text stringlengths 144 682k |
|---|
“Scientifically proven?”
You will find here amount of information labeled “scientifically proven”. I would like to draw your attention to this term.
Nowadays, information is flooding. With a few clicks, we can learn, or get answers to our questions and this in countless areas. Internet…. an inexhaustible source of information but also, unfortunately, misinformation. Indeed, all what we can read is not always a reflection of the truth and it is often difficult to make up one’s mind given the number of people who call themselves “experts”.
Doubt! This is the first thing I want to tell you. Better to focus on information quality over quantity. Sharpen your critical sense, check the information the sources and do not be fooled by especially the “Experts” and other Doctor, Professor, PhD, President or of a particular society. Nowadays, it is easy to create a company and proclaim itself president.
So how to assess a studies or peace of information?
All scientific studies do not have the same value … There is a classification in scientific evidence, namely:
1-The expert opinion (expert opinion): It has no scientific value. This is a personal opinion of a person on a given topic. This reflection may be purely empirical and based on personal experience.
2-Case Report: As its name suggests, this is a detailed report of a case. In medicine the report contain usually symptoms, signs, diagnostic, treatment and follow-up of an individual patient. Low level of scientific evidence grade IV
3-Case-control study: In medicine it is a study that compares a patient with a disease or a condition (study) with a patient without disease or condition (control). Low level of scientific evidence Grade III
4-Cohort Studies: usually observational study. A study design where one or more samples (called cohorts) are followed prospectively and subsequent status evaluations with respect to a disease or outcome are conducted to determine which initial participants exposure characteristics (risk factors) are associated with it. Scientific presumption Grade IIa
5-Above, significantly, we find the Comparative randomized trials or randomized controlled trials (RTCs). A study in which people are allocated at random (by chance alone) to receive one of several clinical interventions. One of these interventions is the standard of comparison or control. The control may be a standard practice, a placebo (“sugar pill”), or no intervention at all. Grade Ib Scientific proof
6. Finally, the top of the hierarchy of evidence are: Meta analyzes or comprehensive systematic reviews of randomized controlled trials. A subset of systematic reviews; a method for systematically combining pertinent qualitative and quantitative study data from several selected studies to develop a single conclusion that has greater statistical power. Grade Ia Scientifically proven
For example I remember a heated debate that started on the theme of homeopathy. Each one was talking from personal experience when, annoyed I started reading the findings of a meta-analysis of serious Australian National Health and Medical Research Council, study that echoed other studies that I knew. (See links below).
My detractors, in this case the majority of the people gathered in the room, began to frantically search on their computers in order to give me a pleiad of articles touting the effectiveness of homeopathic treatments. Indeed, it is possible to find and this, in all areas, an expert opinion or a scientific study of low level to confirm or deny this or that belief.
This topic was so painful for most of the people that i couldn’t make them admit the existence of levels of scientific evidence and that a meta-analysis of quality randomized controlled trials remains well above any case study or expert opinion.
study here : and
I leave to the discretion of the reader the findings of this study.
Unfortunately we can not force anyone out of his ignorance of a subject. Any false certainty can keep you away from your goal which, in the field of medicine, can have very serious consequences. So be careful, rigorous and methodical in what you accept to believe. |
All About Data Mining
Financial planning
Pulling out important information from big volume of data is what data mining is all about. The tools used for data mining are there mainly for the purpose of examining data from different perspectives and then, summarizing it to a useful database library. These tools on the other hand have become computer based applications in an effort to handle growing volume of data. There are instances that others are calling these as kpi metrics tools.
As concept, data mining has existed since the past and what used as data mining tools were actually manual processes. Later on, with the onset of hi-tech and fast computers, increased storage capacities and analytical software tools, automated tools were developed eventually which significantly improved the accuracy of data mining speed, analysis and at the same time, brought down the operation costs.
These methods for analytics companies are employed in order to facilitate major elements similar to pull out, convert as well as load data to warehouse system, collecting and handling data in database system, allow concerned personnel to acquire the data, do data analysis as well as data presentation in format that can be interpreted easily for further decision making. These methods of data mining are used in an effort to explore the associations, trends and correlations in stored data that are based generally on different types of relationships like for instance: associations or the simplest relationship between data, clusters or logical correlations used in categorizing the data collected, classes which is a certain predefined group drawn out and the data within it is searched based on the groups, sequential patterns that is used to help in predicting a certain behavior according to the observed trends in stored data.
The industries that cater heavily to consumers in the financial, retail, sports, entertainment, hospitality and the likes heavily depend on such methods of data mining for them to obtain quick answers to questions and at the same time, improve their business. Due to the reason that the tools help them to study and analyze consumer’s buying patterns, it enables them to create a strategy that can be made for future sales.
To give you a quick example, restaurants may want to study their consumer’s eating habits at different times of the day. Once they obtain the data, it is going to help them in deciding what menu to offer on different parts of the day. With data mining tools, it helps them a lot to draw out a business plan, discount plans, advertising strategy and everything in between to further boosts their operations and sales.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
If you were born in the 19th century or have done your homework on the Vodka industry, then the term “a fifth of vodka” is probably one you have encountered frequently. But exactly what is a fifth of vodka?
Well, wonder no more as that’s exactly what we’ll be looking into today.
Origin of the “Fifth”
Simply put, a fifth of vodka refers to the bottle that we nowadays commonly know as a 750 ml bottle; which is the popular market standard for selling vodka and a host of other alcoholic drinks. Back in the day, particularly in the mid-90s, such a bottle size was unheard of. The 950 ml, which in truth only held about 32 oz, was the standard size for vodka, especially from wholesalers.
In the 1980s, this unit of measurement was the legal threshold upon which distilleries in America were measured against and its name is derived from the fact that this volume roughly translates to a fifth of a gallon or 4/5 of a quart.
Introduction of the Metric System
30 years before the turn of millennium signaled the beginning of the end for the fifth and many other of its derivatives, as there was a push for the United States government to adopt a new standard (metric) in favor of the old system. All the relevant stakeholders eventually agreed on the proposed change and this heralded the birth of the six metric bottle sizes to be used as industry standards i.e. 750, 1000, 1750, 200, 50 and 100 ml.
Why do we still say a fifth of vodka?
It was a common practice to measure bottle sizes against a gallon in the previous century but those days are long gone. Though it’s not uncommon for you to hear the term at your local bar or liquor store particularly during wholesale transactions. It’s persistent usage over the years, however, is nothing scientific or technical but rather it is considered a somewhat fancy vodka slang that’ll earn you the respect of strangers at the bar as it gives off a vibe of someone who knows his/her liquor. It’s also probably a case of the old age adage ‘old habits die hard.’
So how many shots are there in a fifth?
Well, it’s only natural that we had to find out just how many shots you can squeeze out of a fifth of vodka and the answer to that is exactly 25 or 16 and here’s the math to back it up:
So a fifth of a gallon – a gallon being 128 fluid ounces in capacity – has in its entirety about 25 shots (25.6 to be exact) going by the assumption of an ounce-sized shot.
The standard size in the US though stands at 1.5 ounces for a typical shot so taking the above total and dividing it by the latter figure yields a total of 16 shot glasses with some change to spare. And that’s all you need to know about a fifth of vodka.
Hopefully, now you won’t be too green the next time a conversation about the fifth starts up. Maybe you’ll even hold your own.
One Comment
1. zvodret iluret December 5, 2018 at 9:45 pm - Reply
Sweet site, super style and design.
Leave A Comment |
doi:10.1002/2013WR015147 ISI:000333563900063 Selker, John S. Sander, Graham C. Steenhuis, Tammo Barry, David Andrew Kustas, William P. Learning from the scientific legacies of W. Brutsaert and J.-Y. Parlange Washington, American Geophysical Union Though the essence of the scientific literature is to be a repository of unaffiliated truths, scientific advancement fundamentally stems from the insights and efforts of individuals. This dichotomy can hide exemplars for young scholars of how to contribute to scientific understanding. This section of Water Resources Research addresses eminently successful strategies for advancement of the science of hydrology by exploring the ramifications of the work from Drs. Wilfried Brutsaert and Jean-Yves Parlange, colleagues who made many of the most significant contributions to the understanding of hydrologic processes of the last 50 years. The generous scope of the special section follows the key areas of their contributions, but the content looks forward from their work. Important and novel results span solute transport, infiltration, streamflow generation, and evaporation. 2014-03-03T10:22:09Z Text |
In the plastics industry, the Horizontal Injection Molding Machine is an aid to the production of products, but it has a decisive role. In order to shorten the finished product injection cycle, China Molding Machine Factory use high-speed injection molding machines to improve production efficiency. However, the horizontal injection molding machine will have screw slip phenomenon when producing finished products, which will cause certain problems for the production of the enterprise. The principle of the screwing of the horizontal injection molding machine is that after the screw feeds the material to the mold or the material enters the feeding port, the screw slips and cannot enter or retreat. The material gathers at the feeding port and cannot be normally transported to the end of the injection machine. The plasticizing stage is produced. There are many reasons for the plasticizing section, and the excessively cold end of the barrel is one of the main causes of screw slip. The barrel of the injection molding machine is divided into three sections, and the end is a feeding section. During the heating and compression process, a layer of melt film is formed on the screw. Without this film, the pellets are not easily transported to the front end. . The high water content of the resin is also the main cause of the screw slip of the injection molding machine. Especially for the hygroscopic material (such as nylon), improper drying will also significantly reduce the viscosity of the material, and water vapor will occur in the barrel, thus causing the screw The delivery ability is reduced. Therefore, when using materials such as PA, PC, PET, etc., the materials should be properly dried according to the instructions.
There are many reasons for the screwing of the horizontal injection molding machine. When the back pressure is too high, the end of the barrel is too hot or too cold, the barrel or screw is worn, the thread of the feeding section is too shallow, the hopper is infiltrated, the resin is wet, and the resin is excessively lubricated. The problem that the materials are too fine, the screw slip causes the material to degrade, and there is a shortage of materials that we often say. The prolonged molding cycle of these problems directly affects the quality of the product.
There are many ways to solve the screwing of the horizontal injection molding machine, in which the raw materials are sufficiently dried, the temperature of the feed inlet is lowered, the degree of screw wear is regularly checked, the screw speed is appropriately adjusted, and the most important method. The customer will do the corresponding preparations in the early stage of injection molding, and the efficiency will be relatively improved.
Horizontal Injection Molding Machine |
Web Results
In chemical nomenclature, the IUPAC nomenclature of organic chemistry is a systematic method of naming organic chemical compounds as recommended by the International Union of Pure and Applied Chemistry (IUPAC). It is published in the Nomenclature of Organic Chemistry (informally called the Blue Book). Ideally, every possible organic compound should have a name from which an unambiguous ...
Short Summary of IUPAC Nomenclature of Organic Compounds Introduction The purpose of the IUPAC system of nomenclature is to establish an international standard of naming compounds to facilitate communication. The goal of the system is to give each structure a unique and unambiguous name, and to correlate each name with a unique and unambiguous ...
IUPAC Nomenclature of cyclic compounds. i) The IUPAC name of an alicyclic compound is prefixed with "cyclo". E.g. ii) Cycles are seniors to acyclics. Hence when cyclic nucleus is attached to the non cyclic chain, it is always named as the derivative of the cyclic hydrocarbon irrespective of the length of the non cyclic chain.
Nomenclature 1.1 IUPAC Naming Conventions. Nomenclature is one of the most important prerequisites for answering organic chemistry questions on Test Day; if you don’t know which chemical compound the question is asking about, it’s hard to get the answer right!
IUPAC Naming. IUPAC names 1,2,3,4 can be generated for drawn structures in the sketcher. The name is generated in large font above the sketcher as you doodle. Please give it a try and let us know if you encounter any issues. A comparison table for IUPAC naming against two of our competitors is provided below.
IUPAC nomenclature rules can provide valuable structural and reactivity information. On the other hand, most people would be hard pressed to call dihydrogen monoxide by any other name but water, so both types of nomenclature have their place. Nomenclature leads naturally to formula writing. Compounds exist in distinct combinations of elements, and |
1 of 2 2 of 2
This June 25 marks the 110th birthday of George Orwell, the British journalist and writer best known for the dystopian society portrayed in Nineteen Eighty-Four.
The totalitarian surveillance state Orwell envisioned employs an all-encompassing network of television cameras and microphones to monitor and control an entire citizenry.
Nineteen Eighty-Four serves as a warning against the invasion of government into private space. However, as two scholars argued in 2007, Orwell’s work might have actually helped open the door for the acceptance of that very sort of subjugation.
In recent weeks, comparisons have been drawn between the intelligence structure described in Nineteen Eighty-Four and PRISM, the United States National Security Agency program revealed by the Guardian and Washington Post newspapers on June 6.
The NSA and its counterparts in the Canadian and British governments (CSEC and GCHQ, respectively) go far beyond the sort of camera-based intelligence structure that came to be known as “Big Brother” (named after the cloaked head of government and society in Nineteen Eighty-Four).
With PRISM, the U.S. government collects location details, emails, chat logs, videos, photographs, documents, and social network transactions, among other categories of data. A separate program revealed by the Guardian and Wall Street Journal is used to monitor telecommunications, including customer records and metadata collected from all major network providers in the United States.
The extent of post-9/11 surveillance operations renders direct comparisons to Orwell’s Big Brother inadequate. However, that is not to say they are wholly separate.
In a July 2007 essay titled “The Panopticon’s Changing Geography” published in The Geographic Review, Jerome Dobson and Peter Fisher trace the evolution of the surveillance state back to the Panopticon, an architectural concept developed by Samuel Bentham in the late 18th century.
“For 220 years the Panopticon has stood as the tangible symbol of total surveillance, discipline, and control,” they write. “Always it has been the utopian dream of some and hellish nightmare of others.”
Dobson and Fisher note that since the 1970s, the Panopticon has largely lost its literal meaning, and is instead more commonly used as a metaphor for surveillance and power relationships. (This idea was largely developed by the French philosopher Michel Foucault, as discussed in his seminal work, Discipline and Punish.)
Dobson and Fisher describe three stages through which the Panopticon has developed as a means of surveillance and control.
The first is physical; Bentham’s structural manifestation utilizes a circular design to maximize the optical advantage of those in authority to an extreme where a single operator can exert control over a large number of subjects. This literal version of the Panopticon has served as a source of inspiration for the construction of many prisons, though it has seldom been followed with precision.
Panopticon II is Orwell’s version, where technology in the form of cameras and microphones is used to drastically extend the reach of an operator’s visibility beyond a single building, throughout both the public and private spaces of an entire country. Dobson and Fisher argue that the proliferation of closed-circuit television cameras favoured by the British government, for example, suggests that western society is already far along in accepting the implementation of Big Brother-style surveillance (with security being the benefit for which the intrusion of privacy is accepted).
Graffiti on the wall of the British Library in London, presumably in protest against the proliferation of CCTV cameras in the area.
The third manifestation of the Panopticon focuses on location, utilizing human-tracking systems and employing devices such as mobile phones, computers connected to the Internet, or anything equipped with a global position system (GPS).
While Dobson and Fisher’s description of Panopticon III was constructed six years before the public learned about the scope of the NSA and partner governments’ intelligence-gathering operations, it is significantly closer in concept than the system described in Nineteen Eighty-Four. (However, Dobson and Fisher failed to note that location is only one piece of metadata created by a telephone call or interaction with the Internet, and that many others can be monitored just as easily.)
“All three Panopticons are designed to maintain continuous surveillance, reduce the cost of surveillance, and improve the efficiency of surveillance,” Dobson and Fisher write. “In the first two, absolute control over human actions was an express purpose of the proposed surveillance. Both were designed solely as instruments of government or commerce that required total submission to absolute authority.”
Panopticon III is different because of the benefits its tools offer to those being watched; namely, communication and entertainment. “Panopticon III is seductive,” Dobson and Fisher continue. “It is less confining, less visible, and therefore less frightening than its predecessors….Indeed, the simplest devices are carried willingly and obsessively by the watched.”
In a section of the paper subtitled “Orwell’s Wolf”, Dobson and Fisher suggest one reason societies may act complacently in the face of government overreach may be the proliferation of the themes presented in Nineteen Eighty-Four.
“By any reasonable measure, Panopticon III is bound to have an impact on society that will be far greater in magnitude than the actual application of Bentham’s Panopticon and more predictably certain than Orwell’s Big Brother,” they explain. “Why so little interest? It may be due in part to Orwell’s over-the-top success in “crying wolf.” He cried it so well, and the cry was repeated so fervently so often by so many, that most people eventually became inured. After a while, the cry of Big Brother lost its sting.”
The full text of Dobson and Fisher’s “The Panopticon’s Changing Geography” is available here. Sections of Michel Foucault’s Discipline and Punish are available in a preview at Google Books here. |
Combination Homework Help
Introduction to Combination
A Combination is an arrangement of items in which order does not matter. To find the number of Combinations of n items chosen r at a time, you can use the formula
nCr = n!/r!(n-r)! where 0 ≤ r ≤ n
Example for Combination
A class consists of 14 boys and 17 girls. Four students from the class are to be selected to go on a trip.
(a) How many different possibilities are there for the 4 students selected to make the trip?
(b) If it has been decided that 2 boys and 2 girls will make the trip, then in how many different ways could the 4 students be selected?
(a) C(31,4) = = 31,465
(b) C(14,2) ! C(17,2) = 91 ! 136 = 12,376
Number of combinations: The number of all combination of n things, taken r at a time is:
nCr=n!/R!(n-1)! = (n(n-1)(n-2)….to r factors)/r!
An Important Result:
nCr=1 and nCr = nC(n-r)
combination homework help example
combination homework help
Combination Assignment Help |
Transferable Skills
What are Transferable Skills?
As a graduate searching for employment, you will likely come across the term transferable skills and wonder what’s meant by this. This is a specific set of skills that don’t belong to a particular niche, industry or job; they are general skills that can be transferred between jobs, departments and industries (hence the name).
Employers often value these skills because they can be used in so many ways in the workplace. Transferable skills are those that you develop as you progress through employment, education or training. Communication, problem solving and teamwork are all examples of transferable skills because they can be used in any employed role, your education or vocational training.
As such, it is important that you emphasise your transferable skills throughout your application documents and during your interview. These skills can go a long way to persuading a potential employer that you are the perfect fit for their company, even if you don’t necessarily have the experience.
Transferable skills are the tools you'll need to adapt to any new job.
The Importance of Transferable Skills
If you want to secure a graduate opportunity, you are going to have to demonstrate a specific set of skills needed for the role. Some of these skills will be specific to the industry while others (transferable skills) are those that you can build on and develop throughout your career.
Transferable skills tend to bring the following benefits for candidates and employers:
• Flexibility. In an increasingly competitive jobs market, companies want to recruit employees who can diversify and complete multiple tasks and roles. When you have a diverse skill set, this will set you apart from the other applicants and shows you have greater flexibility.
• Diversity. The more transferable skills you have, the more diversity you can offer to a potential employer. The experiences that you have had during your studies, work experience or academic projects have all allowed you to develop a range of skills, many of which can be put to good use in any role.
• Portability. The nature of transferable skills means they can be taken with you when you move jobs. As you progress, the skills that you currently have will improve and you will also gain new ones too.
• Employability. Even if you have very little work experience, building a strong CV around your transferable skills will strengthen your chances of success. Although you may not have direct work experience, these transferable skills will demonstrate that you can adapt to new demands.
The Top 10 Transferable Skills for Graduates
A complete list of transferable skills is beyond the scope of this article, so we’ve put together a list of the ten we consider most important. Without further ado:
1) Business Strategy
Understanding business strategy is a fundamental skill, whether you are joining a small business or a large corporation. The term business strategy is used to describe a set of actions, plans and goals concerning how the business intends to compete in a particular market with a specific product or service offering.
Developing a business strategy and implementing it is certainly not easy, but understanding what is required to achieve this is the key. This transferable skill is about understanding how to put together a strategy which involves careful planning, knowledge of the market and defining organisational goals. These skills would be beneficial in any role, from sales through to finance.
2) Leadership and Team Management
Effective leadership and management involves taking charge and motivating others to achieve specific goals on an individual, team and company level. Possessing leadership and team management skills will mean that you can effectively manage groups and delegate responsibilities, plan and coordinate a variety of tasks, solve problems and resolve conflict, make and implement decisions and coach others.
These skills don’t necessarily have to be workplace-related. They can be acquired through a group project at university, a period of work experience or time spent carrying out voluntary work.
3) Problem Solving
Every business encounters issues and if you can demonstrate your ability to solve problems, this will be a major bonus for your application. Some problems are easier to solve than others and often they relate to the achievement of goals and the barriers that prevent these goals from being achieved.
4) Teamwork Ability
Collaborative working is a must for any organisation. Employers want to see their staff work together toward the achievement of common goals. Effective teamwork involves sharing credit and accepting responsibility for your own work, being receptive to the ideas and suggestions of your colleagues, building rapport with staff across all areas of the business and establishing effective communication channels to avoid duplicated work, mistakes or other problems.
5) Data Analysis
Being able to analyse data is a key task in many different businesses. From identifying patterns to understanding customer metrics, the ability to evaluate information effectively will contribute in some way to the business.
The complexity of this analysis will depend on the company and the specific role, but an aptitude for interpreting information, extracting results and developing reports is a valuable transferable skill. An employee should be able to use databases to collect data, analyse it and then interpret the information they have collected. Data collection and analysis is relevant to many different roles, from finance and IT through to marketing and sales.
6) Communication Skills
Being able to communicate well is perhaps one of the most basic employability skills. Verbal communication is about communicating clearly and concisely with others, whether it is a customer or colleague. In the world of work you will be required to present information to a range of audiences both inside and outside the business. Not all of these people will have an understanding of your work, so being able to communicate with clarity, articulating your ideas in a logical, organised and effective way is important.
Written communication is also important. Good writing skills are as important as being able to speak to someone clearly. Many employees will be asked to prepare reports and explain specific information about products, services and business operations. The majority of written communications are created to encourage the reader to take some form of action, so you must be able to demonstrate a natural ability to write persuasively and engage the reader.
7) Time Management
Time management is a way in which you organise and plan your time to carry out specific activities. Effective time management boosts productivity, meaning that you can complete more work in less time, even when you are working under pressure. Good time management is about planning your day, minimizing distractions and carrying out regular reviews to make sure that you are making progress.
A significant factor in time management is prioritization, and it is only with practice that you can learn to prioritise your tasks more effectively, focusing on the most urgent tasks rather than less important activities.
8) Work Ethic
Having a strong work ethic is often part of your own values. It is based on a personal understanding of taking pride in your work because you want to, rather than the rewards that you may receive.
Demonstrating a positive approach to work and being honest - as well as taking the initiative and caring about your co-workers - are all factors that convey a strong work ethic. In addition, learning new skills, showing a commitment to your employer and being responsible for your own work even when things don’t go as you planned, all illustrate a good work ethic.
9) Commercial Awareness
Showing that you understand the marketplace in which your employer operates, as well as knowing what makes a business successful, is a key requirement in many jobs and even more important when applying for graduate vacancies. Once appointed you will be able to offer a more tailored level of customer service and support the business better if you demonstrate keen commercial awareness. This could include:
• Fully understand the company’s mission and aims
• Demonstrating your knowledge of the sector and your awareness of the economic and political issues that affect the business
• Knowing who the major competitors are
• Understanding the commercial priorities of the business
10) Listening and Providing Feedback
Listening is the ability to understand and interpret messages and it is key to all successful communication. Poor listening skills result in a breakdown in communication, as well as irritation or frustration. Better listening skills - and consequent feedback - can boost service delivery, increase productivity and create better information sharing.
Which Jobs Require Transferable Skills?
Although transferable skills may be role-related, many of them can be used in a range of different industries. Below we’ve looked at which transferable skills are most likely to be preferred for three different industries.
Transferable Skills in Retail
Among the most desired transferable skills for the retail sector are communication, customer service and teamwork.
Transferable Skills in Management
General management skills are highly sought after, as a good manager will be able to transfer easily between sectors. The key skill that can be transferred to different roles is leadership. An individual who can demonstrate the ability to lead, manage and motivate a team would be highly desirable to any recruiter.
Transferable Skills in Not For Profit
Within this sector, skills such as problem solving, communication, data analysis and teamwork are essential. Possessing any of these skills would be useful when dealing with large organisations or a diverse range of individuals, from local community organisations through to corporate decision-makers.
Emphasising Transferable Skills In Your CV Or Interview
Once you have identified what transferable skills you have, ensure that you incorporate them into your CV. If you have very little work experience, then a functional CV focused on your skills rather than your experience would be more effective.
Demonstrate how you used your skills in a specific scenario - giving a brief synopsis of the situation, what you did and the outcome. Try to make your CV achievements focused. Strategically place transferable skills throughout your CV, including in a brief professional summary section which describes you, your skills and your qualities in about six to seven lines at the top of the CV. This is designed to catch the attention of the recruiter and encourage them to read further.
When it comes to the interview, you can expand on your CV in more detail, providing specific examples of when you demonstrated commercial awareness or solved a problem. It’s one thing saying that you have a specific skill - demonstrating that you can use it effectively is very important.
Further Reading
You may also be interested in the following similar articles on WikiJob: |
Plant Science
Plant Science
There is no doubt, that cannabis can have powerful effects. It is a pleasant quirk of nature, that the substances cannabis produces have psychoactive and medicinal properties. The day-to-day tactics evolved by marijuana to survive the harsh demands of raw nature means a delicious range of useful substances for human beings.
Cannabis has developed strategies using volatile compounds produced in resin glands to repel water, to insulate, and to fend bugs off. Zamnesia knows your brain likes trichomes, that produce lots of cannabinoids, terpenes, terpenoids and flavonoids. Our easy to navigate cannabis encyclopaedia will show you all the factors of these compounds.
Age Verification 18+
|
Kamus Online
suggested words
Hasil cari dari kata atau frase: To have a bee in the bonnet (0.00925 detik)
Found 1 items, similar to To have a bee in the bonnet.
English → English (gcide) Definition: To have a bee in the bonnet Bee \Bee\ (b[=e]), n. [AS. be['o]; akin to D. bij and bije, Icel. b[=y], Sw. & Dan. bi, OHG. pini, G. biene, and perh. Ir. beach, Lith. bitis, Skr. bha. [root]97.] 1. (Zo["o]l.) An insect of the order Hymenoptera, and family Apid[ae] (the honeybees), or family Andrenid[ae] (the solitary bees.) See Honeybee. [1913 Webster] Note: There are many genera and species. The common honeybee (Apis mellifica) lives in swarms, each of which has its own queen, its males or drones, and its very numerous workers, which are barren females. Besides the Apis mellifica there are other species and varieties of honeybees, as the Apis ligustica of Spain and Italy; the Apis Indica of India; the Apis fasciata of Egypt. The bumblebee is a species of Bombus. The tropical honeybees belong mostly to Melipoma and Trigona. [1913 Webster] 2. A neighborly gathering of people who engage in united labor for the benefit of an individual or family; as, a quilting bee; a husking bee; a raising bee. [U. S.] [1913 Webster] The cellar . . . was dug by a bee in a single day. --S. G. Goodrich. [1913 Webster] 3. pl. [Prob. fr. AS. be['a]h ring, fr. b?gan to bend. See 1st Bow.] (Naut.) Pieces of hard wood bolted to the sides of the bowsprit, to reeve the fore-topmast stays through; -- called also bee blocks. [1913 Webster] Bee beetle (Zo["o]l.), a beetle (Trichodes apiarius) parasitic in beehives. Bee bird (Zo["o]l.), a bird that eats the honeybee, as the European flycatcher, and the American kingbird. Bee flower (Bot.), an orchidaceous plant of the genus Ophrys (Ophrys apifera), whose flowers have some resemblance to bees, flies, and other insects. Bee fly (Zo["o]l.), a two winged fly of the family Bombyliid[ae]. Some species, in the larval state, are parasitic upon bees. Bee garden, a garden or inclosure to set beehives in; an apiary. --Mortimer. Bee glue, a soft, unctuous matter, with which bees cement the combs to the hives, and close up the cells; -- called also propolis. Bee hawk (Zo["o]l.), the honey buzzard. Bee killer (Zo["o]l.), a large two-winged fly of the family Asilid[ae] (esp. Trupanea apivora) which feeds upon the honeybee. See Robber fly. Bee louse (Zo["o]l.), a minute, wingless, dipterous insect (Braula c[ae]ca) parasitic on hive bees. Bee martin (Zo["o]l.), the kingbird (Tyrannus Carolinensis ) which occasionally feeds on bees. Bee moth (Zo["o]l.), a moth (Galleria cereana) whose larv[ae] feed on honeycomb, occasioning great damage in beehives. Bee wolf (Zo["o]l.), the larva of the bee beetle. See Illust. of Bee beetle. To have a bee in the head or To have a bee in the bonnet. (a) To be choleric. [Obs.] (b) To be restless or uneasy. --B. Jonson. (c) To be full of fancies; to be a little crazy. “She's whiles crack-brained, and has a bee in her head.” --Sir W. Scott. [1913 Webster] Bonnet \Bon"net\ (b[o^]n"n[e^]t), n. [OE. bonet, OF. bonet, bonete. F. bonnet fr. LL. bonneta, bonetum; orig. the name of a stuff, and of unknown origin.] 1. A headdress for men and boys; a cap. [Obs.] --Milton. --Shak. [1913 Webster] 2. A soft, elastic, very durable cap, made of thick, seamless woolen stuff, and worn by men in Scotland. [1913 Webster] And p?i?s and bonnets waving high. --Sir W. Scott. [1913 Webster] 3. A covering for the head, worn by women, usually protecting more or less the back and sides of the head, but no part of the forehead. The shape of the bonnet varies greatly at different times; formerly the front part projected, and spread outward, like the mouth of a funnel. [1913 Webster] 4. Anything resembling a bonnet in shape or use; as, (a) (Fort.) A small defense work at a salient angle; or a part of a parapet elevated to screen the other part from enfilade fire. (b) A metallic canopy, or projection, over an opening, as a fireplace, or a cowl or hood to increase the draught of a chimney, etc. (c) A frame of wire netting over a locomotive chimney, to prevent escape of sparks. (d) A roofing over the cage of a mine, to protect its occupants from objects falling down the shaft. (e) In pumps, a metal covering for the openings in the valve chambers. [1913 Webster] 5. (Naut.) An additional piece of canvas laced to the foot of a jib or foresail in moderate winds. --Hakluyt. [1913 Webster] 6. The second stomach of a ruminating animal. [1913 Webster] 7. An accomplice of a gambler, auctioneer, etc., who entices others to bet or to bid; a decoy. [Cant] [1913 Webster] 8. (Automobiles) The metal cover or shield over the motor; predominantly British usage. In the U.S. it is called the hood. [Brit.] [Webster 1913 Suppl.] Bonnet limpet (Zo["o]l.), a name given, from their shape, to various species of shells (family Calyptr[ae]id[ae]). Bonnet monkey (Zo["o]l.), an East Indian monkey (Macacus sinicus ), with a tuft of hair on its head; the munga. Bonnet piece, a gold coin of the time of James V. of Scotland, the king's head on which wears a bonnet. --Sir W. Scott. To have a bee in the bonnet. See under Bee. Black bonnet. See under Black. Blue bonnet. See in the Vocabulary. [1913 Webster]
Cari kata di:
Custom Search
Touch version | Android | Disclaimer |
TLC\ Archive
All TLC Volumes and Issues
Teaching Generation Z: Methodological problems and their possible solutions
The focus of the article is on the younger generation of today, which is referred to as Generation Z. The theoretical grounding is based on the Strauss-Howe Generational Theory. The paper discusses lack of motivation to study efficiently and looks into the reasons for misunderstanding which often arises among students and teachers born a few generations earlier. Analysis proves the significance of the difference in values and worldview influenced by various venues, circumstances and surroundings that are unique for each generation. Online games, computerisation, communication via text messages and inability to read the context are mentioned among the features of Generation Z. Difference in the attitude to work and studies is explained with the continuous ‘information noise’ and special hypertextual perception of reality that influences the personal and social life of Generation Z representatives. The article suggests a number of steps to optimise the teaching process with the coming generation of students.
KEYWORDS: context reading, computerisation, fan fiction, Generation Z, hypertext, motivation, text messages, theory of generations
Svetlana Popova. CSc in Linguistics, Lecturer at Peoples’ Friendship University of Russia (RUDN University). Research interests cover Linguistics, English teaching methodology, Internet Network Expansion, gamification and computerisation of society and their implications for teachers and students.
TLC Submission Guidelines
Before you proceed to submit your paper, please make sure it meets our requirements |
The Weight of Silence Quiz | Four Week Quiz A
Heather Gudenkauf
Buy The Weight of Silence Lesson Plans
Name: _________________________ Period: ___________________
This quiz consists of 5 multiple choice and 5 short answer questions through Sections 851-1604.
Multiple Choice Questions
1. What do Antonia and Louis try to do?
(a) Embrace the person.
(b) Pet the rabbit.
(c) Catch the dog.
(d) Take a picture of the deer.
2. How does Antonia seem with her answers when questioned by Fitzgerald?
(a) Indifferent.
(b) Flippant.
(c) Not very bright.
(d) Distraught.
3. What does Fielda do as Martin is involved in finding Petra?
(a) Calls other family members.
(b) Creates flyers.
(c) Organizes a search party.
(d) Waits at home.
4. What do the testers find wrong with Calli?
(a) She is autistic.
(b) She should be using her left hand instead of her right hand.
(c) Nothing aside from her muteness.
(d) She has cross-dominance.
5. How does Calli think her father has crossed a line?
(a) By separating her from Antonia and Ben.
(b) By dragging her barefoot.
(c) By not leaving her alone in the woods.
(d) By hitting her.
Short Answer Questions
1. How does Ben see himself?
2. What does Calli do when her father is drinking?
3. What did Calli's kindergarten teacher think of Calli at first?
4. How does Antonia find herself in an unhappy marriage?
5. What does Calli know as far as wood lore?
(see the answer key)
This section contains 289 words
(approx. 1 page at 300 words per page)
Buy The Weight of Silence Lesson Plans
Follow Us on Facebook |
Ocena brak
A cat in the rain - Ernest Hemingway
Autor /Dacjan Dodano /10.11.2011
Ernest Hemingway, who is now believed to be one of the best writers ever, was born in 1899 in America. As the research shows, his life was always filled with adventures connected with his job - he worked as a reporter. He also survived both world wars and worked as a corespondent then. The writer who was a legend during his own lifetime, stands as a monument to the power of literature and could easily be considered as the most influential American writer of this century. He was an icon, partly myth and partly mythmaker, a genius and hero to many, whereas to others he was a writer obsessed with masculinity, violence and death.
When we commemorate him, what we will remember, the legends or the man? For many, the two are one in the same. We might read his work and ask who he was? Often the plots of his stories and novels fill in the sketchy details about his life. We might know he came from the Midwest, that he somehow took part in both world wars, and spent a great deal of time in Europe. Also that he loved to write, box, hunt, fish, drink, and travel until he committed suicide.
So many young people admire Hemingway, and identify with him. Maybe it is because his appeal is so great. Many readers envy him as he represents so much of what a young person wants to have: independence, experience, confidence, strength, courage and talent. And also because his style of writing differs from the one used by most writers. For example his novels use very simple words encouraging young readers to take a look at the story. Secondly, most people find his almost photographic descriptions of places very absorbing. Another important aspect are weather descriptions, which usually constitute substantial part in his writing and introduce the readers into the atmosphere of a story.
The symbolic of Hemingway's characters', though they are mostly men, is another example of his fascinating techniques . "A cat in the rain" is thought to be an exception from that rule, because here the main role plays a woman. On the other hand this short story of a girl, who feels dreary in the relation between her and her husband, is an ideal recapitulation of Hemingway's philosophy. He believed that people are isolated, lonely and not able to establish happy relationships. Unfortunately, though he was one of the greatest men ever, his depressive thoughts led him to a suicide in 1969.
Podobne prace
Do góry |
Mary Tyler Moore and Workplace Equality
When Mary Tyler Moore passed away this week at the age of 80, the world lost a very talented performer. But the world also lost a woman that made a difference for other women. In the 1970s, through her TV show The Mary Tyler Moore Show – which she co-created and co-produced, as well as starred in – Moore helped to change attitudes about workplace equality.
Dan McGarry, who teaches human resource management at Seneca College in Ontario, sent me this post, which he also put on his course website. He wanted to tell his students how important Moore’s television show was in depicting the barriers that women faced at work.
Mary Tyler Moore’s name may mean very little or nothing to most of you, except that you heard that she passed away yesterday. However her television show, which used just her name, was a groundbreaker when it was first aired starting in 1970. Her character of Mary Richards was the first ‘career woman’ portrayed as the primary character in a TV show. 30-something, unmarried and unattached, she demonstrated something new in the mass media: a woman who could ‘make it on her own’. (more…)
Anita Hill, Two Decades Later
Unions, Feminism, and the Fortress Mentality
When a movement for social change is struggling, what’s the best strategic response? Is it to protect and nurture what’s been achieved? Or is it to attempt to become even bigger, and risk undermining the progress that’s already been made?
A few weeks ago, former union organizer Rich Yeselson wrote a provocative article titled Fortress Unionism. In the article, (more…) |
Page:Popular Science Monthly Volume 44.djvu/238
From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.
animal or plant which is well adapted to its conditions of life is more likely to live than an animal which is ill adapted. I have some difficulty in imagining how any other arrangement can even be supposed possible. It seems to be almost an identical proposition that the healthiest and strongest will generally live longest; and the conception of a "struggle for existence" only enables us to understand how this results in certain progressive modifications of the species. If we could even for a moment have fancied that there was no pain and disease, and that some beings were not more liable than others to those evils, I might admit that the new doctrine has made the world darker. As it is, it seems to me that it leaves the data just what they were before, and only shows us that they have certain previously unsuspected bearings upon the history of the world.
One other point must be mentioned. Not only are species interdependent as well as partly in competition, but there is an absolute dependence in all the higher species between its different members which may be said to imply a de facto altruism, as the dependence upon other species implies a de facto co-operation. Every animal, to say nothing else, is absolutely dependent for a considerable part of its existence upon its parents. The young bird or beast could not grow up unless its mother took care of it for a certain period. There is, therefore, no struggle as between mother and progeny, but, on the contrary, the closest possible alliance. Otherwise life would be impossible. The young being defenseless, their parents could exterminate them if they pleased, and by so doing would exterminate the race. This, of course, constantly involves a mutual sacrifice of the mother to her young. She has to go through a whole series of operations, which strain her own strength and endanger her own existence, but which are absolutely essential to the continuance of the race. It may be anthropomorphic to attribute any maternal emotions of the human kind to the animal. The bird, perhaps, sits upon her eggs because they give her an agreeable sensation, or, if you please, from a blind instinct which somehow determines her to the practice. She does not look forward, we may suppose, to bringing up a family, or speculate upon the delights of domestic affection. I only say that as a fact she behaves in a way which is at once injurious to her own chances of survival and absolutely necessary to the survival of the species. The abnormal bird who deserts her nest escapes many dangers; but if all birds were devoid of the instinct, the birds would not survive a generation.
Now, I ask, what is the difference which takes place when the monkey gradually loses his tail and sets up a superior brain? Is it properly to be described as a development or improvement of |
Reactive Depression
Ask a question
Reactive depression is a form of depression caused by a significant event or excessive psychological pressure. Reactive depression affects vulnerable people for whom a dramatic event will result in depression. It can be a serious matter, such as an accident or death, or even events that seem trivial.
People dealing with reactive depression are prone to intense crying, have trouble sleeping, and have the classic symptoms of depression: sadness, loss of interest and motivation, withdrawal, mental and motor slowing, and behavior changes.
Reactive depression is usually treated with antidepressants, complemented by psychotherapeutic care. |
msBahasa Malaysia
Know the basics
What is lymphoma?
Lymphoma refers to a kind of cancer that starts in infection-fighting cells of the immune system, which is called lymphocytes, including lymph nodes, spleen, thymus, bone marrow, and other parts of the body. To be more specific, it is a condition of the lymphatic system that is supposed to be the network of fighting disease in your body. Having lymphoma means that lymphocytes change and grow out of control.
Lymphoma consists of many types, but the two main categories of lymphoma are Hodgkin’s lymphoma and non-Hodgkin’s lymphoma.
How common is lymphoma?
This health condition is not common but it can affect the older and male more than other people. It can be managed by reducing your risk factors. Please discuss with your doctor for further information.
Know the symptoms
What are the symptoms of lymphoma?
The common signs and symptoms of lymphoma are:
• Swollen glands, often in the neck, armpit, or groin;
• Cough, shortness of breath;
• Fever, itching;
• Night sweats;
• Stomach pain, back or bone pain;
• Fatigues, lack of energy;
• Weight loss;
• Chills;
• Loss of appetite;
• Lymphedema;
• Neuropathy;
• Blood in the stool or vomit;
• Blockage of urine flow;
• Headaches;
• Seizures.
When should I see my doctor?
• You have swelling in the neck, armpit, or groin, or unexplained swelling in an arm or leg.
• If fevers, chills, unexplained weight loss, night sweats, lack of energy and itching persist for more than a few days.
Know the causes
What causes lymphoma?
Lymphoma is one of the cancers that the cause is still unknown, even it is the fact that it is more likely to occur in certain people.
Know the risk factors
What increases my risk for lymphoma?
There are many risk factors for lymphoma, such as:
• If you are in your 60s or older;
• If you are male;
• If your immune system is weak from HIV/AIDS, an organ transplant, or because you were born with an immune disease;
• If you have an immune system disease such as rheumatoid arthritis, Sjögren’s syndrome, lupus, or celiac disease;
• If you have been infected with a virus such as Epstein-Barr, hepatitis C, human T-cell leukemia/lymphoma (HTLV-1), or human herpesvirus 8 (HHV8);
• If you have a close relative who had lymphoma;
• If you were exposed to benzene or chemicals that kill bugs and weeds;
• If you were treated for Hodgkin or non-Hodgkin lymphoma in the past;
• If you were treated for cancer with radiation;
• If you are overweight.
Understand the diagnosis & treatment
How is lymphoma diagnosed?
To diagnose your lymphoma, you doctor may ask you answer some questions about your feeling, the time you first notice changes, if and where you have pain, your appetite, if you have lose weight, if you feel tired or weak, if you have ever been treated for lymphoma or another cancer, any infections or illnesses you used to have, if any cancers run in your family.
Then, your doctor can check your signs of lymphoma and feel for swollen lymph nodes. If you have this symptom, it doesn’t mean that you have cancer. You can have an infection which is unrelated to cancer causes swollen lymph nodes.
To check for cancer cells, a lymph node biopsy is required. For this test, your doctor can be able to remove all or part of a lymph node, or use a needle to take a small amount of tissue from the affected node.
In case your doctor wishes to know how far the lymphoma has spread, you can be asked to have blood test to check the number of certain cells in your blood, bone marrow aspiration or biopsy to look for lymphoma cells, chest X-ray – which uses radiation in low doses – to make images of the inside of your chest, MRI with powerful magnets and radio waves to make pictures of organs and structures inside your body, or PET scan associated with radioactive substance to look for cancer cells in your body.
A molecular test can be also ordered to help your doctor know if you have any changes to genes, proteins, and other substances in cancer cells so that they can determine which type of lymphoma you have.
How is lymphoma treated?
Based on the type of lymphoma you have and how far it has spread, your doctor can choose the treatment for you.
If you are diagnosed with non-Hodgkin lymphoma, you can be recommend to choose chemotherapy, which means that you have to use drugs to kill cancer cells; radiation therapy which uses high-energy rays to eliminate cancer cells; immunotherapy with uses of your body’s own immune system to attack cancer cells.
In case you are having Hodgkin lymphoma, your treatment can be chemotherapy and radiation therapy. Even such treatments can’t help you with the disease, a stem cell transplant can be ordered. The first step is that you are given very high doses of chemotherapy to destroy cancer cells. The side effect of this is that it also kills stem cells in your bone marrow that make new blood cells. The next step is that you have to get a transplant of stem cells to replace the ones that were destroyed.
Lifestyle changes & home remedies
What are some lifestyle changes or home remedies that can help me manage lymphoma?
The following lifestyles and home remedies might help you cope with lymphoma:
• You should change your diet which is fit to your condition after discussing with your doctor;
• You should do exercise that can help you feel better during your treatment, like walking or swimming;
• You might also try alternative therapies like relaxation, biofeedback, or guided imagery to relieve pain.
Want to live your best life? |
Cultural Differences
Matters of Trust
call center experience
Design for Social Good
Social engineering is way of designing products and situations which actively encourage people to behave in a desired way — Nudging for Good. EDF Challenge “Sharing energy in the city, 2030” seems an ideal circumstance for social engineering for the greater social good. The basic question is how do we as designers find ways to incentivize individuals to save energy? How do we make a bit of personal sacrifice an attractive option for most? How do we “nudge” people to behave in a socially responsible ways when it comes to energy use? First, it makes sense to break up the problem into several user categories: personal energy sharing, family sharing, neighborhood or community sharing, city or village sharing. At each level we expand the circle to involve more and more individuals, and so we need a different approach for each category. Each category has a set of pressure points on which social engineers can apply pressure to achieve the desired changes. Once we identify the user groups targeted for “nudging”, game theory can be used to find the most attractive options. While there are numerous strategies that can be borrowed from game theory to incentivize the desired energy sharing behavior,…
Language and Cultural Differences in Communication
Kulula Plane Decorations
Above is an example of Interface Design — Kulula Airlines decorates its planes in a very playful manner. Does this choice make you feel safer or more reticent to fly their planes? Well, that depends… Consider the FAA Passenger Briefing Guidelines: 14 CFR 91.519. Below are a few examples: § 91.519 Passenger briefing. (a) Before each takeoff the pilot in command of an airplane carrying passengers shall ensure that all passengers have been orally briefed on: Smoking. Each passenger shall be briefed on when, where, and under what conditions smoking is prohibited. This briefing shall include a statement, as appropriate, that the Federal Aviation Regulations require passenger compliance with lighted passenger information signs and no smoking placards, prohibit smoking in lavatories, and require compliance with crewmember instructions with regard to these items; Use of safety belts and shoulder harnesses. Each passenger shall be briefed on when, where, and under what conditions it is necessary to have his or her safety belt and, if installed, his or her shoulder harness fastened about him or her. This briefing shall include a statement, as appropriate, that Federal Aviation Regulations require passenger compliance with the lighted passenger sign and/or crewmember instructions with regard to…
Language, Culture, and Communication
Where we come from — our background culture: our country of origin and language, our heritage and religion (or lack there of), our family, our education, our friends, and where we live — has an enormous impact on our ability to communicate. What’s more, when people from different cultural backgrounds try to interact with each other, these differences can cause catastrophic failures. Direct versus Indirect Communication Styles Consider the following set of remarks about doing homework: Do your homework! Can you start doing your homework? Would you mind starting your homework now? Let’s clean the table so you can start your homework. Do you need help with homework? It’s getting late, do you have a lot of homework? Didn’t you say you have a lot of homework? Johnny’s mom said that he has a lot of homework today… Do you have everything ready for school tomorrow? Look how late it is — it’s almost time for bed. You have school tomorrow. Each of the statements above represents a progressively less direct command to do homework. In my family, I usually pick number 2 to communicate my desires for finished homework to my sons (although number 1 is perfectly acceptable, to…
Tools to Jump-start Product Design Process
product design proposal: user groups
I often encounter the Blank Page Syndrome among our clients. They have an IDEA, but find it difficult to translate the nebulous desires into plans and actions that become a business. I hear a lot: “I know what I want, I just don’t know how that gets translated into something tangible.” The problem though is that most times, these individuals don’t know what they really want. And my job as a designer is to do product design therapy to uncover the real needs and separate them from vague desires. There are a few strategies for this (cognitive scaffolding for the design process). From the point of view of the final product, it is important that the client buys into the ideas and makes them their own. When I hear my words spoken back to me a few weeks into the process, I feel more confidant that the final result will be the practical manifestation of my client’s desires. Define the Categories of Product Users When one runs a business, selling products or providing services, it’s important to keep in mind that in most cases it’s not about you (typical mirroring error). The products and services have to appeal to end…
Some Examples of Design Failure in Physical Space
square wheeled bike
Affordance is a feature of an object or an environment that suggests a set of possible actions/interaction that a user of such object/environment can perform with it. For example, if an object has a handle (e.g. tea cup), a user can reasonably expect to pick it up via that handle without spilling the contents of the cup. On the other hand, no one has an expectation of the wheels of the bike below turning… We all recognize the bike above as an art piece. As a connoisseur of design failure, I regularly get emails with collections of failed design objects or situations. When I get enough to share, I usually post them on this blog. Bathrooms design fails seem to be a favorite, but there are others… Enjoy! (or my personal experience in The Hague) Some problems arise when the design specks change over time, like the size of a toilet paper roll versus the toilet paper holder… Some problems arise when the maps are out of date… or Some are due to timing and lack of built-in error handling… But some design solutions are there to fix the problem of cultural differences:
Cultural Differences in Interaction Design, a few observations
A couple of months ago, I went on the business trip to The Hague and Amsterdam. There are always cultural differences, especially when a person visits a previously unfamiliar place. And so it was with me. Here are two quirky examples. The Room with a View I’m not particularly prudish or modest, especially when staying alone in a hotel room. But this feature of my room in The Hague was a bit puzzling. The shower and toilet were connected to the room not only by a door (with lock), but also by a picture window. The window coverings were controlled from the OUTSIDE of the bathroom — so effectively, if you were sharing a room, you were at a whim of your roommate when it came to your toilet privacy. But perhaps that’s how they roll in The Hague… I should also add that directly opposite of the toilet window was the window to the outside — if you haven’t considered what internal lighting does to your visibility to the outside world in time, you are out of luck. The Double Action As a designer, most of my work in web-based. But this doesn’t stop me from being annoyed at… |
Duong T. California
Equality and Justice
Racial Injustice
Dear Next President,
What is the difference between equality and justice? Equality is every person can stand in the United States no matter they were Black, Asian, Hispanic, Jewish or any others race else. But those people receives a different treat of how Americans do to them. Justice is despite of who they are, what race they were, those people receives a same treat of how Americans do to them. We cannot tell people still having a negative looks about others race but the way they did, the way they treated is never erase to the society. Example of the protest in North Carolina, a black man was shot to death when the police tells he was holding a gun but his family had said he was waiting for his children to pick them up. Then why this is a problem? In 2016, the statistics of black people had been killed by the police is 51.1 percent out of 12,765 people were killed by the police. We need justice for those people who receives lost, injured, and racist. Not all black people is bad because no one knowing their history, their life, and what they had been pass through so don’t look them by your eyes, look them by your heart to feel. To Black people, Asian, Hispanic, Jewish and any others race, give them the justice that they can stand in United States and to be proud of the citizens.
