the meaning of words. Domain specific dictionaries contain specialist terminology. Linking a specialist dictionary with very specific terminology to a general dictionary for example can provide a fuller picture and thus improve the working of systems.
If researchers build systems for a company they will use an in-house dictionary with all of their terminology and link that to a general dictionary. Linking the two allows them build an effective system. This becomes very important in a cross lingual setting like a multi-national company if you have terminology in different languages.
The work of linking dictionaries is important in the realm of text analysis. It’s incredibly important when it comes to figuring out the meaning of text especially given the fact that a single word can have many different meanings and uses. Take lead the metal and lead the verb. How do you tell the difference in text given they are written the same? The thing about text disambiguation is that in order to do it effectively, you need to be able to use all of the words. By taking large chunks of text, particularly words that are fairly common, out of the mix, you are limiting the efficacy of the technology.
Researchers work with lexicographers and existing dictionary resources. Copyright becomes a big issue in this work. Dictionaries are copyright works the dictionary market is a commercial interest. Often researchers are limited in how much they can reuse dictionary data.
Key question: Are copyright issues impeding research in this field?
Key question: Whose rights should win out in this scenario?
Key question: Should a special case be made for researchers conducting not for profit research?
Brand names in dictionaries
There is an issue of trademarks in dictionaries. Say for example, Hoover and Google. These are both brand names and generic terms.
Researchers in Princeton have a very large dictionary called Wordnet. They have had angry letters from large corporations because they included things like brand names, names of pharmaceuticals, different drugs and so-forth. While these were clearly labelled as proper nouns and correctly defined and attributed to the company and so-on there was an issue that by virtue of the name being in an English dictionary, that made it an English word rather than a brand name. Trademark law dictates that you can’t use a generic word as a brand name. You can’t make a tractor and use a brand name Tractor for example.
The lead researcher in Wordnet took the decision to remove all of these terms. This is regrettable from a research point of view, but the legal risk is too big despite the fact that they weren’t breaking the law. Liability is also unclear and probably depends on the research contract itself.
Key question: Does excluding trademarks from this sort of research compromise it?
Key question: Whose rights should win out in this situation?
Key question: Should a special case be made for not for profit research?
Clarity of licensing
Key question: Combining to resources can be problematic because their licences, even if they’re open, may not be compatible. Can you put a non-commercial resource together with a share alike resource for example?
Leave a Reply
|
@article{astmh:/content/journals/10.4269/ajtmh.1970.19.620, author = "Knight, Wilda B. and Ritchie, Lawrence S. and Liard, Félix and Chiriboga, Jorge", title = "Cercariophagic Activity of Guppy Fish (Lebistes reticulatus) Detected by Cercariae Labeled with Radioselenium (75se)", journal= "The American Journal of Tropical Medicine and Hygiene", year = "1970", volume = "19", number = "4", pages = "620-625", doi = "https://doi.org/10.4269/ajtmh.1970.19.620", url = "http://www.ajtmh.org/content/journals/10.4269/ajtmh.1970.19.620", publisher = "The American Society of Tropical Medicine and Hygiene", issn = "0002-9637", type = "Journal Article", abstract = "Abstract Quantitative laboratory tests were made on the cercariophagic activity of guppy fish, Lebistes reticulatus, by feeding them cercariae of Schistosoma mansoni labeled with radioselenium. Separate counts of radioactivity of the intestine of fish compared with the head and body proper were relatively high, indicating ingestion of cercariae. Heavily gravid females, which apparently find cercariae unattractive, served as controls. Otherwise, all classes studied—juveniles, adults, males, and females—ate many cercariae. When the same number of cercariae were placed in varying amounts of water, it was found that uptake of radioselenium is inversely related to volume. With a constant volume and increasing numbers of cercariae, increasing radioactivity was found in fed guppies. Guppies became radioactive much more quickly if they received feedings of untreated cercariae before being fed radioactive cercariae. Light enhanced cercariophagic activity. It appears possible that guppies may be useful in the biological control of schistosomiasis.", } |
English Homework:
Strange Holidays
©1998 Gareth Pitchford
Imagine that you're going on holiday. You could be going somewhere in the UK or you could be going somewhere abroad. Choose a place to visit and write a list of all the things that you would need to take with you. Think carefully about your list. You have to imagine that you are in charge of the holiday so don't rely on your mum or dad to bring anything that you forget.
Now imagine that you are going on holiday in space. Your holiday destination is another planet! Use your previous list to help you write a new list of what you would need to take on a holiday in space. Are there any things that are on both lists?
Bring both your lists into school. If you have any spare time you could try writing a postcard from your holiday on another planet. |
Nongonococcal Urethritis
What Is It?
Nongonococcal urethritis (NGU) is a broad term describing used to describe an inflammation of the urethra. NGU is caused by the introduction of bacteria, not including gonorrhea. While NGU can be caused by several different microorganisms including Mycoplasma genitalium and adenovirus, the most common NGU-inducing pathogen is chlamydia.1
Who Is at Risk?
Both males and females are at risk for contracting NGU. While engaging in sexual intercourse, men experience urethral exposure to pathogens; however, females’ urethras rarely come into contact with germs during coitus. Since the infection is mostly transmitted through sexual contact, males are at a higher risk of contracting NGU.2
How Is It Transmitted?
The three most common ways of contracting NGU include unprotected oral, anal, and vaginal sex with an infected partner. Since pathogens can be exchanged between partners whether bodily fluids are shared or not, using protection, such as condoms, at all times during sexual contact is highly recommended. Aside from sexual transmission, NGU can develop from urinary tract infections, prostatitis, and possibly catheterization procedures (in which a narrow tube is inserted into the urethra). Additionally, NGU can bepassed from mother to baby through pathogens in the birth canal during childbirth. The transmission of pathogens to the baby can result in conjunctivitis (eye infections), ear infections, and pneumonia in the newborn. Getting tested for sexually transmitted infections (STIs) before giving birth can help ensure the safety of the child.3
What Are the Symptoms?
The symptoms of NGU differ in males and females, and may not even appear until 1 to 5 weeks after the infection is transmitted. Symptoms often presented in males include the following:
• White or clear discharge from the urethral opening
• Burning sensation while urinating
• Urge to urinate frequently
• Genital itching or irritation
• Dryness and flakiness on the head of the penis
Females are often asymptomatic (express no symptoms), making it difficult to determine whether or not a female is infected without getting regularly tested. When symptoms are present in women they include the following:
• Unusual vaginal discharge (often green or yellow)
• Burning sensation while urinating
• Urge to urinate frequently
• Abdominal pain or vaginal bleeding, aside from menstrual bleeding (indication that the disease has progressed to pelvic inflammatory disease)
In both males and females, anal infections can result in itching in the rectal area and pain while defecating.
Oral infections are usually asymptomatic (express no symptoms), but they may occasionally result in a sore throat.2,3
How Is It Treated?
If you a urethral infection becomes a concern, please see a health care provider. A doctor may take chlamydia and gonorrhea cultures to test for urethritis. If urethritis is present but the gonorrhea culture is negative, the infection may be an NGU.4 After receiving the diagnosis, the doctor may prescribe antibiotics. The most commonly prescribed antibiotics include azithromycin and doxycycline. It is important to finish the entire prescribed course of antibiotics course even if visible symptoms are no longer present. Abstain from intercourse until the infection subsides. If left untreated, NGU can cause further medical complications such as the following:
Seeing a doctor at the first sign of symptoms is an easy way to prevent further medical complications.3
How Can It be Prevented?
There are several preliminary measures that can be taken to avoid contracting NGU. Although the most effective method of prevention is to abstain from sexual contact, the following measures can also help prevent the contraction of NGU:
• Get tested for STIs frequently
• Use a latex condom during any kind of sexual contact
• Avoid sexual contact if undergoing (or if a partner is undergoing) current treatment for STIs
• Consult a doctor if any partners have been infected with NGU or STIs
• Inform any partners after coming into contact with the infection
• Try to limit the number of sexual partners
• Communicate with a partner about getting tested before engaging in sexual activity
Safe sex techniques can help stop the spread of STIs such as NGU.5
Why Is Communication with a Partner Important?
When dealing with a sexually transmitted infection (STI), it is important to openly communicate with sexual partners in order to prevent transmission. By informing partners of STIs, potential long term consequences may be avoided. For example, if a female contracts NGU which presents asymptomatically, she may fail to get the appropriate treatment and may eventually develop pelvic inflammatory disease (PID) because she was unaware that her partner was infected. Disclosing STIs to sexual partners can protect against preventable physical damage and may help both partners avoid uncomfortable conversations in the future.2
1. "Department of Health." Nongonococcal Urethritis (NSU, NGU). N.p., Nov. 2006. Web. 26 Jan. 2017.
2. "NGU." American Sexual Health Association. N.p., n.d. Web. 26 Jan. 2017.
3. "Nongonococcal Urethritis (NGU)." Nongonococcal Urethritis (NGU). Oregon Public Health, n.d. Web. 26 Jan. 2017.
4. "Nongonococcal Urethritis (NGU) in Men." Cleveland Clinic. N.p., n.d. Web. 26 Jan. 2017.
5. "NGU (Non-Gonococcal Urethritis) - Symptoms, Treatment | STD NGU." STD. FREEDOM Network, 19 Oct. 2016. Web. 26 Jan. 2017.
Last Updated: 19 January 2017. |
World History Objective - #38
Friday - 8 March 2019
Opener 8 Question
Write the following WHITE PRINTED ITEMS on your Objective Log.
Content: Describe why people were fearful of the future after World War One
Literacy: by completion of TWO assignments by the end of class.
After completing opener, the next step is to - |
Skip to content
• Research article
• Open Access
A genome-wide scan for genes under balancing selection in Drosophila melanogaster
• 1Email author,
• 1,
• 1,
• 1, 2,
• 1, 3 and
• 1
BMC Evolutionary BiologyBMC series – open, inclusive and trusted201717:15
• Received: 13 August 2016
• Accepted: 17 December 2016
• Published:
In the history of population genetics balancing selection has been considered as an important evolutionary force, yet until today little is known about its abundance and its effect on patterns of genetic diversity. Several well-known examples of balancing selection have been reported from humans, mice, plants, and parasites. However, only very few systematic studies have been carried out to detect genes under balancing selection. We performed a genome scan in Drosophila melanogaster to find signatures of balancing selection in a derived (European) and an ancestral (African) population. We screened a total of 34 genomes searching for regions of high genetic diversity and an excess of SNPs with intermediate frequency.
In total, we found 183 candidate genes: 141 in the European population and 45 in the African one, with only three genes shared between both populations. Most differences between both populations were observed on the X chromosome, though this might be partly due to false positives. Functionally, we find an overrepresentation of genes involved in neuronal development and circadian rhythm. Furthermore, some of the top genes we identified are involved in innate immunity.
Our results revealed evidence of genes under balancing selection in European and African populations. More candidate genes have been found in the European population. They are involved in several different functions.
• Balancing selection
• Genome scan
• Drosophila melanogaster
• Population genetics
In most species, a high level of genetic polymorphism has been observed, and the causes of this high diversity have been widely debated. Dobzhansky proposed the ‘balanced hypothesis’, which suggests that many genes are polymorphic and that these polymorphisms are maintained by heterozygote advantage [1]. However, systematic studies that have been carried out on various organisms have so far reported little evidence of balancing selection [28].
Balancing selection is characterized by an increased genetic diversity because it maintains alleles at intermediate frequencies within populations. It involves various mechanisms: besides heterozygote advantage (also called overdominant selection [9, 10]) frequency-dependent selection [11] and local adaptation in substructured populations [12] have been proposed.
One famous case of heterozygote advantage is the sickle cell hemoglobin polymorphism in humans, which is maintained in environments in which Plasmodium falciparum is endemic [13]. Furthermore, some antigen genes are under overdominant selection in P. falciparum [7]. Several examples of negative frequency-dependent selection are also known, as for instance in the Major Histocompatibility Complex (MHC) in vertebrates [1418] and in resistance genes (R-genes) in plants [1921]. Frequency-dependent selection may be linked to coevolution between hosts and pathogens and, more specifically, to the trench warfare scenario in which polymorphisms in the host and the pathogen may be maintained for a long time [21, 22]. In Drosophila, it has been suggested that immune genes might be evolving under this type of balancing selection due to host-parasite interactions [2325].
Most of the examples of balancing selection have been found in humans [4, 2628], bacteria [5, 7], mice [29] and plants [3032], and to a lesser extent in D. melanogaster (but see [3337]). Although limited in number, these examples seem to suggest that, in addition to immunity genes, genes under balancing selection are also involved in other functions, such as the ABO blood group in primates [38] or the S-locus (determining self-incompatibility) in plants [39].
The reason why our understanding of balancing selection is limited to relatively few loci may be mainly due to the difficulty associated with detecting this type of selection at the whole-genome level. However, with the new technologies to analyze large datasets and the availability of whole-genome sequence data with high densities of polymorphisms, it should be possible to identify signatures of balancing selection if they exist. Only a few of these examples were detected by systematic searches (i.e. whole genome scans). An exception presents the work by Andrés et al. [4] who analyzed 13,400 human genes using methods based on the HKA test [40] and the site-frequency-spectrum (SFS). They found 60 candidates genes under balancing selection in two human populations. Several Drosophila studies have also recently obtained encouraging results in this respect [8, 36, 37]. Based on whole-genome sequence data, it has been shown that some genes share non-synonymous polymorphisms between D. melanogaster and D. simulans [34]. Such trans-species polymorphisms are expected to occur in the case of ancient balancing selection [41, 42]. Furthermore, Comeron [35] used a background selection model to look for the spatial distribution of polymorphisms and substitutions around selective sites as well as the allele frequencies surrounding polymorphic sites. He also found some new candidate genes for balancing selection in D. melanogaster. Interestingly, these genes are not only related to immunity, but are involved in an array of biological processes such as sensory perception of chemical stimuli, olfactory behavior, and inter-male aggressive behavior. However, more analyses are needed to increase our knowledge about balancing selection.
In this study, we performed a systematic genome-wide scan to search for signatures of balancing selection in D. melanogaster. Following our preliminary work [8], we used next-generation-sequencing (NGS) data to identify targets of balancing selection in a derived (European) and an ancestral (African) population. We searched for evidence of balancing selection based on two criteria: high levels of polymorphism compared to neutral expectations and a distortion of the SFS toward intermediate frequencies. To ensure significance of our results we performed coalescent simulations using appropriate demographic models.
