text
stringlengths
144
682k
Reading 'White Trash' and Discussing Economic Mobility The historical roots of our hidden biases towards the poor. January 3, 2017 Published in June of 2016. Nancy Isenberg, a professor of history at Louisiana State University, has written a book that attempts to provide the historical foundations as to why today’s poor (in this case poor whites) are usually blamed for their own poverty.  She makes the case that the foundation myth of the US as a classless society is just that - a myth.   Isenberg believes that generations of historians have systematically downplayed the importance of economic exploitation.  Looking at American history through the lens of social class, and in particular through the experiences of poor whites, changes how we make sense of the American experience. The promise of a book like White Trash is that it can help uncover the historical roots of today’s implicit bias against the poor.  If we understand the roots of our own class-based blindness, perhaps we have a chance of thinking and acting differently.   The parts of White Trash that I connected with most are when Isenberg takes the story of how poor whites have been portrayed in media.  Our society’s bias towards low-income whites is apparent in 1960s sitcoms like The Beverly Hillbillies and Gomer Pyle, U.S.M.C, to films such as the 1970s Deliverance, and into recent reality shows such as Here Comes Honey Boo.   Modern depictions of poor whites are aligned with, and determined by, historical perceptions in ways that I did not begin to understand before reading White Trash.  These deeply ingrained ideas about the causes and consequences of poverty are perhaps holding us back from making the political and economic choices required to ensure opportunity for all Americans.   White Trash is not always an easy read - both in the books content and its style.  The story of how poor whites have been treated in America from our country’s founding to the present is not an uplifting one.   Isenberg is at her best when she is making meaning of the historical record - when she allows herself to make judgements and observations that go beyond the (depressing) historical facts that she describes.  Particularly in the early chapters, I was wishing that Isenberg had cut out some details, and omitted some of her research, in order to make sense of her story in the modern American context.   Despite this complaint - which I attribute more to my own impatience to apply the lessons of the book to my own work in higher ed as opposed to any shortcomings of the book - I recommend that our IHE community make the effort to read and discuss White Trash.   What are you reading? Back to Top
Digital Signature and E-Records Management in Hospital Administration Mr & Mrs Professor Dr. Vijay Pithadia  The healthcare industry is highly regulated by a complex statutory and regulatory framework at every level. Electronic commerce in such a highly regulated industry presents some challenges to say the least. States have approached e-commerce in a myriad of ways, leaving consumers and businesses confused as to whose law applies. Electronic records and signatures are essential elements of many electronic transactions, particularly in healthcare. Electronic signatures that can't be forget. It is a computed digest of the text that is encrypted and sent with the text message. A digital signature created by use of encryption keys can provide this high level of security because it ties an originator's identity to an electronically transmitted message by means of an algorithm. The digital signature is not a computer's "picture" of a handwritten signature, but a condensed mathematical representation of the message itself that can be created only by the originator using a private encypted key. Thus, a digital signature provides authentication of data and user. Signatures and Certificates A digital signature ensures that the document originated with the person signing it and that it was not tampered with after the signature was applied. However, the sender could still be an impersonator and not the person he or she claims to be. To verify that the message was indeed sent by the person claiming to send it requires a digital certificate (digital ID) which is issued by a certification authority. See digital certificate. For example: The sender uses a one-way hash function to compute a small digest of her text message. Using her private key, she encrypts the digest, turning it into a digital signature. The signature and the message are then encrypted using the recipient's public key and transmitted. The recipient uses his private key to decrypt the text and derive the still-encrypted signature. Using his public key, he decrypts the signature back into the sender's digest and then recomputes a new digest from the text message. If the digests match, the message is authenticated. Digital signatures are a fundamental component of business in cyberspace. And numerous laws, state and now federal, have codified digital signatures into law. These laws are a mistake. Digital signatures are not signatures, and they can't fulfill their promise. Understanding why requires understanding how they work. Health cares information and its use E-SIGN provides guidance on how records may be stored and retained electronically. If a document is required to retain by law, an electronic version of the document will be acceptable. The electronic document accurately reflects the information in the record and is accessible to all relevant people in a form that may be accurately reproduced at a later date, whether by printing, electronically transmitting or other means. No specific type of technology is mandated by E-SIGN. The law is technology neutral; allowing individual parties to choose the technology that best suits their needs. The term "electronic" is defined broadly in E-SIGN and means related to technology having electrical, digital, magnetic, wireless, optical, electromagnetic or other similar capabilities. Under E-SIGN, the term "transaction" means an action or set of actions relating to the conduct of business, consumer or commercial affairs between two or more persons. The term "electronic record" means a contract or other record created, generated, sent, communicated, received or stored by electronic means. Health care records (HCR) include both informations relating to the physical or mental health of patients, and information regarding the provision of health care by health care practitioners or health care facilities. Relatives, social workers and other third parties may supplement personal health information provided by the patient. The provision of health care is recorded in the professional notes, observations and opinions of health care practitioners and administrative staff. These data are entered into the health care record not only by the health care practitioners caring for the patient (including physicians, dentists, nurses and professions allied to medicine) but also by professionals providing support services, non-clinical staff acting on the professionals behalf and even by patients themselves. This diversity of origin and use of health care data present problems of security in the conventional and electronic health care records. Issues in security of electronic health care records EHCR are health care records that are stored, processed or transmitted using computer technology. The EHCR enables information to be used simultaneously by many individuals who may be remote from each other and from the patient, but this can be achieved only by use of the appropriate computer equipment. Thus the user who has no access to the necessary hardware or lacks the skills to operate it may be denied the information. In contrast, it is possible for those with the skills to examine and alter computer records without leaving any indication of their actions. Computerized records can be stamped with the identity of the users who create or modify them, although the mechanisms by which most computers currently confirm the user's true identity, such as through password control, leave much to be desired and impersonation is not difficult. To compound the problem, identical copies of EHCR can be made at will, often without trace, readily transmitted over networks that now encircle the globe and linked with other data about the same individual to compile detailed profiles of their life style, health and financial status. Ethical and legal aspects The consequences of using an insecure information system in health care are far reaching. Patients may be embarrassed by, or socially ostracized following, disclosure of sensitive information about mental health, sexually transmitted diseases, adolescent care, drug addiction and genetic fingerprints. Their clinical care may be compromised by inaccurate or missing data as a result of unauthorized modification, from system malfunction or due to errors in program design. There is the potential for serious harm or death should such errors remain unrecognized. The EHCR must therefore be designed, implemented and run in such a way that the potential to harm the patient is minimized. Information security is a complex and highly technical subject with which even computer professionals are rarely fully conversant. Very few health care professionals have sufficient understanding of the principles of information security to confidently assume responsibility for security of information. If properly designed, access to EHCR can be controlled more comprehensively than is possible with the conventional HCR. The introduction of the EHCR thus offers the opportunity to comply more closely with the ethical requirement to respect the individual's right to privacy while not impeding the freedom of access to information needed by the clinicians involved in delivery of health care. In either case, We would suggest that the overall responsibility for security of health care data in a health care facility rest with the most senior clinician (e.g. the medical director or Dean) or delegated authority. There is no justification for access to health care records to be controlled by the administrative staff who own or operate the computer system holding EHCR, even though they may have the responsibility to ensure that the mechanisms controlling access are applied effectively. Regular audits of these security measures should be conducted but physical controls such as encryption may be necessary where regular monitoring is not considered feasible. Special Consumer Protections The term "consumer" means an individual who obtains, through a transaction, products or services, which are used, primarily for personal, family or household purposes. E-SIGN imposes special requirements on anyone obligated to provide written disclosures to consumers. Those special requirements are imposed to ensure that consumers can make fully informed decisions about electronic transactions and to provide some protection for consumers. Essentially, E-SIGN provides that the consumer must have affirmatively consented to receive the required information electronically. Under E-SIGN, threshold questions in healthcare are whether a proposed arrangement is a transaction for purposes of E-SIGN, whether the transaction is affecting or in interstate commerce, whether a consumer is involved and what exceptions, if any, apply. If it is assumed that E-SIGN applies to electronic healthcare transactions (and in most cases that may be a reasonable assumption), there still are many unanswered questions about how electronic commerce in healthcare should be conducted. In sum, there is one safe rule to follow when determining which laws or regulations govern a particular healthcare transaction involving the use of electronic records or signatures: closely consider all of them. Assuming each is consistent with E-SIGN, it is highly likely each will apply. The healthcare industry could achieve greater convenience and efficiency by adopting a national standard regarding the use of electronic signatures. As a term, "electronic signatures" refers to any electronic means to indicate consent to the content of a transaction. The great potential of computerized information in health care will be realized only when health care professionals and patients alike feel confident about their personal records being held on computer. It is imperative the health cares professions for quickly to implement such measures to create a secure environment for the electronic health care record. The time is ripe for creation of a national electronic-signature standard. Many vendors already require that correspondence be in electronic form and have received support from state contract law that signatures need not be handwritten. Dick R, Steen E (Eds.) The computer based medical record: an essential technology for health care. Institute of Medicine, Washington: National Academy Press, 1991 Griesser G, Bakker A, Danielsson J, Hirel JC, Kenny DJ, Schneider W, Wasserman AI Data Protection in Health Information Systems: considerations and guidelines. IMIA Working Group 4 1980, Amsterdam: North Holland Bakker AR. Security in medical information systems In Yearbook of Medical Informatics 93 1993, Stuttgart: Shattauer, pp 52-60 Rienhoff O. Digital archives and communication highways in health care require a second look at the legal framework of the seventies. Int J Biomed Comput 1994 35 (Suppl 1): 13-19 Barber B, Jensen OA, Lamberts H, Roger F, de Schouwer R, Zöllner H. “The six safety principles of health information systems In Medical Informatics Europe 90” (O'Moore R et al Eds.) Lecture Notes in Medical Informatics 1990 40: 608-613 Roger France FH, Gaunt PN The need for security - clinical views Int J Biomed Comput 1994 35 (Suppl 1): 189-194 DePotter S, Aimé F, Sauquet D, Ricour C, Degoulet P. Utilisation du minitel dans UN service de nutrition parentrale B domicile. In: Télématique et Télémédicine (Roger France FH, Albert A. Eds.). Technologie et Santé, CNEH, Paris 1993, pp 97-99 Benhamed M, Clément G, Tournade MF Tel-HBD Suivi télématique de patients traités á domicile. In: Télématique et Télémédicine (Roger France FH, Albert A. Eds.). Technologie et Santé, CNEH, Paris 1993, pp 100-105 Moehr JR. Privacy and security requirements of distributed computer based patient records. Int J Biomed Comput 1994 35 (Suppl 1): 57-64 Schloerer J. Identification and retrieval of personal records from a statistical data bank. Methods of Information in Medicine 1975 14: 7-13 Gritzalis D, Katsikas S, Keklikoglou J, Tomaros A. Determining accesses rights for medical information systems, Computers and Security 1992; 11: 149-161 Roger France FH, Noothoven van Goor J, Staer Johansen K. Case-based telematic systems towards equity in health care, Amsterdam: IOS Press. 1994 Weed LL. Medical records, medical education and patient care: the problem-oriented record as a basic tool. Case-Western Reserve University Press, 1969 Kerland LT, Molgaard CA, Weigel K M The minimum basic data set and epidemiologic research: the Mayo Clinic experience. In: Lambert PM, Roger FH (Eds) Hospital Statistics in Europe. North Holland Publishing Company, 1982, pp 25-42 Gostin LO, Turek-Brezina J, Powers M, Kozloff R, Faden R, Steinauer DD. Privacy and security of personal information in a new health care system. J Amer Med Assoc 1993 270: 2487-2493
Oddity with Delicious Bookmarks and RSS Feed Creating Symlinks – How and Why What is a Symbolic Link? 1. Hard Links 2. Soft Links What Would I Use a Symbolic Link For? How Do I Setup a Symbolic Link? ln -s /usr/lib/library.so.0.9.8 /usr/lib/library.so.1.0.0 So, in the example above, the file library.so.1.0.0 is LINKED or pointed back to the actual file library.so.0.9.8.  To setup a hard link you’d drop the -s flag: ln /tmp /other/location/tmp rm /other/location/tmp How Do I Fix Hackety Hack on Debian? As promised, the solution to fixing Hackety Hack on Debian.  First, you need to find/locate the libraries that it complains about.  In the first error I received, it was looking for libssl.so.1.0.0.  I use the mlocate package which has the command ‘locate’ to find libssl.so as follows: devnet@lostlap:~$ locate libcrypto The output tells me that there is a libssl.so.0.9.8 in two locations:  /usr/lib and /lib.  I’ll need to symbolically link both of those with a soft link so that when the program looks for the file libssl.so.1.0.0 it finds it and the link points it back to libssl.so.0.9.8. sudo ln -s /usr/lib/libssl.so.0.9.8 /usr/lib/libssl.so.1.0.0 sudo ln -s /lib/libssl.so.0.9.8 /lib/libssl.so.1.0.0 sudo ln -s /usr/lib/libcrypto.so.0.9.8 /usr/lib/libcrypto.so.1.0.0 sudo ln -s /lib/libcrypto.so.0.9.8 /lib/libcrypto.so.1.0.0 Security 101 – Passwords for the Web While there is nothing I can do about the first one, there is something I can do about the second. I figured it might be a good idea to share how I generate passwords for web resources like Gmail and any other web based service.  I can do this in ANY browser…Opera, Chromium, and Firefox…and any operating system; because I use a tool called LastPass. LastPass is a password vault for your browser.  It can remember any password you type on the web and it can also fill out forms for you (if you’d like).  I’ve been using it for about years now but have only recently taken advantage of their handy tools to generate passwords.  I’m going to walk you through setting it up in Firefox and generating passwords.  Hopefully, this will inspire you to change your password to something a little more complex to thwart hackers. First of course, install the add-on/extension.  This process will differ depending on your browser.  Once LastPass is installed, make sure you sign up for an account or sign in to your existing one.  Remember, LastPass allows you to use a master password to keep a lock on your entire array of of websites you visit.  It takes security a step further by way of password generation. Password Generation You already have passwords for email, Facebook, Twitter, and other places on the web.  Is your password complex enough to thwart hackers attempts to crack it?  Most likely the answer is no…and if that’s the case, it would be a great idea to change your passwords to randomly generated ones and use last pass to remember it.  Imagine your password being the following: With LastPass it can become Which one seems harder for hackers to figure out to you?  So let’s get started.  During the installation for LastPass it should have told you how to access the menu…either through a standard menu or perhaps a button.  Once you access the LastPass menu, look for ‘tools’ and then choose ‘Generate Secure Password’. This should bring up the LastPass password generation tool.  It will look something like this: LastPass Password GeneratorAs you can see, the generator is ready to randomly generate more passwords for you by clicking the ‘generate’ button and you can copy it to your clipboard with the ‘copy’ button.  However, 8 digit passwords (default setting) may not be good enough for you.  In that case, click the ‘Show Advanced Options’ toggle.  This will bring up the following options: Advanced Options As you can see, you can increase the number of digits for password length…I’ve increased mine to 14 characters…and you can increase the Minimum Digit Count.  I’ve done so and moved it up to 2 digits.  Customize it however you like and once you have it set the way you like it, you can click ‘close’.  The options will save for the next time you go to generate a password. Changing the Password Now it’s time for us to actually change a password.  How do we do this?  Well, if you already had a LastPass account, you can visit your password vault and search for the site you would like to change.  Once you find it, you can open up the password generator and generate a new password…then edit the site inside your password vault and paste the new password.  Your job isn’t over yet though as you need to go to the actual site and change the password there as well. If you haven’t used LastPass before, just visit the site you would like to change the password at and login.  LastPass will detect that you’re logging in and will ask if you want to remember the site you just logged in to.  You should select ‘save site’. After you’ve logged in, go to whatever password change link the site provides and go ahead and change the password using the LastPass password generation tool pictured above.  LastPass should detect that you’re changing the password and ask if you want to update the site.  Remember, you can always manually edit the password inside the LastPass Vault. Why Generate Passwords I’ve shown this process to people I work with in Information Technology and they scoff at this idea of having randomly generated passwords.  They often say ‘how will I remember the randomly generated password?’ and that’s the beauty of LastPass.  It remembers so you don’t have to.  Once I tell them this, they generally move onto the question ‘well, what do I do if LastPass isn’t installed on the computer I’m using?’ and once again, the solution is LastPass.  Just head over to www.lastpass.com and login using your account details.  You’ll be redirected to your online password vault.  You’ll be able to fully manage everything as if you were using the extension in your browser.  You’ll also be able to copy and paste passwords by clicking ‘edit’ on the sites and ‘show’ beside the password field.  Sure it’s a bit more work…but it’s also quite a bit more secure. Don’t put your trust in things you think are difficult for hackers to guess…chances are, it isn’t that hard for them to do so…allow LastPass to randomly generate them for you.  That way, you’ll never have your email account hacked like my friends did these past few months…unless you really do want to support the sale of pharmaceuticals or would like to enhance certain appendages.  I hope this helps you to use secure passwords in the future!  If you have questions, please let me know in the comments and I’ll do my best to answer them!  Thanks for reading! CrunchBang Linux Review Default Desktop Login Screen First Run Wizard Where Will You Hide the Bodhi? It just works.  Period. Feedly, Chromium , and Google Reader Feedly, RSS on Steroids
Star Trek Expanded Universe Himiko's starship 13,082pages on this wiki Add New Page Talk0 Share Himiko's starship was a vessel produced by an extinct humanoid civilization on Yamatai in the 4th century BC. It was commandeered and used by the Sun Queen Himiko to travel to Earth and back. In the early 25th century AD, it was commandeered and destroyed by Samantha Hayashi and the other crash survivors from Yamatai. (Star Trek Online: Valkyries). History Edit The starship was originally designed and built in the 4th century BC by an early-warp, humanoid civilization native to Yamatai. When the civilization was destroyed by a polaric ion energy explosion, the ship survived and was used by the non-corporeal Sun Queen Himiko to leave the planet and travel to Earth, where she acquired a body. In the 2nd century AD, Himiko used the starship to return to Yamatai and made several trips to and from the planet as she terraformed it and colonized it with her human subjects. However, when she became trapped on Yamatai in the 3rd century, the starship was hidden in a cave under one of Yamatai's many islands. It remained there, undetected and under guard by Himiko's Stormguard, for over 2,000 years. In 2407, Himiko revealed the location and operation of the starship to Samantha Hayashi while attempting to possess her. After Himiko was killed, Sam used her knowledge to beam herself and the remaining survivors aboard the starship and pilot it out of the atmosphere. Unfortunately, the release of polaric energy on Himiko's death caused a subspace shockwave that threatened the starship. Sam took the ship to maximum warp while inside the Dragon's Head Nebula in an effort to outrun the shockwave. This caused considerable damage to the starship, eventually crippling it. The crew of the USS Nautilus was able to beam away the survivors moments before the shockwave caught up with Himiko's starship and destroyed it. ("Survivors of Yamatai") Design Edit The starship was originally designed by an early-warp culture, and as such its capabilities were limited by Starfleet standards of the 25th century. In particular, the ship had a top speed of warp 5 and could not safely maneuver at that speed. Its deflector was also insufficiently powerful to fully protect the ship from particle densities inside the Dragon's Head Nebula while operating at warp speed. The ship did have a transporter, however, which had been modified to operate in high polaric radiation environments and rigged with a remote control concealed in a silk fan. The ship was capable of water landings and takeoffs. It could also be flown by a single person. By the 3rd century, the interior of the vessel had been cosmetically modified by Himiko to include gilding on most of the surfaces, silk hangings and walls to conceal many of the ship's workings, and a heavily decorated throne for the captain's chair. Ad blocker interference detected!
She Had To Die! The newspaper-reading public, which doubted Ruth Snyder and condemned her, eagerly supported her right to die in the electric chair. State senator William Lathrop Love of Brooklyn urged “equal ‘rights’ for Women Criminals.” “Women should suffer the same penalties that are meted out to men for the crimes they commit,” he maintained. “If a woman enters the competition with men, she has a chance to gain the same ends, and I see no reason why she should not suffer the same penalties.” While the verdict was being awaited in the Snyder case, several papers published accounts of the death in 1899 of Martha Place, the last woman to die in the electric chair in New York; and the Mirror quoted approvingly from then-governor Theodore Roosevelt’s decision denying clemency: “In the commission of a crime...I would deal with the woman as with the man—no whit differently.” On January 10, 1928, while Snyder and Gray waited on death row at Sing Sing, Governor Smith issued a similar statement denying their application for executive clemency. “The execution of this judgment on a woman is so distressing,” he said, “that I had hoped that the appeal to me for executive clemency would disclose some fact which would justify my interference with the processes of the law. But this did not happen.” Pleased with Smith’s decision, the New York Times said in an editorial: “Equal suffrage has put women in a new position. If they are equal with men before the law, they must pay the same penalties as men for transgressing it.” Feminists scarcely could quarrel with the argument for equal rights, yet in this case it smacked unmistakably of expediency rather than justice. No one could claim that Snyder and Gray had been treated “no whit differently” in the courtroom, where Snyder had been tried for adultery and murder, Gray for murder alone. But Ruth Snyder had claimed for herself sexual prerogatives that belonged only to men; through her execution the full implications of “equality” could be brought home to feminists and flappers alike. Arguing that both Gray and Snyder should be executed, Willard Mack gave away the vindictiveness behind the equal rights argument. Ruth Snyder had wanted “one bed” with her lover, Mack said. Let her have “one chair.” In the last act of the drama, both Snyder and Gray did go to the chair on the night of January 12, 1928. And even then Snyder got a bad press. When the sentence was passed on May 9, 1927, the “stone woman” became hysterical, and afterward in her cell she suffered from “nervous paralysis” and “epileptic spasms,” which the papers called “the forerunners of insanity.” Gray, on the other hand, received the sentence “with calmness and prayer.” “Gray finds enough of traditional manhood in him to take his medicine without whining,” reported the Mirror. But “Ruth Snyder—woman—turns to the immemorial device of her sex to wring pity from male hearts. Already she is ill and suffering. Expect her to grow worse and worse as the hour of atonement nears.” In keeping with a Sing Sing tradition of executing the more distraught prisoner first, she went first to the electric chair. She was a “a disheveled wreck” in a drab prison shirtwaist and smock; her blonde hair had gone almost gray. She entered the death chamber murmuring prayers, but cried out and collapsed when she saw the electric chair and had to be lifted into it by the two matrons who accompanied her. Quickly the executioners strapped her in, the matrons retired, Warden Lewis Lawes, who opposed capital punishment, turned away, and while the priest intoned prayers and Snyder, sobbing, cried out, “Father, forgive them for they know not what they do,” chief executioner Robert Elliott threw the switch. An imaginative reporter for the New York World wrote that as the current passed through her body, “her left hand twisted back and upward as if trying to escape the imprisoning strap and the index finger of this hand stiffened in a pointed accusation at herself.” And an imaginative photographer from the Chicago Tribune, smuggled in by the New York Daily News in a last attempt to one-up the Mirror, raised his trouser leg and snapped her picture with a miniature camera strapped to his ankle. She died under the eyes of thirty reporters, doctors, and prison officials—all men—wearing a regulation football helmet wired to two thousand volts. A few minutes later Judd Gray, wearing a well-pressed dark gray suit “with invisible stripe,” entered the room with the prison chaplain. “Here was a man,” said the New York Sun, “who was going to his death with a controlled spirit. He crossed the threshold without the need of a supporting hand. His step was firm and assured. He walked upright, with shoulders thrown back slightly. There was no weakening of the knees, no trembling of hands or lips.” The chaplain recited the Beatitudes, and until the switch was thrown, Gray followed them inaudibly: “Blessed are the poor in spirit; for theirs is the kingdom of Heaven.”
Results for: Eastern-europe In Europe What landforms are in eastern europe? Some landforms of Eastern Europe include the Ural Mountains, the Black Sea, the Baltic Sea, and the Carpathian Mountains. Thanks for the feedback! In Europe Why does Eastern Europe have pollution problems? The IR is a reason for the pollution problems facing Eastern Europe, but not the distinguishing factor between East and West. The reason Eastern Europe faces pollution issues (MORE) How did glasnost affect eastern Europe? Glasnost allowed Western ideas and practices to reach eastern  Europe, which meant the decline of Soviet influence and the  eventual breakup of the Russian-dominated union. (MORE) In Uncategorized What is better the you phone 5c or 5s? Thanks for the feedback! Is Greece in Southern Europe or Eastern Europe? Greece is included in both Southern and Western Europe. Although  geographically located in South-Eastern Europe, Greece is more  commonly associated with Western Europe due (MORE) In Europe What is the GNP GDP of eastern europe? If Europe was split into its 5 regions, the GDP of Eastern Europe would be US$2,083,000,000,000. (compared to its counterpart: Western Europe: US$8,113,000,000,000.) 5 regions (MORE) In Europe Why is it difficult to unify Eastern Europe? Eastern Europe has many ethnic and religious tensions that have been fueled by conflicts over history. Eastern Europe is in peace today, although nowhere near as peaceful as i (MORE) In Europe How did Islam spread in Eastern Europe? When the Ottoman Turks conquered much of eastern Europe, they imposed heavy taxes on the Christians living under their control. Many of the wealthy converted to Islam to avoid (MORE)
Climate Emergency Institute Climate Science Library Methane gas hydrates: A potential threat to climate stability George Papadakis, UK Original Post: Dec. 22, 2011 What is methane hydrate? The term ‘clathrate’ is used to describe a situation of non-bonding molecules that co-exist on a host/guest relationship. It is used specifically to describe “the inclusion of molecules of one kind within the crystal lattice of another” (Webster, 1994). ‘Hydrate’ is a term used to describe a special case of Clathrates where the host molecule is water and the guest molecule is a gas. Therefore, when we speak of methane gas hydrates, we refer to methane gas occupying the lattices of the crystalline structure of frozen water . How was methane hydrate created? Methane gas in hydrates has been produced by the anaerobic decomposition of organic matter dating back to the Pleistocene age. “When the temperature is around the freezing point of water and the pressure is extremely high (26 atmosphere or more), methane combines with water and condenses into methane hydrate, which looks like dry ice[…]Review of previous gas hydrate studies indicates that the formation and occurrence of gas hydrate is controlled by formation temperature, formation pore pressure, gas chemistry, pore water salinity, availability of gas and water, gas and water migration pathways and the presence of reservoir rocks and seals ”. Where does methane hydrate exist? Vast quantities of methane are stored in terrestrial and underwater permafrost. Methane deposits in frozen underwater sediments are found along the outer continental margins where there is ample organic matter supply and very low water temperature. “Promising inventories of methane hydrates have been described in Alaska, Antarctica, the Canadian Arctic, and India, the continental shelf off Japan, Nigeria, the South China Sea, Norway, Peru, and Australia. Most promising for the US are Alaska’s North Slope, Blake’s Ridge, and the Gulf of Mexico ”. How much methane hydrate is there? Scientific consensus currently holds that the global quantity of methane hydrate amounts to 21 x 1015 m3. This estimate has been made independently by Kvenvolden (1988) and Macdonald (1990). Other estimates, both larger and smaller from the consensus estimate, have been made by other scientists. These lie between 1 x 1015 m3 (Ginsburg and Soloviev, 1995) and 139 x 1015 m3 (Gornitz and Fung, 1994). Harvey and Huang (1995) proposed a few estimates but chose 46 x 1015 m3 as their best one. It is likely that the global amount of methane in gas hydrates exceeds 1015 m3 but that it is less than 1017 m3 “with the actual value in the lower or intermediate part of the range ”. The quantity of methane stored in the ocean seabed has been estimated to 10,000-11,000 Gt C . It is estimated that in Siberia alone there are 1,400 billion tons of methane gas hydrates . Although there are methane deposits in Antarctica, estimation about their quantity has not been proposed yet. There is believed to be significantly more methane in oceanic gas hydrates than in arctic ones . The image below shows the available carbon content in methane hydrates in comparison to other carbon sources, including fossil fuels. ​​​Figure 1: How is methane hydrate threatening climate stability? Frozen water containing methane gas is either already melting or in immediate danger of melting due to global warming. As permafrost thaws, methane gas that had been safely trapped in the ice is escaping to the atmosphere. The warming of the oceans is also causing methane to be released from underwater permafrost. Thawing of permafrost followed by an increase in methane concentration has been observed by scientists in Alaska, Siberia and the Arctic. Scientists have also observed methane leakages from the ocean floor off Norway that is believed to be occurring due to recent warming of the ocean . Methane that leaks from the ocean floor was previously thought to dissolve in the water and converted to CO2 by chemical reaction; however a study commissioned by WWF showed that some of the methane escaping from the shallow depth of the arctic shelf reaches the atmosphere without dissolving . “While most of the methane currently released from the seabed is dissolved in the seawater before it reaches the atmosphere, methane seeps are episodic and unpredictable and periods of more vigorous outflow of methane into the atmosphere are possible ”. Deferred over 100 years, methane is 25 times more potent than CO2 as a GHG but methane lasts in the atmosphere about 12 years. The IPCC gives a methane global warming potential of 72 over 20 years and over 10 years it is 100 times CO2. Methane is classified as a long lasting atmospheric GHG by the IPCC. However methane emissions carry on heating after 12 years because this life time is due to atmospheric oxidation to other greenhouse gases notably water vapor and CO2. If Methane release due to melting of permafrost increases, methane will accumulate in the atmosphere faster than it is converted to CO2 and therefore atmospheric concentration of methane will increase. It is estimated that if 10% of methane stored in permafrost was released, it would have an effect similar to a ten-fold increase in CO2. Abrupt warming would occur if the concentration of methane, or CO2, increased suddenly; this would in turn cause further melting of permafrost and release of even more ancient methane deposits ; and therefore it would intensify global warming even further. This phenomenon is known as a ‘positive feedback’. Even if methane accumulates with a slower pace it will still intensify global warming by oxidizing to CO2 which is a less potent greenhouse gas but with a much longer lifetime of 230 years. Has methane gas been linked to past catastrophic events or climate change? Increased atmospheric concentration of methane has been linked to environmental changes during the Paleocene-Eocene Thermal Maximum (PETM) approximately 55.5 million years ago . Temperatures increased by 5oC during the PETM which caused extensive melting of arctic ice. The increase in temperatures and the acidification of the ocean that occurred during the PETM have led scientists to assume that Carbon release was associated with the event, with the most likely candidates being CO2 and CH4 (methane). According to Carozza et al, “more than a single source of carbon is required to explain the PETM onset ”. Methane is also believed to have been involved in a mass extinction event during the end of the Triassic period, 199 million years ago, according to research by Micha Ruhl et al. The outcome of this event was the extinction of half of the life forms known to have existed at that time. Initially, it was assumed that widespread volcanic eruptions that were occurring during that period caused the Earth to warm up and lead to mass extinction. The study of Micha Ruhl et al. suggests that the initial warming caused by the eruptions triggered a positive feedback by causing underwater permafrost to melt and release methane gas to the atmosphere which amplified the warming even more. As a result more methane was released from further melting and caused further warming until conditions became inhospitable and eventually led to mass extinction . How is methane hydrate dealt with nowadays in scope of climate change? Although scientist are alarmed by recorded incidents of methane leakage from methane gas hydrates and by recorded increases in the atmospheric concentration of methane, the majority admits that more data and further investigation is required before assessing how potentially dangerous this might be. However, if the vastness of the methane deposits in naturally occurring methane hydrates is considered, as well as the fact that only a small fraction of available methane is needed to be released in order to trigger abrupt warming caused by a positive feedback effect, it follows that this should be carefully considered in proposed warming scenarios and climate models. At present, this is definitely not the case. The Intergovernmental Panel on Climate Change (IPCC) that operates under the United Nations (UN) is assigned to review scientific evidence and make predictions on future climate change as well as assessments on its socioeconomic impact. Feedback effects, such as the release of methane from gas hydrates, are ignored in current IPCC scenarios and are completely absent from any existing models that the IPCC uses to predict future climate change. The IPCC has therefore received significant criticism from members of the scientific community which characterize their future projections for global warming as ‘conservative’ . How widespread is really methane release from terrestrial and underwater permafrost? Scientific research has shown that the release of methane is far more widespread relevant to the attention it is currently being given. This has been proven by extensive research on methane hydrates in the East Siberian Shelf undertaken by Natalia Shakhova. In a study published in 2008 she writes: “Methane release from continental margins is widespread and contributes methane to shallow sediments have not been considered a methane source to the hydrosphere or atmosphere because seabed permafrost (defined as sediments with a 2-year mean temperature below 0°C), which is considered to underlay most of the ESS, acts as extreme methane supersaturation of surface water, implying high sea-to-air fluxes. .” Shakhova’s research has shown that methane hydrates in the East Siberia Shelf are highly destabilized. She concludes that:  “Further immobilization of stored methane could cause abrupt methane release and unpredictable climatic  consequences.” Shakhova has made similar observations in earlier research on the East Siberian Shelf methane hydrates. Quoting from a study published in 2006: “A hypothesized climate-change-driven increase in methane emission from the Arctic Ocean could dramatically alter not only the regional budget, but also the global cycle .” Based on Shakhova’s conclusions, it is obvious that there is an increased probability of large quantities of methane gas to be released from methane hydrates. As discussed previously, a large atmospheric concentration of methane may have catastrophic consequences. Therefore, if we apply a risk based approach, that is Risk = Probability x Magnitude, we can infer that there is great risk involved in the current processes that methane hydrates, particularly in the East Siberian Shelf, are undergoing. Therefore, it is a global emergency that this matter is considered and taken into account in climate policy planning. Is it possible to use naturally occurring methane hydrate as an energy source? Is this already happening? Methane gas that exists in natural hydrates can be used as fuel upon extraction. It can either be used directly, as pure methane, or converted to methanol and other synthetic fuels. As we approach - if we have not already done so - the peaking of global oil production, methane hydrate will naturally be seen as a very attractive, untapped energy source, “especially when it occurs relatively close to the Earth’s or seabed surface ”. A Literature review of online and offline sources reveals some interesting facts on Research and Development activities of various countries on methane hydrate as a fuel source: “In certain parts of the world characterized by unique economic and/or political motivations, gas hydrate may become a critical sustainable source of natural gas within the foreseeable future, possibly in the next five to ten years ”. “Off the coast of Japan, the first offshore well to test the potential of methane hydrates in the seafloor was drilled in 1999. A second round of drilling here took place in 2003. Japan may be the first country to produce methane from hydrates on a commercial basis. But the head of DOE’s hydrate program has said that the US is determined to be the first to mine them ”. Is methane gas extraction from methane hydrates a wise thing to do? There are many dangers associated with methane extraction from gas hydrates. “Some scientists fear that drilling could destabilize hydrate deposits, triggering major submarine landslides. Around 7,000 years ago, unstable gas hydrates caused a huge landslide off Norway that produced a tidal wave that swamped much of the Shetlands […]. Additionally, there are concerns that a vast new source of fossil fuels will only serve to delay the adoption of more climate-friendly renewable energy technologies ”. Conclusion: Tipping points in the Earth’s Climate The fact that methane is a potent greenhouse gas and that it exists in enormous quantities under the protective shield of terrestrial and underwater permafrost are both scientifically valid and beyond any doubt. Uncertainties do exist as to the involvement of methane in past catastrophic and climate change events but much evidence is in place to suggest that it has played a role in such events and that it may do again. Furthermore more evidence is accumulating which is showing that methane from melting permafrost due to global warming, is escaping to the atmosphere and that atmospheric concentration of methane has increased in hotspot areas such as Siberia . The magnitude of harm that may follow a sudden methane release may very well be nothing less than catastrophic with major consequences to the environment and the well-being of societies, particularly in regions that are most vulnerable. The magnitude of harm that may follow a sudden methane release may very well be nothing less than catastrophic with major consequences to the environment and the well-being of societies, particularly in regions that are most vulnerable. The 1992 UN climate change convention invokes the precautionary principle that measures are to be taken to prevent dangerous levels of atmospheric GHGs accumulating in the atmosphere; even the science is not conclusive. Extreme precaution is required to prevent increasing atmospheric methane concentrations from gas hydrates. Therefore the exclusion of positive feedback effects associated with methane hydrate from climate models and future projections for climate change by the world’s leading organization for climate monitoring , the IPCC, is inexcusable. Tipping Point theory provides a very strong argument for the need to consider the catastrophic potential of methane, were it to be unleashed from naturally occurring methane hydrates. The term was introduced by Malcolm Gladwell in a sociological concept to describe how little causes can have enormous and unpredictable effects . Such a tipping point is very likely to have existed in the Triassic mass extinction event, for example, where a small temperature increase caused by volcanic eruptions escalated to further increase in a non-linear fashion by way of positive feedback triggered by methane release from melting methane hydrates and which eventually led to the wiping out of 50% of known life existing at the time. A characteristic of tipping points is sudden and abrupt change once the threshold is passed. What seems negligent and insufficient to cause an enormous change may only appear so before the tipping point is reached. Thereon, change will occur abruptly and non-linearly. Clearly global climate change risk assessment demands the inclusion of methane hydrates. Risk = Probability x Magnitude. The possible magnitude of Arctic methane destabilization by global warming (regional ocean warming) is enormous and therefore so is the risk. In conclusion the current situation of Arctic methane hydrate instability is a dire planetary emergency for all populations and all future generations. End notes: “Natural Gas Hydrate in Oceanic and Permafrost Environments”, Edited by Michael D. Max, Kluwer Academic Publishers, 2003 “Methane Hydrate: Little Known Energy Resource of the Future”, Kaushik Nath, 2007 “A sleeping giant?” Nature Reports Climate Change Published online: 5 March 2009 “Methane hydrate stability and anthropogenic climate change”, D. Archer, University of Chicago, Department of the Geophysical Sciences, USA, 2007 “Methane and environmental change during the Paleocene‐Eocene thermal maximum (PETM): Modeling the PETM onset as a two‐stage event”, Carozza et al, 2011 “Anomalies of methane in the atmosphere over the East Siberian shelf: Is there any sign of methane leakage from shallow shelf hydrates?”, N. Shakhova et al, 2008 “Methane release and coastal environment in the East Siberian Arctic shelf”, Shakhova and Semiletov, 2006 “Natural Gas Hydrate in Oceanic and Permafrost Environments”, Edited by Michael D. Max, Kluwer Academic Publishers, 2003,1518,547976,00.html “The Tipping Point – How Little Things Can Make a Big Difference ”, Malcolm Gladwell, 2000