Santa Clara High School
Seniors in ERWC @ SCHS
All letters from this group → |
Fifth Grade Math
Chapter 3: Divide Whole Numbers and Decimals
Lesson 3.1: Relate Multiplication and Division
Dividend - A number to be divided
Divisor- The number by which a dividend is divided.
Quotient- The answer to the division problem.
Fact Family- A group of related facts using the same number.
Lesson 3.2: Explore Dividing by 1-digit Divisors
Remainder- In division, a number that is left after the quotient is found.
Lesson 3.5: Estimate Quotients
Compatible Numbers- Numbers that can be divided mentally without a remainder.
Lesson 3.9: Explore Dividing Decimals by Decimals
Power of 10- A number obtained by raising 10 to an exponent.
Chapter4: Data Statistics and Graphs
Lesson 4.1: Explore Collecting, Organizing and Displaying Data
Data (datos) - Collected information
Frequency Table (tabla de frecuencia) A way of organizing a set of data, showing the number of times each item or number appears.
Frequency (frequencia) - the number of times a response occurs.
Survey (encuesta) a method to gather data that involves asking people questions.
Line Plot (plano lineal) - A graph that uses columns of X's above a nuber line.
Lesson 4.2: Range, Mode, Median, and Mean
Range (rango)- The difference between the greatest andthe least number in a set of numbers.
Mode (moda)- The number that occurs most often in a set of numbers.
Median (mediana) - The middle number in a set of numbers arranged in order from least to geratest: if the set contains an even number of numbers, the median is the mean of the two middle numbers.
Mean (media) The quantity is found by adding the numbers in a set of numbers and dividing their sum by the number of addends.
Lesson 4.3: Read and Make Pictographs
Pictograph (pictograma) - A graph that compares data by using symbols
Lesson 4.4: Read and Make Bar Graphs
Bar Graph (gráfica de barras)- A graph that compares data by using vertical and horizontal bars.
Axis (pl. Axes) (eje) - The horizontal or vertical number line on a graph.
Interval (intervalo) - The difference between adjacent numbers on an axis of a graph.
Double Bar Graph (gráfica de barros dobles) - A bar graph that compares two related groups of data.
Lesson 4.5: Read and Make Histograms
Histogram (histograma) - A bar graph that shows frequency of data within equal intervals.
Lesson 4.6: Read and Make Line Graphs
Coordinates (coordinadas) - The umbers in an ordered pair.
Ordered Pair (par ordenado) - A pair of numbers that gives the location of a point on a graph.
Plot (trazar) - To graph a point on a coordinate plane.
Line Graph (gráfica lineal) - A graph that uses line segments to show changes in data.
Lesson 4.9: Read and Make Stem-and-Leaf Plots
Stem-and-leaf Plot (diagrama de tallo y hojas) - An arrangement of numbers that separates the ones digits from the other digits.
Stem (tallo) - The digit or digits to the left of the ones digit of a number in a set of data.
Leaf (hoja) - A ones digit in a row of a stem-and-leaf plot.
Lesson 4.10: Sampling
Population (poblacíon) - An entire group or set about which information is wanted.
Sample (muestra) - The part of a population that is used in a survey to represent the whole population.
Representative Sample (muestra representativa) - A sample that does not represent the entire population.
Biased Sample (muestra no representativa) - A sample that does not represent the entrie population.
Random Sample (muestra al azar) - A sample where each member in the population has an equal chace of being chosen.
Chapter 5
Lesson 5.1: Divisibility
Divisible - (Divisible) A whole number is divisible by another number when the first is divided by the second and the remainder is 0.
Lesson 5.2: Explore Primes and Composites
Prime Number (numero primo) - A prime number is a whole number greater than 1 that is divisible only by itself and the number 1.
Composite Number (numero compuesto)- A composite number is a whole number greater than 1 that is divisible by more numbers than just itself and the number 1.
Prime Factorization -(Factorization en numeros primos)
Factor Tree - (arbol de factores primos)
Lesson 5.3: Common Factors and Greatest Common Factor
Common Factor(factor común) A comon factor of two or more numbers is a whole number that is a factor of all the numbers.
Greatest Common Factor(máximo común divisor) The greatest common factor (GCF) of two or more numbers is the greatest whole number that is a common factor of the numbers.
Lesson 5.4: Fractions
Fraction(fracción) A number that names part of a whole or part of a group.
Numerator(numerador) The number above the bar in a fraction: the part of a fraction that tells how many parts are being used.
Denominator(denominador) The number below the bar in a fraction; the part of the number that tells how many equal parts are in the whole.
Equivalent Fractions(fracciónes equivalentes) Two different fractions that name the same number.
Lesson 5.6: Simplify Fractions
Simplest Form
Lesson 5.7: Least Common Multiple and Least Common Denominator
Least Common Multiple/ lcm (mínimo común múltiplo/mcm) - The Least Common Multiple of two or more whole numbers is the least whole number greater than 0 that is a multiple of each of the numbers.
Multiple (multiplo) A multiple of a number is the product of that number and a whole number. For example, 15 is a muliple of 5 because 3x5=15.
Least Common Denominator/lcm (minimo comun denominador) The Least Common Denominator of two or more numbers is the least common multiple of the denominators of the fractions.
Lesson 5.11: Mixed Numbers
Mixed Numbers (numero mixto) A number that combines a whole number and a fraction.
Improper Fractions (fraccion impropria) A fraction that has a numerator greater than its denominator.
Chapter 6
Lesson 6.1: Add and Subtract Fractions and Mixed Numbers with Like Denominators
Get 2 Months for $5! |
Folktales from Maharashtra: The Magic Ring
Text by Nanditha Chandraprakash
Animals are a necessary and integral part of everyday life in a village, according to the folk tales and art of the Warli Adivasis
Scenes from everyday life, which include the integration of many different animals, are the main theme of Warli paintings, an ancient folkart form from Maharashtra. Photo: From Warli tribe archives, courtesy Prof. Pradip Prabhu.
The Warlis are Adivasis from Maharashtra. They believe that conserving nature and taking care of animals is not an act of selflessness on the part of humans, but the only way to protect their own future and well-being. This folk tale is narrated by Prof. Pradip Prabhu, former Dean, School of Rural Development, TISS, and founder member of Kashtakari Sanghatana, the voice of the millions of tribals in Maharashtra.
Walking through a forest in search of fruits and berries, a poor man chanced upon a pig being attacked by a tiger.The man helped it escape by driving the tiger away. Filled with gratitude, the pig said, “I am very grateful—you have saved my life today. I must repay my debt to you. Please follow me.”
The man followed the pig who led him to a cave, from which the animal brought out a ring and said, “Take this ring and tie it to the top of your house and good fortune will follow you.” The man accepted the gift, thanked the pig, and made his way home.
As night fell, the man and his wife went to sleep. The next morning, their once empty house had grown in prosperity with sacks of pulses and spices in the attic, and vegetables in the kitchen. They could finally eat their fill and feed their pets. With the family’s good fortune, the couple and their pets lived comfortably.
As weeks passed, onlookers became curious and neighbours wondered at the unexpected good fortune of the household. A crafty villager spied on them and found out about the magic ring. That night, he snuck into the house and stole the ring.
Warlifolk art paintings often depict scenes from their folk tales which are part of the oral tradition passed down the generations. Photo: From Warli tribe archives, courtesy Prof. Pradip Prabhu.
The fate of the house quickly reversed back to its impoverished state. The woman was upset as she couldn’t feed her cat and dog anymore. She said to them, “Please go away, there’s nothing for you here. Find another home!”
The dog asked the cat, “How did our fate change? What do we do?” The cat recalled, “There used to be a ring tied to the roof, but it isn’t there anymore. I think we should find it.”
The duo set out in search of the ring. They searched their village and the surrounding villages, even crossing a trickle of a stream. They were determined to find the ring and take it back to the kind couple.
Soon they came upon a prosperous house. The dog guessed that the house was newly prosperous, because there was a wedding of rats on right next to it, and it was an odd season for weddings. This was surely the thief’s house, they concluded.
As they stood wondering what to do, the cat had an idea. She caught the rat bridegroom from next door. The other rats panicked and pleaded with the cat, “Please, please let the groom go! Please do not harm him.” The dog replied, “We mean him no harm. The cat will let him go in return for a favour. We need the ring that is tied to the roof of the rich man’s house.” The rats scampered onto the thief’s roof, detached the ring from there and brought it to the dog. The cat kept her word and let go of the groom. The wedding celebrations continued with merriment.
As the cat and the dog made their way back with the ring, it began to rain heavily and frogs croaked joyfully all around them. Water levels at the trickle of a stream they had crossed earlier had risen, and it had become a torrent. They had no choice but to brave the current. The cat jumped in first and the dog followed. As they were crossing the gushing waters, the ring slipped out of his mouth. Once they reached the shore, they had to think quickly about how they would retrieve the ring from the depths of the stream.
Soon the rain stopped and they spotted a wedding ceremony of river frogs nearby—a common occurrence during the rains. They repeated their trick, catching hold of the bridegroom. The other frogs begged, “please let our groom go, please do not hurt him!” Now it was the frogs’ turn to fetch the ring from the depths of the stream in return for an unhurt groom. They dived into the stream and brought the ring out. Once the dog had the ring in his mouth again, the groom frog was released, and the wedding party resumed.
Without any more untoward incidents, the cat and dog reached their home. The cat climbed to the roof and tied the ring where it used to be. The woman was happy to see her pets again. This is how the cat and the dog returned the ring to their house, and brought prosperity back to the family.
The Adivasis believe that cats, dogs, pigs, rats and frogs are the cause of prosperity. Every creature, big and small, has a role to play in making the world a better place for all to live in. We may not see it all the time, but if we care to look and learn, we will find that without them, our chances of survival are at risk. Through this tale, community elders teach the next generation that animals should be considered part of the family, and are also part of the family’s prosperity. Taking care of them does not eat into one’s wealth; it is not a loss to have them.
Related Stories for You
A Wild Encounter
Green Humour – Sounds like Latin to Me
Hunter to Conservationist: An Ace Birder on the Kaveri
Nishant Srinivasaiah: On First-Name Terms with Wild Elephants
Croc Doc: A Friend Indeed to Reptiles, Turtles, and Tortoises
The Unsung Guardians of Bannerghatta National Park
Folktales from Maharashtra: The Mouse’s Share
The Harmony of Birdsong with A. J. Mithra the Bird DJ |
Skip to content
Sleep your way to weight loss? (10/5/10)
October 5, 2010
Sleep, Weight, Muscle and Fat
There are dozens of studies that people who sleep less weigh more (and also die younger.) Can sleeping more cause weight loss?
Most of the studies done have observed very few people for very short periods. Their answer has generally been yes – you can lose weight when you sleep more. The more interesting questions are how and why?
Today’s study from the University of Chicago looked at young people living in the Clinical Research Center. When you live in the CRC you can control what people eat, how they move, when they sleep – but it won’t be like real life.
Two groups of five people did the same things – one had 5.5 hours to sleep, the other 8.5 hours (though they only got 7.25 hours of actual sleep.) Both groups lost 6.6 pounds. The group that got more sleep lost far more fat than the group who slept 5.5 hours.
The short sleeping group was digesting muscle as they lost weight.
Hormones like ghrelin and leptin showed predictable but small responses in this tiny group, but the issue of glucose and insulin was murkier. What’s really going on?
A lot. Change sleep and how the body regenerates, and you won’t look the same.
Interestingly, similar weight loss results occurred years earlier when Colin Shapiro at the University of Toronto had middle aged people exercise on an exercycle, one group under bright light, the other without. Both lost about the same amount of weight, but the group who exercised in bright light developed more muscle mass – just like the Chicago “dieters.”
What This Means
Human regeneration is swift. Setting up the proper conditions gives the body different signals. Getting the right information can help you get the results you desire.
Weight in humans is controlled by highly complex systems involving sleep, physical activity, active rest, what you eat, when you eat it, even the size of your plates and the color of the dining room. What is clear is that set the right conditions and people lose weight – the right information counts.
The public wants simple single answers, however. Is there a weight loss superfood (acai berries, anyone?) A perfect exercise regime? The right amount of sleep that causes weight loss every time?
Food, activity, and rest, including the passive rest of sleep, are large parts of the picture. So are body clocks and social behaviors. Light, in the form of sunlight, changes perhaps brown fat metabolism as well as body clocks. Since time rules life, light be a major factor, too.
An Easy Way to Do It
If weight loss is your goal, try this – going FAR. FAR stands for Food, Activity, and Rest. Eat, move, then rest, especially the active forms of rest that help regenerate mind and body. If after eating you can walk, stroll, do housework, yardwork, pace back and forth on a cell phone, or meander back from your meal with friends or work colleagues, you may do much more than control weight. You can improve your mood. You can improve your sleep. You can help prevent the major diseases that kill most people. You can also have a lot of fun.
The principle that matters is regeneration. That’s how your body works. Much of you is gone, replaced within a matter of days. Biology works fast. If you give your biology the right information, it remakes you easily. Since everything in you, from brain to muscle to the immune system, can learn from experience, both the hardware and software replacements often function better.
So sleep is part of weight loss, an effect that will probably prove stronger with longer periods of study. Eating earlier in the day is also a factor. So is physical activity. So is rest in its physical, mental, social and spiritual forms. Putting it together through going FAR is a simple, easy way to go. And you can gain far more than a slimmer waistline. You can find a way to live that can make you sharper, more aware, more alert, and more productive – and give you a shot at a longer life.
No comments yet
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
Boost the Immune System With Ayurveda
According to Ayurveda, immunity and natural resistance to disease in the body goes hand in hand with good health. The concept of health—according to Ayurveda—is not only being free of disease but also when there is balance between the three doshas, vata, pitta, and kapha, there is proper functioning of the digestive fire or agni, the three waste products (urine, feces, and sweat) are in normal quantity and balanced, the five senses are working normally, and the mind, body, and consciousness are functioning in blissful harmony.
The function of the immune system is to protect our bodies against foreign invaders. The invaders can come in the form of actual foreign bodies such as bacteria, viruses, fungi, or parasites, collectively called pathogens. Unwelcome entities can also be created from within and show up as dis-eases of the body.
A proper immune system is an intricate balancing act. When functioning optimally, our immune systems are able to discriminate effectively, knowing when to fight the bad guys and when to back down.
A hardy immune system is influenced by the power of agni (digestive fire), and our ability to digest, assimilate, and absorb nutrients in our bodies. Within a healthy body where immune function is strong, any invaders are either neutralized or destroyed then expelled and the body returns to normal. If agni is impaired by an imbalance within the tridosha, metabolism is affected and the immune response and natural resistence are lowered. If the body is unhealthy or has ama (stored toxins from undigested food), then an environment is created in which invaders are encouraged to thrive. Ama can be created from both physical and mental indigestion. It serves as fertile ground for creating weak spots in the body.
According to Ayurveda, ama is the root of all physical disease. Indigestion and ama formation can prevent nutrients from reaching the tissues. Ama can result from improper eating habits and unhealthy lifestyle practices. Our relationships, stress, and traumas also greatly impact our digestive process and immune function. Particularly when you engage in an activity or indulge in food that you know is not good for you but you do it anyway, you are committing prajnaparabda, a crime against wisdom. Not only are you promoting ama formation and creating an unhealthy environment within the body, but you are also weakening your will.
The strength of your will and identity are in direct correlation to proper immune function. Discipline and healthy relationships help to build your sense of self. When your identity with your self is strong, then the cells in the body are better able to differentiate “self” from “non-self” and support the internal things that are serving the whole.
The body naturally wants to become balanced and healthy. Each and every cell of the body possesses an intelligence encoded with a will to live, be healthy, and work together as a whole, communicating with the other cells of the body. Ayurveda is a system that supports the natural proclivity toward balance and offers guidelines regarding diet, lifestyle, herbs, and the stress relieving techniques of yoga, meditation, and pranayama as a formula for acheiving health and longevity.
Strengthen your digestion. Bring awareness to your digestive process, noting how you feel (physically and mentally) after each meal. Proper digestion will result in feelings of lightness, energy, and satisfaction. Watch your portion size and be mindful not to overeat. Choose foods that are in accordance with your constitution. Balancing the doshas through diet can enable you to better support yout health.
There are several foods and herbs that help support a healthy immune system and are traditionally used in Ayurveda. Foods such as milk, ghee (or clarified butter), and honey all enhance ojas, the subtle essence that supports immunity.
Other Suggestions:
• Include many fresh organic fruits, vegetables, nuts, and beans in your diet. These provide you with nutrients, antioxidants, and fiber necessary for proper immune function.
• Sip hot water or ginger tea throughout the day to boost agni.
• Limit sugar intake. Simple sugars can impair white blood cells activity and the proper function of a healthy immune system.
• Limit alcohol. Alcohol can impair white blood cells mobility.
Here are some lifestyle practices that can help boost a healthy immune system:
• Take meals at regular times each day. Regular meals help to prepare the body for a time of nourishment by inceasing appetite and enhancing digestion.
• Maintain a healthy body weight. Excess weight is a burden for the body. Placing undue stress on organs and metabolic functions impairs immune function.
• Get regular exercise. Just the right amount of movement helps the body become more resilient.
• Get sufficient, good-quality sleep. The body restores itself and counters the effects of stress during sleep and relaxation.
Herbs can also play an important role in giving a boost to your natural defense system. Banyan Botanicals Immune Strong is a blend of both Ayurvedic herbs and Western herbs. This herbal remedy may be the extra boost you need to support the immune system through the fluctuations of the season. Banyan's I Sleep Soundly formula can be used to support sound, restful sleep. Triphala can be taken daily to gently cleanse and tone the large intestine, helping to keep the body free of ama.
A basic relaxation in corpse pose can help to reduce stress, lower blood pressure and heart rate, reduce muscular tension, reduce fatigue, improve sleep, and enhance immune response. Allow yourself to feel fully supported by the ground and let go of tensions you may be holding.
Establish a regular habit of sitting in a special, quiet place each day. Meditating for short periods each day can greatly reduce anxiety and stress, improve your quality of life, as well as boost immune function.
• Sit quietly, firmly rooted, focusing on the crown of your head and your breath.
• Bring your awareness to the natural rhythm of your breath.
• Notice the gentle inhalation, exhalation and the short pause of retention in between.
• If the mind begins to wander, invite it back to the breath.
• Allow thoughts to ebb and flow with the breath, staying perfectly present to each moment.
Yogic breathwork, or pranayama, is an excellent way to revitalize prana within the body. Pranayama is a practice in controlling the breath. Pranayama cleanses and strengthens the physical body while calming and clearing the mind.
It is important to practice with the proper posture to allow the breath to move freely in the body. Try alternate nostril breathing to balance the breath and support immunity. Position the right hand (you may choose to alternate with each practice) in vishnu mudra by folding the index finger and third finger inwards to lightly touch at the base of the thumb. Your pinkie finger rests by the side of the ring finger. You will alternately use your thumb to close your right nostril and your ring and pinkie fingers, working as one, to close your left. Rest your left hand comfortably in your lap. The breath should never feel forced. Envision the breath as a light thread of silk, lengthening effortlessly with each inhalation and exhalation.
Keeping the breath relaxed, subtle and light:
• Close the left nostril and exhale completely through the right.
• Inhale fully, through the right nostril.
• Close right nostril and exhale through the left nostril.
• Inhale through left nostril.
• Close left nostril and exhale through right nostril.
This is one round. Begin a slow and regular practice of 5–10 rounds. Rest after your practice and notice how you are feeling. Once comfortable with this practice, you can begin mentally counting to four on your inhalation, pause at the space between the breath and then count to four as you exhale so that the length of your inhalation and exhalation are equal.
The Sanskrit word for immunity is vyadhikshamatva which translates as “forgiveness of disease.” By being flexible, practicing acceptance, and adapting to our ever-changing environment you can support a healthy immune function. Resistance to change and clinging to challenges will only impede health. This type of flexibility is about becoming more whole and saying “yes” to life. It is about positively accepting all that comes your way, even the pain and suffering, allowing yourself to be with it. Although this is more of a mental and spiritual process, it is important to remember in the face of adversity, when something does not go your way.
Understanding the immune system and how it is influenced can help us to take more responsibility for our health. Many of the practices to support good health and immunity are intertwined. Lowering stress levels can help you to sleep more soundly and choose more nutrious foods. Sleeping more soundly can give you more energy to exercise. Ayurveda's holistic approach can help you develop a lifestyle that is good for your body and your mind while supporting health and immunity.
“Your hand opens and closes and opens and closes.
If it were always in a fist or always stretched open,
you would be paralyzed.
Your deepest presence is in every small contracting and expanding,
the two as beautifully balanced and coordinated
as bird wings.”— Rumi
|
Vapes, commonly known as E-cigarettes, is a small device that runs on batteries. It heats up the nicotine and other flavoured chemicals, changes them into smoke so that you can breathe. These chemicals like formaldehyde, particles and some heavy metals get stuck inside the lungs and are responsible for causing cancer.
E-cigarettes or electronic cigarettes pour nicotine directly in the throat, lungs and blood without the tar and smoke of a normal cigarette. Along with this, other perilous things also enter the lungs directly when one vape flavoured cigarettes. It is very difficult to analyse the amount of chemicals you breathe in when you inhale the e-cigarette. According to some studies, e-cigarettes running on high voltage consist of more formaldehyde and other toxic chemicals than normal e-cigarettes.
Some of the chemicals can cause irritations in the passages of the throat and lungs. For example, cinnamon leads to inflammation of the cells inside the lungs. However, more research is required to analyse the greater risk factors of vaping.
Can You Get Throat Cancer from Vaping?
Can You Get Throat Cancer From Vaping?
Studies suggested that vaping possess only 5% of the risk of smoking. E-cigarettes do not have tobacco in it but contain a liquid with nicotine in it which causes addiction but not throat cancer. Additionally, e-cigarettes exhibits less nicotine than normal cigarettes. Nevertheless, people with chronic heart disease must be careful because nicotine worsens the heart condition. Moreover, some chemicals like propylene glycol that are present in the e-juice, can damage the eyes and the air passages.
Sometimes, the batteries can also burst in the face damaging the skin and tissues of the face.
It cannot be said that vaping is completely harmless, but it has lesser damaging effects. The adverse effects depend on the presence of nicotine and the amount of nicotine inhaled. These days, internet is a great source of knowledge. However, people hardly take time out to go through the researches in original to identify the risk factors. They tend to rely on the never –stopping chain of advices and the fear drives them off. Sometimes, these information are misleading which is the case that the latest “e-cig causing cancer” is carried away with. In order to know the correct information, people are advised to go through the researches and compare the results of the studies and then come to a proper conclusion.
It has been already demonstrated that although we are aware of the most common factors that contribute to cancer, it has not yet been possible to blame the exact cause. Rather, a collection of factors can be taken into considerations. Thus, pin pointing out factors directly contributing to cancer, is quite misleading, and rather presenting it as a risk factor associated with cancer would have been much suitable. The causes of cancer are yet to be identified, but we are aware of what may add up to the condition.
However, a recent research that was done on mice and human cells has suggested that vaping might increase the risk of cancer and heart disease but could not yet establish a direct link with vaping causing cancer.
Vaping Causing Lung Disease
Diacetyl, is a buttery flavoured chemical in e-cigarette which has been linked with the serious bronchiolitis obliterans. It is also called popcorn lung. The name was coined when people working in the popcorn factory acquired severe lung disease because of continuously inhaling diacetyl. The chemical was used to add flavour to caramel, dairy products and popcorn. The chemical is breathed while vaping which are quite similar to the workers breathing the same chemicals in the popcorn plants.
The chemical may lead to wheezing, fever, headache, dry cough which might not go away. The vapour may also irritate areas like throat, nose, eyes and skin. It produces small scars in the air sac inside the lungs which leads to the thickening of the sac hence it narrows down the passage.
When the association between diacetyl and lungs was discovered, the popcorn companies removed the harmful chemicals from their product. However, it exists in the flavours of e-cigarettes like vanilla, coconut, maple, alcohol flavour, fruit flavour, and candy flavour. These flavours often lure teenagers, young adults and even kids sometimes.
There is no treatment for the popcorn lungs although there are some medicines to keep it away from being worse. Medicines like steroids, antibiotics can help to relax the inflammation in the lungs.
Vaping reportedly have up to 97% lower chemicals compared to other smokers. This is the level that the non-smokers obtain from the passive smoking or from their environment. It is less harmful than the smoking but can lead to addiction in the young population. Vaping is an alternative to smoking but its adverse side is yet to come out in studies. Since the trend is very new, researchers are working on the area to find out its relation with throat cancer and other health concerns.
Also Read:
Pramod Kerkar
Written, Edited or Reviewed By:
Pain Assist Inc.
Last Modified On: December 24, 2018
This article does not provide medical advice. See disclaimer
Sign Up for Our Newsletter
We'll help you live each day to the healthiest |
4o so
2o lo
10 20 30 40 50 60 70 80 90 100
x dimension of population genotypes and therefore spatial clumping of allele frequencies. There is no such spatial structure in the population with random mating (a). In the simulation that produced these pictures, the grid is initially populated at random with genotypes at Hardy-Weinberg expected frequencies and p = q = V2. Each generation every individual chooses a mate at random within its mating neighborhood and replaces itself with one offspring. The offspring genotypes are determined by Hardy-Weinberg probabilities for each combination of parental genotypes.
0 0
Post a comment |
Harlequin ladybirds have been invading homes across Britain as the insects seek cosy hibernation spots in time for winter.
The bugs, which are flying in from Asia and North America on mild autumn winds, have black instead of red wings and first arrived in Britain in summer 2004.
The first sightings were in the southeast of England but since then the bug has spread rapidly up to north of England and west into Wales.
Experts say the foreign invaders actually pose a threat to the domestic species because they carry a sexually-transmitted disease called Laboulbeniales fungal disease.
But can you catch an STD from the critters?
The ladybirds cluster around boilers, window frames and smoke detectors
The ladybirds are carrying a fungal disease
The ladybirds are gathering in clusters inside homes across the country
While the ladybirds are carrying a sexually transmitted disease and can sometimes bite humans, it's not as scary as it sounds.
The Laboulbeniales fungal disease is specific to arthropods, which includes insects, crustaceans, centipedes, millipedes and spiders.
This means humans cannot catch an STD from the ladybirds.
However, experts have warned homeowners to seal their windows to stop the bug gaining access.
Steve McGrail, director of pest control company Pro Kill Environment, said Harlequin Ladybirds are not harmful to humans but recommended sealing windows to make sure they do not get in homes.
Ladybirds behind furniture in the home of Laura Barnes
The bugs have been spotted in swarms thousands of insects strong
He said: “They are a non-indigenious species. They are coming inside in large numbers.
“They usually cluster around window frames and they cluster together to gather heat and hibernate in winter months.”
Scientists say a fungus the creatures carry, which is passed on through mating, will infect our native species which are already under threat from habitat loss.
While they do not yet know if the fungus is harmful, the UK Ladybird Survey says it is possible the disease affects the lifespan or the number of eggs a female can produce over her lifespan. |
By Quirin Schiermeier
How much of the Netherlands lies below sea level? It seems an innocuous question-- but it sparked a major review of the work of the Intergovernmental Panel on Climate Change (IPCC).
The investigation, commissioned by the Dutch government, focused on the contribution of Working Group II--on impacts, adaptation and vulnerability--to the IPCC's Fourth Assessment Report. The Dutch report's conclusions, released on July 5, highlight a number of mistakes--some trivial, others more egregious--and suggest ways to minimize errors in the future. But they also confirm the IPCC report's core message: that global warming poses substantial risks to societies and ecosystems on all continents.
The inquiry was triggered by widespread media coverage of two errors in the IPCC report: claims that all Himalayan glaciers might melt by 2035 (glaciologists say they are unlikely to melt so quickly) and that more than 55 percent of the Netherlands lies below sea level (the real figure is 26 percent). In April, the Dutch minister for the environment at the time, Jacqueline Cramer, commissioned the PBL to reassess the reliability of the IPCC's regional projections. The PBL then double-checked with the IPCC's coordinating lead authors all statements in relevant chapters that seemed unclear, unfounded or inconsistent.
In 32 projected regional impacts highlighted in the IPCC report's "Summary for Policy-makers," the PBL found only one factual error. The number of Africans projected to be exposed to water shortage due to climate change, stated as 75 million to 250 million people, should be 90 million to 220 million.
Elsewhere in the IPCC report, a predicted 50-60 percent decrease in the productivity of anchovy fisheries was erroneously derived from an unrelated study projecting a 50-60 percent decrease in extreme wind and ocean turbulence. Other errors include a handful of incorrect references, table titles and typos.
The IPCC has already corrected many of the errors--including the anchovy prediction--on its web site. But some, including the number of people affected by water shortages in Africa, remain uncorrected, as the IPCC authors stand by their statements.
Trust me, I'm an expert
|
You are on page 1of 9
Teacher_Toni Bowes Grade__5th_______________ Date____April 20, 2012__________________________ Subject__Science____________________
Stage 1- Desired Results
Established Goals: S5CS3. Students will use tools and instruments for observing, measuring, and manipulating objects in scientific activities. c. Use computers, cameras and recording devices for capturing information. d. Identify and practice accepted safety procedures in manipulating science materials and equipment.
S5CS5. Students will communicate scientific ideas and activities clearly. d. Locate scientific information in reference books, back issues of newspapers and magazines, CDROMs, and computer databases. S5P3. Students will investigate the electricity, magnetism, and their relationship. b. Determine the necessary components for completing an electric circuit.
Understandings: Students will understand that.. Electric circuit is a pathway made of wires that electrons flow through Circuits are made of an insulator, conductor, and power source Electricity is the flow of electrons. Electricity is a form of energy.
Essential Questions: What is an electrical circuit? What are the components for completing an electric circuit? What is electrical current?
Student will know. Terms: insulator, conductor, electrons, energy, current, electricity, circuit How to create a complete circuit The relationship between the power source, insulator, and conductor How electrons make electricity
Student will be able to Complete an electrical circuit with a battery, copper wire, and light bulb Explain how the complete circuit was made Draw three different ways to complete an electrical circuit Write a paper explaining why or why not an aluminum wire would complete a
Stage 2- Assessment Evidence
Performance Tasks: 1. Students copy an example of a complete circuit from the Activboard. Students will label each component of the circuit. Call on several students to check for students understanding. 2. Students work in group of threes to manipulate a D-battery, two copper wires, plastic stopper, paper clip, and a light bulb to make a complete circuit i.e. the light bulb lights up. Once the students have completed a circuit then the students will collaborate with within the group to draw two more ways a circuit could be made. 3. Students go back to their own desks and consider this question: Could a circuit be completed if the copper wire was changed to an aluminum wire? Students will use prior knowledge and new knowledge learned from the group experiment and podcast to answer the question. Students will write a one page explanation on why or why not an aluminum wire could be used. 4. Students will get into pairs to share their ideas with their partner. Students
will compare and contrast their ideas. 5. During Computer Lab, the students will explore the web site resources and videos given by the teacher.
Other Evidence Student participation in group assignments. Completed circuit drawings. One page explanation to question. Teacher observation of students in groups.
Stage 3 Learning Plan
. Learning Activities: 1. Hook students by having the lights off. Ask students, What makes the lights come on? Call on several students to discuss. 2. Remind students that electricity is electrons that move in a circular movement. Draw example of the electrons moving in a circular motion on the Activboard. Walk around to make sure students are drawing the example correctly. 3. Students copy the drawing from the Activboard. 4. Then put up the picture with the completed circuit. Make sure students can see the labels: Power source, copper wire, and light bulb. 5. Once students have copied the drawing, play the podcast entitled Circuit. The podcast will explain about the insulator, conductor, and the power source. 6. After students complete the podcast, instruct students to get into groups of three with the people around them. 7. Once the students are in groups, and then pass out the kits with the D-battery, two copper wires, plastic stopper, paper clip, and light bulb. 8. Instruct students to figure out a way to make the light bulb light up. Walk around to observe and guide students within the groups. 9. After students complete the circuit, instruct students to collaborate with their group to figure out two more ways to light the light bulb and then draw them on the same piece of paper as the example. Also, have students label the circuits. 10. After the students have completed their two drawings in their groups, take up papers to check for understanding. 11. Instruct students to return to their own desks and to take out a piece of paper. 12. Write this question on the board, Could a circuit be completed if the copper wire was changed to an aluminum wire? Tell students they must explain why or why not the
aluminum would work. Their answer should be at least to one page in length. 13. As the students finish their answers, have students turn the papers in. They should place their papers in the science bin in the back of the room. 14. After the papers have been turned in instruct students to get into pairs with the person on their left. 15. Instruct students to share their ideas about the questions with one another. Walk around to listen to each group to make sure each group is on topic. 16. After each student has shared ideas with their partner, instruct students to take out another piece of paper and write down if they agree, disagree, or are divided about the question. The responses should be a paragraph or six to seven sentences. 17. Have students turn in their papers with both names on the paper to the science bin. 18. Before students go to Computer Lab, hand out the paper with the different links. 19. Instruct students to go to the web sites to view the information the web sites contain. The class will have a whole class discussion on what they learned when they return from the computer lab.
Circuit Drawing Rubric Category Name on paper Unsatisfactory 0 pts. Name is not on paper Satisfactory 1 pt. Name on paper. /1 Power source Power source is not clearly labeled. Insulator is not clearly labeled. Conductor is not clearly labeled. Power source is clearly labeled. Insulator is clearly labeled. Conductor is clearly labeled.
/1 /1
Total Points:
One Page Paper Rubric Category Unsatisfactory Satisfactory Exceeds
Name on Paper
0 pts. Name is not on paper. The student did not answer the question.
1 pt.
3 pts. Name is on paper The student answered the question fully without straying. The paper is very organized. Ideas are presented in a logical sequence and are clear. There are one or two spelling or punctuation mistakes.
Focus on question
Spelling and Punctuation
The student answered the question, but strayed from topic of the question. The piece is hard to The paper is pretty follow. The ideas well organized. seem random and The students not thought out. ideas are somewhat out of sequence. There are five or There are three to more spelling or four spelling or punctuation punctuation mistakes. mistakes.
Total Points:
Websites for Students video video game
Picture of electrons flowing in a circular motion
Picture of complete circuit |
Food Hygiene & Sanitation
Topics: Foodborne illness, Escherichia coli, Bacteria Pages: 5 (908 words) Published: May 27, 2013
Section A (20 marks)
Choose the best answer.
1. Which of the following groups is not especially susceptible to foodborne illness? a. The very young
b. Young adults
c. The elderly
d. Pregnant or lactating women
2. The cost of foodborne illness can occur in the form of: a. Medical expenses
b. Loss of sales
c. Legal fees and fines
d. All of the above
3. CDC reports show that in most foodborne illness outbreaks, mishandling of the suspect food occurred within which of the following stages? a. Transportation
b. Retail food establishment
c. Food manufacturing
d. Food production (farms, ranches, etc)
4. If a utensil is sanitized it:
a. Is free from visible soil
b. Has been sterilised
c. Is a single service item
d. D. Has had disease-causing germs reduced to safe levels
5. Bacteria are one of the most common causes of foodborne disease in a food establishment because: a. Under ideal conditions, they can grow very rapidly
b. Bacteria are found naturally in many foods
c. Bacteria can easily transferred from one source to another d. All of the above
6. Most of the bacteria that cause foodborne illness grow: a. With or without oxygen at an ideal temperature of 39⁰C b. Only without oxygen at an ideal temperature 43⁰C
c. Only with oxygen at an ideal temperature of 43⁰C
d. Only without oxygen at an ideal temperature of 39⁰C
7. Which of the following groups of hazards are most likely to cause a foodborne disease outbreak? a. Bacteria and viruses
b. Parasites and molds
c. Vibrio spp. and Shigella spp.
d. Chemical and physical hazards
8. Bacteria grow best within a narrow temperature range called the temperature danger zone. The temperature danger zone is between: a. -18⁰C and 104⁰C
b. -8⁰C and 65⁰C
c. 5⁰C and 60⁰C
d. 5⁰C and 100⁰C
9. Bacteria that cause foodborne illness will only grow on foods that have pH at _____ or above and a water activity (AW) above____. a. 3.2; 0.85
b. 4.6; 0.85
c. 6.5; 0.80
d. 8.0; 0.75
10. Which of the following bacteria produce a toxin that is more likely to cause death if consumed? a. Campylobacter jejuni
b. Clostridium botulinum
c. Shiga-toxin producing Escheria coli
d. Listeria monocytogenes
11. Some bacteria form spores to help them:
a. Reproduce
b. Move easily from one location to another
c. Survive adverse environmental conditions
d. Grow in high acidic foods
12. Which of the following is a histamine poisoning?
a. Ciguatoxin
b. Scombrotoxin
c. Mycotoxin
d. Paralytic Shellfish Poisoning (PSP)
13. Which of the following is not considered a potentially hazardous food group? a. Red meats
b. Fish and shellfish
c. Poultry and eggs
d. Dried grains and spices
14. The most effective way to control the growth of bacteria in a food establishment is by controlling: a. Time and temperature
b. pH and oxygen conditions
c. Temperature and water activity
d. Time and food availability
15. Food borne illness can caused by:
a. Poor personal hygiene
b. Cross contamination
c. Temperature abuse
d. All the above
16. Regarding food thermometers, which statement is false? a. Be calibrated
b. Measure temperatures between 5⁰C and 57⁰C
c. Measure temperatures between -18⁰C and 104⁰C
d. Be approved for use in foods
17. Good personal hygiene includes
a. Using hand sanitizers instead of washing hand
b. Keeping hands and clothes clean and sanitary
c. Wearing attractive uniforms
d. Cleaning and sanitizing food-contact surfaces
18. Cross contamination is a term used to describe the transfer of a foodborne hazard from 1 food to another: a. By a food worker’s hand
b. From a cutting board
c. From a knife blade
d. All of the above
19. After proper cooking, all...
Continue Reading
Please join StudyMode to read the full document
You May Also Find These Documents Helpful
• The Sanitation and Hygiene of Street Food Vendors Essay
• sanitation Essay
• Food Sanitation Essay
• Food Hygiene Essay
• Essay about Food Hygiene
• Food Hygiene Essay
• Sanitation and Hygiene in the Food and Beverage Industry Essay
• Food Essay
Become a StudyMode Member
Sign Up - It's Free |
The Nutritional Benefits of Mushrooms
‘Mushrooms are amazing and shocking the medical world by proving scientifically what our ancestors knew intuitively – they are a nutritional super food that just doesn’t get enough credit!
Credit: Thinkstock – alfernec
Dr. Kayla Arthurs shares this list of four mushroom types that have been extensively researched:
Well known, easily available, and delicious, Shiitake has a history in China as far back as the Ming Dynasty (1368-1644). In Japan 1980s, research showed it is highly effective in supporting liver function and immune system activity.
Unique in its anti-tumoral and immune enhancing activity, the concentrated D-Fraction in Maitake shows amazing results in US and Asian research studies to induce tumor cell death (apoptosis). In Europe researchers are even showing it able to effect the pro-apoptotic genetic component and provide new gene targeting treatment options for both breast and prostate cancers.
Royal Reshi
Reshi has long been recognized as the raw components of drug development in the East. Treasured by royalty, it was especially potent in heart heath. Reshi works by stabilizing blood pressure, balancing blood sugar levels and inhibiting clot formation.
Lion’s Mane
This white icicle shaped fungi is both beautiful and powerful. Japanese studies have shown that it is able to regenerate neurons using a nerve growth factor (NGF). Produced in the body NGF declines with age, and can significantly affect reaction time, intellectual acuity and reflexes. The bio-active compounds that act as NGF in Lion’s Mane can regenerate brain cells and improve memory, clarity, and coordination. This neural refreshing of the brain can effectively address neural damage and conditions that may result including dementia and Alzheimer’s disease.
Dr. Kayla Arthurs is a naturopath in Arizona. |
Meet Maryam Mirzakhani, the first woman to win the 'Nobel Prize Of Math'
Maryam Mirzakhani, the math genius from Iran, was born on May 3, 1977. She became the first woman to be awarded the Fields Medal, the highest award in mathematics, aka the Nobel Prize of math. The International Mathematical Union chose to give the honor to Mirzakhani after she discovered new advances in the theory of Riemann surface. The organisation gives out awards every four years to some of the best mathematicians under the age of 40.
The low representation of women in STEM academic faculty and leadership roles are still not known as studies show no biological differences that would explain it happening. According to the National Academy of Sciences, being the first female to win this prestigious award, people are considering this as the first sign of many changes for the future.
Mirzakhani began to make a name for herself internationally in 1994 and 1995 when she competed in the International Mathematical Olympiads
She won gold at the International Mathematical Olympiad. It is the world's most honored math tournament for pre-college students
She got her undergraduate degree at the Sharif University of Technology in Tehran, Iran
Mirzakhani later went-off to Harvard University to get her PhD with her thesis on the geometry of moduli space
She now works as a professor of mathematics at Stanford
Her studies have potentially innovated different areas of subjects and topics like mechanical engineering and material science
She continues her work on similar topics, including hyperbolic geometry, topology, and both the dynamics and the geometry of Riemann surfaces
She's known for doodling on giant sheets of paper when working on math problems.
Mirzakhani motivates girls to follow their dreams:
In an interview to Stanford News she said, "This is a great honor. I will be happy if it encourages young female scientists and mathematicians. I am sure there will be many more women winning this kind of award in coming years. I think it's rarely about what you actually learn in class... it's mostly about things that you stay motivated to go and continue to do on your own."
1. Excellent information provided by you. I really appreciate your approach. I am also looking for some online Math Practice Test. Thanks and keep posting helpful material.
Math Videos
2. Wonderful information shared, Congratulations to Maryam Mirzakhani to win the Nobel Prize for Mathematics. Hope she becomes an inspiration to the women's and they too achieve such a milestone in their respective lives. All the best! |
Intel - Itanium Chips
Richard Lightman richard at
Sun Jan 7 07:34:31 PST 2001
Misquoted from Steve Hayashi on 2001/01/ 6 at 16:32 +0000:
64-bit integers:
Available for all sorts of cpu's using gcc's "long long" and
"unsigned long long" types. If you are older than pocket
calculators, then the algorithms you learned for long addition
and multiplication apply just as well to multi-word arithmetic
as they do to multi-digit arithmetic.
Floating point:
Back in the days when there were separarte chips for floating
point add and floating point multiply the industustry standardized
on IEEE754-1985 so the ouput of one chip could go to the input
of the other. The standard has not changed so the maximum precision
remains the same. The only things that have changed are the
numbers of floating point calculations that can be in progress
simultaneously, and the number of clock cycles required to complete
IEEE754-1985 is a bit woolly on the precision of things like log
and cosine. The 387 and 68881 did these in hardware but the 486 and
68040 did them in software. If these instructions have gone back
into hardware then the precision might depend on the CPU again.
64-bit pointers:
Handling a 5GB data structure with 32-bit pointers is slow
and fiddly. The 64-bit pointers available with alpha and
(t)itanic architectures make that sort of task easier
and faster. The bad news comes with the address translation
required for virtual memory. Converting 32 bit virtual
addresses to 32-bit physical is much easier than converting
64-bit virtual to about 34 bits of physical address. The
386 memory management unit is slow enough. The alpha uses
the same algorithm as the 386, but uses twice as many steps.
The 601 has a sensibly designed mmu which I suspect was
copied into the later PPC's. I have no idea what ia64 does.
Instruction parallelism:
ia64 puts 3 40-bit instructions in a 128 bit word, and tries
to issue two words per clock cycle. I have had an athlon and
a 686 each running about 4 instructions per clock. It is quite
possible that ia64 instructions achieve more than ia32
The reason for the ia64:
Intel squashing the competition. Intel first moved to a 33MHz
bus because many of there competitors couldn't. Intel want(ed)
us to use RDRAM because they had a good share option deal
with rambus, they do not need to pay royalties to rambus, and
intel gets any royalties over 1.5% that rambus charges intel's
competitors. The ia64 is little different. The idea is to
use more transistors than your competitors can. Here are the
ways to do it:
Speculative execution:
When this code has a conditional branch, execute both sides
of the branch in parallel. When the value of the condition
has been determined, discard the state generated by the
wrong branch. Now you can add extra execution units to
pump data into extra registers all for data that will
never be used.
Loop unrolling:
ia64 is bad at tight loops, so include about three
interleaved copies of the loop code. You will now need
a huge instruction cache to keep all those speculative
execution units running.
Inline functions:
ia64 is bad at subroutines, so include a copy of each
subroutine at each place it is called. Look at the size of
those programs!