Sequence data
Full-genome sequences of D. melanogaster populations were taken from the Drosophila Population Genomics Project (DPGP) ( We used samples from an African and a derived European population whose demography has been reasonably well estimated [43]. The African samples consist of 22 lines from Rwanda including 20 lines from Gikongoro and two from Cyangugu [44]. The European samples consist of four lines from Lyon, France [44] and eight lines from Leiden, the Netherlands [45]. Full-genome sequences were generated by next-generation sequencing of haploid embryos as described in [46]. Consequently, all sequences are haploid, which should minimize the influence of mapping errors. All the lines used for the analysis (22 in Africa and 12 in Europe) were without admixture since in a previous analysis we tested for population substructure using sNMF [47] (A. Wollstein, unpublished results) and excluded these lines from subsequent analysis. This led to the removal of seven out of originally 27 lines from Gikongoro, four out of eight lines from Lyon and two out of 10 lines from Leiden. This procedure coincidentally also removed lines for which genomic blocks of identity-by-descent (IBD) had previously been described [44].
Statistical analyses
Basic population genetic parameters were estimated using the program VariScan [48]. This includes Watterson’s estimator θw [49] and Tajima’s D [50]. Similar to Andrés et al. [4], we used these statistics to search for evidence of balancing selection such as a high level of polymorphisms (θw) and an excess of polymorphisms at intermediate frequency (Tajima’s D). Even though these estimators are slightly different from the statistics used in Andrés et al. [4], they look for similar characteristics of balancing selection and are easily computed and simulated. We estimated these statistics for the whole genome and for each chromosome arm (X, 2L, 2R, 3L, 3R) for different window sizes (0.2, 0.5, 1, 2, and 5 kb) to optimize our analysis (see below).
To determine which window size is best, we simulated balancing selection with the software msms [51]. We performed coalescent simulations under the estimated demographic model (see below) for a neutral model and a selection model of heterozygote advantage. We set the selection coefficient for heterozygote advantage (s) to 0.1. The current effective population size N e was estimated from the demographic model as 1.09 × 106 in the European population and 1.62 × 106 in the African population. We used a recombination rate of 0.5 cM/Mb and set the start of selection to 2N e generations backward in time. We compared the distributions of the Tajima’s D and θw statistics for simulated data under neutrality and selection and determined the percentage of overlap between the two distributions for each window size (0.2, 0.5, 1, 2, and 5 kb). Windows that show smaller overlap between the distributions should have higher power to distinguish between selection and neutrality.
To conduct a test of balancing selection we estimated the parameters of the demographic null models of the European and African populations (A. Wollstein, unpublished results) based on expectations of the SFS at neutral sites [52]. The SFS for both populations were generated by extracting SNPs located at positions 8 – 30 within small introns (length ≤ 65 bp) as these sites are thought to behave closest to neutrality [53]. Demographic parameters were estimated for a model with instantaneous population size changes at varying time points. The demographic models that best fit the observed data were used for our analysis. The best-fit demographic models allow for a bottleneck in the European population and stepwise growth (with a shallow bottleneck) in the African population. Parameters were estimated for autosomal chromosomes and X chromosome separately as autosomes and sex chromosomes might have different demographic histories [54].
We ran 1000 coalescent simulations for each window of 1-kb across the full genome using ms [55] and for each coalescent simulation θw and Tajima’s D were estimated resulting in a neutral distribution of both statistics for each window across the genome. For each window local mutation rates were inferred based on divergence to D. sechellia [56, 57]. The local recombination rates were obtained using the D. melanogaster recombination rate calculator [58] based on the values of [59]. We then compared the observed values of Tajima’s D and θw for each window to the neutral distributions generated with simulations that take into account the demographic history.
Only those windows for which the observed values of both statistics fell within the upper 95th percentile of the simulations were kept as candidates. A p-value was estimated for each window for the θw and Tajima’s D statistics based on the proportion of simulations for which θw and Tajima’s D was greater than the observed value. When the p-value was equal to zero, we ran additional 10,000 coalescent simulations to obtain a more precise p-value. Benjamini-Hochberg multiple test correction [60] was applied to adjust the p-values. Windows with corrected p-values < 0.05 were retained as significant.
GO enrichment analysis
First, a list of genes located in candidate windows, which were significant after correction for multiple testing, was determined for the African and European populations as well as for candidate regions and genes shared between the two populations. Then a gene ontology (GO) enrichment analysis was applied to this list of genes in candidate windows using Cytoscape version 3.2.0 [61], in particular its plugin ClueGO version 2.2.5 ( and CluePedia version 1.2.5 [62, 63] ( We used Cohen’s Kappa score [64] of 0.7 as a threshold for the proportion of genes shared between enriched ontology and pathway terms to link the terms into GO networks [63] and networks of KEGG [65] and Reactome [66] metabolic pathways. Using ClueGO and CluePedia we integrated enriched GO and pathway terms into networks. Enrichments and depletions of single terms were calculated using a two-tailed hypergeometric test. We applied the false-discovery-rate (FDR) correction [60] and retained the enriched terms with a FDR-corrected p-value of less than 0.05 that contained at least three candidate genes, or those whose candidate genes represented at least 4% of the total number of genes related to the term. In addition, we used the option Fusion to group the related terms that have similar associated genes.
Genome scan
To detect signatures of balancing selection in the genome of D. melanogaster, two statistics were used: θw and Tajima’s D. Estimates of these two statistics were computed for windows covering the complete genome. To find an appropriate window size, we performed analyses for various lengths (0.2, 0.5, 1, 2, and 5 kb). Recombination might confine signals of selection to a narrow region. Consequently the analyzed window sizes should be limited. However, windows must also be large enough to contain a sufficient number of polymorphisms for obtaining reasonable estimates of both statistics. We found a window size of 1 kb to be appropriate (see below).
We generated empirical distributions of both statistics separately for each of the five major chromosomal arms. Windows in which the two statistics jointly fell into the upper 95th percentile of the distribution were considered as potential candidates of balancing selection. The proportion of windows on each chromosome identified as candidates differed depending on window size, such that the proportions generally decreased with increasing size (Fig. 1). This decrease may be explained by linked recurrent negative [67] or positive selection [68], which is more pronounced in the larger windows. For chromosome arm 2R and X the pattern was not as clear in the African population (Fig. 1). This may be explained by the higher average recombination rate on chromosome arm 2R and X compared to the other chromosome arms [59]. In the European population, we observed an increase for the X chromosome for 5 kb which could be due to the fact that the overall number of windows along the chromosome for 5 kb is low compared to smaller window sizes and consequently the proportion of candidate windows may be inflated purely due to variance. Overall, the proportion of windows we identified as candidates is rather low (<0.25% in Africa). This suggests that our approach may be conservative, which might be influenced by the fact that our two used summary statistics (θw and Tajima’s D) are numerically not independent.
Fig. 1
Fig. 1
Proportion of candidate windows as a function of window size (in bp) for each chromosome arm (2L, 2R, 3L, 3R and X) in the African and the European populations
In order to examine which window size has the highest power to detect balancing selection, we simulated sequence data under neutrality and balancing selection as described in Methods and compared the overlap between the distributions of neutral and selected Tajima’s D and θw values for different window sizes (Fig. 2). The amount of overlap is inversely related to the power. The more the two distributions overlap, the less ability we have to distinguish selected from putatively neutral regions. We observed for larger window sizes a larger overlap between the two distributions and thus a lower power to distinguish selection from neutrality. The overlap for the 1-kb window is slightly larger than for the 0.2- and 0.5-kb windows and smaller than for the 2- and 5-kb ones. Moreover, the largest difference in power is between 1 kb and 2 kb, which should make 1 kb a good choice. Our choice of window size for subsequent analysis was also influenced by the fact that in Fig. 2 we show perfectly simulated data whereas in our genome scan data may be missing such that the windows behave smaller than the corresponding simulated windows (on average around 10% of the data are missing). Therefore, we continued our analyses with the results obtained from the scan with a window size of 1 kb, even though smaller windows performed slightly better for simulated data.
Fig. 2
Fig. 2
Power analysis for different window sizes (in bp) for the two statistics θw and Tajima’s D for the African and European populations. The overlap between the distributions of simulations with and without selection is represented on the y-axis
We observed for the whole genome a mean θw averaged over all windows of 0.0088 in Africa and 0.0033 in Europe (Table 1). The diversity in the European populations of D. melanogaster is reduced on each chromosome arm compared to the African populations, which agrees with previous estimates [44]. Mean Tajima’s D is −0.5605 in Africa and −0.4111 in Europe for the whole genome. However, the X chromosome has a reduced Tajima’s D in Africa (Tajima’s D = −0.8979) compared to the autosomal chromosomes and, on the contrary, an elevated Tajima’s D in Europe (Tajima’s D = −0.2968). Finally, as previously noticed by Glinka et al. [69], the variance of Tajima’s D is much higher in Europe than in Africa (Table 1), which indicates that the European population has been undergoing a bottleneck.
Table 1
Statistical values for the mean of θW and Tajima’s D for each chromosome arm and population
Tajima's D
2 L
3 L
2 L
3 L
Candidate genes
Since the demographic history of a population can mimic selection (e.g. in the case of a bottleneck), we performed coalescent simulations under the demographic model that best fits the observed data for each population (A. Wollstein, unpublished results). Clearly, the demographic models that we estimated do not represent exactly the history of our populations. Indeed their history is likely more complex but the models fit the data sufficiently well to be used as a null model to reduce the number of false positives. Only windows significantly different from the overall patterns observed in the genome (taking into account the demographic history) are candidates. Then we searched for significantly elevated values of θw and Tajima’s D compared to the distributions obtained by the neutral coalescent simulations that included demography.
We detected 171 candidate windows (of 1 kb each) for the European population and 60 for the African population with significant signatures of balancing selection. Interestingly, in the European population 77 candidate windows are on the X chromosome whereas in the African population we detected only two candidate windows on this chromosome. Then, we identified the genes overlapping with our candidate windows. Occasionally, several genes (up to three for one window) overlapped with the same window. We observed 20 candidate windows in the European population with two genes present (and one with three genes), and eight windows in the African populations. In this case, it was difficult to identify the specific gene under balancing selection. We found 141 (Additional file 1: Table S1) and 45 (Additional file 1: Table S2) candidate genes in the European and African populations, respectively.
We investigated this discrepancy in the number of candidate genes between both populations. In the European population the candidate genes are much larger than in the African population (the average size of the genes is 27.5 kb in Europe and 11.3 kb in Africa). To understand this observation, we studied the genomic distributions of the candidate genes. The European genes are restricted to regions of intermediate to high recombination rates, in which variation is less suppressed by linked selection (discussed above). The 58 candidate genes on the X are distributed over about 20 Mb, whereas those on the autosome arms are located in narrower regions: 16 genes in about 9 Mb on 3R, 16 genes in 13.5 Mb on 3L, 28 genes in 15 Mb on 2R, and 23 genes in 12 Mb on 2L. This pattern may be explained to some extent by the higher average recombination rate on chromosome arm 2R and X compared to the other chromosome arms [59]. The excess of large genes on the X compared to the autosome arms, however, cannot be explained by recombination (“large” is defined somewhat arbitrarily as >10 kb, but other definitions lead to similar conclusions). While 8–10 genes on each autosomal arm are large, 35 are large on the X. This suggests that the excess of large genes on the X in the European population may be due to false positives, which by chance hit longer genes more often than shorter ones. Protein-coding genes generally tend to be longer on the X chromosome compared to autosomes (with average lengths of 8.2 kb vs. 6.1 kb). This may partly explain the observed size distribution between X and autosomes, but needs to be further discussed below.
The average size of the African candidate genes of 11.3 kb is also larger than the average gene length of D. melanogaster (which is 6.5 kb for protein-coding genes). This indicates that false positives may play a role in this dataset as well (although to a lesser extent, as only seven out of 45 genes are longer than 10 kb).
As mentioned before 43 genes in Europe and 16 genes in Africa are uncertain due to the fact that they are in the same candidate window. Three genes (fry, chm and CG42389) show signals of balancing selection in both populations (Table 2). However, these signals were detected in two different regions (windows) of the genes (see e.g. Fig. 3 for chm). Selection acting in both populations is characteristic for long-term balancing selection, which agrees with our expectation when selection predates the split of the two populations. On the other side, candidate genes with significant statistics only in one population have likely been under more recent balancing selection.
Table 2
List of the best candidate genes for the European and African populations with a p-value < 10−4 for θw and Tajima’s D
FBgn number
Gene name
Tajima's D
3 L
3 L
2 L
2 L
2 L
3 L
2 L
2 L
2 L
2 L
Fig. 3
Fig. 3
Map of the genes CG15818 and chm. In a, the green bar represents the region of interest in the African population and the red bar represents the region of interest in the European population. In the case of the African population, the region of interest is larger as two contiguous candidate windows are significant. The Tajima’s D (b) and θw (c) values are plotted for a 1-kb sliding window across the genes CG15818 and chm for both the European and African populations. Plot of θw for a 1-kb window across the gene CG15818 and chm for the European and African populations. The x-axis represents the position on the chromosome and the y-axis, the values of θw. Plot of Tajima\'s D for a 1-kb window across the gene CG15818 and chm for the European and African populations. The x-axis represents the position on the chromosome and the y-axis, the values of Tajima\'s D. Map of the genes CG15818 and chm. the green bar represents the region of interest in the African population and the red bar represents the region of interest in the European population
The number of candidate genes detected in the two populations is very different: 45 in the African population and 141 in the European population. The differences between both populations are even more striking on the X chromosome where we found 58 candidate genes (overlapping with 77 windows) in Europe and only one candidate gene (overlapping with two windows) in Africa. In converse, this would mean that on the autosomes the total numbers are relatively similar: 44 in Africa and 83 in Europe. The disparity in the number of candidate genes between populations is unlikely strongly influenced by differences in statistical power as the proportion of overlap between simulated selected and neutral data in Africa for a 1-kb window is not much different from Europe (Fig. 2). However, in Africa the proportion of overlap is slightly higher, which might indicate a lower power than in Europe. Many genes significant in Europe show high values of Tajima’s D and θw in Africa as well but they do not reach statistical significance in this population. In Europe, all the significant windows where we found our candidate genes have also significant θw values in Africa, but their Tajima’s D values are not significant. In the African population, we observed 13 genes (same windows in Africa and Europe) with a Tajima’s D > 0 (p-values are going from 0.24 to 0.82) for the X chromosome and 18 candidate genes with a Tajima’s D > 0.5 (p-values = 1) for the autosomal chromosomes.
To summarize, taking into account possible false positives the number of candidate genes on the X (without the excess of large genes) converges toward the numbers of candidate genes on the autosome arms in the European population. This is particularly the case for chromosome arm 2R. Furthermore, the overall number of candidate genes in the European population is no longer much greater than that of the African population and the numbers on the autosomes of both populations are more similar than reported above. On the other hand, the African X and the European X still differ greatly in the number of candidate genes, which might be due to an increase of false positives on the European X (discussed below).