A researcher studies the relationship between SAT scores, the test-taker’s family income (Income), and his/her grade point average (GPA). Data are collected from 24 students. A portion of the data is shown; the entire data set, labeled SAT, can be found on the text website. Estimate: SAT = β0 + β1Income + β2GPA + . a. At the 5% significance level, are Income and GPA jointly and individually significant? Show the relevant steps of each test, using the critical value approach. b. Predict SAT if Income is $80,000 and GPA is 3.5. Use these values for the explanatory variables to construct the 95% prediction interval for the individual SATscore. • CreatedJanuary 28, 2015 • Files Included Post your question
Theme for English B Only available on StudyMode • Download(s) : 343 • Published : February 15, 2006 Open Document Text Preview Theme for English B The poem is about a 22-year-old boy from Winston-Salem who is asked by his instructor to write a paper for a class. He tries to find his identity, but has to struggle with the obstacles of racism. At the same time, he shows how we influence each other, whites influencing blacks and blacks influencing whites. Part of the human experience is to learn from one another. He says, "You are white—yet a part of me, as I am a part of you." People strive to be individuals, but it becomes very difficult, because every encounter we have with someone then becomes a part of that person, even if he or she does not want it to. "Sometimes perhaps you don't want to be a part of me. Nor do I often want to be a part of you." The poem itself, I find, is well-structured. At the beginning, the introduction is a little complicated, because it seems like the author has to write something, but he does not know what it is. For instance, what is, indeed, truth? What is it he is attempting to express? At the same time, it is a great introduction, because he makes the connection in the second paragraph (line 6). He gives us a clue as to his motives by asking how simple can it be for a 22-year-old man, colored and new in a place where he is the only African American. He beautifully expresses the reality of his situation. Also, it connects with paragraph 3 (line 16), saying that "it's not easy to know what is true." He seems to be lost tying to find out who he is and exploring his real identity. Not only does he look in different places where he has lived, he even tries listening to the city, building memories of what he likes the most. He continues to reassure himself throughout the poem that he is not different from others just because he is colored. He wants to be equal, based on common traits and characteristics with his fellow human beings. He points this out: "I like to eat, sleep, drink, and be in love. I like to work, read, learn, and... tracking img
HDFS Blocks – Size Does Matter A block is the smallest unit of data that can be stored or retrieved from the disk. In general a Filesystem also consists of blocks which is made out of these blocks on the disk. Normally disk blocks are of 512 bytes and those of filesystem are of a few kilobytes.  In case of HDFS we also have the blocks concept. But here one block size is of 64 MB by default and which can be increased in an integral multiple of 64 i.e. 128 MB, 256 MB, 512 MB or even more in GB’s. It all depend on the requirement and use-cases. So Why are these blocks size so large for HDFS? The main reason for having the HDFS blocks in large size is to reduce the cost of seek time. In general, the seek time is 10 ms and disk transfer rate is 100 MB/s. To make the seek time 1% of the disk transfer rate, the block size should be 100 MB. The default size HDFS block is 64 MB.  Advantages Of HDFS Blocks The benefits with HDFS block are:  • The blocks are of fixed size, so it is very easy to calculate the number of blocks that can be stored on a disk. • HDFS block concept simplifies the storage of the datanodes. The datanodes doesn’t need to concern about the blocks metadata data like file permissions etc. The namenode maintains the metadata of all the blocks. • If the size of the file is less than the HDFS block size, then the file does not occupy the complete block storage. • As the file is chunked into blocks, it is easy to store a file that is larger than the disk size as the data blocks are distributed and stored on multiple nodes in a hadoop cluster. Blocks are easy to replicate between the datanodes and thus provide fault tolerance and high availability. Hadoop framework replicates each block across multiple nodes (default replication factor is 3). In case of any node failure or block corruption, the same block can be read from another node. Big Data HDFS Way Storage was not the biggest concern for the Big Data, the real concern was the rate at which data is getting accessed from the system which is usually used to measure performance of the system and it is determined by the number of I/O ports. As the number of queries to access data increase, the current file system I/O becomes inadequate to retrieve large amounts of data simultaneously. Further, the model of one large single storage starts becoming a bottleneck. One Machine with four io port Consider a machine with 4 I/O channels, each channel having a speed of 100 MB/s. Time taken to read 1 TB of data is : (1024 * 1024)/(100 * 4 * 60 ) = 43.69 mins, approximately 45 mins Solution – To overcome the problems, a distributed file system was conceived that provided solution to the above problems. The solution tackled the problem as 1. When dealing with large files, I/O becomes a big bottleneck. So, we divide the files into small blocks and store in multiple machines. 2. With the advent of block storage, the data access becomes distributed and enables us to combine the power of multiple machines into a single virtual machine, so that you are not limited to the capacity of a single unit. 3. When we need to read the file, the client sends a request to multiple machines, each machine sends a block of file which is then combined together to produce the whole file. 4. As the data blocks are stored on multiple machines, it helps in removing single point of failure by having the same block on multiple machines. Meaning, if one machine goes, the client can request the block from another machine. 5. Since it employs scale-out i.e distributed architecture  its easier to keep pace with data growth problems as well as increasing access demands by adding more nodes to the cluster. In this way, performance and I/O bandwidth all scale linearly as more capacity is added to the storage system. ten machine with four io port Consider 10 machine with 4 I/O channels, each channel having a speed of 100 MB/s. Time taken to read 1 TB of data is : (1024 * 1024)/(100 * 4 * 60 * 10 ) = 4.369 mins, approximately 4.5 mins Handling Failures and Re-Replicating Missing Replicas Data Nodes send heartbeats to the Name Node every 3 seconds via a TCP handshake, using the same port number defined for the Name Node daemon, usually TCP 9000.  Every tenth heartbeat is a Block Report, where the Data Node tells the Name Node about all the blocks it has.  The block reports allow the Name Node build its metadata and insure (3) copies of the block exist on different nodes, in different racks. NameNode detects the absence of a Heartbeat message from a DataNode and marks such DataNodes as dead and does not forward any new IO requests to them presuming it to be dead and any data it had to be gone as well.  Based on the block reports it had been receiving from the dead node, the Name Node knows which copies of blocks died along with the node and can make the decision to re-replicate those blocks to other Data Nodes.  It will also consult the Rack Awareness data in order to maintain the two copies in one rack, one copy in another rack replica rule when deciding which Data Node should receive a new copy of the blocks. replicating missing replicas HDFS Data Replication Stratergy Replication is nothing but keeping same blocks of data on different nodes. hdfs data replicationThe NameNode periodically receives the following from the DataNodes: 1. a Heartbeat implying that the DataNode is functioning properly and 2. a Block report containing the list of all blocks on a DataNode HDFS Architecture HDFS employs master-slave architecture and consists of : 1. Single NameNode which is master and 2. Multiple DataNode which acts as slaves. hdfs architecture HDFS High Level Architecture In the above diagram, there is one Name Node and multiple Data Nodes (servers) with data blocks. When you dump a file (or data) into the HDFS, it stores them in blocks on the various nodes in Hadoop Clusters. HDFS creates several replications of the data blocks and distribute them accordingly in the cluster is a way that will be reliable and retrieved faster. Hadoop will internally make sure that any node failure will never result in data loss. There will be only one machine that manages the file system meta-data. There will be multiple data nodes (These are the real cheap commodity servers that will store data blocks). When we execute a query from a client, it will reach out to Name Node to get the file system meta-data information, and then it will reach out to the Data Node to get the real data blocks. Name Node – HDFS works by breaking large files into smaller pieces called blocks. The blocks are stored on data nodes, and it is the responsibility of the NameNode to know what blocks on which data nodes make up the complete file. The complete collection of all the files in the cluster is referred to as the file system namespace. The namenode manages the filesystem namespace. It maintains the filesystem tree and the metadata for all the files and directories in the tree. So it contains the information of all the files, directories and their hierarchy in the cluster. Along with the filesystem information it also knows about the datanode on which  all the blocks of a file is kept. It is the NameNode’s job to oversee the health of Data Nodes and to coordinate access to data. The Name Node is the central controller of HDFS. A client accesses the filesystem on behalf of the user by communicating with the namenode and datanodes. The client presents a filesystem interface similar to a Portable Operating System Interface (POSIX), so the user code does not need to know about the namenode and datanode to function. The above diagram shows how Name Node stores information in disks. Two different files are – 1. fs image – It’s the snapshot the file system when Name Node is started. 2. Edit Logs – It’s the sequence of changes made to the file system after the Name Node is started. Only in the restart of Name Node, edit logs are applied to fs image to get the latest snapshot of the file system, but Name Node restart are very rare in production clusters which means edit logs can grow very large for the cluster where Name Node runs for a long period of time leading to below mentioned issues – 1. Name Node restart takes long time because of lot of changes has to be merged. 2. In the case of crash we will lose huge amount of metadata since fs image is very old. This is also the reason that’s why Hadoop is known as a Single Point of failure. Secondary namenode – helps to overcome the above mentioned issue. Secondary NameNode Well the Secondary namenode also contains a namespace image and edit logs like namenode. Now after every certain interval of time(which is one hour by default)  it copies the namespace image from namenode and merge this namespace image with the edit log and copy it back to the namenode so that namenode will have the fresh copy of namespace image. Now lets suppose at any instance of time the namenode goes down and becomes corrupt then we can restart  some other machine with the namespace image and the edit log that’s what we have with the secondary namenode and hence can be prevented from a total failure. Secondary Name node takes almost the same amount of memory and CPU for its working as the Namenode. So it is also kept in a separate machine like that of a namenode. Data Nodes – These are the workers that does the real work. And here by real work we mean that the storage of actual data is done by the data node. They store and retrieve blocks when they are told to (by clients or the namenode). Data nodes are not smart, but they are resilient. Within the HDFS cluster, data blocks are replicated across multiple data nodes and access is managed by the NameNode. The replication mechanism is designed for optimal efficiency when all the nodes of the cluster are collected into a rack. In fact, the NameNode uses a “rack ID” to keep track of the data nodes in the cluster. Data nodes also provide “heartbeat” messages to detect and ensure connectivity between the NameNode and the data nodes. When a heartbeat is no longer present, the NameNode unmaps the data node from the cluster and keeps on operating as though nothing happened. When the heartbeat returns, it is added to the cluster transparently with respect to the user or application. Data integrity is a key feature. HDFS supports a number of capabilities designed to provide data integrity. As you might expect, when files are broken into blocks and then distributed across different servers in the cluster, any variation in the operation of any element could affect data integrity. HDFS uses transaction logs and checksum validation to ensure integrity across the cluster. Transaction logs keep track of every operation and are effective in auditing or rebuilding of the file system should something untoward occur. Checksum validations are used to guarantee the contents of files in HDFS. When a client requests a file, it can verify the contents by examining its checksum. If the checksum matches, the file operation can continue. If not, an error is reported. Checksum files are hidden to help avoid tampering. Hadoop Distributed File System (HDFS) Concepts and Design Fundamentals Hadoop Distributed File System (HDFS) is the primary storage system used by Hadoop applications. HDFS is a filesystem developed specifically for storing very large files with streaming data access patterns, running on clusters of commodity hardware and is highly fault-tolerant. HDFS accepts data in any format regardless of schema, optimizes for high bandwidth streaming, and scales to proven deployments of 100 PB and beyond. Because the data is written once and then read many times thereafter, rather than the constant read-writes of other file systems, HDFS is an excellent choice for supporting big data analysis. Hadoop Distributed File System (HDFS) Concepts –  1. Cluster : A hadoop cluster is made by having many machines in a network, each machine is termed as a node, and these nodes talks to each other over the network. computer cluster2. Name Node : Name Node holds all the file system metadata for the cluster and oversees the health of Data Nodes and coordinates access to data.  The Name Node is the central controller of HDFS. 3. Secondary Name Node :  Since Name Node is the single point of failure, secondary NameNode constantly reads the data from the RAM of the NameNode and writes it into the hard disk or the file system. It is not a substitute to the NameNode, so if the NameNode fails, the entire Hadoop system goes down. 4. Data Node : These are the workers that does the real work of storing data as and when told by the Name Node. 5. Block Size: This is the minimum amount of size of one block in a filesystem, in which data can be kept contiguously. The default size of a single block in HDFS is 64 Mb. Fundamentals Behind HDFS Design – 1. Very Large files: Now when we say very large files we mean here that the size of the file will be in a range of gigabyte, terabyte, petabyte or may be more. 2. Streaming data access: HDFS is built around the idea that the most efficient data processing pattern is a write-once, read-many-times pattern. This makes HDFS is an excellent choice for supporting big data analysis. 3. Commodity Hardware: Hadoop doesn’t require expensive, highly reliable hardware. It’s designed to run on clusters of commodity hardware (commonly available hardware that can be obtained from multiple vendors). This leads to an overall cost reduction to a great extent. 4. Data Replication and Fault Tolerance: HDFS works on the assumption that hardware is bound to fail at some point of time or the other. This disrupts the smooth and quick processing of large volumes of data. To overcome this obstacle, in HDFS, the files are divided into large blocks of data and each block is stored on three nodes: two on the same rack and one on a different rack for fault tolerance. 5. High Throughput : In HDFS, the task is divided and shared among different systems. So, all the systems will be executing the tasks assigned to them independently and in parallel achieving high throughput. 6. Moving Computation is Better than Moving Data: HDFS works on the principle that if a computation is done by an application near the data it operates on, it is much more efficient than done far of, particularly when there are large data sets. The major advantage is reduction in the network congestion and increased overall throughput of the system. 7. Scale Out Architecture : HDFS employs scale out architecture as compared to scale up architecture employed by RDBMS. To scale horizontally (or scale out) means to add more nodes to a system, such as adding a new computer to a distributed software application. Scaling out, also known as distributed programming, does something similar by distributing jobs across machines over the network. Hadoop Ecosystem The components of Hadoop Ecosystem are – Hadoop Stack Hadoop Distributed File System (HDFS) –  MapReduce – MapReduce works breaking the processing into two phases – Job Tracker acts as Master and Task Tracker acts as Slave.  Hive – HBase – ZooKeeper – Sqoop – Flume – Oozie – Mahout –
Featured Schools American InterContinental University Colorado Technical University Full Sail University Towson University Signup for email updates! Email signup Computer Programming Careers Career Description Computer Programming Careers: Opt for a Digital Future! Being a computer programmer means being multi talented, since in this field of work you will be required to do whatever it takes to stay on the digital highway. For example computer programmers develop and write languages for computers, not to mention handling and resolving any and all issues a computer might develop in its software or hardware.   Basically, computer programmers are responsible for programming computers, how they will work and making sure the computer delivers the task it was set up for. They write computer programs with the help of different sets of codes and languages. Programmers also create and design softwares for computers which help computers operate. In order to accomplish this, a number of languages are used, which is why majority of programmers know multiple computer languages, each serving a different purpose. Educational Requirements - Computer Programmer: Since the future seems to be computer generated, therefore more and more students are turning towards this subject and getting onto the digital highway. Anyone contemplating computer programming as a career choice will need to have a Bachelors degree in computer sciences, information systems or mathematics. For students with a leaning towards finance are recommended to pursue courses in computer sciences and degrees in accounting and finance. Of course having a firm grasp on various programming skills and experience of working with object-oriented languages such as C++ and Java are mandatory. Computer programmers are required to constantly update their knowledge and skills in their field to stay on top of their game. Advancement Opportunities - Computer Programmer: Computer programming careers begin with a bachelor’s degree at an entry level job, however with time, experience and further qualifications, students might end up running an entire department if not a company. Computer programmers with exposure to business can also branch out towards becoming a system-analyst. Those with exceptional skills in computer languages should think about becoming computer software engineers. The employment projections for this career are quite positive. Professionals not only find themselves drawing a lucrative salary but also find this career challenging and fulfilling. Related Articles • No Entries Found Ask An Expert: Real Questions, Expert Answers Ask your Question
Page 1 of 3 Sligo's Amazing Geology Sunday, March 16, 2008 Smithsonian geologist Janet Douglas, a long-time Takoma Park resident, led 21 adults on a walk through the 500-million-year history of Sligo Creek's geologic evolution, focusing on the area between Maple Avenue and the Flower Avenue playground. We started at a wide, flat rock emerging from the lawn behind the bus stop at the corner of Maple and Sligo Creek Parkway. This rock's grayish color and lumpy texture says a lot about its makeup and origins that we learned along the way. Janet explained that the bedrock now visible in the Park shows evidence of metamorphic processes that require levels of pressure and heat (at least 700° F) only possible beneath mountains 7-10 miles high above the current surface. This is one reason why geologists describe our area as having once been dominated by Himalayan-sized mountains. Erosion over hundreds of millions of years has uncovered these rocks once so deeply buried. The surfaces of many rocks in Sligo are obscured by moss, lichens, and chemical weathering. A freshly broken rock shows its true salt-and-pepper texture. Each bit of color is a crystal grain of muscovite (white or shiny mica), biotite (dark), or feldspar (white or pinkish), the basic constituent minerals of our Sligo rocks. Janet said that these types of minerals, and the size of the grains, indicate a medium grade sandstone that cooled slowly enough from the high pressure and temperature of metamorphism for visible crystals to grow, but not slowly enough for very large crystals to form. Geologists believe this rock material originated as muddy sediments at the bottom of the ancient Iapetus Ocean about 450 million years ago. This ocean separated the proto-North American continent from an approaching volcanic island arch that eventually collided with our continent during the Taconian Orogeny between 460 and 440 million years ago. Embedded within this salt-and-pepper background is a profusion of rock chunks of various sizes called clasts or olistoliths. Geologists infer these fell into the muddy ocean bottom during landslides off the volcanic island chain before the muddy sediments became rock. The lighter-colored objects (mostly schist and metamorphosed quartz-sandstone) are made of quartz and other resistant felsic minerals and may thus protrude from the surface of the rock. The less common darker objects are mostly amphibolite, a metamorphosed igneous rock made of less-resistant mafic minerals (high in magnesium and iron) and often recessed into the rock face.
Food & Drink » Food Flash in the Pan Mother of umami For millennia it was thought that there were only four basic tastes perceptible to humans: sweet, salty, sour and bitter. Plato and Aristotle were on board with this idea, as was their predecessor Democritus, who contributed bitter to the short list of what are now called "taste qualities." It wasn't until about a hundred years ago that another taste, umami, was proposed for inclusion in 1909 by Kikunae Ikeda, a professor at Imperial University of Tokyo. Ikeda wrote, "I believe that there is at least one other additional taste which is quite distinct from the four tastes. It is the peculiar taste which we feel as 'UMAI [meaning brothy, meaty, or savory],' arising from fish, meat and so forth. The taste is most characteristic of broth prepared from dried bonito and seaweed ... I propose to call this taste 'UMAMI' for convenience." The aforementioned broth is called dashi, and the ingredient bonito that he named, aka bonito flakes, are shavings of dried, fermented, smoked tuna. Although Japanese chefs may not have understood the hows and whys, they knew that preparing fish this way and adding it to kelp broth made for a very satisfying bowl of soup, as well as a base for many other dishes. Ikeda's landmark paper, "New Seasonings," details the process by which he identified and extracted the essence of umami from the savory broth. He concludes, "This study has discovered two facts: one is that the broth of seaweed contains glutamate and the other that glutamate causes the taste sensation 'UMAMI.'" The power of umami was already long understood by cooks the world over. But nonetheless, it wasn't taken seriously as an official fifth taste quality until glutamate receptors were discovered on the human tongue in 2000. This proved that humans are engineered to appreciate umami. "The sequencing and functional expression of a human taste receptor for glutamate determined by these studies provides a first molecular basis for Ikeda's pioneering work," noted the Journal of Chemical Senses, in 2002. Several more of Ikeda's observations on umami have withstood the tests of time as well. He noted, for example, that the taste of umami is enhanced with salt, but muted with sugar. John Prescott, in his book Taste Matters, wrote that this is precisely why tomatoes are rarely found in fruit salads and other sweet dishes. There is no tomato shortcake. Rather, the high levels of glutamate in tomatoes make them more suitable for savory applications. Ikeda also noted the distinction between glutamate that is part of a protein molecule, aka bound glutamate, and glutamate that is floating around unattached, known as free glutamic acid. The bound form of glutamate, as is found in muscle protein, isn't available to the receptors. Thus, raw meat has very low levels of umami. • photo by Cathrine L. Walters Some foods have naturally occurring high levels of free glutamic acid, and hence more umami taste. Parmesan cheese and anchovies have helped Italian food get its umami on. The French do it with veal stock, in which flesh and bones are simmered long enough to disassemble the tightest proteins, thereby freeing maximum glutamate. In Southeast Asia umami comes via fish sauce. In America look no further than a charbroiled bacon cheeseburger with ketchup. In addition to being tasty, free glutamic acid is also a neurotransmitter. The cells of Huntington's Disease sufferers can become overstimulated by glutamic acid, making these people potentially sensitive to it. But in the general population, little scientific support has been found for the idea that MSG can cause headaches or other adverse reactions. When glutamate receptors were found, it not only proved that umami is a basic taste, but was taken as evidence that a taste for glutamate offered some kind of evolutionary advantage—otherwise the receptor wouldn't be there. Subsequent studies found a similar glutamate receptor in mice. The mouse receptor was part of a clump of receptors that target a variety of amino acids. Because amino acids are the building blocks of proteins, having a taste pathway dedicated to their detection, the authors of one study note, "... probably had significant evolutionary implications." The multi amino acid receptor in mice is thought to encourage them to consume a variety of amino acids whenever they're available. The glutamate receptor in humans, by contrast, doesn't bind to any other amino acids. This is curious, because glutamate is a non-essential amino acid that our bodies can manufacture from scratch. Why would humans have multiple receptors for it? Many experts believe that, in humans, glutamate has become a signal for the general availability of amino acids. In Taste Matters, Prescott writes that because glutamic acid is an amino acid present in animal and vegetable protein, "... umami taste may act as a signal for the presence of protein, with its effects on palatability therefore promoting consumption." But paradoxically, the umami switch is not triggered by the most protein-dense food of all: meat. As the glutamate is bound up in muscle protein, it isn't free to impart its umami deliciousness. Thus, a taste for umami would not have enticed our ancestors to gorge themselves on a fresh kill. The most convenient and delicious way of releasing free glutamate from meat is to cook it. The processes of heating and browning meat make glutamate, and other amino acids, available to the body, including its glutamate receptors. Cooking also makes the calories in food more accessible, which offered clear evolutionary advantages to our ancestors. Many scientists believe that cooking, and the extra calories it made available, is what led to a dramatic increase in the size and power of the human brain. Perhaps a cultivated taste for glutamate helped seal the evolutionary deal between man and fire. From browned meat to umami-rich broth, fire has allowed the creation of some of the most savory, delicious foods we know. And we can thank our umami receptors for encouraging us to keep cooking. Add a comment
term - turn PC into a dumb terminal [IBM] term [baudrate] [parity] [bits_per_character] [-dial_string] [-ckcmd] term 2400 # Talk to modem at 2400 baud term 1200 7 even # 1200 baud, 7 bits/char, even parity term 8 9600 /dev/tty01 # 9600 baud, 8 bits/char, no parity, use tty01 term -atdt12345 /dev/tty01 # Start with a command to dial out term -cH'echo Hello World!' ... # Bind a shell command to the 'H' key Term allows MINIX to talk to a terminal or modem over RS232 port 1. The program first sets the baudrate, parity and character length, and then forks. The parent sits in a loop copying from stdin (usually the console's keyboard), to the terminal or modem (/dev/tty00). The child sits in a loop copying from the terminal or modem (/dev/tty00) to standard output. Thus when RS232 port 1 is connected to a modem, every keystroke typed on the keyboard is sent to the modem, and every character arriving from the modem is displayed. Standard input and output may be redirected, to provide a primitive file transfer program, with no checking. Any argument that starts with -at is sent out to the modem, usually to dial out. Term accepts several commands that are formed by typing the escape character, CTRL-], and a letter. Type CTRL-]? to see a list of commands. The subshell command is very important, it allows you to type in a ZMODEM command to transfer data. Do not quit term to do this, or your modem line will be reset! Term keeps the modem line open on file descriptor 9 while running the subshell, so you can type <&9 >&9 at the end of your ZMODEM command to connect it to the modem. With -ckcmd arguments you can bind shell commands to keys. The character just after -c is the key to use, the rest of the characters form the command to bind to the key. This command also has the modem open on file descriptor 9. Important note: to use term, it is essential that /etc/ttytab is configured so that there is no login session started on the modem line. If there is, both the login session and term will try to read from the modem, and nothing will work. rz(1), sz(1).
Presentation is loading. Please wait. Presentation is loading. Please wait. CNT devices Since their first discovery and fabrication in 1991, CNTs have received considerable attention because of the prospect of new fundamental science. Similar presentations Presentation on theme: "CNT devices Since their first discovery and fabrication in 1991, CNTs have received considerable attention because of the prospect of new fundamental science."— Presentation transcript: 1 CNT devices Since their first discovery and fabrication in 1991, CNTs have received considerable attention because of the prospect of new fundamental science and many potential applications. 2 Avouris, IBM 3 Stretching And confined deformation Strain of less than 1% results in the CNT changing from metal to semiconductor. 4 Twisting and bending 5 The encapsulated fullerenes can rotate freely in the space of a (10, 10) tube at room temperature, and the rotation of fullerenes will affect C60@(10, 10) peapod electronic properties significantly; generally, orientational disorderwill remove the sharp features of the average density of states (DOS). However, the rotation of fullerenes cannot induce a metal–insulator transition. Unlike the multicarrier metallic C60@(10, 10) peapod, the C60@(17, 0) peapod is a semiconductor, and the effects of the encapsulated fullerenes on tube valence bands and conduction bands are asymmetrical. The distances between the centres of the fullerenes are 0.984 and 1.278 nm for the C60@(10, 10) peapod and C60@(17, 0) peapod, respectively. Peapods J. Chen, and J. Dong, J. Phys. Condens. Matter, 16, 1401 (2004) 7 It is shown that, by appropriate work function engineering of the source, drain and gate contacts to the device, the following desirable properties should be realizable: a sub-threshold slope close to the thermionic limit; a conductance close to the interfacial limit; an ON/OFF ratio of around 1000; ON current and transconductance close to the low-quantum-capacitance limit. Semiconducting behavior in nanotubes was first reported by Tans et al. in 1998. Fig. 5 shows a measurement of the conductance of a semiconducting SWNT as the gate voltage applied to the conducting substrate is varied. The tube conducts at negative Vg and turns off with a positive Vg. The resistance change between the on and off state is many orders of magnitude. This device behavior is analogous to a p-type metal–oxide– semiconductor field-effect transistor (MOSFET), with the nanotube replacing Si as the semiconductor. At large positive gate voltages, n-type conductance is sometimes observed, especially in larger-diameter tubes. McEuen et al., IEEE Trans. Nanotechn., 1, 78 (2002) 8 Semiconducting nanotubes are typically p-type at Vg=0 because of the contacts and also because chemical species, particularly oxygen, adsorb on the tube and act as weak p-type dopants. Experiments have shown that changing a tubes chemical environment can change this doping levelshifting the voltage at which the device turns on by a significant amount. This has spurred interest in nanotubes as chemical sensors. Adsorbate doping can be a problem for reproducible device behavior, however. Controlled chemical doping of tubes, both p- and n-type, has been accomplished in a number of ways. N-type doping was first done using alkali metals that donate electrons to the tube. This has been used to create n-type transistors, p-n junctions, and p-n-p devices. Alkali metals are not air-stable, however, so other techniques are under development, such as using polymers for charge-transfer doping Scattering sites in nanotubes: I–V characteristics at different Vgs for a p- type SWNT FET utilizing an electrolyte gate in order to improve gate efficiency. McEuen et al., IEEE Trans. Nanotechn., 1, 78 (2002) Implying a mean-free path of approx. 700 nm.Maximum transconductance dI/dVg=20uA/V at Vg=-0.9V. Normalizing this to the device width of ~2nm: 10mS/um. 10 Bottom - gated CNT FET 13 Calculated conductance vs gate voltage at room temperature, varying (a) the work function of the metal electrode, and (b) doping of the NT. In (a) the work function of the metal electrode is changed by -0.2 eV (red dashed), -0.1 eV (orange dashed), 0 eV (green), +0.1 eV (light blue), and +0.2 eV (blue), from left to right, respectively. In (b) the doping atomic fraction is n-type 0.001 (red), 0.0005 (orange), and 0.0001 (green), and p-type 0.0001 (blue dashed), from left to right, respectively. Thus the gate field induces switching by modulating the contact resistance (the junction barriers). Oxygen adsorption at the junctions modifies the barriers (i.e. the local band-bending of the CNT) and affects the injection of carriers (holes or electrons). 14 The inverse subthreshold slope, which is a measure of the efficiency of the gate field in turning on the device, decreases with a decrease in gate oxide thickness. This behavior cannot be explained by conventional field-effect transistor models, and has in fact been shown to be a result of the presence of Schottky barriers at the metal/nanotube interface at the source and drain. 15 There is a clear difference in the inverse subthreshold slope for the case of sweeping all gate segments together (S = 400 mV/dec) versus sweeping only the inner segments (S = 180 mV/dec). We attribute the observed change in S to a change from Schottky barrier modulation to bulk switching. (b) shows linear plots of the subthreshold portion ( where the current is dominated by carrier density ) of the transfer characteristics when the inner gate segments are swept together or separately. The current nearly identical, despite the fact that the effective gate lengths differ by a factor of 1.6. This is in contrast to the expected behavior of diffusive transport, where the current varies inversely with the gate length. 16 Calculated output characteristics of the symmetric ( dashed lines) and the asymmetric ( solid lines) CNFET. 18 We have introduced nanotemplate to control selective growth, length and diameter of CNT. Ohmic contact of the CNT/metal interface was formed by rapid thermal annealing (RTA). Diameter control and surface modification of CNT open the possibility to energy band gap modulation. 20 Diode-like rectifying behavior was observed in a CNx /C multiwalled nanotube due to its being one half doped with nitrogen. FETs based on an individual CNx /C nanotube were fabricated by focused ion-beam technology. The nanotube transistors exhibited n-type semiconductor characteristics, and the conductance of nanotube FETs can be modulated more than four orders of magnitude at room temperature. The electron mobility of a CNx /C NT FET estimated from its transconductance was as high as 384 0 cm2/Vs. The n-type gate modulation could be explained as due the effect of bending of the valence band in the Schottky-barrier junction. 21 CNTs doped with fullerenes inside nanotubes (so-called peapods) are interesting materials for novel CNT FET channels. Transport properties of various peapods such as C60-, Gd@C82-, and Ti2@C92-peapods have been studied by measuring FET I-V characteristics. Metallofulleren peapod FETs exhibited ambipolar behavior both p- and n-type characteristics by changing the gate voltage, whereas C60-peapod FETs showed unipolar p-type characteristics similar to the FETs of intact single-walled nanotubes. This difference can be explained in terms of a bandgap narrowing of the single-walled nanotube due to the incorporation of metallofullerenes. The bandgap narrowing was large in the peapods of metallofullerene, where more electrons are transferred from encapsulated metal atoms to the fullerene cages. The entrapped fullerene molecules are capable of modifying the electronic structure of the host tube. It is, therefore, anticipated that the encapsulation of fullerene molecules can play a role in band gap engineering in nanotubes and hence that peapods may generate conceptually novel molecular devices. 22 Schematic illustration of elastic strain distributed around the site of metallofullerenes in a small-diameter nanotube peapod and the corresponding changes in conduction and valence band edges. Charge transport in a partially filled peapod FET in metal-on-top setup. (a) Transfer characteristics at various temperatures. Data were taken at Vds = 0.3 V. 23 CNT junction Current vs. voltage characteristics of an all-carbon transistor with semiconducting nanotube as channel, with different voltages at the carbon gate. The back gate is kept at 0 V. The measurements were carried out at 4 K. 24 The band profile of the SB CNTFET at the minimal leakage bias (VG=0V) for VD=0.6V. The band profile of the MOS CNTFET when the source-drain current is low. (VD=0.6V and VG=-0.3V). The channel is a (13,0) nanotube. Ambipolar conduction leads to a large leakage current that exponentially increases with the power supply voltage, especially when the tube diameter is large. An asymmetric gate oxide SB CNTFET has been proposed as a means of suppressing ambipolar conduction. SB CNTFETs of any type, however, will likely suffer from the need to place the gate electrode close to the source (which increases parasitic capacitance) and metal-induced gap states, which increase source to drain tunneling and limit the minimum channel length. 25 Id vs. Vd characteristics at VG = 0.4V for the MOS CNTFET (the solid line) and the SB CNTFETs (the dashed lines). The off-current of all transistors (defined at Vd=0.4V and Vg=0) was set at 0.01µA by adjusting the flat band voltage for each transistor. For the SB CNTFETs, three barrier heights we simulated. The channel is a (13,0) nanotube, which results in a diameter of d 1 nm, and a bandgap of Eg 0.83 eV. Id vs. Vg characteristics at Vd = 0.4V for the zero barrier SBFET and the MOS CNTFET. The gated channel of both transistors is a 5nm-long, intrinsic (13, 0) CNT. By eliminating the Schottky barrier between the source and channel, the transistor will be capable of delivering more on-current. The leakage current of such devices will be controlled by the full bandgap of CNTs (instead of half of the bandgap for SB CNTFETs) and band-to-band tunneling. These factors will depend on the diameter of nanotubes and the power supply voltage. Similar presentations Ads by Google