The result:
A CPU that requires so much power that you need an extra power
supply on the mother board. It generates so much heat that
you have to clock well below the limit from the switching
speed of the transistors. I suspect ia64 will be very good
at algorithms that cannot be expressed in a parallel form,
and you benefit if you need several gigabytes of virtual
memory, but I am just guessing.
The real tests are things like which CPU makes a better
database, webserver, video compressor, LFS compiler,
or whatever you are using it for. I have had a
quick look around the web, but I hot not found
any itanium benchmarks. Anyone got any?
Unsubscribe: send email to lfs-discuss-request at
and put unsubscribe in the subject header of the message
More information about the lfs-dev mailing list |
What Is Communication That Promotes Peace?
“If we as individuals cannot speak to each other, how, then, can we as nations achieve peace?”
Perhaps the one thing that furthers peace in your world is the way in which you speak to people. So, what is communication? Sometimes, you are friendly and cheery, while other times, you are gruff and impatient, maybe even defensive.
What is going on inside you when you are cheery in your communication? Most likely, you are feeling good about yourself. But when you are feeling “less than,” fearful, or not good about yourself, do you communicate gruffly, with impatience, perhaps even lashing out at another and putting them down?
When I say what is communication, what I’m talking about is your ability to be honest and let another know when you are feeling afraid, or badly about yourself, instead of lashing out. So many times, I hear one person berating or criticizing another, and wonder how badly they must be feeling inside. That doesn’t excuse the berating and criticism, but it is a good chance to practice compassion for them.
So, how can you speak with respect and caring to another when you are angry or feeling poorly inside? Perhaps, just honestly letting the other know what you are feeling, stating simply, “I am angry,” “I am afraid of xyz right now,” or “I feel awful about myself.” The important thing is to own your feelings, rather than saying “You make me feel…”
These things are challenging to say to another, I know. It takes commitment and practice. Above all, it takes being in touch with your feelings in the moment. Perhaps you can make an agreement with a close person in your life whom you trust to practice speaking in this manner. Set the ground rules up front, getting an agreement from the other to not criticize you for what you are about to say.
Infusing your talk with positive and honest words gets you a long way to peace… Practice being candid with someone about your feelings and see what happens. Did it avoid an argument? Did you feel better about yourself? Did it preserve peace?
1. This can be a excellent suggestions specifically to individuals new to blogosphere, temporary and precise information… Many thanks for sharing this 1. A should study write-up.
2. Doudoune moncler says:
I am really enjoyed for this blog. It is actually an informative subject. It assists me really considerably to solve some issues. Its opportunities are so great and working style so speedy. I feel it may possibly be assist all of you. Thanks.
3. I’ve been just after the Internet for such information and i wanted to thank u for the post. Also, just off topic, how can i download a copy of this theme? C Thank you
Speak Your Mind |
Twelfth Night
Read play
Analysis as PDF
Word Cloud
#Summary of the play
The Twelfth night is classed as a comedy play, which see Orsino, the Duke of lllyria, falling in love with the Countess Olivia, he is rejected by her due to her mourning the death of her brother. A ship carrying a young woman called Viola who had been picked up by a group of sailors, after surviving a shipwreck, she believes her twin brother Sebastian had be killed in the wreck.
Viola decided she wants to work in the Duke of lllyria household and the only way to do so is to dress as man called Cesario, gaining her a job as a page boy for Duke Orsino, who she quickly falls in love with but knows she cannot do anything about her feeling due to the Duke believing that she is a male.
Orsino, who think that by sending his new page boy Cesario (Viola) to woo Olivia on his behalf, but this then backfires as it only makes Olivia fall in love with the page boy, making her want to marry him and sends her stewart Malvolio after “him” with a ring.
Olivia’s uncle, Sir Toby Belch, her servant Maria, and Sir Andrew Aguecheek, who is Sir Toby Belch friend, and also is looking to make Oliva fall in love with him, they decided together to expose Olivia stewart Malvolio who is always looking to woo Olivia, they do this by tricking him into believing that she is falling in love with him by sending love letter to him asking him to dress in certain clothes, which he does, leaving the Countess horrified and demand Malvolio to be lock away as a madman.
Then the play take a turn which sees Viola twin brother Sebastian who has survived the wreck turning up in lllyria, this leads to confusion between the characters due to the fact that Viola and Sebastian look-a-like, which leads to Cesario being challenged to a dual by jealous Sir Andrew, but Sebastian’s sea capital and friend Antonio steps in to help and lands up being arrested.
The play ends with all being revealed that Cesario is in fact Viola dressed as a male, then the attraction grows between Olivia and Sebastian, and also with Duke Orsino falling in love with Viola, and both agree that when she starts dressing like a female again they will get married.
The significance of Words
We compared words that are linked to gender. We focused on this due to the nature of the play, where Viola dresses as a man to work for Duke Orsino’s household. AntConc reported the following results:
• The word “sir”
• The word “madman”
• The word “he”
• The word “she”
There is a relevant difference in use of words like Sir/Madam and he/she that is directly linked to the events taking place in the play. As Viola dresses as a man, we can clearly spot the difference between the use of male words over the use of female words.
• The word “love”
• The word “Mad”
Seemingly, no one in the play is truly mad yet everyone is accused of madness throughout the duration. This adds to the turbulent atmosphere of the play which is brought about by the pursuit of love. It seems from the plotted graphs that the words “Love” and “Mad” are used more frequently in absence of one another which suggests that the madness occurs when searching for love and not from the emotion itself. This adds to the idea that Orsino and Olivia’s “love” isn’t real but is just a product of their search for love as Orsino changes his love interest rather quickly from Olivia to Viola and Olivia changes her love interest from Cesario to Sebastian.
Character interaction
The interaction between characters plays a central role in this play.
Information about the structure of the play and insight into its plot itself can be extracted by computing when main characters meet each other on stage.
Using a tagged version of the play and, we parsed events like Enters and Exits and computed which characters were on stage at any given time. In this chart characters appear as columns and time goes by vertically downwards:
Character interactions
With this information and a basic understanding of the play, we can see how the interaction between characters highlights different characteristics of the play.
One example are the appearances of Sir Andrew Aguecheek and Sir Toby Belch. Sir Andrew, with a single exception, always appears on stage with Sir Toby, and often enters after or leaves before him. Sir Toby is more dominant as a character in terms of driving the action forward, while Sir Andrew is more of a counterpoint to Sir Toby.
It is noticeable too how Duke Orsino, decisive to the play’s argument, doesn’t appear very often.
We can also see how the appearances of Viola and Toby, each on a different subplot, interleave prior to Act 3, when both subplots meet.
Clothing is an important part of the play of Twelfth Nights, due to the main themes in the play is the fact that Viola is changing her identity to be a male Cesario, to gain access to the Duke household, which then turns into her nightmare as she falls in love with the Duke, but this love cannot be perused due to her male identity, also the character of the Malvolio and why the words were use to describe his clothing.
Colour of clothing in Elizabethan times was important in showing your station, in accordance with English Law, known as the Sumptuary Laws. Failure to comply with the Sumptuary Laws could result in fines, confiscation of lands, titles and property, imprisonment and even death.
Purple clothing was worn only by royalty to instantly show their class. Colours like gold, crimson, bright white etc. were reserved for the highest nobility. Yellow, however, was a colour for the lower classes in Elizabethan society as it was the most common dye as it was easy to produce and could be made in England without shipping foreign plants. This shows yellow as a symbol of lower-class and that Malvolio is unintentionally displaying his true position in his society.Clothing
Part of Malvolio’s character is the scene in which he dresses “silly” to try and win Olivia’s heart; one of the words that is overused in Twelfth Night compared to other Shakespeare’s plays is the word “cross-gartered”: this refers to the yellow stocking with the criss-cross ribbon that is part of Malvolio’s costume. As you can see from the above table generated by Vocabalance, the words ‘cross’, ‘yellow’, ‘stockings’ and ‘gartered’ are in the higher range of words that are relevant to the character of Malvolio.
Yellow as a Symbol
One of the most relevant words used in Twelfth Night when compared to other Shakespeare works is “Yellow”, as shown by the Twelfth night Word-Cloud.
The main use of yellow in the play is for Malvolio’s cross-gartered stockings. Yellow is a key symbol in the play and important as a symbol for Malvolio’s character. Malvolio dons bright yellow stockings in order to attract Olivia and move up in station.
As early as 1270, Anti-Semitism was gaining popularity in England and people viewed the Jewish community as a threat. In response, King Edward I decreed that Jews would need to identify themselves by wearing a yellow star on their clothing to identify them as the lowest class in society and ostracize them from other English people. Marvolio’s yellow socks would have been viewed as a symbol of his lower class by the Elizabethan audience and would have accentuated the ridiculousness of his endeavour of courting Olivia in order to rise above his caste. Yellow has also been recognised in Christianity as a symbol of hope, rebirth and renewal, and would have been worn by priests around Easter to symbolise the return of Christ. These religious connotations could have been applied to Marvolio as a symbol of his hope to reimagine himself as a worthy suitor for Olivia and advance into high-class society. Yellow also has connotations of boundless joy and excitement which would have made Malvolio very unattractive to Olivia as she is mourning the death of her brother and the stockings would have seemed very opposite and insensitive to her melancholy.
At the time of Shakespeare writing Twelfth Night, medical science surrounded the idea of The Four Humours in a human body. The Four Humours were thought to be the 4 liquids in the body that determined a person’s health by the balance or imbalance of the liquids. The humours were: Yellow Bile, Black Bile, Blood and Phlegm. Shakespeare appears to subscribe to this idea as he thinks that blood is held solely in the liver, “…If he were opened and you find so much blood in his liver as will clog the foot of a flea”. It was commonly believed that cowards had white livers which were drained of blood as blood was the humour of passion and courage. An example from Shakespeare’s Macbeth shows Shakespeare’s understanding of the humours.
“And take my milk for gall (1.5.53)”. Gall comes from an excess of yellow bile. An imbalance of yellow bile in the body turns one ruthless and ambitious. The replacement of milk in a woman, seen as a symbol of maternity and feminine gentleness, for yellow bile shows that Lady Macbeth wants to abandon any emotions in order to help kill King Duncan.
Romeo in Romeo and Juliet would be considered a textbook example of a person with “too much blood.” He is extremely “warm and moist” in his characterization as being amorous, hopeful, courageous, optimistic, and loving. This is seen in his interactions with Juliet, he is very loving and amorous towards her, and he is also hopeful and optimistic that their relationship/marriage will be able to overcome the feud of their families.
It was believed that an excess of yellow bile in a person could make them angry and irritable which is personality traits that can be seen in Malvolio. ‘I marvel your ladyship takes delight in such a barren rascal… I protest, I take these wise men that crow so at these set kind of fools, no better than the fools’ zanies.’ (Act 1, Scene 5). Lines like this show that Malvolio doesn’t see much value in fun and humor. And he thinks this puts him above all the other characters: here’s another quote from Act 3, Scene 4:
‘Go, hang yourselves all! You are idle shallow things: I am not of your element: you shall know more hereafter.’ When Malvolio accuses the other characters of being idle and shallow, he’s setting himself above them. He thinks he’s better than everyone else, and he fantasizes about having power over them so he can make them follow his rules (one example is in Act 2, Scene 4, when he imagines having the authority to scold Sir Toby for drinking too much).
This makes him the perfect target for the prank of the false letter, because he’s only too happy to believe it, and it takes him a long time to figure it out while the other characters get to have fun at his expense. |
Kids Corner
To Serve & Protect:
Sikh-Americans in US Army
General Frank Walter Messervy, a British Indian Army officer who served in World Wars I and II, described an observation he had of a particular kind of solider serving the British army:
"In the last two World Wars, 83,005 turban-wearing Sikh soldiers were killed and 109,045 were wounded. They all died or were wounded for the freedom of Britain and the World, enduring shell fire with no other protection but the turban..."
The sheer number of Sikhs soldiers cited serving in the British army is a testament to how much faith the British army has in Sikh soldiers. It is also a testament to the British Army's respect for turbaned Sikhs serving with their religious articles of faith intact.
The ban on a Sikh-American soldier's articles of faith suggests that the US Army regards the standard uniform of a crew cut and shaved face as the binding factor among US soldiers.
During World War I, American women and African Americans struggled to fully participate in the US Military for fifty years, because gender and race were perceived as a disruption to military unit cohesion.
This again reinforces that there is something deeper than appearance in the way of race or gender that binds US military soldiers together to create a common spirit. When it comes down to life-defining moments, most converge on the shared experience we call life.
As a nation, we have outgrown these outdated inequalities, so let's move forward and not waste time re-living archaic notions that suggest we ban Sikh-Americans from the US Military, only to let them participate fifty years from now. Let's get on with the business at hand.
A Sikh soldier's turban is a guarantee of that very spirit.
Let Sikh-Americans serve in the military with their articles of faith.
June 27, 2009
Conversation about this article
1: I.J. Singh (New York, U.S.A.), June 27, 2009, 7:13 AM.
It took women over 150 years to get the right to vote; Black and White units in the United States armed services were not integrated until Harry Truman finally moved on the issue during the Second World War. We have been here a hundred years but, considering that we won the right to vote only in 1946, we remain the new kids on the block. Progress is slow and history is continually made, but never smoothly and always in a non-linear path. Certainly, in the matter of the armed services, we will need passion but, even more importantly, the steady, consistent unwavering commitment and dedication of a lifetime. Notwithstanding the zigzags, the steady march of this society is heartening. Success will be ours. As a song from the protest marches for racial equality in the 1960s goes: "I do believe deep in my heart that we shall overcome someday."
Comment on "To Serve & Protect:
Sikh-Americans in US Army"
|
Crotalaria sagittalis L.
Family: Fabaceae
arrow-headed rattle-box, more...
[Crotalaria fruticosa Mill., more]
Crotalaria sagittalis image
J. Carroll
Etymology: Crotalaria: from Greek crotalon, meaning "rattle," referring to loose seeds inside inflated pod
Plants: erect, annual, 4"-16" tall, hairy forb
Leaves: hairy, almost stalkless, undivided, linear to lance-shaped
Flowers: yellow, 5-parted, 1/8"-1/2" long; inflorescence with 2-4 short-stalked flowers per cluster (raceme); blooms June-Sept.
Fruits: oblong, inflated, and mostly stalkless pod
Habitat: dry; disturbed sites
Conservation Status: Special Concern
View Genus View Specimen Records |
Jewish Foods
Home | About Us | Submit a Recipe | New Recipes | Links
Kosher Grocery Store | Kitchenware | Judaica | Free Offer | Sale | Search Jewish Foods
Jewish Foods
Jewish Recipes
Kosher Recipes
Jewish Cooking Terms
Jewish Foods
Jewish Spices
Jewish Cookbooks
Baba Ganoush
Gefilte Fish
Jewish Holidays
Kosher Recipes
Kosher Wines
Lox (salmon)
Jewish Cooking
Kosher Symbols
What is Kosher ?
What is a hechsher?
Page Options
Jewish Recipes: Copyright - Disclaimer
Add us to your favorites
Jewish Recipes --> Jewish and Israeli Foods --> What are Latkes?
Potato pancakes or latkes (sometimes spelled latkas) are cakes of grated potatoes fried in oil. Potato pancakes are called "latkes" in the Jewish tradition, but they are a European food and not specifically a Jewish one.
Also See:
Hanukkah and Latkes Recipes
Potato pancakes very likely originated in Eastern Europe, where they are still eaten in large numbers. Areas like northeast Poland, for instance, know many varieties. A favorite Polish dish is placki wegierskie, potato pancakes stuffed with a thick spicy Hungarian goulash.
Potato pancakes are an important part of Jewish cuisine in the United States and Europe. They can be served any time, but by tradition they are especially popular in the celebration of Hanukkah. Eating potato pancakes is not one of the mitzvot of Hanukkah; that is, it is not a fundamental part of the Hanukkah rituals, and has no explicit religious significance. However, Jews find it appropriate to eat foods cooked in oil during the festival that celebrates the miracle of the Temple oil. In Israel, where they are known as levivot (singular levivah), potato pancakes are familiar and well-liked, but sufganiyot (jelly doughnuts, singular sufganiyah) are considered to be more Israeli.
Latkes are often eaten with sour cream, applesauce, or both.
Recipes for potato pancakes vary in the degree of fineness to which the potatoes are grated. Some are grated to long strips, others to a fine powder. Potato pancakes bear a distant resemblance to the American dish called hash browns; however, hash browns are merely coarsely grated potatoes with no binding ingredients or flour. The French dish commonly known as "potato galette" is also similar, but in it the sour cream is an ingredient rather than a topping.
The Swedish version of potato pancakes are called "raggmunk", which literally translates to hairy doughnuts, the grated potatoes making them look hairy. They are made from wheat flour, milk, egg, and potatoes, and are fried just like thin pancakes. If the actual pancake batter is left out, the fried cakes of grated potatoes are called rårakor. Both kinds are enjoyed with fried bacon and/or lingonberry jam.
One recipe for potato pancakes is given below. Variants include cheese latkes, zucchini latkes, and apple latkes.
4 large potatoes
1 medium onion
1 egg, beaten
2 tablespoons Matzo meal, corn meal, or flour
salt to taste
2 tablespoons vegetable oil (for less oily latkes), or enough oil to fill the pan to about 1/4 inch (1/2 cm).
applesauce and/or sour cream
Peel potatoes and onion and grate.
Optionally soak the resulting mixture in water, or squeeze it in a dishtowel, in order to remove excess starch.
Mix potato and onion with egg, meal, and salt.
Heat oil in a 10" pan over medium heat until it is quite hot. Drop 1-2 tablespoons of the potato mixture onto the pan per pancake.
Turn once to allow both sides to fry. Allow 10-15 minutes total.
Serve with applesauce and/or sour cream as a topping.
Serves four. |
Proudly supported by
Home Under Threat Elephant Behaviour Projects The Bees Saving Elephant Project Please click to DONATE
Protecting a future for wildlife and people
Bees Saving Elephants Project
It's the bees knees...
Why we need the bees The elephants are struggling to survive. The daily battles they're facing isn't just with poachers and the horrific ivory trade. There's another factor: Human-elephant conflict (or HEC). It's a complex subject, but what does it mean for elephants and people in Tanzania? Farming communities in rural Tanzania rely solely on their crops as a source of food and income. It’s a volatile livelihood: unforgiving soil, frequent droughts, and little to no innovation in effective farming equipment or techniques. Harvesting a yield of crops is challenging at the best of times. There’s also the every day battle for land, fought between people and wildlife. Elephants are often at the heart of this, because their survival depends upon their freedom to roam across large expanses of land, in search of food and water.
When a hungry herd of elephants make their way through the bush lands and open plains, it’s inevitable that they’ll become attracted to what looks like a free-for-all feast of maize. Rural communities and farmers regularly come face to face with herds of elephants. This meeting does not end well for either party.
Hope rests with the African honey bee! Together with your support, we can provide an effective, working solution!
You may not be aware that elephants are incredibly scared of bees! Just like us, elephants have very sensitive skin. Bees are clever and will target an elephant's thin skin around their eyes, ears and inside their trunk. Hearing the familiar hum of bees, an elephant herd will hastily leave the area. Only bees have this effect on elephants!
As a result of this remarkable discovery, made by Dr. Lucy King in Kenya, an innovative technique is used by farmers to protect their crops!
A practical, low tech solution with a double impact!
Bees are protecting crops from migrating elephants By doing so, they prevent retaliation attacks on elephants by the farmers These clever peacekeepers are creating a new sustainable income for communities, with their delicious organic honey for the farmers to harvest and sell!
We're using techniques developed by Dr. Lucy King, in Kenya, to provide an effective natural deterrent for farmers to own and develop in Northern Tanzania. A field of crops is surrounded by a simple wire fence linking a number of suspended beehives. When elephants approach (usually at night) to tuck into a delicious meal of maize, they carefully attempt to step over the fence surrounding the land. Even with care, the wire fence is knocked, disturbing the bees and their hives. On realising there are agitated bees nearby, the elephant beats a quick retreat and moves off in the opposite direction. They send a unique rumbling call to their herd; a warning that bees are nearby.
Saving the farmer's livelihood Elephants can roam unharmed An environmentally-friendly solution to preserving crops & protecting elephants Bees boost a balanced ecosystem through wild flower & crop pollination.
You can help us today, by making your impact on the Bees Saving Elephants Project. You can help us to provide the beehives and training for farming communities in Tanzania. You will transform their future and ensure we can work together to save the enchanting and iconic elephants of Tanzania. Find out how you can be directly involved and make your mark on conservation today!
Elephants and communities NEED YOU! If you believe in saving these magnificent creatures and empowering people to make change happen, why not become a Wild Survivors' volunteer? There are so many ways you can help! Whether it's fundraising or taking part in projects; get in touch to discover different opportunities for you to make a real difference.
Future Projects in Planning Select photos to explore
Protecting Elephants
Back to top
“The idea of wilderness needs no defence, it only needs defenders.” Edward Abbey
Copyright Wild Survivors 2015-16 Wild Survivors is a UK Registered Charity (No. 1165732) Registered office: High House Farm, Mendlesham Green, Stowmarket, Suffolk, IP14 5RQ
Connect with us on: |
Venice, part 2…Venecia, parte 2
Text credits:
Outstanding Universal Value
Brief synthesis
The UNESCO World Heritage property comprises the city of Venice and its lagoon situated in the Veneto Region of Northeast Italy. Founded in the 5th century AD and spread over 118 small islands, Venice became a major maritime power in the 10th century. The whole city is an extraordinary architectural masterpiece in which even the smallest building contains works by some of the world’s greatest artists such as Giorgione, Titian, Tintoretto, Veronese and others.
In this lagoon covering 50,000 km², nature and history have been closely linked since the 5th century when Venetian populations, to escape barbarian raids, found refuge on the sandy islands of Torcello, Jesolo and Malamocco. These temporary settlements gradually became permanent and the initial refuge of the land-dwelling peasants and fishermen became a maritime power. Over the centuries, during the entire period of the expansion of Venice, when it was obliged to defend its trading markets against the commercial undertakings of the Arabs, the Genoese and the Ottoman Turks, Venice never ceased to consolidate its position in the lagoon.
In this inland sea that has continuously been under threat, rises amid a tiny archipelago at the very edge of the waves one of the most extraordinary built-up areas of the Middle Ages. From Torcello to the north to Chioggia to the south, almost every small island had its own settlement, town, fishing village and artisan village (Murano). However, at the heart of the lagoon, Venice itself stood as one of the greatest capitals in the medieval world. When a group of tiny islands were consolidated and organized in a unique urban system, nothing remained of the primitive topography but what became canals, such as the Giudecca Canal, St Mark’s Canal and the Great Canal, and a network of small rii that are the veritable arteries of a city on water.
Venice and its lagoon landscape is the result of a dynamic process which illustrates the interaction between people and the ecosystem of their natural environment over time. Human interventions show high technical and creative skills in the realization of the hydraulic and architectural works in the lagoon area. The unique cultural heritage accumulated in the lagoon over the centuries is attested by the discovery of important archaeological settlements in the Altino area and other sites on the mainland, which were important communication and trade hubs.
Venice and its lagoon form an inseparable whole of which the city of Venice is the pulsating historic heart and a unique artistic achievement. The influence of Venice on the development of architecture and monumental arts has been considerable..
Créditos de este texto:
¿Qué es Venecia?
Venecia es un conjunto de 120 islas unidas a través de puentes. Desde Mestre se puede llegar a Venecia utilizando el Puente de la Libertad, que lleva hasta la Piazzale Roma.
Como es de imaginar, la ciudad ha sufrido inundaciones periódicas desde sus inicios y, a día de hoy, la ciudad continúa sufriendo las amenazas de las repetidas inundaciones que provocan el fenómeno conocido como Acqua Alta.
En primavera y otoño suele subir el nivel del agua, por lo que es frecuente que la Plaza de San Marcos se inunde hasta tal punto que las autoridades tienen que colocar pasarelas para que caminen los peatones.
Para comenzar a conocer Venecia, puedes empezar leyendo sobre sus distritos, sus puntos de interés o su historia.
¿Por qué visitar Venecia?
Para nosotros Venecia es un destino mágico y se nos ocurren cientos de razones para visitarla.
Si tuviéramos que dar sólo una, sería que es una ciudad única en el mundo y completamente diferente al resto, un lugar con un espíritu único que hace que todo el mundo se enamore de ella.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
Manhood Suffrage
“Those who hold the reins of government entirely in their own grasp should seriously consider whether it would not be far wiser to carry such a measure now they have the ability, and while there is no hostile popular pressure, than to wait until a stormy reformation has swept them from power, and a manhood suffrage, conceded to the agitated masses to prevent a continuance of riot and revolt, has politically annihilated the classes who have hitherto usurped the entire government of the state.”
We have produced a reading of Charles Bradlaugh’s pamphlet ‘The Real Representation of the People’ to commemorate his contribution to campaigning for votes for men and women resulting in legislation in February 1918. Next month sees the centenary of this significant democratic event that Bradlaugh was unable to witness due to a life cut short by the strain of fighting for liberty for all. |
Ecstasy Facts
• Ecstasy's scientific name is "MDMA," short for 3,4-methylenedioxymethamphetamine.
• Ecstasy is synthetic, meaning that it does not come from a plant like marijuana does.
• This drug is often made in secret labs, in trailers, basements, and even kitchens hidden around the country.
• Some pills sold as ecstasy actually contain little or no MDMA. Pills may contain other drugs such as PMA or another MDMA analogue, DXM, household chemicals such as Ajax or rat poison, or other (sometimes lethal) byproducts.
• The Federal penalty for manufacturing or selling ecstasy can lead to fines up to four million dollars. A ringleader or head manufacturer of ecstasy could receive life in prison.
• Ecstasy is most commonly used at all night parties called "raves."
• MDMA (ecstasy) was first synthesized and patented in 1914 by the German drug company called Merck.
• Ecstasy is taken orally, usually in a tablet or a capsule form.
• Slang words for ecstasy are: E, XTC, X, Adam, hug, beans, clarity, lover's speed, and love drug just to name a few.
Ecstasy Facts: Ecstasy Effects and Side Effects
• Memory tests of people who have taken ecstasy as compared to non-drug users have shown that the ecstasy users had lower memory scores.
• Ecstasy's psychological side effects include confusion, depression, sleep problems, anxiety, and paranoia. These ecstasy side effects take place while one is using the drug as well as the weeks following ecstasy use.
• Brain imaging research in humans indicates that ecstasy causes injury to the brain, affecting neurons that use the chemical serotonin to communicate with other neurons.
• Physical symptoms due to ecstasy use include muscle tension, involuntary teeth clenching, nausea, blurred vision, rapid eye movement, faintness, and chills or sweating.
• The effects of ecstasy last approximately 3 to 6 hours.
• Ecstasy can produce a significant increase in heart rate and blood pressure. It also creates a sense of alertness similar to the symptoms associated with amphetamine use.
• The stimulant affects this drug, which enables users to dance for extended periods, may also lead to dehydration, hypertension, and heart or kidney failure.
Ecstasy Facts: Ecstasy Health Hazards
• Researchers at The Johns Hopkins University recently conducted a study in primates showing that exposure to ecstasy for 4 days caused brain damage that was evident 6 to 7 years later.
• Ecstasy can be extremely dangerous in high doses. It can cause a marked increase in body temperature (malignant hyperthermia) leading to the muscle breakdown and kidney and cardiovascular system failure. Use may also lead to heart attacks, strokes, and seizures in some users. There have been numerous fatalities due to ecstasy use over the years.
Ecstasy (Drug)
Ecstasy is known by chemists as MDMA, for 3, 4 methylene dioxymethamphetamine. It is an old drug, synthesized about 70 years ago for use as an appetite suppressant. During the late 1980's, MDMA began to grow in popularity among college students, who discovered that the drug made them feel alert, yet relaxed. They reported feelings of warmth toward each other, but they were not hyperactive.
Ecstasy-Parkinson's Connection?
(AP) Partying with Ecstasy several times a night, a common practice among users of the illegal drug, may damage key neurons in the brain and perhaps hasten the onset of Parkinson's disease, according to a study in monkeys.
Officials: Ecstasy is back, and it's laced with meth
ALBANY, New York (CNN) -- Nick, 16, says ecstasy is rampant in his high school, with kids often mixing the drug with meth and other substances. art.ecstasy.meth.cnn.2.jpg More than half of all ecstasy seized in the United States last year was laced with meth, authorities say. "You just have to know the right person. It's about as easy as any other drug. You just gotta ask for it," says Nick, who asked that his last name not be used. "It's easy to get." Law enforcement officials say stories like these highlight a disturbing trend they're seeing across the country. Most alarming, they say, is not only is ecstasy back after years of decline, but most of the time it's laced with meth.
Ecstasy: a home brew to die for
MORE than 100,000 ecstasy tablets, with a street value of more than $3 million, are consumed every weekend in Australia — and, police say, much of it is now made locally by backyard operators cashing in on demand. Australia is a world leader in the consumption of the dangerous and illegal drug, with 3 per cent of the population using the so-called party drug on a regular basis. Police say local criminals are increasingly using the internet to find out how to make ecstasy and to order chemicals and equipment instead of importing the drug from overseas. Detective Inspector Pat Boyle, acting head of the state's major drug taskforce, said Wednesday night's seizure of 1900 litres of liquid ecstasy in Sydney would have only a short-term impact on the market The chemicals could have been used to make 18 million tablets, worth $540 million. |
Biome Collage
In Glogpedia
by stigger
Last updated 5 years ago
Toggle fullscreen Print glog
Biome Collage
The Artic Wolf has a thick coat to protect it's skin from the ➜ cold.The Calliergon Giganteum adapts to the cold climate by storing nutrients when it isn't growng so leaves can be made next spring. ➜
Taranturals can feel the vibrations in the ground, which helps when dealing with predators. ➜The Globe Mallow has tiny leaf hairs that are used to discourage herbivores from eating it. ➜
The Snowshoe rabbit has fur on the bottom of it's feet to give it traction in the snow. ➜When the Caribou Moss has no water available to it, it simply dries out and goes dormant. Even after long ➜ periods of dormancy, it can still grow again.
Chimpanzees have adapted by building their nests very high in trees. ➜ The Bengal Bamboo's adaptation is that it grows very fast in order to obtain more rain and sunlight. ➜
Biome Collageby Sammy Taliercio
Tropical Rain Forest
There are no comments for this Glog. |
"Mushroom coral" redirects here. For soft mushroom corals, see Corallimorpharia.
Fungia scutaria
Scientific classification
Kingdom: Animalia
Phylum: Cnidaria
Class: Anthozoa
Subclass: Hexacorallia
Order: Scleractinia
Family: Fungiidae
Dana, 1846 [1]
See text
The Fungiidae /fəŋˈɡ.d/ are a family of Cnidaria, often known as mushroom corals. The family contains thirteen extant genera. They range from solitary corals to colonial species. Some genera such as Cycloseris and Fungia are solitary organisms, Polyphyllia consists of a single organism with multiple mouths, and Ctenactis and Herpolitha might be considered as solitary organisms with multiple mouths or a colony of individuals, each with its separate mouth.[2]
Wikinews has related news: Mushroom corals change from male to female and back again
Species are generally solitary marine animals capable of benthic locomotion.[3][4] These corals often appear to be bleached or dead.[5] In most genera, a single polyp emerges from the center of the skeleton to feed at night. Most species remain fully detached from the substrate in adulthood. Some are immobile as well as colonial.[6][7]
Some species of mushroom coral such as Fungia repanda and Ctenactis echinata are able to change sex. This is posited to take place in response to environmental or energetic constraints, and to improve the organism's evolutionary fitness; similar phenomena are observed in some dioecious plants.[8]
The World Register of Marine Species includes these genera in the family:[1]
Notable species
Importance to humans
Members of the family Fungiidae are not of any commercial importance, but are collected for the aquarium trade and are sold as "plate corals".
1. 1 2 WoRMS (2015). "Fungiidae: Dana, 1846". World Register of Marine Species. Retrieved 2015-07-21.
2. Veron, J.E. (2013). "Colony formation". Corals of the World. Australian Institute of Marine Science. Retrieved 2015-04-22.
3. Halstead, Bob. 2000. Coral Sea Reef Guide. Sea Challengers, Danville, CA, USA.
4. "The Best Livestock For Your Reef Aquarium: Plate Corals, Family Fungiidae, Pt. 1". Retrieved 2009-02-22.
5. "Stony Corals From The Family Fungiidae, A.J. Nilsen, October 1997, Aquarium.Net". (Where Reefkeeping Begins on the Internet). Retrieved 2009-02-22.
6. 1 2 "BioLib - Heliofungia actiniformis (Long tentacle plate coral)". Retrieved 2009-02-22.
7. "Fungioidea". 2002-10-28. Retrieved 2009-02-22.
8. Yossi Loya and Kazuhiko Sakai, "Bidirectional sex change in mushroom stony corals", Proceedings of the Royal Society B, 22 October 2008
9. "Siokunichthys nigrolineatus". Fishbase. Retrieved 2009-02-22.
12. "Predatory coral eats jellyfish". BBC News. 2009-11-13. Retrieved 2009-11-13.
See also
Wikispecies has information related to: Fungiidae
Wikimedia Commons has media related to Fungiidae. |
Imagine that, in the near future, pollution, overpopulation and war leads to a massive extinction where almost all chordates, some invertebrates and many plants are wiped out. Small, resilient plants, insects and the like remain, but all megafauna is dead.
Then, mere decades later, an interstellar ark arrives at Earth from another world. On board are a multitude of sapient species, which fled another warlike race that has since destroyed their homeworlds. To them, Earth was like Kepler 186f is to us. They had discovered it beforehand, confirmed it to be in the habitable zone, but did not know whether or not it had any life. So, they brought with them hundreds of species from their world (Mainly from one planet, since they would have all been completely different in physiology if they were all from different worlds.). They arrive at the barren Earth and introduce the alien creatures across the globe, in whatever environment they're best adapted to.
So, the question is: If sapient species came to Earth after a mass exinction, and introduced hundreds of species from their own world, how long would it take for them to get a foothold? I know that natural selection is cruel, and not all the species would survive very long. However, with supervision, help and managing from sapient species, could they have fully functional ecosystems and food-webs all over the world? One with active predators hunting saltatorial grazers and heavy browsers, their carcasses fed on by scavengers?
If you require any more clarification, just say so (Nicely, preferrably.) in the comments and I'll edit it as soon as I can.
• $\begingroup$ What exactly do you mean by functional? How well do the aliens understand the interdependencies of the planed ecosystem? $\endgroup$ – user25818 Apr 25 '18 at 17:23
• $\begingroup$ @notstoreboughtdirt The aliens understand the mechanics and dynamics of ecosystems as well, if not better, than we do. They know the kind of population ratios that would be necessary (1:10 rule) to have a working ecosystem. Do you think I should add that into the body of the question? $\endgroup$ – SealBoi Apr 25 '18 at 17:28
• $\begingroup$ There are a great many variables in this question that directly influence any reasonable answer, such as continued presence of lethal elements of aforementioned mass extinction, length of time for 'dust to settle' on Earth, Alien parameters:(too many to mention here), and of course if the Aliens have technology sufficient to modify either/or species and environment, rendering them more compatible. $\endgroup$ – Joe Apr 25 '18 at 17:31
• $\begingroup$ this depends way to much on their technology and compatibility with earth life. you need to narrow it down a bit more. If earth life is toxic to them then never, if they are introducing their own megafauna it depends on how many (in terms of species and population) they introduce. intoducing 1000 individuals from 30 species will give a very diffrent answer than inducing 100 trillions individuals from 50,000 species. $\endgroup$ – John Apr 25 '18 at 18:47
Plan for about a century or two.
This is a case of invasive species. You have a shocked Earth ecosystem that you’re about to introduce true alien species into. There are two major things to consider here for each species you want to transplant:
1. How viable is this species within the existing ecosystem that matches its ideal climate?
2. How long does it take to propagate in said ecosystem?
The first question is the most critical. Invasive species tend to be so successful because the native species have no previous experience competing or surviving alongside them. As long as this foreign land is familiar enough to the invading species, it typically gains a foothold and then some. Ecological similarities might be a big sticking point for your aliens because rather than being transplanted from a separate region on the same planet, they’re from an entirely different planet. Even small atmospheric or planetary differences could prevent viability. If so, those species will die.
Propagation time depends on reproductive cycles and life spans. Invasive plants in the Americas have become immensely successful in a century or two, often in spite of active campaigns to eradicate them. You may very well be able to improve those times with active support of your flora. Fauna can take control of ecosystems even faster – Burmese Pythons in Florida have taken hold in the ecosystem in a matter of decades.
A note of caution here: you need both alien flora and fauna to have certain compatibilities with Earth life. Successful propagation of Earth plant species is often closely tied to insects and animals – if insects can’t assist in cross-pollination of your alien plants, that could be a serious problem. Likewise for animals – if they need to subsist on Earth fauna or flora, their digestive systems will need to be able to gain nutrients from the foreign materials efficiently.
Extinctions will, of course, be common. Given the general advantage of the invading species, it’s likely that native Earth species will lose the most. It’s inevitable, however, that some alien species won’t adapt well. All told this won’t be a fast process, but with active help from intelligent life, it won’t necessarily be too long either.
It depends a lot on:
1. how similar the ecosystem they are trying to introduce is to Earth's existing, surviving, lifeforms
1. how much of their "native" ecosystem in terms of both diversity and the vertical food-chain they have.
For example a species with left chirality will be starting from scratch with basic carbon capture etc... because all life on Earth uses right chiral enzymes (I'm not sure if it's even possible to have life with left chiral enzymes). Surprisingly enough if they have the necessary material, encompassing everything from primary producers in the form of their equivalent of Cyanobacteria to the higher animals, this is actually the best case scenario for fuss free colonisation; their crops etc... have no natural predators except what they bring with them because nothing on earth can interact effectively with their molecular biology. In this case they spread as fast as their native species can broadcast off-spring since their is little competition for basic resources with so much of "our" ecosystem destroyed and none of what's left can attack the new colonists.
At the other extreme if they're right chiral and DNA based they're prey to everything left living on Earth and probably have no natural resistance to any terrestrial bacteria, fungus or virus, because being DNA based doesn't mean they have anything like a terrestrial immune system. In this case it will be War of the Worlds all the aliens die within a few months of landing because something basic and intrinsic to us, like mitochondria, present a lethal pathogen.
I'd say the most likely scenario is something in-between; there are probably points of convergence in biological structure that make the aliens somewhat compatible with "life as well know it" so while they have little competition some of our native lifeforms do predate part or all of some of theirs at certain points in their life-cycle (whether that's while they're alive or one they're dead) so there will be some give and take. Colonisation will be possible but problems will crop up due to unexpected interactions.
This is like the Columbian Exchange
The Columbian Exchange on Earth provides the nearest real-life analogue. Look at how various creatures on Earth survived when introduced to the New from the Old.
There was a mass extinction of megafauna in the Americas. America's former horses went extinct (along with llamas and oxen and pretty much every other horse analogue except the American Bison). Horses were reintroduced in 1519 and rapidly expanded. On the other hand, it helped that Old World horse were probably the same species as the extinct horses.
Apart from horses, the earliest and most widespread case, there are also plenty of feral wild boar in North America, and water buffalo in Australia (technically not the Columbian Exchange, but the same concept). Neither of these animals had particularly close relatives that went extinct. Wild boar seem to have occupied the niche formerly occupied by black bears; while water buffalo compete are probably the analogue of extinct giant wombats. Both these introduced species expanded relatively rapidly; since widespread introduction in the 1800s they have feral populations in the millions (for boar) and up to 350,000 for buffalo in Australia before heavy culling.
I believe that if these species' is spacefaring to the level of interstellar travel, they should have more advanced knowledge in genetic engineering. In that case, I do not see a problem in integration with any natural environment.
Additionally, one could argue that because of their warlike origins, they should have even better technological advances on survival aids. Therefore, I do not think they or their fauna should take more than a decade to integrate with Earth's ecosystem even if the other civilization attempts to conserve the local life and not alter that.
Your Answer
|
Troubleshooting a Chandelier: Lights Not Working
There may be many reasons why your chandelier lights are not working properly. In most cases, the reason why some or all lights in your chandelier are not working is related to electrical power. Apart from this, the chandelier may be difficult to reach in order to clean it or replace an old light bulb. Today you can find extension poles which were originally created to help you reach such things more easily, however, if the chandelier is either too high or in the center of a room, then the extension will probably be useless. In several cities in the United States, you can hire some scaffolding to reach such chandeliers to check any lights which are not working.
If you want to solve this problem personally, first of all you need to know some basic information about electricity. Always remember to use extreme caution when working with any form of electricity.
1. Check the Circuit Breaker
The easiest way to check chandelier lights is by inspecting the circuit breaker of the house. The circuit breaker is the device which provides the chandelier with electric power. See whether it is turned on or off.
2. Check the Filament of The Light Bulb
two types of light bulbs
If you find that the circuit breaker is on, then go check the chandeliers and find which lights are not working. Turn the light bulb counter-clockwise to take it off. At this point you should examine the bulb’s filament to see if it is broken. If you see that the problem is caused by the filament or to test the theory of a bad bulb, discard the old light bulb and replace it with a new one.
3. Test the Chandelier Socket
If the new light bulb still does not work, try checking the socket that holds the light bulb in the chandelier. In order to test the chandelier socket, you need a two-pronged tester. Put one prong into the socket and let it touch the center of the socket, then allow contact between the second prong and a metal part of the socket. The tester should light if the problem has been solved.
4. Check the Wires of the Chandelier
Take off the chandelier from its place and check the black and white wires. Use the two-pronged tester again by putting one prong in the connector and touch the other prong with a metal part of the electrical box. If you see that the tester is on, then you need to replace the socket.
5. Test the Switch Box
light switch
If the tester does not turn on, then you should check the switch that you use to turn the chandelier lights on and off. Take off the cover and inspect the wires carefully to see that they are attached to a wire connector. Check also that the copper wires are not loose. Turn the switch on and use one prong of the tester on the right-hand-side screw of the switch and put the other prong of the tester on a metal part of the switch box.
6. Test the Wires of the Switch
Allow one prong of the tester to make contact with the right-hand-side black wire in the switch box and put the second prong on a metal part of the switch box. If the tester turns on, you need to replace the switch.
By following these few steps, you will more likely than not, solve your chandelier lights problem. If you are still having problems locating the cause it is advisable to refer to a professional electrician. |
DRS femme1 480x400DRS femme1 480x400
DrugRehab PotBanner
PotBanner narrow
Prevention & Education Programs In Canada
Drug prevention and education are one of the most important steps in helping youth and adults understand the dangers of drugs and addiction, and alcohol abuse. Education programs are set up in so many different ways and operate all throughout Canada in every province, city and town through private organizations, provincially and locally funded organizations. The purpose of drug education is to inform communities with current and up-to-date information about all the different types of drugs both illicit and legal, street and prescription. There is so much information available about drug and alcohol addiction and the different types of drugs that it can be difficult to filter through all of it, and this is why education programs are so important to help spread the current information among communities within different cities across Canada.
Get Involved with These Addiction Prevention Tools
DRS femme2
DRS femme2
Drug prevention programs are designed to teach people how to stay away from drugs and how not to abuse alcohol. These programs are especially important for youth so as they can make smart decisions when it comes to drugs and alcohol, and not get caught up in peer pressure and learn how to say no. Teens face problems with drugs on sometimes a daily basis during their time as school and among friends, but drug prevention programs can give them valuable life skills and tools to say no and not get caught up in addiction. Drug education and prevention are an essential tool in the battle against drug and alcohol addiction, and has proven very successful in helping people not become addicted to drugs and alcohol. |
Abraham: The Friend of Allah
Abraham, as a prophet and patriarch, is called "the friend of God" in Jewish, Christian, and Islamic scriptures, and has a place of eminence in the shared scriptures and histories of each of these three monotheistic, prophetic, and Middle Eastern religions.
In Abraham: The Friend of God, Dr. Dirks provides Jewish, Christian, and Muslim readers with a unique and original presentation of the life of Abraham. In constructing a chronological biography of Abraham, the author integrated and synthesized information from a wide range of Judaeo-Christian and Islamic traditions, including the Bible, the Pseudeigrapha (I.e. Jubilees and the Genesis Apocryphon), the Qur'an, the authenticated sayings (Sahih Ahadith) of Prophet Muhammad, and the classic books of ancient history authored by Josephus and Al-Tabari. This integrated biographical sketch is embedded in a framework drawn from the various historical and geographical contexts dealing with different aspects of Abraham's life. |
A Level Biology Quiz Questions and Answers 29 PDF Book Download
A level biology quiz, a level biology MCQs answers, GCE A level biology quiz 29 to learn online college biology courses. College and university courses MCQs, regulation and control quiz questions and answers, a level biology multiple choice questions to practice biology test with answers. Learn a level biology MCQs, career test on enzyme specifity, cardiovascular system, arteries and veins, a level biology test prep for biology certifications.
Practice a level biology career test with multiple choice question (MCQs): lining of proximal convoluted tubule does not have, with choices podocytes, microvilli, mitochondria, and co-transporter proteins for online biology degree. Learn regulation and control questions and answers for scholarships exams' problem-solving, assessment test.
Quiz on A Level Biology Worksheet 29Quiz Book Download
A Level Biology Quiz
MCQ: Lining of proximal convoluted tubule does not have
1. Podocytes
2. Microvilli
3. Mitochondria
4. Co-transporter proteins
Cardiovascular System, Arteries and Veins Quiz
MCQ: Largest artery is
1. Aorta
2. Jugular artery
3. Carotid artery
4. Thoracic aorta
Enzyme Specifity Quiz
MCQ: Most modern hypothesis about enzyme action is called
1. Lock and key hypothesis
2. Lock and substrate hypothesis
3. Induced fit hypothesis
4. Enzyme substrate hypothesis
Cardiovascular System, Arteries and Veins Quiz
MCQ: After circulation, blood returns to the
1. Left atrium
2. Vena cava
3. Right atrium
4. Right ventricle
Kidney, Bowmans Capsule and Glomerulus Quiz
MCQ: Glomerulus and Bowman's capsule are located in the
1. Medulla of the kidney
2. Cortex of the kidney
3. Pelvis of the kidney
4. Hilus of the kidney |
Farmworkers, Farm, Ranch, and Aquacultural Animals helps professionals in farm/ranch/aquacultural animals farmworker careers find better opportunities across all specialties and locations.
Also known as: Aquaculture Worker, Barn Hand, Barn Worker, Cattle Brander, Cattle Driver, Chicken Handler, Chicken Vaccinator, Cow Tender, Egg Gatherer, Farrowing Worker
Automation is increasingly replacing manual labor down on the farm, but there are still many tasks best performed by people. Called farmworkers, the tasks they handle depend on the size of the operation and what the farm grows.
On a livestock farm or ranch, these workers provide for the care ...
and feeding of the animals and poultry. At the first sign of disease, injury or poor weight gain, farmworkers give the ailing animal medical attention or arrange for veterinary care. They're also responsible for keeping the animals, and their living conditions, clean.
Many of the fruits and vegetable produced in this country are cultivated and harvested by hand. While machines help prep the soil and plant the seeds, the farmworkers do most of the transplanting, weeding, thinning and pruning.
Farmworkers may also operate and maintain machinery, as well as do general repairs around the property. Sometimes the job includes keeping production records. Working with heavy equipment and large animals can be dangerous. Other hazards include prolonged exposure to the sun and chemicals.
Many types of farming are seasonal, requiring long, labor-intensive days during planting and harvesting. At these times, a workday of 16 to 20 hours is not unusual, so this is a job that can be very physically demanding.