GO terms
A GO analysis was performed on significant genes to determine the groups of terms enriched for both the European and the African populations. Groups are based on GO hierarchy or on the kappa score [64], which is based on the overlapping genes (within categories). The name of the group is determined by the most significant term of the group. The European population is enriched for many terms, 41 biological function categories are enriched and are grouped in eight terms (see Additional file 1: Table S3). We observed three groups with many GO terms and consequently have a high number of genes including shared genes between several GO terms (Additional file 1: Table S3). Additionally, we observed three GO terms enriched within the molecular process and cellular component categories each (Additional file 1: Table S4). Finally, eight pathways from the KEGG [65] and Reactome [66] databases were enriched for candidate genes (Additional file 1: Table S4). However, since half of the European candidate genes are located on the X chromosome and there is evidence that these genes may contain an increased number of false positives we repeated our GO analysis with autosomal genes only. With this reduced dataset we only found four enriched GO terms under biological process (mushroom body development, regulation of circadian sleep/wake cycle, organophosphate metabolic process and nucleotide metabolic process) and transcription cofactor activity under molecular process. All five of these terms were also significant in the original analysis. Analyzing the complete African candidate gene set we found only two GO terms enriched (aspartic-type endopeptidase activity and surfactant metabolism) for all categories. However, this result might be an artifact since the three genes enriched for these terms (CG31928, CG31926 and CG33128) are physically adjacent, which might explain why they collectively show a signal of balancing selection.
Then we examined in greater detail the more extreme candidate genes (p-value < 10−4 for θw and Tajima’s D after multiple testing corrections). In the European population, we found 17 genes (Table 2), which include genes involved in different functions such as circadian rhythm (unc80), cell migration (klar), neuronal development (lea and Ten-a), neurogenesis and memory (Tomosyn), and chemical synaptic transmission (VGlut). We also found genes related to immunity (Nox, nub and tlk) or involved in phagocytosis (mv and CHES-1-like). The genes cd and Nup133 are located in the same genomic region; cd is involved in several processes including response to oxidative stress, while Nup133 is involved in nucleocytoplasmic transporter activity. Interestingly, there is evidence that Nup133 may also have undergone recurrent adaptive evolution in D. simulans and D. melanogaster [70]. Candidate genes with unknown functions have been also found (CG2157, CG1637, CG1657 and CG15744). Concerning the African population, 9 genes (Table 2) are highly significant (p-values < 10−4). However, the genes primo-1 and primo-2 are located in the same region. Their proteins have the same function. The genes CG15818 and chm are also localized in the same region with two significant windows adjacent. The gene chm is involved in 15 biological processes such as neuron differentiation, development (larvae, pupal and wing), histone acetylation and regulation of metabolic processes. The gene Cyp6a18 has an oxidoreductase activity. However, the function of the other genes remains unknown. Moreover, two of the best candidate genes (chm and CG42389) in Rwanda are also significant in Europe (Table 3). In addition, the gene fry is also shared by the two populations.
Table 3
List of candidate genes shared by the African and European populations and the values of the significant statistics observed (p-value < 0.05) for θw and Tajima’s D
FBgn number
Gene name
Tajima's D
3 L
0.0051 (0.0121)
2.1338 (<10−4)
0.0103 (<10−4)
1.8448 (0.0219)
2 L
0.0042 (0.0285)
2.2383 (0.0231)
0.008 (<10−4)
2.5511 (<10−4)
2 L
0.0025 (0.0469)
2.3025 (<10−4)
0.0202 (<10−4)
1.1303 (<10−4)
The p-values of the statistics are indicated in the parentheses
Some recent studies have found new examples of genes under balancing selection in D. melanogaster. For instance, Sato et al. [37] detected balancing selection in core promoter regions. Unckless et al. [36] found evidence of alleles maintained by balancing selection in genes encoding antimicrobial peptides. Nonetheless, examples of genes under balancing selection in D. melanogaster are still scarce, and no genome-wide analysis for balancing selection has been done in this species with the exception of our own previous preliminary work [8]. Based on the availability of a wealth of NGS data we approached the difficulties of detecting balancing selection in the genome using two common statistics (high genetic diversity and intermediate-frequency polymorphism), without specifying a certain type of balancing selection. These two features are characteristics of balancing selection and cannot be confounded by other types of selection such as purifying and positive directional selection. Furthermore, we accounted for demography in our methods. Thus we followed a similar approach as Andrés et al. [4] rather than using a model-based method, such as DeGiorgio et al. [71].
In total, we found 183 candidate genes: 141 in the European population and 45 in the African one, with only three genes overlapping between both populations. This overlap is much smaller than found in humans between a Europe-derived and an Africa-derived population [4], which may be explained by the much longer separation time (in generations) between the two fly populations. However, even if the p-values are not significant, we observed many genes with high estimates of θw and Tajima’s D shared between both populations. The small overlap of significant genes might therefore be due to our statistical approach being conservative.
Although we fitted demographic models to the data for both the African and European populations, we found evidence for false positives in our set of candidate genes. More false positives appear to be present in the European set of candidate genes (in particular on the X chromosome). Inaccuracies in the estimation of demographic parameters may be the primary reason for this problem. We estimated demography for the X and the autosomes separately, based on the SFS at neutral sites [52, 53]. Since the European X chromosome harbors the lowest amount of variability the estimated demography might have been less precise for the European X compared to the European autosomes and the African X and autosomes, leading to an elevation of false positives.
The discrepancy between the X chromosomes of both populations is particularly large. We observed only one candidate gene on the African X, but 20–30 on the European one (after correcting for the excess of large genes). As mentioned above, all significant windows on the X where we found our candidate genes in Europe have also significant θw values in Africa, but their Tajima’s D values are not significant. The reason for this may be as follows. As already Glinka et al. [69] noticed, the variance of the European X is higher than that under standard neutrality, and lower in Africa (see also Table 1). Therefore, scaling Tajima’s D with the standard neutral variance may have led to too many candidates in Europe and/or too few in Africa.
Concerning the functions of genes, we observed enrichment in many biological processes in the European population. When we repeated the analysis for autosomal genes only, we were, however, only left with five GO terms. This reduction might be because of an overrepresentation of certain functions on the X chromosome, but could also be purely due to reduced statistical power given the lower number of genes in the autosomal dataset. GO terms that were consistently detected include ones related to circadian behavior and the development of mushroom bodies. Mushroom bodies play a major role in olfactory learning and memory, but have also been shown to be involved in other behavioral traits and the regulation of sleep [72, 73]. Even though these GO terms seem to be closely related their statistical significance is driven by different sets of genes (Additional file 1: Table S3). Candidate genes related to neuronal development and behavior are particularly interesting, as evidence of balancing selection in genes associated with neuromuscular junction development and behavior [35] has previously been reported. For the African population, only two GO terms are enriched and the three corresponding genes lie in the same genomic region.
Andrés et al. [4] performed a genome-wide analysis to detect balancing selection in humans using a similar method. They found a relatively high number of candidate genes related to immunity. Indeed, genes involved in immune defense are assumed to often evolve under balancing selection. However, we did not find an enrichment of genes involved in immunity. Only a few candidate genes of our scan are involved in immunity, such as Ser and tlk genes in Europe and Dif gene in Africa. However, we detected four genes involved in wound healing (Cad96Ca, Fhos, Rok and Hml) in Europe. Even if the majority of our candidate genes seem to be involved in other functions, they could also play a role during an infection. It has been shown that the immune system is linked to circadian rhythms [74]. Clock genes may be involved in the fight against bacterial invasion [75, 76]. For example, the ortholog of our candidate gene cry has been shown to up-regulate pro-inflammatory cytokine gene expression during an infection in mice [77]. Moreover, an enrichment of genes involved in extracellular matrix interaction (Additional file 1: Table S4) has been found. Andrés et al. [4] also detected candidate genes involved in the extracellular matrix. Concerning the examples found previously in D. melanogaster [3537], we did not confirm any of these examples although we observed some genes with similar functions such as oxidation-reduction process and olfactory behavior. Furthermore, Comeron et al. [35] found a P450 gene (Cyp6a16) as candidate gene for balancing selection, which was also detected in our search. The fact that we did not find overlap with other studies might be explained by the difference in the methods [35] and the samples, which are not exactly the same. Moreover, in the studies [36] and [37], the authors look for balancing selection only in a small part of the genome of D. melanogaster. We also find little overlap when we compare the results to our earlier study [8]: only one gene (CG18208) is shared for the African candidate genes. This discrepancy might again be explained by our different methodology and different dataset. In our previous study, we preselected windows in which the observed θw and Tajima’s D values jointly fell within the 95th percentile of the empirical distribution for each chromosome. Consequently, many candidate windows were removed. Moreover, in our current study we performed rigorous multiple testing correction, which led to many overlapping genes losing significance after correction.
We found 17 extreme genes (p-value < 10−4 for θw and Tajima’s D) in the European population and 9 in the African population. Among these genes, some are related to immunity. The gene tlk has been reported to be involved in the humoral immune response [78]. The gene Nox has a role in both regulation of the gut microbiota and resistance to infection by inducing the generation of reactive oxygen species [79]. The gene nub is a negative regulator of antimicrobial peptide biosynthesis. It represses the expression of NF-κB-dependent immune genes and increases the tolerance to gut microbiota [80]. The gene CHES-1-like is required for phagocytosis of the fungal pathogen Candida olbicans [81]. CG15818 has been shown to be down-regulated in flies infected by the Nora virus [82]. The gene Cyp6a18 may play a role in the metabolism of insect hormones and in the resistance to insecticides. Concerning the other genes, some are involved in neural function. The gene Ten-a is involved in neuronal development and also in the establishment of neuron connectivity [83]. The gene Tomosyn plays a role in the regulation of behavioral plasticity and memory [84] and VGlut is involved in neuromuscular junctions. The genes primo-1 and primo-2 have both a function in dephosphorylation and play a role in different functions such as neurogenesis [85]. Finally, chm enhances JNK signaling during metamorphosis and thorax closure and acts positively in the JNK-dependent apoptotic pathway [86]. This gene is also required for the maintenance of Hox gene silencing by PolyComb group proteins [87]. It is interesting that many genes have a role in the nervous system, which is known to be connected to immunity in insects [88]. While many examples of balancing selection have been found in immune genes, genes involved in other functions might be under this type of selection due to temporal changes in the environment like fluctuations between seasons [89].
Thus, of the extreme genes, many seem to be related to immunity or to neuronal function. Of course, it will be interesting to examine these genes in more detail. In addition to our analysis, it would be informative to combine our summary statistics with other estimators, such as linkage disequilibrium to detect evidence for recent balancing selection, and species comparisons to find trans-species polymorphism as signatures of ancient balancing selection.
We identified candidate genes under balancing selection in two populations of D. melanogaster: 141 in the European population and 45 in the African one. The difference between both populations is mainly due to an excess of candidate genes on the European X chromosome, which is likely due to false positives. Correcting for this effect reduces the difference between both populations considerably. Among the candidate genes detected in the European population there is an overrepresentation of genes involved in neuronal development and circadian rhythm. Other genes are involved in immunity including the top candidates. These top genes are also involved in behavioral plasticity, memory, neuromuscular junctions or neurogenesis.
False-discovery rate
Gene ontology
Major histocompatibility complex
Next-generation sequencing
Site frequency spectrum
Single nucleotide polymorphism
We would like to thank three anonymous reviewers and the editor Ryan Gutenkunst for very helpful suggestions on our paper.
This work was supported by the DFG Priority Program 1399 (grant HU 1776/1-2 to SH and WS).
Authors’ contributions
MC, WS, SH, AW, DZ, and VB wrote the manuscript. MC analyzed the data. DZ and AW estimated the demographic history. VB and MC did the GO analysis. All authors have read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Consent for publication
Not applicable.
Ethics approvals and consent to participate
Not applicable.