Thursday, September 26, 2013 What is transfer price? • The commercial transaction between various multinationals corporations(MNCs) or groups or independent units of same organisations may not subject to market forces. • One party or group or unit transfers to another goods,services at some price. • This price is called 'Transfer price(TP)'. • Profit or loss may not be taken into consideration while deciding TP. • TP may be dictated or arbitrary independent of market forces. Transfer Pricing refers to prices of transaction between associated enterprises which may take place under conditions different from those taking place between independent enterprises. Let us consider an example. Suppose there are two companies parent company  A and its subsidiary company  B. • A purchases goods for 1 lakh and sell it to B for 2 lakh . • B sells the same goods for 7 lakhs. • Here B earns a profit of 5 lakhs. If A would have decided to sell goods directly A would have earned  6 lakhs. But A restricted itself to the profit of 1 lakh only and given chance to B to appropriate the profit. Thus the transaction between A and B is arranged and not governed by market forces. • Here TP is 2 lakh i.e price fixed by A to sell goods to B. • Arm length Price(AP) is 7 lakhs at which B sells goods. Let's see why it is done and what are its implications... • Here let us suppose parent company A resides in country India where taxes are more and subsidiary B resides in tax haven Mauritius where taxes are less. • Now the profit earned by A by direct selling goods would have attracted high taxes but in above scenario  A would show less income and hence subject to less tax. • B would earn good profit as the tax on its income would be very less or no tax.Here A saved tax by using transfer pricing mechanism. In this case the result is India has lost tax revenue and drain on foreign reserves.  In nut shell this can be stated as  A group which manufacture products in a high tax countries may decide to sell them at a low profit to its affiliate sales company based in a tax haven country. That company would in turn sell the product at an arm's length price(AP) and the resulting (inflated) profit would be subject to little or no tax in that country. The result is revenue loss and also a drain on foreign exchange reserves. Technical definition of arm length price(AP)  “arm’s length price” means a price which is applied or proposed to be applied in a transaction between persons other than associated enterprises, in uncontrolled conditions; In above example B would sell goods to local markets in Mauritius at inflated price which is 7 lakhs. Why is it bad? • Though transfer pricing is not illegal, but concerns are growing in number of countries that large corporations are not paying their fair share of taxes.  • In a recent article in The Guardian, Nobel Price wining economist Joseph Stiglitz while stressing on the point in favour of a global deal to stop multinationals from taking advantage of rules noted:  • “Our multinationals have learned how to exploit globalization in every sense of the term—including exploiting the tax loopholes that allow them to evade their global social responsibilities.”  • Number of countries are not only working to plug the loopholes in tax laws but are also strengthening transfer pricing monitoring systems. Recent NEWS --- Current Affairs New transfer pricing rules to lessen tax disputes • Therefore, the government has introduced new tax rules, aimed at reducing litigation with multinational firms over cross-border transactions the government considers tax avoidance schemes. • Known as "safe harbour" rules, the new regulations aim to clarify transfer pricing, over which disputes have surged under a government drive for revenue to narrow a yawning fiscal deficit and stave off a threatened ratings downgrade. The rules will give multi-national companies and the domestic companies having subsidiaries abroad to come for tax estimation with the authorities in advance. The income-tax authorities will not question the pricing of transactions between multinational companies and their subsidiaries under certain situations, which will benefit a host of sectors such as IT and ITES (Information Technology Enabled Services), pharmaceuticals and automobiles. • The new rules will be applicable for five years beginning assessment year 2013-14, instead of the two years specified in the draft as recommended by Rangachary panel. Further the definition of Knowledge process outsourcing (KPO) has been rationalised to provide reasonable distinction from routine business process outsourcing activity. • The safe harbour operating margin has been reduced from 30 per cent to 25 per cent.  • Further the ceiling in respect of KPO transactions has been removed.  Print Friendly and PDFPrint Friendly and PDFPrint Friendly and PDFPrint Friendly and PDF Additional Reading :: Miscellaneous !! Blog Archive
Home » The meaning of «dva» DVA may refer to: Dvaita (द्वैत) is a Sanskrit word that means "duality, dualism". The term refers to any premise, particularly in theology on the temporal and the divine, where two principles (truths) or realities are posited to exist simultaneously and independently. The Kamboja–Dvaravati Route is an ancient land trade route that was an important branch of the Silk Road during antiquity and the early medieval era. The Dvapara Yuga, also spelt as Dwapara Yuga, is the third out of four Yugas, or ages, described in the scriptures of Hinduism. Dvar is a virtual band from Russia that plays darkwave music, though their more recent releases have been coined as Lightwave, for a lack of an existing genre to file their unique sound under. Over the years, there have been many philosophers, writers and other literary figures who have contributed to the Dvaita school of thought, founded by Sri Madhvacharya. The Dwaraka pīţha or Dwaraka maţha, also called Saradha Matha/Peeth and "western peeth", is an ancient monastery situated in the coastal city of Dwaraka, Gujarat, India. In Norse mythology, Dvalinn is a dwarf who appears in several Old Norse tales and kennings. The name translates as "the dormant one" or "the one slumbering" (akin to the Danish and Norwegian "dvale" and Swedish "dvala", meaning "sleep", "unconscious condition" or "hibernation"). Choice of words d-va_ _ dv-a_ _ dva-_ _ dva:_ _ _ _ dva_ _ _ _ dva_ - _ _ _ dva-_ _ _ _ dva _ _ _ _ _ dva _ - _ _ _ _ © 2015-2017, Wikiwordbook.info Copying information without reference to the source is prohibited! contact us mobile version
Exhaust gas temperature, Physics Exhaust gas temperature Monitoring of the temperatures within the engine core is performed by the exhaust gas temperature system. The operating limits of the engine, and monitoring of the mechanical integrity of the turbines during operation, is vital for the continuing serviceability of the engine.  Exhaust gas temperature, abbreviated to EGT, is only one of the terms relating to gas temperature. It can also be known as:- • turbine gas temperature (TGT) • jet pipe temperature (JPT) • turbine inlet temperature (TIT) • turbine blade temperature (TBT) • Intermediate turbine temperature (ITT) 1886_Exhaust gas temperature.png The EGT system consists of a series of thermocouples arranged radially in the exhaust- section of the engine. The exact location is decided by the engine manufacturer; other components within the system are:- • a thermocouple junction box • a balance resistor box (junction box) • indicators on the flight deck. A typical system lay-out is illustrated in Fig. 14.12 . The thermocouple itself consists of two dissimilar metals joined together within the probe body. Gas inlet holes are provided in the outer casing to allow hot gases to circulate around the sensing elements. The most common types of dissimilar sensing wires used are chromel and alumel. The probes may contain more than one thermocouple to sense the temperature at different lengths into the exhaust duct, or adjacent probes may be of different lengths. Some engines may have more than one EGT system. One for FADEC or for temperature limiting. The junction of the two wires (within the probe) is known as the hot or measuring junction; the indicator end is known as the cold or reference junction. The operation is fairly simple, as the thermocouple is a self-generating electrical system. Assuming that the reference end is kept at a constant temperature (flightdeck) and the hot end is subjected to high gas temperatures, then an electromotive force (emf), created by the dissimilar metals. The Seebeck effect causes the indicator to move in proportion to the difference in temperature between the two junctions. The thermocouples are connected electrically in parallel to provide an average gas temperature. The two wires (chromel and alumel) from each thermocouple terminate at the junction box. The chromel wires are connected together to form a parallel circuit, the alumel wire is common to all thermocouples. The junction box can also be used to check the thermocouple continuity during maintenance checks. From the junction box, the chromel and alumel wires are routed to the indicator on the flight deck. In some installations the cold junction is not in the gauge, but is a separate thermocouple located in the intake. The benefit of this system is that when a top temperature system is used to trim the fuel control unit, the majority of the components in the temperature system are located on the engine. It will also indicate the temperature difference across the engine. Posted Date: 9/12/2012 4:40:51 AM | Location : United States Related Discussions:- Exhaust gas temperature, Assignment Help, Ask Question on Exhaust gas temperature, Get Answer, Expert's Help, Exhaust gas temperature Discussions Write discussion on Exhaust gas temperature Your posts are moderated Related Questions BCS theory (J. Bardeen, L.N. Cooper, J.R. Schrieffer; 1957) A theory put forth to describe superconductivity and superfluidity both. This recommend that in the superconducting At 200.0 K, silicon has 1.89 x 10 5 thermally liberated charge carriers/cm 3 . If it is doped with 1 As atom to 3.75 million Si atoms, what is the ratio of doped carriers to t For the series-parallel arrangement shown in Figure, find (a) The supply current, (b) The current flowing by each resistor and (c) the p.d. across each resistor A 100 hp car engine operates ata bout 15 percent efficiency. Assume the engine's water temperature of 85°C is it scold-temperature (exhaust) reservoir and 500°C is its thermal "int Define the interplanar spacing in miller indices. Interplanar spacing d in a cubic lattice Interplanar spacing into a cubic crystal is specified by d = a/(√(h2 + k2 + l Find the resultant of two vectors defined as A=6km east B=8km north Q. In the given circuit, calculate the current through the circuit and mention its direction. Let the current be I. 7 I + 3 I + 5I + 5 I = 10 + 8 - 2 (i.e) 20 I = 1
Born Gay or Genetics Only available on StudyMode • Download(s) : 280 • Published : March 12, 2011 Open Document Text Preview Born Gay or Genetics Homosexuality is a person’s sexual preference. Many people are ashamed, or wish to remain silent because of how the world view homosexuals. People judge and treat them as if they are some kind of different species. Homosexuals are judged and resented by many for religious matters. Scientists have done studies to find out why homosexuals choose to be with the same sex, but these tests are still constantly being studied. Some say it is a choice to be gay, but many people think it is from environmental influence. Homosexuality could evolve from brain structure, possible hormonal influence, or from environmental influence. Since so many people resent homosexual behavior, many find it hard to believe homosexuality really could not be of choice. Debating between this is why scientists have done studies to actually find out the truth. Scientist Simon LeVay has stated after research, “that there is a physiological difference between the brains of heterosexual and homosexual men” (qtd. in Rana). Studies proving the effect of females are the same as males are different. Explaining all of this, the components that organize the brain are the prenatal and perinatal hormones, which creates a female or male brain that produces the behavior of males and females (Rana). The most differentiated portion of the brain is the sexually dimorphic nucleus of the peptic area (Rana). The four cell groups named Interstitial Nuclei of the Anterior Hypothalamus (INAH 1-4) located in this area are three times bigger in men than they are in women; which in the case where there is a homosexual man, his brain is similar to a female (Rana). This is a logical cause to why some men who try to become attracted to the opposite sex is fairly impossible for him. The brain being built different to cause people to be homosexual could also have to do with hormonal influence. Homosexuality is a sexual preference and should not be treated as an unnatural. This act... tracking img
Swan Lake - Romantic Ballet Only available on StudyMode • Topic: Swan Lake, Ballet, The Nutcracker • Pages : 7 (2817 words ) • Download(s) : 1015 • Published : April 4, 2007 Open Document Text Preview ‘Swan Lake' was re-choreographed by Marius Petipa and Lev Ivanov in1895, after initially being choreographed by Julius Reisinger in 1877. The musical score was composed by Pytor Tchaikovsky. ‘Swan Lake' was created towards the end of the romantic period, so the culture and style of romanticism was prominent, with glimpses of the beginning of the classical era. Because of this, it contains elements of both eras. Some of the romantic characteristics include the pursuit of the unattainable, romance, fantasy, focus on the female role, gas lighting and simple sets, pointe work, soft and feminine technique for females and the bell tutu. Some of the classical features include the length of the ballet, the classical tutu and more advanced technique for both males and females. ‘Swan Lake' was first performed in 1877 at the Bolshoi theatre in Moscow, by the Imperial Bolshoi Ballet. ‘Swan Lake' was choreographed originally choreographed by Julius Reisinger, and later re-choreographed more successfully by Marius Petipa an admired and well known choreographer. The Petipa and Ivanov version is the one we still see today. The score was written by Pytor Ilyich Tchaikovsky, a composer who often worked closely with Petipa. During the romantic period, a rapid development in society had occurred. Scientific advances lead to a rise in education, huge interest in poetry the arts, particularly the opera and the ballet, and a rebellion against traditionalism. The romantic era took risks, and tested society in what is acceptable, by raising issues such feminism, religion, and breaking free from the conformity that had been around for years. When ‘Swan Lake' was first performed, it wasn't a success, but not, as some critics said, a failure. The first production of ‘Swan Lake' was performed 41 times with 3 productions over 6 years. This was well above norm of a new ballet. During this first production, it's claimed that the music was far too advanced and complex for this ballet, and the conductor and orchestra did not meet the need of the perspicacious score. The choreography by Julius Reisinger was also considered disjointed and tedious to watch. A critic wrote "Mr. Reisinger's dances are weak in the extreme.... Incoherent waving of the legs that continued through the course of four hours - is this not torture? The corps de ballet stamp up and down in the same place, waving their arms like a windmill's vanes - and the soloists jump about the stage in gymnastic steps." Critics also said that the designs were disjointed as three designers were working on the production, and they worked separately, without discussing their ideas to each other. Anna Sobeshchanskaya, prima Ballerina at the time, did not play role of Odette until the fifth performance, due to political reasons. The governor general of Moscow had given jewels to her, and despite that she went and married a dancer. This offended the Governor General, so the company used Pelagia Mikhailovna Karpakova, a less talented dance to play the lead dual role. Marius Petipa had seen potential in ‘Swan Lake' and took on the challenge of re-choreographing with Lev Ivanov in the other Russian imperial theatre in St. Petersburg, the Marinsky Theatre. This proved far more successful, and because it was produced in 1895, at the beginning of the era in which classical ballets such as the ‘Nutcracker' and ‘Sleeping Beauty' were produced. The elements of the classical ballets were also incorporated into ‘Swan Lake' making it new and exciting for the audience. ‘Swan lake' is a story set in medieval times in Germany, about a compassionate prince who falls in love with a princess who takes the form of a swan by day, due to a spell by an evil wizard von Rothbart. Von Rothbart keeps then apart through several means, but there undying love for each other brings then together, even though their love results in death. In Act I, Prince... tracking img
Classifications of Varmam Human body is divided into five areas in which varmam (varma points) are discussed. They are: Unit Area Number of Points I From Top of the Head till Neck 25 II From Neck till Naval Point 45 III From Naval Point till Anus 9 IV Both Hands 14 V Both Legs 15 Total 108 The same 108 varmams are classified under different categories. One such classification is based on 12 nerves (or a meridian channel) in the nervous system. Each meridian channel consists of one Padu varmam and eight Thodu varmam. Varmam Type Number of Points Thodu Varmam 96 Padu Varmam 12 Total 108 The number of varmams (108) various between various schools of varmam. Based on Indian Astrology, there are 92 varmams: Varmam Based On Number of Points (Hindu Astrological) Stars 27 Lunar 30 Padu Varmam 35 Total 92 Based on the text Naramparai, written by Kumbamuni Siddha, there are 253 varmams: Classification Number of Points Padu Varman 18 Thodu Varmam 96 Pakka Varmam 8 Narambu Elumbu Varmam 86 Maru Varmam 45 Total 253 Based on yet another classification, there are 107 points: Classification Number of Points Vata Varmam (Air) 65 Pitta Varmam (Heat) 24 Kapha Varmam (Cool) 6 Concealed Varmam 12 Total 107 [Previous] [Next] Intro to Varmalogy Varmam Magazine Article Publications Video Articles
Selection and Storage of Fish After reading this article you will learn about the selection and storage of fish. Selection of Fish: There are many different ways of selecting a fish and these do not require any sophisticated tools or deep knowledge. One can easily segregate a good quality fish by carrying out the organoleptic tests, which means using senses such as smell, touch, etc. 1. Feel the Fish: The fish should be free from slime and should not feel dry to touch. Moist fish indicates the freshness. When the flesh is depressed, it should feel firm and should spring back to its original position. The scales should be firmly attached to the fish. 2. Smell the Fish: It should have no foul smell. This is the probably the easiest way of knowing the difference between a fresh and a stale fish. Since it is highly perishable commodity it will smell very unpleasant if it is spoilt. 3. Look at the Eyes: The eyes should be bulging and clear. As the fish would age, the eyes would lose the moisture and would sink into the head. 4. Touch the Fins and the Tail: The fins and the tail should be firm and flexible. Brittle or dry tail is an indication of a spoilt fish. 5. Check the Gills: The gills should be moist and should have a deep red colour with no trace of grey or brown. In case of shellfish, try and procure only live shellfish such as lobsters and crabs. Shells of bivalves should be tightly shut and the ones that are open, tap them slightly if they still don’t shut then discard them. Storage of Fish: In ideal situations the fish should be procured as fresh as possible, but in case if it is not possible for various reasons, then one must follow these steps to keep the seafood safe and fresh to eat: i. Rinse the fish in cold water and pat it dry. ii. Place the fish on bed of crushed ice and place on the perforated pan to allow for drainage. Cover the fish with additional ice and store in the refrigerator until usage. iii. If the fish is not used in the next two days, then take out the fish and repeat the above procedure. While we do that it is important to carry out the organoleptic checks on the fish. iv. Clams, mussels, and oysters should not be kept on ice. Store them in mesh bags in the refrigerator. Oysters stored this way would remain alive for at least two to three weeks. Some restaurants have fish tanks where artificial sea water is created to store shellfish such as lobsters and prawns. v. Do not let the fish to touch the water or to swim in water. vi. Do not let fresh water come in contact with shellfish, otherwise they will get killed. , , , Comments are closed.
Creating a Test Case · Vaadin Vaadin Testbench - Creating Tests - Creating a Test Case  Edit This Page Creating a Test Case Test Setup Test configuration is done in a method annotated with @Before. The method is executed before each test case. The basic configuration tasks are: • Set TestBench parameters • Create the web driver • Do any other initialization TestBench Parameters TestBench parameters are defined with static methods in the com.vaadin.testbench.Parameters class. The parameters are mainly for screenshots and documented in Taking and Comparing Screenshots. Basic Test Case Structure A typical test case does the following: 1. Open the URL 2. Navigate to desired state .. Find a HTML element ( WebElement) for interaction 1. Use click() and other commands to interact with the element 2. Repeat with different elements until desired state is reached 3. Find a HTML element ( WebElement) to check 4. Get and assert the value of the HTML element 5. Get a screenshot The WebDriver allows finding HTML elements in a page in various ways, for example, with XPath expressions. The access methods are defined statically in the By class. These tasks are realized in the following test code: public void basic() throws Exception { // Find an element to interact upon ButtonElement button = // Click the button; // Check that the label text is correct LabelElement label = $(LabelElement.class).first(); assertEquals("Thanks!", label.getText()); You can also use URI fragments in the URL to open the application at a specific state. For information about URI fragments, see Managing URI Fragments. You should use the JUnit assertion commands. They are static methods defined in the org.junit.Assert class, which you can import (for example) with: import static org.junit.Assert.assertEquals; Please see the Selenium API documentation for a complete reference of the element search methods in the WebDriver and By classes and for the interaction commands in the WebElement class. TestBench has a collection of its own commands, defined in the TestBenchCommands interface. You can get a command object that you can use by calling testBench(driver) in a test case. While you can develop tests simply with test cases as described above, for the sake of maintainability it is often best to modularize the test code further, such as to separate testing at the levels of business logic and the page layout. See Creating Maintainable Tests for information about using page objects for this purpose. Creating and Closing a Web Driver Vaadin TestBench uses Selenium WebDriver to execute tests in a browser. The WebDriver instance is created with the static createDriver() method in the TestBench class. It takes the driver as the parameter and returns it after registering it. The test cases must extend the TestBenchTestCase class, which manages the TestBench-specific features. You need to store the driver in the test case with setDriver(). The basic way is to create the driver in a method annotated with the JUnit @Before annotation and close it in a method annotated with @After. public class AdvancedTest extends TestBenchTestCase { public void setUp() throws Exception { setDriver(TestBench.createDriver(new FirefoxDriver())); public void tearDown() throws Exception { This creates the driver for each test you have in the test class, causing a new browser instance to be opened and closed. If you want to keep the browser open between the tests, you can use @BeforeClass and @AfterClass methods to create and quit the driver. In that case, the methods as well as the driver instance have to be static and you need to set the driver in a @Before method. public class AdvancedTest extends TestBenchTestCase { static private WebDriver driver; static public void createDriver() throws Exception { driver = TestBench.createDriver(new FirefoxDriver()); public void setUp() throws Exception { static public void tearDown() throws Exception { Browser Drivers Please see the API documentation of the WebDriver interface for a complete list of supported drivers, that is, classes implementing the interface. All supported browsers require a special driver, as was noted in Installing Browser Drivers.
Eight Divisions East 1915 – the San battle I 2 - Eastern Front When the Germans sent their eight divisions to the east, they brought a new style to warfare there. These, and their chief of staff, Seeckt, had absorbed western lessons—careful registration of guns, observation, camouflage, co-operation between infantry and artillery. German guns did not strew shell around in the Austro-Hungarian manner, in the vague hope of awakening an impression of unconquerable might in enemy breasts. Nor did they, in the Russian manner, disdain their own infantry as a worthless mob, tediously blundering into the skilled tournaments of their betters. German preparations on the field were also superior, since the Germans did not refrain from digging extensively. The local weakness on the part of the two Russian corps facing attack was compounded by the primitiveness of their digging, which alone could provide an answer to the Germans’ artillery-superiority. But this front had been largely inactive since December 1914, and, as the spring thaws came, Russian soldiers disliked digging into ground that might conceal frozen corpses. In any case, no-one foresaw much action, or thought that it needed digging. Prescriptions from France were ignored; the melting of snow and ice made trenches difficult to keep going; and in any case officers sold off some of the equipment for their own trenches. There was not much more than a thin, ill-connected ditch with a strand or two or barbed wire before it; and communications to the rear often ran over open ground. Bonch-Bruyevitch was sent to inspect the field-positions of the various fronts in spring 1915, and reported that III Army’s was ‘not serious’. There was almost no reserve-position, either. 10. Corps had wanted to build one, but was told that, if it could spare the labour for this, it must have more troops than it needed to hold the front line: one regiment was therefore removed from each of its divisions for the Carpathian offensive. A corps—21.—and infantry divisions were removed, replaced at best by cavalry divisions, which required support from the remaining infantry. The infantry that did remain was largely second-line, even territorial, in composition, armed, often, with antiquated rifles they had been barely trained to use. Yet the tactics of the time were that front-lines should be held as strongly as possible: even the Germans held that ‘support-troops should be kept as close as possible to the front-line because they are safer, there, from gunnery’. Minenwerfer and field-mortars were to profit from this. Yet confidence was strangely high. The Germans did their best to obtain secrecy, but, with large-scale, slow troop-movements, this could never be guaranteed, and by the end of April intelligence-reports on the Russian side revealed the presence of powerful German forces. Even on 11th April, as the Germans were reaching their decision, Yanushkevitch warned Alexeyev of the threat to western Galicia. Alexeyev did not respond. He ‘doubted’ the news; in any case he probably wrote off the alarm as yet another of Stavka’s attempts to make him give up troops for someone else’s offensive. On 26th April Dobrorolski, chief of staff of III Army, said the Germans intended ‘breaking through at Nowysącz and north’—exactly correct. The local population of Ruthenes was so Russophil that information came in thick and fast—to such a degree that Seeckt wanted the populace moved out altogether. By 29th April, three German corps were noted; on the 30th desertions from the Austrian army revealed that attack was due to begin on 2nd May. None of this seems to have disturbed Russian confidence. Radko-Dmitriev was told, ‘There is nothing in III Army’s situation to suggest any danger’; the field-fortifications had been ‘strengthened in time’. The best counter would be a renewed Carpathian offensive, particularly by IX Army, with its six infantry and two cavalry corps on the Dniester, far to the south-east. The German break-through was quite a simple affair. It began with a four-hour bombardment on 2nd May that reduced Russian trenches to rubble, swept aside barbed-wire, cut telephones and prevented local reserves from coming up in time. The bombardment ended with Minenwerfer action that scared the ill-trained defenders from their places, and the Russians lost a third of their men through gunfire alone—many of the rest reduced to a state of shock. One German corps attacked the point of junction of the two Russian ones, drove a wedge between them and took 4,000 prisoners in an hour. Since there were no rear positions, the defenders simply moved back into open country, still more vulnerable to gunfire. On that day and the next, the Germans advanced eight miles, and in this area ruined the Russian corps’ defence-system altogether—10. Corps fell from 34,000 rifles to barely 5,000, and a second-line division of 9. Corps further north simply disintegrated. A gap of five miles opened between the two corps. The commander of III Army, was not on the telephone, and was in any case absent for celebration of the St. George Order. But in any case there was little he could do. Local reserves had been pushed in, often through bombardment, in piece-meal style. There was not much else. Two regiments, force-marched into the gap, disappeared in it on 3rd May. Two cavalry divisions, hurriedly summoned, with twenty-four guns between them, also melted away in useless counter-attacks. Half of 63. Division, a second-line one, was marched forward without maps to much the same fate. The only substantial group in reserve was 3. Caucasus Corps, in two groups some way to the rear. It could not arrive until 4th May, and in any case, as Radko-Dmitriev reported, 10. Corps and the cavalry were ‘so seriously disrupted that even the arrival of 3. Caucasus Corps can only serve to cover retreat’. Most of the troops had been swallowed up in inadequate first-line defences, let down by their artillery, unable, in many cases, to use their rifles with skill. In any case many of these divisions existed purely on paper—facts known to the army command, but not, it seems, to the officers of Stavka. The Germans had captured huge numbers of prisoners on the first two days. But they too had suffered. They could not exploit the victory with much speed, for their own supplies had to be hauled up over broken country, and at Biecz they encountered 3. Caucasus Corps, which gave a good account of itself, on 4th–5th May. It proved impossible to move fast enough to cut the roads leading north from the Carpathians, and trap the Carpathian part of III Army. Only one division—Kornilov’s—was caught, partly because its order to retreat came too late, partly because its supply-routes were taken up with other troops’ supplies, partly because Kornilov foolishly counter-attacked: he surrendered on 6th May, with all but five guns. The corps in the region had retired towards the Dukla Pass, and formed something of a line on the river Wisloka, by 6th May. This line was nearly a hundred kilometres in length, more or less running north-south, fifty miles west of the San. It was outflanked to the south as Austrian groups emerged from the Carpathians. The Germans assaulted its western side. Nothing at all had been done to prepare the line. Almost nothing could come in as reserve—Alexeyev had promised the half-strength, second-line 13. Siberian Division, but only half of it could come in—two regiments, not even full-strength. Two battalions of a hastily-composed ‘composite division’—scraped together from oddments found lying around the front—were also sent. But the troops expected to defend the line had been destroyed. Radko–Dmitriev asserted that, while nominally he might have twenty divisions, in fact they were worth five. 10. Corps had been reduced to 1,500 rifles—half of a regiment. He talked of ‘the Germans’ crushing strength, which with numerous artillery has in a short space literally destroyed our trenches and wiped out the defence in places to the last man’. Dragomirov of 9. Corps said ‘territorial troops have been utterly feeble, surrendering in droves’. Ivanov reckoned the army should go back to the San and re-fit. Brusilov was offered command of the entire area. ‘On my honour’ he turned the offer down. Yet Stavka insisted on retention of the Wisloka lines: Italy was about to intervene, IX Army would soon be in a position to attack Austria-Hungary in the Bukovina, such that Romania might come in as well. III Army had already lost over 200 guns; also, its shell-reserve had been expended much faster than foreseen. It now had to suffer shell-shortage, on top of everything. On 3rd May Radko-Dmitriev complained that he needed 50,000 rounds at once. He was told by Kondzerovski, for Stavka, ‘Your demands are in the impossible class’, and he was sent 22,000. On 5th May the demand was for 31,000, supply 18,000. The next day, demand was for 20,000: ‘I know that this cannot square with your earlier warnings on the subject, but my situation is exceptional’. Supply was 12,500, with a demand for proper accounting. This latter came back on 8th May: 9. Corps needed 43,000 and had 4,000; overall, 20,000 were needed at once, and 25,000 daily thereafter. 15,000 were then supplied. Radko-Dmitriev sought to organise a counter-attack. He took 3. Caucasus Corps and 24. with other divisions that had come out of the Carpathians, and attempted counter-attack near the Dukla Pass. This occurred on 7th–8th May, just as a fresh German division came in, a renewed German offensive prepared, and a German stroke on the northern side under way, Radko-Dmitriev said: ‘I have great hopes in this manoeuvre, the only way of restoring the army’s position.’ There was a set-piece battle that gave the Germans thousands of prisoners, 24. Corps dropping to less than a thousand rifles, in a force, nominally, of forty thousand. Further north, the Prussian Guard broke through, forcing a retreat that left the rest of 10. Corps and much of 9. Corps in disorder—the Austrian IV Army, following it, taking thirty thousand prisoners. Only a radical retreat, to the San, could have saved the unbroken part of the army. But Stavka would not allow this at all, and Ivanov’s credit was so low that he could not behave with normal autonomy: on the contrary, he was now begging desperately for reinforcements from Alexeyev’s front. Danilov still behaved as if army corps were of full-strength. He talked grandiosely of counter-attacks. There came a medley of declamation and scripture from the Grand Duke. Ivanov, demanding retreat, was told by Danilov: ‘Your views cannot conceivably be submitted for the Supreme Commander’s approval’; and from the Grand Duke: ‘In view of your staff’s continual demands to retreat on this or that part of the front, you are hereby categorically ordered not to undertake any retreat whatsoever without my express permission’—fine, fighting stuff, that condemned III Army to bleed to death. On 10th May the nerves of Ivanov’s chief of staff broke: ‘The strategic position is quite hopeless. Our line is very extended, we cannot shuttle troops around it with the required speed, and the very weakness of our armies makes them less mobile; we are losing all capacity to fight’. Przemyśl must be given up, together with Galicia; the Germans would invade the Ukraine; Kiev must be fortified; Russia must ‘renounce serious military activity until we have recovered’. He was at once dismissed. But it took more than Stavka’s fortitude to hold III Army, which on 10th May was given permission to retire to the San. It had lost nearly 200 guns, and the Germans had taken 140,000 prisoners, in six days. Of 200,000 men and 50,000 replacements, only 40,000 unwounded men reached the San—10. and 24. Corps barely existed at all; 9. Corps had lost four-fifths; 3rd Caucasus, three-quarters. 21. Corps had 2,000 men, 12. Corps less than 8,000. Even retention of the San would be difficult enough. However, Stavka kept its hopes. On 6th May Alexeyev promised to send a corps and a division (he sent the weak 15. Corps); 5. Caucasus Corps was due to come from Odessa. Above all, the new IX Army would soon be ready for its attack in the Bukovina. Leave a Reply WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s
Some General Shin Buddhist Practice Etiquette Whereas most Buddhist sects and teachings have specific practices that are incorporated into their realization and learning process such as Soto Zen Buddhists utilizing meditation and Nichiren followers chanting the Daimoku, etc. BUT what do we Shin Buddhists have as a "practice"? It is said that Shin Buddhism is the practice of no practice, but where does the idea of practice or "action" come into play in our religious path? For the life of a Shin Buddhist, the recitation of Namo Amida Butsu is "practice" - in every moment of this existence we are called on by Namo Amida Butsu, Infinite Wisdom and Compassion. Therefore, whenever we say Namo Amida Butsu, we are reminded of the presence of the Buddha Amida; Infinite Wisdom and Compassion.* Therefore, etiquette becomes a very important "practice" for us as Nembutsu followers. But what are some examples of "practice" for a Shin Buddhist? 1. One should bow and/or place your hands together in Gassho when coming before a statue or representation of the Buddha. We acknowledge all Buddhas of this universe (including those Buddhas used by other sects) and should pay proper respect as well. Sometimes, the question arises if we should bow when we come in front of statues of Buddha in art galleries and museums? Some people express the opinion that Buddhas in art work are not Buddha representations for religious purposes but if you feel that even a work of art is a representation of the Buddha, you may want to place your hands together in Gassho or even just slightly bow as you pass in front of the art piece of a Buddha or Bodhisattva. 2. When walking in front of any Buddhist temple, it is customary to bow as you pass the front door as an expression of gratitude to the Buddha. Also, if you walk in front of a likeness (statue or portrait) of Shinran Shonin or Rennyo Shonin, you should also stop and bow as you walk in front of the likeness as an expression of your gratitude to our Master. In Japan, most temples are surrounded by walls and there is always a gate through which you enter the temple grounds. When entering the temple grounds through the gate, it is customary to bow as you pass through the gate both when entering and leaving the temple grounds. The one exception when you don't have to bow when you cross in front of the likeness of Amida Buddha is if you are in the hondo or naijin and are cleaning. In this instance, it's not necessary that you bow each time as you cross in front of the likeness of the Amida Buddha, Shinran, Rennyo, etc. more … * The great practice is to say the Name of the Tathagata of unhindered light This practice, embodying all good acts and possessing all roots of virtue, is perfect and most rapid in bringing them to fullness. It is the treasure ocean of virtues that is suchness or true reality. For this reason, it is called great practice. (A Collection of Passages Revealing the True Practice of the Pure Land Way - Shinran)
A library is a wonderful place to promote or run a disc recycling collection or education campaign. Students and non-students alike trust their local library for educational experiences. Recycling and environmental issues are growing more popular everyday, and people are seeking new knowledge to help manage their sustainability and carbon footprint. Libraries also continually receive and dispose of CDs and DVDs. Are you recycling them correctly? The CD Recycling Center focuses on proper disc collection, sorting, handling and recycling. Our mail-in initiative is important for environmental supporters that recycle their discs, and realize curbside recycling does not properly recycle the #7 plastic that CDs and DVDs are manufactured from. We have zero landfill waste here at the center, and we can achieve this by focusing just on CDs, DVDs and related packaging. Curbside cannot properly collect, sort, store and process a few dozen, hundreds, or even thousands of discs. Since we collect millions, it is very easy for us to successfully recycle them. Here’s a suggestion on how to have a collection program at your school: Discs only 1. Choose a convenient location in your Library. 2. Place a recycling receptacle or collection box in this area. Write on it 'Recycle Compact Discs Here'. 3. Post our free CD recycling poster informing people about the importance of CD recycling. 4. Simply take a few minutes, check your all areas where waste discs may be, and other areas for old, scratch, used, over run, or unwanted discs. Spread the word to peolple coming in. 5. Place all the discs into the box. 6. Mark the box 'CDs / DVDs/ HD / Blu-ray Discs only' 1. If you have plastic cases such as a jewel case, or a slim case, please see if you can reuse them, or keep them for future use with perhaps another new disc. 2. If broken or cracked, please collect in a separate box Please write on it 'CD cases here' 3. We accept all standard CD packages, cases and sleeves. 4. If your CD case is a carboard and plastic combination, such as a DigiPak or similar, please tear off the plastic part and place in this box, but see below in regards to the paper. 5. Mark the box 'cases only' Inserts, Covers, Paperwork 1. If you have covers, inserts or any other paper or paper board product that accompanies your compact disc, Please collect in a separate box. 'CD paperwork here' 2. Mark the box 'paper only' When your boxes, bins or pallets are full, please send to: The Compact Disc Recycling Center of America 68E Stiles Road Salem, NH 03079 Yes, the shipping may cost you a small amount, but although you may not realize it, you'll be generating less trash, which you would have to pay to dispose of anyway. Less trash = less weight = less pickups which hopefully means fewer and cheaper trash pick ups. Think about it • You'll generate less trash. • You'll be helping the very planet you live on. • Landfills will be less filled with non-decomposing plastic. • Incinerators will be generating less pollution that hurts our atmosphere. • Your customers will love you for it. (Some may already be expecting that you're already doing it) If needed, you can rent or purchase a CD shredder and CD collection boxes from one of our affiliates Get helpful signs and posters here to support your campaign Start recycling now!
sexta-feira, 8 de outubro de 2010 Computers That Read Minds are Being Developed by Intel August 2010 by Richard Gray He said: "The computer uses a form of 20 questions to narrow down what the word is. "We are currently mapping out the activity that an average brain produces when thinking about different words. It means you'll be able to write letters, open emails or do Google searches just by thinking". Intel already have a working prototype that can detect words such as "screwdriver", "house" and "barn", by measuring around 20,000 points in the brain. But as brain scanning technology becomes more sophisticated the computer's ability to distinguish thoughts will improve. Justin Ratner, director of Intel Laboratories and the company's chief technology officer, said: "Mind reading is the ultimate user interface. There will be concerns about privacy with this sort of thing and we will have to overcome them. "What is clear though is that humans are not restricted any more to just using keyboards and mice".  Sem comentários:
Сonsult a sports coach - pages 2 An Explanation of Cricket Contents Cricket is a team sport for two teams of eleven players each. A formal game of cricket can last anything from an afternoon to several days. Although the game play and rules are very different, the basic concept of c Cricket pitch (not to scale) In the game of cricket, the cricket pitch consists of the central strip of the cricket field between the wickets – 1 chain or 20. 12 m (22 yards) long and 3. 05 m (10 feet) wide The outfield is a sporting term used in cricket and baseball to refer to the area of the field of play further from the batsman or batter than the infield, and in association football to players outside the goal. They always say in commentary that th Under which conditions are sportspeople eligible to compete at Universiade? Additionally, I also wonder to which extent it is common that same person represents a country at both world championships and universiade. I have tried to Google for univers Choosing not to choose One of the deepest understanding you need to have to become really good in squash is movement into the court. The best analogy to explain the deep concept that you need to use in order to move perfectly in the squash court is i Good question! Wikipedia defines caught as A batsman is out caught if a fielder catches the ball fully within the field of play without it bouncing once the ball has touched the striker's bat or glove holding the bat. If a batsman could be given out Let me quote from the rule you have cited. Rule 10, Section 2, Article 1 of the NFL Rules: A Fair Catch is an unhindered catch of an airborne scrimmage kick that has crossed the line of scrimmage, or of an airborne free kick, by a player of the recei Yes, it makes a difference whether it's the serve or in general play. These rules only apply if the shuttle at least gets to the top of the net (or over it) before becoming stuck. If you hit it too low and it gets stuck in the middle of the net witho
Electronic Music Wiki Matrix routing 787pages on this wiki Add New Page Talk0 Share A method of signal routing within a synth in which interconnections between sources and destinations are arranged on a grid, which may be conceptual or physical. In the matrix concept, modulation signal sources (e.g., an LFO) are placed on horizontal lines on the grid, and destinations are placed on vertical lines (or vice versa). Each place where a horizontal and a vertical line intersect, the respective source and destination can be connected together. The matrix concept is physically implemented by the pin matrix, as used on the EMS VCS3 and the ARP 2500. It can also exist in software, or in analog circuitry by the use of an integrated circuit known as a "bilateral switch". The Oberheim Matrix series implement matrix routing as a virtual concept; the performer can select from a list of sources and destinations, place an interconnect on a source-destination pair, and set the signal level which is to be passed through the interconnect. In theory, matrix routing allows everything to be connected to everything else, but there are practical limits. The Oberheim Matrix synths have hardware and software limits on the total number of interconnects that can be active at one time. Pin matrix routing has problems with impedance matching and loading down of signal sources, if a signal is routed to too many destinations, or if too many sources are combined on a destination. Ad blocker interference detected!