Many farms rely on day-to-day or temporary laborers, with most employers providing on-the-job training. Because no formal education is required, the pay tends to be low. In addition, agricultural labor is exempt from the overtime provisions of minimum wage laws.
People who chose this often-strenuous work enjoy growing and tending living things. For them, farming is more a lifestyle than a career.
Critical decision making
Level of responsibilities
Job challenge and pressure to meet deadlines
Dealing and handling conflict
Competition for this position
Communication with others
Work closely with team members, clients etc.
Comfort of the work setting
Exposure to extreme environmental conditions
Exposure to job hazards
Physical demands
Want to pursue a career as Farm/Ranch/Aquacultural Animals Farmworker? Create a job alert, and get new job listings in your area sent directly to you.
Feed and water livestock; and monitor food and water supplies.
Coordination Adjusting actions in relation to others' actions.
Operation and Control Controlling operations of equipment or systems.
Speaking Talking to others to convey information effectively.
There is a better job out there! |
Located a convenient eight kilometres south of the central business district on the north shore of Botany Bay, Sydney’s Kingsford Smith Airport is a world-class airport that connects Sydney to the rest of the country and the world with 28 regional, 23 domestic and 47 international destinations. Sydney Airport stands on what is considered the traditional lands of the Eora Aboriginals, and the site has played a central role in the city’s history since colonial days.
In 1813, convict-turned-successful businessman Simeon Lord established water-powered flour and wool mills after damming the Mill Stream, which resulted in Engine Ponds East and West. His enterprises were considered to be Australia’s first successful private manufacturing industries, and they operated until 1855 when the land was acquired by the government, which demolished the mills in 1862. The site was used for various reasons over the next several decades until 1911 when the first aircraft took off.
By 1920, the grassy pasture area had been declared an aerodrome and was christened Mascot Aerodrome. Just a year later, the Commonwealth began to develop it further as a part of their network of airports. Kingsford Smith now has the reputation as one of the oldest continuously operating airports in the world.
Sydney Airport was expanded during the 1930s, and in 1940, a new passenger terminal was added. During World War II, the airport was expanded even further, and new runways were constructed to provide more military and civilian functions. In 2002, the airport was privatised, and the airport was upgraded and expanded even further.
Today, Sydney Airport is the busiest airport in Australia with nearly 40 million passengers arriving and departing every year. Flights begin as early as 6 a.m. and continue until nearly midnight. Four terminals are available, including one freight terminal. Terminal 1 is the International Terminal and is located in the northwestern sector. It contains 30 gates, several remote bays and serves flights to Bangkok, Singapore, Los Angeles, Auckland and Dubai. Terminals 2 and 3 are domestic terminals that feature nearly 30 parking bays between the two terminals. Domestic passengers who are transferring to international flights may need to allow longer transfer times of about an hour since the International Terminal is located a runway away from the other terminals. The Freight Terminal is used for both international and domestic freight services.
Sydney Airport is easily accessible by train. Underground Cityrail stations are located beneath the International Terminal and the car park between Terminals 1 and 2. Shuttle bus and Sydney Buses also run routes to and from Sydney Airport. Road connections are plentiful, and driving to or from the airport is also a viable option for many. Short-term and long-term parking are both available, and International and domestic terminals offer bicycle racks for those who live nearby.
Accommodations around the airport are plentiful and include budget hotels, five-star hotels and many other options in between. Airport hotels tend to offer convenient access to the CBD and some of Sydney’s top attractions so that no matter how long you plan to be in the city, you will always find plenty to keep yourself occupied. |
C Shell (csh)
Definition - What does C Shell (csh) mean?
The C shell (csh) is a command shell for Unix-like systems that was originally created as part of the Berkeley Software Distribution (BSD) in 1978. Csh can be used for entering commands interactively or in shell scripts. The shell introduced a number of improvements over the earlier Bourne shell designed for interactive use. These include history, editing operations, a directory stack, job control and tilde completion. Many of these features were adopted in the Bourne Again shell (bash), Korn shell (ksh) and in the Z shell (zsh). A modern variant, tcsh, is also very popular.
Techopedia explains C Shell (csh)
The C shell was created by Bill Joy while he was a graduate student at UC Berkeley in the late 1970s. It was first released as part of the 2BSD Berkeley Software Distribution of Unix in 1978.
The C shell gets its name from its syntax, which is intended to resemble the C programming language.
The C shell introduced features that were intended to make it easier to use interactively at the command line, though like other shells it is capable of being scripted. One of the most notable features was command history. Users can recall previous commands they have entered and either repeat them or edit these commands. Aliases allow users to define short names to be expanded into longer commands. A directory stack lets users push and pop directories on the stack to jump back and forth quickly. The C shell also introduced the standard tilde notation where "~" represents a user's home directory.
Most of these features have been incorporated into later shells, include the Bourne Again shell, the Korn shell and the Z shell. A popular variant is tsch, which is the current default shell on BSD systems, as well as on early versions of Mac OS X.
Share this: |
What is an invoice?
• An invoice is a document that keeps a record of a sale.
• It lists vital information about a transaction such as date of purchase, mode of payment, and items purchased.
• Fraudsters have devised ways to get money out of companies through invoice fraud, so beware.
When you purchase an item in a store, the seller will give you a piece of paper as proof of the receipt of your payment—which is more formally called an ”invoice.” An invoice is a commercial document that lists the transaction between the seller and the buyer.
Information found on the invoice
The invoice should clearly state the following information:
1. Amount due – it is essential to display the exact amount of the purchase, and any confusion leads to delays.
2. Date of the invoice – the time is crucial because it gives a timestamp for when the goods were officially sold or paid.
3. Payment due date – this marks the period of the latest possible time that the customer must pay.
4. Description of the goods and service – all of the items purchased shall be on this list.
5. Customer’s information – the invoice has to contain information such as the customer’s name, contact number, and address.
Importance of an invoice
At its most basic form, an invoice is used to keep a record of a sale. It tracks the date of the purchase, the payment, and holds a record of the buyer’s debt if any. A business can also trace its employee’s sales through invoices. Also, providing an invoice for every purchase is a legal responsibility in most countries including the U.S. It is a vendor’s responsibility to pay their taxes truthfully, and they can only do so if they give out correct invoices. It also really helps if you ask for a receipt everytime you are purchasing because it leaves a mark on their sales record. If the buyer’s invoice got lost, the seller has the responsibility to provide a copy.
What is invoice fraud?
Invoice fraud schemes can be incredibly simple: Fraudsters who act as a legitimate seller send an incorrect, more expensive or fake invoice to an unsuspecting company in an attempt to extract money.
Here’s an example of a recent case:
An incident in Australia involving a well-known bank in a multi-million dollar invoice fraud was found to have corrupt employees doing the illegal activity from inside the company. These corrupt employees would authorize the payments of invoices for a legitimate contractor but with amounts higher than the agreed value.
How to prevent invoice fraud
One of the best ways to avoid invoice fraud is to validate the legitimacy of invoices that you receive by cross-checking it with your orders and the goods that you received. Double-checking the information such as the date, email address, bank details and contact information will help prove the legitimacy of the invoice received. Also, check if the supplier listed in the document is a real business establishment.
If you found any suspicious activities by the invoice sender, go ahead and run it by your financial advisor or call the U.S. anti-fraud hotline. Even if the amount is low, it is essential to make a report because they may be operating on a larger scale.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
Superstar Writers!Top of Page
Each student in Mrs. Sivori’s second grade class used the internet to research facts on a nonfiction topic of his or her choice. Students created a written report and then typed their nonfiction research reports on Google Docs. They learned how to change their font, size, and insert a picture and create their own caption. This is an example of using technology infused with literacy and science. |
The Campaign for Sustainable Transportation is open to considering a variety of forms of transit that may be appropriate for the corridor. On this page Bruce Sawhill, one of the most knowledgeable experts on rail issues—especially as they relate to our Santa Cruz Branch Line—has submitted the following piece.
For each of the nine paragraphs, the misconception—an assertion or a question—appears in red, and is responded to by Bruce Sawhill. As he says at the end of his piece, democracy only works with informed citizens.
Feel free to write to us (clickhere) if you have comments.
Clearing up misconceptions about the rail corridor and its potential use for passenger rail.
by Bruce Sawhill, PhD
1. There's not enough room for both a rail line and a trail.
It has been shown in the RTC's award-winning Monterey Bay Sanctuary Scenic Trail study that there is enough space for both. In some cases this requires moving the tracks to one side instead of the middle, but this is a common practice. There are areas of the corridor that are too narrow to have both tracks and a trail wide enough for separation of bikes and pedestrians. In those sections, bikes and pedestrians will share the trail. However, in most sections of the corridor, the minimum width necessary for separation of bikes and pedestrians is available alongside the tracks, should the community desire this.
2. A single track rail line is useless for rail service.
There are many single track lines in service around the US, even commuter lines with frequencies as high as every 15 minutes. Segments of parallel extra rail called “passing sidings” are built for this purpose in places where there is room. (Much of the rail corridor is wide enough for this.) Computers and GPS and intelligent scheduling coordinate the passing.
3. Trains are big and loud.
Most Americans think of Amtrak when they think of passenger rail. Amtrak is big and loud and diesel powered. A more appropriate vehicle for the rail line is an electric or hybrid “rapid streetcar” that weighs about one-tenth of an Amtrak train and is about ten times more efficient, getting 600 to 1000 miles per gallon per passenger equivalent instead of 70 mpg like Amtrak. This is better even than an electric car stuffed with people like a clown car. Modern vehicles of this sort are quieter than car traffic.
4. Trains and bikes and pedestrians in close proximity are dangerous.
Trains, unlike buses and cars, do not often swerve into the bike lane alongside the tracks. In other installations around the US, the rail and trail are separated by a simple low fence to prevent bikes and pedestrians from wandering onto the tracks. The safety record is solid.
5. Wouldn't it be cheaper to just tear out the tracks and have the trail down the middle?
At first, yes. But since this rail line is almost 140 years old, various trestles and other structures along the line will eventually need replacement. The cost of replacing these with local dollars would likely far outweigh any cost savings incurred by tearing out the rails. Federal and State infrastructure dollars are available to keep working rail lines working, but dollars are not yet so readily available to keep trails functional. A combined rail/trail system is likely to be cheaper and will certainly serve more people in the long run.
6. Freight and passenger rail cannot coexist on the same segment of track.
As it stands currently, the Federal Railroad Administration (FRA) says that these two uses must be separated in space and/or time or the passenger rail vehicles must be sturdy enough to withstand a collision with a freight train. This is an impractical solution, as such a vehicle would be heavy and loud. A new technology called Positive Train Control (PTC) is in the process of being installed around the US and has automatic lockout protocols that would allow non-compliant vehicles to share track safely. Its installation would be complete by the time Santa Cruz County had a rail system.
7. What about that darned horn?
In rail systems that cross roads frequently, the warning sound can be installed as part of the crossing guard apparatus and not sounded by the vehicle itself. This puts the sound on roads instead of in the middle of neighborhoods, and the sound is quieter because it is being sounded right where it needs to be heard rather than hundreds of yards away.
8. Won't all cars be self-driving soon, eliminating the need for trains and buses?
A revolution is coming that will change how cars are used. People will own fewer of them and use automated cars like taxis. Traffic jams will be less frequent with software and market forces controlling traffic. Early indicators show that automated cars will have the potential to be cheaper than current taxis, however less than half of the cost of current taxis is the cost of the driver. This means that “Google Cars” will still be a premium service, cost effective for groups of people but still more expensive than a train or a bus for single passengers, and of course constrained to the road system. A daily solo commute in a Google Car will be too expensive for most people. The “transportation ecosystem” of the future will have multiple components for multiple needs, just as it does now. Rail has persisted for nearly two centuries because it is simple and efficient and reliable, and it's a good bet that it will persist for two centuries more.
9. Won't it cost a lot of money?
Yes, it will. Infrastructure is expensive. The expense needs to be compared to alternative transportation investments. For example, the Highway 1 High Occupancy Vehicle Lane alternative is several times more expensive than the infrastructure for electric light rail. Whether it is worth it or not depends on what kind of future one wants for their children and grandchildren. Choices like this don't come up very often, so it's worth being informed. Democracy only works with informed citizens. |
How to Ensure Child Safety and Protection
October is Child Abuse Prevention Month, a cause that strongly aligns with ANBU.
As much as we want to be there at all times to shield our children from harm, there are ways of protecting them that do not involve our constant physical presence. In reality, a good portion of their daily lives is spent away from us in environments we can’t control or even observe. So what steps can we take to ensure our children’s safety and wellbeing?
This daunting task becomes more manageable through three practices: education, empowerment and communication. By equipping children with the tools they need to identify potential situations of abuse, we can ensure their safety when we aren’t there to intervene. We are their caregivers, protectors and supporters, but we need to empower them and cultivate a sense of autonomy within them so they can take an active role in their safety. These are vital skills that set up a strong foundation of self-worth, confidence and self-respect, which children take with them into other stages of life. Sexual education is one avenue you can take to develop these skills in them.
Early on, kids seek to understand the complexities of human life. With their boundless curiosity, they ask questions that sound shocking and amusing to us adults. These are questions that make many of us nervous! There’s a lot of pressure, considering that what you say could shape a child’s perspective of a very important but sensitive topic. For us in the Tamil community, responding to these questions can feel like unchartered territory. A lot of us didn’t grow up having these conversations with the adults in our lives. We may not have a point of reference from our families to use but there are other sources of information and guidelines (like Toronto Public Health).
Sex education is a debated topic, especially in Ontario. How much do our kids need to know? Everyone has their own opinion on the issue. Despite your values about it, the reality is that children are getting sex education from everywhere. It’s not just from school or their peers, these messages come from movies, television, magazines, billboards…which can be found pretty much anywhere they go. And this isn’t explicit material; it’s content that we consider to be normal in our society. But they still influence our views and understanding of things like body image, gender roles and sexuality, no matter what your age! All this information that our children receive is going to raise a lot of questions in their curious minds.
Rather than shy away, avoid or give incomplete answers to these questions, take them as opportunities to build your child’s understanding of sex and sexuality as well as their own body ownership and safety.
As part of ANBU’s video series, this month’s video was a continuation of our interview with Tharani Selvanathan from Toronto Public Health. Tharani guides us through a very useful system of responding to children when they ask those age-old questions using a Four-Point Plan.
Here’s what the Four-Point Plan entails:
1) Confidence
Instil a sense of confidence in your child by commending them for asking the question in the first place. It takes a lot of courage to approach adults with these questions. Your child could have been conflicted about coming to you for answers about sensitive topics. To ensure that they continue to confide in you (instead of going to other sources like the Internet or their peers), thank them for their openness with warmth and kindness. Before answering their question, set an atmosphere of comfort and mutual respect to let them know that they can come to you to talk about these topics.
2) Truth
Answer the question truthfully. Now, that doesn’t mean disclosing all the details. Give them the facts that are appropriate for their age. You could be asked the same question at age 5 and again at age 10 but the answer you give at each stage will be different. Sometimes, you won’t be able to answer questions if their subject matter is beyond what your child needs to know at a particular age. In those situations, you can respond truthfully and gently by saying that now is not the right time for you to give them an answer but you can revisit the question later on. A similar response can be given for questions you don’t know the answer to (because let’s be honest…no one knows everything). As long as you don’t give false or unclear information, there’s no harm done. Some kids are really good at catching those types of responses! Just keep it simple and age-appropriate.
3) Values
Here’s where you can incorporate your own family/cultural/religious/social values into your response. This will also give your child a point of reference for identifying unsafe situations. Keep in mind that as they grow up, your child might develop values that don’t exactly align with what you say here, especially for topics like sexual orientation and gender identity. Kids have their own experiences in life that will shape their values and identity. But what you teach them about safety, personal boundaries and body ownership is vital in establishing a sense of autonomy. This information will keep your child safe because it makes it infinitely more difficult for abusers to take advantage of them.
4) Responsibility
Children obviously can’t do all the heavy lifting when it comes to their safety. The responsibility component has to do with their communication with you. It’s to make sure that you stay informed about your child’s social environments and who they interact with. If your child finds themselves in situations that make them feel uncomfortable, they have a responsibility to tell you about it. Don’t treat it as a reporting system, which could be intimidating to a child and even make them feel guilty of situations they had no control over. See it as a time when your child can confide in you. Set up that trust, comfort and openness that will ensure that they come to you in times of need.
Let’s look at a situation where you could use this plan:
You’re at home with your family, watching television. An advertisement comes on where two adults are kissing. Your young child, age 5, asks why people kiss like this. Following the Four-Point Plan, here’s how you could possibly respond:
1) Confidence: start by commending your child for asking by saying “that’s a good question” or “that’s an interesting question”
2) Truth: answer by saying “this is how some adults show affection towards each other”
3) Values: specify that only adults show affection in this manner, children do not
4) Responsibility: tell your child that if anyone tries to kiss them like this, they should tell the person no and immediately come and tell you about it
It can be uncomfortable to speak with children about sex education but it is vital for their wellbeing. Imagine a child comes to you with a question about something they heard in the schoolyard, or worse, from someone threatening their safety. The way the child might bring up the topic is by asking a question. If you avoid or dismiss their question, there could be a lot of information that you miss out on because 1) you bring your conversation to an abrupt end and 2) they now feel like they can’t come to you with these kinds of questions. Whether or not there’s a situation of abuse going on, children need at least one trusted adult who is willing to listen to what they have to say.
If you want more information on raising sexually healthy children, you can contact Toronto Public Health at 416-338-7600. You can also visit their website and find resources and fact sheets in several languages, including Tamil.
Leave a Reply
|
• Main Menu
• What is the Size of a Terabyte?
With the advent of image processing programs, video editing software, home studio applications, and other similar Size of a Terabytedesktop publishing software, comes the demand for larger storage space. It is no longer just a necessity for those who use such applications but they also become an important investment. Those who are wondering about available storage space for your computer, you might want to check out hard drives that offer at least one terabyte of storage.
Sizing Up a Terabyte
To the average computer user, a terabyte would be equal to 1,000 gigabytes. You may also hear the usual drill that goes eight bits is a byte, a thousand bytes is a kilobyte, and a thousand kilobytes is a megabyte. That is usually followed by a thousand megabytes is a gigabyte and a thousand gigabytes is a terabyte. Though those are just rough estimates of how much actual storage space there is, they do work for the not so techie computer users.
However, if you want to get the actual size of a terabyte you won’t get exact numbers by thousands. What you will have instead is that a kilobyte is 1,024 bytes, a megabyte is 1,024 kilobytes, a gigabyte is 1,024 megabytes, and a terabyte is 1,024 gigabytes.
Tracing Its Roots
Going back to the late 80s, most home computer systems only had one hard drive. The average storage space available then would be about 20 megabytes, which is rather small considering today’s standard. All that changed by the mid-90s where there is an upsurge of 80 megabyte drives. With the introduction of operating systems that require more room than just several hundred megabytes came the increase in available storage space for the average home computer.
When the year 2000 then came new operating systems that had recommended hard drive spaces in terms of gigabytes. Windows Me, for example, required a minimum of 320 MB of storage space. However, the recommended amount of storage to hold the operating system alone was two gigabytes. On the other hand, Windows XP required a minimum of 1.5 GB with several gigabytes of storage required to install service packs and other applications you might want to add. By the year 2005 consumers were purchasing hard drives by gigabytes with the next step up in storage capacity in mind.
Picturing the Capacity
To help you picture out how much information can you store in a terabyte, we’ll try to translate that into the amount of words or pages you can save in each unit of storage on a hard drive. A byte will only contain just one letter from the alphabet or a symbol such as a period or a comma. One kilobyte can store a really short story. You can save a small novel or paperback in one megabyte. You can store several yards of books in one gigabyte. A terabyte however will be like cutting down 50,000 trees and turn them into paper with printed pages on them, which is something like an entire library of books. |
garden with chairs and tableA healthy garden can give any homeowner a sense of fulfillment. It is not achieved in a single day or week; it is usually a work in progress that has started several months before. And blooming flowers provide you with the assurance that your dedication to keep your garden in good shape was not in vain.
Be Careful when Introducing New Plants
Introducing new plants into your garden can put other plants at risk of contracting new diseases. That means you should not take just any seedling you got from your friend’s yard. To be safe, purchase seedlings from a garden center in Minnesota. It is better than risking your entire garden.
Monitor the Soil's pH
The soil's pH level refers to its degree of acidity or alkalinity, which affects the health of plants. Stable soil should have an average pH value of between five and seven. When the pH is low, it means the soil is acidic, and toxic compounds such as aluminum become soluble. They are, therefore, absorbed by plants, resulting in discolored leaves. You can reverse soil acidity by applying lime, which results in a neutralization reaction increasing the pH level.
Ensure Proper Spacing
Most plants require sunlight to carry out photosynthesis. Those that do not receive enough light end up dying. Therefore, make sure to space plants properly so that the leaves are exposed to sunlight, keeping them healthy and lush. Also, know the watering requirements of your plants—when, how, and how much.
Achieving a healthy garden requires a lot of hard work. You have to monitor all important variables such as the soil pH and humidity levels, all of which have an effect on plant health.
Spread the love |
Ask Your Question
What exactly is net metering?
asked 2015-03-31 18:15:36 -0500
mike gravatar image
Keep hearing about how net metering is great but don't totally understand how it works or how it makes it better to go solar. What is it?
edit retag flag offensive close delete
1 Answer
Sort by » oldest newest most voted
answered 2015-04-02 23:59:07 -0500
this post is marked as community wiki
updated 2015-04-02 23:59:07 -0500
energysage gravatar image
Hi Mike,
Net Metering guarantees that, if you have a solar system on your home or business, you will receive full retail value of the electricity you generate. Basically, for every kilowatt-hour (kWh) of solar electricity that your system produces, you save money on your power bill equivalent to whatever you pay for a kWh of electricity from your utility. You can read more about Net Metering here.
Net Metering is a production incentive - meaning that it rewards you for electricity that you generate. Most other incentives are designed to defray the cost of going solar in the first place. For example, the federal Investment Tax Credit (ITC) reduces your tax burden by 30% the amount of whatever you spend on a solar energy system.
There are various other incentives available through states and utilities across the country. Be sure to check what they are.
By the way: All incentives available in a given area are clearly detailed in all quotes in EnergySage's Solar Marketplace, which is a great place to shop for solar.
edit flag offensive delete publish link more
Login/Signup to Answer
Question tools
subscribe to rss feed
Asked: 2015-03-31 18:15:36 -0500
Seen: 317 times
Last updated: Apr 02 '15 |
Distribution of Permanent Canadian Residents under Age 25 by Region of Origin, 2012
In 2012 almost half of the immigrants under 25 years who became permanent residents in Canada came from the Asia and Pacific Region. A further 25% came from Africa and the Middle East.
A child’s or youth’s region of origin is not necessarily their place of birth. For example, research had found that many Jamaicans immigrate first to the United Kingdom, and then to Canada.1 These individuals would technically be considered immigrants from the United Kingdom.
1 Takenaka, A. (2007). Secondary Migration: Who Re-Migrates and Why These Migrants Matter. Migration Policy Institute. http://www.migrationpolicy.org/article/secondary-migration-who-re-migrates-and-why-these-migrants-matter |
What is astigmatism?
Astigmatism is a common, mild health condition occurring when the front surface of your eye (cornea) or the lens, inside your eye, has a slightly different surface curvature in one direction from the other. However, astigmatism can cause blurred vision.
How common is astigmatism?
Astigmatism occurs commonly. Astigmatism is often present at birth and may occur in combination with nearsightedness or farsightedness. It can be managed by reducing your risk factors. Please discuss with your doctor for further information.
What are the symptoms of astigmatism?
The common symptoms of astigmatism are:
• Blurred or distorted vision;
• Eyestrain;
• Headaches.
When should I see my doctor?
• Blurred or distorted vision;
• Eyestrain;
• Headaches.
What causes astigmatism?
Astigmatism is a refractive error caused when the cornea or lens isn’t evenly and smoothly curved, present from birth or it may develop after an eye injury, disease or surgery. Astigmatism isn’t caused or made worse by reading in poor light, sitting too close to the television or squinting.
• Nearsightedness (myopia): a condition by which your cornea is curved too much or your eye is longer than normal, resulting in a blurry appearance for distant objects.
• Farsightedness (hyperopia): a condition by which your cornea is curved too little or your eye is shorter than normal, resulting in a blurry appearance for near objects.
Risk factors
What increases my risk for astigmatism?
Age is one of the risk factors of astigmatism. In fact, the risk of having astigmatism in older is higher than in the younger.
Diagnosis & treatment
How is astigmatism diagnosed?
• Vision tests: your doctor will ask you to read letters on a chart to test the vision in a visual acuity test.
• Test to measure the curvature of your cornea (keratometry). Doctor uses a keratometer to measure the amount of curvature to your cornea’s surface.
• Test to measure light focus.
How is astigmatism treated?
Treatments contain corrective lenses and refractive surgery.
Using corrective lenses treats astigmatism by counteracting the uneven curvature of your cornea. Corrective lenses can be:
• Eyeglasses;
• Contact lenses.
Refractive surgery treats astigmatism by reshaping the surface of your eye. Refractive-surgery methods include:
• Laser-assisted in-situ keratomileusis (LASIK) is a procedure in which an instrument called a keratome is used to make a thin, circular hinged cut into your cornea.
• Photorefractive keratectomy (PRK) is a procedure in which the outer protective layer of the cornea is removed before using an excimer laser to change the curvature of the cornea.
• Laser-assisted subepithelial keratomileusis (LASEK) is a procedure in which a much thinner layer of the cornea is folded back to limit the injury to your eyes caused by daily actions or exercises. LASEK may be a better option if you have a thin cornea or if you’re at high risk of an eye injury at work or from playing sports.
Lifestyle changes & home remedies
What are some lifestyle changes or home remedies that can help me manage astigmatism?
The following lifestyles and home remedies might help you cope with astigmatism:
• When working at a computer, reading, or doing other detailed work, you should take the time to give your eyes a break by looking at a tree, flower, or anything outside the window or blinking.
• You should have excellent lighting in the area where you are working.
• Eat right to ensure that your eyes have all the vitamins and nutrients that they need.
Want to live your best life? |
Posts Tagged ‘c++
Default assignment operators and const values
It’s been so long! Update: I’ve been working primarily in C++ for the past four months or so. Hooray! I have so many drafts. I’ve really got to just start posting stuff even when it’s not (gasp) perfectly complete. Today, we’ve got another thing that I didn’t actually learn today, and it’s pretty basic, but I encountered a surprisingly bad suggestion from Microsoft’s documentation, and it seemed worth commenting on. You C++ gurus can probably skip this one.
You may recall, lo these many months ago, I posted about warnings-as-errors and why you should enable it. Well, I’m in the position of taking a large existing project and trying to turn that functionality on, and let me tell you, even with a lot of the work done for me — I was not the first, or even the second, engineer to tackle this — it’s no picnic. Reminder: turn on warnings-as-errors from the start of your project.
Anyway, one of the issues that has come up is the following:
c4512: The compiler cannot generate an assignment operator for the given class. No assignment operator was created.
For those of you not in the know, the C++ compiler generates a default copy constructor and assignment operator for you, unless you’ve specified them yourself. This warning simply means that, for some reason, the default assignment operator cannot be generated. Note that if some part of the code were actually attempting to use this operator, the compiler would throw an error, rather than a warning. Microsoft’s documentation on the warning helpfully points out that if you have any const members in your class, you will get this warning because a const member is not modifiable and thus assignment to it will not work. It continues to add that your options for dealing with the warning are the following:
• Explicitly define an assignment operator for the class.
• Remove const or the reference operator from the data item in the class.
• Use the #pragma warning statement to suppress the warning.
The engineer who looked at this before me went for both the first and the second option. The second option is the wrong option, and frankly, Microsoft should be ashamed for even suggesting it. And while the third option is appropriate for some warnings, in this case, completely ignoring the error is almost certainly never the right answer. Even the first option isn’t quite on target, or at least ignores a possible solution.
I haven’t talked about const much in this blog, but I’m a huge fan. If a member variable is declared const, any programmer using that API can assume that once the data is set in the constructor, it will not change. Removing const-ness should not be done lightly, especially when (as in this case) the member is public. Removing this type modifier opens up that member to modification by any other code. Scott Meyers would tell you to “use const whenever possible” because it is such a strong contract, and I’m inclined to agree with him.
As I mentioned before, if any code were actually attempting to use the assignment operator, you would get an actual error — the code could not be generated, so anything attempting to use that code would not compile. So we don’t need an assignment operator. We just need for the compiler not to generate one. The fix for this is easy — declare it private in the header file and don’t define it. You can do this yourself (there are a million examples on the internet), or you can just make your class inherit from boost::noncopyable, which will also declare the copy constructor private, if you happen to be using the Boost libraries already.
This is a really great practice even if you’re not getting this warning. (I believe it’s one of the first item’s in Effective C++.) If you don’t expect your class to be copied, go ahead and declare the copy constructor and the assignment operator private.
C++ Basics: Static
I’ve been working on this long, boring post about the differences in equality comparison in Perl and Python and the fundamental differences of the two languages, but you know what? I’m sick of Perl and Python! And that post was boring! So let’s talk about C++ instead.
I’m in the unenviable position of not having touched a compiler (for work) in about a year. How do you live, Maitland?, you ask, Without C++, what gives your life meaning? Those are really wonderful questions for another blog, but the fact is, while I’ve learned tons in the last year about Perl and automation (and debugging and debugging and debugging), my C++ knowledge has been getting fuzzier and fuzzier. It’s extremely unnerving. Just yesterday, I opened up one of my favorite books and I freaked out because I saw my second favorite* C++ keyword, static, and, frankly, I wasn’t sure I could remember all of its usage. Thank god I have a blog so I can write it all down.
The static keyword can be the slightest bit tricky because it has several applications, and different implications in different situations. Some people will tell you that it behaves differently or that it means something different in these different situations, but I feel like this point of view overcomplicates the issue. From my point of view, static really just means one thing: it means that for the duration of the program, there will be only one of the described object or function. Once the thing is defined, it’s defined for the lifetime of the program. In fact, static objects don’t even allocate memory from the stack or the heap — they have their own separate memory segment, creatively called static memory.
Static Objects. Static non-member objects are probably the simplest usage of static. They look like this:
static int myInt = 42;
Once this variable is initialized, it’s there for the lifetime of the program. So if, for example, you put this variable in a header file, you can change that object in your functions or class members, and the change will persist. The example above uses an integer, but the concept is the same for user-defined types as well. Static objects are scoped in the same way that any other object is. If the object is declared in a header, it is scoped by the translation unit (i.e., the source and headers required to compile a given source file) that includes it. If it’s declared inside a method or function, like any local variable, it cannot be referenced outside of that method or function.
Static Members. A static member is much like a static object except for the fact that it belongs to a class. A static member is shared by all instances of a class. The biggest implication of this is that you can modify the member completely independently from an instance of the class. For example,
class MyClass
static int m_myInt;
MyClass::m_myInt = 0;
is totally valid code! Furthermore, any instances of MyClass can modify that member, and that change will persist until some other instance (or external code) modifies that member. Obviously, making a static non-const member public is fairly dangerous (as is making any member variable public), because you have no way of controlling who can modify it, but a non-public member can be very useful when you want to keep a reference count of something, for example. And when you combine static and const, you have a great way to store immutable data that may want to be scoped and defined at compile time.
One thing worth pointing out about static members is that, unless they are const and integral, you cannot initialize them within the class declaration. Logically, this makes sense, when you consider that you could construct the class multiple times, and, if the static member were initialized within the declaration, it would theoretically be re-initialized every time the class was instantiated. Because a static member is defined for all instances of a class, re-defining it in every instance would violate C++’s one definition rule. (C++ does make an exception for static const integral members, but if I’m being honest, I don’t entirely understand the rationale except “it makes life easier,” which, in fairness, is a good thing.)
Static Methods. Static methods (not to be confused with static functions!) have a lot in common with static members. Like static members, they can be referenced without an instance of the class. The natural implication of this is that static methods cannot reference any non-static members of the class. Because they don’t require state, static methods are especially good when you have software that uses callbacks. They allow you to group functionality with your class even when that functionality does not operate on the class’s state directly.
Static LinkageOkay, here’s where it gets a little tricky. Remember how I said that static really only means one thing? I kinda lied.
So, a long time ago, in a galaxy far, far away, there was a little programming language called C. And it defined static as a keyword, and it was slightly really a lot different from how C++ defines it. If you define (not declare) a method or function as static, the compiler, knowing that it has to be backwards compatible with C, treats this as static linkage. This means that your function or method cannot be referenced outside of the file it’s defined in. I’m sure there are good reasons to do this — certainly, it allows you to write helper functions that you don’t intend to be used outside of a certain file — but I can’t say I’ve ever used it myself.
I feel like I must be forgetting something, but I suppose that’s to be expected, given how rusty I am. Hell, I haven’t even talked about extern or referenced Meyer’s excellent point about how the intialization order of non-local static objects is totally undefined, meaning you should probably avoid that and use a local static variable inside a function instead. But this is getting lengthy, so I think I’ll close it off here. Next time, memory segments?
* My favorite being, of course, const.
Inlining and #includes
|
December 04
Controlling the brain with lasers!
Two male mice are hanging out in a cage, both with strange looking cables coming out of their head, and both minding their own business, when all of a sudden, a researcher flips a switch, sending a green light down the cable and into one of the mice’s brain. The mouse immediately proceeds to attack the second, with seemingly no provocation, but immediately stops when the researcher turns the light off. Some time passes, the mice are fighting, as mice sometimes do. The researcher flips a different switch, this time sending a red light into the brain of the other mouse, which immediately stops fighting. The researcher turns off the light and the mouse resumes fighting. This has been a demonstration of a trendy technique in neuroscience: optogenetics, controlling individual brain cells with finely-tuned wavelengths of light. These mice both have fiber optics planted deep in their brains, in a part of ventromedial hypothalamus. The first mouse has a specific channel that excites the neurons in response to green light, whereas the other has red light-responsive channels that silence the neuron when activated. This study effectively showed that by taking control of neuronal firing in this region, they were able to control aggression in these mice (1).
How does it work?
So how does this work, anyways? Controlling the brain with lasers sounds impossibly science fiction-y, but the technology behind it is actually fairly straightforward. In order to understand how optogenetics is controlling a neuron, we must first have a basic understanding of how neurons communicate. Essentially, neurons relay signals from their dendrites (which contact other neurons) to the cell body, which sum up these signals and fire an action potential. These action potentials are a brief change in the electric potential of the cellular membrane, a change which travels towards the cell body and is caused by the opening and closing of ion channels. From the cell body, the action potential moves down the axon, which will send signals to other neurons. Optogenetics works by making the neuron express an ion channel from algae, channelrhodopsin, which opens in response to light. This opsin is then incorporated in the neuron’s membrane, and a specific wavelength of light will prompt the opsin to open its ion channel, causing a depolarization of the membrane, effectively causing an action potential. The light comes from either a laser via an optical fiber that runs into the brain, or a surgically implanted LED.
Since the technology’s inception, a whole slew of other opsins and similar molecules have been developed. By using different opsins, we can either depolarize the membrane, causing the neuron to fire, or hyperpolarize it, effectively preventing the neuron from sending any action potentials. These opsins are stimulated by different wavelengths of light, so they can be put in the same neuron, allowing us to effectively turn the neuron on and off at will. Other ion channels have been developed that are able to open and close much faster, mimicking the higher firing rate of some neurons, and a new wave of proteins modify protein-protein interactions in response to light, allowing us to control different cell types in a whole new way. A new method, dubbed InSynC, even controls synaptic vesicle release, which is how the axon of one neuron communicates to another neuron across the synapse (2).
That hair!
They can control your synaptic vesicle release with lasers!
In order to express a light-sensitive protein in neurons, a genetic construct containing the opsin and a protein that fluorescently tags the cell (in order to identify where it is expressed) is placed in a virus that is then injected into the region of interest in the brain. Importantly, the type of virus that is used is from the same family as HIV and, like HIV, is able to incorporate itself into the genome of the cell, hijacking the cell’s own mechanisms in order to express the opsin and reporter. Fortunately, the virus has been modified in such a way that it is unable to replicate and take over the cell.
injecting viruses into monkey brains; just another day the office...
In order to optogenetically activate a region, a viral construct must first be injected, then an optogenetic probe lowered into the region of interest. From Gerits and Vanduffel 2013
To control the cells in which the opsin is expressed, the regulatory elements (promoter) of a cell-type specific gene will be put in control of the opsin’s expression. Often, the expression of the opsin will be dependent on the expression of a particular gene inserted into the genome of an animal that marks a specific cell type (as in the cre-lox system), a more effective method, albeit dependent on the availability of transgenetically manipulated animals. In both systems, the opsin will only be expressed where that gene is expressed, enabling specific types of neurons to be manipulated. This methodology is key to the success of optogenetics: by controlling subsets of neurons in a region, we can parse apart the role of different neuronal networks and systems. Regions of the brain consist of many different cell types close together that receive different inputs and have different outputs, sometimes doing completely opposite things, such as the case of inhibitory versus excitatory neurons.
Applications of optogenetics: the cool and the practical
so trendy!
The growth of optogenetics in published research studies. From Aston-Jones and Deisseroth, 2013
Optogenetics has been trendy in neuroscience since its first successful demonstration by Karl Deisseroth in 2005 “Ever since Karl Deisseroth and his post-doc Ed Boyden first successfully controlled mammalian neurons with lasers in 2005, optogenetics has become an incredibly trendy neuroscience tool, as shown in this first figure (for an interesting history of optogenetics’ development, which I’m not going to go into here, read this piece by Boyden). Now, its use is practically mandatory if you want to prove that a set of neurons has a particular function in the brain. This isn’t surprising; optogenetics allows us to control how specific neurons fire on precise time scales, allowing us unprecedented control of the brain. Plus, lasers are sexy. So far, optogenetics has been applied to everything from neurons in a dish, fly brains, and roundworms, to mice, primates, and practically a whole zoo of other systems–though rodent work remains most prevalent. So what have people done with it?
• In the roundworm, each of its 302 neurons can be activated individually, or in particular subsets. Several studies have shown that activation of a particular neuron results in forward acceleration, whereas stimulating a different neuron results in the reverse (4) (as to what activating both at the same time will do, I don’t know: maybe the worm will explode?).
• A study in fruit flies found that activating a set of 12 neurons evoked what amounts to a fear memory; optogenetically activating these neurons resulted in the flies avoiding where they happened to be when the laser turned on (5).
• Recent work implanted a false fear memory in mice by activating a subset of neurons in the hippocampus, an area strongly associated with memory. Here, they activated neurons that were shown to be involved a traditional fear conditioning paradigm (a foot shock) in a context outside of the paradigm and found that this unconditioned but light-stimulated mouse responded to the laser-associated context the same way as the fear-associated one (6)
• Optogenetics is also capable of both causing and relieving Obsessive-Compulsive Disorder-like symptoms in mice. Light-mediated activation of a circuit shown to be dysregulated in human OCD patients caused OCD-like symptoms in mice (which involves persistent grooming, among other things) (7). A different lab (in the same issue of Science) showed that optogenetically stimulating a different, yet related, circuit in the mouse model of OCD reduced OCD-like behaviors to baseline levels (8).
These are only a few of the hundreds of contexts where optogenetics has been used to a myriad of effects: causing, stopping, or altering countless behaviors.
More than just neurons
While this technology was developed in the brain for neurons, it’s not confined to neurons or the brain. Sergey Kasparov’s lab found that by optogenetically stimulating astrocytes–a different, highly abundant cell type found in the brain and spinal cord–in the brainstem they were able to control breathing (9). Additionally, using the same principles as in neurons, optogenetics has been used to control heartbeat (10), with pulses of light essentially pacing the firing of heart cells, telling them when to contract. This works because most muscle cells communicate through electric impulses traveling along their membrane, just as neurons do. Theoretically, this means that we can control movement with light.
Like any technology, optogenetics has its limits. First and foremost, we are limited by the neurons we can mark. Not all cell types have known genetic markers, and if we can’t mark the cell type genetically, it is much harder (and sometimes impossible) to insert an opsin into those cells alone. We also need to know enough about different circuits and cell types in the brain in order to target them, which is no small feat. Beyond that, only a handful of animals have the established, pliable genetics required for making genetically manipulated animals that make it easy to successfully interrogate a given cell type. While the development of new technologies such as the excellently named TALENS and its less welled-named but more likely to succeed cousin CRISPR will make it easier to manipulate genomes across the board, the fact remains that it is much easier to excite your cells of interest in mice or roundworms than it is in leeches or monkeys. There are also limitations in being able to effectively mimic neuron firing. Different neuronal cell types, of which there are many, fire in widely different patterns, with different electrical signatures, both of which vary in response to the stimuli received. How you are controlling the input is then quite important, and often overlooked, as these parameters may be unknown. It’s also hard to gauge the expression of the inserted opsin. The efficacy of viral infection varies significantly, making it easy to over-express the opsin and overexcite the neuron, causing ion depletion and effectively silencing the neuron. Conversely, too little viral expression will lead to no effect at all.
The Future
So let's control your brain!
While a bunch of cool work will undoubtedly continue to happen in other model systems the application of optogenetics to the monkey brain is the next frontier for this technology. Less than a half dozen studies have induced behavioral responses from optogenetic stimulation in primates, due to the expense and difficulty in targeting subsets of neurons in the monkey. Genetic manipulations of the sort that are standard in mice, which enable the specificity of opsin integration to subsets of cells, simply don’t exist in the primate, though there hasbeen a recent push to develop genetically manipulated (transgenic) primates, most promisingly with marmosets. Marmosets are more amenable to being raised in lab environments and have a relatively quick generation time, yet are still quite genetically similar to humans, with important similarities in brain architecture and genetics that other non-primate model organisms lack (11) By offering fine control of neuronal firing, optogenetics holds much promise in interrogating the brains of our close animal relatives.
Of course the holy grail of optogenetics, or nightmare, depending on your perspective, is its use in humans. Countless therapies could be imagined and possibly developed using optogenetics, though we certainly are limited by the fact that transgenic humans are out of the question. New ways of targeting neuronal subsets will have to be developed that don’t rely on genetic manipulation, such as some sort of “gene therapy”, but many of the viral vectors already used in optogenetics are already FDA-approved.13 There is even some precedence for modulating human neurons in an even cruder way. Deep Brain Stimulation (DBS), which uses an electrode to stimulate a specific region of the brain, is an approved, albeit radical, treatment for epilepsy and Parkinson’s, and is in clinical trials to treat major depression. This could be replaced by optogenetics, which, even if not targeted to specific neurons, is probably a safer, more effective alternative to electrodes in one’s brain. Even if we are able to get over safety issues and technical hurdles, we will still be limited by our knowledge of the neuronal underpinnings of mental conditions. It’s all well and good to be able to modulate the firing of specific neurons, but we first need to know which neurons are firing abnormally, which is something a long way off in humans for most mental disorders. Hopefully, in using optogenetics with organisms from roundworm to the marmoset, we can elucidate exactly what’s going on in that fleshy bit between our ears.
1) Lin D, Boyle MP, Dollar P, Lee H, Lein ES, Perona P, Anderson DJ. Functional identification of an aggression locus in the mouse hypothalamus. Nature. 2011 Feb 10;470(7333):221-6. doi: 10.1038/nature09736.
2) Lin JY, Sann SB, Zhou K, Nabavi S, Proulx CD, Malinow R, Jin Y, Tsien RY. Optogenetic inhibition of synaptic release with chromophore-assisted light inactivation (CALI). Neuron. 2013 Jul 24;79(2):241-53. doi: 10.1016/j.neuron.2013.05.022.
3) Aston-Jones G, Deisseroth K. Recent advances in optogenetics and pharmacogenetics. Brain Res. 2013 May 20;1511:1-5. doi: 10.1016/j.brainres.2013.01.026.
4) Husson SJ, Gottschalk A, Leifer AM. Optogenetic manipulation of neural activity in C. elegans: from synapse to circuits and behaviour. Biol Cell. 2013 Jun;105(6):235-50. doi: 10.1111/boc.201200069.
5) Claridge-Chang A, Roorda RD, Vrontou E, Sjulson L, Li H, Hirsh J, Miesenböck G. Writing memories with light-addressable reinforcement circuitry. Cell. 2009 Oct 16;139(2):405-15. doi: 10.1016/j.cell.2009.08.034.
6) Ramirez S, Liu X, Lin PA, Suh J, Pignatelli M, Redondo RL, Ryan TJ, Tonegawa S. Creating a false memory in the hippocampus. Science. 2013 Jul 26;341(6144):387-91. doi: 10.1126/science.1239073.
7) Ahmari SE, Spellman T, Douglass NL, Kheirbek MA, Simpson HB, Deisseroth K, Gordon JA, Hen R Repeated cortico-striatal stimulation generates persistent OCD-like behavior. Science. 2013 Jun 7;340(6137):1234-9. doi: 10.1126/science.1234733.
8) Burguière E, Monteiro P, Feng G, Graybiel AM Science. Optogenetic stimulation of lateral orbitofronto-striatal pathway suppresses compulsive behaviors. 2013 Jun 7;340(6137):1243-6. doi: 10.1126/science.1232380.
9) Gourine AV, Kasymov V, Marina N, Tang F, Figueiredo MF, Lane S, Teschemacher AG, Spyer KM, Deisseroth K, Kasparov S. Astrocytes control breathing through pH-dependent release of ATP. Science. 2010 Jul 30;329(5991):571-5. doi: 10.1126/science.1190721.
10) Bruegmann T, Malan D, Hesse M, Beiert T, Fuegemann CJ, Fleischmann BK, Sasse P. Optogenetic control of heart muscle in vitro and in vivo. Nat Methods. 2010 Nov;7(11):897-900. doi: 10.1038/nmeth.1512.
11) J Mashiko H, Yoshida AC, Kikuchi SS, Niimi K, Takahashi E, Aruga J, Okano H, Shimogori T. Comparative anatomy of marmoset and mouse cortex from genomic expression. J Neurosci. 2012 Apr 11;32(15):5039-53. doi: 10.1523/JNEUROSCI.4788-11.2012.
12) Nayerossadat N, Maedeh T, Ali PA. Viral and nonviral delivery systems for gene delivery. Adv Biomed Res. 2012;1:27. doi: 10.4103/2277-9175.98152.
13) Gerits A, Vanduffel W. Optogenetics in primates: a shining future? Trends Genet. 2013 Jul;29(7):403-11. doi: 10.1016/j.tig.2013.03.004. |
Skip to Main Content
1. Determine the diagnostic criteria for significant bacteruria, urinary tract infections (UTIs), and catheter-associated UTIs.
2. Recognize the signs and symptoms of urinary tract infections (UTIs), and differentiate asympotomatic bacteriuria from acute cystitis and pyelonephritis, and acute prostatitis from chronic prostatitis.
3. Identify the pathogenic organisms most commonly implicated in different UTIs.
4. Assess the laboratory tests used in the diagnosis of UTIs.
5. Based on clinical signs, symptoms, and laboratory parameters, recommend appropriate empiric and targeted pharmacotherapy for the treatment of acute cystitis, pyelonephritis, and prostatitis, including drug, dose, and duration of therapy.