Authors’ Affiliations
Section of Evolutionary Biology, Department of Biology II, University of Munich (LMU), Grosshaderner Str. 2, 82152 Planegg-Martinsried, Germany
Center of Food and Life Sciences Weihenstephan, Technische Universität München, 85354 Freising, Germany
Natural History Museum Berlin, 10115 Berlin, Germany
1. Dobzhansky T. A review of some fundamental concepts and problems of population genetics. Cold Spring Harb Symp Quant Biol. 1955;20:1–15.View ArticlePubMedGoogle Scholar
2. Soejima M, Tachida H, Tsuneoka M, Takenaka O, Kimura H, Koda Y. Nucleotide sequence analyses of human complement 6 (C6) gene suggest balancing selection. Ann Hum Genet. 2005;69(Pt 3):239–52.View ArticlePubMedGoogle Scholar
3. Grigorova M, Rull K, Laan M. Haplotype structure of FSHB, the beta-subunit gene for fertility-associated follicle-stimulating hormone: possible influence of balancing selection. Ann Hum Genet. 2007;71(Pt 1):18–28.View ArticlePubMedPubMed CentralGoogle Scholar
4. Andrés AM, Hubisz MJ, Indap A, Torgerson DG, Degenhardt JD, Boyko AR, Gutenkunst RN, White TJ, Green ED, Bustamante CD, et al. Targets of balancing selection in the human genome. Mol Biol Evol. 2009;26(12):2755–64.View ArticlePubMedPubMed CentralGoogle Scholar
5. Thomas JC, Godfrey PA, Feldgarden M, Robinson DA. Candidate targets of balancing selection in the genome of Staphylococcus aureus. Mol Biol Evol. 2012;29(4):1175–86.View ArticlePubMedGoogle Scholar
6. Zhang XH, Dai ZX, Zhang GH, Han JB, Zheng YT. Molecular characterization, balancing selection, and genomic organization of the tree shrew (Tupaia belangeri) MHC class I gene. Gene. 2013;522(2):147–55.View ArticlePubMedGoogle Scholar
7. Amambua-Ngwa A, Tetteh KK, Manske M, Gomez-Escobar N, Stewart LB, Deerhake ME, Cheeseman IH, Newbold CI, Holder AA, Knuepfer E, et al. Population genomic scan for candidate signatures of balancing selection to guide antigen characterization in malaria parasites. PLoS Genet. 2012;8(11):e1002992.View ArticlePubMedPubMed CentralGoogle Scholar
8. Croze M, Zivkovic D, Stephan W, Hutter S. Balancing selection on immunity genes: review of the current literature and new analysis in Drosophila melanogaster. Zoology. 2016;119:322–9.View ArticlePubMedGoogle Scholar
9. Bamshad M, Wooding SP. Signatures of natural selection in the human genome. Nat Rev Genet. 2003;4(2):99–111.View ArticlePubMedGoogle Scholar
10. Hedrick PW. What is the evidence for heterozygote advantage selection? Trends Ecol Evol. 2012;27(12):698–704.View ArticlePubMedGoogle Scholar
11. Charlesworth D, Awadalla P. Flowering plant self-incompatibility: the molecular population genetics of Brassica S-loci. Heredity. 1998;81(Pt 1):1–9.View ArticlePubMedGoogle Scholar
12. Charlesworth D. Balancing selection and its effects on sequences in nearby genome regions. PLoS Genet. 2006;2(4):e64.View ArticlePubMedPubMed CentralGoogle Scholar
13. Hedrick PW. Population genetics of malaria resistance in humans. Heredity. 2011;107(4):283–304.View ArticlePubMedPubMed CentralGoogle Scholar
14. Klein J. Origin of major histocompatibility complex polymorphism: the trans-species hypothesis. Hum Immunol. 1987;19(3):155–62.View ArticlePubMedGoogle Scholar
15. Takahata N, Nei M. Allelic genealogy under overdominant and frequency-dependent selection and polymorphism of major histocompatibility complex loci. Genetics. 1990;124(4):967–78.PubMedPubMed CentralGoogle Scholar
16. Cutrera AP, Lacey EA. Trans-species polymorphism and evidence of selection on class II MHC loci in tuco-tucos (Rodentia: Ctenomyidae). Immunogenetics. 2007;59(12):937–48.View ArticlePubMedGoogle Scholar
17. Eizaguirre C, Lenz TL, Kalbe M, Milinski M. Rapid and adaptive evolution of MHC genes under parasite selection in experimental vertebrate populations. Nat Commun. 2012;3:621.View ArticlePubMedPubMed CentralGoogle Scholar
18. Sutton JT, Robertson BC, Grueber CE, Stanton JA, Jamieson IG. Characterization of MHC class II B polymorphism in bottlenecked New Zealand saddlebacks reveals low levels of genetic diversity. Immunogenetics. 2013;65(8):619–33.View ArticlePubMedGoogle Scholar
19. Stahl EA, Dwyer G, Mauricio R, Kreitman M, Bergelson J. Dynamics of disease resistance polymorphism at the Rpm1 locus of Arabidopsis. Nature. 1999;400(6745):667–71.View ArticlePubMedGoogle Scholar
20. Schierup MH, Mikkelsen AM, Hein J. Recombination, balancing selection and phylogenies in MHC and self-incompatibility genes. Genetics. 2001;159(4):1833–44.PubMedPubMed CentralGoogle Scholar
21. Rose LE, Grzeskowiak L, Hörger AC, Groth M, Stephan W. Targets of selection in a disease resistance network in wild tomatoes. Mol Plant Pathol. 2011;12(9):921–7.View ArticlePubMedGoogle Scholar
22. Ebert D. Host-parasite coevolution: insights from the daphnia-parasite model system. Curr Opin Microbiol. 2008;11(3):290–301.View ArticlePubMedGoogle Scholar
23. Tellier A, Moreno-Gamez S, Stephan W. Speed of adaptation and genomic footprints of host-parasite coevolution under arms race and trench warfare dynamics. Evolution. 2014;68(8):2211–24.PubMedGoogle Scholar
24. Lazzaro BP. Natural selection on the Drosophila antimicrobial immune system. Curr Opin Microbiol. 2008;11(3):284–9.View ArticlePubMedPubMed CentralGoogle Scholar
25. Obbard DJ, Welch JJ, Kim KW, Jiggins FM. Quantifying adaptive evolution in the Drosophila immune system. PLoS Genet. 2009;5(10):e1000698.View ArticlePubMedPubMed CentralGoogle Scholar
26. Asthana S, Schmidt S, Sunyaev S. A limited role for balancing selection. Trends Genet. 2005;21(1):30–2.View ArticlePubMedGoogle Scholar
27. Bubb KL, Bovee D, Buckley D, Haugen E, Kibukawa M, Paddock M, Palmieri A, Subramanian S, Zhou Y, Kaul R, et al. Scan of human genome reveals no new loci under ancient balancing selection. Genetics. 2006;173(4):2165–77.View ArticlePubMedPubMed CentralGoogle Scholar
28. Leffler EM, Gao Z, Pfeifer S, Segurel L, Auton A, Venn O, Bowden R, Bontrop R, Wall JD, Sella G, et al. Multiple instances of ancient balancing selection shared between humans and chimpanzees. Science. 2013;339(6127):1578–82.View ArticlePubMedPubMed CentralGoogle Scholar
29. Linnenbrink M, Johnsen JM, Montero I, Brzezinski CR, Harr B, Baines JF. Long-term balancing selection at the blood group-related gene B4galnt2 in the genus Mus (Rodentia; Muridae). Mol Biol Evol. 2011;28(11):2999–3003.View ArticlePubMedPubMed CentralGoogle Scholar
30. Tian D, Araki H, Stahl E, Bergelson J, Kreitman M. Signature of balancing selection in Arabidopsis. Proc Natl Acad Sci U S A. 2002;99(17):11525–30.View ArticlePubMedPubMed CentralGoogle Scholar
31. Bakker EG, Toomajian C, Kreitman M, Bergelson J. A genome-wide survey of R gene polymorphisms in Arabidopsis. Plant Cell. 2006;18(8):1803–18.View ArticlePubMedPubMed CentralGoogle Scholar
32. Hörger AC, Ilyas M, Stephan W, Tellier A, van der Hoorn RA, Rose LE. Balancing selection at the tomato RCR3 Guardee gene family maintains variation in strength of pathogen defense. PLoS Genet. 2012;8(7):e1002813.View ArticlePubMedPubMed CentralGoogle Scholar
33. Juneja P, Lazzaro BP. Haplotype structure and expression divergence at the Drosophila cellular immune gene eater. Mol Biol Evol. 2010;27(10):2284–99.View ArticlePubMedPubMed CentralGoogle Scholar
34. Langley CH, Stevens K, Cardeno C, Lee YC, Schrider DR, Pool JE, Langley SA, Suarez C, Corbett-Detig RB, Kolaczkowski B, et al. Genomic variation in natural populations of Drosophila melanogaster. Genetics. 2012;192(2):533–98.View ArticlePubMedPubMed CentralGoogle Scholar
35. Comeron JM. Background selection as baseline for nucleotide variation across the Drosophila genome. PLoS Genet. 2014;10(6):e1004434.View ArticlePubMedPubMed CentralGoogle Scholar
36. Unckless RL, Howick VM, Lazzaro BP. Convergent balancing selection on an antimicrobial Peptide in Drosophila. Curr Biol. 2016;26(2):257–62.View ArticlePubMedGoogle Scholar
37. Sato MP, Makino T, Kawata M. Natural selection in a population of Drosophila melanogaster explained by changes in gene expression caused by sequence variation in core promoter regions. BMC Evol Biol. 2016;16:35.View ArticlePubMedPubMed CentralGoogle Scholar
38. Segurel L, Thompson EE, Flutre T, Lovstad J, Venkat A, Margulis SW, Moyse J, Ross S, Gamble K, Sella G, et al. The ABO blood group is a trans-species polymorphism in primates. Proc Natl Acad Sci U S A. 2012;109(45):18493–8.View ArticlePubMedPubMed CentralGoogle Scholar
39. Roux C, Pauwels M, Ruggiero MV, Charlesworth D, Castric V, Vekemans X. Recent and ancient signature of balancing selection around the S-locus in Arabidopsis halleri and A. lyrata. Mol Biol Evol. 2013;30(2):435–47.View ArticlePubMedGoogle Scholar
40. Hudson RR, Kreitman M, Aguade M. A test of neutral molecular evolution based on nucleotide data. Genetics. 1987;116:153–9.PubMedPubMed CentralGoogle Scholar
41. Figueroa F, Gunther E, Klein J. MHC polymorphism pre-dating speciation. Nature. 1988;335(6187):265–7.View ArticlePubMedGoogle Scholar
42. Wiuf C, Zhao K, Innan H, Nordborg M. The probability and chromosomal extent of trans-specific polymorphism. Genetics. 2004;168(4):2363–72.View ArticlePubMedPubMed CentralGoogle Scholar
43. Stephan W, Li H. The recent demographic and adaptive history of Drosophila melanogaster. Heredity. 2007;98(2):65–8.View ArticlePubMedGoogle Scholar
44. Pool JE, Corbett-Detig RB, Sugino RP, Stevens KA, Cardeno CM, Crepeau MW, Duchen P, Emerson JJ, Saelao P, Begun DJ, et al. Population genomics of sub-Saharan drosophila melanogaster: African diversity and non-African admixture. PLoS Genet. 2012;8(12):e1003080.View ArticlePubMedPubMed CentralGoogle Scholar
45. Voigt S, Laurent S, Litovchenko M, Stephan W. Positive selection at the polyhomeotic locus led to decreased thermosensitivity of gene expression in temperate Drosophila melanogaster. Genetics. 2015;200(2):591–9.View ArticlePubMedPubMed CentralGoogle Scholar
46. Langley CH, Crepeau M, Cardeno C, Corbett-Detig R, Stevens K. Circumventing heterozygosity: sequencing the amplified genome of a single haploid Drosophila melanogaster embryo. Genetics. 2011;188(2):239–46.View ArticlePubMedPubMed CentralGoogle Scholar
47. Frichot E, Mathieu F, Trouillon T, Bouchard G, François O. Fast and efficient estimation of individual ancestry coefficients. Genetics. 2014;196(4):973–83.View ArticlePubMedPubMed CentralGoogle Scholar
48. Hutter S, Vilella AJ, Rozas J. Genome-wide DNA polymorphism analyses using VariScan. BMC Bioinformatics. 2006;7:409.View ArticlePubMedPubMed CentralGoogle Scholar
49. Watterson GA. On the number of segregating sites in genetical models without recombination. Theor Popul Biol. 1975;7(2):256–76.View ArticlePubMedGoogle Scholar
50. Tajima F. Statistical method for testing the neutral mutation hypothesis by DNA polymorphism. Genetics. 1989;123(3):585–95.PubMedPubMed CentralGoogle Scholar
51. Ewing G, Hermisson J. MSMS: a coalescent simulation program including recombination, demographic structure and selection at a single locus. Bioinformatics. 2010;26(16):2064–5.View ArticlePubMedPubMed CentralGoogle Scholar
52. Zivkovic D, Stephan W. Analytical results on the neutral non-equilibrium allele frequency spectrum based on diffusion theory. Theor Popul Biol. 2011;79:184–91.View ArticlePubMedGoogle Scholar
53. Parsch J, Novozhilov S, Saminadin-Peter SS, Wong KM, Andolfatto P. On the utility of short intron sequences as a reference for the detection of positive and negative selection in Drosophila. Mol Biol Evol. 2010;27(6):1226–34.View ArticlePubMedPubMed CentralGoogle Scholar
54. Hutter S, Li H, Beisswanger S, De Lorenzo D, Stephan W. Distinctly different sex ratios in African and European populations of Drosophila melanogaster inferred from chromosome-wide SNP data. Genetics. 2007;177:469–80.View ArticlePubMedPubMed CentralGoogle Scholar
55. Hudson RR. Generating samples under a Wright-Fisher neutral model of genetic variation. Bioinformatics. 2002;18(2):337–8.View ArticlePubMedGoogle Scholar
56. Li YJ, Satta Y, Takahata N. Paleo-demography of the Drosophila melanogaster subgroup: application of the maximum likelihood method. Genes Genet Syst. 1999;74(4):117–27.View ArticlePubMedGoogle Scholar
57. Kim Y, Stephan W. Detecting a local signature of genetic hitchhiking along a recombining chromosome. Genetics. 2002;160(2):765–77.PubMedPubMed CentralGoogle Scholar
58. Fiston-Lavier AS, Singh ND, Lipatov M, Petrov DA. Drosophila melanogaster recombination rate calculator. Gene. 2010;463(1–2):18–20.View ArticlePubMedGoogle Scholar
59. Comeron JM, Ratnappan R, Bailin S. The many landscapes of recombination in Drosophila melanogaster. PLoS Genet. 2012;8(10):e1002905.View ArticlePubMedPubMed CentralGoogle Scholar
62. Bindea G, Galon J, Mlecnik B. CluePedia Cytoscape plugin: pathway insights using integrated experimental and in silico data. Bioinformatics. 2013;29(5):661–3.View ArticlePubMedPubMed CentralGoogle Scholar
63. Bindea G, Mlecnik B, Hackl H, Charoentong P, Tosolini M, Kirilovsky A, Fridman WH, Pages F, Trajanoski Z, Galon J. ClueGO: a Cytoscape plug-in to decipher functionally grouped gene ontology and pathway annotation networks. Bioinformatics. 2009;25(8):1091–3.View ArticlePubMedPubMed CentralGoogle Scholar
64. Cohen J. Weighted kappa: nominal scale agreement with provision for scaled disagreement or partial credit. Psychol Bull. 1968;70(4):213–20.View ArticlePubMedGoogle Scholar
66. Croft D, O’Kelly G, Wu G, Haw R, Gillespie M, Matthews L, Caudy M, Garapati P, Gopinath G, Jassal B, et al. Reactome: a database of reactions, pathways and biological processes. Nucleic Acids Res. 2011;39(Database issue):D691–697.View ArticlePubMedGoogle Scholar
67. Charlesworth B, Morgan MT, Charlesworth D. The effect of deleterious mutations on neutral molecular variation. Genetics. 1993;134:1289–303.PubMedPubMed CentralGoogle Scholar
68. Stephan W. An improved method for estimating the rate of fixation of favorable mutations based on DNA polymorphism data. Mol Biol Evol. 1995;12:959–62.PubMedGoogle Scholar
69. Glinka S, Ometto L, Mousset S, Stephan W, De Lorenzo D. Demography and natural selection have shaped genetic variation in Drosophila melanogaster: a multi-locus approach. Genetics. 2003;165(3):1269–78.PubMedPubMed CentralGoogle Scholar
70. Presgraves D, Stephan W. Pervasive adaptive evolution among interactors of the drosophila hybrid inviability gene, Nup96. Mol Biol Evol. 2007;24(1):306–14.View ArticlePubMedGoogle Scholar
71. DeGiorgio M, Lohmueller KE, Nielsen R. A model-based approach for identifying signatures of ancient balancing selection in genetic data. PLoS Genet. 2014;10:e100456.View ArticleGoogle Scholar
72. Heisenberg M. Mushroom body memoir: from maps to models. Nat Rev Neurosci. 2003;4(4):266–75.View ArticlePubMedGoogle Scholar
73. Joiner WJ, Crocker A, White BH, Sehgal A. Sleep in Drosophila is regulated by adult mushroom bodies. Nature. 2006;441(7094):757–60.View ArticlePubMedGoogle Scholar
74. Tsoumtsa LL, Torre C, Ghigo E. Circadian control of antibacterial immunity: findings from animal models. Front Cell Infect Microbiol. 2016;6:54.View ArticlePubMedPubMed CentralGoogle Scholar
75. Shirasu-Hiza MM, Dionne MS, Pham LN, Ayres JS, Schneider DS. Interactions between circadian rhythm and immunity in Drosophila melanogaster. Curr Biol. 2007;17(10):R353–355.View ArticlePubMedGoogle Scholar
76. Lee JE, Edery I. Circadian regulation in the ability of Drosophila to combat pathogenic infections. Curr Biol. 2008;18(3):195–9.View ArticlePubMedPubMed CentralGoogle Scholar
77. Narasimamurthy R, Hatori M, Nayak SK, Liu F, Panda S, Verma IM. Circadian clock protein cryptochrome regulates the expression of proinflammatory cytokines. Proc Natl Acad Sci U S A. 2012;109(31):12662–7.View ArticlePubMedPubMed CentralGoogle Scholar