Home      Articles     Contact Us       Free Source Code on ASP, Visual Basic, C++, Java Script, Java Our mission is to provide High Quality material Source Code Visual Basic Java Script Additional Resources Visual Basic ▪  C++ Certification Question Papers CCNA Study Questions Some CCNA Certification Exam questions 1. The five steps of Encapsulation: 1) User information is converted to data. 2) Data is converted to segments. 3) Segments are converted to packets or datagrams. 4) Packets or datagrams are converted to frames. 5) Frames are converted to bits. 2. What kind of services are provided by the Presentation layer ? 3. What kind of services are provided by the Session layer ? 4. How to enable a Banner on a Cisco Router ? Router(Config#) banner motd # 5. What are the three ways to display IPX interface e0 ? sh ipx int e0 sh ipx interface e0 sh ipx interface ethernet0 6. What's the default subnet mask for Class A, B and C IP adresses ? Class A Class B Class C 7. Which IP-class provides the least number of Hosts? Class C 8. How to define access-list commands ? wrong: Router(config-if)# access-list 1 permit right: Router(config) # access-list 1 permit The access list will be defined at global level, not at the interface level. It?s a small but important detail. The access group command will be defined at interface level: Router(config) # int e0 Router(config-if) # access-group 1 out 9. What are the access-list ranges of IP (standard and extended) ? 1-99 IP standard access list 100-199 IP extended access list know also: 600-699 Appletalk access list 800-899 IPX standard access list 900-999 IPX extended access list 1000-1099 IPX SAP access list 10. What happens to a packet which receives the end of an access list ? There is an implicit deny any at the end of an access list. So if the packet is not allowed, it will be dropped. 11. Which command is used to view the access-list on serial0 interface ? show access-lists s0 12. How many access-lists are possible on an interface per protocol ? There can be only one access list for in and one for out on each interface per protocol. 13. What is the FrameRelay configuration command for the second subinterface ? interface s0.2 point-to-point interface s0.2 multipoint point-to-point is a direct link between two routers. multipoint is a router in the center as a star of virtual circuits. 14. How to change the Enable Secret password to CCNA ? Router(config)# enable secret CCNA 15. How to change the Enable password to CCNP ? Router(config)# enable password CCNP How to change the Virtual Terminal password to CCIE ? Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password CCIE 16. How to change the Auxiliary password to Cisco ? Router(config)# line aux 0 Router(config-line)# login Router(config-line)# password Cisco How to change the Console password to Cisco ? Router(config)# line con 0 Router(config-line)# login Router(config-line)# password Cisco 17. How to change the Console password to Cisco ? Router(config)# line con 0 Router(config-line)# login Router(config-line)# password Cisco 18. What is the command to show you both source and destination DLCI's in one command ? I'm thinking it is show frame-relay route but I'm not sure. What is the command to show both source and destination addresses in ipx ? debug ipx routing activity (not sure) 19. How are the ISDN protocols defined ? I stands for concepts, terminology and services E stands for existing telephone network Q stands for switching and signaling 20. What are the correct encapsulation type of frame-relay ? Cisco (default), IETF 21. How to monitor Frame-relay activity on a Cisco router ? show interface s0 show frame-relay map 22. What command copies a backup of the ISO image? copy running-config tftp albert 23 .Session layer standards? What are some? (ASCII, NFS, SQL, MIDI, JPEG, etc...) 24. How do you change the admin password on the console? line con o 25. What is the host config file type? 26. How do you load the sys image "beta" from a tftp server? 2c.000.0c56.de34 <-- What protocol, Node, Network id, etc? 27. What are the characteristics of ISDN? (two identical questions with different answer choices) 28. How do you set the frame relay interface s1 bandwidth to 56k? 29. Transport layer functionality? router#cl (Get ambiguous command) (how do you get the choices from here?) 30. How do you move the cursor to the beginning of the line? CTRL + A 31. Session Layer functionality? 32. Presentation Layer Functionality? 33. How do you display an ip address assigned to specific host names? 34. How do you turn on the motd on the router? banner motd # 35. What is the wildcard mask (subnet mask) for this situation? 36. How to display the ipx address on ethernet 0? 37. What protocol is used to convert IP addresses to MAC addresses? ARP 38. What is flow control? Technique for ensuring that a transmitting entity, such as a modem, does not overwhelm a receiving entity with data. When the buffers on receiving device are full, a message is sent to the sending device to suspend the transmission until the data in the buffers has been processed. 39. How do you display the ipx routing updates in or out between routers? (I didn't really understand this question) 40. What password types control access to a router? (pw to access line, password to access EXEC mode, etc...) 41. What are the default encapsulation and LMI type options? 42. What is the ICMP protocol for? Management protocol and messaging service provider for IP. Network Layer internet protocol that reports errors and provides other information relvant to IP packets processing. 43. ISDN protocol standards? (Key in on the categories based on what letter the protocol starts with -- Q, I, E, etc...) 44. What two commands can be used to verify the address config. Match the IPX encapsulation with the IOS encapsulation (i.e. Ethernet_II -> arpa, Ethernet_802.3 -> SAP, etc...) 45. How do you get help with a command syntax? leave a space? type the question mark Reliable transport layer connections support? (acknowledgments, route selection, checkpoints, etc...?) End-to-end communication Responsible for hiding the communications from the higher layers. TCP / UDP 46. How are routing lops prevented? 47. How do you enable IPX on a router? 48. Which technology is appropriate for serial communications? (CPE, Demarc, DTE, CO, etc...) 49. What are the technology implications of 1/2 duplex Ethernet cards? 50. How do you log onto EXEC mode? You have to log in to the router before an Exec command can be entered 51. How do you enter commands on a router? (terminal, a file on a tftp server, etc?) 52. What is a MAC? Error Detection. Responsible for framing and media access 53. How do we deny telnet traffic from <ip address> on S0? 54. What does a manual shutdown look like when you run "show s1 status"? 55. With an ip address and access list, how do you display what interface a list has set? 56. What specifies a second sub-interface on S0? 57. How do you define an interface on a Cisco 7000 or 7500 with a VIP card installed? 58. What are the components of the route command? 59. Which class allows for the fewest hosts? 60. What does the MAC layer of the Datalink layer do? 61. What is actually on the test? According to Cisco you need to be able to configure and manage "simple" networks. What defines "simple" networks (according to Cisco): IP, IGRP, IPX, Serial, AppleTalk, Frame Relay, IP RIP, VLANs, IPX RIP, Ethernet, Access Lists In addition to the recommended study topics you should be very fluent with several other (not all listed) topics. A few examples of these would be: The OSI model, and Cisco Discovery Protocol. A lot of the questions deal specifically with the Cisco IOS, such as installing, logging in, navigating, backing up, and debugging. 62. What is the command to show you both source and destination dlci's in one command. 63. What is the command to show both source and destination addresses in ipx. I'm thinking it is "debug ipx activity". 64. What is half duplex? I know it is you can tx & rx in both directions but only one at a time, but the way they word it is confusing. They say it is transmit connected to receive circuit or vice-versa or they say it is like a one way bridge. The closest answer I could find in the multiple choice it the one way bridge? 65. What are the three ways you could display ipx E0 interfaces: 66. How to define a range of access list: For example, - what is the wild mask you will use. Study Complex subnetting thoroughly. Meaning if you cross 8-bit boundary. For example: take an ip address It is a Class-B network. You use 11-bit for subnetting. You will be asked to choose the correct range of host addresses. Todd has shown the chart which will help you a lot. 67. What's the default subnet mask for Class A, B and C. Copyright 2006  - SourceCode.HimArticles.com  -  All rights reserved SourceCode
Xpandaalu' ni cayuya Diidxa nashi ni hriuladxe' Cadi indou cashiáni. ¡Ma ngasi bia'na ni hranashie'! Pause animation  La Glace Copyright © Isthmus zapotec poem, translated by O Toledo Esteva Love poem translated into zapotec of the isthmus (diidxazá), an indigenous mesoamerican language. Poetry into an merindian language of Oaxaca state. Around 100.000 speakers for the diidxazá also called zapothèque of the coastal plain. There are about 60 varieties of the Zapotheque language. The Zapotecs are the descendants of an important pre-Columbian civilization encountered by the Spaniards during their invasion in the 16th century. There are still many archaeological traces that prove the importance of this civilization. We find their hieroglyphic writing for mathematical and chronological inscriptions. Their religion, dominated by the god of rain and vegetation, the god of maize and fire, and their political organization, probably a theocracy, are the most striking characteristics of this civilization. In the 13th century the Mixtecs beat back the Zapotecs and gain control of their territory. The Zapotecs live today in village communities monogamous, patrilocal and generally endogamous, with an agricultural vocation where the compaternity remains a factor of fundamental social cohesion. American poems
Romanized Bible Text General Information The original manuscripts which represented the Bible in ancient times are believed to have been written in ancient Hebrew (Old Testament) and ancient Greek (New Testament). Those alphabets use many letters which don't exist in our modern alphabet. One way of creating a printable version is the so called Romanized Text. To illustrate just what this source material of the Bible is like, a portion of Genesis is shown below in the Romanized form. Text Font Face Text Size (for printing) BELIEVE Religious Information Source - By Alphabet Our List of 2,300 Religious Subjects None of those actual original manuscripts appear to still exist today. In general, modern Bibles are all based on many copies of the actual manuscripts, and very few of those copies are older than about 1,000 years. See the BELIEVE presentation of the Septuagint for an extensive discussion of the many specific source targums and codices. Finally, the actual translation of the Bible was complicated by several extra facts. The original Ancient Hebrew in which the Old Testament was first written, would have been written without any vowels being recorded. For example, God was referred to as JHWH in the Bible. When the Old Testament was translated into Greek (in the Septuagint), vowels were added, to make words that were meaningful in the Greek language. Since JHWH was apparently unpronouncable, ancient people used several other Names to refer to God, one of which was Adonai. The vowels of this Name were inserted between the letters of JHWH to create a Name we refer to as Jehovah. Greek manuscripts were also somewhat difficult to translate, because they were written with all letters the same size and with no spaces between words or sentences. There is another entry in BELIEVE which is the Literal Translation of each of these words in the original sequence shown here. You might want to look at that, too. Genesis 1:1 Bree'shiyt baaraa' 'Elohiym 'eet hashaamayim w'eet haa'aarets. Genesis 1:2 Whaa'aarets haaytaah tohuu waabohuu wxoshek `al - pneey thowm wruuxa 'Elohiym mraxepet `al - pneey hamaayim. Genesis 1:3 Wayo'mer 'Elohiym yhiy 'owr wayhiy - 'owr. Genesis 1:4 Wayar' 'Elohiym 'et - haa'owr kiy - Towb wayabdeel 'Elohiym beeyn haa'owr uubeeyn haxoshek. Genesis 1:5 Wayiqraa' 'Elohiym laa'owr yowm wlaxoshek qaaraa' laaylaah wayhiy - `ereb wayhiy - boqer yowm 'exaad. Genesis 1:6 Wayo'mer 'Elohiym yhiy raaqiy`a btowk hamaayim wiyhiy mabdiyl beeyn mayim laamaayim. Genesis 1:7 Waya`as 'Elohiym 'et - haaraaqiy`a wayabdeel beeyn hamayim 'asher mitaxat laaraaqiy`a uubeeyn hamayim 'asher mee`al laaraaqiy`a wayhiy - keen. Genesis 1:8 Wayiqraa' 'Elohiym laaraaqiy`a shaamaayim wayhiy - `ereb wayhiy - boqer yowm sheeniy. Genesis 1:9 Wayo'mer 'Elohiym yiqaawuu hamayim mitaxat hashaamayim 'el - maaqowm 'exaad wteeraa'eh hayabaashaah wayhiy - keen. Genesis 1:10 Wayiqraa' 'Elohiym layabaashaah 'erets uulmiqweeh hamayim qaaraa' yamiym wayar' 'Elohiym kiy - Towb. Genesis 1:11 Wayo'mer 'Elohiym tadshee' haa'aarets deshe' `eeseb mazriy`a zera` `eets priy `oseh priy lmiynow 'asher zar`ow - bow `al - haa'aarets wayhiy - keen. Genesis 1:12 Watowtsee' haa'aarets deshe' `eeseb mazriy`a zera` lmiyneehuu w`eets `oseh - priy 'asher zar`ow - bow lmiyneehuu wayar' 'Elohiym kiy - Towb. Genesis 1:13 Wayhiy - `ereb wayhiy - boqer yowm shliyshiy. Genesis 1:14 Wayo'mer 'Elohiym yhiy m'orot birqiy`a hashaamayim lhabdiyl beeyn hayowm uubeeyn halaaylaah whaayuu l'otot uulmow`adiym uulyaamiym wshaaniym. Genesis 1:15 Whaayuu lim'owrot birqiy`a hashaamayim lhaa'iyr `al - haa'aarets wayhiy - keen. Genesis 1:16 Waya`as 'Elohiym 'et - shneey ham'orot hagdoliym 'et - hamaa'owr hagaadol lmemshelet hayowm w'et - hamaa'owr haqaaTon lmemshelet halaylaah w'eet hakowkaabiym. Genesis 1:17 Wayiteen 'otaam 'Elohiym birqiy`a hashaamaayim lhaa'iyr `al - haa'aarets. Genesis 1:18 Wlimshol bayowm uubalaylaah uulahabdiyl beeyn haa'owr uubeeyn haxoshek wayar' 'Elohiym kiy - Towb. Genesis 1:19 Wayhiy - `ereb wayhiy - boqer yowm rbiy`iy. Genesis 1:20 Wayo'mer 'Elohiym yishrtsuu hamayim sherets nepesh xayaah w`owp y`owpeep `al - haa'aarets `al - pneey rqiy`a hashaamaayim. Genesis 1:21 Wayibraa' 'Elohiym 'et - hataniynim hagdoliym w'eet kaal - nepesh haxayaah haaromeset 'asher shaartsuu hamayim lmiyneehem w'eet kaal - `owp kaanaap lmiyneehuu wayar' 'Elohiym kiy - Towb. Genesis 1:22 Waybaarek 'otaam 'Elohiym lee'mor pruu uurbuu uumil'uu 'et - hamayim bayamiym whaa`owp yireb baa'aarets. Genesis 1:23 Wayhiy - `ereb wayhiy - boqer yowm xamiyshiy. Genesis 1:24 Wayo'mer 'Elohiym towtsee' haa'aarets nepesh xayaah lmiynaah bheemaah waaremes wxaytow - 'erets lmiynaah wayhiy - keen. Genesis 1:25 Waya`as 'Elohiym 'et - xayat haa'aarets lmiynaah w'et - habheemaah lmiynaah w'eet kaal - remes haa'adaamaah lmiyneehuu wayar' 'Elohiym kiy - Towb. Genesis 1:26 Wayo'mer 'Elohiym na`aseh 'aadaam btsalmeenuu kidmuuteenuu wyirduu bidgat hayaam uub`owp hashaamayim uubabheemaah uubkaal - haa'aarets * uubkaal - haaremes haaromees `al - haa'aarets. Genesis 1:27 Wayibraa' 'Elohiym 'et - haa'aadaam btsalmow btselem 'Elohiym baaraa' 'otow zaakaar uunqeebaah baaraa' 'otaam. Genesis 1:28 Waybaarek 'otaam 'Elohiym wayo'mer laahem 'Elohiym pruu uurbuu uumil'uu 'et - haa'aarets wkibshuhaa uurduu bidgat hayaam uub`owp hashaamayim uubkaal - xayaah haaromeset `al - haa'aarets. Genesis 1:29 Wayo'mer 'Elohiym hineeh naatatiy laakem 'et - kaal - `eeseb zoree`a zera` 'asher `al - pneey kaal - haa'aarets w'et - kaal - haa`eets 'asher - bow priy - `eets zoree`a zaara` laakem yihyeh l'aaklaah. Genesis 1:30 Uulkaal - xayat haa'aarets uulkaal - `owp hashaamayim uulkol rowmees `al - haa'aarets 'asher - bow nepesh xayaah 'et - kaal - yereq `eeseb l'aaklaah wayhiy - keen. Genesis 1:31 Wayar' 'Elohiym 'et - kaal - 'asher `aasaah whineeh - Towb m'od wayhiy - `ereb wayhiy - boqer yowm hashishiy. Here is the text of Genesis 1:1 as recorded in different Targums: In Hebrew form: Masoretic Text Gen 1:1       בְּרֵאשִׁית בָּרָא אֱלֹהִים אֵת הַשָּׁמַיִם וְאֵת הָאָרֶץ Modern Hebrew Gen 1:1      בראשית ברא אלהים את השמים ואת Onqelos: Gen 01:01      בֲקַדמִין בְרָא יוי יָת שְׁמַיָא וְיָת אַרעָא׃ Pseudo-Jonathan: Gen 01:01      מן אוולא ברא אלקים ית שמייא וית ארעא Neofiti: Gen 01:01      מלקדמין \בחכמה ברא דייי ׳בחוכמתא ברא ייי״2״׳ שכלל׳ושכלל״2״׳ ית שמיא וית ארעא׃ FTP Gen 01:01      בחכמה׳מן לקדמין׳ ברא וייי ושכליל ית שמיא וית ארעא FTV Gen 01:01      בחכמה ברא ה' ית שמיא וית ארעא Paleo-Hebrew ( The language which was used before 585 B.C.) (also called Ancient Hebrew) (THIS is the language in which the Original Bible had been written down. It has no resemblance to modern Hebrew, and understanding of modern Hebrew is of no value in understanding this Ancient Hebrew.) Gen. 1:1   THIS is the language that the Original Old Testament of the Bible had been written down. After about 585 BC, this language began to fall out of use and by about 300 BC, Jewish Rabbis felt it necessary to translate the entire Bible into Greek, as the Septuagint or LXX. Once Aramaic and other later forms of Hebrew writing later developed, the LXX was used as the source text to re-translate the Bible back into Hebrew, but now as the more broadly understandable Aramaic. By the time of Jesus, there were virtually no longer any Rabbis who were capable of reading any remaining texts in Paleo-Hebrew, so this was critically important to do. We also note that the materials and ink used tended to begin disintegrating after even twenty years, so even by Jesus' time, there were certainly no actual Original Paleo-Hebrew texts still in existence, and at best, some Scribal copies of a very few limited texts were still in existence. THESE (partial) targums represent the bulk of all the Paleo-Hebrew text that is now known. We ask that you note that the text of the Aramaic Bible, or the even later Greek and Latin Bibles are NOT the Original text, but are the result of at least two processes of translating the entire text. Hebrew Rabbis complicated this all even further in that after their Scribe created a new copy of the entire Bible text, they always immediately destroyed the source text. That process essentially eliminated any chance of later checking the precise accuracy of the Scribal copies, although we are confident that all Scribes were zealously diligent in avoiding copyists errors. The same text in Romanized form: Gen 01:01      b:aqadmiyN b:rA) ywy yAt $:mayA) w:yAt )ar(A)% Gen 01:01      mN )wwl) br) )lqyM yt $myy) wyt )r() Gen 01:01      mlqdmyN \bxkmh br) dyyy /bxwkmt) br) yyy#2#/ $kll/w$kll#2#/ yt $my) wyt )r()% Gen 01:01      bxkmh/mN@lqdmyN/ br) wyyy w$klyl yt $my) wyt )r() Gen 01:01      bxkmh br) -h' yt $my) wyt )r() Also, see: Transliteration of Hebrew Literal Translation History of the Bible Septuagint and early Manuscripts Translating the Bible Jewish Genesis (Advanced), Bereshit. A Thorough Presentation of Jewish Genesis 1 text The individual articles presented here were generally first published in the early 1980s. This subject presentation was first placed on the Internet in May 1997. This page - - - - is at This subject presentation was last updated on - - Copyright Information
Memory Beta, non-canon Star Trek Wiki Dhoraxi mothership 48,871pages on this wiki Add New Page Talk0 Share Dhoraxi mothership 20th Century Dhoraxi mothership The Dhoraxi mothership was an older design starship that was used by the Dhoraxi during the 20th century, but which had been taken out of service before the 23rd century. It was normally not capable of crossing four light-years in just two days because of limits in Dhoraxi propulsion technology. The ship that was commanded by ambassador Xahd managed to do this by operating the engines beyond safety margins and channeling nearly all energy into them, including that normally reserved for life support. By the time the ship had arrived at Earth, only five members of its crew were still alive. The regular crew complement on board a ship of this design was sixty. It carried at least one Dhoraxi scout ship that was used as a shuttlecraft. (TOS comic: "1971/4860.2") The mothership Xahd came with to Earth would eventually enter a decaying orbit and burn up in the atmosphere above Alberta, Canada in 1972, its remaining crew having died of oxygen starvation. Ad blocker interference detected!
19th Century Energy Challenges Over the last 30 years we’ve seen our fair share of energy crises. From the oil embargo and gasoline lines of the ’70s to our recent oil shortages and price inflation, we’ve come to live with energy dilemmas on a daily basis. Lest we believe that these matters are unique to our era, we should look back to the 19th century for some perspective. Many of the issues we face today were also crucial then and are illustrated by the history of the D&H Canal. How these problems were handled holds lessons for us today. From pre-historic times up through most of the 19th century the predominant source of energy used in America, besides animal and human labor, was from wood. In fact, in 1850 90% of the energy consumed in American homes and businesses came from wood. It wasn’t until the 1880’s that coal produced more than 50%. At the turn of the century coal accounted for about 75%. The story told by American cities such as Boston, New York and Philadelphia was a bit different. Coal accounted for a larger share of the energy picture in our urban areas than the country as a whole. Coal took up less storage space per unit of energy than did wood. Wood also didn’t have the advantage of local harvesting that it had in the rural areas of the country. Until the early 19th century, almost all coal used in America was bituminous, most of it of British origin. This coal came predominately from Newcastle in northern England. It wasn’t until 1748 that coal was commercially mined in the U.S. at Richmond, Virginia. Bituminous coal had been discovered there almost 50 years earlier in 1701 by Huguenot settlers. Later during the 18th century, Pittsburgh became another domestic source of commercial coal. Owing to the difficulties and expense in transporting coal long distances over land, most of the Pittsburgh coal was locally consumed. American supplies of imported coal were drastically reduced by the British embargo acts of 1807 and the War of 1812-1815. The British blockade of American ports during the war also impeded the flow of Richmond bituminous coal to American cities up and down the seaboard. This led to America’s first energy shortage and the search for alternative fuels. The anthracite hard-coal fields of Pennsylvania, almost exclusively confined to an area of 485 square miles in eastern Pennsylvania, would help alleviate the shortage of coal. Anthracite wasn’t discovered until 1762. Its inability to easily ignite discouraged its general use at first. Unlike wood and bituminous coal, it required a grate on which to burn and ignited very slowly. It wasn’t until 1808 when it was demonstrated that anthracite could be burned on an open grate without a forced draft that it started to gain acceptance. The fuel was abundant and produced an intense, clean and slow burning flame. It had half-again as much energy as bituminous coal and twice as much as wood. It also had the advantage of being mined in the northeast, close to its urban customers. With the advent of the D&H Canal and its regional rivals, anthracite transport became relatively cheap and fast. The use of anthracite needed vigorous promotion from its advocates since urban dwellers still preferred wood and bituminous coal. It took strong marketing along with a nurturing Pennsylvania government to establish the anthracite market. By 1842 it had all but replaced bituminous coal in America’s seaboard cities. Though the raise of the great railroad systems and the discovery of significant coalfields in Ohio and further west would prove a boon to the bituminous coal industry, Pennsylvania anthracite still was an important energy source during the 19th century. Overall anthracite production steadily grew during the century and peaked in 1895. The story of anthracite coal in the 19th century illustrates how an alternative energy source was fostered in the face of an energy crisis precipitated by events related to the War of 1812. Key to the success of this new energy source was affordable transportation provided by regional canal systems. Competition served to keep coal prices low during the 19th century. Any opportunity to improve coal’s profit margin was eagerly sought. Canal improvements, for example, allowed for larger and larger boats to ply the canalways resulting in reduced transportation costs. The first telegraph line in America was completed in 1844. Four years later in 1848 the D&H Canal Company granted a right-of-way along the canalway for a line that would run from Fredonia on Lake Erie to New York City. The Erie and Western Railroad began using this line in 1851 to dispatch trains. At about the same time, the D&H Canal Company built telegraph offices along the canal and started using the telegraph for dispatching canal boats and regulating traffic. If a washout disabled the canal a “stop the boats” order could be broadcast on the line to halt traffic until the canal was repaired. It wasn’t very long before the canal operators found a new use for the line. Though the D&H Canal didn’t enjoy a monopoly on coal sales in New York City, it was a very significant supplier. By slowing or stopping the delivery of coal to the city, the canal company could help improve the price it would receive for the coal it carried. Especially in times of depressed prices, these “stop the boat” orders were useful in manipulating the price of coal. It seems that holding back an energy supply in order to raise prices is not a new phenomenon and was as legal then as it is today. To learn more about the story of coal in 19th century America, Old Dominion, Industrial Commonwealth: Coal, Politics, and Economy in Antebellum America by Sean Patrick Adams is a valuable reference. Also, the Anthracite Heritage Museum in Scranton, Pennsylvania tells the story of anthracite coal and the people who mined it and is well worth a visit. Copyright 2005 by Stephen Skye Social Widgets powered by AB-WebLog.com.
The Canoeing Merit Badge, although not required, you will find a lot easier to earn if you already have completed your Swimming Merit Badge, First Aid Merit Badge and your 1st Class rank.  Many of the requirements for canoeing are done in these areas and will make the Canoeing Merit Badge much easier to complete. If you like the Canoeing Merit Badge, consider also doing Rowing or Small-Boat Sailing.  You  might also consider working on the Canoeing Merit Badge BEFORE the Whitewater Merit Badge. Scoutmaster Bucky offered this merit badge: Saturday June 26, 2010 Minneapolis, MN  29 Scouts Friday June 25, 2010 Minneapolis, MN 38 Scouts Saturday June 27, 2009 Minneapolis, MN 60 Scouts Scoutmaster Bucky Class Prep Page: click here Scoutmaster Bucky Workbook: click here Canoeing Merit Badge History Page: click here source: Boy Scout Requirements, 2015 Edition 1. Do the following: a. Explain to your counselor the most likely hazards you may encounter while participating in canoeing activities and what you should do to anticipate, help prevent, mitigate, and respond to these hazards. b. Review prevention symptoms and first aid treatment for the following injuries or illnesses that could occur while canoeing: blisters, cold-water shock and hypothermia, dehydration, heat-related illnesses, sunburn, sprains, and strains. c. Discuss the BSA Safety Afloat policy.  Tell how it applies to canoeing activities. 3. Do the following: a. Name and point out the major parts of a canoe. b. Describe how length and shape of a canoe affect its performance c. Discuss the advantages and disadvantages of the different materials used to make canoes. 4. Do the following: a. Name and point out the parts of a paddle.  Explain the difference between a straight and bent-shaft paddle and when each is best used. b. Demonstrate how to size correctly a paddle for a paddler in a sitting position and a kneeling position. 5. Do the following: a. Discuss with your counselor the characteristics of life jackets most appropriate for canoeing and tell why a life jacket must always be worn while paddling. b. Demonstrate how to select and properly fit the correct size life jacket. 6. Discuss with your counselor the general care and maintenance of canoes, paddles, and other canoeing equipment. 7. Do the following: a. Discuss what personal and group equipment would be appropriate for a canoe camping trip. Describe how personal and group equipment can be packed and protected from water. b. Using the containers and packs from Requirement 7a, demonstrate how to load and secure the containers and other equipment in the canoe. c. Using appropriate knots, including a trucker's hitch, tautline hitch, and bowline, demonstrate how to secure a canoe to a vehicle or a trailer, or if those are not available, a rack on land. 8. With a companion, use a properly equipped canoe to demonstrate the following: a. Safely carry and launch the canoe from a dock or shore (both, if possible). b. Safely land the canoe on a dock or shore (both, if possible) and return it to the proper storage location. c. Demonstrate kneeling and sitting positions in a canoe and explain the proper use for each position. d. Change places while afloat in the canoe. 9. With a companion, use a properly equipped canoe to demonstrate the following: a. In deep water, exit the canoe and get back in without capsizing. b. Safely perform a controlled capsize of the canoe and demonstrate how staying with a capsized canoe will support both paddlers. c. Swim, tow, or push a swamped canoe fifty feet to shallow water. In the shallow water, empty the swamped canoe and reenter it. d. In deep water, rescue a swamped canoe and its paddlers by emptying the swamped canoe and helping the paddlers safely reenter their boat without capsizing. 10. With a companion, use a properly equipped canoe to demonstrate the following paddling strokes as both a bow and stern paddler: a. Forward stroke b. Backstroke c. Draw d. Pushaway e. Forward sweep f. Reverse sweep For stern paddling only: g. J-Stroke h. Rudder stroke 11. Using the stroke in Requirement 10, and in an order determined by your counselor, use a properly equipped canoe to demonstrate the following tandem maneuvers while paddling on opposite sides and without changing sides. Each paddler must demonstrate these maneuvers in both the bow and stern and on opposite paddling sides: a. Pivot or spin the canoe in either direction b. Move the canoe sideways or abeam in either direction c. Stop the canoe d. Move the canoe in a straight line for 50 yards 12. Use a properly equipped canoe to demonstrate solo canoe handling: a. Launch from shore or a pier (both, if possible) b. Using a single-blade paddle and paddling only on one side, demonstrate proper form and use of the forward stroke, backstroke, draw stroke, pushaway stroke, forward sweep, reverse sweep, J-stroke, and rudder stroke. Repeat while paddling on the other side c. While paddling on one side only, paddle a 50-yard course making at least one turn underway and one reverse of direction. Repeat while paddling on the other side d. Make a proper landing at a dock or shore (both, if possible). Store canoe properly (with assistance, if needed) 13. Discuss the following type of canoeing: a. Olympic canoe sprint b. Flatwater and river touring c. Outrigger d. Marathon e. Freestyle f. Whitewater g. Canoe poling this page last reviewed and updated - December 2015
134,551pages on this wiki Add New Page Talk0 Share Keratin was a substance that could be found in the physiology of various species. The Gands had a layer of transparent keratin that served to shield their eyes from airborne debris, such as would be present in a sandstorm. The scales of the Barabel were comprised of keratin.[1] Supernova-TSW This article is a stub about a subject or topic of science. You can help Wookieepedia by expanding it. Notes and referencesEdit External linksEdit Ad blocker interference detected!
Friday, January 13, 2012 Mad Libs Memphis We've been learning about parts of speech and how to make them more interesting in our essays because the state writing test is coming up and they need to pass. On Wednesday, we were also looking at context clues and determining the meaning of an unknown word based on the words surrounding it. So I put the following sentences on the board: This morning, as we were jabbering out the door, my chickasaw tried to trip me, but I saw it coming, so I sequestered the door really swishlike and he hit it with his dermis. I laughed so hard, I jumbled off the duvet. Obviously, there are words in there that they don't know and some words are just invented - no idea what a chickasaw is, but it sounded cool, so I threw it in - but I wanted them to be able to determine the part of speech and replace it with an appropriate word. This is what my students came up with (I told them to be the most creative possible): 8-2 Class This morning, as we were passing gas out the door, my toilet tried to trip me, but I saw it coming, so I fought the door really hard in the paint and he hit it with his pancakes. I laughed so hard, I peed off the sink. 8-1 Class This morning, as we were fumbling out the door, my homeroomies tried to trip me, but I saw it coming, so I swooshed the door really boisterously and he hit it with his pelvis. I laughed so hard, I peed off the entertainment unit. Apparently peeing off things is hilarious to 14-year-olds. 8-3 Class This morning, as we were juking out the door, my brother's teeth tried to trip me, but I saw it coming, so I RKO'd (a wrestling move) the door really monstrously and he hit it with his stinky breath. I laughed so hard, I farted off the Eiffel Tower. 8-4 Class This morning, as we were hustling out the door, my ignorant dinosaur tried to trip me, but I saw it coming, so I stiff-armed the door really anxiously and he hit it with his weenus. I laughed so hard, I exploded off the roof. 8-9 Class This morning, as we were moonwalking out the door, my crazy man doing the stanky leg tried to trip me, but I saw it coming, so I used Earl's breath to melt the door really efficiently and he hit it with his dark shady night gums. I laughed so hard, I made my belly roll off the side of Jose's face. Can you tell which class is the most rambunctious of the bunch? New Info on the Mormons A conversation that occurred 10 minutes ago with two students whom I know, but aren't my students. They're pretty good kids. R: "I like 'Napoleon Dynamite,' but it's like everyone in it is high. Their eyes are always half-shut." M: "They're making it into a cartoon! It's gonna be soooo funny!" R: "My mom told me it's a Christian movie, but I'm not so sure." Me: ", it's not a Christian movie, however, it was made by all Mormons." (hint, hint, I'm a Mormon, but they have no idea) M: "Really? I don't like Mormons." Me: "Why?" R: "There are two types of Mormons - the Mormons who are all angelic and the Mormons who do every drug on the planet." Me: "Every drug on the planet? What's the ratio like?" R: "Um, I'd say it's about half and half." I knew Provo's full of half-medicated housewives, but I didn't know that half of us did hard drugs. News to me. Thursday, January 12, 2012 "I've Found the Person I Truly Love!" The math teacher, Ms. M, found this note today in class and shared it. I just wish my students would put this much insight into their actual writing that I grade... This note is between a boy, DB, and a girl, JW, about D's newly-ex-girlfriend, DT. Sad story. DB: "Give me a reason not to cry." JW: "because I don't want to see you cry =(" DB: "I miss her and need her...actually I miss us and need us back." JW: "D, i'm sorry that i have to say this, but you need to move on like she has. i don't want you upset about this anymore." DB: "You don't understand how hard that is for me! I've found the one person I truly love and now I have to move on? I kno life isn't fair but this time its gone to far. She is the one thing that makes me happy! Every time I look at a girl that isn't her, I see nothing but a person standing there but when I look at her, I see love, I see my future, I see life as good again. I can't let that go!! I can't lose her!! I love her and I don't want to lose her love!!" JW: "What the hell do you want me to tell you ?!?! i don't know what to tell you! nothing i say means anything to you! so why do you keep coming to me? you tell me stuff and i don't know what to tell you and that upsets me! so why?!?! idk. i'm sorry but i really don't know what to say. i wish i did but i don't. i'm sorry i yelled at you through words, but it upsets me. look, this is all i can tell you, she has moved on. so you need to before you really fall apart. and none of us want you to fall apart." DB: "Idk how to move on from my true love." JW: "but you know you have to, right?" DB: "No...I will always love her and I will always want to be with her." JW: "i'm sorry, i made you cry didn't i? I should really shut up." DB: "No, it's not ur fault." JW: "but you were fine a min ago until i said something." DB: "I wasn't fine at all, it's what u said...Everyone is asking me to move on, but they don't get how hard it is for me." JW: "I know it must be hard on you. but if you keep holding on you will never be the same D you were at the start of the year. =(" DB: "That was before I fell in love with her..." JW: "D, what do you want me to say that you will listen?" DB: "I am listening but idk how to let her go." JW: "1. don't be around her 2. don't hug or kiss her 3. forget all the date you two had. I know this is hard but you need to do it! and it kills me to tell you this." DB: "But that's what keeps me going. those happy memories remind me of the love we once shared, they remind me that there is someone that wants to be with me." This could totally be an ABC Family tv show... Friday, January 6, 2012 Today, my desk is uncharacteristically clean and void of hundreds of random papers. I say this because I found a random note underneath the only stack of papers on my desk and I have absolutely no idea how it got there. I lifted the stack of papers - which were paperclipped together - to find a note entitled: TO: The Most AMAZING-Sweet-Beautifull girl in the World :) (L <3) FROM: J :) I haven't taken a note from someone since we came back to school on Tuesday and since I cleaned my desk entirely before Christmas break. I don't know who put it there or why it was put there, but I was giddy to have a love note on my desk because those are my FAVORITES to read. Now, I have to hand it to this kid because he's got some swooning skills in the written form. If these students were 10 years older, I might think an engagement was on the horizon (aside from all the smiley faces), but they're 14, so they'll probably break up at lunch today. Presenting, THE NOTE: (: L :) You are the most amazing girl I could ever dream of :) When I look in your beautifull blue eyes, my heart belongs to you* Now you have me mesmerized ;) When we're holding hands I feel this connection between us that gives me the [can't reading handwriting] to never wanna let go <3 Your voice is like an angel, so sweet that everytime we talk it sends this feeling through my body, almost like butterflies in my belly :P Baby there's no way in words to tell you how much I trully care for you, and I promise to be there right beside you through anything and everything <3 No matter the cost* because you deserve every bit of it :) and more!! L, I don't want to rush things, but every word of this comes from my heart.....I love you :) Truer words hath never been spoken thus until now. Bill Shakespeare would be so proud.
Volpone Essay Questions 1. 1 How does the master-slave relationship play out in Volpone? From the standpoint of Elizabethan aristocracy, Volpone is the master and Mosca the slave, but, considering that Volpone is essentially dependent on Mosca, the reverse might be true as well. Which role does each play and how do these roles change as the play progresses? 2. 2 Are the characters in Volpone completely encapsulated by their names? Is Volpone more than just a fox? Is Mosca more than just a parasite? Does Jonson's naming system enhance or diminish the message of the play? 3. 3 Celia and Bonario are arguably two of the most righteous characters in the play. But what of Celia's claim to innocence? Do you consider her protestations to exhibit sadomasochistic desire, and would such desire signify that she has lost her innocence? Further, is her piety indivisible from her chastity? 4. 4 Compared to other comedies of the time period, Volpone has a relatively unhappy ending. In the Epistle, Jonson claims that this is intentional and in accordance with the ancient tradition of comedy. Does Jonson's ending effectively transmit his message? Would his message have been better conveyed by a more triumphant ending? Should Volpone even be considered a comedy? 5. 5 During their lifetimes, Shakespeare and Jonson competed to produce some of the most popular and meaningful works in the English language. Citing specific examples, compare their respective styles. Whose style was more effective in teaching a moral lesson? In making an audience laugh? Which of them should be considered the better Playwright? Should the question be asked at all? 6. 6 In the Epistle, Jonson claims that the "principle end of poesie [is] to inform men in the best reason of living." Do you believe this? How does Volpone support or refute this claim? 7. 7 Also in the Epistle, Jonson declares the "impossibility of any man's being a good poet without first being a good man." Do you believe this? Was Jonson a good man? A good poet? How does Volpone support or refute this claim? 8. 8 What are the roles of Sir Politic Would-be and Peregrine in the play? Is their subplot a distraction or a valuable contribution to the message of Volpone? Has Jonson adhered to Aristotle's Unity of Action as he claims in the Prologue? 9. 9 Volpone's opening soliloquy arguably sets the moral tone of the play. Imagine you are Ben Jonson and you are overseeing an upcoming performance of Volpone. How would you stage this opening scene so as best to convey the message of the play? 10. 10 The theme of Metatheatricality is important to the moral of Volpone insofar as it conveys Jonson's criticism of Elizabethan theater. Which scenes in Volpone qualify as plays-within-the-play? Do they represent meaningful satire or meaningless comic relief? Discuss the roles of Nano, Castrone, and Androgyno in the context of Volpone's message.