6. Formulate appropriate monitoring and education information for patients with UTIs.
A urinary tract infection (UTI) is defined as the presence of pathogenic microorganisms in the genitourinary tract with associated signs and symptoms of infection. UTIs represent a diverse array of syndromes based on location within the urinary tract, including acute cystitis, pyelonephtritis, and prostatitis.1–3 UTIs are one of the most common reasons for the prescribing of antimicrobial therapy.4
The prevalence and type of UTIs generally vary according to age and gender.5,6 In adults, bacteriuria is more common in young, nonpregnant women (range, 1%–3%), but uncommon in men (up to 0.1%).7 Symptomatic UTIs occur most frequently in women of childbearing age. It is estimated that the lifetime risk of UTIs in women is as high as 60%, with 25% of those patients experiencing a recurrence within 1 year.8 UTIs are much more common in women and men due to their inherently shorter urethra and location in the perineal area. However, older men may experience UTIs due to immunoscenesence and concomitant disease states, such as benign prostatic hypertrophy (BPH).
Image not available. UTIs can be classified as either uncomplicated or complicated. Uncomplicated infections usually occur in women of childbearing age. Complicated UTIs usually occur in patients who have structural or functional abnormalities of the genitourinary tract, and may involve the bladder or the kidneys.2 Male patients with UTIs are considered complicated, and most older adults will also meet this criterion. Although complicated infections are usually treated similar to uncomplicated infections, a longer treatment duration is typically warranted in complicated infections. UTIs can also be classified as upper and lower depending on their anatomical location. Lower UTIs usually refer to acute cystitis, whereas upper UTIs refer to pyelonephritis. It is important to note that an upper UTI does not necessarily imply complicated UTI, nor does a lower UTI imply uncomplicated UTI.
The etiologic pathogens of most UTIs originate from the perirectal area. Escherichia coli is implicated in more than 80% of uncomplicated infections, with Klebsiella pneumoniae and ...
Pop-up div Successfully Displayed
|
Sex reassignment surgery
Last updated
Sex reassignment surgery or SRS (also known as gender reassignment surgery and by numerous other names) is a surgical procedure (or procedures) by which a transgender person's physical appearance and function of their existing sexual characteristics are altered to resemble that socially associated with their identified gender. It is part of a treatment for gender dysphoria in transgender people.
Transgender State of ones gender identity or expression not matching ones assigned sex. (Use with P21)
Sexual characteristics are physical or behavioral traits of an organism which are indicative of its biological sex. These can include sex organs used for reproduction and secondary sex characteristics which distinguish the sexes of a species, but which are not directly part of the reproductive system.
Gender Characteristics distinguishing between masculinity and femininity
Feminization surgeries are surgeries that result in anatomy that is typically gendered female. These surgeries include vaginoplasty, feminizing augmentation mammoplasty, orchiectomy, facial feminization surgery, reduction thyrochondroplasty (tracheal shave), and voice feminization surgery among others.
Orchiectomy surgical procedure
Orchiectomy is a surgical procedure in which one or both testicles are removed. The surgery is typically performed as treatment for testicular cancer, in some cases of testicular torsion, and is sometimes used in the management of advanced prostate cancer.
Masculinization surgeries are surgeries that result in anatomy that is typically gendered male. These surgeries include chest masculinization surgery (top surgery), metoidioplasty, phalloplasty, scrotoplasty, and hysterectomy.
Metoidioplasty or metaoidioplasty is a female-to-male sex reassignment surgery.
Transgender hormone therapy of the female-to-male (FTM) type, also known as masculinizing hormone therapy, is a form of hormone therapy and sex reassignment therapy which is used to change the secondary sexual characteristics of transgender people from feminine to masculine. It is one of two types of transgender hormone therapy, and is predominantly used to treat transgender men and other transmasculine individuals. Some intersex people also receive this form of therapy, either starting in childhood to confirm the assigned sex or later if the assignment proves to be incorrect.
Transgender hormone therapy of the male-to-female (MTF) type, also known as feminizing hormone therapy, is hormone therapy and sex reassignment therapy to change the secondary sexual characteristics of transgender people from masculine to feminine. It is one of two types of transgender hormone therapy and is predominantly used to treat transgender women and other transfeminine individuals. Some intersex people also take this form of therapy, according to their personal needs and preferences.
There are numerous other expressions that are used or have been used to refer to sexual reassignment surgery, including sex change operation, gender reassignment surgery, gender confirmation surgery, genital reconstruction surgery, gender-affirming surgery, and sex realignment surgery. [1]
The American Society of Plastic Surgeons (ASPS) calls this procedure Gender Confirmation Surgery or GCS. [2] [3] Another term for SRS includes sex reconstruction surgery.
People who pursue sex reassignment surgery are usually referred to as transsexual.[ citation needed ] A trans woman assigned male at birth and seeking feminizing surgery may have one or more of the procedures used for trans women, which go by various names, such as feminizing genitoplasty, penectomy, orchiectomy, or vaginoplasty . A trans man assigned female at birth and seeking masculinizing surgery may undergo one or more procedures, which may include masculinizing genitoplasty, metoidioplasty or phalloplasty .[ citation needed ]
In the US in 1917, Dr Alan L. Hart, an American TB specialist, becomes one of the first female-to-male transsexuals to undergo hysterectomy and gonadectomy for the relief of gender dysphoria. [4]
In Berlin in 1931, Dora Richter, became the first known transgender woman to undergo the vaginoplasty [5] surgical approach.
As of 2017, some European countries require forced sterilization for the legal recognition of sex reassignment. [9]
Prior to surgery
Medical considerations
Ethical considerations
At birth
SRS does not refer to surgery performed on infants with differences in sex development (intersex). [11] Infants born with intersex conditions might undergo interventions at or close to birth. [12] This is controversial because of the human rights implications. [13] [14]
Sex reassignment surgery performed on unconsenting minors (babies and children) may result in catastrophic outcomes (including PTSD and suicide—such as in the David Reimer case, following a botched circumcision) when the individual's sexual identity (determined by neuroanatomical brain wiring) is discrepant with the surgical reassignment previously imposed. [15] [16] [17] Milton Diamond at the John A. Burns School of Medicine, University of Hawaii recommended that physicians do not perform surgery on children until they are old enough to give informed consent and to assign such infants in the gender to which they will probably best adjust. Diamond believed introducing children to others with differences of sex development could help remove shame and stigma. Diamond considered the intersex condition as a difference of sex development, not as a disorder. [18] [19]
Standards of care
A growing number of public and commercial health insurance plans in the United States now contain defined benefits covering sex reassignment-related procedures, usually including genital reconstruction surgery (MTF and FTM), chest reconstruction (FTM), breast augmentation (MTF), and hysterectomy (FTM). [23] In June 2008, the American Medical Association (AMA) House of Delegates stated that the denial to patients with gender dysphoria or otherwise covered benefits represents discrimination, and that the AMA supports "public and private health insurance coverage for treatment for gender dysphoria as recommended by the patient's physician." [24] Other organizations have issued similar statements, including WPATH, [25] the American Psychological Association, [26] and the National Association of Social Workers. [27]
Surgical procedures
Bottom surgery
The array of medically indicated surgeries differs between trans women (male to female) and trans men (female to male). For trans women, genital reconstruction usually involves the surgical construction of a vagina, by means of penile inversion or the sigmoid colon neovagina technique; or, more recently, non-penile inversion techniques that make use of scrotal tissue to construct the vaginal canal. For trans men, genital reconstruction may involve construction of a penis through either phalloplasty or metoidioplasty. For both trans women and trans men, genital surgery may also involve other medically necessary ancillary procedures, such as orchiectomy, penectomy, mastectomy or vaginectomy. Complications of penile inversion vaginoplasty are mostly minor; however, rectoneovaginal fistulas (abnormal connections between the neovagina and the rectum) can occur in about 1–3% of patients. These require additional surgery to correct and are often fixed by colorectal surgeons. [29]
Scope and procedures
Post-surgical considerations
Quality of life and physical health
Several studies tried to measure the quality of life and self-perceive physical health using different scales. Overall, transsexual people have rated their self-perceived quality of life as ‘normal’ or ‘quite good’, however, their overall score was still lower than the control group. [32] Another study showed a similar level of quality of life in transsexual individuals and the control group. [33] Nonetheless, a study with long-term data suggested that albeit quality of life of patients 15 years after sex reassignment surgery is similar to controls, their scores in the domains of physical and personal limitations were significantly lower. [31] [34] On the other hand, research has found that quality of life of transsexual patients could be enhanced by other variables. For instance, trans men obtained a higher self-perceived health score than women because they had a higher level of testosterone than them. Trans women who had undergone face feminization surgery have reported higher satisfaction in different aspects of their quality of life, including their general physical health. [35]
Psychological and social consequences
After sex reassignment surgery, transsexuals (people who underwent cross-sex hormone therapy and sex reassignment surgery) tend to be less gender dysphoric. They also normally function well both socially and psychologically. Anxiety, depression and hostility levels were lower after sex reassignment surgery. [36] They also tend to score well for self-perceived mental health, which is independent from sexual satisfaction. [37] Many studies have been carried out to investigate satisfaction levels of patients after sex reassignment surgery. In these studies, most of the patients have reported being very happy with the results and very few of the patients have expressed regret for undergoing sex reassignment surgery. [38]
Although studies have suggested that the positive consequences of sex reassignment surgery outweigh the negative consequences, [39] it has been suggested that most studies investigating the outcomes of sex reassignment surgery are flawed as they have only included a small percentage of sex reassignment surgery patients in their studies. [40] These methodological limitations such as lack of double-blind randomized controls, small number of participants due to the rarity of transsexualism, high drop-out rates and low follow-up rates, [41] which would indicate need for continued study.
Persistent regret can occur after sex reassignment surgery. Regret may be due to unresolved gender dysphoria, or a weak and fluctuating sense of identity, and may even lead to suicide. [42] Risk categories for post-operative regret include being older, having characterised personality disorders with personal and social instability, lacking family support, lacking sexual activity, having not suffered from gender identity disorders during childhood, and expressing dissatisfaction with the results of surgery. [43] During the process of sex reassignment surgery, transsexuals may become victims of different social obstacles such as discrimination, prejudice and stigmatising behaviours. [44] The rejection faced by transsexuals is much more severe than what is experienced by LGB individuals. [45] The hostile environment may trigger or worsen internalized transphobia, depression, anxiety and post-traumatic stress. [46]
Looking specifically at transsexual people's genital sensitivities, trans men and trans women are capable of maintaining their genital sensitivities after SRS. However, these are counted upon the procedures and surgical tricks which are used to preserve the sensitivity. Considering the importance of genital sensitivity in helping transsexual individuals to avoid unnecessary harm or injuries to the genitals, allowing trans men to obtain an erection and perform the insertion of the erect penile prosthesis after phalloplasty, [47] the ability for transsexual to experience erogenous and tactile sensitivity in their reconstructed genitals is one of the essential objectives surgeons want to achieve in SRS. [47] [48] Moreover, studies have also found that the critical procedure for genital sensitivity maintenance and achieving orgasms after phalloplasty is to preserve both the clitoris hood and the clitoris underneath the reconstructed phallus. [47] [48]
Erogenous sensitivity is measured by the capabilities to reach orgasms in genital sexual activities, like masturbation and intercourse. [47] Many studies reviewed that both trans men and trans women have reported an increase of orgasms in both sexual activities, [37] [31] implying the possibilities to maintain or even enhance genital sensitivity after SRS.
The majority of the transsexual individuals have reported enjoying better sex lives and improved sexual satisfaction after sex reassignment surgery. [31] The enhancement of sexual satisfaction was positively related to the satisfaction of new primary sex characteristics. [31] Before undergoing SRS, transsexual patients possessed unwanted sex organs which they were eager to remove. Hence, they were frigid and not enthusiastic about engaging in sexual activity. In consequence, transsexuals individuals who have undergone SRS are more satisfied with their bodies and experienced less stress when participating in sexual activity. [31]
Most of the individuals have reported that they have experienced sexual excitement during sexual activity, including masturbation. [31] The ability to obtain orgasms is positively associated with sexual satisfaction. [37] Frequency and intensity of orgasms are substantially different among transsexual men and transsexual women. Almost all female-to-male individuals have revealed an increase in sexual excitement and are capable of achieving orgasms through sexual activity with a partner or via masturbation, [31] [49] whereas only 85% of the male-to-female individuals are able to achieve orgasms after SRS. [50] A study found that both transmen and transwomen reported qualitative change in their experience of orgasm. The female-to-male transgender individuals reported that they had been experiencing intensified and stronger excitements while male-to-female individuals have been encountering longer and more gentle feelings. [31]
The rates of masturbation have also changed after sex reassignment surgery for both trans women and trans men. A study reported an overall increase of masturbation frequencies exhibited in most transsexual individuals and 78% of them were able to reach orgasm by masturbation after SRS. [37] [31] [51] A study showed that there were differences in masturbation frequencies between trans men and trans women, in which female-to-male individuals masturbated more often than male to female [31] The possible reasons for the differences in masturbation frequency could be associated with the surge of libido, which was caused by the testosterone therapies, or the withdrawal of gender dysphoria. [37]
Concerning transsexuals’ expectations for different aspects of their life, the sexual aspects have the lowest level of satisfaction among all other elements (physical, emotional and social levels). [51] When comparing transsexuals with biological individuals of the same gender, trans women had a similar sexual satisfaction to non-trans women, but trans men had a lower level of sexual satisfaction to non-trans men. Moreover, trans men also had a lower sexual satisfaction with their sexual life than trans women. [37]
In 2012, Argentina began offering government subsidized total or partial SRS to all persons 18 years of age or older. [52] [53] [54] Private insurance companies are prohibited from increasing the cost of SRS for their clients. At the same time, the Argentinian government repealed a law that banned SRS without authorization from a judge. [55]
In 2012, a bill was introduced that stated SRS was no longer a requirement for legal name and sex change. [56]
In 2013, Chile's public health plan was required to cover sex reassignment surgery. [56] The cost is subsidized by the government based on a patient's income. [56]
Since 2016, France no longer requires SRS as a condition for a gender change on legal documents. [57] [58]
In 2017, a case brought earlier by three transgendered French people was decided. France was found in violation of the European Convention on Human Rights for requiring the forced sterilization of transgender people seeking to change their gender on legal documents. [59]
India is offering affordable sex reassignment surgery to a growing number of medical tourists [60] and to the general population. [61]
The Iranian government's response to homosexuality is to endorse, and fully pay for, sex reassignment surgery. [62] [54]
The leader of Iran's Islamic Revolution, Ayatollah Ruhollah Khomeini, issued a fatwa declaring sex reassignment surgery permissible for "diagnosed transsexuals". [62] Eshaghian's documentary, Be Like Others , chronicles a number of stories of Iranian gay men who feel transitioning is the only way to avoid further persecution, jail, or execution. [62] The head of Iran's main transsexual organization, Maryam Khatoon Molkara—who convinced Khomeini to issue the fatwa on transsexuality—confirmed that some people who undergo operations are gay rather than transsexual. [63]
As late as 2010, transgender people that have undergone SRS can change their sex on legal documents. [64]
Casablanca, Morocco is notable for being the home of Clinique de Parc, Dr. Georges Burou's clinic for transgender women. Dr. Burou is considered one of the pioneers of SRS. [65] A French gynecologist, Dr. Burou created the anteriorly pedicled penile skin flap inversion vaginoplasty, still considered the “gold standard” of skin-lined vaginoplasty. [66] He is credited with having performed over 3000 MtF surgeries. [65]
In Pakistan, the Council of Islamic Ideology has ruled that sex re-assignment surgery contravenes Islamic law as construed by the Council. [67] This Pakistani law prevents Hijras from becoming women.
Despite a resolution from the European Parliament in 1989 suggesting advanced rights for all European Union citizens, as of 2002 only Andalucia's public health system covers sex reassignment surgery. [68] Other states in Spain have not yet added, or like Valencia, refuse to add, this right into their health care systems. [68]
In 2010, the Swiss Federal Supreme Court struck down two laws that limited access to SRS. These included requirements of at least 2 years of psychotherapy before health insurance was obligated to cover the cost of SRS [69] [70] and inability to procreate. [71]
Thailand is the country that performs the most sex reassignment surgeries, followed by Iran. [63]
In 2015, the Administrative District Court of Kiev ruled that forced sterilization was unlawful and no longer required for legal gender change. [72]
See also
Related Research Articles
Penectomy surgical removal of penis
Gender dysphoria (GD) is the distress a person experiences as a result of the sex and gender they were assigned at birth. In this case, the assigned sex and gender do not match the person's gender identity, and the person is transgender. Evidence from studies of twins suggests that gender dysphoria not only has psychological causes, but may have biological causes as well.
The Standards of Care for the Health of Transsexual, Transgender, and Gender Nonconforming People are international clinical protocols outlining the recommended assessment and treatment for gender non-conforming individuals across the lifespan or transgender or transsexual people who wish to undergo social, hormonal or surgical transition to the other sex. Clinicians' decisions regarding patients' treatment are often influenced by this standard of care (SOC).
Sex reassignment therapy is the medical aspect of gender transitioning, that is, modifying one's characteristics to better suit one's gender identity. It can consist of hormone replacement therapy (HRT) to modify secondary sex characteristics, sex reassignment surgery to alter primary sex characteristics, and other procedures altering appearance, including permanent hair removal for trans women.
Sex reassignment surgery for male-to-female involves reshaping the male genitals into a form with the appearance of, and, as far as possible, the function of female genitalia. Before any surgery, patients usually undergo hormone replacement therapy (HRT), and, depending on the age at which HRT begins, facial hair removal. There are associated surgeries patients may elect to, including facial feminization surgery, breast augmentation, and various other procedures.
Transitioning is the process of changing one's gender presentation and/or sex characteristics to accord with one's internal sense of gender identity – the idea of what it means to be a man or a woman, or to be genderqueer. For genderqueer people, the internal sense of gender identity is neither solely female nor male. For transgender and transsexual people, this process commonly involves reassignment therapy, with their gender identity being opposite that of their birth-assigned sex and gender. Transitioning might involve medical treatment, but it does not always involve it. Cross-dressers, drag queens, and drag kings tend not to transition, since their variant gender presentations are (usually) only adopted temporarily.
History of intersex surgery
The history of intersex surgery is intertwined with the development of the specialities of pediatric surgery, pediatric urology, and pediatric endocrinology, with our increasingly refined understanding of sexual differentiation, with the development of political advocacy groups united by a human qualified analysis, and in the last decade by doubts as to efficacy, and controversy over when and even whether some procedures should be performed.
Blanchard's transsexualism typology, also Blanchard autogynephilia theory and Blanchard's taxonomy, is a psychological typology of male-to-female (MtF) transsexualism created by Ray Blanchard through the 1980s and 1990s, building on the work of his colleague, Kurt Freund. Blanchard divided trans women into two groups: one is "homosexual transsexuals" who, Blanchard says, seek sex reassignment surgery because they are feminine in both behavior and appearance, and to romantically and sexually attract men; and the other is "autogynephilic transsexuals" who, according to Blanchard, are sexually aroused at the idea of having a female body. Blanchard's model is unusual in that neither group is considered "false transsexuals"; both autogynephilic and homosexual transsexuals are thought to benefit from transition. This distinction is a recurring theme in scholarly literature on transsexualism.
Toby Meltzer American surgeon
Toby R. Meltzer is an American plastic and reconstructive surgeon. Meltzer specializes in sex reassignment surgery male-to-female, sex reassignment surgery female-to-male, and facial feminization surgery. In the 1990s, Meltzer pioneered the neovaginal construction technique that increased the ability of the neoclitoris to feel sensations. According to his website, Meltzer performs 2-4 vaginoplasties a week, and that he has performed over 3000 male and female sexual reassignment (SRS) surgeries. Joan Roughgarden called Meltzer one of the leading surgeons in this specialized field. He practices in Scottsdale, Arizona.
Georges Burou (1910–1987) was a French gynecologist who managed a clinic in Casablanca, Morocco and is widely credited with innovating modern sex reassignment surgery for trans women.
Transsexual condition in which an individual identifies with a gender inconsistent or not culturally associated with their biological sex
The Baptist Medical Center sex reassignment surgery controversy occurred in 1977 in Oklahoma City, Oklahoma. Surgeons at the Baptist Medical Center, a hospital owned by the Southern Baptist Convention, were prohibited from performing sex reassignment surgery.
Paul Allen Walker was an American social psychologist and founding president of HBIGDA, the Harry Benjamin International Gender Dysphoria Association now known as WPATH, the World Professional Association for Transgender Health in 1979. He also served as director of the Janus Information Facility.
The real-life experience (RLE), sometimes called the real-life test (RLT), is a period of time in which transgender individuals live full-time in their preferred gender role. The purpose of the RLE is to confirm that a given transgender person can function successfully as a member of said gender in society, as well as to confirm that they are sure they want to live as said gender for the rest of their life. A documented RLE is a requirement of some physicians before prescribing hormone replacement therapy (HRT), and a requirement of most surgeons before performing genital reassignment surgery (GRS).
Transgender health care refers to how medical institutions, communities and individuals approach the care of transgender people. It includes the prevention, diagnosis and treatment of physical and mental health conditions, as well as sex reassignment therapies.
Detransition is the cessation or reversal of a transgender identification or gender transition, whether by social, legal, or medical means.
Facial masculinization surgery (FMS) is a set of plastic surgery procedures that can transform the patient’s face to exhibit typical masculine morphology. Cisgender men may elect to undergo these procedures, and in the context of transgender people, FMS is a type of facial gender confirmation surgery (FGCS), which also includes facial feminization surgery (FFS) for transgender women.
1. Harrington, Lee (1 May 2016). Traversing Gender: Understanding Transgender Realities. Mystic Productions Press. p. 287. ISBN 978-1-942733-83-6. OCLC 947837700 . Retrieved 15 October 2018.
2. "Gender Confirmation Surgeries". American Society of Plastic Surgeons. Retrieved 2017-08-07.
3. "About ASPS". American Society of Plastic Surgeons. Retrieved 2017-08-07.
4. Munro, Donald. "Trans Media Watch" . Retrieved 1 November 2018.
5. Munro, Donald. "Trans Media Watch" . Retrieved 13 June 2016.
6. Magnus Hirschfeld, Zeitschrift für Sexualwissenschaft, 1908
7. The Case Van Kück vs. Germany, June 12 2003
9. M.H. (1 September 2017). "Why transgender people are being sterilized in some European countries". The Economist . Retrieved 2 September 2017.
10. See WPATH Standards of Care, also WPATH Clarification.
21. "WPATH Standards of Care". 2003-12-17. Retrieved 2014-08-11.
22. See WPATH Clarification Statement, APA Policy Statement, and NASW Policy Statement
23. See discussion of insurance exclusions at:
24. AMA Resolution 122 "Removing Financial Barriers to Care for Transgender Patients". see:
25. See WPATH Clarification Statement
26. APA Policy Statement Transgender, Gender Identity, and Gender Expression Non-Discrimination. See online at:
27. NASW Policy Statement on Transgender and Gender Identity Issues, revised August 2008. See
29. Gaither, Thomas W. et al. Postoperative Complications following Primary Penile Inversion Vaginoplasty among 330 Male-to-Female Transgender Patients The Journal of Urology, Volume 199, Issue 3, 760 - 765
40. Adams, Cecil (2012). "Does Gender Reassignment Surgery Lead to Happiness?".
42. Olsson, S-E.; Möller, A. (2006). "Regret after sex reassignment surgery in a male-to-female transsexual: a long-term follow-up". Archives of Sexual Behavior. 35 (4): 501–506. CiteSeerX . doi:10.1007/s10508-006-9040-8. PMID 16900416.
43. Karpel, L.; Cordier, B. (2013). "Postoperative regrets after sex reassignment surgery: A case report". Sexologies. 22 (2): e55–e58. doi:10.1016/j.sexol.2012.08.014.
45. Norton, A. T.; Herek, G. M. (2013). "Heterosexuals' attitudes toward transgender people: findings from a national probability sample of u.s. adults". Sex Roles. 68 (11–12): 738–753. doi:10.1007/s11199-011-0110-6.
47. 1 2 3 4 Selvaggi, G., Monstrey, S., Ceulemans, P., T'Sjoen, G., De Cuypere, G., & Hoebeke, P. (2007). "Genital sensitivity after sex reassignment surgery in transsexual patients". Annals of Plastic Surgery. 58 (4): 427–433. doi:10.1097/ PMID 17413887.CS1 maint: Multiple names: authors list (link)
50. Lawrence, A. A. (2005). "Sexuality before and after male-to-female sex reassignment surgery". Archives of Sexual Behavior. 34 (2): 147–166. CiteSeerX . doi:10.1007/s10508-005-1793-y. PMID 15803249.
52. Ansari, Azadeh (February 23, 2017). "Transgender rights: These countries are ahead of the US". CNN. Retrieved December 10, 2018.
53. brian (2012-05-13). "Argentina Has Passed the Most Progressive Gender Identity Legislation in Existence". Leading Global LGBTIQ Human Rights Organization. Retrieved 2018-12-17.
54. 1 2 Anonymous (2012-05-14). "Argentina Adopts Landmark Legislation in Recognition of Gender Identity". Leading Global LGBTIQ Human Rights Organization. Retrieved 2018-12-17.
55. "– Argentina Gender Identity Law" . Retrieved 2018-12-11.
56. 1 2 3 brian (2012-08-13). "Chilean Paradoxes: LGBT rights in Latin America". Leading Global LGBTIQ Human Rights Organization. Retrieved 2018-12-17.
57. "French Law Removes the Surgical Requirement for Legal Gender Recognition". National Center for Transgender Equality. 2016-10-21. Retrieved 2018-12-14.
58. Toor, Amar (2016-10-14). "Transgender people no longer required to undergo sterilization in France". The Verge. Retrieved 2018-12-14.
59. "Why transgender people are being sterilised in some European countries". The Economist. 2017-09-01. ISSN 0013-0613 . Retrieved 2018-12-14.
61. "WHO | Growing recognition of transgender health". Bulletin of the World Health Organization. 94 (11): 790–791. 2016. doi:10.2471/BLT.16.021116. PMC 5096349 . PMID 27821880 . Retrieved 2018-12-19.
62. 1 2 3 Hays, Matthew. "Iran's gay plan". CBC News. Archived from the original on August 26, 2009.
63. 1 2 "Sex change funding undermines no gays claim", Robert Tait, The Guardian , 26 September 2007; accessed 20 September 2008.
64. Anonymous (2010-10-11). "Malta: UN Committee on the Elimination of Discrimination against Women (CEDAW)". Leading Global LGBTIQ Human Rights Organization. Retrieved 2018-12-18.
65. 1 2 "Dr. Georges Burou's pioneering technigue for male-to-female surgical sex reassignment". Retrieved 2018-12-14.
66. Perovic, Sava; Djinovic, Rados (November 2009). "Genitoplasty in male-to-female transsexuals". Current Opinion in Urology. 16 (6): 571–576. doi:10.1097/mou.0b013e3283312eb3. ISSN 0963-0643.
67. "Islamic Ideology body okays test tube babies, terms sex-change operations 'un-Islamic'". 2013-11-05.
68. 1 2 Anonymous (2002-06-10). "Spain: Health Care For All!". Leading Global LGBTIQ Human Rights Organization. Retrieved 2018-12-17.
69. "– Switzerland drops 2-year therapy as surgery-requirement" . Retrieved 2018-12-11.
70. "Schlumpf v. Switzerland (European Court of Human Rights) – Gender Identity Watch" . Retrieved 2018-12-11.
71. "Guide on Article 8 of the European Convention on Human Rights: Right to Respect for Private and Family Life, Home and Correspondence". European Court of Human Rights. August 31, 2018. Retrieved December 10, 2018.
72. "– Administrative District Court of Kiev rules against forced surgery requirement" . Retrieved 2018-12-14. |
Tetrahydrocannabinol(THC) and cannabidiol (CBD) are both main compounds of the cannabis plant. Maybe they don’t have much difference in elemental organization, but from the simplest point, THC has a psychoactive effect, but the CBD does not. Not just for this reason, through this article, we will talk more deeply today as detailed as can we distinguish the differences between the two compounds of cannabis plant and why do we prefer CBD instead of THC?
1. Where are they from?
Originally, cannabis was planted for medical purposes, its flowers also called buds and leaves were processed, and the end result is that cannabis became the “pejorative term” in people’s eyes. Speaking of cannabis, there is also a plant called hemp that has to be mentioned. They are all attributed to the cannabis class and they all have an impact on the nervous system. But they still have differences in growth methods.
①Hemp and cannabis
Hemp can produce fibers that are used to make clothing, rope, paper and so on. Medical cannabis has the same method of planting, it will grow larger flower buds, and it can produce more psychoactive compounds in its ingredients.
Cannabis is a highly versatile plant, which is manifested in its ability to alleviate many injuries and has a higher coefficient.The reason why marijuana benefits so many health problems comes down to the fact that some active pharmaceutical compounds of plants mimic the body’s internal harm reduction system and maintain our healthy balance – this is the Endocannabinoid System – ECS.
Endocannabinoid System – ECS
ESC is controlled by endocannabinoids in our body, and endocannabinoids play a key role in our internal balance, including sleep, the immune system, appetite, pain and much more. Once the body feels pressure and there is an imbalance, endocannabinoids will automatically act and fix it. The compounds in the cannabis plant are highly mimicked by the role of endocannabinoids in the body and can be self-storing after the endocannabinoids have lost their effect, and can stay alone inside, maintains body balance.
④Terpenoids and Flavonoids
The cannabis plant is the most versatile plant with more than 400 compounds in the world, and the most unique and active of which is cannabidiol. In addition, there are two other ingredients called terpenoids and flavonoids, which are also worth mentioning, because when they work together, they will give excellent therapeutic benefits for our body, such as: dilating blood vessels, protecting damaged brain cells, stimulating bone growth, killing certain kinds of cancer cells, controlling muscle spasticity, preventing seizure, killing viruses and bacteria. And there are just a few of their benefits for the body. The combination of these three ingredients is only one of many ingredients. Although the effects of other ingredients are not so obvious, they still have a certain therapeutic effect.
Cannabis has been shown to reduce the pain and nausea caused by illness, as well as chemo-induced neuropathy. It is also very effective in controlling muscle spasms and seizures, curing damaged brain cells and preventing the devastating effects of Alzheimer’s disease. It is also a very effective antioxidant.
There are more than 100 cannabis in the cannabis plant, the most worth talking about, and what we are talking about today is THC and BCD.
1. What are they?
①THC and BCD
When it comes to Marijuana, people’s first impression will be its psychoactive effects. We can’t deny this view, and in most cases, it will indeed be used for its mind-altering effects. The cannabis contains a lot of chemical ingredients, and each ingredient will have different effects. Some ingredients have this effect, but others do not. We hope that through this article, you can change the view of medical marijuana.
Both CBD and THC are found in cannabis flowers that are covered with the crystalline resinous trichomes, and they are the most widely found cannadidiols in marijuana. They have the same chemical formula, but the atoms are arranged differently. They have different effects in our body, because they interact with our endocannabinoid system differently.
The use of CBD is safer and helps to suppress unhealthy mental activity. But to a certain extent, because THC has a negative impact on the body, it is often undesirable.
A more detailed introduction for CBD or click the link:https://www.buycbdreview.com/
②CBD: A short introduction for CBD
CBD, also known as cannabidiol, was first discovered by cannabis scientists and is the most and most valuable compound in cannabis plants. Just through two important things about CBD, you can make a deep impression on it.
First, CBD is not addictive, in other words, CBD won’t make you feel high. It is because of this that the CBD derived from hemp is allowed to be used in some countries, but which from marijuana is banned.
Second, CBD has important medical and therapeutic benefits of cannabis. That’s why you hear a lot of people talking about the medical benefits of the CBD.
Click here to explore more about CBD:
③THC: A short introduction for THC
People who consume cannabis should not be unfamiliar with THC, also called Tetrahydrocannabinol. After taking cannabis with THC, it will give people a feeling of euphoria and excitement. Usually, we call it “high”.
THC is not the only cannabidiol that can bring this effect, but its enough quantities is occupied in the cannabis plant. This amount is enough to make people become very high. Just for this reason, THC is prohibited for recreational consumer use.
1. How THC works?
When THC affects the brain, THC stimulates cells to release the dopamine which is a substance can make people happy and it also activates the cannabinoid receptors which affect brain in many ways. The initial state of consuming THC is generally an extreme relaxation, the whole body feels soft, and the pupils dilated, and the other feelings of the body are strengthened. There are also some of the symptoms reported: a feeling of both happiness and elation, anxiety and pain are forgotten.
What has been described above is the state that occurs after taking THC for 10-30 minutes. THC will change the way of thinking, messing up the timeline of events in memory, and causing hallucinations and delusions.
1. How CBD works?
At present, there are many studies on the CBD, and some studies explain how the CBD works in the body, but this is not enough. The only thing scientists can be sure of is that the CBD, like THC, has an effect on our body through interacting with the endocannabinoid system, which contains two cannabinoid receptors: CB1 receptors and CB2 receptors.
CB1 receptors: In brain, CB1 receptors play a very important role in many functions, such as: memory, mood, sleep, pain sensation, and appetite, and it can be found in many areas in brain.
CB2 receptor: They are usually found in the immune system and They are responsible for the anti-inflammatory effects of cannabis.
CB1 and CB2 receptors are activated by endocannabinoids. The endocannabinoids found in our body are anandamide and arachidonoyl glycerol (2-AG).
THC mimics the body’s endocannabinoids to stimulate CB1 and CB2 receptors. Unlike THC, the CBD does not seem to act directly on the CB1 and CB2 receptors. Instead, it only increases the level of endocannabinoids in the human body. Because the CBD activates the release of endocannabinoids and interferes with the natural decomposition of endocannabinoids.
1. Why CBD used more on medical treatments?
Because THC has strong and long-term side effects, these side effects include impaired memory, decreased tissue capacity, and irregular heart rate. The series of negative effects make THC illegal in most countries around the world. In addition, the most important point is that long-term use of THC can cause abnormalities in the brain and heart. However, CBD does not have the side effects of THC described above, and even CBD can interfere with the mental effects of THC, whether in plants or in extracts.
With the increasing frequency of medical cannabis use, more growers are now choosing to develop an industrial chain with a higher CBD ratio to minimize the psychoactive side effects.
And if you are still confused about THC and CBD, let’s talk about the reasons why we choose CBD in detail.
1. Why do we choose CBD?
①CBD is the earlier one
Not that many people think that THC was discovered earlier than CBD, or that they were discovered at the same time. From a historical perspective, the CBD was discovered first. Around 20 years ago, CBD was discovered by American scientist Roger Adams, a chemist at the University of Illinois. And THC was actually discovered later by Israeli scientist and college professor Raphael Mechoulam back in the sixties.
Legal Status
Uruguay became the first country in the world to legalize recreational use in 2014, and Canada passed similar laws in 2018. Marijuana is illegal in the United States, but it is allowed to be used for recreational use in 10 states, including D.C., and it is allowed for medical treatment in 20 states.
Any CBD product derived from Marijuana plant is classified as an over-the-counter drug. However, in 46 states, if you want to use the CBD for medical treatment, the hemp plant must be allowed only if the THC content is 0.3%.
This is one of the most powerful reasons for choosing a CBD. When you are consuming hemp or marijuana products, do you often feel incentive? That’s because THC contains psychoactive compounds, which makes you like that. But what about the CBD? It won’t make you become psychoactive. But that doesn’t mean you don’t feel anything after taking the CBD, but this feeling doesn’t make your mood change too much. You only feel that your body gets very light and the whole body will feel very relaxed. And this is why CBD strains are more popular in medical use.
④Doesnt cause anxiety
It seems that the use of THC cannabis strains will bring anxiety from a long period of time, but the CBD will not. High doses of CBD and low doses of THC are often mixed and used to treat anxiety and it will give good results. The next time when you feel anxious, you can try the CBD strains instead of the THC strains you used often. The effect is good or not, only know when you try.
⑤Antipsychotic properties
Sometimes when you are smoking cannabis products with THC, you may feel that the whole body is floating, and the idea will become extremely uncontrolled. Maybe you will become unable to concentrate, your brain will slow down, or you will feel dizzy. Combined with the above reactions, you are mostly too high. The CBD will not make you like this. What’s even better is that the CBD will interfere with the negative effects of THC in your brain. And CBD is a good choice for people who are new to cannabinoid.
⑥Energizes you more
In addition, there is another reason to say. You may feel a little tired after consuming THC products. That is because THC comes with psychoactive effects, which is why THC is usually used as a sleep aid. This is great when you want to fall asleep as soon as possible, but if you want to find something to make your day full of energy, then you’d better choose CBD. After using it, you will find yourself energetic, but not overshoot. Also tell you a little secret: CBD is very effective for hangover people.
Finally you need to know:
I hope that everyone can understand that this is not an article that leads the CBD and THC into a battle. When we look at the benefits that the CBD brings to everyone, we can’t completely negate THC, because in some ways, THC is also beneficial. As we mentioned above, THC is more helpful for sleep than CBD. They are like apples and pears, they are all fruits, and each with its own nutrients. Choosing the right one for you is the best.
Know more about us, please click: https://www.buycbdreview.com/ |
Meaning and Impact of Recession
Readers Question: What does a Recession mean?
The definition of a recession is negative economic growth for two consecutive quarters. (see: definition of recession (definition of depression)
How does the recession impact:
1) Savings
In a recession, private sector savings tend to rise. This is because people become more nervous to spend. The spectre of unemployment encourages people to save more and spend less. However, the rise in private sector saving may be offset by a fall in public sector saving (i.e. government borrowing increases to try and stimulate the economy)
2) consumption
Consumption will tend to fall because people are worse off.
3) Investment
Investment will fall. Usually investment is highly cyclical. Therefore, a recession causes a bigger % fall in investment than consumption. Confidence is very important to investment so in a recession, investment tends to dry up.
4) goverment spending
Automatic fiscal stabilisers will cause government spending to rise. e.g. in recession, government have to spend more on unemployment benefits. Also the government may pursue expansionary fiscal policy to try and increase aggregate demand e.g. spending on infrastructure projects.
5) aggregate demand
Aggregate demand is falling in a recession
See also: Impact of recession
19 thoughts on “Meaning and Impact of Recession
1. I wont to know the meaning of recession,effect of recession and difinisation of recession ?
Comments are closed. |
One common way in which hearing people are first exposed to sign language is through the popular phenomenon of ‘song signing’ videos. If you do an online search for the name of virtually any popular song followed by “sign language,” you’ll find dozens of videos in which people sign lyrics to the camera while the song plays in the background. To someone with limited exposure to ASL, these videos look fascinating and impressive. However, the reality is complex, as song signing is a much more controversial topic than it may initially seem.
The main issue with song signing relates to appropriation and misrepresentation. A large percentage of the song signing videos on YouTube are posted by people who have either taken an introductory ASL class or who have not received any official instruction. As a result, videos which are labelled as “ASL covers” do not involve anything resembling true ASL. Because the signers do not grasp the grammar rules and unique conventions which make ASL a language entirely separate from spoken English, they often impose English rules on ASL vocabulary, resulting in a final product which would be confusing or meaningless to a fluent signer. As Deaf blogger Faith Georgia expresses in her post on the subject, this practice isn’t just disrespectful, it also perpetuates serious misconceptions. Because the majority of viewers have no way of judging how accurate the videos are, they tend to accept what they see as proper ASL and celebrate the hearing signers as skilled artists. As a result, false impressions of sign language spread easily and amateur performers with no involvement in Deaf culture receive exposure and acclaim which could be directed towards Deaf performers.
To further illustrate the issues with irresponsible practices in song signing, consider the work of Amber Galloway Gallego, a talented interpreter who has spent most of her life immersed in Deaf culture and studied ASL interpretation at the post-secondary level. She specializes in concert interpretation and has expressed her frustration with a lack of accessibility for Deaf individuals; even when an interpreter is hired, venues often select the cheapest option, resulting in an interpretation which communicates the song’s lyrics but does not replicate the experience of listening. Because Galloway Gallego believes that “music is more than words,” she makes an effort to express elements like rhythm and melody through her body.
For a demonstration of the ASL interpretation techniques used by Galloway Gallego and other qualified interpreters, check out a video in which she covers “Fight Song” by Rachel Platten. If you turn on the closed captions, you can see Galloway Gallego’s interpretation recorded in a gloss, which is a direct transcription of the signs used. A person with a limited understanding of ASL grammar and the difference between spoken and signed languages might translate a line like “Starting right now, I’ll be strong; I’ll play my fight song” as “START NOW BECOME STRONG, WILL PLAY FIGHT SONG,” so they’d be surprised to see that Galloway Gallego signs this phrase as “NOW FROM-NOW-ON TOUGH ME CAN, ME HANDLE++” while incorporating movement and facial expressions into her signing. However, Galloway Gallego’s version captures the meaning of the line–that the narrator has learned to believe in herself and respond assertively to challenges–while the first version becomes almost meaningless when translated. If you were interpreting a German speech and encountered an idiom such as “es is mir Wurst,” you would not say “it’s sausage to me” and trust your audience to know what you meant. Instead, you would translate the meaning, “I don’t understand any part of it,” or else choose an equivalent English idiom like “it’s all Greek to me.” Given how obvious this approach seems in a scenario where a spoken language is interpreted, it’s shocking to see how many online “Fight Song” covers exist where the signer simply translates each word of the English lyrics and labels the final product as ASL. The proliferation of online ASL covers by people with no apparent interest in learning the language suggests that many people view ASL exclusively as a party trick or an “exotic” mode of expression rather than a fully functional, independent language that millions of people rely upon for day-to-day communication. Furthermore, as described in this excellent essay by former song signer Stephen Torrence, hearing people from outside the Deaf community who profit from these inaccurate videos can be perceived as exploiting Deaf culture and using their privilege to dominate the work of marginalized artists.
However, although the world of song signing is one in which hearing people must tread carefully, there are plenty of ways to appreciate the breathtaking art that can be produced using ASL, particularly when the creators are members of the Deaf community. As discussed above, concert signing is an incredibly exciting medium, and there are plenty of fluent signers who release song signing videos online. Taking the fusion of sign language and music to an even greater extreme, Los Angeles-based theatre company Deaf West recently mounted a Broadway production of the musical Spring Awakening using both Deaf and hearing actors. If you want to participate yourself, there are many websites and apps produced by Deaf individuals which can help you learn, and looking for local classes will give you an even more immersive ASL learning experience.
Pin It on Pinterest
Share This |
Redistribution doesn’t reduce wealth inequality
Governments need to address the mechanisms by which people actually get rich.
Economics has trouble predicting the effects of big changes. Most of the events economists can observe and study are limited, incremental changes — a modest increase in the minimum wage, or a small decrease in immigration. This is as it should be, because governments are (rightfully) cautious about undertaking huge economic experiments. But when people are contemplating truly transformative changes — reparations for the descendants of slaves, for example, or wealth taxation — economists have fewer recent examples to look at. That’s one reason economic history is important — by looking at times of great upheaval, economic historians can shed light on the likely consequences of dramatic policy changes in the present day.
One such enlightening study is a recent paper by economists Philipp Ager, Leah Platt Boustan and Katherine Eriksson, entitled “The Intergenerational Effects of a Large Wealth Shock: White Southerners After the Civil War.” Using detailed Census records, Ager et al. measure the effect of the war on the wealth of slaveholders and their sons. This is an interesting question, because it asks: When the government takes away some of your wealth, how quickly can you bounce back?
The answer: Very.
Ager et al. used a combination of surnames, position in the wealth distribution and the amount of wealth held in “personal property” (which included slaves before the Civil War) to identify likely slaveholders among Southern families. Using these measures, they found that the Civil War and the abolition of slavery reduced slaveholders’ wealth by about 15% relative to Southerners who had had similar amounts of wealth before the war. This makes sense: When slaves were freed that represented a direct loss of wealth for slave holders, and their inability to compel former slaves to work their land reduced the value of that land as well.
But when they matched fathers to sons — estimating the sons’ wealth by their occupations and locations — they found that the sons of likely slaveholders closed the gap, rebounding to an approximately equal level of wealth relative to their Southern peers by 1880, and outstripping them by 1900. Although the South as a whole fell behind the North in wealth after the war, due to the accelerating importance of manufacturing and to temporarily reduced agricultural productivity, the relative wealth changes resulting from emancipation were temporary.
One reason for this might be that after the failure of Reconstruction to leave deep lasting changes on Southern society, the South implemented a system of sharecropping that was often only slightly better than slavery for black farm workers. To test this possibility, Ager et al. looked specifically at areas where land was redistributed or infrastructure destroyed by General William T. Sherman. Wealthy slaveholding families in these areas lost even more than Southerners elsewhere, often by large margins, due to the seizure or devaluation of their land. But again, within one generation, their sons tended to bounce back and equal or surpass those who escaped the devastation.
How did the sons bounce back? One way was by marrying into wealthy families, which they tended to do. The authors see this as evidence that former slaveowners retained social status and connections that gave them advantages in postbellum Southern society. Those connections could have allowed them to get good jobs or raise money to start businesses.
Whether that explanation is right, the finding that families bounced back from having their wealth expropriated has important implications for modern-day wealth inequality. Suppose the US government were to enact a big one-time redistribution of wealth, for example to pay for reparations for African-Americans. If the history of the postbellum South is any guide, the descendants of the rich people who took the hit would make up the difference before too long, thanks to the survival of the human networks that determine who has the opportunity to get rich. Even an annual wealth tax would likely have only a limited effect in flattening the distribution.
Right now, many economists and policy makers are looking for a way to reduce wealth inequality:
But Ager et al.’s research suggests that in order to make the US wealth distribution more equal in a meaningful and lasting way, the government will have to do more than simply reallocate resources. It will have to address the mechanisms by which people actually get rich. And if Ager et al. are correct, social ties and human networks are an incredibly important mechanism. Although racial segregation has fallen since 1970, black and white Americans still tend to live in different neighbourhoods and attend different schools. And poor Americans are at a big disadvantage when it comes to college:
When it comes time to get a good job or start a business, the children of well-off Americans know who to call, while the children of poor Americans do not.
Thus, evening out the wealth distribution will require more than just transfers. It will require getting more poor and minority kids into good colleges, enforcing the Fair Housing Act to help neighbourhoods desegregate faster, and other measures to help the children of the rich form strong social bonds with the children of the poor. Unless the basic shape of society is changed, the US can probably expect wealth redistribution to produce the same fleeting results found in the history books.
© 2019 Bloomberg L.P
Get access to Moneyweb's financial intelligence and support quality journalism for only
R63/month or R630/year.
Sign up here, cancel at any time.
To comment, you must be registered and logged in.
Don't have an account?
Sign up for FREE
Work hard and you earn a salary, start a business and you have a shot at becoming wealthy.
I suggest you read about social mobility in the US vs EU.
Could genetics and IQ have something to do with wealth? The book by Richard Lynn and Tatu Vanhanen, “IQ and the Wealth of Nations” and “The Bell Curve” by Charles A. Murray and Richard Herrnstein seem to prove that.
That’s just racist people trying to justify things.. it’s very easy to claim IQ based on race by dumb people till you dig a bit deeper and understand the impact early education, environment and socio norms on the individual.
There are a ton of studies on this being done in the US, UK and EU and they all conclude the same thing.. you can’t run a race and conclude some are better when they start with every advantage imaginable. I find it hilarious when people claim race has a massive impact but can never provide an equal test case.
Please read The Bell Curve. It’s not politically correct but unfortunately. ..
I find it hilarious when people try to deny the very obvious link between intelligence and wealth. Just take a look at the top scorers in the international PISA tests and see how well their countries do in comparison to Africa. Then ask yourself why.
Not a river in Egypt.
I find it hilarious that people accept that one can inherit hair and eye colour, height, body shape, etc, but if one implies that IQ can be inherited he is immediately shouted down for being racist. BTW, I am white, but have no problem accepting that Chinese, Japanese, Ashkenazi Jews and others have higher average IQ than whites.
Surely its far easier to understand the mechanisms for becoming (or staying) poor than it is to understand why people become (or stay) rich.