78. Kleino A, Valanne S, Ulvila J, Kallio J, Myllymaki H, Enwald H, Stoven S, Poidevin M, Ueda R, Hultmark D, et al. Inhibitor of apoptosis 2 and TAK1-binding protein are components of the Drosophila Imd pathway. EMBO J. 2005;24(19):3423–34.View ArticlePubMedPubMed CentralGoogle Scholar
79. Buchon N, Silverman N, Cherry S. Immunity in Drosophila melanogaster--from microbial recognition to whole-organism physiology. Nat Rev Immunol. 2014;14(12):796–810.View ArticlePubMedGoogle Scholar
80. Dantoft W, Davis MM, Lindvall JM, Tang X, Uvell H, Junell A, Beskow A, Engstrom Y. The Oct1 homolog Nubbin is a repressor of NF-kappaB-dependent immune gene expression that increases the tolerance to gut microbiota. BMC Biol. 2013;11:99.View ArticlePubMedPubMed CentralGoogle Scholar
81. Stroschein-Stevenson SL, Foley E, O’Farrell PH, Johnson AD. Identification of Drosophila gene products required for phagocytosis of Candida albicans. PLoS Biol. 2006;4(1):e4.View ArticlePubMedGoogle Scholar
82. Cordes EJ, Licking-Murray KD, Carlson KA. Differential gene expression related to Nora virus infection of Drosophila melanogaster. Virus Res. 2013;175(2):95–100.View ArticlePubMedPubMed CentralGoogle Scholar
83. Mosca TJ, Luo L. Synaptic organization of the Drosophila antennal lobe and its regulation by the Teneurins. eLife. 2014;3:e03726.View ArticlePubMedPubMed CentralGoogle Scholar
84. Chen K, Richlitzki A, Featherstone DE, Schwarzel M, Richmond JE. Tomosyn-dependent regulation of synaptic transmission is required for a late phase of associative odor memory. Proc Natl Acad Sci U S A. 2011;108(45):18482–7.View ArticlePubMedPubMed CentralGoogle Scholar
85. Miller DT, Read R, Rusconi J, Cagan RL. The Drosophila primo locus encodes two low-molecular-weight tyrosine phosphatases. Gene. 2000;243(1–2):1–9.View ArticlePubMedGoogle Scholar
86. Miotto B, Sagnier T, Berenger H, Bohmann D, Pradel J, Graba Y. Chameau HAT and DRpd3 HDAC function as antagonistic cofactors of JNK/AP-1-dependent transcription during Drosophila metamorphosis. Genes Dev. 2006;20(1):101–12.View ArticlePubMedPubMed CentralGoogle Scholar
87. Grienenberger A, Miotto B, Sagnier T, Cavalli G, Schramke V, Geli V, Mariol MC, Berenger H, Graba Y, Pradel J. The MYST domain acetyltransferase Chameau functions in epigenetic mechanisms of transcriptional repression. Curr Biol. 2002;12(9):762–6.View ArticlePubMedGoogle Scholar
88. Mallon EB, Brockmann A, Schmid-Hempel P: Immune response inhibits associative learning in insects. Proc R Soc Lond. 2003;B 270:2471–2473.Google Scholar
89. Bergland AO, Behrman EL, O’Brien KR, Schmidt PS, Petrov DA. Genomic evidence of rapid and stable adaptive oscillations over seasonal time scales in Drosophila. PLoS Genet. 2014;10(11):e1004775.View ArticlePubMedPubMed CentralGoogle Scholar
© The Author(s). 2017 |
Microbiome Research for Forensic Science
Microbes are ubiquitous and diverse, yet microbial communities exhibit repeatable patterns across many ecosystems and sample types. It is likely that some aspects of microbial ecology may be useful as forensic tools. For example, we know that microbes play an important role in decomposition of cadavers and we are exploring the use of microbial succession during decomposition to estimate the time since death and as an indicator for locating unknown (clandestine) graves. Additionally, we are exploring the potential use of relationships between the bacteria of the built environment (e.g. Sloan House Project above) and the bacteria of their occupants for use as trace evidence.
We are currently working on characterizing microbial community changes associated with decomposing corpses (contact: Jessica Metcalf). In conjunction with a number of forensics collaborators and under the auspices of a grant from the National Institutes of Justice, we are using a mouse model system in a controlled laboratory system to understand how bacterial and microbial eukaryotic communities change during decomposition and whether it is repeatable across many replicates. Our goals are to 1) determine whether bacterial and microbial eukaryotic, in particular fungal, decomposer communities change in a predictable manner as corpse decomposition proceeds 2) determine whether decomposer communities change the endogenous soil community in detectable ways and therefore may be useful for locating graves of unknown location and 3) determine whether decomposer communities are universal or source-specific by characterizing variation in these communities across soil types. Recently, we determined that postmortem microbial community changes are dramatic, measurable, and repeatable in a mouse model system, allowing postmortem interval (time since death) to be estimated within approximately 3 days over 48 days (Metcalf et al., 2013). Our results provide a detailed understanding of bacterial and microbial eukaryotic ecology within a decomposing corpse system and suggest that microbial community data can be developed into a forensic tool for estimating the postmortem interval and locating clandestine graves. |
When Rocket Lab's Electron rocket lifted off from its New Zealand launch complex on January 21, it carried a surprise payload. Along with its three commercial satellites, the launcher deployed a passive geodesic sphere called Humanity Star. The orbiting mirror ball is designed to reflect the Sun's rays and be visible to everyone on Earth as a way to create a "shared experience for all humanity."
When the Electron "It's Still a Test" evaluation payload reached Earth orbit on Sunday, it was already flying into the history books. It was not only the first successful orbital launch to be sent up by New Zealand, it was also the first commercial space mission to lift off in the Southern Hemisphere. But Rocket Lab founder and CEO Peter Beck wanted to add something extra to the mission and that was Humanity Star, which is meant to act as symbol of inspiration to the people of the world.
The technology behind Humanity Star is very simple. It rode in the Electron second stage folded up and when deployed it unraveled into a carbon-fiber geodesic sphere a little over a meter (3.3 ft) in diameter covered in 65 highly reflective panels. These reflect sunlight using what is known as the Iridium flare phenomenon, named after the flashes of light produced by the flat panels on Iridium satellites, which are regarded as the brightest man-made objects in the night sky.
The difference is that the flashes from the Iridium satellites are accidental, while those of Humanity Star will be deliberate. To make sure the Star is visible to everyone on Earth, Rocket Lab set it in a 90-minute polar orbit. It will remain aloft for about nine months before its orbit starts to decay and it burns up in the atmosphere.
Meanwhile, the Humanity Star website offers a tracking window to help people find out when and where the satellite will be visible in their neck of the woods.
"No matter where you are in the world, or what is happening in your life, everyone will be able to see the Humanity Star in the night sky," says Beck. "My hope is that all those looking up at it will look past it to the vast expanse of the universe and think a little differently about their lives, actions and what is important for humanity.
"For us to thrive and survive, we need to make big decisions in the context of humanity as a whole, not in the context of individuals, organizations or even nations. The Humanity Star is a way of looking beyond our immediate situation, whatever that may be, and understanding we are all in this together as one species, collectively responsible for innovating and solving the challenges facing us all. We must come together as a species to solve the really big issues like climate change and resource shortages."
Whatever Mr Beck's intentions, let's hope advertisers don't take the idea and run with it.
Source: Rocket Lab
View gallery - 3 images |
You are here
Your body image is impacted by those around you
Wednesday, January 30, 2019
Spending time with people who are not preoccupied with their bodies can improve your own eating habits and body image, according to researchers from the University of Waterloo.
In a new study, researchers examined how social interactions influence body image. They found that in addition to the previous findings that being around people preoccupied with their body image was detrimental, that spending time with people who were non-body focused had a positive impact.
man looking down
Miller conducted this study with Allison Kelly, a psychology professor in clinical psychology at Waterloo and former Waterloo undergraduate Elizabeth Stephen.
The study measured participants’ frequency of daily interactions with body focused and non-body focused others, their degree of body appreciation, meaning how much one values their body regardless of its size or shape, and body satisfaction, and whether they ate intuitively in alignment with their hunger and cravings rather than fixating on their dietary and weight goals.
“Body dissatisfaction is ubiquitous and can take a huge toll on our mood, self-esteem, relationships, and even the activities we pursue,” said Kelly. “It’s important to realize that the people we spend time with actually influence our body image. If we are able to spend more time with people who are not preoccupied with their bodies, we can actually feel much better about our own bodies.”
The researchers also found that spending more time with non-body focused individuals may be advantageous in protecting against disordered eating and promoting more intuitive eating.
“If more women try to focus less on their weight/shape, there may be a ripple effect shifting societal norms for women’s body image in a positive direction,” said Miller. “It’s also important for women to know that they have an opportunity to positively impact those around them through how they relate to their own bodies.”
The study appears in Body Image, an International Journal of Research.
1. 2019 (51)
1. April (14)
2. March (15)
3. February (8)
4. January (14)
2. 2018 (179)
1. December (6)
2. November (15)
3. October (16)
4. September (12)
5. August (9)
6. July (12)
7. June (18)
8. May (17)
9. April (15)
10. March (22)
11. February (23)
12. January (14)
3. 2017 (129)
1. December (9)
2. November (9)
3. October (11)
4. September (16)
5. August (8)
6. July (7)
7. June (12)
8. May (13)
9. April (8)
10. March (18)
11. February (8)
12. January (10)
4. 2016 (166)
5. 2015 (229)
6. 2014 (237)
7. 2013 (180)
8. 2012 (99)
9. 2011 (76)
10. 2010 (32) |
Wildlife is one thing some people hope to spot in their favorite park, or even in their backyard. Green Seattle Partnership caught up with Professor Mark Jordan to hear some insights about a multi-year carnivore study his Seattle University Wildlife Lab is carrying out in some of Seattle’s forested parks. Jordan and his students get a unique perspective on our urban forest by capturing digital images and even snagging small hair samples from the animals that come out at in the evening and at night.
Green Seattle Partnership: What is your green Seattle story? How did you become involved in this work?
Mark Jordan: I moved to the Pacific Northwest for college, and I fell in love with the region. When I started at Seattle University five years ago, I knew that I wanted to learn more about the wildlife here in the city. I had experience studying forest carnivores in California and Vermont, and it was easy to adapt those same methods to Seattle’s forested parks.
Professor Mark Jordan from the Seattle University Wildlife Lab
How do you select the parks to sample? How do you sample for wildlife?
We use camera traps to sample for wildlife. The cameras have motion sensors and infrared flash, so we can get images any time of the day or night. We try to set these up along trails. These trails can be either human or animal-made, because the wildlife will use both.
We select the parks where we put out our cameras based on a mix of practical and scientific reasons. We’ve focused on Southeast and West Seattle because they are relatively accessible from Seattle University. One of the primary research questions we are trying to answer is which impacts of urbanization affect the species that live in our forested natural areas. To answer this question we need to sample in parks in a variety of different locations, from highly urbanized areas along the Duwamish River to less densely populated residential neighborhoods. We also try to sample parks of a range of different sizes, from neighborhood pocket parks to our bigger parks like Lincoln and Seward Park.
What sorts of wildlife are you finding in the forested natural areas? Which animals are you most interested in?
I’m particularly interested in studying carnivores because they are good indicators of the health of an ecosystem. My students and I have found a handful of different carnivore species in natural areas in Seattle. The most common ones are raccoons and opossums, though we also see the occasional coyote. We also get lots of pictures of house cats.
Caught you!
What factors affect the presence of urban carnivores in the parks? Are they just in the parks or do they live in our backyards too?
It seems that the best predictor of presence of carnivores, at least raccoons and opossums, is the amount of impervious surface around the park; that is, how much of the land surface is made up of hard surfaces like streets and roofs that don’t absorb water. Interestingly, while opossums prefer less urbanized areas, our data suggest raccoons prefer areas with more impervious surfaces. Although we haven’t set up camera traps in residential neighborhoods, I’ve talked to enough people with raccoons in their backyards that I’m sure many of these species are not shy about wandering outside of the parks. All species need food and cover. Our parks are good places to find cover for many species, and they’re also the best place to find food for things like Pileated Woodpeckers. But some species, like raccoons, might have better luck finding food in our backyards.
Are you able to derive some conclusions about the impacts to and benefits to wildlife through different phases of forest restoration?
Because most of our photos are of raccoons and opossums, those are the only species I can say anything with confidence about. It seems like the amount of restoration in a park does not have an effect on these two species; the urban landscape features around the park seem to be more important than what is happening inside the forest. I suspect, however, if we looked at different species like birds or beetles, that we might tell a different story. If we’ve learned nothing from the study of ecology, it’s that every species is different.
What is the most interesting/weirdest thing you have found while carrying out this project?
I’ve been surprised at some of the places where we’ve found wildlife. We get raccoon photos in heavily industrialized spots along the Duwamish, and we’ve even seen deer right by I-5 on the north end of Beacon Hill. I think this goes to show that many species are adaptable to urban environments, and if we carefully manage our natural areas, we might be surprised at what decides to call our parks home.
One can read more about Seattle University’s wildlife study on the GSP Research Page.
Connect with the SU Wildlife Lab directly by email jordanma@seattleu.edu | Instagram @suwildlife | Web http://emammal.si.edu/seattle-university
Coyotes are part of city life in some parts of Seattle |
SSC CGL 2018 Practice Test Papers | Reasoning Ability (Day-27)
Dear Aspirants, Here we have given the Important SSC CGL Exam 2018 Practice Test Papers. Candidates those who are preparing for SSC CGL 2018 can practice these questions to get more confidence to Crack SSC CGL 2018 Examination.