Saint Patricks Day Postcard March 17th marks the day that everyone around the world celebrates Saint Patrick's Day. It is a day of celebration filled with parades, parties, and mass for the Catholics for it is a religious holiday for them. Saint Patrick's Day is a day of celebrating everything green from shamrocks to leprechauns. It is also associated with luck and pots of gold. Here in America it is customary to wear green on this day, and if you forget, you will most definitely get pinched. For the most part, it means much more. In reality, Saint Patrick was a patron saint who brought Christianity to Ireland. No one is positive about his identity, but most historians believe that Saint Patrick was actually a man named Maewyn Succat who was born around 373 A.D. in Scotland or Britain. Religion was not new to him because of his upbringing by his wealthy father deacon Calpurnius, and grandfather Potitus, a priest to the people of Bannavem Taburniae. When he turned 16, he was taken into captivity by pirates and sold into slavery in Ireland. In the "Confessio" of Saint Patrick, which is an autobiography that he himself wrote, he states that he was a shepherd while in captivity, and one night in a dream that the lord told him to escape and flee the country. After he escaped and boarded a ship, he returned home to Britain. He attended the Church in Auxerre in Gaul where he studied to become a priest, and later a bishop. After he became a priest, he changed his name to Patrick. After he became a bishop, he returned to Ireland in order to convert the Irish people from their Celtic paganism to Christianity in 432. Legend has it that at the age of sixty, he used a green shamrock as a metaphor for the Holy Trinity, the Father, the Son, and the Holy Spirit to teach the people about Christian doctrine. Loved by the Irish people, he ministered to them for the next thirty years until his death on March 17, 460A.D. Since the time of his death, the Irish has observed Saint Patrick's Day as a religious holiday for well over a thousand years. Traditionally, the Irish people would attend mass in the morning and celebrate in the evening. Even though this holiday fell during the middle of the Christian season of Lent, the rules about consuming meat where waived to allow the traditional feast of cabbage and bacon. It wasn't until the 70's that Ireland allowed pubs and bars to be open on Saint Patrick's Day. Up until that time, it was observed as a religious public holiday. After realizing the opportunity to increase revenue, Ireland decided to play upon the countries holiday to drive tourism to the area. This tactic has worked well considering almost a million tourist take part in the celebrations in Duplin in recent years. Technically, the first celebration of St. Patty's Day in America occurred in Boston, Massachusetts, in 1737. The first parade for this holiday did not take place in Ireland. The first parade commenced in New York City in 1762. As this trend grew over the years, immigrants with a newfound patriotism for their Mother Ireland began creating Irish Aid societies. From these groups the Friendly Sons of Saint Patrick and the Hibernian Society were formed. Today cities all over the United States participate in the celebration of Saint Patrick's Day. Some Interesting Facts About Saint Patrick's Day 1. The color that was originally associated with Saint Patrick's Day was blue. Because of the use of the shamrock it is now associated with green. 2. Saint Patrick's Day didn't become an official public holiday in Ireland until 1903. 3. The first parade held in Ireland to celebrate Saint Patrick's Day was in 1931. 4. The Catholic Church will often change the date of Saint Patrick's Day in any given year that it coincidence with other religious observance like Palm Sunday. 5. The shortest Saint Patrick's Day parade is the distance of 100 yards. It starts at one pub and ends at another. This parade is held in Dripsey, Cork. 6. Saint Patrick's Day is the busiest day of the year for bars. 7. The Shamrock is the National Flower in Ireland. 8. Saint Patrick is best known for driving the snakes out of Ireland. If truth be known, there technically were never any snakes in Ireland to begin with. 9. Many cities use green vegetative dyes to pour into the river to make it turn green on Saint Patrick's Day. Chicago started this trend in 1962. 10. Beannachtaí na Féile Pádraig is the Gaelic expression for "luck of the Irish." 11. This expression rose from the legend about the capture of leprechauns. Once captured a leprechaun would give you gold. 12. Saint Patrick left behind two sets of works, the Confessio and his Epistola. 13. His jawbone is reserved in a silver shrine. 14. Many Catholic places of worship around the world are named after Saint Patrick. 15. It is customary to celebrate the day drinking Irish Whiskey! May the Luck of the Irish be with you this St. Patty's Day!
What Is Heart Disease: What Causes Heart Disease? What causes heart diseaseWhat is heart disease? Heart disease is the blanket term for different heart and cardiovascular diseases. One similarity that all different cardiovascular diseases share is that they effect the structure and functioning of the heart. Heart disease is currently the number one cause of death for both sexes in the United States. [Read more...]
March 23, 2017 font size Systemic Lupus (cont.) Medical Author: Medical Editor: Medical Editor: What is the treatment for systemic lupus? Is there a cure for lupus? There is no permanent cure for SLE. The goal of treatment is to relieve symptoms and protect organs by decreasing inflammation and/or the level of autoimmune activity in the body. The precise treatment is decided on an individual basis. Many people with mild symptoms may need no treatment or only intermittent courses of anti-inflammatory medications. Those with more serious illness involving damage to internal organ(s) may require high doses of corticosteroids in combination with other medications that suppress the body's immune system. People with SLE need more rest during periods of active disease. Researchers have reported that poor sleep quality was a significant factor in developing fatigue in people with SLE. These reports emphasize the importance for people and physicians to address sleep quality and the effect of underlying depression, lack of exercise, and self-care coping strategies on overall health. During these periods, carefully prescribed exercise is still important to maintain muscle tone and range of motion in the joints. To protect from sun sensitivity, sunscreens, sun avoidance, and sun protection clothing are used. Certain types of lupus rash can respond to topical cortisone medications. Nonsteroidal anti-inflammatory drugs (NSAIDs) are helpful in reducing inflammation and pain in muscles, joints, and other tissues. Examples of NSAIDs include aspirin, ibuprofen (Motrin), naproxen (Naprosyn), and sulindac (Clinoril). Since the individual response to NSAIDs varies, it is common for a doctor to try different NSAIDs to find the most effective one with the fewest side effects. The most common side effects are stomach upset, abdominal pain, ulcers, and even ulcer bleeding. NSAIDs are usually taken with food to reduce side effects. Sometimes, medications that prevent ulcers while taking NSAIDs, such as misoprostol (Cytotec), are given simultaneously. Corticosteroids are more potent than NSAIDs in reducing inflammation and restoring function when the disease is active. Corticosteroids are particularly helpful when internal organs are affected. Corticosteroids can be given by mouth, injected directly into the joints and other tissues, or administered intravenously. Unfortunately, corticosteroids have serious side effects when given in high doses over prolonged periods, and the doctor will try to monitor the activity of the disease in order to use the lowest doses that are safe. Side effects of corticosteroids include weight gain, thinning of the bones and skin, infection, diabetes, facial puffiness, cataracts, and death (necrosis) of the tissues in large joints. Hydroxychloroquine (Plaquenil) is an antimalarial medication found to be particularly effective for SLE people with fatigue, skin involvement, and joint disease. Consistently taking Plaquenil can prevent flare-ups of lupus. Side effects are uncommon but include diarrhea, upset stomach, and eye-pigment changes. Eye-pigment changes are rare but require monitoring by an ophthalmologist (eye specialist) during treatment with Plaquenil. Researchers have found that Plaquenil significantly decreased the frequency of abnormal blood clots in people with systemic lupus. Moreover, the effect seemed independent of immune suppression, implying that Plaquenil can directly act to prevent the blood clots. This fascinating study highlights an important reason for people and doctors to consider Plaquenil for long-term use, especially for those SLE people who are at some risk for blood clots in veins and arteries, such as those with phospholipid antibodies (cardiolipin antibodies, lupus anticoagulant, and false-positive venereal disease research laboratory test). This means not only that Plaquenil reduces the chance for re-flares of SLE, but it can also be beneficial in thinning the blood to prevent abnormal excessive blood clotting. Plaquenil is commonly used in combination with other treatments for lupus. For resistant skin disease, other antimalarial drugs, such as chloroquine (Aralen) or quinacrine, are considered and can be used in combination with hydroxychloroquine. Alternative medications for skin disease include dapsone and retinoic acid (Retin-A). Retin-A is often effective for an uncommon wart-like form of lupus skin disease. For more severe skin disease, immunosuppressive medications are considered as described below. Medications that suppress immunity (immunosuppressive medications) are also called cytotoxic drugs. They are sometimes referred to as chemotherapy because they are also used to treat cancer, generally in much higher doses than those used to treat lupus. Immunosuppressive medications are used for treating people with more severe manifestations of SLE, such as damage to internal organ(s). Examples of immunosuppressive medications include methotrexate (Rheumatrex, Trexall), azathioprine (Imuran), cyclophosphamide (Cytoxan), chlorambucil (Leukeran), and cyclosporine (Sandimmune). All immunosuppressive medications can seriously depress blood-cell counts and increase risks of infection and bleeding. Immunosuppressive medications may not be taken during pregnancy or conception because of risk to the fetus. Other side effects are specific for each drug. For examples, methotrexate can cause liver toxicity, while cyclosporine can impair kidney function. In recent years, mycophenolate mofetil (CellCept) has been used as an effective medication for lupus, particularly when it is associated with kidney disease. CellCept has been helpful in reversing active lupus kidney disease (lupus renal disease) and in maintaining remission after it is established. Its lower side-effect profile has advantage over traditional immune-suppression medications. In SLE patients with serious brain (lupus cerebritis) or kidney disease (lupus nephritis), plasmapheresis is sometimes used to remove antibodies and other immune substances from the blood to suppress immunity. Plasmapheresis is a process of removing blood and passing the blood through a filtering machine, then returning the blood to the body with its antibodies removed. Rarely, people with SLE can develop seriously low platelet levels, thereby increasing the risk of excessive and spontaneous bleeding. Since the spleen is believed to be the major site of platelet destruction, surgical removal of the spleen is sometimes performed to improve platelet levels. Other treatments have included plasmapheresis and the use of male hormones. Plasmapheresis has also been used to remove certain harmful proteins (cryoglobulins) that can lead to vasculitis. End-stage kidney damage from SLE requires dialysis and/or a kidney transplant. Research is indicating benefits of rituximab (Rituxan) in treating lupus. Rituximab is an intravenously infused antibody that suppresses a particular white blood cell, the B cell, by decreasing their number in the circulation. B cells have been found to play a central role in lupus activity, and when they are suppressed, the disease tends toward remission. This may particularly helpful for people with kidney disease. Another new B-cell-suppressing treatment is belimumab (Benlysta). Belimumab blocks the stimulation of the B cells (a B-lymphocyte stimulator or BLyS-specific inhibitor) and is approved for the treatment of adults with active autoantibody-positive systemic lupus erythematosus who are receiving standard therapy. It is important to note that the efficacy of belimumab has not been evaluated in patients with severe active lupus nephritis or severe active central nervous system lupus. Belimumab has not been studied in combination with other biologic therapies or intravenous cyclophosphamide. Is there a systemic lupus erythematosus diet? While there is no specific lupus diet, scientists have found that low-dose diet supplementation with omega-3 fish oils could help patients with lupus by decreasing inflammation and disease activity and possibly decreasing heart-disease risk. It is generally recommended that patients with lupus eat a balanced diet that includes plant-based foods and lean sources of protein. DHEA (dehydroepiandrosterone) has been helpful in reducing fatigue, improving thinking difficulties, and improving quality of life in people with SLE. Recent research indicates that DHEA diet supplementation has been shown to improve or stabilize signs and symptoms of SLE. DHEA is commonly available in health-food stores, pharmacies, and many groceries. Medically Reviewed by a Doctor on 1/19/2017 WebMD Daily Get breaking medical news. Use Pill Finder Find it Now See Interactions Pill Identifier on RxList • quick, easy, pill identification Find a Local Pharmacy • including 24 hour, pharmacies Interaction Checker • Check potential drug interactions Search the Medical Dictionary for Health Definitions & Medical Abbreviations
Just about every data scientist and statistician knows that correlation doesn’t necessarily confirm causation. However, popular business and social literature often confuse the two concepts. By understanding the maxim of “correlation is not a cause” more clearly, it’s possible to let loose creativity and imagination of the questioning mind. Humans like to think and speak in declarative terms. For a sampling, imagine statements bandied about by pundits such as; “global warming is caused by humans”, or “the Financial Crisis of 2008 was caused by greedy bankers” or “Republicans lost the 2008 election because they didn’t pay enough attention to immigration issues.” Psychologist and author Sue Blackmore says the simple reminder that “correlation is not a cause” (CINAC), would improve just about everyone’s mental toolkit. Case in point, in an Edge.org article, she gives an example of people filling up a railway station as a scheduled train approaches.  She asks, “Did the people cause the train to arrive (A causes B)? Or did the train cause people to arrive (B causes A)?” The answer she says is they both depended on a railway timetable (C caused both A and B)! Editor's note: Paul Barsch is an employee of Teradata. Teradata is a sponsor of The Smart Data Collective. In linear systems, cause and effect is much easier to pinpoint. However, the world around us is considered a complex system where there are often multiple variables pushing an outcome to occur. Nigel Goldenfeld, a professor of physics at University Illinois, sums it up best: “For every event that occurs, there are a multitude of possible causes, and the extent to which each contributes to the event is not clear. One might say there is a web of causation.” And author Richard Bookstaber says that it’s a difficult search to pinpoint cause in complex systems especially because, “a change in one component can propagate through the system to lead to surprising and apparently disproportionate effect elsewhere, e.g. the famous “butterfly effect””. The concept that in complex systems there is a “web of causation” may not sit right with some individuals, especially since newscasters, publishers, and even a fair portion of scientists prefer to insist on simple declarations of true and false.  However, the very nature of complex systems is that every object is in some way linked to another with either weak or strong ties and often connections are opaque and mysterious. So even a correlation of one, may not necessarily mean A causes B. Freeing ourselves from the shackles of CINAC thinking means we have the possibility to let loose our imaginations says psychologist Sue Blackmore. Each definitive report should be greeted with skepticism. And when “A causes B” is held up as the answer, Blackmore cautions, then the critical mind automatically gets to work thinking; “Maybe instead, B actually causes A! And if not, what are the other opportunities?” It’s human nature to try and explain the world around us. However, when it comes to complexity, we should lead discussions with a measure of humility to include questions and possibilities rather than declarations of certainty. • How does our “aim to explain” end up stifling innovation and creativity? • The US Securities and Exchange Commission posited an explanation for the May 6, 2010 “Flash Crash”, but experts are not buying their simplistic explanation of a single “trigger event”. What are your thoughts?
Origen (ca. 182 - ca. 251) was a Christian scholar and theologian and one of the most distinguished of the Fathers of the early Christian Church. He is thought to have been born at Alexandria, and died at Caesarea. His writings are important as the first serious intellectual attempt to describe Christianity. Biographical sketch Origenes Adamantius was born to a Christian family (most likely in Alexandria), the oldest of seven children. He was initially trained in both secular and religious literature by his father Leonides (who was exceedingly proud of his son's learning). The burden of caring for the family fell upon Origen at the age of seventeen when his father was martyred, so he began to teach. His classes proved so popular that he had to divide them, leaving beginners to an assistant, reserving the more advanced for himself. Origen lived in extreme austerity. Eusebius related that in his rashness he castrated himself, but that account may not be accurate. He was bold in his admiration for martyrs, and many of his students suffered in the persecutions. Despite his lack of care for his own life, he was spared because many pagan philosophers and Christian heretics came to him for instruction. (The Neoplatonist Porphyry was an early acquaintance.) His range of learning was vast. In addition to his father's instruction, Origen also studied under Ammonius Saccas and Clement of Alexandria. For the sake of biblical exegesis, he learned Hebrew. His knowledge of the philosophies of the day, especially Platonism, was profound. While still living in Alexandria, he began to write and compile books. One of the earliest and most significant was De principiis, one of the first efforts toward a systematic theology. Another work was his Hexapla, an enormous edition of the Bible arranged in six columns. It contained the Hebrew text, a Greek transliteration of the Hebrew, the Septuagint, and the Greek versions by Symmachus, Aquila, and Theodotion. The Hexapla was a great aid in the study of the Scriptures. So famous did he become that Mamaea, mother of Emperor Alexander Severus, summoned him to Antioch to instruct her. On his way to Greece, he was ordained as a priest by the bishop of Caesarea. That action was uncanonical and was protested by his own bishop of Alexandria. As a result, he never returned to Egypt but settled down in Caesarea, where he taught for the remainder of his life. Constantly called upon all his life to preach (even when he was a layman), he finally, after he had passed the age of sixty, allowed his homilies to be recorded by shorthand experts. Toward the end of his life (circa 250), he was seized by civil authorities and tortured in an effort to make him apostatize. The persecution, although very severe, failed in its purpose. But it may have contributed to his death not long after. Thus he died, not a martyr, but a confessor. Origen wrote an incredible number of books but the total body of his work has not been preserved. What has been preserved has come down only in part in Greek, the rest in Latin translation. His leading Western interpreter was Tyrannius Rufinus, a friend of Jerome. All of Origen's work was, at least in theory, based on the literal text of Scripture, which he believed to be historical. Origen's exegesis of the text was often allegorical and typological, a style following that adopted by Alexandrian commentators on the Homeric epics. To Origen, Christ was the center and all Scripture must be interpreted in his light. That meant, for Origen, speculation on the spiritual significance of the literal. Along with De principiis and Hexapla he also wrote commentaries on Genesis, the Psalms, Song of Songs, Lamentations, the prophets, Matthew, John, and the Pauline corpus. He is the one who made the well-known remark, "But who wrote the letter to the Hebrews, only God really knows." His homilies treated Genesis, Exodus, Leviticus, Numbers, Joshua, Judges, Ruth, 1 Samuel, Song of Songs, Isaiah, Jeremiah, Ezekiel, and Luke. The details of Origen's life were recorded by his student Gregory Thaumaturgus in a panegyric, by Eusebius in his history, and by Jerome in several references. The first two were favorable. So was Jerome at first, but he later came to disapprove of Origen's exegesis. Yet, Jerome called him the second teacher of the church after Paul. Some of Origen's teachings were condemned by the Fifth Ecumenical Council. The West was more favorable to his writings, albeit usually not by name. But in quite modern times, his fame and his thought have been more or less rehabilitated, owing to the effort to distinguish his doctrines from those attributed to him by his later followers. • Adapted from "Origen" J.D. Douglas, Who's Who in Christian History, Tyndale House, 1992
You are here Indonesia’s forest moratorium, a policy aiming to protect an area the size of Japan from development, represents one of the most ambitious conservation schemes ever established in the country. But is it actually making progress in improving the forest sector? WRI’s new working paper, Indonesia’s Forest Moratorium: Impacts and Next Steps, aims to answer that question and more. The Greenhouse Gas (GHG) Protocol celebrates its 15th anniversary this year; it was established to develop and promote the use of best practices for accounting and reporting GHG emissions. Stephen Russell reflects on the project's history and impact, and discusses next steps for an evolving GHG accounting landscape. Many countries in Africa are rich with trees, wildlife, minerals, and other natural resources. But as new WRI research and an interactive map show, few national laws provide communities with strong, secure rights to the resources on their land. WRI conducted a systematic review of the national framework laws for five natural resources—water, trees, wildlife, minerals, and petroleum—in 49 sub-Saharan African countries. The results are presented in our new Rights to Resources map. Manish Bapna highlights five standout climate and energy stories of 2013, which point to signs that some businesses, consumers, and governments are moving toward a growing understanding of the risks of climate change. The question is whether this heightened awareness will shift a global course quickly enough to reduce negative climate impacts. This blog post was originally published at Forbes. Robust, Recognizable, and Legitimate Stay Connected
Samoa (/səˈmoʊ.ə/; Samoan: Sāmoa, IPA: [ˌsaːˈmoa]), officially the Independent State of Samoa (Samoan: Malo Sa'oloto Tuto'atasi o Sāmoa), formerly known as Western Samoa, is a country encompassing the western part of the Samoan Islands in the South Pacific Ocean. It became independent from New Zealand in 1962. The two main islands of Samoa are Upolu and one of the biggest islands in Polynesia, Savai'i. The capital city, Apia, and Faleolo International Airport are situated on the island of Upolu. Samoa was admitted to the United Nations on 15 December 1976. The entire island group, inclusive of American Samoa, was called “Navigators Islands” by European explorers before the 20th century because of the Samoans' seafaring skills. The oldest date so far from pre-historic remains in Samoa has been calculated by New Zealand scientists to a likely true age of circa 3,000 years ago from a Lapita site at Mulifanua during the 1970s. The origins of the Samoans is closely linked to modern research about Polynesia in various scientific disciplines such as genetics, linguistics and anthropology. Scientific research is ongoing although a number of different theories exist; including one proposing that the Samoans originated from Austronesian predecessors during the terminal eastward Lapita expansion period from Southeast Asia and Melanesia between 2,500 and 1,500 BCE. The Samoan origins are currently being reassessed due to new scientific evidence and carbon dating findings from 2003 and onwards. Intimate sociocultural and genetic ties were maintained between the eastern Lapita colonies and the archaeological record supports oral tradition and native genealogies that indicate inter-island voyaging and intermarriage between prehistoric Samoans, Fijians, and Tongans. Contact with Europeans began in the early 18th century. Jacob Roggeveen (1659–1729), a Dutchman, was the first known European to sight the Samoan islands in 1722. This visit was followed by French explorer Louis-Antoine de Bougainville (1729–1811), who named them the Navigator Islands in 1768. Contact was limited before the 1830s which is when English missionaries and traders began arriving. Mission work in Samoa had begun in late 1830 by John Williams, of the London Missionary Society arriving in Sapapali'i from The Cook Islands and Tahiti. By that time, the Samoans had gained a reputation of being savage and warlike, as violent altercations had occurred between natives and French, British, German and American forces, who, by the late nineteenth century, valued Samoa as a refueling station for coal-fired shipping and whaling. According to Barbara A. West, "The Samoans were also known to engage in “headhunting,” a ritual of war in which a warrior took the head of his slain opponent to give to his leader, thus proving his bravery." The Germans in particular began to show great commercial interest in the Samoan Islands, especially on the island of 'Upolu where German firms monopolized copra and cocoa bean processing; the United States laid its own claim and formed alliances with local native chieftains, most conspicuously on the islands of Tutuila and Manu'a (which were later formally annexed to the USA as American Samoa). Britain also sent troops to protect British business enterprise, harbour rights, and consulate office. There followed an eight-year civil war, where each of the three powers supplied arms, training, and in some cases, combat troops to the warring Samoan parties. The Samoan crisis came to a critical juncture in March 1889 when all three colonial contenders sent warships into Apia harbour, and a larger-scale war seemed imminent, until a massive storm on 15 March 1889 damaged or destroyed the warships, ending the military conflict. The Second Samoan Civil War was a conflict that reached a head in 1898 when Germany, the United Kingdom, and the United States were locked in dispute over who should have control over the Samoa Islands. The Siege of Apia occurred during the Second Samoan Civil War in March 1899 at Apia. Samoan forces loyal to Prince Tanu were besieged by a larger force of Samoan rebels loyal to Mata'afa Iosefo. Supporting Prince Tanu were landing parties from four British and American warships. Over the course of several days of fighting, the Samoan rebels were defeated. American and British warships shelled Apia on 15 March 1899; including the USS Philadelphia. Germany, the United Kingdom and the United States quickly resolved to end the hostilities; with the partitioning of the island chain at the Tripartite Convention of 1899. 20th century The Tripartite Convention of 1899 partitioned the Samoan Islands into two parts: the eastern island group became a territory of the United States (the Tutuila Islands in 1900 and officially Manu'a in 1904) and is today known as American Samoa; the western islands, by far the greater landmass, became known as German Samoa after Britain vacated all claims to Samoa and accepted termination of German rights in Tonga and certain areas in the Solomon Islands and West Africa. By 1912 the German administration had apparently achieved its long-term objective of understanding the traditional forces in Samoa politics while maintaining a semblance of local participation in government. There was no more Tupu (King), nor even alii sili (similar to a governor), but the two Fautua (Advisors) were appointed. Tumua and Pule (traditional governments of Upolu and Savaii) were for a time silent; all decisions on matters affecting lands and titles were under the control of the Governor. To complete the process, the Fa’alupega for all Samoa was revised. In a culture based on oratory, the Fa’alupega is a formal greeting which acknowledges those being greeted and their status. The Fa’alupega, which had been nationally accepted from at least the late 19th century (and probably for much longer than that), was as follows: "Tulouna a Tumua ma Pule, Tulouna a Itu’au ma Alataua, Tulouna a Aiga-i-le-Tai, Ma le Va’a-o-Fonoti, Tulouna a Tama ma a latou aiga Po’o aiga ma a latou tama". This firstly recognized the authority and identity of principal districts of Samoa through their spokesmen – Tumua ma Pule, Itu’au ma Alataua, Aiga-i-le-Tai, and the Va'a-o-Fonoti – and the highest titles which were bestowed by these groups. It concludes with the recognition of the great maximal descent groups of Samoa and their “sons” who had been chosen to hold the highest titles. The new Fa’alupega of German Samoa, which in its first line recognises the Kaiser (Kaisa), apparently required Malietoa Tanunafili and Tupua Tamasese to be sworn on oath to become advisors to the governing council: "Tulouna a lana Maiesitete le Kaisa o le tupu mamalu o lo tatou malo kasialika aoao. Tulouna a lana afioga le kovana kasialika o le sui o le kaisa I Samoa nei. Susu mai Malietoa, Afio mai Tupua Ua fa’amanatuiana ai aiga e lua I o oulua tofiga Kasialika o le Fautua. Tulouna a le vasega a Faipule Kasialika o e lagolago malosi I le Malo. Afifio mai le nofo a vasega o tofiga Kasialika o e usu fita I le tautua I le malo". The first German Governor, Wilhelm Solf, later went on to become Secretary for the Colonies of Imperial Germany. New Zealand troops landed on 'Upolu unopposed on 29 August 1914 and seized control from the German authorities, following a request by Britain for New Zealand to perform their "great and urgent imperial service." From the end of World War I until 1962, New Zealand controlled Samoa as a Class C Mandate under trusteeship through the League of Nations. There followed a series of New Zealand administrators who were responsible for two major incidents. In the first incident, approximately one fifth of the Samoan population died in the influenza epidemic of 1918-1919. In 1919 The Royal Commission of Inquiry into the Epidemic concluded that there had been no epidemic of pneumonic influenza in Western Samoa before the arrival of the 'SS Talune' from Auckland on 7 November 1918. The NZ administration allowed the ship to berth in breach of quarantine; within seven days of this ship's arrival influenza became epidemic in Upolu and then spread rapidly throughout the rest of the territory. The second major incident arose out of an initially peaceful protest by the Mau (which literally translates as "strongly held opinion"), a non-violent popular movement which had its beginnings in the early 1900s on Savai'i, led by Lauaki Namulauulu Mamoe, an orator chief deposed by Solf. In 1909, Lauaki was exiled to Saipan and died en route back to Samoa in 1915. By 1918, Samoa had population of some 38,000 Samoans and 1,500 Europeans. By the late 1920s the resistance movement against colonial rule had gathered widespread support during the mistreatment of the Samoan people by the New Zealand administration. One of the Mau leaders was Olaf Frederick Nelson, a half Samoan and half Swedish merchant. Nelson was eventually exiled during the late 1920s and early 1930s, but he continued to assist the organization financially and politically. In accordance with the Mau's non-violent philosophy, the newly elected leader, High Chief Tupua Tamasese Lealofi, led his fellow uniformed Mau in a peaceful demonstration in downtown Apia on 28 December 1929. The New Zealand police attempted to arrest one of the leaders in the demonstration. When he resisted, a struggle developed between the police and the Mau. The officers began to fire randomly into the crowd and a Lewis machine gun, mounted in preparation for this demonstration, was used to disperse the demonstrators. Chief Tamasese was shot from behind and killed while trying to bring calm and order to the Mau demonstrators, screaming "Peace, Samoa". Ten others died that day and approximately 50 were injured by gunshot wounds and police batons. That day would come to be known in Samoa as Black Saturday. The Mau grew, remaining steadfastly non-violent, and expanded to include a highly influential women's branch. After repeated efforts by the Samoan people, Western Samoa gained independence in 1962 and signed a Friendship Treaty with New Zealand. Samoa, the first small-island country in the Pacific to become independent, joined the Commonwealth of Nations on 28 August 1970. In 2002, New Zealand's prime minister Helen Clark, on a trip to Samoa, formally apologised for New Zealand's role in the events of 1918 and 1929. In July 1997 the government amended the constitution to change the country's name from Western Samoa to Samoa. The U.S. territory of American Samoa protested the move, asserting that the change diminished its own identity. As of 2012 American Samoans still use the terms Western Samoa and Western Samoans to describe the independent State of Samoa and its inhabitants[citation needed]. Travel writer Paul Theroux noted marked differences between the societies in Samoa and American Samoa. 21st century Effective 7 September 2009, the government has changed the driving orientation for motorists and Samoans now drive on the left side of the road. This brings Samoa into line with many other countries in the region. Samoa is the first country in recent years, and the first country in the 21st century, to switch to driving on the left. At the end of 29 December 2011, Samoa jumped forward by one day, omitting 30 December from the local calendar, when the nation moved to the west of the International Date Line. This is anticipated to help the nation boost its economy by doing business with Australia and New Zealand. Before this change, Samoa was 21 hours behind Sydney, but the change means they are now three hours ahead. The previous timezone was agreed on 4 July 1892, to work in line with American traders based in California. The 1960 Constitution, which formally came into force with independence from New Zealand in 1962, is based on the British pattern of parliamentary democracy, modified to take account of Samoan customs. The national modern Government of Samoa is referred to as the 'Malo'. Samoa's first Prime Minister was Fiame Mata'afa Faumuina Mulinu’u II, one of the four highest ranking paramount chiefs in the country. Two other paramount chiefs at the time of independence were appointed joint heads of state for life. Tupua Tamasese Mea'ole, who died in 1963, leaving Malietoa Tanumafili II sole head of state until his death on 11 May 2007, upon which Samoa transitioned from a constitutional monarchy to a parliamentary republic. The next Head of State Tuiatua Tupua Tamasese Efi was elected by the legislature on 17 June 2007 for a fixed 5 year term. The unicameral legislature (Fono) consists of 49 members serving 5-year terms. Forty-seven are matai title holders elected from territorial districts by Samoans; the other two are chosen by non-Samoans with no chiefly affiliation on separate electoral rolls. Universal suffrage was extended in 1990, but only chiefs (matai) may stand for election to the Samoan seats. There are more than 25,000 matais in the country, about 5% of whom are women. The prime minister is chosen by a majority in the Fono and is appointed by the head of state to form a government. The prime minister's choices for the 12 cabinet positions are appointed by the head of state, subject to the continuing confidence of the Fono. Prominent women in Samoan politics include the late Laulu Fetauimalemau Mata'afa (1928–2007) from Lotofaga constituency, the wife of Samoa's first prime minister. Their daughter Fiame Naomi Mata'afa is a paramount chief and a long-serving senior member of cabinet. Other women in politics include Samoan scholar and eminent professor Aiono Fanaafi Le Tagaloa, orator-chief Matatumua Maimoana and Safuneitu'uga Pa'aga Neri, the current Minister of Communication and Technology. The judicial system is based on English common law and local customs. The Supreme Court of Samoa is the court of highest jurisdiction. Its chief justice is appointed by the head of state upon the recommendation of the prime minister. Samoa is made up of eleven itūmālō (political districts). These are the traditional eleven districts that were established well before European arrival. Each district has its own constitutional foundation (faavae) based on the traditional order of title precedence found in each district's faalupega (traditional salutations). The capital village of each district administers and coordinates the affairs of the district and confers each districts' paramount title, amongst other responsibilities. For example, the District of A'ana has its capital at Leulumoega. The paramount title of A'ana is the TuiA'ana. The orator group which confers this title - the Faleiva (House of Nine) - is based at Leulumoega. This is also the same for the other districts. In the district of Tuamasaga, the paramount title of the district - The Malietoa title - is conferred by the FaleTuamasaga based in Afega. 1including islands Manono, Apolima and Nu'ulopa 2including the Aleipata Islands and Nu'usafe'e Island 3smaller parts also on Upolu (Salamumu (incl. Salamumu-Utu) and Leauvaa villages) Samoa is located south of the equator, about halfway between Hawai‘i and New Zealand in the Polynesian region of the Pacific Ocean. The total land area is 2,934 km² (1,133 sq mi), consisting of the two large islands of Upolu and Savai'i which account for 99% of the total land area, and eight small islets. These are the three islets in the Apolima Strait (Manono Island, Apolima and Nu'ulopa), the four Aleipata Islands off the eastern end of Upolu (Nu'utele, Nu'ulua, Namua, and Fanuatapu), and Nu'usafe'e (less than 0.01 km² - 2½ acres - in area and about 1.4 km (0.9 mi) off the south coast of Upolu at the village of Vaovai). The main island of Upolu is home to nearly three-quarters of Samoa's population, and its capital city is Apia. The Samoan islands have been produced by vulcanism, the source of which is the Samoa hotspot which is probably the result of a mantle plume. While all of the islands have volcanic origins, only Savai'i, the western most island in Samoa, is volcanically active with the most recent eruptions in Mt Matavanu (1905–1911), Mata o le Afi (1902) and Mauga Afi (1725). The highest point in Samoa is Mt Silisili, at 1858 m (6,096 ft). The Saleaula lava fields situated on the central north coast of Savai'i are the result of the Mt Matavanu eruptions which left 50 km² (20 sq mi) of solidified lava. Samoa was previously located east of the international date line but in 2011, Samoan Prime Minister Tuilaepa Sailele announced his country would move the International Date Line to the east of the country, so that Samoa would lie to the west of the date line. This change took effect on the night of 29 December, so that the Friday was skipped altogether and the following day was Saturday 31 December. The climate is equatorial/monsoonal, with an average annual temperature of 26.5°C (79.7°F), and a rainy season from November to April. Savai'i is the largest of the Samoan islands and the sixth largest Polynesian island after New Zealand's North, South and Stewart Islands and the Hawaiian islands of Hawaiʻi and Maui. The population of Savai'i is 42,000 people. Samoa is located within the Samoan tropical moist forests ecoregion. Since human habitation began, about 80% of the lowland rain forests has been lost. Within the ecoregion about 28% of plants and 84% of land birds are endemic. Gross Domestic Product (GDP) in purchasing power parity (PPP) in 2006 was estimated at $1.218 billion USD.[citation needed] The industrial sector is the largest component of GDP at 58.4%, followed by the services sector at 30.2% (2004 est.). Agriculture represents only 11.4% of GDP (2004 est.). Samoan labor force is estimated at 90,000.[citation needed] The country currency is the Samoan tālā, issued and regulated by the Central Bank of Samoa. The economy of Samoa has traditionally been dependent on agriculture and fishing at the local level. In modern times, development aid, private family remittances from overseas, and agricultural exports have become key factors in the nation's economy. Agriculture employs two-thirds of the labour force, and furnishes 90% of exports, featuring coconut cream, coconut oil, noni (juice of the nonu fruit, as it is known in Samoan), and copra. Outside of a large automotive wire harness factory (Yazaki Corporation), the manufacturing sector mainly processes agricultural products. Tourism is an expanding sector which now accounts for 25% of GDP. Tourist arrivals have been increasing over the years with more than 100,000 tourists visiting the islands in 2005, up from 70,000 in 1996. The Samoan government has called for deregulation of the financial sector, encouragement of investment, and continued fiscal discipline.[citation needed] Observers point to the flexibility of the labour market as a basic strength for future economic advances.[citation needed] The sector has been helped enormously by major capital investment in hotel infrastructure, political instability in neighboring Pacific countries, and the 2005 launch of Virgin Samoa a joint-venture between the government and Virgin Australia (then Virgin Blue). In the period before German colonization, Samoa produced mostly copra. German merchants and settlers were active in introducing large scale plantation operations and developing new industries, notably cocoa bean and rubber, relying on imported labourers from China and Melanesia. When the value of natural rubber fell drastically, about the end of the Great War (World War I), the New Zealand government encouraged the production of bananas, for which there is a large market in New Zealand.[citation needed] Because of variations in altitude, a large range of tropical and subtropical crops can be cultivated, but land is not generally available to outside interests. Of the total land area of 2,934 km² (725,000 acres), about 24.4% is in permanent crops and another 21.2% is arable. About 4.4% is Western Samoan Trust Estates Corporation (WSTEC).[citation needed] The staple products of Samoa are copra (dried coconut meat), cocoa bean (for chocolate), and bananas. The annual production of both bananas and copra has been in the range of 13,000 to 15,000 metric tons (about 14,500 to 16,500 short tons). If the rhinoceros beetle in Samoa were eradicated, Samoa could produce in excess of 40,000 metric tons (44,000 short tons) of copra. Samoan cocoa beans are of very high quality and used in fine New Zealand chocolates. Most are Criollo-Forastero hybrids. Coffee grows well, but production has been uneven. WSTEC is the biggest coffee producer. Rubber has been produced in Samoa for many years, but its export value has little impact on the economy.[citation needed] Other agricultural industries have been less successful. Sugarcane production, originally established by Germans in the early 20th century, could be successful. Old train tracks for transporting cane can be seen at some plantations east of Apia. Pineapples grow well in Samoa, but beyond local consumption have not been a major export. Samoa has a population of 182,265 of which 92.6% are Samoans, 7% Euronesians (people of mixed, European and Polynesian ancestors) and 0.4% are Europeans, per the CIA World Factbook. About three-quarters of the population live on the main island of Upolu. Only the Māori of New Zealand outnumber Samoans among Polynesian groups. Samoans' religious adherence includes the following: Christian Congregational Church of Samoa 35.5%, Roman Catholic 19.6%, Methodist 15%, Latter-day Saints 12.7%, Samoan Assemblies of God 10.6%, Seventh-day Adventist 3.5%, Worship Centre 1.3%, unspecified 0.8% (2001 census). The Head of State until 2007, His Highness Malietoa Tanumafili II, was a Bahá'í convert. Samoa hosts one of seven Bahá'í Houses of Worship in the world; completed in 1984 and dedicated by the Head of State, it is located in Tiapapata, 8 km (5 mi) from Apia. The fa'a Samoa, or traditional Samoan way, remains a strong force in Samoan life and politics. Despite centuries of European influence, Samoa maintains its historical customs, social and political systems, and language. Cultural customs such as the Samoa 'ava ceremony are significant and solemn rituals at important occasions including the bestowal of matai chiefly titles. Items of great cultural value include the finely woven 'ie toga. Samoan mythology includes many gods with creation stories and figures of legend such as Tagaloa and the goddess of war Nafanua, the daughter of Saveasi'uleo, ruler of the spirit realm Pulotu. Other legends include the well known story of Sina and the Eel which explains the origins of the first coconut tree. Some Samoans are spiritual and religious, and have subtly adapted the dominant religion of Christianity to 'fit in' with fa'a Samoa and vice versa. As such, ancient beliefs continue to co-exist side-by-side with Christianity, particularly in regard to the traditional customs and rituals of fa'a Samoa. The Samoan culture is centered around the principle of vāfealoa'i, the relationships between people. These relationships are based on respect, or fa'aaloalo. When Christianity was introduced in Samoa, most Samoan people converted. Currently 98% of the population identify themselves as Christian. The other 2 percent either identify themselves as irreligious, or do not belong to any congregation. Some Samoans live a communal way of life, participating in activities collectively. Examples of this are the traditional Samoan fale (houses) which are open with no walls, using blinds made of coconut palm fronds during the night or bad weather. The Samoan word for dance is siva with unique gentle movements of the body in time to music and which tells a story, although the Samoan male dances can be more physical and snappy. The sasa is also a traditional dance where rows of dancers perform rapid synchronised movements in time to the rhythm of wooden drums (pate) or rolled mats. Another dance performed by males is called the fa'ataupati or the slap dance, creating rhythmic sounds by slapping different parts of the body. This is believed to have been derived from slapping insects on the body. The form and construction of traditional architecture of Samoa was a specialised skill by Tufuga fai fale that was also linked to other cultural artforms. As with other Polynesian cultures (Hawai'ian, Tahitian and Māori) with significant and unique tattoos, Samoans have two gender specific and culturally significant tattoos. For males, it is called the Pe'a and consists of intricate and geometrical patterns tattooed that cover areas from the knees up towards the ribs. A male who possesses such a tatau is called a soga'imiti. A Samoan girl or teine is given a malu, which covers the area from just below her knees to her upper thighs. Contemporary culture Albert Wendt is a significant Samoan writer whose novels and stories tell the Samoan experience. In 1989, his novel Flying Fox in a Freedom Tree was made into a feature film in New Zealand, directed by Martyn Sanderson. Another novel Sons for the Return Home had also been made into a feature film in 1979, directed by Paul Maunder. The late John Kneubuhl, born in American Samoa, was an accomplished playwright and screenwriter and writer. Sia Figiel won the 1997 Commonwealth Writers' Prize for fiction in the South East Asia/South Pacific region with her novel "Where We Once Belonged". Momoe Von Reiche is an internationally recognised poet and artist. Tusiata Avia is a performance poet. Her first book of poetry Wild Dogs Under My Skirt was published by Victoria University Press in 2004. Dan Taulapapa McMullin is an artist and writer. Other Samoan poets and writers include Sapa'u Ruperake Petaia, Eti Sa'aga and Savea Sano Malifa, the editor of the Samoa Observer. In music, popular local bands include The Five Stars, Penina o Tiafau and Punialava'a. The Yandall Sisters' cover of the song Sweet Inspiration reached number one on the New Zealand charts in 1974. King Kapisi was the first hip hop artist to receive the prestigious New Zealand APRA Silver Scroll Award in 1999 for his song Reverse Resistance. The music video for Reverse Resistance was filmed in Savai'i at his villages. Other successful Samoan hip hop artists include rapper Scribe, Dei Hamo, Savage and Tha Feelstyle whose music video Suamalie was filmed in Samoa. Lemi Ponifasio is a director and choreographer who is prominent internationally with his dance Company MAU. Neil Ieremia's company Black Grace has also received international acclaim with tours to Europe and New York. Hip hop has had a significant impact on Samoan culture. According to Katerina Martina Teaiwa, PhD from the University of Hawai'i at Manoa, "Hip hop culture in particular is popular amongst Samoan youth." This is not surprising considering the large amounts of migration between Samoa, Hawaii, and the United States mainland, specifically California. In addition, the integration of hip hop elements into Samoan tradition also "testifies to the transferability of the dance forms themselves," and to the "circuits through which people and all their embodied knowledge travel." Dance both in its traditional form and its more modern forms has remained a central cultural currency to Samoans, especially youths. The arts organisation Tautai is a collective of visual artists including Fatu Feu'u, Johnny Penisula, Shigeyuki Kihara, Iosefa Leo, Michel Tuffery, John Ioane and Lily Laita. Director Sima Urale is an award-winning filmmaker. Urale's short film O Tamaiti won the prestigious Best Short Film at the Venice Film Festival in 1996. Her first feature film Apron Strings opened the 2008 NZ International Film Festival. The feature film Siones Wedding, co-written by Oscar Kightley, was financially successful following premieres in Auckland and Apia. The 2011 film The Orator was the first ever fully Samoan film, shot in Samoa in the Samoan language with a Samoan cast telling a uniquely Samoan story. Written and directed by Tusi Tamasese, it received much critical acclaim and attention at film festivals throughout the world. In comedy, Laughing Samoans, the Naked Samoans and Kila Kokonut Krew have enjoyed sold-out tours. Actor and director Nathaniel Lees has featured in many theatre productions and films including his role as Captain Mifune in The Matrix movie trilogy. Published playwrights include Oscar Kightley, Victor Rodger, Makerita Urale and Niuean Samoan playwright Dianna Fuemana. The main sports played in Samoa are rugby union, Samoan cricket and netball. Rugby union is the national football code of Samoa. In Samoan villages, volleyball is also popular. Rugby union is the national sport in Samoa and the national team, nicknamed the Manu Samoa, is consistently competitive against teams from vastly more populous nations. Samoa has competed at every Rugby World Cup since 1991, and made the quarter finals in 1991, 1995 and the second round of the 1999 world cup. At the 2003 world cup, Manu Samoa came close to beating eventual world champions, England. Samoa also played in the Pacific Nations Cup and the Pacific Tri-Nations The sport is governed by the Samoa Rugby Football Union, who are members of the Pacific Islands Rugby Alliance, and thus, also contribute to the international Pacific Islanders rugby union team. At club level there is the National Provincial Championship and Pacific Rugby Cup Prominent Samoan players include Pat Lam and Brian Lima. In addition many Samoans have played for or are playing for the New Zealand All Blacks. They also took home the cup at Wellington and the Hong Kong Rugby Sevens in 2007—for which the Prime Minister of Samoa, also Chairman of the national rugby union, Tuila’epa Sa’ilele Malielegaoi, declared a national holiday. They also were the IRB World Sevens Series Champions in 2010 capping a year of achievement for the Samoans, following wins in the USA, Australia, Hong Kong and Scotland Sevens tournaments. Rugby league is mostly played by Samoans living in New Zealand and Australia, with Samoa reaching the quarter finals of the 2000 Rugby League World Cup made of players playing in the NRL and Superleague. Many Samoans and New Zealanders or Australians of Samoan descent play in the Super League and National Leagues in Britain. Francis Meli, Ta'ane Lavulavu of Workington Town, Maurie Fa'asavalu of St Helens and David Fatialofa of Whitehaven and Setima Sa who signed with London Irish rugby club. Other noteworthy players from NZ and Australia have represented the Samoan National team. There are only eight rugby league club in Samoa with only 125 player in the country. Samoans have been very visible in boxing, kickboxing, wrestling, and sumo; some Samoan sumo wrestlers, most famously Musashimaru and Konishiki have reached the highest rank of Ozeki and yokozuna. American football is occasionally played in Samoa, reflecting its wide popularity in American Samoa, where the sport is played under high school sanction. About 30 ethnic Samoans, many from American Samoa, currently play in the National Football League. A 2002 article from ESPN estimated that a Samoan male (either an American Samoan, or a Samoan living in the mainland United States) is 40 times more likely to play in the NFL than a non-Samoan American. See also Further reading • Watson, RM, History of Samoa (Wellington, 1918) • Meleisea, Malama. The Making of Modern Samoa: Traditional Authority and Colonial Administration in the Modern History of Western Samoa. (Suva, 1987) Institute of Pacific Studies, University of the South Pacific. • Schnee, Dr. Heinrich (former Deputy Governor of German Samoa and last Governor of German East Africa). 1926. German Colonization, Past and Future—The Truth about the German Colonies. London: George Allen & Unwin. • Eustis, Nelson. [1979] 1980. Aggie Grey of Samoa. Adelaide, South Australia: Hobby Investments. ISBN 0-9595609-0-4. • Stevenson, Robert Louis. A Footnote to History: Eight Years of Trouble in Samoa. BiblioBazaar. ISBN 1-4264-0754-8.  External links • Government of Samoa • Chief of State and Cabinet Members General information • Samoa entry at The World Factbook • University of Colorado from UCB Libraries GovPubs • Samoa at the Open Directory Project • Samoa from the BBC News • Wikimedia Atlas of Samoa • Samoa Tourism Authority • Samoa travel guide from Wikitravel • Samoa, an external wiki • Key Development Forecasts for Samoa from International Futures •, Online Samoan Dictionary This entry has been automagically sourced from Wikipedia, the user-contributed encyclopedia. It may not have been reviewed by professional editors and is licensed under CC-BY-SA. Visit Samoa on Wikipedia to correct or update this entry.