The first logical step in avoiding not becoming poor is by judging ones ability to actually afford a family before starting one, or otherwise put, understanding the repercussions of your actions.
Secondly would be a serious outlook on education, starting with primary education that sets a solid foundation for any future studies. 30% or 40% pass rates won’t cut it in the real world.
As the article points out, the rich will probably bounce back (whether through strategic marriages, clever ideas, hard work or better allocation of capital), so the rich are all too often easy targets to go to whenever the future is not looking too rosy for those less fortunate. In South Africa anyone with a house and car are probably deemed rich (although they are in reality most probably overextended financially).
Less rather address the cause of being poor, not rich.
The focus on “getting rich” instead of on “staying poor” struck me as well.
While there is no doubt that social capital helps, there are other psychological factors: agency, aspirations, locus of control etc. While education is one of the biggest factors, it cannot all be ascribed to “elite schools”; many kids from elite schools do NOT “make it” while some kids from “poor schools” do. What often drives the self-made rich is an obsession of escaping the poverty of their roots. Whether this is a healthy obsession or not is debatable.
Friedrich August von Hayek, The Constitution Of Liberty
There might be some truth to it, but it has nothing to do with language or culture, or race. There are several examples in history where the losers who lost the “war” ended up winning the peace, e.g. Japan and Germany. There are more examples closer to home too.
To simply give those who do not have something which they have never had or would in any case never have, would simply and eventually return them back to their original position.
Consider the case of the European lottery winner of €170mil, he did not have much then got rich beyond anyone’s wildest imagination and after 3 years he was poor again.
Change cannot be sudden, change requires responsibility, education and effort.
Redistribution starts with responsible governing, cultural awareness and the mindset change so that people do not on both sides of the scale cause extreme of wealth and poverty.
If you didnt create it, you probably cant control it!
Ah but you can rename it!
The shocking level of poverty in the U.k. was only mitigated by the industrial revolution (jobs) and especially through birth control which eventually became available to the poor. Our local informal settlements are full of young women (including teenagers) who are pregnant, many become pregnant to obtain child grants. Absent fathers make the situation worse, these children have little chance in life, inadequate nutrition, early mental stimulation, rampant child rape etc. etc. So when we talk of upliftment and inequality it is these factors are the drivers of poverty.It is a social problem which cannot be rectified by redistribution.
Saying “Governments need to address the mechanisms by which people actually get rich (wealthy)” is no different to saying “Governments must change the environment in which donkeys live to enable them to turn into race horses”. Nice idea but in terms of wealth it’s not going to happen. To get them to become “rich” requires introduction of communism / socialism and we see how successful that has been.
How about rewarding proper family planning and addressing the out of control population explosion in our country, rather than rewarding and funding people who just cannot afford large families but yet continue thereby imposing further unsustainable burdend on the ever diminishing pool a real taxpayers…..close down the social gimme club, encourage and reward smaller families and give those children the parenting attention they deserve and a future….if not, being wealthy becomes a mere mirage in a land of universal poverty….unless of course you are part of the anc elite!
I think population control isn’t needed as such, more economic migration. South Africa suffers because we have idiotic leaders not because we have a large population. In fact if the last 10yrs has taught anyone anything then it’s that electing a kleptocratic party is arguably worse than a booming populous as I’ve seen plenty countries use the latter to their advantage.
Why do we have a diminishing tax payer base? Is it really the population growth or is that socio-economic growth is hindered by the politically corrupt?
What I find fascinating about Sa is that we also quick to blame politicians for their part.. but what happen to the management consultant firms? Why are they still functioning in SA? When it’s impacting an American or EU company the local companies involved have punitive measures placed on them but if they American, German etc then it’s just a slap on the wrist
That reward comes from the tax payers pocket. The only thing that must be rewarded is work, the harder the work the more the reward. Thinking people gets rewarded more than non thinkers.
It is a culture thing. It will never be rectified.
The ANC never promotes hard work, they prefer their supporters lazy and dependent.
Whilst I think the article is everywhere. It would be interesting if the study were done on Zimbabwe farmers who lost land without compensation. I know a few who adjusted,reinvented themselves and are doing well inspite of the inflation and meltdown that followed the farm grabs.
This is interesting. The study would be useful if it was completely frank about what sort of alliances had to be forged (probably with ZANU PF) and what rules were broken (exchange control?). Just about everywhere in the third world are small pockets of what looks like excellence whether it be mining, cutting indigenous timber, planting cash crops (tobacco, palms, sugar etc), sometimes for political big men or foreign governments (China, India and Saudi?).
One thing remains common – the general populace stay dirt poor and downtrodden.
Interesting thing case studies, always an alternative to disprove. Looking at the world over the years. Which continents have prosperity and wealth and which do not. Really simple or perhaps not.
With regards to population growth. For years China had a one or perhaps two child policy and where are they now as an economic force due to that policy?
If you have too many children in a household with a set income, the household will suffer. If the population in a country becomes too large the population will suffer and starve.
In which continent is this mostly prevalent now and over the years?
First step in becoming wealthier. Accept responsibility. Its the very step 90% refuse to take.
Load All 26 Comments
End of comments.
Follow us:
Search Articles:Advanced Search
Click a Company: |
Condensation: Why is it an issue?
The air in every home will contain some level of moisture. Many of our day to day activities create additional moisture in the air. This can allow condensation to form rapidly and easily. Showering, cooking, even the breaths that you take can contribute. Unfortunately, many issues can arise from allowing excess humidity and moisture to build-up in within your home.
Frost On the Nails
There is frost visible on the underside of the roof deck and the nails. Mould has begun to form as well.
When too much Condensation is able to collect it can lead to costly interior damage. Our ceilings, wall and even our floors can become damaged as a result. Condensation build-up within our attic spaces may even cause the roofing system, shingles and roof deck, to deteriorate prematurely. It is also one of the leading causes of mould growth in our bathrooms and attic spaces. Mould and mildew growth can cause a number of adverse health effects including: difficulty breathing, asthma attacks, stuffy noses, sore throats and more.
Mouldy Roof Deck
Mould spores can be seen on the roof deck as a result of condensation.
What Is Condensation?
But what is condensation and how does it form? Air contains moisture in the form of water vapour. The warmer the air, the more water vapour it is able to hold. Once the humid air comes in contact with a cooler surface, the water in the air will revert back to liquid form and water will begin to collect on the nearest surface. In the winter months, this condensation will turn to frost very quickly. While condensation is most visible on surfaces such as windows, more serious cases can allow it to be seen on walls and ceilings as well.
Condensation drips
Condensation drips can be seen running down the walls and on the ceiling.
During the warmer months, condensation is generally less of an issue. This is because the level of humidity in the outside air is usually higher than the air inside of the home. Our windows and doors are left open more frequently as well, which helps to prevent excess condensation build-up within our living spaces. During the winter months however, the majority of home are closed up tight, to preserve the warmth inside. Condensation is more likely to build in this scenario.
Frost on the roof deck as a result of condensation.
Short Term Solutions
There are some things that you can do immediately to reduce the amount of condensation that can collect. If you see signs of condensation within your home, be it present on the windows or elsewhere, these short term solutions may help reduce the issues:
• First, it is important to be aware of the amount of moisture that you are producing on a daily basis. When showering or bathing, be sure that the bathroom fan is left on. When you are done, be sure to leave the fan running for an additional 15 minutes. This will allow the remaining moisture to vent out of the room. The same goes for cooking. When you are preparing meals over the stove, ensure that your range hood fan is on at all times. Small changes in your routine can help to reduce the amount of condensation that can collect. If you don’t have a fan, keeping a window open during these activities, can help as well.
• Invest in a dehumidifier. Dehumidifiers are great for lowering humidity levels within the home. These units operate by drawing the humid air into the unit, where it is dried out before the water within has a chance to condense.
• It is also important to ensure that your dryer is properly ventilated. By keeping the hose clear and ensuring that it is hooked up to a proper vent, you can reduce much of the humidity and moisture that escapes back into the home.
These short-term solutions should help to rid your home of moisture laden air, when an immediate solution is needed.
Prevent Condensation Long-Term
However, if the short-term solutions are not doing the trick, the issue should be further investigated. In this case, it may be best to hire a reputable company to properly assess your attic space. Attic insulation and Ventilation are two of the largest contributing factors to condensation development within the attic space and the home.
A well-maintained attic space will have sufficient insulation and vapour barrier installed. It will also have proper ventilation to ensure that air can flow through the attic space, pulling in cooler air from the soffits and exhausting hot and humid air through the exhaust vents as necessary. When it is not possible to have air intake from the soffits, there are specialized intake vents that can be used instead.
Blocked Soffits
The vented soffits are blocked by insulation. Attic baffles should be installed.
It is also important to ensure that any protrusions, such as pot lights, are covered and insulated within the attic. Even the smallest of gaps in the attic floor can allow hot air to rise up into the attic space. When this occurs, larger issues are created. Unfortunately, after assessing many attics all over Ontario, it is apparent that too many homeowners do not realize the importance of attic maintenance. Sometimes to their detriment.
The Pot light is not sealed.
The Pot light is covered but not sealed.
Contact a Professional
Costly damage can occur if condensation issues are left without rectification. The higher the temperature within your attic space, especially in the winter, the more condensation will form. The more condensation forms, the higher the likelihood of mould growth on the roof deck. This also increases the chance of interior water damage. If condensation continues to be an issues in your home, contact a professional immediately. |
Discover our nations leaders
5 Fast Facts About William McKinley
Photo courtesy of the Library of Congress
William McKinley will forever be remembered as one of the U.S. presidents who unfortunately had his time in office cut short due to assassination. Despite dying only a few months into his second term, McKinley had already accomplished many things. Luckily, historians have not forgotten his contributions to the country and have ranked him as one of the top 20 presidents in history. From his service in the Civil war to his backing of strong tariffs, his life of public service stretched for decades and deserves a closer look.
Civil War Veteran
McKinley has the distinction of being the last president who served in the Civil War. Not only did he enlist, McKinley was a part of some of the most historic battles of the war. Once serving under future president Rutherford B. Hayes, he would go on to be a part of the Second Battle of Bull Run and Antietam. McKinley would serve through the end of the war and leave the army as a brevet major.
Governor of Ohio
After serving in the House of Representatives for over a decade, McKinley became Governor of Ohio in 1892. Following the path of his former general, Rutherford B. Hayes, McKinley was now making a name for himself. His contributions to the national party as governor greatly increased his national profile.
After years of working on a strong tariff platform as a congressman, McKinley would push his agenda as president. McKinley would support the Dingley Act that raised the rates charged for American products.
Spanish-American War
After the sinking of the USS Maine during the first part of the Spanish-American War, McKinley took over an active role in the daily operations. By confronting the Spanish army in the caribbean and in the Philippines, the U.S. gained freedom for the people of Cuba and gained control of Puerto Rico, the Philippines and Guam. It was also during this time period that the U.S. annexed the Republic of Hawaii. The conflict with Spain would be resolved on December 18, 1898 with the signing of the Treaty of Paris.
Tour of the nation
Just after his second inauguration, McKinley would tour the nation by railroad. This would be the first time that the president and first lady would visit California together. By giving speeches and shaking hands extensively in the south and the west coast, McKinley gained exposure to the rapidly expanding country. |
Speaking Spanish Rocks
by : Catherine Smith
Spanish is the mother tongue of approximately 350 million people in 21 countries (Mexico: 95 million, Spain: 40 million, Argentina: 35 million, Colombia: 35 million, Venezuela: 25 million, Peru: 20 million. Spanish is the second most used language in international communication.
More than forty-seven million people learn Spanish anywhere in the world at this moment .
As you learn Spanish, traveling to Spanish speaking countries will be much more enjoyable. Time and time again while traveling in Mexico, Central America and South America I have had doors opened to me simply because I speak Spanish, allowing me to see and do things that many other visitors do not. When I read Latin American or Spanish newspapers, for example, I often find that I gain a sense of how other people think and feel, a way that is different than my own. There are many other reasons to learn Spanish like the great contribution of the Spanish and Hispanic American culture in Architecture, Literature and Arts.
Spanish can be easy to learn compared to other languages. Much of its vocabulary is similar to English's, and written Spanish is almost completely phonetic: Look at almost any Spanish word and you can tell how it is pronounced. And while mastering the grammar of Spanish can be a challenge, basic grammar is straightforward enough that you can have meaningful communication after only a few lessons. Wherever you decide to go, be it to Central America, or to Spain, the mother country of the Spanish language, knowing the language will get you far. If you take a little time to learn some of the Spanish language before heading off to distant lands, your understanding and appreciation for the places you visit will be improved tremendously.
Spanish vocabulary is basically of Latin origin; however it contains many loan words from other languages, especially Arabic, French, and Italian. If you can learn Spanish, you'll have a head start in learning the other Latin-based languages such as French and Italian. And I wouldn't be surprised if learning Spanish might even help you learn Japanese or any other non-Indo-European language, since intensive learning the structure of a language can give you a reference point for learning others. It's easy: Spanish is one of the easiest foreign languages to learn.
Learning a foreign language is fun and exciting and does not have to be boring. Learning Spanish allows you to enjoy the various nuances of a different cultural. |
Walter Munk, pioneer of oceanography, passes away at 101
February 11, 2019 | Environment
Walter Munk: a genius of the oceans | Photo: Jepsen/UC San Diego
Walter Munk, one of the pioneers of oceanography and surf forecasting, passed away at 101, at Seiche, in La Jolla, San Diego, California.
Walter Heinrich Munk was born on October 19, 1917, in Vienna, Austria. In 1932, he was sent by his parents to New York. They wanted him to follow the family's footsteps in banking.
"My mother exiled me because I was doing very poorly in high school, and the reason I think was that I enjoyed skiing so much," Munk once told.
However, Munk hated the financial business and ended up at the Scripps Institution of Oceanography in La Jolla, California. In 1940, he earned a master degree in geophysics.
But, while working at the Scripps at the U.S. Navy Radio and Sound Laboratory, Munk and his colleagues developed methods and formulas for predicting ocean conditions in any given location.
The surf forecasting techniques initiated at Scripps were used by Allies to plan the Invasion of Normandy, the critical chapter that even led to the defeat of the Nazis.
The American and British oceanographers were able to indicate the best date for D-Day, and improve the assault conditions of the largest amphibious invasion in history.
In 1947, and a couple of years after the end of World War II, Walter Munk completed his Ph.D. in oceanography from the University of California, Los Angeles.
The Einstein of the Ocean
In the following decades, the "Einstein of the Ocean" would participate in multiple research and development activities involving ocean circulation and currents, the study of the sea floor, and the behavior of ocean waves.
For many, Walter Munk is the father of surf forecasting. The Austrian oceanographer began his studies in a time where there were no computers, and all wave forecast predictions were drawn by hand.
Between the 1970s and the 1990s, Munk dedicated his time to ocean acoustic tomography, tide patterns, and the relationship between ocean temperature and sea levels.
Recently, Water Munk was involved in raising awareness about the problems associated with global warming.
In 2017, the city of La Jolla dedicated a section of its boardwalk to the legendary oceanographer - the Walter Munk Way.
"The CO2 we are putting into the atmosphere now is producing a rate of sea-level rise so that the Walter Munk Way is not going to enjoy another 100 years," he said at the time.
He is survived by his daughters Edie Munk and Kendall Munk, and three grandsons.
|
A deity (Listeni/ˈd.ti/ or Listeni/ˈd.ti/) is a concept conceived in diverse ways in various cultures, typically as a natural or supernatural being considered divine or sacred.Monotheistic religions accept only one Deity (predominantly referred to as God),polytheistic religions accept and worship multiple deities,henotheistic religions accept one supreme deity without denying other deities considering them as equivalent aspects of the same divine principle, while several non-theistic religions deny any supreme eternal creator deity but accept a pantheon of deities which live, die and are reborn just like any other being. A male deity is a god, while a female deity is a goddess.
|
Asian american women dating
12-Aug-2017 01:04
Trade agreements such as NAFTA and GATT have broken down protections for workers and the environment in order to secure a free-wheeling capitalist global economy, and Asian workers, especially women, are suffering the worst of it -- laboring under worse working conditions and being forced to compete for the most degraded, worst-paying jobs.
Activists have responded to these new changes with a renewed labor movement that cross borders and industries.
They are putting poor immigrant and refugee Asian women at the forefront of their organizing, thinking globally, and they are making the connections among the politics of labor, health, environment, culture, nationalism, racism, and patriarchy.
A different sort of Dragon Lady is emerging -- not a cold-blooded reptile, but a creature who breathes fire.
Chinese women who were not prostitutes ended up bearing the brunt of the Chinese exclusion laws that passed in the late 1800s.Far from being predatory, many of the first Asian women to come to the U. in the mid-1800s were disadvantaged Chinese women, who were tricked, kidnapped, or smuggled into the country to serve the predominantly male Chinese community as prostitutes.The impression that Asian women were prostitutes, born at that time, "colored the public perception of, attitude toward, and action against all Chinese women for almost a century," writes historian Sucheng Chan.Asian America has masked a series of internal tensions.
In order to produce a sense of racial solidarity, Asian American activists framed social injustices in terms of race, veiling other competing social categories such as gender, sexuality, ethnicity, and nationality.The political context of the 1990s is significantly different and today, Asian immigrant professionals are less vital to the labor market and are thus, in a familiar cycle, being forced down the status ladder. |
Monday, February 28, 2011
Hermit Crab
True Wild Life | Hermit Crab | The hermit crab is a small sized crustacean, that is found in ocean waters worldwide.Despite its snail-like appearance the hermit crab is related to crabs, although they are not that closely related as the hermit crab is not a true crab. There are more than 500 different species of hermit crab found in marine habitats all around the world. Although hermit crabs do venture into deeper waters,they are more commonly found in coastal waters where there is more food and places to hide.
The hermit crab has a soft under-body which it protects by carrying a shell on its back. The shell of the hermit crab is not its own, but one that belonged to another animal. As hermit crabs grow, they continue to find larger shells to accomodate their increasing size. Hermit crabs are omnivorous animals that eat pretty much anything they can find in the surrounding water. Small fish and invertebrates including worms, are the most common prey for the hermit crab along with plankton and other food particles in the water.
Due to their small size, hermit crabs have numerous natural predators all around the world, which includes sharks, fish, cuttlefish, squid and octopuses. It is thought that hermit crabs often hide amongst other animals such as sea anemones as a form of natural protection.
After mating, the female hermit crab carries large numbers of eggs in a mass that is attached to her abdomen. The hermit crab larvae hatch into the open ocean in just a few weeks, where they quickly moult exposing the adult hermit crab body underneath.
Anonymous said...
I am a hermit crab
Anonymous said...
yay hermit crab
Anonymous said...
vey funny
Anonymous said...
thank does not alike with the crabs
|
A Cause of Snoring a Lot of People Are Not Aware Of
A sleeping woman and her roommates trying to stop her from snoring There are several different possible reasons behind your snores – the sounds you produce while sleeping. Sinus problems, a loose or hanging tissue in the throat, obstructed airways, clogged nasal passages, and obesity are some of the most common.
However, many people do not know that their snoring can also be a direct result of their misaligned teeth. Misaligned teeth, which can come in many different forms, cause a blockage in the airways. This then gives rise to snoring. An overbite is one of the most common ways teeth misalignment can occur.
It is important you look at all your possible treatment options, one of which is dental braces that you can get from a highly experienced Stafford, VA orthodontist such as Southpoint Quality Dental.
What an Overbite Looks Like
In people with an overbite, their upper teeth overlap their lower teeth. In other words, when they close their mouths, the upper teeth sit in front of the lower teeth, creating a gap in between.
Note that it is normal to have a slight overbite, as you would have difficulties chewing or biting if the upper teeth keep landing directly on the lower teeth. This slight overbite also protects the teeth and jawbone from fractures and damages.
An overbite that causes snoring and numerous other issues occur when the space the upper teeth creates when it sits on the lower teeth is too big.
When an Overbite Should Concern You
When you have an excessive overbite, your upper teeth overlap those at the bottom by more than half of the tooth’s length (typically an overlap of around 2 to 3mm).
This type of malocclusion, also commonly known as excessive overbite, does not just cause snoring; it can also result in other issues that make biting, chewing, and speaking difficult. It can also cause discomfort, even pain. And in some cases, tooth and jaw fractures.
Recommended: Fluoride: The Good, The Bad, and What to Do About It
Seeking Immediate Help
To minimize or prevent snoring, you can use mouth guards (also called night guards). However, if the cause of your sleeping sound issues is an overbite, it is better to have the root problem resolved. This way, you can fix not just your snoring, but also all the other complications of having misaligned tooth. |
Datapoint Palenquero/r - voiced dental/alveolar trill
Note that in Spanish, <rr> is consistently [r], and so is word-initial [r]. Palenqueros (all of whom speak Spanish) are thus very familiar with the trill [r]. Yet they often articulate a vibrant with a single trill instead (i.e. [ɾ]). Cf. perro 'dog' > [peɾo / pelo].
Exists (as a major allophone)
Example 48-233:
perro rabioso
dog angry 'angry dog' |
Global Warming And Ice Ages Essay
868 words - 3 pages
Through the Earth’s geological history, it has often been frozen in the grips of various ice ages, interrupted with brief warming periods. For the past 10,000 to 50,000 years, the Earth has been enjoying the latest period of global warming. The Earth’s surface temperature is protected by its atmosphere, of which carbon dioxide (CO2) is a major component. There is a strong relationship between CO2 and the surface temperature on Earth. CO2 levels would naturally rise as the Earth warms up. However, over the past 200 years, humans have contributed to CO2 levels rising dramatically, way above even the highest historical levels, and this has hastened global warming.
Lutgens and Tarbuck (2014) explain that the Earth’s atmosphere greatly influences its surface temperature and its life-giving environment. The major components of the atmosphere are nitrogen and oxygen, composing about 99% of the atmosphere. The next major component is carbon dioxide (CO2). Additional variable components are water vapor, aerosols, and ozone (O3). Both water vapor and CO2 act like a greenhouse by conserving the heat emitted from the Earth. Aerosols are solid and liquid particles that float in the atmosphere and can either reflect or absorb the sun’s radiation. Two examples of an aerosol are man made pollution or ash from a volcanic eruption. These aerosols can reduce the temperature on Earth, because they effectively block sunlight from reaching the Earth’s surface. Ozone sits on the stratosphere like a layer. This layer of ozone absorbs the sun’s harmful ultraviolet (UV) radiation. Each component of the atmosphere guards the Earth’s current habitable state.
CO2 is released and absorbed into the atmosphere as part of the carbon cycle. CO2 is emitted from respiration, decay and volcanoes. It is absorbed into plant life, dissolves into the oceans, or becomes part of the atmosphere (Lutgens and Tarbuck, 2014; SEED, 2013). When animals including humans respire or breathe, they take in oxygen (O2) and exhale CO2. When animals and plant life decay, they break down to simpler compounds including CO2. CO2 is released by volcanic eruptions. On the other side of the cycle, plant life absorbs CO2 during photosynthesis. Water, including the Earth’s oceans, naturally dissolves CO2. It is more soluble at lower temperatures and higher pressure (SEED, 2013). Colder, deeper oceans, ice or snow hold more CO2 than warmer waters. Any excess CO2 stays in the atmosphere.
When the Earth warms up, CO2 levels also increase naturally. When the Earth cools down, CO2 levels decrease. In the past 450,000 years, the CO2 concentration in the Earth’s atmosphere...
Find Another Essay On Global Warming and Ice Ages
Economics and Global Warming Essay
1821 words - 7 pages Arguably one of the most oft debated topics in recent years, the effects of global warming pose a threat to the world economy. Growth in the economy can spur changes in climate that have the ability to prove both beneficial and impeding to economic prosperity. An understanding of economic principals can provide insight onto the costs that are incurred with growth of industry and the methods that can be implemented to cede further negative
Population and Global Warming Essay
982 words - 4 pages Population and Global Warming In recent years, people have begun to realize the adverse affects of the technologies we use. The tools that humans use to harness energy change the face of the environment around us. When the industrial revolution began, I am sure that no one thought that the innovation taking place could potentially be the cause of a huge change in our surroundings. People were just doing what they thought was the best
Global Warming and Gender Studies
1545 words - 6 pages global warming, has raised concerns among the scientist community, since higher temperatures can lead to more frequent and irregular hydro-meteorological phenomena - such as intense cyclones and hurricanes or irregularities in seasonal rainfall patterns - the melting of the ice caps and glaciers and the raising of sea levels (Landa, Magaña and Neri, 2008: 36). 2. Global warming and inequality as problems of development Because of the
Global Warming and Climate Change
998 words - 4 pages , but the significant one is greenhouse gases. Greenhouse gases have negative effects on climate and cause melting of polar ice caps, acid rain, and ozone layer destruction. The significant effect of global warming is emission of greenhouse gases, which has numerous negative environmental impacts. Fossil fuels are known as a big cause of global warming. When fossil fuels such as: natural gas, coal, and oil are burned, they release carbon dioxide
Extreme weather and global warming
1588 words - 6 pages ENG 102-V1Extreme Weather and Global WarmingOver the last few decades, there has been a signifacant change to the climate on our planet Earth. People around the world are beginning to connect the dots between global warming and the impact it has on recent extreme weather patterns. If someone didn't believe in global warming before, there have been many extreme weather occurences that can be linked to an increase in global warming. An increase in
Global Warming and Climate Change
Global Warming and the Media
1504 words - 6 pages Global Warming and the Media In this paper I will show that the issues of global warming have been misrepresented by some and cleverly utilized by others, (Y) by giving an overview of global warming as it is portrayed by the media, (Z) so that people will learn to search for scientific information regarding important issues for themselves. (P1) The media’s constant over-coverage of global warming is desensitizing the public to the very real
Global Warming and its Consequences
736 words - 3 pages Protection Agency). As the climate warms, changes will happen the can affect water supplies, agriculture, power and transportation systems, the natural environmental and humans health and safety, according to the EPA’s website. Global warming has impacts on us. With the warming temperatures and the melting ice that causes the sea level to rise, this presents a threat to the vital coastal ecosystems and millions of people who live in the coastal
Human Activities and Global Warming
713 words - 3 pages single effect, thus there is no one solution. There isn’t a solution to end climate change but each individual can bring important help by adopting more responsible lifestyles, even just the smallest change could make a huge difference. Climate change or Global warming has already started to affect our planet, and the most significant sign through research is the melting of the very important Arctic Ice Caps. This research has indicated a major
Global Warming and Human Population
2651 words - 11 pages from where we were in 1990, for example, would put the ecosystem on the verge of an ice-age. Already, there is a suspicion that, since 1975, the persistent El Nino is the first sign of the relation between global warming and climate (Kerr, 1994). As MGT increases further, we can expect more frequent and severe hurricanes and perpetual summertime droughts in many places, particularly in the US Midwest. Paradoxically, more intense winter storms
Global Warming and it's Warnings
1996 words - 8 pages Global Warming and Its WarningsThe first claim of Global Warming first started in 1986 with a Sweden chemist named Svante Arrhenius. Arrhenius theorized that all the carbon dioxide emissions, that were from the burning of fossil fuels, would be the cause of global warming, as well as the cause for the temperatures of the earth to rise, due to heat being trapped in the earth's atmosphere ( A lot of things come to mind
Similar Essays
Science: Global Warming, The Ice Sheets
947 words - 4 pages “The Glacier, and with it the Duck, might have moved since then.” Lou Sapienza is the lead organizer of a Coast Guard Operation searching for a missing World War II plane; the Grumman Duck and its lost crew. A challenging problem the party has with finding the Duck is the movement of glaciers since the planes went down close to 70 years ago. Since the 1950s the extent and the movement of the ice sheets have rapidly changed due to Global Warming
"Putting Global Warming On Ice" Essay Disproving Global Warming Myth Using Scientific Evidence
2292 words - 9 pages Putting Global Warming on IceWhat makes the earth's temperature rise and fall? Do greenhouse gases block solar heat from leaving the earth, or is it only a product of solar activity? Many people have theorized on what causes temperatures to change. A catch phrase named Global Warming came to popularity. Environmentalists from all walks of life joined the 'global warming' fight. According to Thomas O'Connell the global warming debate wasn't
Penguins And Global Warming Essay
1516 words - 7 pages , global climate change is also having important impacts. In the Atlantic part of the southern ocean, ocean warming and the melting of sea ice are associated to the decline of the penguin’s major food supply. Krill in this region have declined by as much as eighty percent since the 1970s. Since krill are on algae that grow on the bottom of the sea ice, the loss of ice leads to the loss of krill. Researchers project that a 1 degree rise in sea
Canada And Global Warming Essay
887 words - 4 pages It will be the destruction of earth. Global warming is increasing the average temperature of the earth's atmosphere and is changing regional climates. It is caused by greenhouse gases, weather, and part of the greenhouse effect. By 2100, it is predicted that the earth's average temperature will rise by 1.5ºC to 4.5ºC. The greenhouse effect keeps the earth 30ºC warmer; it forms a layer around the atmosphere and because of |
"Characters and Caricatures" by William Hogarth
“Characters and Caricatures” by William Hogarth
Grynszpan 6
Last year I reviewed a book about Erik Jan Hanussen, a mentalist and con man who first flourished and then crashed and burned in Berlin during the Nazi era — an Austrian Jew posing as a Danish aristocrat. Hanussen struck me as one of the most bizarre characters in the drama of that time, but he has to make room in the pantheon for a puny Jewish teenager who is the subject of Jonathan Kirsch’s arresting book, The Short Strange Life of Herschel Grynszpan.
Grynszpan 2Herschel was living with his Polish parents in Hamburg, Germany, when the Nazis came to power. During the run-up to the Holocaust, when Adolf Hitler’s scheme was to make life so unbearable for Jews that they would leave the Third Reich by their own volition, Herschel’s parents became concerned about his wellbeing. Their solution was to send him west when he was 15 years old, and he wound up living with his uncle and aunt in Paris.
During his sojourn, Herschel’s parents and siblings were among about 12,000 Polish Jews who were abruptly taken from their homes by the Nazis and deposited on the Polish side of the border with Germany. From the refugee camp there, Herschel’s sister wrote to him, describing the harsh conditions.
After an argument with his uncle over the question of helping the Grynszpans financially, Herschel bolted from the apartment and, on the following day, bought a revolver, entered the German embassy on a pretext, and shot a young diplomatic aide, who died from the wounds.
Grynszpan 1When he was taken into custody by French authorities, Herschel, who saw himself as some kind of avenging angel, immediately and then repeatedly told them that he had shot the man, Ernst Vom Rath, in response to the treatment of Polish Jews and, in particular, of his own family.
The Nazis reacted to the murder with the carefully staged mob rampage that destroyed Jewish businesses and synagogues and terrorized Jewish people throughout Germany and Austria on the night of November 9 and 10, 1938 — the so-called Kristallnacht.
Meanwhile, Hitler and his partners in paranoia had a different take on the crime. They saw it as the work of the “international Jewish conspiracy” that actually existed only in their nightmares. Hitler sent representatives to both observe, manipulate, and exploit the proceedings against Herschel.
Before the case was played out, however, Germany invaded France, and after Herschel, with the connivance of the French, dodged the grasp of the Nazis in a chain of events that sounds like a Marx Brothers scene, he fell into German control.
Adolf HitlerHitler, employing a brand of logic of which only he was capable, decided to stage a show trial so that the international community would conclude from this solitary crime that Jews everywhere were plotting to take control of Germany if not the whole world.
Kirsch describes the elaborate investigations and other preparations the Nazis made for this spectacle, inquiring into the most remote details of Herschel’s background.
But Hitler didn’t know whom he was up against. The hundred-pound dropout pulled the rug out from under the Nazi propaganda machinery by telling interrogators that he and Vom Rath had actually been involved in a homosexual relationship that went sour. It was a idea that had been suggested to him by one of his lawyers while he was still in French custody. The Nazis were stymied. Given Hitler’s horror of homosexuality, they couldn’t let the show trial go ahead and take a chance that Herschel’s claim would become public. On the other hand, they also couldn’t simply do away with Herschel after making such a big deal about how the case would be tried in public. The trial was postponed — indefinitely, as it turned out.
In a way, that’s where this story ends. No one knows what became of Herschel Grynszpan, although the debate goes on about whether he was a megalomaniac lone ranger or an overlooked hero of the Jewish resistence.
It’s a wonderful yarn, and Kirsch tells it like a novelist, exploring the psyche of an oddball teenager who played a quirky role in the biggest historic epoch of the twentieth century.
Grynszpan 5
CAROLE LOMBARD as Maria Tura and STANLEY RIDGES as Siletsky.
CAROLE LOMBARD as Maria Tura and STANLEY RIDGES as Siletsky.
to be 10
Books: “Isaac’s Army”
November 10, 2012
Warsaw came as a surprise to me. Because of my uneducated impressions of Eastern Europe, I expected the city to be grim, but it was not. Warsaw was lively, handsome, well-swept, festooned with parks, and imbued with the spirits of such as Paderewski, Chopin, and Wojtyla.
But as satisfying as it was to see the city thriving, it was impossible to escape reminders of its darkest days, when it was occupied and devastated by Nazi Germany — and its Jewish population virtually exterminated — a period that is described in vivid human detail in Matthew Brzezinski’s book, Isaac’s Army.
Brzezinski, who has been a reporter for the New York Times and the Wall Street Journal, concentrates in this book on the walled ghetto in which the Nazis confined hundreds of thousands of Jews in subhuman conditions until most of the poor people were either worked to death, killed by hunger and disease, shot to death in summary executions, burned to death in their homes and hiding places, or shipped off to death camps.
I saw remnants of the ghetto in Warsaw, but it seemed almost like an abstract idea. In Brzezinski’s book, however, the depth of the depravity with which the Nazis and their collaborators treated Polish Jews comes through with shocking force.
Brzezinski is particularly interested in a relatively small group of Jewish men and women who recognized from the beginning that the Nazi presence was an imminent danger to their community and were not willing to stand by and let the Germans proceed unhindered. The writer relates the stories of about a dozen individuals who were in that category. They belonged to underground paramilitary organizations that struggled to maintain some semblance of resistance to their persecutors. These folks defied and undermined the Nazi attempt to isolate the Jews and ultimately, in 1943, participated in the uprising that stunned and momentarily humiliated the SS when the “supermen” entered the ghetto with the object of leveling it.
Unfortunately, as Brzezinski relates, Polish Jews were not of a single mind about how they should respond to the Nazis or whether they should respond at all. They also were sharply divided over issues such as Marxism and Zionism.
They were frustrated by the fact that so many people and nations were indifferent to their plight, and they had to resort to bribery and subterfuge to accumulate even the poor excuse for an arsenal they had to defend themselves against the combination of Adolf Hitler’s insanity and his military machine. Their situation may have been hopeless to start out with, but Brzezinski shows that some of them would not give up hope or, at least, would persist in their struggle against the Nazis even when hope was gone. While this book, on the one hand, records one of the worst examples of human cruelty, it also records one of the best examples of human resilience. The account of a few score sick and starving Jews escaping the ghetto by stumbling for hours through a sewer laden with human excrement, corpses, and rats is disgusting to the imagination. At the same time, it is uplifting to know that people who would not concede their right to dignity and justice were willing to undergo even that in order to deny Hitler his dream of eradicating Judaism in Europe.
Books: “The Nazi Séance”
February 27, 2012
One of the most bizarre characters among the opportunists, lackeys, and hangers-on who orbited around Adolf Hitler and the Nazi party was Erik Jan Hanussen — a mentalist who is the subject of Arthur J. Magda’s book The Nazi Séance.
Hanussen, who worked his way up from rinky-dink vaudevillian to international celebrity, lived on the edge. Driven almost entirely by his appetite for fame and fortune, he dazzled some people and irritated others, and while he was being applauded for his feats on stage he was also being hounded by skeptics and enemies.
His act consisted of such effects as finding people in an audience whose names had been written on slips of paper and sealed in envelopes, finding hidden articles, telling strangers details about their lives, and occasionally foretelling the future.
Hanussen also conducted private consultations and séances for which he charged substantial sums.
He had many critics, but the most serious challenge to his credibility may have been a criminal case of fraud brought against him in Czechoslovakia. Although he probably had defrauded the people involved, he beat the charges after the judge, who seems to have been sympathetic anyway, allowed Hanussen to conduct a daring demonstration of his skills in the courtroom.
He also became a target of the communists who in the late ’20s and early ’30s were struggling with the Nazis for political control of Germany and who had no patience with such things as magic and spiritualism.
Some of the Nazis, on the other hand, including some high-ranking ones, were caught up in a post-World War I wave of interest in other-worldly things.
Hanussen, Magida writes, had no interest in politics or government, but he cast his lot with the Nazis to the extent that he used his charisma and manipulative skills to make some influential friends, not the least of whom was Count Wolf-Heinrich von Helldorf, head of the Nazi storm troopers in Berlin. Hanussen, who lived lavishly, entertained Helldorf in style and, while the Nazis were still trying to consolidate their power, the mentalist repeatedly lent money to Helldorf, holding onto the IOUs. Hanussen, who owned a newspaper in Berlin, used it to vigorously promote Adolf Hitler and his party.
Hanussen’s success was to a large extent a result of his hubris, and the primary example of that was the fact that he was not a Danish aristocrat, as he claimed, but an Austrian Jew named Hermann Steinschneider.
How he kept this from the Nazis for as long as he did is unclear, particularly since he continued to observe some Jewish rituals. In fact, one of his three wives converted to Judaism when she married him.
Eventually he was outed, first by a German communist newspaper and then by a Nazi publication. Even after this happened, he continued to behave with an extraordinary recklessness. He went too far, though, in February 1933, when he conducted a séance attended by some Nazi elite and tried to goad a hypnotized young actress into talking about a large fire. The following day, the Reichstag, seat of the German government, was torched. The circumstances surrounding that fire are still in dispute, but the Nazis blamed the communists. Magida writes that Hanussen, from his apartment, inexplicably telephoned the editor of a communist newspaper — a man he was otherwise unlikely to talk to — to inform him of the fire and warn him of the possible consequences.
In addition, Hanussen tried to use Helldorf’s IOUs to strong-arm the Nazis into letting him in on a lucrative business deal from which he had been shut out. The Nazis hadn’t been in power very long before three men took Hanussen for a ride. His body, with three shots in it, was found much later in the forest where he had been killed.
Unlike most of the Nazis’ millions of victims, Hanussen asked for it. Ironically, the success he enjoyed before he was eliminated was in part a result of an attitude that he shared with Hitler, who took advantage of the desperation and aimlessness of the German people after the combined blows of defeat in World War I and deprivation during the Great Depression. The following remarks are Hanussen’s, but they might have come from either man:
“”Their sadness comes from the fact that they don’t have a teacher, a father, a boss, a friend who impresses them enough that they can trust him. Why do these people come to me? Because I am stronger than they are, more audacious, more energetic. Because I have the stronger will. Because they are children and I am a man.”
While we have been absorbed in the death of Michael Jackson and the whatever-you-call-it of Sarah Palin, Bernie Ecclestone has been telling what a swell guy Adolf Hitler was — and then sort of taking it back.
Ecclestone is the top man in Formula One. He was commenting recently about the seeming inability of governments to do anything to improve the economic condition of most of the world. Now Hitler, Ecclestone said, there was a guy who could get things done.
And that he could.
The remark attracted a predictable response. Ecclestone, describing himself as a “fool” for having said such a thing, took a second crack at it, writing in The Times of London:
During the 1930s Germany was facing an economic crisis but Hitler was able to rebuild the economy, building the autobahns and German industry. That was all I meant when I referred to him getting things done. I’m an admirer of good leadership, of politicians who stand by their convictions and tell the voters the truth. I’m not an admirer of dictators, who rule by terror.
Evidently Ecclestone was absent the day the teacher told how the German government, soon after Hitler took power in 1933, suspended civil rights including the writ of habeas corpus, suppressed the Communist party and other opposition organizations, and violently — sometimes to the point of murder — drove the Communists away. And Ecclestone might have dozed over that part of the history text that described how Hitler’s government, before turning the Fatherland into heaven on earth, got the legislature to pass an act that pushed aside inconvenient constitutional provisions and made the regime a legal dictatorship.
Every once in a while someone who hasn’t done his homework “discovers” how beneficial Hitler would have been for Germany if he hadn’t been the devil incarnate. These epiphanies always end the same way. |
Chinese New Year
To the Chinese community, the most important festival celebrated is the Spring Festival, more commonly known as Chinese New Year. Chinese New Year marks the beginning of a new lunar year and falls on the first day of the ‘first moon’ in the lunar calendar. It is also the most important event of the entire Chinese calendar.
Chinese New Year symbolises renewal; a turning point in fortunes and lives on the whole. As such, families hold the traditional reunion dinner to celebrate the coming of the ‘first moon’. As midnight strikes, a cacophony of fireworks is heard throughout cities and towns marking the beginning of the new year. Fire crackers are believed to drive out evil spirits.
A Chinese home is incomplete without the traditional specialties of wax ducks and sausages, glutinous cakes and mandarin oranges. As red is the predominant colour symbolising luck for the Chinese, strips of red paper with ‘lucky’ characters inscribed on them are hung on walls or doors in most homes. Ang pows or 'lucky money’ are given in special red packets to the younger members of the community by their elders.
The Chinese moon calendar is divided into cycles of twelve years and is named after various animals. In order of sequence, the twelve animals are the rat, ox, tiger, rabbit, dragon, snake, horse, goat, monkey, rooster, dog and pig. Chinese New Year is ushered by the sign of these animals yearly. According to popular belief, individuals are born under the influence of the animal that controls the year of their birth. |
Shangsi Festival
Shangsi Festival is also known as the Double Third Festival because it falls on the 3rd day of the 3rd Chinese lunar month. It is an ancient Chinese festival when people would go out for an outing by the water, have picnic and pluck orchids. It is also a day when cleansing rituals were held to prevent diseases and to get rid of bad luck. The 3rd day of the 3rd month was also celebrated by lovers as their Valentine’s Day in ancient China. |
Posts Tagged ‘organic chemistry’
1. Draw the molecular formula for hexane.
Precise Names.
More on Hydrocarbons. Branched Chains.
The Systematic Name Game.
Hydrocarbon names and substituent names.
More than one substituent gets more than one number.
External links
Finally, cholestane
The themes in my blog are the scientific issues in nutrition, how to interpret data in the literature and my take on policy issues like taxing fat and taxing sugar. The most important thing, though, is the basic science because you really can’t understand nutrition without biochemistry and you really can’t do biochemistry without organic chemistry. Organic chemistry refers to the chemistry of carbon compounds. The term once referred to the chemistry of living organisms but now would includes polyethylene as much as fructose and, in the extreme case, the plastic bottles made from corn. I am going to try to present the science and I will start from scratch and make it very elementary. My experience is that chemists don’t mind very elementary — at professional seminars, it is the Nobel prize winner who asks the really simple question (because he doesn’t care what you think of him, he just wants to know the answer). I am interested in reader feedback as to whether this is what you want to know and if this and subsequent blogs help.
The good news is that, contrary to the college myth, organic chemistry is easy. It is freshman chemistry that is hard (because it depends more on physical chemistry, that is, physics), so I think I can get you up to speed on biochemistry and nutrition pretty fast. I am duplicating some of the material on my YouTube presentation but people told me that that is not always the best format. So, organic chemistry is easy. That’s the first thing.
The second thing is that chemistry is structural, that is, visual and what a chemist sees in chemical formulas is visual objects. I am going to show what a chemist is thinking about in dealing with chemical formulas. It’s graphic, so I will try to use as few words as possible. Comments on the figures at the end of the post.
Start with H2O
What a chemist sees in the formula H2O is a diagram, or structural formula. What a chemist thinks of when they see that diagram is the ball and stick model or maybe the so-called space-filling model which is supposed to be closer to what you would see if it weren’t that molecules of water are too small to be seen.
Methane is the simplest organic compound – The formula is CH4 – carbon always forms 4 chemical bonds. Different views of methane below. Methane is a colorless, odorless gas, the major component of natural gas (the odor of cooking gas comes from an added compound as a safety warning). Various representations below. (The wedge (coming out of the paper) and dotted line (behind the plane of the paper) is a shorthand representation of the 3D structure
Carbon Forms bonds with Other Carbons and Carbon Atoms Can Form Chains – Think of two methane molecules tied together by replacing one of the carbon-hydrogen bonds in each with a carbon-carbon chemical bond. The two carbon compound (C2H6) is called ethane. We can, similarly build up chains of carbon atoms. which will be the skeletons on which millions of organic compounds will be constructed. Carbon always forms four chemical bonds. A compound that has only carbon and hydrogen is called a hydrocarbon. The series built up from ethane are called saturated hydrocarbons (other name: alkanes) meaning that they have as many hydrogens as possible.
There is a Family of Organic Compounds – everything is organized as if it came from the chain of carbons known as saturated hydrocarbons. (IUPAC is the International Union of Pure and Applied Chemists who standardizes chemical names). Propane is a gas but it can be compressed into a liquid and is used as a fuel for various kinds of engines or for barbecues or welding torches. The higher hydrocarbons are fuels; you recognize the name octane as a component of gasoline which is a mixture of the higher saturated hydrocarbons. Much larger hydrocarbons are the major constituent in industrial and motor oils. The first ten hydrocarbons are shown in this table:
STOP. Are you with me so far? If so, you should commit to memory the names of the ten hydrocarbons. Everything else depends on this. Most organic compounds are given names based on this system.
The Secret of Organic Chemistry: Functional Groups
Organic compounds have two parts: a hydrocarbon backbone and a functional group, the non-hydrocarbon part that contains the chemically reactive part of the molecule, the functional groups. The assumption is that all compounds with the same functional group have similar chemistry. The millions of organic compounds are grouped into classes: alcohols, aldehydes, acids, sugars, amino acids, etc. based on which functional groups they contain. It’s easiest to understand by example. Look at the alcohols.
What Alcohols Look Like
Start with the simplest functional group. The combination of oxygen and hydrogen as a functional group is called hydroxyl. Any compound that has an hydroxyl group is called an alcohol. The common term “alcohol” refers to ethanol, one specific type of chemical alcohol. The simplest series of alcohols are those derived from the saturated hydrocarbons. If the hydroxyl group is added at the end of the chain, the compound is called a primary alcohol. To name such compounds, you count the number of carbons, use the name from the hydrocarbon, e.g., ethane and remove the “-e” at the end and add “-ol.” The figure below shows you that no matter how complicated the hydrocarbon backbone, if there is an OH group, the compound is an alcohol. Cholesterol is an alcohol (you can figure out that if you know that a structure has only CH groups, they can be indicated just with the geometry without writing the symbols, each vertex in the figure representing one carbon atom).
Next chemistry post:
Aldehydes, sugars and sugar alcohols.
Do I get it? Answers in the comments.
1. Can you write the structural formula for octanol?
2. When there is more than one hydroxyl group, the number of groups may be indicated by “di-, tri-” etc. The common compound glycerol would be called propane triol. What does it look like? |
Tobias James Johnson (March 14, 1951 – )
On March 14, 1951, Tobias “Toby” James Johnson, was born the fourth of five children in Bethlehem, Pennsylvania. Johnson’s parents, Eli Greenberg and Anna Solomon were both Jewish immigrants to America, having escaped Nazi Germany in 1938, immediately following the ceremony where Eli accepted the Nobel Prize at the age of 28. When the couple entered America they applied for citizenship, adopting the most common American surname at the time, hoping to avoid the scrutiny and fame that accompanied the international award.