SSC CGL | Reasoning Ability Day-27
maximum of 10 points
Table is loading
Click “Start Quiz” to attend these Questions and view Explanation
1) Introducing a woman, Amrish said ,” she is the only sister of his father-in law”. How that woman is related to wife of Amrish?
a) Mother
b) Sister
c) Aunt
d) Niece
2) Select the related word/numbers/letters from the given alternatives.
Neurology: Nervous system:: ??: Newborn
a) Odontology
b) Ostology
c) Neonatology
d) Morphology
3) Select the related word/numbers/letters from the given alternatives.
25: 125::144:??
a) 1561
b) 1728
c) 3375
d) None of the above
4) Find the odd one.
a) 357
b) 425
c) 527
d) 610
5) A series is given with a term missing. Choose the correct alternative from the given ones that will complete the series.
Violet, Indigo,_______, Green
a) Orange
b) Blue
c) Black
d) Red
6) In a certain code language ‘CROW’ is written as ‘BSNX’. Then, how will ‘SOFT’ be written in that code language ?
7) From the given alternative words, select the word which cannot be formed using the letters of the given word :
a) TEN
b) SET
c) ICE
d) MAT
8) Statement:
Some Apple are Orange
All Radish are Orange
1. All Apple are Radish
2. Some Orange are Radish
a) Only I follows
b) Only II follows
c) Both I and II follows
d) Neither I nor II follows
Directions: (9-10) Read the following instructions carefully and answer the following questions.
P, Q, R, S and T are five friends sitting in a straight line. P sits immediate right of R and P is not neighbor of S. Three persons sit between R and Q.
9) Who sits to the right of T?
a) S
b) P
c) Q
d) R
10) How many persons sit between S and Q?
a) one
b) two
c) three
d) None
Answers :
1). Answer: c)
2). Answer: c)
Neurology is study of Nervous system. Similarly, Neonatology is the study of Newborn.
3). Answer: b)
25(52) x 5 = 125
144(122) x 12 = 1728
4). Answer : d)
Except d All others are multiples of 17.
5). Answer: b)
6). Answer: c)
7). Answer: b)
SET cannot be formed Since S is not there in the given word.
8). Answer: b)
9). Answer: a)
10). Answer: d)
Online Mock Tests 2019: |
Types of oesophageal cancer
Knowing which type of oesophageal cancer you have helps your doctor to plan your treatment.
There are two main types of oesophageal cancer:
• Squamous cell carcinoma develops in the thin, flat cells of the mucosa, which lines the oesophagus
• Adenocarcinoma develops from glandular cells and is often linked with Barrett’s oesophagus.
A cancer can develop anywhere along the length of the oesophagus. Cancers in the upper oesophagus are usually squamous cell cancers. Most cancers in the middle of the oesophagus are also squamous cell cancers. Most cancers in the lower oesophagus are adenocarcinomas. This includes those in the junction where the oesophagus joins the stomach.
Over 95 in 100 (95%) oesophageal cancers are squamous cell carcinomas or adenocarcinomas. There are other, rarer types of oesophageal cancer. These include:
The tests and treatments for these rarer types of cancer are different from the ones we describe in this section. Our cancer information specialists can give you more information. You can call them for free on 0808 808 00 00.
Back to Understanding oesophageal cancer
What is cancer?
The oesophagus
The oesophagus (gullet) is part of the digestive system. It connects the mouth to the stomach. |
How does a camera work?
Image of a DSLR camera. But how does a camera work?
How does a camera work?
This is Part 2 of Learn Photography Faster Than Ever. If you have not read Part 1 use this link to go there.
If you want to create perfect images, you need to learn how does a camera work. At its core Photography is about capturing light. That light goes into your camera through a lens which has an aperture inside. By widening or narrowing this opening, you can control how much light goes inside the camera.
Here you can see how a DSLR works. Do not worry, it is less complicated than it looks.
The light passes through a shutter now, which opens when you press the shutter release button. From there, the light hits the camera sensor, where it is digitally captured and saved as a photo.
All types of cameras work quite similar, whether you have a DSLR or a smartphone.
What does that mean for you as a photographer?
As you know, I am a strong advocate for keeping things simple. It is not necessary to dive deep into technical details or into the long history of photography like many other photography blogs do.
All you need to know is that you can control the light in three ways.
• Use the aperture to set the amount of light. The further you open this hole, the more light goes into the camera.
• The shutter lets you set how long the light is allowed to hit the photo sensor. The faster you set the shutter speed, the more you can freeze the movement of objects.
• If you do not have enough light because you want to shoot after sunset or freeze a moving object in a dark room, the third option is to increase the sensitivity of the camera sensor. You can use the ISO setting for that. Always adjust this setting last, because the higher you set the ISO value, the more noisy the image becomes.
get paid to travel the world
Learn Photography Faster Than Ever And Get Paid To Travel The World!
I will teach you the essentials of photography, advanced photo techniques, editing tricks, tips to master mobile photography, and even how to make an income from selling your photos.
Learn to know your camera
Today’s digital cameras have become increasingly sophisticated and complex. The average digital camera today literally has many tens of buttons, switches, dials and menu options. The big question is which of all these options do you really need to know and understand? Especially if you try to learn photography faster than ever before.
To answer this question, let me tell you a story about a good friend of mine. He works as a pilot for Thai Airways and one day I had the rare opportunity to look over his shoulder. In the co-pilot seat of a Boeing 747-400, surrounded by hundreds of switches, dials and buttons, I asked him “How do you know what all these switches, buttons and dials mean?”
“It is really quite simple”, he replied. “In an airplane there are six instruments that are essential and they are the ones sitting directly in front of you on the flying panel. Altimeter, air speed, vertical speed, artificial horizon, turn-and-slip indicator, and the compass. Of the others you only really need to refer to them when they begin flashing. When they flash, there is a manual in the back of the cockpit, so you look it up and follow any instructions the manual gives you.”
This little story about my friend sums up perfectly how you should use a modern digital camera. Of the many buttons, switches and dials, there are a few that are essential to capturing an image.
• Aperture
• Shutter speed
• ISO
• Metering modes
• Focus
• File type
• White balance
The rest are nice to have and, if shooting in JPEG mode, can be utilized in place of postcapture processing. However, for the most part, and particularly when shooting in RAW mode, most can be ignored except in extraordinary circumstances.
Focusing on the essentials and mastering the few settings is the fastest way to learn photography and to know how to use your camera.
Your next step is to learn how to use exposure in photography. By understanding how to expose an image properly, you will be able to create better photos.
Markus Hermannsdorfer
Markus Hermannsdorfer is a professional travel photographer, working as a photographer for the hotel and tourism industry since 2013.
Leave a Reply
Close Menu |
Old analogue TV frequencies should turned into free ‘super WiFi’, scientists say
Old television frequencies should be used to create new bandwidths for a super-frequency WiFi to prevent overloading of the mobile networks and boost the economy, instead of being auctioned off to the highest bidder, say German scientists.
Old television frequencies are sold off by governments due to the change over from analogue to digital broadcasting, often to whoever is prepared to pay the most for them. They should instead be used to create a new range of free Wi-Fi, say scientists from the Karlsruhe Institute of Technology (KIT) in Germany.
Transmitting WiFi over old TV frequencies would cover a far wider area than traditional WiFi because they use much lower frequencies. Current WiFi is transmitted over local area networks (WLAN) at about 2GHz and therefore has a limited range.
And instead of auctioning them off, mostly to mobile phone networks, governments could use them for free WiFi networks, rendering pricey mobile phone services such as 4G obsolete.
Such a move would also bring a host of economic benefits, the scientists claim.
“Implementation of our approach would have far-reaching consequences. Individuals, institutions and companies would be far less dependent on expensive mobile communications networks in conducting their digital communication. This would also be of great economic benefit,” Arnd Weber of the Institute for technology Assessment and Systems Analysis (ITAS) at KIT, told Factor, a website covering the latest developments in technology and science.
Weber and his colleague Jens Elsner plan to make their case at the UN-initiated World Radio communication conference next year.
Their argument will rest on convincing governments that the long-term financial gains would far outweigh the short-term benefits from selling the old TV frequencies to whoever has the deepest pockets.
But some are not convinced. The Nobel Prize winning economist Ronald Coarse said the frequencies could indeed be auctioned off to make sure they are used effectively, and that governments should then use the proceeds from the selloffs to fund other things.
Others have argued that if used for WiFi, congestion would make these lower frequency networks unworkable, although the KIT scientists say applying the right technological approach would avoid this. |
Hives diagram
Splitting Hives. There are a number of reasons for making splits and a number of ways of making them. The main reasons for making splits are: Beekeeping in top bar hives, Michael Bush. Plans and a
parts list for a simple Kenya top bar hive. Pictures and descriptions of a Tanzanian top bar hive that doubles as a long Langstroth hive. Top bar hive management. Frequently asked top bar hive questions. Water-Phenol Miscibility Diagram Purpose Liquid water and phenol show limited miscibility below 70ºC. In this experiment, miscibility temperatures of several … This joint has five ligaments. The ischiofemoral ligament is a band of very strong fibers that connect the pelvis and the femur. The specific bone it is attached to is the ischium, which is EKG Test. An electrocardiogram, also known as EKG or ECG, is a test that observes and
analyzes the electrical activity of the heart. An EKG is a non-invasive procedure, allowing you to understand how well your heart is performing. Cholinergic urticaria (CU) is a type of physical urticaria (or hives) that appears when a person is sweating or their core body temperature increases. The beekeeper will want the hive to be structurally stable, even after considerable handling, and might want to disassemble it at some time in the future. The Cape honey bee or Cape bee (Apis mellifera capensis) is a southern South African subspecies of the Western honey bee.They play a major role in South African agriculture and the economy of the Western Cape by pollinating crops and producing honey in the Western Cape region of South Africa. The Cape honey bee is unique among honey bee subspecies because workers can lay diploid, female … "Hey, do you
want some?" your friend asks as he offers you a mouthwatering homemade brownie. You're tempted by the delicious dessert, but then you see the crushed peanuts on top. Darn! You're allergic to peanuts. Maybe just one little bite? Nope. If you have a food allergy, even a very tiny bit of Thankfully, true allergy to tomatoes is rare.Some people have problems with acidic foods like tomatoes and orange juice. Tomatoes are part of the nightshade plant family, so some people will have allergies to them, along with potatoes, eggplant, and other nightshade plant fruits and vegetables. People who only have digestive upset
from eating tomatoes may only have an intolerance, not a true
Rated 4.7 / 5 based on 203 reviews.
Deeper into the Windows Registry Gizmo s Freeware
Indoor Bee Hive Bee Mistress
Pinterest bull The world rsquo s catalog of ideas
Are You Suffering From Histamine Intolerance DrJockers com
Hivetool com Beekeeping Guide The Hive
Termites can hold back deserts by creating oases of plant life
Busy Bees Flowering plants require insects for
What is a brood pattern Honey Bee Suite
Usaha Kecil Budidaya Lebah Madu
THE STRESS ndash Dr Rajiv Desai
Integumentary System Flash cards at Malcolm X College
AllergyCases org Mind Maps Asthma
Mononucleosis Physiopedia
Alkali bees the alfalfa specialists Honey Bee Suite
The Honey Bee Colony The hive consists of three castes of
Allergy Allergies Symptoms Causes Treatment What
Different Types of Honey Honey Varieties |
How many times a month do neap tides occur
Proudman Oceanic Laboratory states that spring tides and neap tides occur twice a month. In the graphic above, we see a month animated. This causes a spring tide, during which the high and low tides have a large tidal range, the difference between high and low tide.
During a neap tide, the sun and moon are at right angles to the Earth, and instead of amplifying one another as with a spring tide, the ac. How do I determine the molecular shape of a molecule. How many times per month do neap tides and spring tides occur. These services tell whether a user is online, offline or invisible. What are the units used for the ideal gas law.
How many times a month do neap tides occur
Tides are the cycle of rising and falling ocean water that repeats automatically every. Xbox one seems to be giving off some kind of lag with right analog stick. A neap tide happens exactly half-way between a full moon and a new moon. |
Islam: Since the Beginning of Time
God created the universe. He knows best its creation plan. He has full knowledge of which path in this world leads to success and which path leads to failure. Therefore, God-given guidance is entirely trustworthy.
Understanding Islam
Islam is actually a religion of peace and humanism. Not only Islam, but also all other religions are religions of peace. The Sufis have given the best interpretation of Islam. A Persian phrase, Sulh-e-Kul, which means peace with all, truly expresses the spirit of Islam.
There are two major sources of Islam, the Quran, which is the word of God and the Hadith, which are the sayings and the actions of the Prophet of Islam. We find the true message of Islam through these sources. |
all papers written from scratch
24/7/365 support
no plagiarism - GUARANTEED
Essay on Japan Country
Surface and Localization
Japan is a country that consists of various islands that form an arc in the Pacific Ocean. It is situated to the east of the Asian Continent. It is made of four large islands, namely, Shikoku, Honshu, Kyushu, and Hokkaido. In addition to the four large islands, the country also consists of thousands of small islands. To the country’s east lies the Pacific Ocean, while it is separated by the Sea of Japan and the East China Sea from the rest of the Asian continent. The country has a total land area of approximately 378,000km2. As a result, the country is approximately 1/25 of the size of the USA.
The countries that are closest neighbors to Japan include Korea, Russia, and China. Japan has several large and developed cities, including Tokyo, which is the largest. It has approximately nine million inhabitants, which is higher than the combined population of the countries second, third and fourth largest cities. The other large cities are Yokohama, Osaka and Nagoya. Japanese is the country’s national language and also the most widely used one. As a result of the country’s large North-South extension, there is a strong variation in the climate. The countries most major cities, including Tokyo, have the temperate to subtropical climate with four seasons. The winter is usually mild while the summer is usually humid and hot. In early summer, there are rains, while typhoons are experienced during late summer. Most of the country has weak podzolic soils zone, red earth zone, and a brown earth zone. However, there are variations in other regions. The country experiences natural disasters, including volcanoes and earthquakes. It is mainly attributed to the location of the country where numerous tectonic plates meet. Mt. Fiji is the most famous volcano and highest mountain.