How can we help? You can also find more resources in our Help Center. Chapter 1 Terms - Mental Health and Mental Illness Advanced Practice Registered Nurse, Psychiatric Mental Health A licensed RN with a master of science or Doctor of Nursing practice in Psychiatric nursing. Basic Level Registered Nurse, RN Any nurse with basic training, a diploma, associate degree, or baccalaureate degree in nursing., completed nursing program, state licesure and qualified to work in most any general or speciality area. Clinical Epidemiology broad term that addresses what happens after patients are seen by providers Co-morbid Condition A condition that occurs along with another disorder. Diagnostic And Statistical Manual Of Mental Disorders, Fourth Edition, DSM 4 A classification of mental disorders that includes descriptions of diagnostic categories. The DSM 4 is the most widely accepted system of classifying abnormal behaviors used in the United States today. Electronic Health Care, E H C The provision of health care through methods which are not face-to-face but rather through an electronic medium. The quantitative study of the distribution of mental disorders in human populations. Evidence-Based Practice Care based on the collection, interpretation, and integration of valid, important, and applicable patient-reported, clinician-observed, and research-derived evidence. Refers to the number of new cases of mental disorders in a healthy population within a given period of time. For example, the number of New York City adolescents who were diagnosed with major depression between 2000 and 2010. Mental Health Continuum A conceptual line used to represent levels of mental health and mental illness that vary from person to person and vary for a particular person over time. Mental Illness A clinically significant behavioral or psychological syndrome marked by the patient's distress, disability, or the risk of suffering disability or loss of freedom. Nursing Intervention Classification, N I C A listing of research-based nursing intervention labels that provide standardization of expected nursing interventions. Nursing Outcomes Classification, N O C A classification system which defines and describes patient outcomes to nursing interventions. Phenomena Of Concern The central interests of a particular discipline. In nursing they are commonly considered to be person, health, environment, and nursing. Describes the total number of cases, new and existing, in a given population during a specific period of time. Example: the number of adolescents who screen positive for major depression in New York City schools between 2000 and 2010 Psychiatric Mental Health Nursing, P M H N This specialty area in nursing and core mental health profession promotes mental health through the nursing process in the treatment of mental health problems and psychiatric Psychiatry's Definition Of Mental Health Evolves over time and is shaped by the prevailing culture and societal values. Reflects changes in cultural norms, society's expectations, and political climates. Registered Nurse-Psychiatric Mental Health, R N, P M H A nursing graduate who possess a diploma, AA, or BA and chooses to work in the specialty of psychiatric mental health nursing. The ability to adapt and cope, which helps people to face tragedies, loss, trauma, and severe stress. Global Assessment of Functioning A 0 to 100 rating of a person, with more severe disorders indicated by lower numbers and more effective functioning by higher numbers Electronic Health Record A long-term accumulation of a patient's health care information from a many different of providers. 10 Fundamental Components of the Recovery process Self directed, Individule and person centered, Empowering, Holistic, Nonlinear, Strength Bases, Peer supported, Respect, Responsibility, Hope. Diathesis-Stress Model Suggests that a person may be predisposed for a mental disorder that remains unexpressed until triggered by stress or trauma. This is the most accepted explanition for mental illness. Mental Health Consumer Groups of people with mental illnesses. Decade of the Brain •1990 - 2000 by Pres. George H. W. Bush •Years dedicated to new studies & to make legislation/general public aware of advances that were made in neuroscience/brain research Traits of Mental Health Think rationally, most of the time. Communicate appropriately. Learn - frontal lobe working properly. Grow emotionally. Healthy self-esteem. Mental Health a state of well-being in which each individual is able to realize his or her own potential, cope with the normal stresses of life, work productively and fruitfully, and make a contribution to the community. Culture-Bound Syndromes Occur in specific sociocultural contexts and are easily recognized by people in those cultures. Running Amok a culture-bound syndrome of Southeast Asia, in which a person, usually a male, runs around engaging in furious, almost indiscriminate violent behavior. an uncontrollable desire to tear off one's clothing and expose oneself to severe winter weather, is a recognized psychological disorder in parts of Greenland, Alaska, and the Artic regions The fact that some people, even those with the most serious illnesses, such as schizophrenia, will recover. A consumer-focused process, in which people are able to live, work, learn, and participate fully in their communities. Why is it important to recognize & treat mental illnesses early? Because with each "episode", the risk goes up 50% that they will have another episode A biological predisposition to a disorder. Also known as vulnerability. A diathesis only causes abnormal behavior when it is combined with a stress or challenging experience. National Alliance on Mental Health (NAMI) •1979 - Formed by people w/ mental illness & their families. •1980's - Group began resisting traditional "paternalistic" mental health care providers who dictated care & treatment New Freedom Commission on Mental Health 2003 - Release of recommendations for mental health care in America. Called for a streamlined system. Advocated for Early diagnosis and treatment, New expectation for principles of recovery, Increased assistance in helping people find housing & work. functional equality Identify high-risk groups, and high-risk factors associated with illness onset, duration, & recurrence. Examples of high-risk groups associated w/ illness onset, duration, & recurrence. •Kids facing traumatic experiences at young age. •Genetic predisposition Examples of high-risk factors associated w/ illness onset, duration, & recurrence are. •Old treatments In the DSM 4, mental disorders are MANIFESTATIONS of a dysfunction of an individual's. behavior, psychology, and biology. In the D S M 4, mental disorders are ASSOCIATED with? Distress or painful symptom. Disability of important areas of function. High risk of suffering death, pain, disability, or loss of freedom. The D S M 4 classifies what? the disorder not the person. Axis 1 Mental disorder that is the focus of treatment; refers to a collection of s/s that together constitute a particular disorder. Example: Major depressive disorder Axis 2 Personality disorders & mental retardation. Example: Dependent personality disorder Axis 3 General medical conditions relevant to the mental disorder on Axis 1. Example: Diabetes Axis 4 Psychosocial & environmental problems. Example: relationship failing, job loss, finances. 300 to 500 means high stress. Axis 5 The Global Assessment of Functioning Score, or G A F Score. Example: 31; unable to work or respond to family & friends. The Main Personality Disorders are Obsessive-Compulsive, Narcissistic, Histrinic, Paranoid, Boarderline, Dependent, Schizoid, Anxious or Avoidant, Schizotypal, and Antisocial. Nursing Intervention any treatment based upon clinical judgment and knowledge that a nurse performs to enhance patient/client outcomes I C D-10 International classification of diseases •Clinical descriptions of mental & behavior disorders •Divided into 10 disease categories Nursing Diagnosis This is a clinical judgment about individual, family, or community responses to actual or potential health problem/life processes. It provides the basis for selection of nursing interventions to achieve outcomes for which the nurse is accountable. A well defined nursing diagnosis provides the framework for Identifying appropriate nursing interventions for dealing w/ the patients reaction to the disorder Basic Level Psych RN interventions •Health teaching andmaintenance •Milieu therapy •Pharmacological, biological & integrative therapies Psych nurse advanced practice interventions Basic interventions plus Med Rx's and treatment, hospital admitting, Psychotherapy, Consultation-sharing clinical expertise with nurses or other health care professionals to enhance the treatment of patients Case Management Coordinate patient care provided to individuals, their families, and significant other on a continuum and to provide efficient transitions to services that may be needed after discharge at home, in clinics, or other health care facilities. Community nursing centers Centered on low cost by providing care in established community buildings. The focus is on wellness and ease of accessible within the community. Serves low-income and uninsured people as long as they can secure funding. Cultural Competence Sensitivity to different cultural views reguarding health, illness, and response to treatment. Patient Advocate an individuale who speaks for the patient and protects their rights a powerfully negative label that greatly changes a person's self-concept and social identity
Multiple Choice v. Free Response Is multiple choice really so bad? For the humanities, we answer unequivocally: “sorta.” If any of the truly important questions about the human condition had unambiguously correct answers, human history would have been a long boring tale of comity and well-being. As a result, any attempt to assess subjects in the humanities through multiple choice cannot and do not broach the questions dearest to humanists. Instead they must skirt and skulk around looking for secondary signs of an engaged and thinking mind. We ask our students to identify metaphors and supporting arguments without also asking: How evocative is the metaphor? How convincing is the argument? Why? Because multiple choice questions as we all know must by definition contain at least one unambiguously correct answer. And we also know, the more interesting the question the less clear the answer. Still, is there a way to do multiple choice that’s open-ended and allows for asking questions with no right answer? We think we have a (nuanced, textured) answer to that question. We have embraced multiple choice, sorta …by turning it inside-out and upside-down. In Ponder multiple choice, the questions are predefined and the possible answers are infinite. The questions are not questions for the students (e.g. Can you identify the topic sentence of this paragraph?), they’re questions for the author of the text, opportunities to “talk back” to the reading and it’s up to the student to figure out where and how to ask them. After all, we learn by asking questions, not answering them. Our readers have a more important task than simply finding examples of Metaphor versus Simile, Hubris versus Pride, Compromise versus Conciliation (themes predefined by teachers). They are also asked to identify examples that perplex them, intrigue them, shock, disgust, inspire, agitate, make them wonder if someone might be a touch hysterical or someone else is oversimplifying something that deserves more serious consideration (reactions predefined by us). They don’t simply observe and identify, they analyze and evaluate, both the author’s ideas and their own reactions to those ideas. In a word, they think. Still, assessment is simple. Though Ponder is not a Scantron machine that can tell you automatically who was right and who was wrong, it’s concise, data-rich, and designed to call attention to good work. It is easy for both teachers and classmates to evaluate each response. 1. Has it substance? 2. Is the reaction apt? 3. Are the themes apt? If not, let’s talk about it! 2 responses from the same student. Same student, 2 different responses. Both are invitations if not provocations to ask Why? And Ponder is only getting smarter. While we can’t pass absolute judgement on student responses, what we can do automatically is build a nuanced profile of each student over time. • Who’s taking the time to read in-depth articles? • Who’s expanding beyond their comfort zone to read about new subject areas? • When confronted with something confusing, who’s able to identify exactly how they’re confused? • Who’s reacting emotionally? Who’s able to evaluate the soundness of logic? • Who’s figured out how to get their classmates interested in what they’re interested in? • Who’s good at starting conversations? What we’re interested in is the ability to paint a portrait of readers that reflects their level of curiosity, comprehension, self-awareness and awareness of others. We can’t produce a number with the finality of a Scantron machine. But really, what does a 67 versus an 83 really mean when we’re talking about the Bill of Rights or the Leaves of Grass? You’ll be able to explain that number better with the insights Ponder affords you into your students’ thinking. Multiple choice is really not so bad if you don’t let it kill the open-ended nature of intellectual inquiry. We like it, sorta. Share Button Leave a Reply
Evol Ecol Res 17: 21-34 (2016)     Full PDF if your library subscribes. From the bare minimum: genetics and selection in populations founded by only a few parents Jacques Labonne1, Renaud Kaeuffer2, François Guéraud1, Mingsha Zhou2, Aurélie Manicki1 and Andrew P. Hendry2 1INRA, UMR 1224, Ecologie Comportementale et Biologie des Populations de Poissons, Saint-Pée sur Nivelle, France and  2Redpath Museum and Department of Biology, McGill University, Montreal, Quebec, Canada Correspondence: J. Labonne, INRA, UMR 1224, Ecologie Comportementale et Biologie des Populations de Poissons, Aquapôle, quartier Ibarron, 64310 Saint-Pée sur Nivelle, France. e-mail: labonne@st-pee.inra.fr Question: Genetic variation is expected to control the fate of populations colonizing new environments, because the amount and nature of this variation influences adaptation. Thus, it is generally expected that the ability of populations to colonize new environments is severely compromised if the number of founding individuals is very few. Organisms: Brown trout (Salmo trutta) are native to the northern hemisphere, but have been widely introduced globally, including into the southern hemisphere. Times and places: We analysed two isolated populations of brown trout introduced in 1993 to the remote Kerguelen Islands in the sub-Antarctic region, each population being founded with the offspring of only a single mother, and with either only one or two fathers. Methods: Scale samples were collected in 2003 and 2010 and analysed using a set of 16 microsatellite markers. These data were used to calculate individual homozygosity level and variance in inbreeding. The association between age (estimated through scale reading) and homozygosity level was used to assess the potential consequences of low genetic variation for individual survival. Results: The two populations represented different outcomes. In one population, variance in inbreeding was high and a clear heterozygosity–fitness correlation (HFC) was evident: older individuals were less homozygous than younger individuals. Consistent with these results, homozygosity level in this population decreased from 2003 to 2010. In the other population, variance in inbreeding was low, no consistent HFC was detected, and no decline in homozygosity level was evident from 2003 to 2010. Low genetic variation and severe initial bottlenecks through founding effects did not prevent the establishment and success of these populations, one of which appears to be actively purging inbred individuals. Keywords: genetic variation, heterozygosity, inbreeding, invasion, small population. or through its VPN.
Fossil Wiki 7,205pages on this wiki Add New Page Talk1 Share Argentina, officially the Argentine Republic, is a country in South America, constituted as a federation of 23 provinces and an autonomous city, Buenos Aires. It is the second largest country in South America and eighth in the world by land area. Phorusrhacidae (terror birds) where very common 65 to 2 million years ago. Argentina was home to other strange and marvalous creatures. Mantell&#039;s Iguanodon restoration Ad blocker interference detected!
Hyperscanning allows multiple subjects, each in a separate MRI scanner, to interact with one another while their brains are simultaneously scanned. This technology allows researchers to study the brain responses that underlie important social interactions. Human behavior is not endlessly variable, but can be captured and quantified by testable laws. Modern neuroscience techniques can now characterize individual differences in decision-making behavior and link those differences to such variables as brain anatomy.
But some doctors could not wait for convict bodies to dissect. This led to a new profession – Body snatching or grave robbing! One of the most gruesome trials to take place in 19th century Scotland was that of the famous grave robbers William Burke and William Hare. By day, the two appeared as hardworking Irish immigrants: William Burke even rented out rooms to recent arrivals in Edinburgh. But by night, the pair lurked in dark corners of the city's ancient graveyards, digging up bodies of the recently departed to sell to anatomy instructors in Edinburgh's fast growing medical In those days, Edinburgh was one of the major centres of medical education in Europe. Dr. Robert Knox of the city's Medical School was one of the most popular anatomists - attracting as many as 500 students per But in early 19th century Scotland, obtaining human cadavers for medical research was not a simple matter. Schools were restricted by laws that allowed the dissection of only one body per year - and it had to be the body of an executed It was just a matter of time before someone found an illegal way of providing dead humans for dissection. Enter William Burke and William Hare. Smelling a profit, they cooked up a scheme to supply freshly dead bodies to the anatomy schools with "no questions asked". Burke and Hare were successful grave robbers. But success soon turned to greed and greed to murder. When they realized the profits they could make they started murdering victims in Edinburgh's Old Town using strangulation and then handed the corpses over to local anatomists such as Dr. Knox. It was only when suspicious neighbours starting asking about a missing Irish immigrant named Mrs. Docherty, that the whole scheme began to unravel. Before long, the two grave robbers turned serial killers were up on charges of murdering the old lady and the whole of Britain was riveted to the grisly details of the trial throughout that Christmas and New Year season of 1828. Christmas morning 1828, the jury gave their verdicts: Burke was guilty and Hare was innocent. Burke was executed on January 28, 1829. In the month between his sentencing and the execution, he gave two detailed confessions. In both of them he cited 16 murders that he and Hare had committed. At his scaffold, enormous crowds shouted for Hare and Dr. Knox to join him at the So what happened to Burke’s body - you guessed it - donated to the Medical School for what they called "useful dissection". Nearly two hundred years after his death, Burke's skeleton remains on display at the University's Medical School. Ironically, the anatomists to whom Burke and Hare supplied bodies were never brought to trial. Although Dr. Knox was named as the recipient of bodies, he was never charged with any crime. Slide 1 - Crime and Punishment through time
Reactant Dynamo The Reactant Dynamo is one of the Dynamos added by Thermal Expansion. It generates Redstone Flux using alchemical reactions between fluid fuel and solid reactants. Automating energy generation with Reactant Dynamos can lead to interesting setups, as the Dynamo uses somewhat unusual kinds of fuel. Shaped Crafting The Reactant Dynamo generates energy using fluid fuel and reactant items. It does not work if there is fuel but no reactant in it, and vice versa; the Dynamo essentially consumes two kinds of fuel simultaneously. The Reactant Dynamo generates energy at a maximum rate of 80 RF per tick. This rate may decrease depending on how full the Dynamo's internal storage is, which can fill up if the Dynamo cannot emit its energy. The rate may be reduced down to a minimum of 8 RF per tick. At this point, generated energy that cannot be stored anywhere is lost. Installing the Excitation Field Limiter Augment removes this lower limit, allowing the Dynamo to automatically stop generating energy completely if needed. Energy generated by the Reactant Dynamo is stored in the Dynamo's internal energy storage. It is then emitted as soon as possible in the direction in which the Dynamo's red coil is pointing. The Dynamo does not emit energy if it is inactive, even if some generated energy is still stored in it. The Dynamo accepts fluid fuel and reactant items from external sources like Machines or Ducts. These can be inserted on all sides of the Dynamo, except for the coil. However, if the Transmission Coil Ducting Augment is installed, that side may also receive them. The below table lists the fluids that can be used as fuel for the Reactant Dynamo. It displays how much energy the Dynamo can generate from a Bucket (1000 mB) of each kind of fuel. Fluids that yield less energy are consumed more quickly. Fuel Energy Destabilized Redstone 600000 RF Energized Glowstone 750000 RF Essence 500000 RF Sewage 12000 RF Sludge 12000 RF Biomass 450000 RF Seed Oil 250000 RF Creosote Oil 200000 RF All energy amounts can be changed in the config. More fluids to treat as fuel can also be added in it. The below table lists the items that can be used as reactants in the Reactant Dynamo. It displays how long each reactant lasts, expressed in the amounts of energy the Dynamo can generate with them. These energy amounts are not added to the amounts of energy generated using the above fuels. Reactant Energy Sugar 16000 RF Gunpowder 160000 RF Blaze Powder 640000 RF Ghast Tear 1600000 RF Nether Star 6400000 RF Reactant items are currently not configurable. 1. Fuel Tank Fluid fuels that are to be consumed for generating energy are stored here. 2. Reactant Slot Items placed here are used as reactants for generating energy. 3. Reactant Gauge Displays the progress of the item currently being used as reactant. 4. Energy Gauge Displays how much Redstone Flux is currently stored in the Reactant Dynamo's internal energy storage. 5. Energy Tab Displays how much power the Reactant Dynamo is generating, and how much Redstone Flux is currently stored in it. 6. Information Tab Displays a bit of information about the Reactant Dynamo. 7. Tutorial Tab Explains various things about the Reactant Dynamo and the other tabs in the GUI. 8. Augmentation Tab Allows installing Augments in the Dynamo. 9. Security Tab Allows setting who is allowed to access the Reactant Dynamo. Only available if a Signalum Security Lock is installed. 10. Redstone Control Tab Allows setting how the Reactant Dynamo responds to Redstone signals. Only available if the Integrated Redstone Circuit Augment is installed. 11. Player Inventory The inventory and hotbar of the player that is accessing the Reactant Dynamo. Last updated: 2017-03-19 13:56:46 +0000
Lecture 17 - Population in Modern China Families lived together in traditional China and sons remained on the land; division of family land led to tiny plots and rural poverty. Because labor was so cheap, the country did not urbanize or mechanize. The Communist government started out with a pro-natal stance, but after experiencing the famine of the Great Leap Forward, moved strongly to fertility control. Fertility declined rapidly in the 1970s, but to counter momentum, the One-Child Policy was introduced in 1979-80. Nevertheless, population has now risen to over 1.3 billion. Facebook, Twitter, Google+ logos
• Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month To what extent was did the British political system respond to the demands of its new electorate in the period 1867 to 1900? Extracts from this document... To what extent was did the British political system respond to the demands of its new electorate in the period 1867 to 1900? We can we define the British political system's responses to the new electorate within three main categories. These would be the social reform Acts, the political reform Acts that were passed, and the new party organisation and structure. This will enable us to decide the extent to which the political system responded to the new electorate. It would be a fairly simple answer to merely reply that the parties became completely demagogic during this period, as it can easily appear this way, but there seem to be alternative motives behind nearly each major reform Act. This is not to say that these Acts did not make the country more democratic, because they did, but it appears that this is more by coincidence than intention. Personal causes for the passing of an act can be see in the 1872 Secret Ballot Act. This Act was passed in an attempt to cut down on election corruption and intimidation, which we can see as a good and worthy motive for the passing of the Act. However Gladstone passed the Act so that he would gain the radicals support, including the famous John Bright. ...read more. So the 'Arlington Street compact' was agreed in which the Liberals attained the extension of the franchise, allowing Gladstone to maintain his support, and in return Salisbury's redistribution act was passed, allowing the Conservatives to gain more single-member constituency seats. Once again we see that this was not based upon what the public wanted, this was what the parties wanted. It was an underhand meeting allowing both the Conservative party, and Gladstone to gain from it. So we can see that there do not appear to be many examples of demagoguery in the political reform Acts, but it is also hard to find examples of the governments direct response to the new electorate's demands in social reform Acts. Social reforms by their very definition should be for the benefit of all the community, but we see that the government did not always seem to agree with this definition, as we can infer through the Bills that they legislated. The Artisans' Dwelling Act was an act which empowered local authorities to buy land to build or re-house the lower classes who lived in impoverished conditions. The government, when necessary, could supply small loans to the councils for the work. This appears from the outside to be an Act which shows caring for the community, but it was only a permissive Act. ...read more. This meant that the lower classes had to find another way to represent themselves, and they did this through the formation of group which eventually found common ground in the form of the Labour Representative Committee. Analysis of the motives behind the major political and social reform acts show that the political system responded very little to the new electorate. It is evident that there was some degree of reply from the government in so much as the issues made the agenda, but very rarely was an act in direct response to public outrage. It appears that the case is far more complicated, and that there is never the one simple answer. The motives behind the acts are usually for the personal political gain of members of the parties, rather than for the good of the public. The very fact that the Labour Representative Committee emerged shows that much of the new electorate, mainly the lower classes, felt that they were not being fairly represented in parliament. We can see that this is true as well, as Salisbury redistributed the seats so that the working classes had less influence over the outcome of the elections. The only direct response to the new electorate was the party organisation as this was to try to gain votes. So it is fair to say that the government responded to the new electorate to a certain extent, but obviously not enough. ...read more. The above preview is unformatted text Found what you're looking for? • Start learning 29% faster today • 150,000+ documents available • Just £6.99 a month Not the one? Search for your essay title... • Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month See related essaysSee related essays Related GCSE Politics essays 1. Conflict Analysis: Angola An amnesty on past corrupt activities, which have been obviously rife, might be the only way to persuade the potentially embarrassed government into bringing about transparency. Furthermore there needs to be more attention to human rights issues in Angola. Even Angolan ministers point out the need for this to be addressed53. 2. Why is corruption so prominent in the contemporary Latin American political scene? life - from wealthy businessmen who have offshore accounts to the policeman who takes a bribe when you stop him on the street" (37) needs to change. Furthermore without reform to the judiciary systems of Latin America, progress made could easily be reversed. 1. This assignment identifies and discusses the major social and political trends expected to affect ... This possibility is viable in light of all the corruption and mismanagement emerging within the current government. The influence of minority interest groups should not be disregarded as these do have power that can be expressed, through business, professional and ratepayers associations. 2. Did Gladstone Unite or Divide the Liberals? In his biography of Gladstone (1995), H Matthew stated that 'It is not difficult to see the latter part of Gladstone's public life as a failure: religion on the wane, the free order giving way to militarism and protectionism, Britain bloated by imperial expansions, Home Rule unachieved, the Liberal Party divided.' 1. Analyse the causes of Mexico's instability in the period 1821-1855 tried in civilian courts but only in either ecclesiastical or military courts respectively. Although the independence wars were over, the army had still not been demobilised. Both the army and the church had one thing in common, there were both privileged under the fueros and enjoyed legal immunities and exemptions from civil courts. 2. How powerful was Britainin 1900? With this Britain was now a powerful unbreakable force, with two strong alliances. Great Britain was often seen as a greater, more powerful force compared to the other European countries as it, it used itself and system wittily, as Britain wasn't recorded to have the most men in its army, making its military somewhat of a joke. 1. Why Did the Liberals Experience a Constitutional Crisis in the Period 1909-1911? How Successful ... However, the cause of conflict cannot be attributed only to Asquith's poor handling of events and many would argue that the Conservatives did much to antagonise matters. Indeed the attitude of the Conservatives in threatening to give all-out support to Ulster's defiance of Home Rule received even harsher criticism than a lot of reasons that were derived from his view of masculine superiority for example he argued that the enfranchisement of woman would upset the natural balance of things .He is seen as the main deterrent in blocking the Liberals from supporting suffrage. • Over 160,000 pieces of student written work • Annotated by experienced teachers • Ideas and feedback to improve your own work
The Canon Debate Only available on StudyMode • Download(s) : 1522 • Published : September 20, 2011 Open Document Text Preview Part I: Bibliographic Data: The introduction should state the name and author of the article, the date of publication, and the name of the professional journal in which the article appears. Part II: Content of Summary: The summary of the content of the article should highlight the material in the article that you feel is most significant for educators who are involved with urban and diverse learners. The article “The Canon Debate, Knowledge, Construction, and Multicultural Education” by James A. Banks Presents a typology that details five types of knowledge and contends that each type should be part of the school, college and university curriculum. Dr. Banks first describes a national debate that has is taking place concerning what knowledge should be taught in schools and universities curriculum. There are three groups of scholars that are participating in the debate, the Western traditionalist, the Multiculturalists, and the Afrocentrists. Each groups share a number of important assumption and beliefs about the nature of diversity in the United States and about the role of educational institutions in a pluralistic society. The Western Traditionalist created the National Association of Scholars to protect what they believe is an attack on Western history, literature, and culture. They contend that the emergence of feminist, ethnic minority scholars and other multiculturalists are threatening the dominance of Western civilization in curricula. point of view. They believe that western Part III: Writer’s Reaction: Explain why you think the content of the article is of popular value to educators who are involved with diverse population of students. Part IV: Implications: Provide at least three examples of how the articles relates to the content of the course, and provide support of selecting these examples. The examples should include a citation of the appropriate references. Each example should represent a separate reference.... tracking img
Testing pond water The quality of the water is determined by the substances that have been dissolved in itWhen you test the water of your pond, you are investigating the so-called water values. Correct water values in a pond are of importance to secure a beautiful clear pond having a proper biological equilibrium. The quality of the water is determined by the substances that are dissolved in it. Hardness forming substances may be involved here, like Calcium and Magnesium; however, it may as well be primary nutrients for plants such as phosphates and nitrates. Furthermore the water contains important gases like oxygen and carbon dioxide, but also poisonous methane gases. The aforementioned and many more substances finally determine the quality of the pond water. A large number of the substances dissolved in pond water can be determined using a water test kit. Such a pond test kit can be easily used. It contains the most important water tests, namely the pH-, GH– and CH-values. It is advisable to carry out pond tests regularly. Is one or more of the following problems bothering you in your pond? • The pond water is turbid and green • In the pond there are CO2 or slimy algae • Pond plants are growing badly or dying • Pond fish behave in a strange way Then it is import to (let) test your pond water.