As a child, Johnson was not interested in sports, music, art or social activities. Johnson’s main interests included solving math equations and balancing chemical formulas. Instead of pushing him to become a more social person, Johnson’s parents encouraged his interest in science, pushing him towards flashcards and textbooks. In elementary school, Johnson won his first science award at the sixth-grade science fair. His project was titled, “Concrete and Chemicals: Keeping Our Sidewalks Clean”. Though eventually determined to cause the concrete to raise from its rebar foundation, Johnson’s invention was initially hailed as an instant solution to the problem of removing dog excrement from the sidewalk surface.
After receiving a Bachelor of Science degree in chemistry from The University of Pennsylvania, where he attended on a full academic scholarship, Johnson began to pursue a Masters of Science degree in chemical engineering, but dropped out a few months into the program. Though Toby cited personal reasons for his departure, his immediate employment with Troon Laboratory in Rosemont, Illinois, caused many in the science world to speculate he had received a generous financial incentive.
It appeared that Troon’s investment in Johnson would pay off when, in 1976, Johnson made his career discovery. Trimentholdiptomine (3MD) was accidentally discovered when Johnson and his Troon team were looking for a better way to clean the slide covers for their microscopes. When Toby dropped one too many menthol particles into the solution, it made the slide covers completely disappear. The clarity of the solution was recorded at .00000011 on the Metrionomic Scale of Clarity, a rating that had been regarded as theoretical and unable to be obtained within the gravitational pull of Earth. Though scientists found the solution to be impractical in the lab, causing too much confusion when clear containers blended into the surface they were set on, Johnson recognized the commercial benefit when sitting beside his murky backyard pool. Having fought algae and cloudy water all summer, Johnson was inspired to dump a vial of 3MD into the chlorinated water and found that within minutes the pool water was crystal clear and extremely inviting.
Following eighteen months of toxicity testing, the newly patented solution of 3MD sold out as fast as it hit the shelves in June of 1978. Pools across America were treated with 3MD and the swimming world celebrated the pleasure of having a pool without the stress and work of keeping the water crystal clear. Unfortunately, Johnson and Troon’s financial success was short lived. Within a few months, reports came in of swimmers turning up at hospitals with bright red streaks of rash running down their legs and scattered across their bodies at random intervals. The rashes resembled poison oak, with blisters and bumps that crusted over and erupted again and again, but the intensive itching that accompanied the rash could not be cured with normal prescriptions of anti-itch medication. For several months, occurrences of the strange swimmers rash continued to spread to epidemic proportions, but doctors were unable to find a cause.
Finally, during a final Labor Day swim in his own pool, it was Johnson himself who realized the cause of the miserable rash. When urine and 3MD were mixed, thin, clear strands of what Johnson called P-Strings formed and attached to solid objects as they floated through the water. Completely clear and with a diameter thinner than a human hair, the P-Strings were invisible to the naked eye. When P-Strings came up against an inanimate object such as a raft or a pool wall, they simply broke down into harmless components. However, when P-Strings contacted human skin at a temperature greater than 98.8 F, an allergic reaction occurred producing itchy, red welts. Testing showed that only 46% of individuals have a body heat higher than 98.8 F at any given time, explaining why not every individual swimming among the P-Strings reacted in such an unpleasant manner.
Johnson never recovered from the embarrassment of causing millions of people so much pain and discomfort. Refusing to give interviews or answer questions regarding 3MD and P-Strings, Johnson retired to permanent residence within the walls of the Troon Laboratory where he continues to search for a new use for 3MD.
Nathaniel Jetter |
Skip to main content
Read and write spage.
Project description
# os-spage
[ after all.
From v0.4, this libaray support reading from offpage. Offpage is another data storage format, include url, headers and series data. You can use ``read/open_file`` methods with ``page_type="offpage"`` to read from offpage.
# Install
`pip install os-spage`
# Usage
* Write to size-rotate-file
from os_spage import open_file
url = ''
inner_header = {'User-Agent': 'Mozilla/5.0', 'batchID': 'test'}
http_header = {'Content-Type': 'text/html'}
data = b"Hello world!"
f = open_file('file', 'w', roll_size='1G', compress=True)
f.write(url, inner_header=inner_header, http_header=http_header, data=data, flush=True)
* Read from size-rotate-file
from os_spage import open_file
f = open_file('file', 'r')
for record in
* R/W with other file-like object
from io import BytesIO
from os_spage import read, write
s = BytesIO()
write(s, "")
for record in read(s):
# Unit Tests
`$ tox`
# License
MIT licensed.
Project details
Download files
os-spage-0.4.1.tar.gz (9.4 kB) Copy SHA256 hash SHA256 Source None
Supported by
|
The Mask is a symbol of truth. This mask has been an important recognisable asset of AV's street-activism campaign (Cube of Truth) since 2016.
It has been used by Anonymous, as well as by thousands of people around the world in the past 13 years, as a unifying symbol against the forces that still promote discrimination, corruption, injustice and oppression in any form in our society today. Thus, when AV activists bear the mask in a Cube of Truth campaign they are a part of modern History:
By wearing the mask, activists are together with the trillions of animals that are cruelly abused and killed every year by the globalised animal-food industries.
We're voicing the unspeakable.
The interesting question is how did this mask got this status? And who decided that it should be so?
Guy Fawkes
In 1605, almost 400 years before The Iron Lady's rule of the 1980's, catholic Guy Fawkes and his rebellious catholic Gun Powder Plot group was fighting against the protestant monarch James I for the same reasons. This was a time of strong divide between Catholics and Protestants in England where Catholics were often persecuted, beaten, shamed and/or ruthlessly killed in the streets.
Image is Public Domain
Image is Public Domain
Fawkes tried to change this by attempting to blow up the House of Lords and thus assassinate both the protestant king and the ruling Protestant elite of nobles all gathered at the State Opening of Parliament, November 5th.
Unfortunately, Fawkes was discovered hours before detonation of the 36 barreIs of powder he had hidden under the House of Lords, and a couple of months later, he was tortured, dismembered, gutted and killed on public square together with 8 of his peers in the plot.
The failure of Guy Fawkes' and his peers' plans was initially celebrated with sermons, ringing of church bells and it ultimately developed into the creation of the Bonfire Night (still celebrated to this day!) established by King James I every November 5th. Dolls with masks of the villain Fawkes were burned. During following decades and centuries, as this feast grew in popularity all over England, fireworks were added, but the Fawkes masks were always a constant asset, in different forms, shapes and materials.
But during all this time, the Fawkes mask somehow paradoxically kept symbolising the celebration of the survival of a cruel, corrupt government ( as originally established by James I ), and the masked dolls that were burned on bonfires aII over EngIand, the capitulation of an idealistic cathoIic fool.
V for Vendetta
V for Vendetta collectors edition cover, art by David Lloyd
V for Vendetta collectors edition cover, art by David Lloyd
The Fawkes mask has been around for 400 years since the times of King James I of England. But this Fawkes mask, as we know it today, goes back to the beginning of the 1980's when two graphic novelists David Lloyd and Allan Moore decided to create a mask for the fictional freedom-fighter character “V”, inspired by the 17th century catholic renegade Guy Fawkes, for their graphic-novel "V for Vendetta".
The graphic-novel "V for Vendetta" was released in stripes in different publications between 1982-1989, the years in which the ultra-conservative rule of Margaret Thatcher (1979-1990) was in place in England.
These were harsh times for Britain. The Iron Lady (as Thatcher was known) created a tremendous widespread feeling of social injustice mainly among low and middle working-classes, a strong feeling of persecution and constant repression. Under Thatcher, unemployment rates were sky-high, violence in the streets was common due to the desperation felt by a large majority in the population to which her harsh, oppressive, authoritative rule didn't shy away from often responding very aggressively against.
With "V for Vendetta", Lloyd and Moore created a dystopian metaphor of Britain's reality in the 80's setting the story in an Orwellian totalitarian England of a future post-apocalyptic nuclear time, in which their masked character V would use any means available to fight against tyranny and oppression.
"V for Vendetta", quickly became a cult-novel and the mask (as we know it today) became here for many, for the first time, a clear embodiment of the IDEALS of freedom and social justice the British population aspired to.
Anonymous: Cyber Hackers
Later on, in 2006, the last scene of the Hollywood film-adaptation of "V for Vendetta" written for screen by The Wachowkys ("The Matrix Trilogy"), came to inspire the cyber-hacker leaderless group Anonymous in its first worldwide street-action the same year against the Church of Scientology who was pressing YouTube to remove statements that Tom Cruise had made on the religious organisation.
Scene from “V for Vendetta” film, 2005
Scene from “V for Vendetta” film, 2005
For Anonymous, the choice of mask was obvious at the time since a disruptive cyber-meme of the Fawkes mask had already been circulating within the Anonymous' network, the film was in everyone's minds and had already become a part of popular culture at the time, moreover the righteous freedom-fighting character V and his mask were now clearly and unmistakably already understood as symbols of justice, democracy, freedom of speech and freedom of information.
With the financial crisis in 2008/09, the Arab Spring in 2011-12 and the Occupy movements worldwide between 2011-13, the use of the mask became common in protests worldwide and acquired a global impact as a form of progressive, socio-political expression.
Anonymous for the Voiceless
In 2016, when establishing the very first actions of AV in Melbourne, the choice of mask for Paul Bashir and Asal Alamdari seemed obvious since the Guy Fawkes mask represents today a global movement in the XXI century that is in alignment with the values of the organisation they wanted to create: - the mask stands for stamping out oppression, it represents the fight for truth, it is against all sorts of injustice and discrimination, thus against speciesism as well.
Learn More About Anonymous for the Voiceless
All text by João Løbo (AV Chapter: Copenhagen)
For more information, please watch João's Lecture on AV's work and the Guy Fawkes mask: |
Standard cyber protection
Fred Juhlin
Computer networks are constantly under attack. However, only a small number of these attacks are successful. The majority of cyber-attacks are opportunistic, not targeting a specific victim, but just poking and prodding by scanning for open networks/ports; trying easy-to-guess passwords; identifying unpatched network services or sending phishing emails. The attackers don’t want to spend any time or effort on a failed attack, so they will just move along to the next potential victim.
If you think of it as the equivalent of a car thief wandering down a road trying door handles until he finds a car that has been left unlocked, then similarly it is easy to protect yourself from opportunistic attacks by following some standard cyber hardening recommendations – i.e. don’t leave your car door unlocked! Having a router with a firewall built-in, using hard-to-guess passwords on your computer and keeping your OS and software up to date are simple things you can do at home. Other things that hopefully have been drummed into us in the last 10-20 years include: don’t open attachments from unknown senders; install anti-malware; don’t install software from untrusted sites and don’t insert that USB-stick you just happen to find on the street (didn’t your mother ever tell you that don’t know where it’s been?)
But this is the Axis blog, so what about IP-enabled cameras and what are the risks, if any, when you install them? Thankfully, cameras are not subject to the same threats as a PC. A camera doesn’t have users that log in, install software, visit web-pages or open email attachments. However, a camera DOES have services that an attacker may want to use as a platform for other attacks. The explosion of the ‘Internet of Things’ has led to many insufficiently hardened and Internet-exposed devices, including cameras, that are easy targets for hacker groups to ‘enslave’ into botnets.
So, here are a few simple recommendations that will mitigate the risks from opportunistic attackers:
Reduce network exposure
Basically, don’t attach something to the internet unless it really needs to be. And if you do, then understand that making that step requires it to be sufficiently hardened before you hook it up.
The challenge with network cameras is that many people want to be able to remotely access the video. IP-enabled cameras have a web server and video can often be accessed just by using a web browser. It may seem like a good idea to poke a hole in the router/firewall (known as port-forwarding) and use a web browser as the primary video client, but this adds unnecessary risks, so we don’t recommend it.
In the interests of openness, we should note that Axis cameras have historically supported UPnP NAT traversal, a service that simplifies the router port-forwarding configuration process.
However, it isn’t enabled by default and we don’t recommended you enable it. It is a legacy feature that will be removed in future products. There are better and more secure ways to get remote video access. For individuals and small organizations that do not have a VMS (Video Management System), Axis recommends using AXIS Companion client free of charge, which enables secure remote video access without exposing the camera (as a device) to the Internet. For systems that use a VMS we recommended you follow your VMS vendors’ recommendations for remote video access. If your video is streamed to the public, e.g. a web attraction, then we suggest you use a media proxy with a properly configured Internet web server. And if you have multiple remote sites, then you would be best to use a VPN (Virtual Private Network).
Hard-to-guess passwords
As with almost every other internet-enabled device, a password is the camera’s primary protection to prevent unauthorized access to its data and services. There is much debate about definition of what a strong password is. One common recommendation is to use least 8 characters long with a mix of upper/lower letters, numbers and special characters. A brute-force-login-attack is not practical on strong passwords as it would take thousands of years. In a VMS environment, authentication is primarily machine-machine, since users don’t access the cameras directly. Adding login-failure-delay in a VMS environment may increase the risk of locking yourself out. In smaller organizations, clients often connect directly to the camera (human-machine-authentication), so we recommend using hard-to-guess but easy-to-remember passwords. Use long passphrases as passwords such as “this is my camera passphrase”. Yes, space is allowed. But, whatever you do, don’t just use the factory default password.
Firmware and Software patching
Software is made by human beings and human beings are still fallible (for now!). So, new vulnerabilities are regularly discovered, and will continue to do so, even while we do our best to catch them before the software goes live. Most aren’t critical but some may be, so always keep your firmware and software updated and check for new versions at regular intervals. When a critical vulnerability is discovered there is a good chance that someone will exploit it, assuming it is economically viable to do so. If an attacker has access to an unpatched network service it is very likely they will succeed, which is one reason why it is important to reduce those opportunities.
Targeted Attacks
Enterprise and critical infrastructure organizations are subject to not just opportunistic but also targeted attacks. These will use the same low-cost vectors as before, however a targeted attacker has more time, resources and determination as there is more value at stake. In order to determine what security controls should be used to reduce your risks, it is important undertake threat modeling and risk analysis. This is a big topic that I will go into in more detail in a future blog post.
Axis responsibilities
We are continuously working hard to reduce our customers’ risks, including improving our development process and product life-cycle, better security controls, more secure default configurations, enhanced user interfaces and additional guidance such as this blog post. If you want to find out more about how best to harden your IP-enabled cameras, please read this guide to get more recommendations. |
The Reasons For Seasons
How the position of Earth in relation to the sun causes seasons.
By Gail Gibbons Illustrated by Gail Gibbons Read by Chris Lutkin Children’s Fiction / Family Life / Humorous English Age group 3-8 12m Sell Sheet Also available on
Format Release Date List Price Your Price ISBN
1 Video DVD February 16, 2016 $38.99 $38.99 9781682621349 Add to Cart
Why is there winter in the Southern Hemisphere at the same time there is summer in the Northern Hemisphere? Here is an explanation of how the position of Earth in relation to the sun causes seasons, and the wonders that come with each one of them. Summer. Autumn. Winter. Spring comes again. Year after year the seasons repeat themselves.
"Gibbons uses simple words and clear, colorful pictures to explain the seasons, the solstices, and the equinoxes...Brightly colored pictures, as accessible and appealing as those in Gibbons' other books, illustrate the text." - Booklist
"Gibbons seems to know just what teachers need to fill that open niche in their curriculum plans....The text is amplified by her trademark illustrations done in bright, primary colors." - School Library Journal
"This is a visually appealing, straightforward introduction to seasonal activities, and the discussion about why we have different seasons is well suited to the youngest viewers." - School Library Journal (Video Review) |
Probiotics are dietary supplements, like vitamins, minerals and essential oils.
The word probiotic means “for life” as opposed to antibiotic which means “against life”. The WHO defines probiotics as live microorganisms which, when administered in adequate amounts, confer a health benefit on the host.
BioGaia has several patented strains of Lactobacillus reuteri. They are all derived from the human body, and are thus uniquely adapted to reside in humans.
Probiotic Facts
Important criteria for qualifying as a probiotic are thus that the microbes are alive and have proven health effects in clinical trials. Furthermore, a probiotic product must contain the same bacterial strain (or strains) and the same dose that was used in the clinical trials. The most common types of microbes used as probiotics are lactic acid bacteria, like Lactobacillus reuteri, and bifidobacteria.
Use of Probiotics in Digestive Health
Lactobacillus reuteri is well researched and has been shown to help promoting digestive health within the following health conditions. No side-effects or negative effects have been discovered.
Read more..
BioGaia Probiotic Q&A
Biogaia Drops are a probiotic that helps promote a healthy, balanced digestive system when taken daily. Biogaia Drops for babies have demonstrated beneficial effects on common digestive upsets such as diarrhea, constipation, wind and bloating.
Read more.. |
Web Results
the liquid inside a galileo thermometer is NOT WATER. It is KEROSENE. I just broke mine last night. It smelled like kerosene to me. So after I soaked up the fluid with rags, I tossed them into the fireplace to see what would happen. Guess what, they burned like rags soaked in kerosene. Very volatile stuff. I won’t have one in my house again.
A Galileo thermometer (or Galilean thermometer) is a thermometer made of a sealed glass cylinder containing a clear liquid and several glass vessels of varying density.. The individual floats rise or fall in proportion to their respective density and the density of the surrounding liquid as the temperature changes,
So a friend of mine broke my Galileo thermometer recently. The glass tube and the liquid inside were lost, but the bulbs survived. I've cleaned out an old tall glass candle, and tried filling it with water. Even when the water is steaming hot the bulbs still float, so the liquid in there was definitely not water.
The liquid in Galileo thermometers need not be alcoholic or mercuric. Simple water is a sufficient and supple conductor of heat. Nor does food-coloring have to be added to the bubbles for the thermometer to work. Rather, the different colors of the floating bubbles make for easier identification and a more pleasant aesthetic.
There’s no more beautiful way to measure the temperature than using a Galileo thermometer. This fairly accurate instrument is based on the thermoscope invented by Galileo Galilei in the early ...
www.greenearthstores.com/faq/MSDS - Galileo Thermometer.pdf
MATERIAL SAFETY DATA SHEET Galileo Thermometer Page 2 of 3 SECTION 7 HANDLING AND STORAGE Handling Wear appropriate protective clothing and safety gloves. Avoid contact with eyes, skin. Avoid inhalation. Mechanical exhaust required. Keep away from ignition sources, heat and flame. Incompatibilities: strong oxidizing agents and foods.
Galileo Thermometers Named after Galileo Galilei for his discovery of the principle on which this thermometer is based. Galileo thermometers are made of a sealed glass cylinder containing a clear liquid and several glass bulbs of varying mass.
This stylish free standing Galileo thermometer will look great in any position indoors and shows the current temperature. Orange Galileo Thermometer 11x2" $11.27. Buy It Now. Free Shipping. It is a perfect gift to arouse kids interest in science or be a fun and scientific decor. Galileo Thermometer by Kikkerland. |
Tipping Point
26 min. Video Project. 2017. $79. ISBN unavail.
Gr 5–9—Dylan D'Haeze, a 13-year-old filmmaker, tackles the complicated concepts and environmental consequences of climate change in this short, fact-filled video. A variety of climate experts are presented who support the idea that the Earth may not be able to reverse the adverse effects of global warming. Beginning with a clear definition of the problem, the film offers a variety of causes, such as the increase of carbon dioxide and methane. The significance of ocean warming and melting ice caps is also addressed. The complex role of business and profit in environmental degradation is also touched on. The heartfelt suggestions of actions viewers can take to change current attitudes and actions include eating less or no meat and dairy products, advocating the use of renewable energy, and consuming less fossil fuel by walking and biking. Most importantly, young adults are encouraged to contact political entities, both local and national, to press their concerns and to demand action by those in power. However, from the lighting to the camera angles, the production values lack sophistication.
VERDICT The involvement of a teenage student in the development and presentation of this summary of the causes and consequences of climate change makes this accessible to environmental science students.
Be the first reader to comment.
Comment Policy:
• Don't use obscene, profane, or vulgar language.
Kids are using VR to explore worlds and create new ones
Kids are using VR to explore worlds and create new ones
Kids are using VR to explore worlds and create new ones
|
Table of Contents
1 Lecture 2, CPSC 539 Formal Reasoning about Compilers, 4 January 2019
1.1 Intro
1.1.1 Goal is formal reasoning about compilers
1.1.2 A compiler is a translation between languages. Some examples:
• GCC (C -> x86)
• clang (C -> LLVM)
• LLVM (C -> x86)
• Babel between JS versions
• Minifiers
1.2 What is a language? How to model?
• Syntax
• Semantics
• Paradigms: functional/imperative
• Calculi to model into: Lambda Calculus, etc.
• We model a language into the calculus using Sets, Logic
• Type theory?
1.2.1 A language is:
• A collection of expressions (syntax)
• Some operations on those expressions (semantics)
• Shared properties
– Type system gives you static guarantees – The runtime provides dynamic guarantees
• Defined inductively, in our case in BNF form
Example given is a language over the natural numbers and the booleans, with addition, subtraction, and if statements
How is a expression different than a program? Just given a BNF, we can say that 1 + 2 is an expression, but since we don't know what a program is (yet), we can't say it's a program.
1. How do we get from expressions to programs?
What makes a program? It has meaning; it has some evaluation interpretation. So let us define some function, eval: e -> v, from expressions to values. And we can define eval in terms of Denotational or Operational Semantics.
1. Denotational Semantics
Interpret your expressions as math. Set theory, category theory, first order logic, domain theory, etc.
It's just math (set theory), so we can use all the mathematical tools at our disposal, but it also means we have to model everything in that math, which can be a huge lift. So let us say that the denotation of n in e to be the natural numbers, and so we can define operations for the arithmetic operations, which is easy to do, but what about modeling a heap?
2. Operational Semantics
nterpreting the raw symbols on the page. Define a reduction relation rom individual bits of syntax into simpler bits of syntax. e -> e.
n the case of our natural and boolean language, we define relations etween, for instance, +BEGINEXAMPLE f true then e1 else e2 -> "e1" f false then e2 else e2 -> "e2" +ENDEXAMPLE
ote that -> is a relation between expressions. In the if case, we say hat if is a eliminator applied to a boolean value.
ut what about e_1 + e_2?
f we define the natural numbers in Peano-like (0, add1 0, add1 add1 0) ashion, then we can define addition recursively like so:
+BEGINEXAMPLE 0 + e2) -> e2 add 1 e1 + e2) -> e1 + add 1 e2 +ENDEXAMPLE
et us interpret (add1 0) (add1 (add1 0))? We can apply the second ddition rule to get
• (add1 (add1 (add1 0)))
hich reduces to
+BEGINEXAMPLE add1 (add1 (add1 0))) +ENDEXAMPLE
e define a Conversion Relation, e ->* e that uses the reduction elation:
+BEGINEXAMPLE -–— refl ->* e
_1 -> e2 e2 ->* e3 -----------------–— trans _1 ->* e3 +ENDEXAMPLE
iven a nested expression:
+BEGINEXAMPLE f (if true then true else false) then 1 else 2 +ENDEXAMPLE
et's try using the trans rule, but we can't make progress because we nly have two rules given if, and they require values, not xpressions. So we need to define congruence rules:
+BEGINEXAMPLE _1 ->* e1' e2 ->* e2' --------------------–— cong-add _1 + e2 ->* e1' + e2'
->* e' --------------------------------------------–— cong-if f e then e1 else e2 ->* if e' then e1 else e2 +ENDEXAMPLE
e construct a derivation tree for 1 + 2 using trans and the eduction relations for addition
e can define a equivalence relation ==
+BEGINEXAMPLE ->* e'
≡ e'
' ≡ e
≡ e' +ENDEXAMPLE
ow we define a function eval: e -> v
+BEGINEXAMPLE val(e) = v | e ->* v here v :: nat | bool=, +ENDEXAMPLE
2 Lecture 3, CPSC 539 Formal Reasoning about Compilers, 7 January 2019
2.1 Retrospective
• Small Step Semantics
• Induction
• Quick quiz: add pair construction and destruction (first, second) to the language from last lecture
– Syntax – Reduction Rules -> – Conversion Rules ->*
Overview: the language of booleans and natural numbers, with if, addition, and substraction. We want to add pairs. First, syntax: let us define (e_1, e_2) to build pairs, then first e and second e to deconstruct pairs.
Now to define the reduction relation, e -> e'. We have two reduction rules:
first (e_1, e_2) -> e_1
second (e_1, e_2) -> e_2
Now to define congruence rules
e_1 ->* e_1' e_2 ->* e_2'
(e_1, e_2) ->* (e_1', e_2')
e ->* e'
first e ->* first e'
e ->* e'
second e ->* second e'
Lots of discussion about why we need congruence rules. Mostly because we need a way to decend into terms before we can reach those forms that match reduction rules.
2.2 Review of Inductively Defined Judgements
A judgement:
premises p_1 ... p_n hold
judgement j holds
Everything we're talking about in this class is about judgements. We have judgement rules for syntax, reduction, and congruence.
So about syntax:
We have the axiomatic, or "boring" judgement rules, but let's say:
e := e + e is shorthand for
e_1, e_2 \in expr
e_1 + e_2 \in expr
This is important for proofs, let us go back to our defintion of the Natural numbers:
We defined the natural numbers as:
0 ∈ Nat
n ∈ expr
add1 s ∈ Nat
Suppose we want to prove some theorem, if we have an inductive definition, we can do a proof by induction over the (inductive) structure of the definition.
Let us say we are trying to prove some property P over the Nats. First we need to show that P holds for 0, then we need to show that if s ∈ exp, and P holds for s, if we show that P holds for add1 s, then it holds for all Nat.
For those who are familiar with functional programming, foldr can be see as induction on pairs:
Let us define pairs:
nil ∈ Pair
e_2 ∈ Pair
cons e_1 e_2 ∈ Pair
So now:
fold base_case inductive_case over p where p ∈ Pair
2.3 Functions: Lambda
Let us add functions to our language:
e ::= λ x.e | ( e e ) | x
Let's talk about reduction for Lambda:
(λ x.e) e' -> e[e'/x]
Let us define a substitution judgement:
e[e'/x] = e
true[e'/x] = true
false[e'/x] = false
...We define this judgement inductively...
x[e'/x] = e'
x_1 != x_2
x_1[e'/x_2] = x_1
(λ x.x) 1 = x[1/x] = 1
(λ x.λ y.x) 1 -> (λ y.x)[1/x] -> ...
this is not defined so far …
Let us defined:
e[e'/x_2] = e_2
(λ x_1.e)[e'/x_2] = λ x_1.e_2
Now we can continue our previous example to
(λ y.x)[1/x] -> λ y.1
Final example:
(λ x.λ y.x) y -> (λ y.x)[y/x] -> λ y.y
Oops. Here we have dynamic scope.
So our initial substitution rules need to be defined to be capture avoiding:
e[x_3/x_1] = e_3[e'/x_2] = e_3', x_1 != x_2, x_3 is fresh
(λ x_1.e)[e'/x_2] = λ x_3.e_3'
3 Lecture 4, CPSC 539 Formal Reasoning about Compilers, 9 January 2019
3.1 Overview
• Language over the booleans and the natural numbers
• Formalizing Lambda: functions, application, variables, substitution, capture avoiding subst
• Reduction rules for substitution
• We use capture avoiding substitution by convention (especially in the literature)
3.2 Moving On
Let us add variables/references to our language.
e ::= | x := e | deref x
But we don't have a way to represent that memory yet, because our reduction relation is only defined over expressions; We need to augment our model:
M(emory), e -> M, e
Inductively defined:
M ::= · | M, [ x |-> e ]
So now our previous reduction rules (that have no memory effects, need to refer to this M, but their reductions just pass it through.
(M, x := e) -> (M[x |-> e], e)
[x |-> e] ∈ M
(M, deref x) -> (M, e)
But we're still missing sequencing; or else how could we set a value, then read one?
e ::= ... | e ; e
(M, e_1) -> (M', e_1')
(M, e_1 ; e_2) -> (M', e_1'; e_2)
(M, v; e_2) -> (M, e_2)
So how does this affect our conversion rules?
First they are now of the form
(M, e) ->* (M, e)
As before:
Structural rules (two):
(M, e) -> (M', e') (M', e') ->* (M'', e'')
(M, e) ->* (M'', e'')
(M, e_1) -> (M', e_1') (M', e_2') ->* (M'', e_2')
(M, e_1 + e_2) ->* (M'', e_1' + e_2')
Note that we've enforced an Memory evaluation order here. But not! See that perhaps we can apply the reflexivity rule to e_1, then e_2 would go first to the memory.
(M, e_1) ->* (M', e_1) (M', e_2) ->* (M'', e_2')
(M, e_1; e_2) ->* (M'', e_1'; e_2')
But this is problematic as before; we could use the reflexivity rule here for e_1 and e_2 would modify Memory first.
So one approach here would be to enforce a precedence ordering, Left-to-Right, for example.
Now on to a evaluation relation:
eval(e) = v
(<empty>, e) ->* (M', v)
eval(e) = v
But we still have the issue of nondeterministic evaluation.
Remember, we want a language to have three things:
• Syntax
• Semantics
• Shared Properties
Our language has all sorts of undefined behavior. Eval is a partial function.
Maybe we could use…types?
Let us add a judgement that rules out programs we don't want to include in our language, and one way to do that would be to use a type system.
3.2.1 Type Systems
Γ = · | Γ,x
Let's add a judgement:
[ Γ |- e ]
x ∈ Γ
Γ ⊢ x
----------- nat
Γ ⊢ n
----------- bool
Γ ⊢ b
Γ, x ⊢ e
Γ ⊢ λ x.e
Let us add a precondition for eval:
Γ |- e:A e ->* v
eval(e) = v
To make our system richer, we need to add types so our judgements yield more information:
Let us define types:
A, B := Nat | Bool | A -> B
(A & B are metavariables for the same set)
We extend our type judgements:
[ Γ ⊢ e: A ]
x: A ∈ Γ
Γ ⊢ x: A
(similar for Nat and Bool)
for functions:
Γ x:A ⊢ e: B
Γ ⊢ λ x: A.e : A -> B
Γ ⊢ e_1: A -> B Γ ⊢ e_2: A
Γ ⊢ e_1 e_2
Γ ⊢ e_1: Nat Γ ⊢ e_2: Nat
Γ ⊢ e_1 + e_2: Nat
But we are faced with an issue: there are some programs that won't work:
eval((λ x.x) 0) = ???
Note that this won't work we can't statically find out a type for x.
So we need to write a bunch of specialized typed identity functions for each type. Rude.
Let's see what happens when we don't require annotations. Let's try to build a derivation tree for:
x: Nat ⊢ x: Nat
⊢ λ x.x: ? -> ? ⊢ 0: Nat
|- (λ x.x) 0
The unification process by which we "infer" the types of functions can become undecidable (or just computationally very expensive) as our language grows richer.
Since we want to talk about compilers, we want decidable type systems, the annotations need to stay.
We want a Theorem:
· ⊢ e: A implies eval(e) = v
That means all programs are defined, and that they terminate. But for the most part, we can't get that. Instead we can probably get:
· ⊢ e: A => eval(e) = v
or eval(e) = Ω (non-termination)
or eval(e) = Error
And this would be type safety.
4 Lecture 5, CPSC 539 Formal Reasoning about Compilers, 11 January 2019
4.1 Overview
• Assignment Details
4.2 Back to Type Safety
Type safety theorem from last time:
· |- e : A => eval(e) = v
This is super strong, usually we'd include non-termination (divergence) or errors.
| eval(e) = Ω (non-termination)
| eval(e) = Error
How do we prove this?
How do we prove, for instance, that 1 + 1 = 2? We build a derivation tree that proves the fact using the axioms we've defined.
These are built using only implication.
P => Q P
So how do we prove type safety, that ∀ e ∈ expr: eval(e) = v?
For this we need induction, defined:
Let J be some inductively defined judgement, defined by rules R_0 ... R_n
To prove that some property P holds for P(J), it suffices to prove the
following, we need n cases, one for every rule:
0. If P(subderivations of R_0) then P(R_0)
n. If P(subderivations of R_n) then P(R_n)
Let us show that ∀ n: Nat, m: Nat: eval(n + m) = eval(m + n)
By induction on n ∈ Nat:
Case 0: P holds for
eval(0 + m) = eval(n + 0)
We know that 0 + m -> m
But we need to show that eval(m + 0) = m. We'd have to prove a lemma
via induction to prove this fact.
Case 1: We are operating over the second rule for e \in Nat (the
inductive one):
n = (add1 n')
n': Nat
(add 1 n'): Nat
If \forall m: eval(n' + m) = eval(m + n') then
eval((add1 n') + m)) = eval (m + (add1 n'))
Let us step from:
eval((add 1 n') + m) -> eval(n' + (add 1 m))
Instantiate induction hypothesis with (add 1 n') for m:
eval(n' + (add1 m)) = eval((add 1 m) + n')
So now that we have eval((add 1 m) + n')
We reduce again, and we have
eval(m + (add1 n'))
Notes that this is slightly tedious and not particularly enlightening.
Oh, good point, that proof is flawed because eval is defined as a relation between expr and values:
We need an equivalence relation between expressions:
e ≡ e'
e ->* e'' e' ->* e''
e ≡ e'
Now that we have equivalence defined, we can clean up the above proof.
So for a type safety proof:
Thm: If · ⊢ e : A => eval(e) = v
Note we have all these typing rules for all the proofs in the language, so we'll have cases for all the typing rules in our language:
Let's do the natural number case:
Prove that eval(n) = v.
If · ⊢ n: Nat => eval(n) = v.
1st, appeal to the definition of eval:
n ->* v
eval(n) = v
We have conversion rules for n. And thus we can show that n ->* n.
Now for the if case:
If P holds for the subderivations of if (of which there are 3):
if 1) · ⊢ e: Bool implies eval(e) = v and
2) · ⊢ e_1: B implies eval(e_1) = v_1 and
3) · ⊢ e_2: B implies eval(e_2) = v_2 then
if · ⊢ if e then e_1 else e_2: B => eval(if e then e_1 else e_2) = v'
We need a lemma that appeals to canonical forms, namely, that
e: Bool, so eval(e) = true | false
Let us expand our eval, but based on cases, we now have two derivation trees:
In each of our derivation trees, we have to show that e ->* v', using
reduction for if, we get e_1 or e_2 depending on case, but by
reduction and conversion rules we can then appeal to the induction
hypotheses and show that e ->* v', which satisifies eval(e) = v'.
Sorry that was sloppy.
4.3 Getting type safety in "untyped" languages
Instead of forbidding eval on some programs with a type system, just add more reductions so eval is more defined:
[ e -> e]
true + false -> Error("Cannnot add booleans")
(add1 n) e -> Error("Cannot apply a number as a function")
Takeaway: there are no real untyped languages, there are some dynamically-checked languages. And really, even "statically" typed languages often have some runtime errors.
5 Lecture 6, CPSC 539 Formal Reasoning about Compilers, 14 January 2019
5.1 Review
• HW Questions
• Recap last lecture
5.2 Type Safety
e.g. for If
⊢ e:Bool ⊢ e_1:B ⊢ e_2:B
⊢ if e then e_1 else e_2:B
It must be the case that if some expression e meets the type judgement, then ∃ v.eval(e) = v
e.g. for Lambda:
x:A ⊢ e:B
⊢ λx:A.e:A -> B
But when faced with
∃ v.eval(λ x:A.e) = v
We get stuck because we can't reduce a function straightaway. And now we have to make a distinction between observable values and irreducible expressions.
v ::= n | b
i ::= v | λ x:A.e
So we need to strengthen our type safety theorem to include a premise based on the notion of irreducible expressinos.
So now we need Progress and Preservation lemmas.
Γ ⊢ e:A then either e is a value (irreducible expression) or
e -> e'
Γ ⊢ e:A and e -> e' then Γ ⊢ e': A
So with these lemmas we can proceed:
Thm(Type Safety):
· ⊢ e:A => eval(e) = v
Proof: Since e:A, then either e is irreducible or e -> e'
(By Progress)
e = i
But we get stuck. So we need to redefine our Theorem to only operate
over a set of expressions that we consider well-typed, and that produced
valid top-level observations.
Relation =⊢ e=
⊢ e: Nat
⊢ e
⊢ e: Bool
⊢ e
This judgement excludes functions from our Type Safety proof, which now reads:
⊢ e => eval(e) v
Back to our previous part of the proof:
If e = i, then by canonical form eval(e) = v
either e = n
or e = b.
Then e ->* e, and so eval(e) = e.
Otherwise e -> e'
We must show eval(e) = v.
By Preservation, we know that e' is well-typed.
By Progress, either e' = v or e' -> e'' (and may do so forever)
So our theorem now reads:
⊢ e => eval(e) = v | eval(e) = Ω
Note that if we have a Lemma for Strong Normalization, we know that all well typed e ->* i.
Now we need to prove Progress and Preservation
5.3 Progress
⊢ e:A => e = i | e -> e'
Proof by induction Γ ⊢ e:A
By Cases on the inversion of Γ ⊢ e:A:
Case Var (oh, we need to add vars to the list of irreducibles)
Proved by definition.
Case Bool:
⊢ b: Bool
Proved by definition.
Case Add:
· ⊢ e_1:Nat · ⊢ e_2:Nat
· ⊢ e_1 + e_2:Nat
If we had conversion instead of reduction, the inductive proof would be trivial (which is easy, but usually in a bad way), but we don't want that because conversion contains rules where we don't actually progress. So we need to split apart the congruence rules from the reflexivity and transitivity rules.
So in our conversion relation, we retain reflexivity and transitivity.
In our "compatible" or "congruence" closure, our new ->
Contains the rest of the congruence rules. PLUS
e reduces to e'
e -> e'
So this relation now only has judgements where progress happens.
The reduction relation gets a new symbol because we stole the arrow.
So with these new relations, we can prove the case for Add appealing to inversion on terms e_1 + e_2, albeit with two cases:
Case 1: e_1 is irreducible, it steps to i + e_2'
Case 2: e_1 and e_2 both step to some e_1' and e_2', by inductive
e_1 + e_2 -> e_1' + e_2'
Case Lambda:
x:A \vdash e:B
\vdash \lambda x:A.e: A -> B
Lambdas are irred, so true by definition.
Case App:
\vdash e_1:A -> B \vdash e_2:A
\vdash e_1 e_2: B
a) e_1 is irreducible or
b) e_1 -> e_1
Case 1: e_1 = \lambda x:A.e
a) e_2 is irreducible
b) e_2 -> e_2'
Case a:
(\lambda x:A.e) e_2 -> e[e_2/x]
Case b:
(\lambda x:A.e) e_2 -> (\lambda x:A.e) e_2'
Case 2:
e_1 e_2 -> e_1' e_2
6 Lecture 7, CPSC 539 Formal Reasoning about Compilers, 16 January 2019
6.1 Review
• Today is add/drop deadline
6.2 Discussing Properties of Programs
• Monads: monads allow us to re-order monadic operations according to the monadic laws, like associativity, etc.
• Things like the Java Interface. If e1 and e2 implement the same Interface, then we shouldn't be able to tell them apart.
• Private fields
Note that all these things are judgements over programs. But how to reason about them?
6.2.1 Introducing Logical Relations
\box e P hold
e P hold
What we would like to say is that if e is well typed, then e P holds, this is the
Fundamental Property Lemma: γ \vdash e:A => e P holds
We can talk about Lemmas where if e P hold => some desired Property holds
We an also talk about a equivalence relation where e =~ e:A
But we will use a proof of Strong Normalization to illustrate this concept.
\box e SN(A)
Lem: γ \vdash e:A => e SN(A) Lem: e SN(A) then e ->* i where i is irreducible
Note that with γ, we're dealing with open terms, where they may be free variables. This is opposed to last week, where type safety was defined over expressions that are well-typed over the empty environment.
We wish to talk about program components, so we need to add gamma back:
\box Γ \vbox e
Note that we have components here, not just whole programs
Let's talk about linking. We define this by substitution, syntactically:
γ ::= <empty> | γ[x |-> e]
\box γ(e) = e'
<empty>(e) = e
γ(e2[e1/x]) = e'
gamma[x |-> e1](e2) = e'
But we have types, right? So
\box Γ \vdash γ
<empty> \vbox <empty>
Γ \vdash γ <empty> \vdash e:A
Γ, x:A \vdash γ[x |-> e]
Lemma: if Γ \vdash e and Γ \vdash γ => \vdash γ(e)
Basically, that well-typedness is closed over linking
6.2.2 How to Formalize Logical Relations
First we define them over closed terms:
\box e SN(A)
Where A is a syntactic type. We consider each kind of type in the language.
Next, we define the relation in multiple parts. For a language, we need relations for each form in the language.
\box i SN(A)
What does it mean for a value to have this relation at type A?
Note that we have three types in our language: Bools, Nats, and \lambdas.
b SN(Bool)
n SN(Nat)
For both bools and nats, we need no preconditions.
But how do we define this for lambda?
∀ e' SN(A').e[e'/x] ->* i i SN(B)
λ x:A'.e SN(A' -> B)
Back to our expression relation:
e ->* i i SN(A)
e SN(A)
But now we can rewrite our λ value relation:
∀ e' SN(A').e[e'/x] SN(B)
So far, we've defined the things we need to prove to show strong normalization for closed terms. But what about open terms?
Let us say we have an open term:
Γ \vdash e:A
How do we claim that e SN(A)?
Let us say we had a well-typed closing substitution?
Γ \vdash e:A and Γ \vdash γ => γ(e) SN(A)
But how do we know if the linking substitution is part of the logical relation SN?
\vbox γ SN(Γ)
<empty> SN(∅)
γ SN(Γ) e SN(A)
γ[x |-> e] SN(Γ, x:A)
Now we can rewrite our fundamental property:
Γ \vdash e:A and Γ \vdash γ and γ SN(Γ) => γ(e) SN(A)
We will prove this over Γ \vdash e:A
This Lemma is sufficient to prove Strong Normalization:
Thm(Strong Normalization) <empty> \vdash then e ->* i
7 Lecture 8, CPSC 539 Formal Reasoning about Compilers, 18 January 2019
7.1 What is a language
Collection of expressions: syntax, BNF grammars (judgements)
Operations on these expressions: Reduction, Congruence, and Conversion, relations, which gives us an Evaluation function
Shared Properties, like Type Safety
We've spent the previous time talking about the Simply Typed Lambda Calculus
7.2 But what do we want, really? What is a COMPILER?
A translation between languages. What is a language? See above.
We usually think about compilers between nice languages and into languages just above bits (assembly).
What do we think about when we say assembly?
• Registers
• Instructions
• Accumulator
• Jumps
So how do we start formalizing our assembly language?
7.2.1 The Syntax of Assembly
• Integers (32-bit int) i |[ i1 + i2 ]|
(We place "well known" operations inside semantic double brackets)
• Registers r
• Addresses a
• Labels l
• Instructions I ::= mov d, s | add1 d | sub1 d | jump l
• Destinations d ::= r | a | [ a + i ]
• Source s ::= i | r | a | [ a + i ]
• Sequencing S ::= I; S | ret
• Blocks B ::= l : S
• Program P ::= B | P; B
So we want an eval(P) = w (word size value)
Let's write a simple program:
main: move r1, 0; add1 r1; ret;
Convention 1: start with first instruction of main:
\box eval(P) = w
P = B; …; main: S; B…
eval(P) = w
So let's think about the first instruction "move r1, 0". It will put 0 in register 1 and move to the next instruction:
So our reduction should be from
\box (R, S) ->> (R, S)
Now we need to add some things to our syntax:
R ::= ⋅ | R[ r |-> w ] w ::= i | o | l
Let's define a reduction for mov:
(R, (mov r1 i); S) ->> (R[ r |-> i ], S)
[ r |-> w ] ∈ R
(R, (add1 r); S) ->> (R [ r |-> |[ w + 1 ]|], S)
Note that the semantic brackets mean we know how to do the addition already.
What do we do in the end?
Convention 2: The final answer is the value of r1 when ret is reached.
Let's modify our judgement for eval:
(⋅, S) -> (R, ret) [ r1 |-> w ] ∈ R
eval(P) = w
Let's see another example:
main: mov a1, 0; mov r1, a1; add1 r1; ret
So! We have a memory now: let's add to the syntax:
H ::= ⋅ | H [ a |-> w ]
And our reduction relation now reads:
\vbox (R, H, S) ->> (R, H, S)
And now, a reduction relation for mov:
(R, H, (mov a, i); S) ->> (R, H [ a |-> i ], S)
…similarly for the move from memory TO a register…
And now, another program:
l: add1 r1; ret;
main: mov r1 0; jmp l
How do we find label l when we jump to it? We may need to keep track of the whole program. Let's update our reduction relation:
\box (R, H, P, S) ->> (R, H, P, S)
P = B0; … l: S'; Bn
(R, H, P, (jmp l); S) ->> (R, H, P, S')
So, now we have an assembly language! But how do we get from the simply typed lambda calculus to ourAsm?
In our source language, we have first class functions, but we don't have this in our target language.
Let's look at function application. We can imagine:
λ x.e e'
What would that look like? Would we need a label for e'. But this leads us to a bigger issue: we have a compositional syntax in our STLC, but in order to figure out "where to go next", we need continuation passing style. This will be our first compiler pass.
STLC -(continuation passing style, making returns/control flow explicit)-> CPS IR -(closure conversion, make free variables explicit)-> C-like IR -(heap allocation)-> Heap Alloc IR -(code generation, registers explicit, etc.)-> ASM
8 Lecture 9, CPSC 539 Formal Reasoning about Compilers, 21 January 2019
We're finally talking about compilers!
8.0.1 Coming up: a fast overview of compilation passes
1. STLC
2. STLC with explicit jumps (via CPS translation)
For example:
λ x.x (1 + 1) -> λ x.x 2 -> x[2/x] = 2
Compiles to:
l: ret; main: mov r1 1; add1 r1; jump l
How do we abstract this?
We can say that main is in some way: do 1 + 1; jump l
So this is where we would like to get to today.
What's going on here?
(1 + 1) ->* 2
(λ x.x) (1 + 1) ->* ?
We would like to compile this to:
do (1 + 1); jump
Let's label the lambda term, "k"
do (1 + 1); jump
k:(λ x.x) (1 + 1) ->* ?
Let's create a continuation:
(λ k.(let x=1 + 1 in (k x))) (λ x.x)
Let's say we wanted to continue the computation, with "+ 2". Let's create a new continuation:
λ k2.(λ k.(let x=1 + 1 in (k x)) (λ x.(k2 x))) (λ x.x+2)
How do we define CPS translation?
\box |[ e ]| = e
[ v ] = (λ k.k) [ v ]
How do we translate values?
\box |[ v ]| = v
[ n ] = n
[ b ] = b
[ λ x.e ] = λ x. [ e ]
Let's go back to \box |[ e ]| = e:
[ e1 + e2 ] = λ k. [ e1 ] λ x. [ e2 ] λ y.(let z=x + y in k z)
[ e1 e2 ] = λ k. [ e1 ] (λ f. [ e2 ] (λ x.f x k)
What does eval look like in the RHS of relation \box |[ e ]| = e
\box eval(e) = o
e (λ x.x) ->* o
eval(e) = o
Let's call the identity the halt continuation, or the return continuation.
What's in the syntax of our language?
v ::= x | b | n | λ x.e e ::= v1 v2 | let x = v1 + v2 in v3 x
\box e -> e
(λ x.e) v -> e[v/x]
let x=v1 + v2 in v3 x -> v3 (v1 + v2)
Let's go back to translating \box |[ e ]| = e for if expressions
[ if e1 then e2 else e2 ] = λ k. [ e1 ] (λ x.if x then [ e2 ] k else [ e3 ] k)
How would we do a proof of program correctness for this compiler?