As of July 2014, Japan had a population of 127,103,388 people and the growth rate was estimated to be -0.13%. As of 2011, the urban population in Japan was estimated to be 91.3%, with the country’s rate of urbanization being 0.57%. The country’s population density is estimated to be approximately 336 people in every square kilometer. To compare, the population density in the USA is approximately 36.06 people per square kilometer. The birth rate in the country is estimated at 8.07 births per 1000 people, while the death rate is estimated at 9.38 deaths per 100 people. There is a net of 0 migrants per 1000 people as of 2014. The country’s population consists of 98.5% Japanese, 0.5% Koreans, 0.4% Chinese, and other ethnic groups form approximately 0.6%. As a result, the largest majority of the country’s population is the Japanese ethnic group. The country has a high literacy level with individuals aged 15 and above being able to read and write. There is a literacy level of 99%, and it applies to both male and female. The school life expectancy is 15 years and 3.8% of the GDP is spent on education.
The country spends 9.3% of the GDP on health expenditures and there is approximately 2.14 physicians serving 1000 people as of 2008. For every 1000 people within the population, there are 13.7 beds. The obesity prevalence rate is 5%. The maternal mortality rate is estimated at approximately 5 deaths for every 100,000 live births as of 2010. Japan is one of the countries with a high number of healthy people. The factors affecting health in Japan include culture, universal health care system, and isolation. The country has a higher suicide rate than the USA.
Social and Cultural Issues
Japan is largely homogenous and it lacks deep class, ethnic, or religious divisions. In addition, the country’s gap between the rich and the poor is not very striking compared to other nations. Approximately 90% of the country’s population is considered middle class. It is a remarkable difference from what has been recorded in the history of Japan where significant differences were experienced. However, there exist some social differences shown in the discrimination in education, marriage, and employment, especially concerning the nation’s Korean minority. The country is mainly group-oriented even with the shift toward the empowerment of individuals. Most of the groups in the country are structured using hierarchical means. Members of a group have ranks based on their responsibilities.
There is freedom to practice any religion with majority of the people being Shinto at 83.9%. The Buddhists form approximately 71.5%, 2% of people are Christians and other religions form 7.8%. There is an excess of 100% on all since most people confess both Shintoism and Buddhism. There are no major conflicts based on religious beliefs. The main language spoken is Japanese, but other languages, including Korean and English, are used. The lifestyle of the Japanese people involves gestures and etiquette, which are common and different from most other countries. Their meanings may also vary from the conventional gestures, and they are derived from the country’s culture. The society is governed by numerous subtle norms that are based on authority, respect, self-discipline, hierarchy, and they also emphasize on the interactions among people. For instance, greetings are highly regarded in Japan. The business etiquette in Japan involves politeness, sensitivity, and good manners. It is vital for a foreign firm to understand that politeness, good manners, and respect are highly regarded by the Japanese people.
Get a Price Quote:
Total price:
All first-time users will automatically receive 15% discount
Order now
Economic Situation
The freedom score for the Japan economy is 73.3 according to the 2015 index. The country has a free market economy with a 1.2% average tariff rate. Investing in some of the sectors undergoes screening. The government has significant shares in the banking sector, which means that it has control in the financial sector. The company’s economy is abenomics, which means that it has an aggressive set of fiscal and monetary policies, which focus on aiding the country to overcome the deflation. In addition, the country faces major risks as the policies may cause inflation. However, the policies support both local and foreign investments. Since 1980, Japan’s GDP growth rate has averaged 0.49. The growth rates in 2011, 2012 and 2013 were -0.5%, 1.8% and 1.6% respectively. In 2013, the GDP was $4901 billion, with 38,633.71 GDP per capita. In 2012 and 2011, the GDP was $5.954 trillion and $5.906 trillion respectively. The GDP per capita in 2011 and 2012 was $46,203.70 and $46,679.27 respectively.
The per capita annual income in Japan was $44,085 as of 2011, compared to $27,334 in the USA in 2010. The country’s share of income is taken from the top 1% with exception of capital gains, which peaked at 9.5% in 2008 before dropping slightly in 2012 to 9%. It contrasts from the USA with its top 1%, which had 17.5% of the income in 2013, which was an increase from 16.7% in 2009. Japan has almost full employment rate of 3.40% in March 2015, compared to 5.5% in the USA at the same time. In March 2015, the country’s inflation rate was recorded at 2.30%, and it has a public deficit of 23.5%. The interest rate in 2013 was 1.9%. Japan is an information age country that is still creating industries in the information technology sector. It is the world’s third largest economy after China and the USA. Japan is among the leading countries in terms of technological development. It is a net exporter of technology-related products.
The banking system in Japan has maintained stability in the recent past. There was a slight increase in in the volatility of the stock prices in 2014; however, it has been low in the government bond and forex markets. The volatility in 2014 resulted from the investors being increasingly risk averse due to nervousness on the emerging markets. The development in the financial markets and institutions indicate that there are no warnings regarding financial imbalances, for example, excessive expectations regarding an increase in the prices. Macros tests results indicate that financial institutions can maintain the capital adequacy ratio levels. The medical care system in Japan is designed in a way that all services are available to all its citizens through the employer-purchased insurance. In addition, they have controlled heath care expenditures. There are compulsory health insurances that are financed through compulsory deductions in salaries. The patients have the freedom to choose from available providers who are, in turn, paid by the government through a uniform method and rate.
Japan has a well-established telecommunication and media infrastructure. However, since the 2011 earthquake, the government has focused on other urgent issues, including the changing of electric power policies. The country is in the forefront in the adoption of the new technologies, such as, for example, the 4G networking. The government has set regulations to govern the telecommunication and media infrastructure. For instance, there is the Wire Telecommunication Act, which facilitates Wired Transmission Act, Radio Act, Telecommunications Business Act, and Business Act. The public transport system in Japan is highly efficient especially in the urban areas. The system enables punctuality and it is used by numerous people.
International Trade
Japan has well-established international trade policies. As of 2013, the county was contemplating effecting Free Trade Agreements with different countries. The county offers attractive opportunities that are available to investors. The environment is conducive for business, cost competitiveness, infrastructure, as well as advanced technology. In addition, the employee pool is highly skilled due to the country’s high education level. Investing in the country can be beneficial for both Japan and the world’s largest economies, and, as a result, it welcomes foreign investors. The country’s ministry of Economy, Trade and Industry implement effective measures to promote foreign investment. Japan’s exports in March 2015 brought approximately 6927.38 billion Yens of revenue, and the imports brought 6698.12 billion Yens. It shows that Japan is a net exporter, but its margin is small. At the same time, the USA had imports and exports at the level of 239,205 billion USD and 187,837 billion USD respectively. Japan is the fifth largest exporter and importer globally. It has a significant role in the global trade as it is a member of numerous trade organizations, including WTO, G-20, G-8, and OECD. The main trade partners include Indonesia, Malaysia, Philippines, Singapore, Vietnam, Australia, and Korea among others. The country trades with its partner countries through partnership agreements.
Political Situation
Japan has a constitutional monarchy, which is founded on a parliamentary cabinet system. The power of the executive is held by the cabinet where the prime minister sits. The prime minister appoints the ministers and members of the cabinet. The country has various political parties and the ruling political party is a coalition between New Komeito and the Liberal Democratic Party. There is an imperial family in Japan and the emperor is a state symbol. The country has an ambassador in the USA, as well as the US has its ambassador in Japan. The judicial system in Japan considers the Supreme Court as the highest court in the land. The Japanese law is sourced from the Constitution. The Prefectural Police enacts the law enforcement and it is overseen by the National Police Agency. All matters of corruption and other crimes are conducted through the court system. Japan has numerous allies throughout the world. Anyway, there exist disputes with neighboring countries regarding territorial control. The country has strained relations with the People’s Republic of China and Taiwan regarding the Senkaku Islands and Okinotorishma. There are also conflicts with North and South Korea regarding military actions. In addition, the main global threat that Japan faces includes terrorism.
buy academic writing
15% first order Order now close |
Francis Bacon
Back in the day
The Subway Sarin Incident
On March 20, 1995, members of the Japanese religious sect Aum Shinrikyo released sarin gas, a nerve agent, on several lines of the Tokyo Metro system in five coordinated attacks, killing 12 and injuring thousands. Carrying homemade liquid sarin packaged in plastic bags, the perpetrators boarded the trains, punctured the packets, and left them to vaporize on the car floors. More than 10 Aum members were sentenced to death for their involvement in the incident. What was the group's motive?
Dura-Europos: The Pompeii of the Desert
Dura-Europos was an ancient town on the Euphrates River in what is now Syria. Originally a Babylonian town, it was captured by the Romans in 165 BCE. Destroyed by the Sasanian dynasty in 256, it was abandoned, covered by sand and mud, and disappeared from sight for nearly 1,700 years until it was rediscovered in 1920. Its ruins give an unusually detailed picture of everyday life there and have provided finds including armor, paintings, and the world's oldest preserved version of what?
Born on a day like today
Publius Ovidius Naso, a Roman poet better known as Ovid, is ranked alongside Virgil and Horace as one of the three canonical poets of Latin literature. Ovid was a great storyteller whose writings generally deal with the themes of love, mythology, and exile. His poetry, much imitated during late antiquity and the Middle Ages, had a decisive influence on European art and literature for centuries. Why did Augustus banish Ovid in 8 CE?
Last updated on Saturday, 20th March 2010
More sponsors |
Show Summary Details
Page of
date: 24 April 2019
Summary and Keywords
International organizations (IOs) play an important role in addressing the plight of vulnerable groups (VGs), especially when states are either unwilling or unable to do so. Vulnerability as a concept thus provides a unique perspective for analyzing some of the strengths and shortcomings, as well as the challenges, of IOs. Vulnerability implies that the effects of disasters are determined not only by physical events but also by the institutional context. Some definitions of vulnerability suggest that it is a forward-looking concept indicating damage potential for people arising from hazards, which can be social and technological and not just natural. Three cases illustrate how specific forms of vulnerability are constituted, who are (considered to be) vulnerable, and who does what, when, and how to address vulnerability: Herbert Hoover’s Commission for Relief in Belgium during World War I, internally displaced people, and policy attempts by the United Nations and nongovernmental organizations to address different and growing forms of vulnerability. These cases contribute to a history of vulnerability as addressed by IOs, and highlight the incomplete nature of international action to address vulnerability as well as the difficulties faced by IOs in implementation, compliance, and concomitant institutionalization. Future research should devote more attention to issues such as the interaction of the politically powerful and vulnerable groups, the actual pathways that resistance to change or addressing vulnerability takes, and the processes by which vulnerability arises, and why and how it is being addressed—or not, states, IOs, and other actors.
Keywords: international organizations, vulnerable groups, vulnerability, hazards, Herbert Hoover, Commission for Relief in Belgium, internally displaced people, United Nations, nongovernmental organizations, disasters
Please subscribe or login to access full text content.
|
Rāmāyana |Kiṣkindha Kaṇḍa| Chapter 44
44. Rāma Gives Ring to Hanuman
[When Sugrīva feels that the one who is capable of doing the job is Hanuman, the son of wind God, Rāma gives his signet ring to Hanuman so that Sītā can identify it.]
Sugrīva specially mentioned about Hanuman who is fit to do this job and he felt that among the best of the monkeys he is likely to achieve the result. 44.1
Sugrīva who was greatly liked by all monkey chiefs then told the valorous Hanuman, who was the son of wind god. 44.2
"Oh great monkey, I have not seen any one equal to you in speed of movement in earth or space or sky or the land of gods." 44.3
"You know about all the world consisting of oceans and mountains including that of asuras, Gandharvas, Nagas, men and gods." 44.4
"Oh great monkey, in speed of movement, lustre and efficiency, you are like your father the great wind God." 44.5
"There is no other being in this world which is equal to your lustre and so you alone are capable of finding Sītā and so please go ahead." 44.6
"Oh Hanuman, Oh expert in diplomacy only in you, strength, wisdom, valour, capability of judging suitable place and time and knowledge of diplomacy is there." 44.7
"Understanding that responsibility of finding Sītā is placed on Hanuman alone, Rāma started thinking about Hanuman." 44.8
"This Lord of monkey would achieve the goal by employing all methods as in accomplishing the task, he has been considered as the most worthy individual." 44.9
"His lord knows that if he goes he is capable of getting results and that is the reason why he is favouring him so greatly in achieving the objective." 44.10
The mighty ones heart was filled with joyous feeling as if the task has already been accomplished by Hanuman, who answered all questions with great determination. 44.11
Then he gave him his ring on which his name was engraved and shining, for recognition by the daughter of the king. 44.12
"Oh great monkey, by seeing this symbol, the daughter of Janaka, who is one who would be perplexed would recognize that you are coming from me." 44.13
"Oh valorous one endowed with strength and prowess, the message of Sugrīva to you, makes me feel that you would accomplish the task." 44.14
The greatest among monkeys took it from Rāma and kept it on his forehead; saluted him with folded palms and after touching feet of Rāma departed. 44.15
Hanuman being the foremost among the monkeys being the son of wind God among the other monkeys surrounding him appeared like moon amidst other stars in a cloudless sky. 44.16
Rāma said to him, "Oh very strong one, most valorous among the best of monkeys, Oh son of wind God, Oh Hanuman, I am depending on your strength and mighty valour and so exert yourself so that you can find the daughter of Janaka." 44.17
This is the end of Forty Fourth Sarga of Kiṣkindha Kanda which occurs in Holy Rāmāyaṇa composed by Vālmīki as the First Epic. |
Breathe Better While Working Out
By Deborah Jeanne Sergeant
Want a more effective workout? Try breathing correctly.
While exercising, your muscles work harder than they do while at rest. Since they’re working harder, they need more oxygen than while performing at a lower level. The heart increases its rate to deliver the oxygen. Without the oxygen, you can’t perform as well.
Beyond a less-than-ideal performance, not breathing properly can have some unpleasant results.
“Proper breathing technique is crucial while exercising,” said Karly Frigon, a personal trainer at Metro Fitness in Syracuse.
She said that not breathing properly can cause blood pressure spikes, stress on the lungs and blood vessels and, sometimes, chest pains, increased blood pressure and lightheadedness.
Holding the breath while exerting the most effort, taking shallow or fast breaths while running, or inhaling and exhaling at the wrong time can increase blood pressure and lower performance.
While lifting a weight, many hold their breath as they focus on performing the movement to focus on the lift. At that moment, their body needs more oxygen. Instead of holding the breath, Frigon advises exhaling through the mouth while lifting the weight and inhaling through the nose while lowering the weight.
Of course, swimmers breathe in through their mouths and out of their noses to avoid taking in water. For any land-based exercise, inhaling through the nose helps filter out debris. While exhaling through the nose is also fine, most people find that difficult while exercising vigorously.
Physician Joanne Wu, an experienced yoga teacher, health coach and wellness expert who sees patients in Syracuse, calls breathing “an art” because of how many ways it affects the body.
She said that slowing respiratory cycles can help people relax, which can benefit some activities.
“However, there are forms of exercise where rapid breathing is helpful to build core strength and work out more effectively, such as dance and Pilates,” she said.