Section 3: Authors Q 3.12: How do I create my own document type? Analyse the class of documents, and write a DTD or Schema Document types usually need a formal description, either a DTD or a Schema. Whilst it is possible to process well-formed XML documents without any such description, trying to create them without one is asking for trouble. A DTD or Schema is used with an XML editor or API interface to guide and control the construction of the document, making sure the right elements go in the right places. Creating your own document type therefore begins with an analysis of the class of documents you want to encode: reports, invoices, letters, configuration files, credit-card verification requests, novels, plays, theses, or whatever. Once you have the structure correct, you write code to express this formally, using DTD or Schema syntax. If you want to create a DTD, you need to learn the XML Declaration Syntax (very simple: declaration keywords begin with <! rather than just the open angle bracket, and the way the declarations are formed also differs slightly). Here's an example of a DTD for a shopping list, based on the fragment used earlier: <!ELEMENT Shopping-List (Item)+> It says that there shall be an element called Shopping-List and that it shall contain elements called Item: there must be at least one Item (that's the plus sign) but there may be more than one. It also says that the Item element may contain only parsed character data (PCDATA, ie text: no further markup). Because there is no other element which contains Shopping-List, that element is assumed to be the ‘root’ element, which encloses everything else in the document. You can now use it to create an XML file: give your editor the declarations: <?xml version="1.0"?> <!DOCTYPE Shopping-List SYSTEM "shoplist.dtd"> (assuming you put the DTD in that file). Now your editor will let you create files according to the pattern: It is possible to develop complex and powerful DTDs of great subtlety, but for any significant use you should learn more about document systems analysis and document type design. See for example Maler and el Andaloussi (1995): this was written for SGML but perhaps 95% of it applies to XML as well, as XML is much simpler than full SGML — see the list of restrictions which shows what has been cut out. Incidentally, a DTD file never has a DOCTYPE Declaration in it: that only occurs in an XML document instance (it's what references the DTD). And a DTD file also never has an XML Declaration at the top either. Unfortunately there is still software around which inserts one or both of these.
Poem “Justice of the Peace” and “Genius and Valor,” by Rev. Langhorne In Uncategorized on September 17, 2013 at 4:45 pm White poem referred in biography of Scottish Robert Burns: It’s so beautifully eloquent of the description of a sad mother’s tears mixing in with her breastmilk for she once nursed that child. Most women in America don’t have a clue about the “feeling” that goes with it. Today it seems like a “rushed” thing to do like a business and not a “loved” or primal instinct feeling to share. And yes, I would shutter if I were a White mother today and had a baby boy only to baptize him into the USA a “child of misery baptized in tears.” Only to send him to war, as my husband’s mother birthed him just to be a potential $.37 body bag for the Jew banks. You see Jews only pay the $.37 towards the White body bag. If he is lucky the soldier dies immediately and gets it over. If he is wounded bad or addicted by Jews and lives, his live of “misery” is beyond compare especially having every door slammed in his face and every door “opened” to Jews, Yellow Commies also, Hindus’, Browns, Blacks, Reds. And along with the Veteran the widow and child suffer, even the poor door. And we have to point the finger of fate at the Jew and Jewess their child who have become near gods as they put us in the Holocaust of hell in the USA. Burning alive with pain and agony while they “laugh” and are entertained. “The only thing I remember which was remarkable in Burns’s manner was the effect produced upon him by a print of Burnbury’s, representing a soldier lying dead on the snow, his dog sitting in misery on the one side, on the other his widow, with a child in her arms. These lines were written beneath,— Cold on Canadian hills, on Minden’s plain, Perhaps that parent wept her soldier slain; Bent o’er her babe, her eye dissolved in dew, The big drops, mingling with the milk he drew, Gave the sad passage of his future years, The child of misery baptized in tears. Burns seemed much affected by the print, or rather the ideas which it suggested to his mind. He actually shed tears. He asked whose the lines were, and it chanced that nobody but myself remembered that they occur in a half-forgotten poem of Langhorne’s, called by the unpromising title of The Justice of the Peace.” Here’s poem about the sadness of a wife or mother. I think this is Blessed Virgin Mary. When I was in mental hospital for depression they had art therapy and I joined all the therapies hoping I’d get well. I didn’t. I got raped… by a Jewish doctor.. and threatened for life. But there is a “law of limitations” for Jewish rapes, but “no” law of limitations for Jews to persecute, hound, prosecute even murder the White smartest Germans who only wanted to “deport them.” It is why Whites cannot deport the Jews today, why Lincoln couldn’t deport the slaves back to Africa as he wanted, and why Whites can’t deport the 50,000,000 Brown Mexicans back to one of the richest countries on the planet, Mexico, but they want to use up our $$$ first to build their country up, and then leave the White USA in ashes. Mexico is loaded to the hilt with natural resources, oil, gold, fertile land, etc. In poem “Justice of the Peace” the sad woman could be the wife or mother of the soldier either imprisoned by the enemy (whether mental or physical prison as Jews put us in). The entire poem is here. The first stanzas talk about the “monster” she has to deal with. Jews told us Hitler and Nazis were monsters. I’m calling the Jews monsters. Would you cry seeing your son or husband come back from war addicted coffee, cola, cigarettes, heavy booze, Scotch, addicted gambling, womanizing for the yellow women were more than happy to spread their lips below for the change of having a “white” baby and perhaps marriage, citizenship, screaming nightmares, testicle shot off, (obviously the Jew and Yellow Commies don’t want us to have babies) pierced ear drums, hookworms, horrible malaria. And he was “forced” to go or go to prison with a record that he would never be able to work again!!!!!!! I know someone close who was a “conscientious objector” and refused to go. He was assaulted badly by Blacks in South Chicago, and could never get a job for he was “black-balled!” Even with a Master’s Degree!!!!! Why? He was White, and the Jewish Civil Rights Act made by religious Rabbi in a synagogue in 1965 was passed to take away this other man’s civil rights objecting to his body being torn to shreds, his mind smashed, his nerves fried… for Jew Commies and Yellow Communists’ with face of Black Commie Obama and Michelle and their takeover of world! On page 87 is also a poem called “Genius and Valor” about Scottish White Geniuses which I’m also reading a book about. “The bard whose gentle heart ne’er gave One pain or trouble that he knew to save The poem talks of being “Freed from the Gothic graves” such as the one the White species is in today. “When taste and ‘genius’ of the royal mind” (It gives the hint that indeed White royalty and breeding were of the “highest.” It reflects two things in Jew’s destruction of us. 1. the Royals were of the highest and that is why Jews bred with them, married them like President Kennedy’s and Clinton’s daughters. Since childbirth they were bred and educated to the highest and have the most “connections.” Talk about Jewish networking, Whites can’t even dream of it and only get frustrated for we can never achieve what the Jews have taken from us by force and crime. Even if we become like them, we still don’t have the 15,000,000 highest and richest most powerful to back up or network with. We sometimes have just poor Whites and it just depresses them more to realize. Also it is why Jews had to murder and assassinate Royalty for they were the “highest” and Jews had to kill off the “highest” so they can be the “Chosen of God” which our Whites are now insane into ‘believing’.) “In nervous strain Dunbar’s bold music flows” This country and Jews had pushed my parents beyond the brink of nervous strain with family of 15 for slaves for Jews beyond any kind of endurance that even a top athlete could withstand. Jews have done the same to me. “Hail, Anna, Hail! O May each Muse divine!” Odd but I mentioned my mama’s nervous and physical and mental strain as slaves for Jews above and have never seen this poem before, but my Mama’s name is “Anna.” I wonder if the Jews raped my poor White Polish Catholic Mama and got away with it as they did me as the White German girls until Nazis educated them in schools about the evil Jew and taught them how to make police reports. “With wreaths eternal grace thy holy shrine Graved on thy tomb this sacred verse remain This verse more sweet than conquest’s sounding strain She bade the rage of hostile nation’s cease The glorious arbitress of of Europe’s peace She through whose bosom rolled the vital tide In Britains monarchs one stream ‘allied’ Closed the long jealousies of different stray And saw united sister’s realms obey Auspicious days when Scots no more oppressed On their free mountains bared the fearless breast (And my breast is fearless) (It then talks of exploring Africa in peace… what a mistake! Whites should never have been suckered into the Jewish slave conspiracy!) “Boast Scotland, boast they sons of mighty name Thine ancient chiefs of high heroic fame (yet Europe has been evacuated by 6,000,000 Jews who illegally came here from a Jewish conspiracy against Whites of both Europe and USA… and as Jews did when hundreds of thousands suddenly left Poland in 1096, the Jews left Europe en masse and emigrated to Poland to fill those vacant homes, jobs etc. Europe “lost” the Jews, but “lost again” by winning the Muslims their “Semite” brothers and sisters! There are 3 religions: Christians, Jews, Muslims. They are both “Semites.” We are the opposite or Christians so in reality “anti-Semites”. Not in a cruel way, but our beliefs are different. Muslims and Jews, especially Jews are the Anti-Christ or Anti-Christians as can be seen in the 100,000,000 White Christians the Jew Communists killed in Communist Eastern Europe and Russia. ) From the “Justice of the Peace,” by Rev. Langhorne. “See the pale mother (wife, sister of Veteran, daughter or Blessed Virgin Mary sunk with grief at just how evil the Jews treated her and her son Jesus Christ! Until today, the Jews crucify him and us) sunk with grief and despair “To the proud farmer fearfully repair Soon to be sent with insolence away You can see the rest below. But “note” the Scottish were farmers. Robert Burns, famous genius poet a ‘ploughman.’ Why didn’t USA and Jews if they had any mind at all, bring White farmers here. If they were “drinking” cure them. Black farmers misnamed slaves, shuffling one that pretended to work so Jews could bring and sell more to White suckers like us.. But Blacks were drunks. They had to be for the Jews sold the African “Kings and Queens” bottles of rum to buy the cannibals and wild natives and some still are not civilized thanks to Jews. Mary weeps because the Jews persecuted her since she carried Jesus in her womb for they would have stoned her to death! Plus the Jews arresting, torturing, imprisoning and murdering her son! Leave a Reply WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s %d bloggers like this:
get a grasp on Definition of get a grasp on 1. :  to gain a good understanding of We're still trying to get a grasp on the situation. Word by Word Definitions 1. :  to gain possession of :  to receive as a return :  earn :  to obtain by concession or entreaty 1. :  something begotten: :  offspring :  the entire progeny of a male animal 1. :  a document of release from obligation in Jewish law :  a bill of divorce :  a religious divorce by Jewish law 1. :  to make the motion of seizing :  clutch :  to take or seize eagerly :  to clasp or embrace especially with the fingers or arms 1. :  handle :  embrace :  hold, control Seen and Heard What made you want to look up get a grasp on? Please tell us where you read or heard it (including the quote, if possible). soon or gladly Get Word of the Day daily email!
Bilingual Storytime At Your Biblioteca Published on This is the Power Point for a presentation I am doing at the Virginia Hamilton Conference on Multicultural Literature for Youth in April 2010. The presentation is titled, "Bilingual Storytime at Your Biblioteca: What, Why and How." This presentation is designed to provide library staff interested in developing a bilingual storytime program a framework for doing so. There is information for current bilingual storytime practitioners on how to enrich their programming using early literacy skill building techniques. Ideas on how non-bilingual library staff can make their programming more inclusive of the Latino community are also presented. Published in: Education • Be the first to comment No Downloads Total views On SlideShare From Embeds Number of Embeds Embeds 0 No embeds No notes for slide • Introduce myself and Village • Be friendly and welcoming (reference WJ survey), promote services and programs offsite where they areShow example of stereotypes in books; Elya and Paul examples of text with Spanish words – Dear Primo tooReference Kenton County librarians • Point A: statistics, though it will take time to develop an audience so know whether or not this will work for your communityPoint B: Does your organization have a diversity initiative? Get this added to the diversity planPoint C: Are you trying to reach out to Spanish-speakersPoint D: Is early-literacy a priority for your organization? • Remind group not to fall into sterotypes; then share details specifically about the community Village serves6 early literacy skills – vocabulary, letter knowledge, print awareness, phonological awareness, narrative skills, and print motivationImmigrant families care about their children’s education and want them to learn English and to fit in; they are afraid to interact with their child “too much” in SpanishSongs, talking, practicing shapes, making up silly rhymes, etc. Be sure to explain what you are doing and why throughout the program for parents in both languages, as well as having a handout. • You need your front lines staff to help promote your program – CML example and how VB staff help tooStaff who do not speak Spanish may look at Latinos as “your customers” and not offer the same level of service; may also be intimidated to work with non-English speakers or fear this program is going to require them to learn new skillsGive them a reason to care and they will be your best support! • These four things will help you attain success and overcome barriers and challenges. • Where can you go for this information? Local leaders, such as Hispanic/Latino organizations, local papers, local radio, churches, ESL teachers. You may have to be prepared to seek these people out. How much groundwork you need to lay depends largely on where your organization is currently in terms of providing service to the Latino community. • Point A: Cannot establish a successful program without administrative support. This can be the biggest challenge you may face.Point B: Don’t fear data! Look to community demographics for support. Hook into bigger projects both at the level of your organization and at the community level.Point C: Is serving the Latino community important to your Director? Anyone on your board? Be sure they know who you are and what you are doing. • Point A: Need to be able to articulate your points in terms of organizational values and vision, community data, anecdotal success. Know who responds to numbers, stories, etc.Point B: Involvemedia. Celebrate successes, even small ones. Point C: Be sure people know what you are doing and why it matters within the appropriate institutional framework. Reward others for helping.Point D: Dia de los ninos, Dia de los muertos, Hispanic Heritage monthPoint E: Is your website in Spanish? Do you have materials from Latin America? Do you have bilingual staff, particularly from the Latino community?Some of what you can/cannot change depends on where you are in the organization. This is why it is essential to gain administrative support and work with allies for your cause. • Establishing a new program is expensive and everyone is fighting for resources – be thrifty from the beginning, look for outside funding (and be prepared to spend it if you get it), and build on what you already have. • Controversial disclaimer.Point A: Target preschool age, with materials for babies and toddlers too. Explain that it is a family program at the outset.Blend lots of techniques into each program, so there are books and music in addition to flannels, puppets, drawing stories, creative dramatics and games.Keep program interactive so that it works for all ages. Continually tell families why we are doing what we are doing and how it reinforces specific skill development. • If serving a new immigrant community, cannot take it for granted they know the expectations of storytime. Also, your expectations may be different from expectations at other libraries, schools, etc. Show sample handouts • Demonstratefingerplay • Point A: Piñata publishers example. Point B: Example of poor girl that has to cut off braids. Point C: Isabel Schon center for evaluating books and translations. Point out that this happens a lot with rhyming books • Online patterns and recommended websites – how to find • Bilingual Storytime At Your Biblioteca 1. 1. Bilingual Storytime at Your Biblioteca: What, Why and How<br />Katie Cunningham, Children’s Librarian<br />Lexington Public Library, Village Branch<br />Lexington, KY <br /><br /> 2. 2. Cuentosbilingües en la biblioteca de village<br />Miss Katie reads Perdido y encontradoby Oliver Jeffers to local children enjoying a bilingual storytime about friendship at the Village Branch Library.<br />February 10, 2010<br /> 3. 3. Today we will cover…<br />What is bilingual storytime, and who can do it?<br />Why should my library/school offer bilingual programming?<br />How do I plan and implement a bilingual storytime program?<br />Resources and questions<br /> 4. 4. Why are you here today?<br /> 5. 5. What is Bilingual Storytime<br />…and who can do it?<br /> 6. 6. Bilingual Storytime Is:<br />A standing storytime program that uses various elements such as books, music, fingerplays, flannelboards and other storytelling techniques to equally promote and encourage the development of early literacy skills and inspire a love of reading in both English and Spanish<br />From “Bilingual Storytime: What, Why and How” chapter by Katie Cunningham in Celebrating Cuentos: Promoting Latino Children’s Literature and Literacy in Classrooms & Libraries, edited by Dr. Jaime Naidoo. To be published Fall 2010.<br /> 7. 7. What if I’m not Bilingual?<br />Incorporate books by Latino authors/illustrators<br />Incorporate books that positively feature Latino characters<br />Choose books that have some Spanish words in the text<br />Choose bilingual books and read the English, while pointing out that Spanish text is also included<br />Use Spanish and/or bilingual movement songs, rhymes and fingerplays<br />Tandem programming with community volunteers<br /> 8. 8. Why Should I Offer Bilingual Storytime at my School/Library<br />…and how do I convince my boss?<br /> 9. 9. Benefits of Bilingual Storytime<br />Casts a wider net than monolingual storytime; will appeal to those already speaking Spanish and those who want to expose their children to other languages<br />Opportunity for social interaction among diverse groups of children <br />Opportunity to visibly welcome your Spanish-speaking community, and to showcase Spanish materials, programs and services<br />Model early literacy skill building techniques in two languages<br /> 10. 10. Literacy Needs of Latino Children<br />There is no one picture of the “Latino” child!<br />Every Child Ready to Read / Cadaniñolistopara leer<br />Reinforce to parents importance of speaking/reading with children in their native language<br />Alternative early literacy skill building techniques for low-literacy parents<br /> 11. 11. Challenges to Bilingual Storytime<br />Staff Buy-In<br />Budget<br />Anti-Immigrant Sentiment<br /> 12. 12. My Advice?<br />Know Your Community!<br />Know Your Administration!<br />Be An Advocate!<br />Don’t Reinvent the Wheel!<br /> 13. 13. Thinking about your community<br />Who are the Latinos in our community?<br />Where are they coming from and why?<br />How long have they been here?<br />Where do they live?<br />How do they exchange information?<br />What organizations are helping the Latino community?<br />Do the Latinos in our community use the library?<br />If no, what barriers are preventing this?<br /> 14. 14. Thinking about your administration<br />What are the mission, vision, values and strategic goals of your organization?<br />How does bilingual storytime align with each of these?<br />What is the goal of bilingual storytime and how will you measure its success?<br />Outreach? Kindergarten readiness? Inclusive programming?<br />Who are your advocacy allies? Who are roadblocks?<br />Know what motivates them!<br />How can you maximize/minimize their impact?<br /> 15. 15. Be an Advocate!<br />Always remember, Advocacy Is Not Whining!<br />Sell your story<br />Invite others to observe or participate in your program<br />Turn cultural celebrations into large scale events that the whole library/school can be part of<br />Encourage holistic inclusivity of the Latino community in all things your organization does<br /> 16. 16. Do Not Reinvent the Wheel!<br />Collection – bilingual titles are more bang for your buck than translations<br />What does your organization already have that you can modify?<br />Flannels<br />Drawing stories<br />Storytime kits/plans<br />What have other bilingual storytime practitioners already done that you can do too?<br /> 17. 17. ¡EstoyLista! I’m Ready! So Now What Do I Do?<br />Choosing books and planning bilingual storytimes<br /> 18. 18. My Approach<br />Family storytime format<br />Early literacy development<br />Math/science skill inclusion<br />Books by Latino authors/illustrators<br />Traditional folklore and nursery rhymes<br />Repetitive and cumulative tales to reinforce specific Spanish vocabulary<br />Simple movement songs with motions in the lyrics<br /> 19. 19. Matemáticas in bilingual Storytime<br />We graphed our amigos during our friendship storytime to explain math concepts such as counting and comparing in a visual way.<br /> 20. 20. Common Outline<br />Typically a 30 minute program<br />Welcome – take time to explain rules and to point out early literacy skills<br />Opening Song<br />First Book<br />Storytelling: Flannelboard, Drawing Story, Creative Dramatic or other technique<br />Second Book<br />Movement Song<br />Third Book<br />Closing Song<br /> 21. 21. Sample: Snow/Nieve<br />Welcome<br />Opening Song: “Hola amigo”<br />Fingerplay: Five Little Snowman / Habíancincomuñecos de nieve<br />Froggy se visteby Jonathan London<br />Retell using flannelboard to reinforce clothing vocabulary<br />Movement song: “Los niñoscuandobailan”<br />Phonological awareness and vocabulary<br />El día de nieveby Ezra Jack Keats<br />Reinforces narrative skills<br />“Disappearing Snowman” cut-and-tell<br />Closing Song: “Adiós amigos”<br /> 22. 22. What to avoid<br />Overly wordy bilingual books<br />Books that reinforce stereotypes<br />Translated books with awkward word flow<br />Books you don’t like<br /> 23. 23. Flannelboards<br />Folktales and cumulative stories<br />The Bossy Gallito<br />La Hormiguita<br />Stories that reinforce vocabulary<br />Brown Bear, Brown Bear, What Do You See?<br />Picky Paul<br />Eight Animals<br />Dog’s Colorful Day<br /> 24. 24. Final Thoughts<br />Did we cover everything?<br /> 25. 25. Final Thoughts<br />Available resource lists<br />Establishing a Collection to Support Bilingual Storytime: Recommended Books and Music<br />Recommended Online and Print Resources<br />Taking Storytime Home / Cuentos en casa<br />Bilingual Family Storytime Sample Plans: <br />Birds / Pájaros<br />Friendship / La amistad<br />Questions?<br /><br /><br />
distichaisis{ DISTICHIASIS } The severity of the problem and the need for treatment vary from patient to patient. Some patients may have only a few distichia (abnormal hairs) on a single eyelid, while others may have several distichia present on all four eyelids. Although some patients live their entire lives without being bothered by their distichia (common in the American Cocker Spaniel), others require medical or surgical treatment to alleviate irritation caused by the hairs rubbing on the cornea. Temporary relief may be provided by pulling out the abnormal hair in the exam room, but these lashes usually grow back. Topical ointments may be used to help lubricate the eye and protect it from the hair. If clinical signs persist, one of two different surgical procedures can be used to treat distichiasis. Electroepilation involves applying heat to the eyelid to destroy the hair follicles. Cryosurgery involves freezing the lid and follicles. Both procedures destroy the hair follicle and serve to prevent the distichia from growing back. Although surgery usually prevents the distichia from growing back in the same area, new distichia could potentially emerge. Therefore, while surgery fixes the immediate problem, it is possible that the patient could have a future distichiasis problem if new distichia grow from other follicles in the eyelids.
Make a blog 2 years ago Environmentally-Friendly Ways to Get Around Town People whod like to limit their impact on the environment by minimizing the amount of time they use their car have a number of different options for getting around town, each with their own pros and cons. Walking or Biking One of the most environmentally-friendly options is walking or biking. However, this can take quite some time if a person is going any distance and requires that a person is relatively physically fit. Not everyone wants to arrive at their destination all sweaty, and biking requires a place to safely store the bike once a person gets where theyre going. Both of these options can help people reach their weight-loss goals and help people increase their physical fitness level, which most other environmentally-friendly modes of transportation cant do. Use Public Transportation Another option is to take public transportation if its available and goes where you need to go. This isnt always an option, however, and the schedules may not suit everyones needs even when it is available. It is relatively affordable, however, and less polluting than taking your own car. This is the best choice for people going relatively long distances or needing to travel along highways or very busy roads where walking or biking may not be safe or feasible. Motorized Scooters One of the newer alternatives is to take some type of motorized scooter thats rechargeable. This could be a Segway scooter, but these take up a lot of space, are too heavy for many people to carry and can be quite expensive. However, its now possible to get a high-quality two wheel balance scooter, called the smart balance wheel, from The Best Smart Balance Wheel is small, consisting of a platform on wheels thats about the size of a skateboard, making it easy to store. Its also relatively light, weighing in at around 30 pounds, so most people could easily carry it when necessary. It does take some getting used to, as it doesnt have any handlebars to hold onto. Movement is controlled by tilting the body slightly in the direction you want to go. These scooters charge in a couple hours, and each charge lasts for about 10 miles. They cant go over high curbs or large bumps, but can travel easily over smaller bumps or sticks in their path. This type of transportation can be a fun way to travel from place to place without overexerting yourself.
Camerapedia Wiki Leica M4 5,980pages on this wiki Add New Page Talk0 Share The Leica M4 was introduced in 1967, and replaced the 1954 Leica M3. The Leica M4 is by many photographers and collectors alike considered the epic model of the Leica rangefinder cameras. The reason is the finder optics and the superior mechanical quality, not convincingly equalled in later models. However, the question of which is best, boils down to preferences with regards to the finder magnification and which finder frames are needed. Otherwise, there is actually not very much difference among the classic Leica M's, other than the early Leica M3 with double stroke wind lever, the rangefinder-less M1, and the slanted Leica M4 rewind The Leica has a particular shutter sound that connoisseurs appreciate, and there is the highly appreciated feel of quality in every detail. Never the less, the modern Leicas are far removed from the original handmade screw lensmount cameras built of an aluminium tube, steel spindles, and brass plates screwed together. The M-body is a metal casting machined to close tolerances, and every component made to perform reliably under strenuous conditions. The four-pronged lensmount is quick and reliable, and the relevant parallax compensated field-of-view frame is automatically shown in the finder. The standard lens for the M4 would be any number of top quality Leica Lenses. Leitz in Wetzlar was long convinced that their camera concept was perfect and could be made to suit any conceivable task within reason only by providing specialized accessories. In the beginning, this worked fine and any institution with a minimum of self-respect would acquire a Leica outfit for documentation work or for their microscope. The camera finder was not suitable for telephoto focusing and framing, so a reflex housing was devised for long lenses and close-up work, using the SLR principle. It is a truly adaptable system. This being the case, it took Leitz particularly long time to realize that the SLR camera actually could make some sense after all. The Leicaflex was introduced in 1965, and was a beautiful, outdated camera from early on, but eventually the Leica range of SLR cameras caught on, and they are still an item to consider some forty years later; but the remarkable fact is that so are the Leica M cameras! • Leica M3 (1954-1966) viewfinder magn. ×0.91, frames for 50-90-135mm • Leica M2 (1958-1967) viewfinder magn. ×0.72, frames for 35-50-90mm • Leica M1 (1959-1964) viewfinder magn. ×0.72, frames for 35-50mm, no RF. • Leica M4 (1967-1975) viewfinder magn. ×0.72, frames for 35/135-50-90mm In addition, there have been several shorter runs of models, like the MP professional and the MD with no finder. Se Leica M chronology list. Links Edit In English: In German: In Italian: Ad blocker interference detected!
Skip to navigation – Site map Gender and the city: intergenerational spatial practices and women’s collective action in Milan Elena Vacchelli Full text 1Throughout the 1970s Milan was a laboratory for social and political practices. In Milan, before other Italian cities, the 1968 students and workers movement had attempted to subvert local institutions by challenging them through protest and other forms of action. Revolutionary neighbourhood committees and anti-authoritarian schools were self-managed by activists themselves ; like in other Italian cities such as Turin, in Milan factories were the key place of this struggle consisting of strike actions and demonstrations. These actions were often ending up in dangerous street guerrilla where the level of social conflict was increasingly rising up until 1977, when a stark police repression concurred to push several members of the student and workers movement to act under cover. The late 1970s were also the years when the student and worker movement underwent a further radicalisation of their political strategies and part of the movement embraced armed struggle (Pozzi, 2007). The feminist movement took shape in this climate of general contestation and started its battle against wo- men’s socio-spatial segregation in the domestic sphere, against the family as an oppressive environment for women and other institutio- nal discriminations rooted in the Italian legal and political system. In order to achieve these changes the feminist movement in Milan adop- ted a specific rationale, that of « sexual difference », a version of French feminism conceptualized by the Milan Women’s Bookstore Collective, which proved fruitful in creating vanguard social practices. Although the feminist movement in Milan can by no means be identified as a single, cohesive actor and was indeed composed by different groups and strands within it, the theory of sexual difference became the prevailing paradigm in feminist discourses and practices (Martucci, 2008), despite some disagreement and internal frictions (Melandri, 2000).   2New feminist social practices were aimed at generating changes in the political subjectivity of the participants and ultimately impacted on the ways in which women appropriate and use urban space. Examples of these practices include consciousness-raising and separatism as discussed extensively in Vacchelli (2011), however insights on these practices in conjunction with « sexual difference » fall outside the scope of this article. What is important here is that the outcome of these transformative practices resulted in the integration of the personal sphere, such as sexuality and other multiple sources of oppression, in the political sphere and played a central role in the implementation of legal frameworks in the field of divorce, abortion and domestic violence to include marital rape and honour killing. Despite the specificities of Milan with regards to original routes to achieve similar aims, overall in Italy, but mainly in medium to large cities such as Turin, Bologna, Rome and Naples a combination of mainly white, middle-class and working class women started fighting for a new social identity that would have allowed them to become collective actors and to gain a first-time access to Italian political institutions. These newly conceived institutions would have had to reflect personal dimensions of women’s life to include the family, relationship between men and women, their role as mothers and many other personal domains where they felt oppressed. 3This article looks at two main shifts in space appropriation which are specific to the feminist movement in Milan. The first shift is the one which made it possible for women to get organized and collectively appropriate public space in the city. The second shift refers to the consolidation of these achievements and the social transformations involved in the definition of contemporary women’s organizations in Milan as heterotopia spaces. This article is situated theoretically in the field of gender and urban studies (Bassanini, 2001, Bondi, 2002, Greed, 1994, 2005 ; Hubbard and Saunders, 2003 ; McDowell, 1999, Nash and Bain, 2007 ; Spain, 1992, 2001 ; Terlinden, 2003, Watson, 2002, Wilson, 1991) and combines a Lefebvrian with a Foucaultian framework to illustrate specific feminist strategies of space production and appropriation (Lefebvre [1975] 1997, 2003 ; Doderer, 2003 ; Johnson, 2006 ; Foucault, 1970, 1986). The originality of the proposed approach lies in its innovative reading of the shifts in space appropriation operated by feminist movements in advanced capitalist cities. 4The ways in which feminist politics mobilizes space highlight aspects of continuity and difference between two generations of feminist space appropriation. In Milan women’s collective action has been particularly motivated by space appropriation as is evident by the progressive opening of women-only bookshops, cafes, restaurants and autonomous nurseries (Milan Women’s Bookstore Collective, 1990, Martucci, 2008, Melandri, 2000, Muraro, 1993). As this article demonstrates, this strategy gradually changed as also the spaces to appropriate become more stratified and diversified reflecting an increased institutional complexity. Daphne Spain (1992) argues that women’s status is lower in societies in which housing is sexually se- gregated and institutions tend to reflect the degree of gender segregation across cultures and over time. « Spatial segregation does more than creating a physical distance : it also affects the distribution of knowledge women could use to change their position in society » (p. 3). Institutionalized segregation is both an outcome and a cause, contributing to reproduce gender stratification. A modification of spatial arrangements is deemed necessary in order to break this vicious circle and create a workable social change (Spain, 2001). 5By drawing on Lefebvre’s theory of space appropriation this article shows how feminists from the 1970s onwards were able to deconstruct the domestic borders of their homes and make them public. Hybrid forms of separatist private-public environments were considered essential in order to define their social identity and shape their novel political subjectivity as feminists (Vacchelli, 2011). However both separatist practices and rigid separations between public and private spheres have changed ; so has the level of ideological cohesion across two generations of feminism. 6From a methodological point of view, the article makes selective use of 40 semi-structured interviews with women’s organizations leaders, activists and ex-activists across two generations interviewed in Milan between 2006 and 2008. The set of qualitative data presented here is also based on participant observation and archive work at the Fondazione Badaracco over two years. Empirical data gathered during fieldwork in Milan confirm that, despite conflicting strands and intergenerational differences in contemporary feminism, urban space appropriation has played a key role in the definition of political practices for women’s collective action. Space appropriation 7(Social) space is a (social) product 8Henri Lefebvre 9To widen the imagination of space and interpret it as dynamic and as a key sphere for exploring power relations and material/symbolic boundaries in society, it is fundamental to understand how space is appropriated and used. Feminist work has looked at space in terms of spatial relations that are continually produced and contended within cities and has used the work of Henri Lefebvre ([1975] 1997, 2003) to engage with daily practices that produce space (Marston and Smith, 2001, Simonsen, 2005) despite the fact that Lefebvre himself had neglected a specifically gendered perspective in his theorizations. These feminist scholars have shared the understanding that, for Henri Lefebvre (1975), social space is essentially a social product, sugges- ting that the production of space is not about the production of material objects and goods, but a series of relations that are created by production forces, social practices, different technologies and products of knowledge, as well as social structures and institutions. Space is not, therefore, just the resulting effect of its production, such as monuments and goods, but also, and fundamentally, the result of a production process as an experience of the accumulation of knowledges  exemplified by the work of production and reproduction. Production for Lefebvre clearly refers back to Marx and Engels in relating to modes of production, goods and work. Ed Soja (1996) reminds us that the space thus produced serves as a power base for certain actions : « [I]n addition to being a means of production [space] is also a means of control, and hence domination, of power » (p. 26). 10Space is for Lefebvre a product, but at the same time it is not an object in a physical sense nor a pure abstraction. Instead, the term space is always employed to mean a social space. People do not stand in front of or close to social space like an exhibition or a picture, but they assume that space as it is constituted (Doderer, 2003). This dialectical relation is constitutive of spatial practices that have to be understood as social and political practices. 11The Production of Space, first published in 1975 and translated into English in 1991, constitutes an attempt to combine all possible forms of space production and appropriation, from abstract to material ones, and represents Lefebvre’s effort to theorize space deliberately adopting a Western European and capitalist perspective. 12Spatial practices are the formal aspect of production (and reproduction) of space, are situated in the everyday and can be both subjective and collective. Routes, networks and other patterns of interaction lin- king places to each other make spatial practices possible. Spaces of representation refer to the function of space more than its formal aspects ; it is about conceptual space which is imagined by professionals and technocrats such as planners, developers, architects who give shape to material representations and are inspired by ideologies which are inscribed in certain contexts of power and knowledge. Finally, spaces of imagination refer to the actual construction of space and all the appropriation strategies which oppose existing power relations. They represent the counter-cultural, underground, clandestine sides of social life and they are particularly appropriate to explain women’s groups and their battle against the patriarchal society in which they are situated.      13Appropriation of urban space happens at every level of the triadic construction developed by Lefebvre (1997). In terms of the third case (spaces of imagination), Lefebvre includes in his construction the appropriation of countercultural spaces. Lefebvre refers to spaces as topoi (singular form of the Greek topos) and describes isotopia spaces as analogous spaces, heterotopia as contrasting and different spaces and utopia as places of that which no longer has a place. In this article we add that the shift from a-topia (literally, lacking a place) to topia (having a place) describes the process of space appropriation by feminist movements in advanced capitalist societies, which allowed for women’s access to the political sphere. This perspective integrates Lefebvre’s analysis of social space by offering a new category of spaces aimed at including sexual difference in the horizon of the already delineated isotopic, heterotopic and utopic spaces. 14Lefebvre discusses heterotopia in The Urban Revolution (2003) and defines it as « the place of the other » or marginal space, referring to something that takes place outside the city but is still interwoven with the city itself (such as exchange and trade outside the 16th century city walls). « Heteropic » parts of the medieval city were inhabited by outcasts and other marginal or dangerous people. However Lefebvre concentrates on the potential for utopic space, a paradoxical, contradictory non-place, opposite to the everyday to cut through capitalist spatializations and resist homogeneity to break up the rigorous ratio- nalization of time and space (such as holidays, festivals and celebrations) (Johnson, 2006). 15Although not systematically theorized, Foucault (1970, 1986) provides a definition of heterotopia which is more fruitful for analysing women’s groups and organizations in Milan, as they are real spaces as opposed to utopic spaces which create spatial and temporal disruptions and interrogate and undermine certain formulations of utopia. For Foucault therefore heterotopia is about conceiving space outside, or against, any utopian framework or impulse (Johnson, 2006) and its reality embodied and emplaced onto the Milan map will be further addressed in the discussion of contemporary Milan and the role of women’s organizations. 16Appropriation does not only refer to a natural occupation of goods in a Marxian sense but to an activity which is first and foremost spatial, taking place in space and with space. As a reflection on the contested nature of urban space, the feminist movement in Milan started to collectively appropriate milieus of everyday life in which to live, organize and participate in political meetings and build up feminist struggles. New spatialities aimed at contesting previously set and exclusionary boundaries were created to enhance and promote a culture of the feminist project through women’s centres and organizations. Space appropriation provides the starting point and the theoretical background to discuss the shift from topia to atopia and the hybrid nature of women’s spaces (heterotopia). This will be useful in exa- mining the specifically gendered processes at stake in the subversion of urban public space operated by women’s collective action from the 1970s onwards. Towards the polis 17Paradoxically, the starting point for the appropriation of public spaces in Italian cities took place in the submerged and unspecific space of the home as it happened in other international contexts such as the US, the UK and Germany (Bowlby, Mc Kie and Gregory, 1999, Hayden, 1981, Rose, 2003, Terlinden, 1980). Domestic space was for too long defined as a « natural » space for women (Wilson, 1991, Terlineden, 2003, Landes, 1995), within the rigid patriarchal order of Italian society. In other words, domestic space was, for Italian feminists, the starting point for the subversion of social space and relations, an area to re-appropriate through deconstructing its boundaries and challenging its traditional order (Fare’, 1992). As argued in Bassanini (1990), Fare’ (1992), Muntoni (1982) and Sarti (1995), the house in Italy as in other patriarchal societies was a space in which women were expected to contribute to the continuous care of the other (generally male but also the youth, the elderly and the sick). The domesticity of the home came to be associated to a museum, as the li- ving space had to be kept tidy, clean with a high symbolic value for the family’s economic and social status. It has, over time, also been compared to a symbolic « prison » for women. Ida Fare’ (1992) describes the need for incessant and cyclical cleaning and nurturing using the image of the invisible woman who, in the domestic sphere, keeps cancelling her own footsteps to remain invisible. In this perspective, domestic subversion of the strict gender roles within the domestic sphere represented the first rupture with the Italian cultural establishment operated by the Italian feminist movement. To untidy the home, re-organize it according to a new use-value, inhabit it with different and new criteria, eliminating sofas and chairs, and adding carpets and cushions also meant freeing bodily postures and eliminating barriers between different spaces in the house. This also meant enriching it with new meanings, bringing the political within domestic walls and creating the polis through house meetings of feminist collectives (Fichera, 1996, unpublished source). 