Thm. Whole Program Correctness: If eval(e) = o then eval(|[ e ]|) = |[ o ]|
Remember though, we want to consider linking:
Thm. Partial Program Correctness: If Γ \vdash e, Γ \vdash γ, eval(γ(e)) = o then eval(|[ γ ]|(|[ e ]|) = |[ o ]|
Author: William J. Bowman
Created: 2019-02-11 Mon 11:49 |
Idea Exchange: 9/25-9/29
Monday, 9/25:
Solutions for navigating an ever-changing social media world
Today’s students face a challenging paradox: the digital tools they need to complete their work are often the source of their biggest distractions. Students can quickly become overwhelmed trying to manage the daily confluence of online interactions with schoolwork, extracurricular activities, and family life. Written by noted author and educator Ana Homayoun, Social Media Wellness is the first book to successfully decode the new language of social media for parents and educators and provide pragmatic solutions to help students.
Today is: Great Foods-World Pasta-Comic Books
Clever Uses for Pencil Erasers:
1. Remove sticker gunk-an eraser works as a mild abrasive to get residue off glass and metal surfaces.
2. Secure your earrings-if you need a quick fix wheb you lose an earring back, break the eraser off a pencil and poke the post through it.
3. Polish silver-rub a pencil eraser on dull silver jewelry. The rubber particles will absorb oil and residue, leaving your accessories as shiny as ever.
4. Extend battery life. Lightly brush the contact points of a dying battery with an eraser to remove the nickel or iron oxides that build up and cause a drop-in voltage.
5. Spruce up suede. Gently run an eraser over suede shoes or clothing to remove minor stains and marks.
Windowsill Herb Gardens
Greek Oregano is a perennial that can be taken from an established plant. Just separate off a chunk and pot it up. Or you can start from seed, however it may take a few months to reach a harvestible size.
Basil is an annual so it’s best to start new plants from seed.
Thyme (caraway, lemon, narrow-leaved French and English garden types) are perennials and can be divided from the parent plant.
Parsley is a biennial plant, which means it goes to seed in the second season. New plants can be started from seed but if you’re potting up an existing plant, use a deep container to avoid injuring the tap root.
Sage is a perennial and can be grown from a softwood cutting or by division. Try a tri-colored or golden sage plant for a more decorative look. The flavor is not as pronounced but they grow better indoors.
Rosemary is a tender perennial. You can take cuttings from an established plant. Rosemary can be fussy as it needs bright light, a cool location, lots or air circulation and frequent misting. The extra pampering is worth it.
Cilantro is best started from seed but it grows fast. Use it before it flowers for best flavor.
Tuesday, 9/26:
Wednesday, 9/27:
10:30-11AM: FALL GARDEN DOCTOR PROGRAM with Dick Zondag of Jung’s Garden Center
Thursday, 9/28:
Friday, 9/29: |
Dispersal range
"Dispersal range" refers to the distance a species can move from an existing population or the parent organism. An ecosystem depends critically on the ability of individuals and populations to disperse from one habitat patch to another. Therefore, biological dispersal is critical to the stability of ecosystems. [edit]Environmental constraints Few species are ever evenly or randomly distributed within or across landscapes. In general, species significantly vary across the landscape in association with environmental features that influence their reproductive success and population persistence.[12][13] Spatial patterns in environmental features (e.g. resources) permit individuals to escape unfavorable conditions and seek out new locations.[14] This allows the organism to "test" new environments for their suitability, provided they are within animal's geographic range. In addition, the ability of a species to disperse over a gradually changing environment could enable a population to survive extreme conditions. (i.e. climate change). [edit]Dispersal barriers A dispersal barrier may mean that the dispersal range of a species is much smaller than the species distribution. An artificial example is habitat fragmentation due to human land use. Natural barriers to dispersal that limit species distribution include mountain ranges and rivers. An example is the separation of the ranges of the two species of chimpanzee by the Congo River. On the other hand, human activities may also expand the dispersal range of species by providing new dispersal methods (e.g., ships). [edit]Dispersal mechanisms Most animals are capable of locomotion and the basic mechanism of dispersal is movement from one place to another. Locomotion allows the organism to "test" new environments for their suitability, provided they are within the animal's range. Movements are usually guided by inherited behaviors. The formation of barriers to dispersal or gene flow between adjacent areas can isolate populations on either side of the emerging divide. The geographic separation and subsequent genetic isolation of portions of an ancestral population can result in speciation. [edit]Plant dispersal mechanisms Burs are an example of a seed dispersion mechanism which uses a biotic vector, in this case animals with fur. Main article: Seed dispersal Seed dispersal is the movement or transport of seeds away from the parent plant. Plants have limited mobility and consequently rely upon a variety of dispersal vectors to transport their propagules, including both abiotic and biotic vectors. Seeds can be dispersed away from the parent plant individually or collectively, as well as dispersed in both space and time. The patterns of seed dispersal are determined in large part by the dispersal mechanism and this has important implications for the demographic and genetic structure of plant populations, as well as migration patterns and species interactions. There are five main modes of seed dispersal: gravity, wind, ballistic, water and by animals. |
Dynamical systems
From Scholarpedia
James Meiss (2007), Scholarpedia, 2(2):1629. doi:10.4249/scholarpedia.1629 revision #9087 [link to/cite this article]
This revision has been approved but is not the latest approved revision
Revision as of 02:14, 21 February 2007 by James Meiss (Talk | contribs)
Jump to: navigation, search
Post-publication activity
Curator: James Meiss
A dynamical system consists of an abstract phase space or state space, whose coordinates describe the state at any instant; and a dynamical rule that specifies the immediate future of all state variables, given only the present values of those same state variables. For example the state of a pendulum is its angle and angular velocity, and the evolution rule is Newton's equation \(F = ma\).
A dynamical system can have discrete or continuous time. A deterministic system with discrete time is defined by a map, \[ x_1 = f(x_0) , \] that gives the state \(x_1 \) resulting from the initial state \(x_0 \) at the next time value. A deterministic system with continuous time is defined by a flow, \[ x(t) = \varphi_t(x(0)), \] that gives the state at time \(t\), given that the state was \(x(0)\) at time 0. A smooth flow can be differentiated with respect to time to give a differential equation, \(dx/dt = X(x)\). The function \(X(x)\) is called a vector field, it gives a vector pointing in the direction of the velocity at every point in phase space.
A dynamical system is a state space \(S\), a set of times \(T\) and a rule \(R\) for evolution, \(R: S \times T \rightarrow S\) that gives the consequent(s) to a state \(s \in S\). A dynamical system can be considered to be a model describing the temporal evolution of a system.
State Space
Dynamical systems first appeared when Newton introduced the concept of ordinary differential equations (ODEs) into Mechanics. In this case, \(T = \mathbb{R}\). However, Henri Poincaré
Figure 1: Henri Poincaré, the father of dynamical systems
Evolution Rule
The evolution rule provides a prediction of the next state or states that follow from the current state space value. An evolution rule is deterministic if each state has a unique consequent, and is stochastic if there is more than one possible consequent for a given state.
A deterministic evolution rule with discrete time, and a continuous state space is called a map, \[f: S \rightarrow S\]. The evolution is defined by iteration \(s_{t+1} = f(s_t )\). A map can be one-to-one (invertible) or not. Invertible maps can be continuous with continuous inverses (homeomorphism) or be smooth and smoothly invertible (diffeomorphism).
A simple example is the Logistic map of population dynamics. Here the state space is \(\mathbb{R}^+\), the nonnegative reals, representing a continuous approximation to a population size. The map is
<math logistic>
f(x) = rx\left( 1 - \frac{x}{K}\right) </math> where \(r\) is the growth rate per individual and \(K\) is the carrying capacity. The map (<ref>logistic</ref>) is not invertible since most states in the interval \([0,K]\) have two preimages.
A flow is a deterministic dynamical system on a manifold, \(M\) that is continuously differentiable with respect to time. It is defined by a function \[\varphi : R\times M \to M\], so that the orbit is given by
<math flow>
x(t) = \varphi_t(x(0)) </math> Flows obey the properties
Iterated Function System
A stochastic evolution with discrete time but continuous phase space is an iterated function system. In this case there is a collection of functions \(f_\alpha\) indexed by parameters \(\alpha\). The evolution is random with the next state \(s_{t+1} = f_\alpha (s_t )\) where \(\alpha\) is selected from a probability distribution.
Cellular Automata
A dynamical system with a deterministic rule, discrete time and discrete state space is a cellular automata. An example is the game of life, where the state space consists of a lattice with binary values, say \([0,1]\). The evolution rule takes a given state and either flips a given lattice value or not according to the values of lattice points in a neighborhood.
See Also
Attractors, Bifurcation, Chaos, Difference Equations, Equilibrium, Fixed Point, Map, Ordinary Differential Equations, Partial Differential Equations, Periodic Orbit, Phase Space, Phase Portrait, Relaxation Oscillator, Stability, Topological Dynamics, Vector Field
Personal tools
Focal areas |
Skip to content
Teaching Heritage
Board of Studies NSW
Dept House Banner
Contact Print this page Reduce font size Increase font size
Section markerTranscripts
Italian internment in Australia during World War II
Kevin, C. A History of Italian Settlement in New South Wales
During World War 1, many Italians living in Australia served in the Italian or Australian armies, a number with distinction. Dr Tommaso Fiaschi, for example, earned official recognition for his service at the Australian field hospital during the Boer War and then went on to fight with both the Italian and Australian armies during World War I. These international conflicts did not impact on the status of Italians in Australia. The Second World War however, did this dramatically. The influx of Italians in the 1920s combined with the rise of Fascism in Italy provoked discussion of Italian immigration in the various Australian parliaments. Italian immigration was construed in a negative light and unemployment figures were drawn on to bemoan the rising number of Italians in Australia.
In the same period Mussolini was clear in his insistence that Italian emigrants, naturalised Australians or not, were to remain Italians. Shortly after his rise to power, the Italian Department of Emigration was supplanted by a new service within the Foreign Office. Consuls were told to ensure that Mussolini's policy was achieved and Vice-Consuls were put in place to disseminate knowledge of Fascism among Italian immigrants in Australia. Italians in Australia were to become an asset to Mussolini's political ventures. Social clubs and celebrations reifying Fascist ideals were strongly supported by Italian authorities in Australia. Some of the centres of Fascist activity in Sydney have already been discussed. Only those immigrants stationed far from towns and city centres managed to miss the effect of developing Fascism, and only those without dependents and family in Italy could afford to be openly anti-fascist, though many others took this risk.
When news of the declaration of war reached Australia on June 11 1940, most Italians had been forewarned that Italy would enter on the side of Germany, which meant that their status in Australia was liable to be jeopardised in new ways. Many were not surprised when Australian police and security officers came to arrest Italian men. The methods of identification, arrest and internment had been formulated in August 1939 just prior to the passing of the corresponding legislation. Internment was carried out on a large scale. In most areas Italian blood was considered reason enough for arrest, regardless of one's political persuasion. Even naturalised British subjects were arrested. In 1942 the number of Italians interned in Australia reached a wartime high of 3 651. But thereafter as the danger of Japanese invasion subsided, they were gradually released, and by September 1944, only 135 hard core fascists remained in the internment camps.
Political alliances and conflict among internees became a prominent part of camp life. Between 1940 and 1943, increasing manifestations of Fascist and Nazi sympathies were reported by security officers at the camps. The Australian Minister for Information carried out an inquiry which alleged that 'the influence exercised by camp leaders and their supporters over other internees operat(ed) to cause many internees of no firm political belief to continue their adherence to our enemies. And that 'the camp leaders had not shrunk even from the use of physical violence if that be necessary to maintain their dominance. At the internment camp at Hay, evidence of threats and intimidation meted out to anti-Fascists by Fascist internees lead to the separation of the two political factions by the building of a barbed wire fence across the camp. In 1942 Jewish internees were also separated from the openly Fascist prisoners.
Secondary reports repeatedly suggest that the treatment of internees was reasonable and that life in the interment camps was not physically gruelling. In his autobiography, Claudio Alcorso remembers the shock not only of being arrested at his textile factory, in spite of his expressions of support for the Australian forces and his offer to serve in the airforce. He also recalls the physical conditions at Long Bay Gaol and then at the Orange Showground where he spent a couple of very cold months before being transported to the more favourable environs of the Hay camp. He describes the latter's physical character in the following way:
The camp had just been built and was completely bare;
whatever grasses or shrubs might have been present
were destroyed during construction. There was only
beige clay, light-coloured timber huts with silvery
corrugated-iron roofs, a wide ring of grey barbed
wire and a blue immense sky. It was adequate and
functional… It was designed to house 2000 people;
the huts were arranged in concentric circles, 30 people
to a hut sleeping in tiered bunks.
At camps across Australia there was generally an infirmary and a canteen, a school hut and workshop, a devotional hut and a library. Menus had been fixed by common agreement between the authorities and the Italians, and relations between the prisoners and Australian troops in charge were cordial. At the Hay camp a healthy water supply from the Murrumbidgee meant that internees were able to establish their own-vegetable gardens in the spaces between the huts. Much of Alcorso's time at Hay was spent strolling in discussion with other interned men, playing cards and tending his garden. There is no mention of work until he was transferred to the Loveday camp in South Australia.
From the Liverpool internment and POW camp prisoners were transported daily by military trucks to and from the prison to perform agricultural work in the outlying areas. At Hay occupations included shaping bricks in the brickworks, building bridges and tending vegetable gardens. In the Cowra internment and POW camp there was a vineyard, olive groves and orchards, the tending of which constituted much of the work done by prisoners.
Many of those interned were forced to leave their wives and families to fend for themselves in a hostile Australia at war with their homeland. Maria Paoloni was compelled to abandon the family business in Balmain when her husband Gino was interned and vandalism and abuse from locals compounded the difficulties of combining motherhood and breadwinning as a single parent. Business had dropped off significantly and amidst violent racism Maria feared for her children. She was forced to travel in search of work and a place to stay, eventually finding both on a farm at the edge of the city. Maria worked hard for very little and only by soliciting the help of Catholic authorities was she able to speed up the release of her husband which brought economic and emotional relief. There are many families who had to negotiate the difficulties of wartime Australia outside of the prison camp whose stories are yet to be documented.
The second largest group of Italians to be held in captivity during the Second World War were prisoners of war captured in North and East Africa. While residing in the camps they were occupied with the kinds of tasks described above for those interned. June 1944 saw the beginning of employment of the POW volunteers, unguarded, on individual farms and in rural industry. An ABC radio interview with former POWs and former POW employers reveals that friendships often developed between the employing families and the POWs. Some of the workers were included in family holidays and many shared with them their daily evening meal. One of the former employers interviewed recounted putting together packages of dress material to send to the wives and daughters of the POWs on her property. A strong fear of the bush and reasonably comfortable living situations meant that the chances of attempted escape were minimal.
On return to Italy, many POWs who had been stationed on farms and in rural industry applied to return to Australia. One such POW was Michele Laricchia who was captured by the allied forces in Egypt in December 1940. He was held in India until the Italians surrendered in 1943 and Laricchia and his fellow prisoners went to the POW camp in Cowra. He spent three months at this camp before being sent to- North Queensland to work on farms. Here he began to learn English and develop a friendship of sorts with at least one of the men he worked for. At the war's end Laricchia, reluctantly repatriated, found himself in a war ravaged Italy where he knew virtually no one. In time he was able to borrow the money to return to Australia and establish himself in Griffith.
Reproduced with permission of the NSW Heritage Office.
Contact Print this page Reduce font size Increase font size |
Dark-Matter ‘Superhighways’ of the Cosmos –“Connecting Vast Bubbles Devoid of Galaxies”
By using the best available data to monitor galactic traffic in our neighborhood, Noam Libeskind from the Leibniz Institute for Astrophysics Potsdam (AIP) and his collaborators have built a detailed map of how nearby galaxies move. In it they have discovered a bridge of Dark Matter stretching from our Local Group all the way to the Virgo cluster – a huge mass of some 2,000 galaxies roughly 50 million light years away shown above, that is bound on either side by vast bubbles completely devoid of galaxies. This bridge and these voids help us understand a 40 year old problem regarding the curious distribution of dwarf galaxies.
These dwarf galaxies are often found swarming around larger hosts like our own Milky Way. Since they are dim they are hard to detect, and are thus found almost exclusively in our cosmic neighborhood. A particularly fascinating aspect of their existence is that near the Milky Way and at least two of our closest neighbors – the Andromeda and Centaurus A galaxies – these satellites don’t just fly around randomly, but are instead compressed on to vast, flat, possibly spinning, planes. Such structures are not a naive outcome of the Cold Dark Matter model that most cosmologists believe is responsible for how the universe forms galaxies. These structures are thus a challenge to the current doctrine.
One possibility is that these small galaxies echo the geometry of structure on much greater scales: "This is the first time we have had observational verification that large filamentary super highways are channeling dwarf galaxies across the cosmos along magnificent bridges of Dark Matter" Libeskind says. This cosmic “super highway” gives the speeding satellites an off ramp along which they can be beamed towards the Milky Way, Andromeda and Centaurus A.
“The fact that this galactic bridge can affect the dwarf galaxies around us is impressive, given the difference in scale between the two: the planes of dwarfs are around one percent of the size of the galactic bridge to Virgo”.
The AIP is the successor of the Berlin Observatory founded in 1700 and of the Astrophysical Observatory of Potsdam founded in 1874. The latter was the world's first observatory to emphasize explicitly the research area of astrophysics. Since 1992 the AIP is a member of the Leibniz Association.
Publication: Noam Libeskind et al. „Planes of satellite galaxies and the cosmic web“ in Monthly Notices of the Royal Astronomical Society and in arXiv.
The Daily Galaxy via The AIP
Image credit: Virgo Cluster, 1080plus.com
"The Galaxy" in Your Inbox, Free, Daily |
Race and Ethnicity Caucus Law and Legal Definition
Race and ethnicity caucus refer to a special interest caucus created by the members of Congress who wishes to pursue legislation for a specific race or ethnicity. For example, the Congressional Black Caucus is made up of the black members of Congress to pursue interests specific to the black population. Congressional Hispanic Caucus is created to represent Hispanics in Congress and Congressional Asian Pacific American Caucus represent Asian Americans and Pacific islanders. |
Open main menu
Guitar/Effects Pedals
< Guitar
Effects pedals are electronic or digital devices that modify the tone, pitch, or sound of an electric guitar. Effects can be housed in effects pedals, guitar amplifiers, guitar amplifier simulation software, and rackmount preamplifiers or processors. Electronic effects and signal processing form an important part of the electric guitar tone used in many genres, such as rock, pop, blues, and metal. All these are inserted into the signal path between an electric instrument and the amplifier. They modify the signal coming from the instrument, adding "effects" that change the way it sounds in order to add interest, create more impact or create aural soundscapes.
Guitar effects are also used with other instruments in rock, pop, blues, and metal, such as electronic keyboards and synthesizers. Electric bass players use bass effects, which are designed to work with the low-frequency tones of the bass.
Distortion-related effectsEdit
Boss DS1 distortion pedal
Distortion is an important part of an electric guitar's sound in many genres, particularly for rock, hard rock, and metal. A distortion pedal takes a normal electric guitar signal and combine harmonic multiplication and clipping through the use of analog circuitry to create any number of sounds ranging from a mild vintage blues growl to a 1960s psychedelic fuzz sound to the sound of an highly overdriven tube amp in a metal band. Distortion is essential to the powerful sound of heavy metal music.
There are several different types of distortion effects, each with distinct sonic characteristics. These include overdrive/distortion (or vacuum tube-style distortion), overdrive/crunch, fuzz, and hi-gain.
Overdrive DistortionEdit
Overdrive distortion is the most well known of all distortions. Although there aren't many electronic differences between a distortion an overdrive, the main audible one is that a distortion does exactly as the name suggests; distorts and clips the signal no matter what volume is going through it, the amount of distortion usually remains relatively the same. This is where an overdrive differs. Most overdrives are built to emulate the sound of a tube amp overdriving and therefore give the player control of the clipping through dynamics. This simply means that the effect gives a clean sound for quieter volumes and a more clipped or distorted sound for louder volumes.
While the general purpose is to emulate classic "warm-tube" sounds, distortion pedals such as the ones in this list can be distinguished from overdrive pedals in that the intent is to provide players with instant access to the sound of a high-gain Marshall amplifier such as the JCM800 pushed past the point of tonal breakup and into the range of tonal distortion known to electric guitarists as "saturated gain." Although most distortion devices use solid-state circuitry, some "tube distortion" pedals are designed with preamplifier vacuum tubes. In some cases, tube distortion pedals use power tubes or a preamp tube used as a power tube driving a built-in "dummy load." Distortion pedals designed specifically for bass guitar are also available. Some distortion pedals include:
• MXR Distortion+: A distortion which is capable of having a very subtle, soft clipping, right through to a heavily overdriven sound favoured by many modern day heavy and death metal guitarists.
• Pro Co Rat
• Boss DS-1 Distortion
• Marshall Guv'nor
• Line 6 Dr. Distorto
• T-Rex Engineering|T-Rex Engineering's Bloody Mary
• Digitech Hot Head
• Danelectro FAB Distortion
Ibanez Tube Screamer pedal
• Ibanez Tube Screamer (TS-9 and TS-808): an overdrive which was built to work with the harmonics of a push-pull tube amp. This effect was made famous by blues guitarist Stevie Ray Vaughan but was and is used by hundreds of prominent guitarists since it's invention.
• BOSS SD-1 Super Overdrive
• BOSS BD-2 Blues Driver
• BOSS OD-3 Overdrive
• Line 6 Crunchtone
• DigiTech Bad Monkey
• N-audio Firesound V3
• Danelectro FAB Overdrive
Arbiter Fuzzface, a fuzz pedal.
Fuzz was originally intended to recreate the classic 1960's tone of an overdriven tube amp combined with torn speaker cones. Oldschool guitar players (like Link Wray) (citation needed) would use a screwdriver to poke several holes through the paperboard part of the guitar amp speaker to achieve a similar sound. Since the original designs, more extreme fuzz pedals have been designed and produced, incorporating octave-up effects, oscillation, gating, and greater amounts of distortion.
Some fuzzbox pedals include:
• Z.Vex Fuzz Factory
• Dallas Arbiter Fuzz Face: This was a favorite of Psychedelic rocker Jimi Hendrix who shot this pedal to stardom as he did himself.
• Electro Harmonix Big Muff: Probably the most popular fuzz effects ever designed, the Big Muff is also often used as a sustain pedal and sounds excellent in combination with a wah wah.
• BOSS FZ-5 Fuzz
• Danelectro Cool-Cat Fuzz
Hi-Gain (descended from the more generic electric guitar amplification term high-gain) is the sound most used in heavy metal. High gain in normal electric guitar playing simply references a thick sound produced by heavily overdriven amplifier tubes, a distortion pedal, or some combination of both--the essential component is the typically loud, thick, harmonically rich, and sustaining quality of the tone. However, the Hi-Gain sound of modern pedals is somewhat distinct from, although descended from, this sound. The distortion often produces sounds not possible any other way. Many extreme distortions are either hi-gain or the descendents of such. The Mesa Boogie Triple Rectifier Series of amps are an example.
Some Hi-Gain Pedals Include:
• BOSS MT2 Metal Zone
• DigiTech Death Metal
• Danelectro FAB Metal
• Electro Harmonix Metal Muff with Top Boost
• MXR Dime Distortion: Used by Dimebag Darrell.
• Suhr Riot
Power-tube pedalEdit
A Power-Tube pedal contains a power tube and optional dummy load, or a preamp tube used as a power tube. This allows the device to produce power-tube distortion independently of volume; therefore, power-tube distortion can be used as an effects module in an effects chain.
Power attenuatorEdit
Filtering-related effectsEdit
Behringer EQ700 graphic equalizer
Most parametric EQ pedals (such as the [1] Boss PQ-4) provide semi-parametric EQ. That is, in addition to level control, each band provides either a center frequency or Q width control. Parametric EQs have rotating controls rather than sliders.
Placement of EQ in a distortion signal processing chain affects the basic guitar amp tone. Using a guitar's rotary tone control potentiometer is a form of pre-distortion EQ. Placing an EQ pedal before a distortion pedal or before a guitar amp's built-in preamp distortion provides preliminary control of the preamp distortion voicing.
For more complete control of preamp distortion voicing, an additional EQ pedal can be placed after a distortion pedal; or, equivalently, the guitar amp's tone controls, after the built-in preamp distortion, can be used. An EQ pedal in the amp's effects loop, or the amp's tone controls placed after preamp distortion, constitutes post-distortion EQ, which finishes shaping the preamp distortion and sets up the power-tube distortion voicing.
As an example of pre-distortion EQ, Eddie Van Halen places a 6-band MXR EQ pedal before the Marshall amplifier head (pre-distortion EQ). Slash places a Boss GE-7, a 7-band EQ pedal, before his Marshall amp. This technique is similar to placing a Wah pedal before the amp's preamp distortion and leaving the Wah pedal positioned part-way down, sometimes mentioned as "fixed wah," (pre-distortion EQ), along with adjusting the amp's tone controls (post-distortion EQ).
If a dummy load guitar-amp configuration is used, an additional EQ position becomes available, between the dummy load and the final amplifier that drives the guitar speaker. Van Halen used an additional EQ in this position. This configuration is commonly used with rackmount systems.
Finally, an EQ pedal such as a 10-band graphic EQ pedal can be placed in the Insert jack of a mixer to replace the mixer channel's EQ controls, providing graphical control over the miked guitar speaker signal.
Equalization-related effects pedals include Wah, Auto-Wah, and Phase Shifter. Most EQ pedals also have an overall Level control distinct from the frequency-specific controls, thus enabling an EQ pedal to act as a configurable level-boost pedal. Some EQ pedals include:
• MXR M-108 10-band Equalizer
• BOSS GE-7 Equalizer
Boss V-Wah pedal
Some wah-wah pedals include:
• Dunlop Cry Baby
• VOX V847 Wah Wah
• Danelectro Trip-L Wah
Auto-Wah / Envelope FilterEdit
Musitronics Mu-Tron III pedal
• Electro-Harmonix Q-Tron
• MXR M-120 Auto Q
• Keeley Electronics Nova Wah
• Danelectro French Fries Auto-Wah
• Mu-Tron III
Talk BoxEdit
Early forms of the talk box, such as the Heil Talk Box, first appeared in Country Music circles in Nashville in the 1940',s 1950's, and 1960's, by artist like swing band pedal steel player Alvino Rey, Link Wray ("Rumble"), Bill West, a Country Music steel guitar player and husband of Dottie West, and Pete Drake, a Nashville mainstay on the pedal steel guitar and friend of Bill West. Drake used it on his 1964 album Forever, in what came to be called his "talking steel guitar." The device used the guitar amplifier's output to drive a speaker horn that pushed air into a tube held in the player's mouth, which filters and thereby shapes the sound leading to a unique effect. The singer and guitarist Peter Frampton made this effect famous with hit songs such as "Do You Feel Like We Do" and "Show Me the Way," as did Joe Walsh on "Rocky Mountain Way." On Van Halen's cover of "You Really Got Me" Eddie Van Halen uses a talk box after the guitar solo to make a sound similar to a person having sex. Newer devices, such as Danelectro's Free Speech pedal, use a microphone and vocoder-like circuit to modulate the frequency response of the guitar signal. Some Talk Boxes include: The Dunlop Heil Talk Box, Rocktron Banshee, and Peter Frampton's own company,Framptone.
Volume-related effectsEdit
Volume pedalEdit
A Volume pedal is a volume potentiometer that is tilted forward or back by foot. A volume pedal enables a musician to adjust the volume of their instrument while they are performing. Volume pedals can also be used to make the guitar's notes or chords fade in and out. This allows the percussive plucking of the strings to be softened or eliminated entirely, imparting a human-vocal sound. Volume pedals are also widely used with pedal steel guitars in country music. It has also been used to great effect in rock music; the Pat McGee Band's live version of "Can't Miss What You Never Had" on General Admission illustrates what the pedal is capable of. Some volume pedals are:
• Ernie Ball Stereo Volume Pedal
• Boss FV-50H Foot Volume
• VOX V850 Volume Pedal
Auto-Volume/Envelope VolumeEdit
Just as an Auto-Wah is a version of a Wah pedal controlled by the signal's dynamic envelope, there is an envelope-controlled version of a volume pedal. This is generally used to mimic automatically the sound of picking a note while the guitar's volume knob is turned down, then smoothly turning the knob up, for a violin-like muted attack. An example is:
• Boss SG-1 Slow Gear
Tremolo is a regular and repetitive variation in gain for the duration of a single note, which works like an auto-volume knob; this results in a swelling or fluttering sound. This effect is very popular in psychedelic and trip-hop music. The speed and depth of the flutter are usually user-controlled.This is a volume-related effects pedal. This effect is based on one of the earliest effects that were built into guitar amplifiers. Examples include:
• Demeter TRM-1 Tremulator
• Boss TR-2 Tremolo
• Electro-Harmonix Worm
• Line 6 Tap Tremolo
• Danelectro Cool-Cat Tremolo
Marshall ED-1 Compressor effects pedal
A compressor acts as an automatic volume control, progressively decreasing the output level as the incoming signal gets louder, and vice versa. It preserves the note's attack rather than silencing it as with an Envelope Volume pedal. This adjustment of the volume for the attack and tail of a note evens out the overall volume of an instrument. Compressors can also change the behaviour of other effects, especially distortion. when applied toward the guitar, it can provide a uniformed sustained note; when applied to instruments with a normally short attack, such as drums or harpsichord, compression can drastically change the resulting sound. Another kind of compressor is the optical compressor which uses a light source (LED or lamp) to compress the signal.
Some compressor pedals are:
• Boss CS-3 Compression Sustainer
• MXR M-102 DynaComp
• Diamond Compressor (optical compressor)
• Line 6 Constrictor
• T-Rex Engineering's CompNova
• Electro-Harmonix Black Finger (optical compressor)
• Aphex Punch Factory Optical Compressor
• TC Electronic Hypergravity Compressor (parallel compressor)
Time-based effectsEdit
Boss DD3 digital delay pedal
A Delay or Echo pedal creates a copy of an incoming sound and slightly time-delays it, creating either a "slap" (single repetition) or an echo (multiple repetitions) effect. Delay pedals may use either analog or digital technology. Analog delays often are less flexible and not as "perfect" sounding as digital delays, but some guitarists argue that analog effects produce "warmer" tones. Early delay devices actually used magnetic tape to produce the time delay effect. U2's guitarist, The Edge, is known for his extensive use of delay effects. Some common Delay pedals are:
• Boss DD-6 Digital Delay
• Boss DD-20 Giga Delay
• Line 6 DL-4 Delay Modeler
• Line 6 Echo Park
• T-Rex Engineering's Replica
• TC Electronic Flashback Delay
• Danelectro FAB Echo
Another technology that is used in Delay units is a feedback circuit, consisting of a tracking oscillator circuit to hold a note of the last interval, and after amplifying the signal, send it back to the input side of the delay. While it was first associated with Boss DF-2 Super Feedbacker & Distortion, currently, the signal feedback circuit is employed by Delay pedals, and if used under "hold" mode (As in Boss DD-3) it will provide a sustain effect instead of a simply delay effect.
Extremely long delay times form a looping pedal, which allows performers to record a phrase or passage and play along with it. This allows a solo performer to record an accompaniment or ostinato passage and then, with the looping pedal playing back this passage, perform solo improvisations over the accompaniment. The guitarist creates the loop either on the spot or it is held in storage for later use (as in playback) when needed. Some examples of loops effects are:
• Boss RC-300 Loop Station
• DigiTech JamMan Looper
• Boomerang Looper
• TC Electronic Ditto
DigiTech DigiDelay effects pedal
Reverb is the persistence of sound in a particular space after the original sound is removed. When sound is produced in a space, a large number of echoes build up and then slowly decay as the sound is absorbed by the walls and air, creating reverberation, or reverb. A plate reverb system uses an electromechanical transducer (actuator), similar to the driver in a loudspeaker, to create vibration in a plate of sheet metal. A pickup captures the vibrations as they bounce across the plate, and the result is output as an audio signal. A spring reverb system uses a transducer at one end of a spring and a pickup at the other, similar to those used in plate reverbs, to create and capture vibrations within a metal spring. Guitar amplifiers frequently incorporate spring reverbs due to their compact construction. Spring reverberators were once widely used in semi-professional recording due to their modest cost and small size. Due to quality problems and improved digital reverb units, spring reverberators are declining rapidly in use. Digital reverb units use various signal processing algorithms in order to create the reverb effect. Since reverberation is essentially caused by a very large number of echoes, simple DSPs use multiple feedback delay circuits to create a large, decaying series of echoes that die out over time.
Examples of reverb pedals include:
• DigiTech DigiDelay
• Electro-Harmonix Holy Grail
• Boss RV-5 Digital Reverb
• Line 6 Verbzilla
Modulation-related effectsEdit
Rotary SpeakerEdit
Before such effects are available electronically, these are accomplished by the use of Rotary speakers, by spinning the speakers and/or place a rotating baffle in front of it. This creates a doppler effect, and depend on the speed of the rotation, translate into phasing, flanging, chorus, vibrato, or even tremolo.
• Leslie Speakers: This is a unit that contains a bass speaker that blare into a rotating baffle, and a horn speaker that rotate like a siren. Originally designed for Hammond organs, they are also favored by guitarist; some say that no electronic effects can duplicate its sounds.
• Fender Vibratone: This is a simplified version of Leslie Speaker, containing only a 10" speaker that blare into a rotating baffle.
All the electronic-based effects can duplicate the sound of a rotating speakers, as all the following effects differ based on speed, volume, and modulation. In fact, it is not uncommon for a pedal to be capable of doing two or more of modulation effects.
Phase Shifter (Phaser)Edit
Digitech Hyper Phase effects pedal
A Phase Shifter creates a complex frequency response containing many regularly-spaced "notches" in an incoming signal by combining it with a copy of itself out of phase, and shifting the phase relationship cyclically. The phasing effect creates a "whooshing" sound that is reminiscent of the sound of a flying jet. This effect dominates the sound in the song Star Guitar by Chemical Brothers. The song was not played with any guitars but you can hear the phasing effect. The instrument being phased was actually a synthesizer. Some electronic "rotating speaker simulators" are actually phase shifters. Phase shifters were popular in the 1970s, particularly used with electric piano and funk bass guitar. The number of stages in a phase shifter is the number of moving dips in the frequency response curve. From a sonic perspective, this effect is equalization-oriented. However, it may be derived through moderate time-based processing. Some phaser pedals include:
• MXR M-101 Phase 90
• BOSS PH-3 Phase Shifter
• Electro-Harmonix Small Stone
• Moog] MF-103 12 Stage Phaser
• DigiTech Hyper Phase
Vibe (Univibe)Edit
• BBE Soul Vibe
• Voodoo Lab Microvibe
Some vibe-chorus pedals include
• Dunlop Univibe
• Dunlop Rotovibe
• BBE Mind Bender
A vibrato pedal cyclically changes the pitch of the signal, giving the impression that the guitar is out of tune. The depth of the effect, the speed and the overall level of the effect can be controlled by potentiometers. Although similar in name and able to achieve similar sounds at high speed settings, a vibrato is different from a Vibe pedal.
Examples of vibrato-only pedals:
• TC Electronic Shaker Vibrato
• Malekko Omicron vibrato
• Subdecay Siren pitch vibrato
• Zvex Verter Instant LoFi Junky
• Boss VB-2w Vibrato
Some chorus and modulation pedals inclue a vibrato section that can be combined with chorus, vibe or rotary.
A Flanger simulates the sound effect originally created by momentarily slowing the tape during recording by holding something against the flange, or edge of the tape reel, and then allowing it to speed up again. This effect was used to simulate passing into "warp speed," in sci-fi films, and also in psychedelic rock music of the 1960s. Flanging has a sound similar to a phase-shifter, but different, yet is closely related to the production of chorus.
• Boss BF-3 Stereo Flanger
• Line 6 Liqua Flange
• MXR M-117R Flanger
• Danelectro FAB Flange
• Electro Harmonix Deluxe Electric Mistress
Ibanez CF7 chorus/flanger effects pedal
Chorus splits your guitars signal in two, then second signals pitch is then delayed and/or modulated in pitch and mixed back in with the dry signal. The effect sounds like several guitarists playing the same thing at the same time resulting in a wide swelling sound. Some common chorus pedals are:
• Boss CE-1 Chorus Ensemble (the original chorus effect pedal, and first device released by Boss)
• Boss CH-1 Super Chorus
• Electro-Harmonix Small Clone
• Ibanez CF-7 Chorus/Flanger
• Line 6 Space Chorus
• MXR M-134 Stereo Chorus
• TC Electronic Stereo Chorus /Flanger /Pitch Modulator
• Danelectro FAB Chorus
Rotary Speaker SimulatorEdit
• Boss RT-20 Rotary Ensemble Pedal: This is one of the few pedals that is capable of modelling all aspect of a Leslie Speaker.
• Line 6 Rotomachine: Also a modelling pedal, it is available in a compact pedal size.
• DLS Roto-Sim: Hybrid of analog with DSP modelling.
Pitch-related effectsEdit
Pitch Shifter/harmonizerEdit
• Digitech Whammy
• Boss PS-5 Super Shifter
• Electro Harmonix Harmonic Octave Generator
Electro-Harmonix Polyphonic Octaver Generator effects pedal
An Octaver mixes the input signal with a synthesised signal whose musical pitch is an octave lower or higher than the original. Effects that synthesize intervals besides octaves are referred to as harmonizers or pitch shifters. These are frequently used in bands without a bass player. Octave Up pedals include:
• Ampeg Scrambler
• Electro Harmonix POG (Polyphonic Octave Generator)
Octave Down pedals include:
• Boss OC-3 Super Octave
• Electro-Harmonix Octave Multiplexer
Octave fuzzEdit
MXR M-103 Blue Box (octave down fuzz pedal)
An Octave fuzz is a fuzz with an analog octave (up or down). The Octavia is one of the first octave pedals ever produced. Unlike octavers, the level of the octave cannot be controlled separately from the fuzz: increasing the gain makes the octave louder.
Octave up fuzzes include:
• Roger Mayer Octavia
• Chicago Iron Tycobrahe Octavia
• Catalinbread Octapussy
• Electro Harmonix Octavix
• Fender Blender
• Foxx Tone Machine
Octave down fuzzes include:
• MXR M-103 Blue Box
Other effectsEdit
While audio feedback in general is undesirable due to the high frequency overtone, when controlled properly, it can provide true sustain of the sound (instead of using a distortion/compressor to make quiet notes louder, or a feedback of a signal in a circuit as in a delay unit). Several approaches have been used to produce guitar feedback effects, which sustain the sound from the guitar:
• The most primitive form, as used by Jimi Hendrix, is to use the feedback created when the guitar is played in front of a loudspeaker.
• The neck pickup is used as a driver to push the strings based on the bridge pickup, such as the Sustainiac Sustainer and Fernandes Sustainer.
• A string driver can be mounted on a stand as in the Vibesware Guitar Resonator, which is driven by the selected guitar pickup(s). Feedback start, stop and harmonics can be controlled here by positioning the drivers distance to the strings and the position along the guitar neck while playing.
• A signal amplifier that powers a headstock transducer, which in turn send feedback vibration down the string, as in Sustainiac's Model C.
• A handheld string driver can contain a pickup and driver, as in the EBow.
• A dedicated high-gain guitar amp can be used in the control room, without a microphone, as a footswitch-controlled string feedback driver. The microphone is placed on the speaker cabinet of the main guitar amp in the isolation booth or live room.
Switcher/Mixer (or "A/B" pedal)Edit
A switcher pedal (also called an "A/B" pedal) enables players to run two effects or two effects chains in parallel, or switch between two effects with a single press of the pedal.
Some switcher pedals also incorporate a simple mixer, which allows mixing the dry guitar signal to be mixed with an effected signal. This is useful to make overly processed effects more mild and natural sounding. Examples of the use of the mixer function include:
• A wah can be mixed with dry guitar to make it more mild and full-bandwidth, with less volume swing.
• A compressor can be mixed with dry guitar to preserve the natural attack of the dry signal as well as the sustain of the compressor.
• Two overdrive pedals can be blended together.
• A strong phaser effect can be mixed with dry guitar to make it more subtle and musical.
Some examples of switcher pedals include:
• Dunlop A/B pedal
• Loop Master
Some examples of Switcher/mixer pedals include:
• BOSS LS-2 Line Selector
Noise GateEdit
A noise gate allows a signal to pass through only when the signal's intensity is above a set threshold, which opens the gate. If the signal falls below the threshold, the gate closes, and no signal is allowed to pass. A noise gate can be used to control noise. When the level of the 'signal' is above the level of the 'noise', the threshold is set above the level of the 'noise' so that the gate is closed when there is no 'signal'. A noise gate does not remove noise from the signal: when the gate is open, both the signal and the noise will pass through.
Noise gates are also used as an effect to modify the envelope of signals, removing gradual attacks and decays.
Examples of noise gate pedals include:
• BOSS NS-2 Noise Suppressor
• MXR M-135 Smart Gate
There are three types of boosters.
• The first are signal boosters. These give a gain boost to the signal running through it and appear to make the guitar louder. They are known as clean boosts.
• The second are frequency boosters. These are similar to the signal boosters but instead of boosting the whole signal, they boost one specific frequency range. These include treble boosters.
• The third are harmonic boosters. These boost certain harmonics within the wave and can sometimes give a gritty, octave sound (in either direction)
A boost pedal can be used to make the guitar louder (set up last in the effect chain, often in the effects loop of a distorted amp), or to increase the gain of an overdriven amplifier. Before distortion, a booster only increases the saturation, not the volume.
Bass EffectsEdit
Sound conditionerEdit
Bass effects that condition the sound, rather than changing its character are called "sound conditioners." Gain booster effects pedals and bass preamplifier pedals increase the gain (or volume) of the bass guitar signal. Bass preamplifiers for double basses are designed to match the impedance of piezoelectric pickups with the input impedance of bass amplifiers. Some double bass preamplifiers may also provide phantom power for powering condenser microphones and anti-feedback features such as a notch filter (see "Filter-based effects" section below).
Bass DistortionEdit
Bass distortion effects preamplify the signal until the signals' waveform "clips" and becomes distorted, giving a "growling", "fuzzy" or "buzzing" sound. Until the late 1980s, distortion effects designed specifically for electric bass' low range were not commonly available in stores, so most electric bass players who wanted a distortion effect either used the natural overdrive that is produced by setting the preamplifier gain to very high settings or used an electric guitar distortion pedal. Using the natural overdrive from an amplifier's preamplifier or a guitar distortion effect has the side effect of removing the bass' low range (low-pitched) sounds. When a low-range note is amplified to the point of "clipping", the note tends to go up an octave to its second harmonic, making deep bass notes sound "tinny".
In the 1990s and 2000s, bass distortion effects became widely available. These effects contained circuitry which ensured that the low-range bass signal was maintained in the distorted bass tone. Bass distortion is used in genres such as metal, thrash, hardcore, and punk.
Bass "overdrive" effects use a vacuum tube (or digitally-simulated tube modelling techniques) to compress the top of the signal's wave form, giving a smoother distorted signal than regular distortion effects. Regular bass distortion effects preamplify the signal to the point that it develops a gritty or "dirty" tone.
Filtered based effectsEdit
Filter based effects for bass include equalizer, phase shifter, wah and auto-wah.
A bass equalizer is the most commonly used of these three effects. It adjusts the frequency response in a number of different frequency bands. While its function is similar to a tone controls on an amplifier, such as rudimentary "bass" and "treble" frequency knobs, it allows for more precise frequency changes. A rack-mounted bass equalizer, for example, may have ten sliders to control the frequency range encompassed by a regular "bass" frequency knob.
Bass chorusEdit
Bass chorus effects use a cycling, variable delay time that is short so that individual repetitions are not heard. The result is a thick, "swirling" sound that suggests multiple instruments playing in unison (chorus) that are slightly out of tune. Bass chorus effects were more common in the late 1980s, when manufacturers such as Peavey included chorus effects in its bass amplifiers. In the 1990s and 2000s, more sophisticated bass chorus effects devices were created which only apply the swirling chorus effect to the higher parts of the bass tone, leaving the instrument's low fundamental untouched.[5]
Multi-Effects unitEdit
A multi-FX unit is a single effects device that can perform several guitar effects simultaneously. Such devices generally use digital processing to simulate many of the above-mentioned effects without the need to carry several single-purpose units. In addition to the classic effects, most have amplifier/speaker simulations not found in analog units. This allows a guitarist to play directly into a recording device while simulating an amplifier and speaker of his choice.
Boss GT-3 multi-effects unit
A typical digital multi-effects pedal is programmed, with several memory locations available to save custom user settings. Many lack the front-panel knobs of analog devices, using buttons instead to program various effect parameters. Multi-effects devices continue to evolve, some gaining MIDI or USB interfaces to aid in programming. Examples include:
• Tech 21 Sans Amp - A line of analog effects with distortion and speaker simulation capability.
• Line 6 POD XT Live
• Behringer V-Amp Pro
• DigiTech RP series
• DigiTech GNX series
• Boss ME-20, ME-50, GT-6, GT-8
• Zoom G2, G3, G5 series
• Vox Tonelab series
• Roland VG series
• Korg AX series
The quality of sound that is a major feature of separate pedals can never be matched by a multi-effects unit but they are ideal for a guitarist on a budget.
Appendices: Dictionary | Alternate Tunings | Chord Reference | Blanks |
your blood
Your Blood – Why is it So Important?
Your Blood – Why is it So Important?
Your blood could be viewed as the river of life; it is the substance that carries oxygen, water and nutrients to all your organs and tissues.
It therefore makes perfect sense, that imbalances seen in the blood will affect the organs and tissues, leading to malfunction and imbalance.
If the red blood cells are anything other than perfect in shape, structure, flexibility and fluidity, then their ability to travel around the body and deliver the vital level of oxygen and nutrients is severely compromised. This translates into low energy production, fatigue and a general sense of feeling unwell. There are obviously many degrees of this. The quality of the blood is vital to a healthy, disease free body and this is dependent on correct nutrition and lifestyle.
Every second of every day the trillions of cells within the body absorb nutrients and oxygen from the blood and excrete acid wastes in the process of metabolism. Diet and lifestyle dramatically affect the cellular health either positively or negatively. If our bodies, due to being acidic have to work harder in order to keep the blood at the slightly alkaline level of 7.365, then we will feel sick and tired. Blood, which is an important ‘organ’ of life, must stay at an exact pH of 7.365.
The body will do anything to maintain this level and will rob the body of calcium in order to stay that way, causing imbalances in health. Healthy cells can only survive in an environment that maintains an optimum pH. Think of fish in a fish tank, we spend much time and effort making sure the water they swim in is clean, well oxygenated and at the correct acidity/alkalinity level. If we don’t monitor the oxygenation and pH levels and keep the water clean, the fish get sick. If the fish do get sick, changing the water they swim in is a sensible first option.
Healthy blood cells live in a healthy environment, i.e. one free of pollutants, harmful bacteria, parasites, etc. Healthy blood cells can also only survive in an environment that maintains an optimum pH. One needs to assess the terrain in which the cells are floating. For example, if the terrain is too acidic then the red cells will behave in a way which will compromise their ability to circulate freely around the body to deliver oxygen.
The body is equipped with many mechanisms to enable it to maintain the blood in a pure and healthy state. These are the elimination channels and filtering organs. These consist of the Lymph, Liver, Kidneys, Lungs, Bowels and Skin. The efficiency of these channels can alter over time and is perfectly illustrated by the changes observed as a human grows from a baby, with a very pure and untarnished blood stream, (dependent on the nutrition of the mother of course, during pregnancy and weaning) to that of a teenager with acne and then on to middle-age where the body develops signs of toxicity and aging.
0 replies
Leave a Reply
Want to join the discussion?
Feel free to contribute!
Leave a Reply |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.