Cameron Apt, senior performance specialist at University of Rochester Medical Center, said that poor posture and sitting for long periods has ruined how many people breathe.
“We become chest breathers,” he said. “The lungs elongate down towards the stomach. We try to expand the chest outwards more than usual. It can lock up the shoulders and neck so they tense up.”
Improper breathing can even contribute to shoulder, neck and back pain. Breathing from the core makes a difference in all of these areas, as well as in athletic performance.
“The diaphragm is where you should breathe, not the upper back,” Apt said. “That’s where people get in the habit of breathing. Breath deep into your stomach. It helps realign things.”
Apt also said that proper deep breathing helps improve balance, which can be important for activities that emphasize balance such as martial arts. Breath that originates from the core prevents the shoulders from rising, for example.
If you want to learn the difference between breathing from the core and chest breathing, lie on your back and breathe deeply enough so the belly button rises and lowers. That is core-based breathing.
Please follow and like us: |
The Big “C”: Cancer Tips And Advice
By | December 13, 2018
If you expose your skin to the sun, you risk contracting skin cancer. Try to wear hats to shield your face from the sun, and be sure to always use sunscreen in order to help prevent getting cancer.
TIP! Sun exposure is a leading cause of cancer, skin cancer being one of the most common types of cancer. Wear a hat when you go outside and be sure to use plenty of sunscreen.
Coping with your own cancer or supporting someone you care about with cancer is a tremendous burden. There is a plethora of assistance available like this article to make life with cancer more tolerable.
Exercising is a good way to fight cancer. By exercising, this gets your blood pumping all throughout your body. Getting your blood pumping will help your treatments to go through your body easier.
TIP! When you are battling cancer, it is still important that you exercise. Exercise helps your circulation by getting your blood flowing.
One form of cancer that is commonly contracted is skin cancer caused by excessive exposure to the sun. To prevent skin cancer, protect your face with a hat, and do not forget to apply sunscreen diligently.
Quit smoking immediately if you have cancer. Some people think that because they have already been diagnosed with cancer, they can’t be saved, and thus quitting smoking would be pointless. The carcinogens contained in cigarettes could decrease the chance of their body recovering from cancer.
TIP! Quit smoking immediately if you have cancer. A lot of people who are afflicted with cancer have the mistaken idea that there is no longer any point in giving up cigarettes since they are already seriously ill.
As you are treated for cancer, you will undergo many physical changes as a result of the treatment process. Prepare yourself for this. Discuss the side effects of any drugs or other treatments with your doctor. You may have to wear a wig or use makeup if you get really pale. Taking care of your physical appearance may help may your feel less self-conscious about the changes caused by different cancer therapies.
As you are treated for cancer, you will undergo many physical changes as a result of the treatment process. Prepare yourself for this. Your doctor will let you know all the effects that medications and treatments may have. For example, you may be able to make advance preparations such as buying a suitable wig for hair loss or changing your cosmetics to accommodate increased paleness.
TIP! Prepare yourself for all the physical changes that may take place as you receive cancer treatment. A health care professional can outline the different treatment options and the likely side effects of each one.
If someone you know has been diagnosed with cancer, take the time to listen to them. It can seem hard to talk about at first, but you will soon understand the importance of being able to express your feelings to another person who actually understands what you are going through. When you are listening, remember that this time exists for them and their health, so avoid interruptions and withhold personal opinions.
Most fresh fruits and veggies bought from the store may have contamination. Pesticides are used to prevent bug infestation but the bacteria can occur from natural sources such as fertilizer or other types of contamination. Before eating these nutritious foods, be sure to wash off any pesticide residue. You can do this with a mild detergent and warm water. You may also want to buy organic produce to avoid pesticides.
Prevent Cancer
TIP! When someone close to you has cancer, it is important to let them know you are available. You may find it awkward to do at first, but your loved one will benefit greatly from the opportunity to talk, as well as from knowing that you cared enough to take the first step.
Most people are aware that fish, such as wild salmon, is a healthy food choice. However, the fatty acids that are in salmon, as well as its low mercury count, can also help prevent cancer. You can do your part to prevent cancer by including wild salmon into your diet a few times per week.
Consult cancer information, especially scientific journals, if you or a loved one suffers from cancer. Your confidence is, in reality, very important in these circumstances.
TIP! Reading cancer-related books, journals, or magazines can be helpful. Being confident plays a major role in fighting cancer.
Always be ready for a battle. Gathering your inner strength and refusing to let the difficulties of dealing with cancer get you down is the positive way to give yourself the best chance for survival.
Always be ready for a battle. Since you’re fighting to live, you need to be in the best possible position to win.
TIP! Do not let cancer frighten you. If there’s a time to fight, it’s when you’re dealing with a direct threat to your life.
Being an active participant in your treatments is a better strategy for fighting cancer, than to just passively allow the physicians to treat you. Make sure you stay in the situation. This will not help you to get well.
TIP! Dealing with cancer is easier when you have people to talk to, so support groups with people who are sharing the same struggles can be very beneficial. The Internet is full of information and you can find local support groups or someone you can talk to.
Help cancer patients deal with cancer by finding them an outlet to talk about it. The Internet is full of information and you can find local support groups or someone you can talk to. Having this release outlet can be a huge emotional benefit.
If you are a relative of someone afflicted with cancer, then it is critical that you not treat them any differently than before or as you would anyone else. A person with cancer needs positive energy from their family and friends. They often feel down and bad about things, so good energy is beneficial.
It is important to be aware of and recognize cancer symptoms. If you can distinguish which symptoms could be cancer, and which are nothing to worry about, you can address those symptoms that much faster.
You need to keep your friends and family fully informed of your condition. If you put up a falsely brave front and refuse to admit to fears or doubts, then you may feel alone and isolated when you need support the most. Open and honest communication is what will serve all of you best at this time.
TIP! Be open and honest with your family and friends about your diagnosis. Trying to play brave can actually leave you feeling alone and isolated at the very time when you need a support group.
You can offer support to someone who has cancer by going with them when they visit the doctor and asking appropriate questions. You may have specific questions about how best to care for your loved one, and the doctor is probably the best person to answer them.
Try not to be in the sun very much between 10 am and 3 pm. If your skin is sensitive to the sun, try to remain inside during this period to help cut down the risk of damage to your skin.
TIP! If at all possible avoid the strong sunlight from 10 in the morning until 3 PM. You can significantly reduce your risk for skin cancer by scheduling your outdoor activities before or after these hours.
Make sure that you take the adequate amounts of vitamin E every day. Evidence suggests that vitamin E can help prevent certain cell changes that can lead to cancer. There are hundreds of different foods that contain vitamin E or, if you prefer, you could take a vitamin E health supplement.
Be sure to set aside some time for enjoyment. You don’t have to (and shouldn’t) completely change your lifestyle just because you have cancer. Be sure to do what you love, whether watching sports, reading books, or seeing movies. You might need to plan carefully so that these events don’t take too much out of you, but you must still experience life.
Be open and honest with your family and friends about your diagnosis. If you try to act fearless and stoic, you can end up feeling even more secluded and desolate when what you most need is a loving and compassionate support system. Open lines of communication build sound bonds that are healthy and beneficial to all involved.
You body needs a restful eight hours of sleep daily. You can feel very tired and stressed from cancer treatments. When you get high quality sleep, it will help your body rejuvenate, and leave you refreshed to face the challenges of each day. If you find that you can’t get enough during the night hours, set aside a good time to squeeze in some shut-eye during the daylight hours too.
TIP! Get a minimum of eight nightly hours of rest. The treatments and medications used to fight cancer can take a major toll on your body, leaving you fatigued and stressed out.
When you have cancer, you should listen to your body. Take a generous break if you feel tired. If you’re feeling a lack of energy, make changes to your diet to incorporate more healthy foods. Take the time to listen to your body, and do what it is telling you that it needs to have done.
TIP! Make sure you pay attention to how your body is feeling. When you feel worn out or exhausted, take a break and rest.
Take time to have fun. A diagnosis of cancer doesn’t have to overhaul your life. Make sure to do everything that you really love, whether it is reading a book, going to movie theaters, or attending a sporting event. You may need to plan a little more carefully to ensure that these events do not take an unnecessary toll on you, but you still need to experience life.
Look into complementary therapies that could very well support conventional medical therapies and help you transition into your post cancer lifestyle. You might want to try receiving a massage or acupuncture. Attending a yoga class or trying aromatherapy can also significantly reduce your stress. These forms of therapy can help you relax and relieve tension during this extremely stressful time.
TIP! When you are being treated for cancer and recovering afterwards, there are many complementary therapies that can help you to get through it all. Perhaps you could try acupuncture, yoga, massage therapy or aromatherapy as relaxing ways to control your stress.
Be aware of, and monitor, your body’s signals for what it needs. If your energy is low, then take a break. If you are feeling run down, change up your diet so it includes healthier foods. Don’t ignore the messages that your body is sending to you. Follow what your body is telling you.
There are foods that help in the battle with cancer. For example, the lycopene in tomatoes is helpful in warding off prostate cancer. There are studies that support this as being fact.
Tell your loved ones who are diagnosed with cancer how much you love them. Those three words mean more than anything you can do. You can do this to let them know everything is okay.
For many people, diarrhea is one of the most uncomfortable side effects of cancer treatments. Eliminating coffee from your diet may help to reduce this problem. Caffeine may assist you in feeling alert; however, it can worsen diarrhea, and may cause dehydration. To lesson the symptom, stay away from caffeine.
TIP! You may have to give up coffee if it combines with your cancer medication to cause diarrhea. While it helps you to stay awake, caffeine can make your diarrhea worse.
It is crucial that you eat three, healthy meals daily. After your cancer treatments, you may not be very hungry, but to ensure that the medication you take works effectively, you have to eat. Eat starches if you’re having trouble keeping other foods down. You’ll find fruits and veggies very helpful too.
Sleeping is a good thing to do for your body. Sleeping enough allows your body critical hours for recovery and regeneration to counteract what the cancer treatment is doing to you. It is recommended that you get a minimum of seven hours sleep during the night and take at least a one our nap during the day.
Difficult Disease
One of the most important steps to reduce the risk of cancer is to avoid risky behaviors. Riskier activities can make it much more likely that an individual can develop an infection, increasing the likelihood of cancer in the future. Don’t share needles and always protect yourself when having one-night stands.
TIP! Avoid risky behaviors. Certain actions dramatically boost the chances of individuals getting infected with something, and many infections lead to cancer.
Cancer is a very difficult disease to live with. Because it is the number one cause of death, it instills a lot of fear into the patient and patient’s family. The solid advice in the article above can be a powerful resource to help you deal with the challenges of facing this difficult disease.
Have someone who can transport you around while undergoing cancer treatments. Cancer may be exhausting, and its side effects may limit or reduce your mobility and reaction times. Since your health is your utmost focus right now, let somebody else drive. |
The Threat to Mandatory GMO Labeling
There is no question consumers have become increasingly more attentive when it comes to knowing what is in their food. When i say that, I am referring to consumers wanting to know whether the food they are purchasing has GMO components or not. GMO, or genetically modified organism, is used to describe agricultural products that have been genetically modified (Source). In fact, 90% of Americans want to know what is in their food (Source). So far, only three states have passed mandatory GMO labeling legislation: Vermont, Connecticut, and Maine. These states are pioneers for the future of the food industry with consumers starting to question the quality of their food, thus realizing they are being kept in the dark about whether the food they are eating has GMOs or is GMO-free. Although there is overwhelming evidence the American public wants mandatory labeling of GMOs so they can make educated decisions about the food they are consuming, there are institutions advocating against it immensely.
These institutions mainly consist of food companies, biotech companies that produce GMOs, and a lot of the United States Congress. These three actors benefit materially by making the commonwealth live in ignorance when it comes to their food. Some may ask, how does Congress benefit from the non-regulation of GMO labeling? It is quite simple, the food and biotech companies that have a special interest in this matter lobby Congress, so the legislators can further their interest. However, it is not all bad because there are coalitions made up of other food companies, consumer advocates, organic farmers, and health care associations such as Just Label It. Just Label It is made up of 700 organizations and advocacy groups that are completely in favor of mandatory GMO labeling (Source). Despite the fact there are groups in favor of mandatory GMO labeling, little progress has been made in requiring mandatory GMO labeling across the country with the exception of the three states mentioned above.
Even though three states passed a mandatory GMO labeling bill, there is legislation being pushed through Congress to redact the small progress that has occurred.The DARK Act, also known as the Deny Americans the Right to Know Act, is reactionary legislation to the three states whom have adopted mandatory GMO labeling. The opposition to this bill coined the “DARK” term (Source). If the bill is implemented, a voluntary USDA labeling standard for GMO products would be established. In other words, under this law, food companies do not have to disclose if they use GMO products in their food. Of course, the companies can do so if they please, but why would they if it is voluntary?
The last sentence of the bill explicitly states: “No state or a political subdivision of a state may directly or indirectly establish … or continue in effect as to any food or seed in interstate commerce any requirement relating to the labeling of whether a food … or seed is genetically engineered,” (Source).
The advocates for this bill suggest mandatory GMO labeling would put a burden on food and biotech businesses resulting in higher costs and lower profits. That statement is simply not true because companies have regularly changed their labels and never experienced a sharp decrease in profits. The belief is Corporate America likely fears mandatory GMO labeling since natural farmers, in theory, could take in much of the market (Source). Whether this is true or not is besides the point. The people deserve to know every ingredient in their food, GMO or not. Yet, our government is failing us.
In 1991, the FDA raised concerns about the dangers to human health by GMO foods and multiple studies on GMO foods, published in peer-reviewed journals backed up these concerns. Looks like the FDA did its job properly, right? Not so fast. Subsequently, in 1992, the FDA issued a statement that it was “not aware of any information showing that foods derived by these methods differ from other foods in a meaningful or uniform way” despite asserting the opposite in 1991 (Source). This is disappointing as an American citizen because the FDA is supposed to regulate the food industry, but instead they lie to the public about the effect GMOs have on human health. Also, Monsanto’s Roundup, the most heavily used agricultural pesticide in the world, has been revealed to be a “probable carcinogen” by the World Health Organization because of its active ingredient glyphosate. A carcinogen is something that causes cancer. Why have the American people not been informed about this? This is something that the government keeps quiet so federal officials can please the lobbyists, whom basically pay them off.
Regardless of the views I have expressed, I encourage any individual to do their own research and come to their own conclusions. What we eat is the most important aspect to our overall health; our body literally makes new cells out of the food we consume. Who knows, maybe there is hope; Campbell’s took action and started labeling their products that contained GMOs (Source).
Contributed by R.A.
Leave a Reply |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.