18Making the domestic sphere public thus breaking the rigid boundaries between the two spheres was the first step towards the re-appropriation of denied public spaces. The ghost of the home as a prison was eliminated and the new home became a primary place that was to be inhabited differently. In this sense, the space of the home became a porous place for new political synergies where feminist collectives could meet or where independent feminist magazines, such as for instance Lapis, were discussed and produced as Lea Melandri, leading figure of  Milan’s feminism, recounts during an interview with the author (June 2007). This disruption of the fixed borders between internal/external, public and private, by bringing public life within domestic walls suggests a radical change in the use value of the home and a re-appropriation of its spaces. 19From the late 1960s onwards, the hybridization of space through innovative spatial practices informed by feminist theory suggested a radically new social use of urban space. As a result, space itself underwent a transformation assuming new values and meanings. As Fraire (1996) argues, the strengths that allowed for the transformation of the public/private spheres started from inhabiting the body diffe-     rently as a primary space to then change the private space of the home and subsequently the public space of the polis. In order to change the way in which women inhabit their body, feminist activists during the 1970s felt the need to experiment with social practices by artificially separating from the male gaze whilst in search for their novel political subjectivity (Vacchelli, 2011). This separation was firstly experimen- ted within the social practice of separatism, according to which the body of the participants was perceived and experienced differently when situated away from the male gaze and discursive hegemony. One of the main aims of separatism in fact was re-creating an environment where women were able to represent themselves outside of the male hegemonic discourse and create their own discursive order. The relationship among women in the context of separatist feminist politics paved the way to a re-territorializing of the borders between inside and outside, internal/external, private/public. Lea adds :   «We went to dig into the least political area, far from institutions, from public life. This also included the creation of new political practices such as consciousness raising i.e. working with the sub-conscious and in the pre-history of personal lives. »   20Practices such as consciousness raising necessarily required separatist spaces in order to successfully enable a reflection on women’s oppression and envisage shared political strategies in order to overcome it. The use of space, until then mainly limited to a restricted horizon — i.e. the atopic sphere of the home — changed, as the body itself became a new space able to inhabit the polis. From separatism to heterotopia : transforming the polis 21In contrast with a-topic space of the home, separatist groups and collectives were positioned in specific locations which have a particular meaning in the socio-political mapping of Milan. In order to read Milan’s maps, it is important to understand that Italian cities are usually depicted in terms of centre and periphery (Foot, 2001, Martinotti, 1999). While the former is a privileged site, the latter is commonly boundless and is often affected by poverty and social exclusion. « Regardless of whether it captures some elements of reality, this powerful yet contrived dichotomy inevitably reifies the spatial relations that are continually produced and contended within cities » (Dines, 2012, p. 15). 22Feminists’ experience of place is difficult to re-construct, since it is only known through oral history and is seldom written down. Wo- men’s unwritten genealogy is usually reconstructed through narrations, direct experiences of some places, sometimes indirect experience, pieces of lived life, thoughts, militant slogans, pictures and objects that would have allowed for a reconstruction of this particular story. Personal paths intertwined with collective trajectories of the feminist movement made it possible to increasingly acquire political visibility by occupying material space in the city. The redefinition of women’s political subjectivity would only have been possible in separatist places which were located outside of the mainstream cultural traditions of the public sphere, until then organized by men in the Italian society. This meant creating counter-cultural political spaces (Fraser, 1990, Lefebvre, [1975] 1997) or « spaces of imagination » to use Lefebvre’s phrase, opposing existing power relations and representing underground, oppositional and clandestine sides of social life, which, in the case of feminism, took the shape of feminist cafes, libraries, independent bookshops and self-organized nurseries, anti-authoritarian groups and collectives in work places. 23Separatism is a central aspect of feminist political practices that however needs to be understood in the context of temporary identity building whose outcome could be defined as « selective topia »: the imagined spaces appropriated in the 1970s generation can only be accessed by women and the artificial boundaries delimiting this separation would soon be dismantled1.   Map on contemporary women organizations 25Contemporary women’s groups are the legacy of the kind of public spaces that the feminist movement produced in 1970s Milan and re- present, in this article, the second generation of collective space appropriation by the women’s movement. There are 103 such groups and organizations scattered in contemporary Milan and they are distributed unevenly across the Milanese territory, with a higher concentration in the city centre and fewer in the second and third rings around it. As it is visible from the map, the Corso di Porta Nuova address is of particular significance for the women’s and feminist movement in Milan as several groups are based there today. Historically, the elegant Corso di Porta Nuova buildings were the headquarter of the Unione Femminile Nazionale, an early 1900s group of upper class intellectual women concerned with women’s work and political representation. Milanese suffragists also donated a women’s library in the same location which is still operative today. 26Contemporary women’s centres and organizations are, in part, a legacy of the previous generation and in part represent new stances within the movement2. Approximately one third of these organizations define themselves as feminists, yet they are mainly left wing and there is no right wing groups represented among the women’s organisation mapped in Milan. While definitional boundaries of the feminist movement are easier to identify in the 1970s, in contemporary Milan these definitional boundaries are more blurred. I therefore chose to represent women-only civil society groups which include service providers, single-issue and multiple-issues independent groups and movement organizations. These groups target in some instances the entire society and in other instances a group’s own constituency. The so called « professionalization » of the women’s movement and the shift from feminist movement to « diffused feminism » as defined by Calabro’ and Grasso (2004) from the 1980s onwards contributed to fragment general feminist concerns into single-issue (such as violence against women, or women’s health) and project orientated groups.        27Within contemporary women’sgroups based in Milan, professio- nals coming from different sectors collaborate transversally with private and public institutions locally, nationally and at European level. The often individual and diversified experience of women organizations in Milan can be classified in three stands of activity that provide a broad goal-oriented framework to identify women-only organizations in Milan : 1. organisations with a gender mainstreaming goal aimed at transforming  political institutions from within through training and mainstreaming gender by promoting projects to do with employment, 2. organizations that mainly focus on services such as hel- ping with integration of migrants, providing support for women who are trapped in violent relationships, provide focussed health support for women and family related matters, assist elderly, housewives and other socially excluded women and 3. movement organisations which are usually more overtly anti-institutional. These frameworks at times overlap and new organizations are constantly being set up. Despite recent synergies mobilized in opposition to Berlusconi’s government, contemporary voices of feminism in Milan do not share the same views if compared with the more homogeneous strategies of the previous generation and tend to have different ideas with regards to the usefulness of separatist politics. So speaks one of the members of a movement organization : « (…) we are not separatist strictly speaking but claim for a separatist space for political theorization. We realized that before mixing up with the world it is fundamental to have a moment of consultation just among women because it’s different. For instance we do invite men to our initiatives but they cannot participate in our group’s mee- tings. »   28Intergenerational views on separatism are different as shown in the quote above. Today spatial practices such as separatism are used selectively in the light of the previous generation’s achievements. The younger feminists 29The so-called « younger feminists », a network of women in their thirties, mainly academics, have recently defined the positions of   contemporary feminism in Milan3. The central aspect of their activism revolves around conditions of temporary work that Western European youth is experiencing in the current socio-economic cleavage. Accor- ding to the younger feminists interviewed in Milan, older feminists fail to fully comprehend the impact that precarity has on several aspects of younger women’s lives. In their analysis, precarious work conditions from being a merely economic category addressing new forms of occupation and labour relations is turned into an instrument of struggle. Over the last ten years, four networks of young feminists (Sconvegno, Prec@s, A/matrix and Sexyshock) have appropriated precariousness, sometimes inverting its connotations and looking at it positively in a provocative manner and inspired to queer theories (Fantone, 2007). These aspects in particular reflect the « diversification of the spaces » according to Foucault’s definition of heterotopia « as spatial and temporal disruptions that interrogate and undermine certain formulations of utopia » (Johnson, 2006, p. 1). « The more you meet the people involved in the movement the more you find out that there are squabbles among groups, you find out what the main focuses of each person are as of course you get to know them personally — so my own position is that of great respect for the struggles these women did [interviewee refers to women of the previous generation] and for their theoretical approaches. However there is also an individual positioning, so to say, a space which is autonomous. I am increasingly realizing that, if compared to our specific experiences, they don’t have a mental space to be able to really comprehend our experiences. »     30Interestingly the interviewee traces a line between « us » and « them » and clearly declares the incomprehension that characterizes two different generations within the movement. These disagreements are not just between groups but mainly intergenerational. The follo- wing quote better clarifies the statement : « For instance on precarity of work and life we have had several debates and it makes you realize that they haven’t had these experiences and this makes our positions difficult to understand. We do use their knowledges and we do make use of these fruitful debates however we want to own our communication and be active in promoting our own messages… with many prominent feminists there is this kind of relation… this is because they are extremely intelligent women they are curious and they have recognized our specificity in the context of work and relationships… so they respect us… we think that — okay — they have done their amazing struggle now there are different kind of struggles which they don’t really understand however they are as legitimate. » 31The positioning of the younger feminists is that of setting up an imaginary spatial field which is not separate from the consolidated environment of women’s organizations and civil society actors in contemporary Milan ; it just goes against the grain and offers lines of flight without any logic of contradiction with the previous generation. The heterotopic spaces that the younger feminists describe are rooted in a changed socio-political and economic context if compared with the 1970s and devise different battles to fight at a time when women as collective actors have achieved a consolidated position in the institutional realm of the polis.     « Our analysis starts from work however we realize how this precarity in reality is pervading every sphere of life, relations which are anyway transformed by time of work and even by your way of living your own home — where there is your laptop is your office and hence even your own home magically become your office so we start from this kind of argument and we expand from this anyway yeah, we start from this. » 32The current condition of temporary work for younger generations conflates with the use value of domestic space and the home becomes an office as long as a laptop is there. This particular aspect also reflects the concept of heterotopia as explained by Johnson’s (2006) : « heterotopias are fundamentally disturbing places » (p. 84), because they « alter to different degrees what might be described as everyday existence » (ibid.) and « challenge the space in which we might feel at home ». Like in the example where the home becomes conflated with the office so long as a laptop is there, heterotopias do not exist in pure form and can only function in relation to each other, in a way that clash and create the « spatio-temporal disturbances » that Foucault refers to. Differently from Lefebvre however, according to Foucault there is no inevitable relationship between heterotopias and spaces of hope and utopia. On the contrary, Foucault’s heterotopias are about conceiving space which is situated in the everyday hence outside, or against, any utopian framework or impulse. « Our group is made of 5 people and from the onset it was evident that we are not interested in the intergenerational discourse as such. We are more interested in what it means to perceive oneself a feminist subjectivity today. An intergenerational confrontation among women does not have to necessarily exclude men and one of our aims has always  been  to  go  beyond the  boundaries  of  lesbo  and  heterosexuality. » 33Clearly not only the use of separatism has changed, as it is beco- ming more strategic and aimed at a women-only leadership of strategies and projects, but the focus of the feminist enquiry has changed. The main focus has become « what does it mean to perceive oneself as a feminist subjectivity today » hence the intergenerational perspective tends to lose importance and feminist debates can now include men. The previous boundaries such as women versus men, public versus private are being re-written to include the boundaries between homosexuality and heterosexuality, as in the quote above, although the queer feminism strand was still underdeveloped at the time of the interviews and the queer argument was subsumed under the precarity argument.   34Spatial practices inaugurated by the feminist movement in Milan from the 1970s onwards have been read in the context of space appropriation. In particular, the abolition of imposed boundaries (women’s socio-spatial segregation) and the erection of new and voluntarily established boundaries (separatism) had a fundamental importance in the phase of identity building for the women’s movement and contri- buted to shape feminist subjectivity through separatism. Spatial practices played a relevant role in the contestation of the private and public divide and were deployed to create different divisions, such as separatism, considered useful for feminist strategies. The appropriation of separatist spaces contributed to make these new, re-designed boundaries visible and the material presence of women’s cafes, shelters, bookshops and collectives in the city made women’s political claims become a starting point on which discursively and materially build their political project. 35This article offers an intergenerational reading of space appropriation by the feminist movement in Milan and the women-led civil   society sector which resulted from it. In the case of women’s groups in Milan, urban transformation processes reflected the ambivalences of public and private and set up novel ways to inhabit the public sphere which can be understood as heterotopia according to Foucault’s definition of the term. 36By looking at two generations of women’s countercultural and  civil society groups, this article shows that space organization is    central to how political relations and strategies are negotiated. More- over, changes in social and economic cleavages are necessarily reflected in the ways in which space is used.  From the interview      extracts it emerges that, for the new generation of women’s groups, the domestic sphere no longer represents a limit to full citizenship and active participation in the life of the polis, and offers a basis to a politics where women are no longer excluded and can make a difference. Separatism is still used selectively in order to disrupt the everyday and challenge its hegemonic status. 37Women’s collective action in the 1970s inaugurated the progressive blurring of the boundaries between domestic and public spheres and pioneered ways to disrupt this dichotomy. These « disturbing spaces » and the spatio-temporal disturbances they represent are not just aimed at understanding the gender-related implications of the flexibilisation of the labour market. They are also trying to challenge the alleged continuity between intergenerational feminist practices and affirm the specificity of the current socio-economic cleavage in the West.  This is substantially different from the 1970s and the 1980s and creates different priorities and the need for different strategies. However these heterotopia spaces could not exist without the work of the previous generation. The legacy of feminist spatial practices inaugurated in the 1970s has been welcomed and further developed by contemporary women’s groups in Milan and represent a potential thre- shold for the necessary transformation of institutional politics today. Top of page Anderson Jackie, 1994, « Separatism, Feminism, and the Betrayal of Reform », Signs : Journal of women in culture and so-   ciety, 19/2, pp. 437-448. Balestrini Nanni and Primo Moroni, 1988, L’orda d’oro, Milan, Feltrinelli. Bassanini Gisella, 1990, Tracce silenziose dell’abitare. La donna e la casa, Milan, Franco Angeli. Bondi Liz, 2002, « Working out the urban : gender relations and the city » in G. Bridge and S.Watson, A companion to the city. Blackwell city reader. Bowlby Sophie, Linda McKie and Sisan Gregory (eds), 1999, Gender, power and the household, London, Macmillian. Braidotti Rosi, 2002, Nuovi soggetti nomadi, Rome, Sossella. Calabrò Anna Rita and Laura Grasso, 2004, Dal movimento femminista al femminismo diffuso, Milan, Franco Angeli. Cavarero Adriana, 2000, Relating Narratives. Storytelling and Selfhood, London and New York, Routledge. Dines Nick, 2012, Urban change and contested space in central Naples, Oxford, NY, Berghan Books. Doderer Yvonne P., 2003, Urbane Praktiken. Strategien und Raumproduktionen feministischer Frauenöffentlichkeit, Münster, Verlaghaus Monsenstein und Vannerdat. Dörhöfer Kerstin, 1980, « Die Fußnote oder zum wissenschaftlichen Umgang mit der Frauenfrage in der Wohnungsversorgung und Stadtplanung », Beiträge zur feministischen Theorie und Praxis, 1/4, pp. 30-38. Dörhöfer Kerstin and Ulla Terlinden (eds), 1998, Verortungen. Ge- schlechterverhältnisse und Raumstrukturen, Basel, Birkhäuser Verlag. Fantone Laura, 2007, « Precarious changes : gender and generational politics in contemporary Italy », Feminist Review, 87, pp. 5-20. Fare’ Ida, 1992, Il discorso dei luoghi. Genesi e avventure del moderno, Napoli, Liguori. Feminist Review, 2007, Italian Feminisms, vol. 87, Basingstoke, Palgrave. Fichera Rosaria,1995-96, Sotto il Vulcano. Percorsi spaziali e politici delle donne a Catania, Thesis submitted for PhD, Faculty of Architecture, Milan, Vanda archive. Foot John, 2001, Milan since the miracle. City, culture, identity. Oxford, Berg. Foucault Michel, 1970, The order of things, London, Tavistock. __________, 1986, « Of other spaces », Diactrics,16, pp. 22-27. Fraire Manuela (ed.), 2002, Lessico politico delle donne. Teorie del femminismo, Milan, Franco Angeli. Fraser Nancy, 1990, « Rethinking the public sphere : a contribution to the critique of actually existing democracy », Social Text, 25, pp. 56-80. Greed Clara, 1994, Women and planning : creating gender realities, London, Routledge. __________, 2005, « Overcoming the Factors Inhibiting the Mainstreaming of Gender into Spatial Planning Policy in the United Kingdom », Urban Studies, 42/4, pp. 719-749. Hayden Dolores, 1981, The grand domestic revolution : a history of feminist designs for American homes, neighbourhoods and cities, Cambridge, MA, The MIT Press. Hubbard Phil and Saunders Teela, 2003, « Making space for sex work : female street prostitution and the production of urban space », International Journal of Urban and Regional Research, 27/1, pp. 75-89. Johnson Peter, 2006, Unravelling Foucault’s « different spaces », History of the Human Sciences, 19/4, pp. 75-88. Landes Joan (ed.), 1998, Feminism, the public and the private, New York, Oxford readings in feminism, Oxford University Press. Lefebvre Henri, [1975] 1997, The production of space, Oxford, Malden, Blackwell. __________, 2003, The urban revolution, Minneapolis, University of Minnesota Press. Martin John and Primo Moroni, 2007, La luna sotto casa. Milano tra rivolta esistenziale e movimenti politici, Milan, Shake. Martinotti Guido, 1999, L’area metropolitana, Bologna, Il Mulino. Martucci Chiara, 2008, Libreria delle donne. Un laboratorio di pratica politica, Milan, Fondazione Badaracco and Franco Angeli. Massey Doreen, 1994, Space, place and gender, Cambridge, Polity Press. McDowell Linda, 1999, Gender, identity and place. Understanding feminist geographies, Cambridge, Oxford, Polity. Melandri Lea, 2000, Una visceralità indicibile, la pratica dell’inconscio nel movimento delle donne degli anni Settanta, Milan, Franco Angeli. Milan Women’s Bookstore Collective, 1990, Sexual difference. A theory of social-symbolic practice, Bloomington, Indiana University Press. Muntoni Alessandra, 1982, « Cultura della casa nell’Italia del dopoguerra », Nuova DonnaWomanFemme, 19-20, pp. 510-533. Muraro Luisa, 1993, La posizione isterica e la necessità della mediazione, curated by Mimma Ferrante, Palermo, Donne Acqua Liquida, Biblioteca delle donne, UDI. Nash Catherine and Alsion Bain, 2007, « Reclaiming ranch ? Spatia- lizing queer identities at Toronto’s women’s bathhouse’s events », Social and Cultural Geography, 8/1, pp. 47-89. Percovich Luciana, 2005, La coscienza nel corpo. Donne, salute e medicina negli anni Settanta, Milan, Franco Angeli. Pozzi Paolo, 2007, Insurezioni, Rome, Derive/Approdi. RoseGillian,1993, Feminism and geography : Thelimits of geogra- phical knowledge, Minneapolis, University of Minnesota Press. Sarti Raffaella, 1995, « Spazi domestici e identita’ di genere tra l’eta’ moderna e contemporanea », in Dianella Gagliani and Mariuccia Salvati, Donne e spazio nel proceso di modernizzazione, Bologna, Clueb. Simonsen Kirsten, 2005, « Bodies, Sensations, Space and Time : The Contribution from Henri Lefebvre », Geografiska Anna- ler, Series B, Human Geography, pp. 1-14. Soja Edward, 1996, Thirdspace : Journeys to Los Angeles and Other Real-and-Imagined Places, Oxford, Basil Blackwell. Spain Daphne, 1992, Gendered Spaces, Los Angeles, University of Carolina Press. __________, 2001, How women saved the city, Minneapolis, University of Minnesota Press. Squire Vicki, 2011, The contested politics of mobility. Borderzones and irregularity, Oxon and NY, Routledge. Terlinden Ulla, 1980, « Baulich-räumliche Herrschaft : Bedingungen und Veränderung », Beiträge zur feministischen Theorie und Praxis, 1, pp. 48-62. Terlinden Ulla (ed.), 2003, City and gender. International Discourse on gender, urbanism and architecture, Hemsbach, Leske+Budrich. Vacchelli Elena, 2005, « The gendering of urban space in Berlin and Milan : a comparative perspective », Research and Trai- ning Network Urban Europe Series, 1/2005. __________, 2008, « Milan 1970-1980 : women’s place in urban  theory », Research in Urban Sociology, 9, pp. 29-51. __________, 2011, « Geographies of subjectivity : locating feminist political subjects in Milan », Gender, Place and Culture, 18/6, pp. 768-785. __________, 2013, « Researching the urban reflexively : feminist methodological issues », Hagar. Studies in Culture, Polity and Identities, 11 (1), pp. 41-62. Wardhaugh Julia, 1999, The Unaccommodated Woman : Home, Homelessness and Identity, The Sociological Review, 47/1, pp. 91-109. Watson Sophie, 2002, « City A/Genders » in Gary Bridge and Sophie Watson, Blackwell city reader, Oxford, Blackwell. Wilson Elisabeth, 1991, The sphinx in the city. Urban life, the control of disorder, and women, Berkeley, Los Angeles and Oxford, University of California Press. 1  Separatism produced a collective female subject separate from men. However in a second phase of the movement it further developed into « relational practice » among women. Differently from separatism, this phase recognized and asserted differences among women as a positive value (see Milan Women’s Bookstore Collective, 1990). 2 The map was created from the data found in a Milan council publication which lists existing women’s organizations, associations and centres in 2005-2006. 3  To this regard, see the special issue of Feminist Review in 2007 entirely dedicated to Italian feminism. Top of page Elena Vacchelli (Social Policy Research Centre, Middlesex University). Top of page List of illustrations Caption Map on contemporary women organizations File image/jpeg, 132k Top of page Electronic reference Elena Vacchelli, « Gender and the city: intergenerational spatial practices and women’s collective action in Milan », Les cahiers du CEDREF [Online], 21 | 2014, Online since 20 October 2015, connection on 23 March 2017. URL : Top of page About the author Elena Vacchelli Top of page Tous droits réservés Top of page • Logo Université Paris Diderot – Paris 7 • Les cahiers de
OWS and the Importance of Political Slogans 99_percent Radical political movements always employ slogans that encapsulate in a few powerful words the aspirations of those fighting for a new world. The French revolutionaries fought under the banner, “Liberty, Equality, Fraternity,” words that still resonate with radicals. The first words of the U.S. Constitution—“We the People”—have quickened the hearts of generations of populist activists. Emiliano Zapata’s soldiers longed for “Tierra y Libertad,”and the peasant armies of Mao Tse Tung went to war for “Land to the Tiller.” Every slogan has a context, circumstances that give rise to the words and make them effective. For example, when the Chinese communists were waging their long struggle against the army of Chiang Kai-shek, they relied upon mass support from peasants, who formed the base of the Red Army. China was still a largely feudal society, and peasants were brutally exploited by rich landlords. Those who worked the land wanted it, and the communists promised to give it to them. “Land to the Tillers” expressed this desire and the Party’s commitment to it. Even today, after decades of capitalist restoration, China’s rural people still have land rights won in revolutionary struggle. The catchphrases of political upheaval are always somewhat vague. In China, there were the farmers who tilled the soil and the landlords who owned it. However, both classes included people of varying economic means. There were small, medium, and large landholders. Not all peasants lived in squalor and destitution. Yet, all landlords tended to be lumped together, and all of their land was fair game for expropriation. The imprecise nature of political slogans is a virtue. Actual political programs do not derive from words alone but from the balance of class forces that exist at a particular point in time. What slogans do is clarify the most basic political cleavages; they help people develop the mindset most suited to active participation in whatever struggles are at hand. In China, “land to the tiller” said that those who worked the land should possess it; those who owned but did not till, should not. That some both owned and tilled did not and should not have mattered. Such complexities would have to be dealt with later, when a new constellation of class forces had come into being. “We are the 99%” derived its power from the devastation experienced by so many people during the Great Recession that erupted in December of 2007. The roots of this economic crisis go back to the mid-1970s, when an employer-led attack upon the working class began in response to lower corporate profit margins, the result of the declining global economic dominance of the United States. U.S. businesses faced strong economic competitors in Japan and Europe; the costs of the War in Vietnam were generating inflation and higher wages; and the brisk demand for U.S. capital goods diminished as the rest of the world completed post-Second World War reconstruction. A weakened and class-collaborationist labor movement accommodated a rapid victory by capital, in what we typically call neoliberalism: a political project that included the deregulation of finance, privatization of public services, elimination and curtailment of social welfare programs, open attacks on unions, and routine violations of labor laws. These left working people with lower wages, less generous benefits, and growing insecurity. The deregulation of capital markets gave rise to a host of new financial instruments, which grew by leaps and bounds as cash-strapped workers began to go into debt by borrowing against their houses and maxing out their credit cards. All of this generated growing income and wealth inequality; raised the financial sector to the commanding heights of the economy; and made production more vulnerable to financial crisis. The Great Recession was the product of the interaction of these three factors, and it generated a scale of worldwide misery not seen since the 1930s. While the downturn officially ended in June 2009, much of the working class is still mired in debt, employed in low wage/ no benefit jobs, either unemployed or fearful of job loss, and not very hopeful about the future. While there were periodic protests against neoliberalism, it was not until the Great Recession that these broke out into mass struggle. This first emerged in the Arab Spring, but it soon spread to the entire world, from Spain to China and from Canada to Chile. In the United States, the Wisconsin Uprising of early 2011, led by public employees, inspired workers across the country, demonstrating that when pushed hard enough, in the right circumstances the working class would revolt and do things no one had imagined possible. Then, within a year of this, OWS erupted. Young people, led mainly by anarchists, took over Zuccotti Park in downtown Manhattan and waged protests against one of the greatest symbol of the 1%—Wall Street. When the police began to suppress the dissent, thousands of Occupy supporters descended upon the center of finance. Soon amazing displays of cooperative action and self-education deepened the struggle. As the OWS phenomenon spread to cities and towns in the United States and then the world, the objects of the protestors’ scorn and anger increased geometrically—all those who oppressed the 99%: police, bankers, landlords, employers, universities, politicians, the media, and the military. In response, the powers that be began a coordinated campaign to slander and suppress what had the potential to disrupt both production and commerce. Ultimately, OWS encampments were closed, mainly by police force, but OWS-inspired struggles live on, and the memory of what happened is very much alive. Critics of OWS and “We are the 99%” say that the slogan is inaccurate. I disagree. It is true that there are well-to-do people in the 99%, and there are many in the 1% who are not that rich. The cutoff yearly household income for the 1% varies, ranging from $380,000 using the Census definition of income to nearly double that using that of the Federal Reserve, which includes capital gains. In some parts of the country, $380,000 would qualify a household as rich, while in others it would not. The flip side of this is that there are many people in the 99% who are not poor. There is a big difference between an income of $379,000 (just below the Census 1% cutoff) and $20,000, the cutoff for the poorest 20 percent of households. We could argue as well that using income to divide the 99% and the 1% is inaccurate because what matters most is wealth. Ownership of stocks, bonds, real estate, unincorporated businesses, and the like is much more skewed than income, and it is at the top of the wealth distribution that economic and political power reside. The richest 1% of households now own an astonishing 42.4 percent of net financial assets (these exclude homes and mortgage debt). But these arguments about the accuracy of the slogan miss the point. “We are the 99%” suggests an “us versus them” politics that foreshadows the class perspective so badly needed in the United States. Those who feel unfairly maligned because, although their incomes are high, they are not rich are free to ally themselves with their poorer brethren. And those who are objectively poor are done no harm by being lumped together with those whose incomes are higher. What the slogan does is help nurture a worldview that understands that not only is inequality out of control but that the position of the 1% comes at the expense of the rest of us. To invert and paraphrase the words of Bartolomeo Vanzetti, “their triumph is our agony.” We can build upon this to create a politics that transcends the populism that passes for radicalism in the United States. The issue here is not the literal meaning of the “1%,” but power. Whether we speak of income or wealth, power resides in the households of the 1%. They own our workplaces and control our labor. They construct nearly every aspect of society—government, media, schools, culture—to maintain and increase their dominance over us. What the slogan, “We are the 99%,” has done is bring power into the open and help change the political landscape. Another criticism of “We are the 99%” argues that it implies a liberal politics of income redistribution and not a critique of capitalism. However, this ignores how OWS took shape. Public spaces were occupied; clashes with police ensued immediately; diverse discussions and debates took place; the movement spread rapidly across the nation and then the world; and millions of people were energized and made to feel part of something of great importance. Open air classrooms scrutinized critical issues. People learned that they could make decisions and effectively organize daily life. Those camped out in Zuccotti secured food and shelter, took care of sanitation, and solved complex problems of logistics every day. These actions, combined with the anarchist and youthful sensibility and leadership of so much of OWS, gave rise to the posing of fundamental questions. What is democracy? Why don’t we have it? How do we dispense with ubiquitous hierarchies? Why is there so little solidarity, compassion, love? Why aren’t there enough jobs? Why is work so meaningless? Why do we devote so much of our lives to it? Why are we obsessed with making money and consuming things? Why are we destroying the environment that sustains us? Why does our government wage war against ordinary people, the 99%, all over the globe? These questions cannot be answered and the issues they raise resolved by more progressive taxes or a few expanded social welfare programs. Our collective future is grim. Under our current political economic system, none of our major problems can be solved. Insecurity, inequality, and environmental destruction will get worse unless we take radical actions, repeatedly, for as long as necessary. OWS and “We are the 99%” were, and continue to be, ingenious interventions in what promises to be an era of growing class struggles. Other slogans will supplement “We are the 99%,” but I hope that the idea that “we are the many, they are the few” remains foremost in our minds as we combat our class enemies. *This essay was published on counterpunch:  A different version of the argument appeared in the Winter 2013 issue of New Labor Forum. 9 Responses to OWS and the Importance of Political Slogans 1. Martin February 28, 2013 at 5:05 pm # You are fighting the good fight, but the battle was lost a long, long time ago. Vacuous slogans that comfort the American middle class into faux victimology, when they (we) are leagues, houses, mortgages, vacations, and votes away from the terrible horror of the poor, was and remains offensive. Without an Occupy candidate, without an Occupy triumph over a corporation, without social consequence (some lessening of elite pwoer) after all that rhetoric, the path looks more than grim, on all sides. You’ve heard from with this nihilist angle before, and I’m sure this just gets tiring, but you are too much on target with your critiques for me just to let it go, and just say watch the socio-political carnage ahead. 2. Carrol Cox March 4, 2013 at 7:23 pm # The phrase “vacuous slogans” in the reply above suggests that the writer did not even read Michael’s argument, which deals precisely with the Non-vacuousness of slogans. The crafting of slogans is perhaps the most difficult and most important step in mobilizing people for mass struggle. Michael does point out that complexities must be worked out later. But that _begins_ to happen from the earliest stages of any movement, and exploring the complexities behind the slogan is precisely the process of political education. In any case, I am disappointed to see that this important blog post has not elicited more discussion. 3. Martin March 6, 2013 at 3:25 pm # I read the post, and simply disagree. A vacuous slogan it was, and if 99% Just Won’t Do has some, delicate staying power, so do insipid ad lines. One of my favorites from the early 80’s – AT&T: The System is the Solution. Feel free to continue insisting on slogans as protest, but others may not go for these chanting impulse. I agree- comments sections are going nowhere, mostly due to the debased nature of modern discourse – what’s wrong with objections, criticism, opinions? Who has the full handle on everything? 4. Joe Shlabotnik March 11, 2013 at 4:10 pm # Resentment of the rich is a trope of human history that dates back to when Og had more women and bigger and better clubs and rocks than Thak. A related trope is stating that those who have wealth MUST have acquired it in some dishonest, devious, and/or evil fashion. This accomplishes two extremely useful purposes for the 99%er sign-waver: 1. I’m not as rich as that 1% bastard, not because I’m not as smart or didn’t work as hard, but rather, because due to my moral superiority, I have been unwilling to become a capitalist exploiter of unwilling wage slaves (or to participate in that eeeevil system at all, i.e., work); 2. Due to the moral bankruptcy of the 1%, it is not only acceptable but a MORAL IMPERATIVE to forcibly deprive the 1% of their wealth. I realize how tidy, as well as how appealing, this way of thinking is, and I even partially sympathize with it, but it has the same flaw that dates back to the ravings of Karl Marx: if you strip the rich of their wealth, it is unlikely that they will continue to produce that wealth again; after all, they’re not stupid. Then, to continue to support the seizure-of-assets paradigm, we will have to continually redefine “wealth,” until the State will eventually be confiscating the “excess” shoes of everyone who owns more than one pair. Yes, indeedy, there is income and wealth inequality, but when you consider the societies in recent human history wherein there was/is the most equality of wealth–Soviet Union, Somalia, China, Cuba–it doesn’t seem like a desirable human state. I think, in fact, that a perfectly equal society would be a perfect hell. Also–impoverished. Yes, yes, yes, capitalism is a nasty, greedy, exploitative, soul-destroying blight on the face of humanity, more morally bankrupt than Naziism and more evil than torturing and raping Girl Scouts. But it HAS proved to be an effective engine for creating wealth, and not just for the eeeeeevil corporations and the Scrooge McDucks who run them. The ordinary schmuck is better off than he ever has been in human history, largely due to capitalism. The po’ folks in the ghetto today live better than an 18th-century king ever did. That, to me, defines progress. • Michael D. Yates March 11, 2013 at 4:17 pm # Joe, these are the ravings of a fool.But thanks for exposing your foolishness. Always appreciated. • Joe Shlabotnik March 22, 2013 at 5:56 pm # Michael my man, your collective writings are more evidence of lunacy than anything I could ever write. However, I won’t stoop to insulting YOU just because you and I radically disagree. Your worldview is tragically distorted–and I say “tragically” because you’re a manifestly intelligent man–but you are nonetheless entitled to that view as well as to express it. I don’t, however, think that entitlement extends to lifting your hind leg and peeing on anyone who doesn’t share your outlook. Though your recent fulsome praise of the late Hugo Chavez–the power-mad, barely sane leader of what was a classic South-American kleptocracy, whom you seem to have chosen to exalt to mythic status simply because of his rabid anti-US (and often, anti-sanity) stance–means that you probably feel constrained to pee on a LOT of people. 5. Martin March 13, 2013 at 4:54 pm # Brilliant, Michael – what a lunatic gasbag (though probably an upright, voting “citizen”) – it’s heartening to see the line “the State will eventually be confiscating the “excess” shoes of everyone who owns more than one pair” given such a dignified response. • Joe Shlabotnik March 27, 2013 at 9:43 pm # Ah, yes: “lunatic” = “anyone who has the effrontery to disagree with MOI.” I would clasify anyone who exalts Hugo Chavez and Fidel Castro as a lunatic, in that megalomaniac mass murderers are generally not worthy of exaltation. Also, Comrade Yates claims to be a Marxist and an economist; you actually can’t be both, as being one contradicts being the other. Thankfully, Yates remains on the far, far, far left fringe of both society and human thought. I’m actually a liberal by any definition of the term, but I nonetheless realize the childishly obvious–that Marx was a crackpot and his theories were diarrhea. I guess Comrade Yates thinks I’m a rightist conservative; by contrast, I suppose, I am, much in the way that to a person standing on the North Pole, everyone is south of him. 1. “We Are The 99%!” Occupy Wall Street and the Importance of Political Slogans | - March 15, 2013 […] This article was originally published at Cheap Motels and Hot Plates. […] Leave a Reply
Tips for Growing Grass in the Shade Tips for Growing Grass in the Shade Finding the balance between beautiful trees, thick shrubbery and a quality lawn can be tricky, considering maintaining luscious grass in the shade is a constant battle. However, this feat isn’t impossible as long as some sunlight still reaches the ground. Here are some tips for helping your lawn thrive in the shade: Turf Management Practices The first step is ensuring that your lawn is being properly watered, mowed, fertilized and checked for weeds. Maintaining a lawn in the shade is going to require a little more attention to detail and will be handled differently than one in greater sunlight. During dry periods, it’s ideal to water deeply but intermittently. This is because shady areas don’t take quite as hard a hit from the sun and therefore will not dry out as fast. However, there are cases where root systems on trees soak up all the water and cause draught stress, so pay close attention for those signs. Cutting and Fertilizing You may need to adjust the height of your mower when mowing the grass in the shade versus the grass in the sunlight. Grass growing in the shade requires a larger leaf surface to encourage deeper and more extensive rooting, so the turf can better compete with the tree for water and nutrients. When it comes to fertilizing, shaded areas require less. This is because the photosynthesizing process is impeded by less sunlight, so too much fertilizer could hinder the grass’s ability to manage nutrients. Modify the Soil The type of soil that you have can affect the way the grass grows. Any lawn will perform better if it’s topsoil is rich in organic material. For soil that is comprised of sand or clay, try to incorporate more OM into the soil. Make sure you are aerating and providing draining for the soil—this helps with the penetration of nutrients. Also, because the air movement is reduced and surface moisture remains in the soil longer, shady areas are more prone to diseases associated with high moisture; selecting a good cultivar and managing the soil properly should reduce the risk of acquiring these diseases. If you have any issues, you can call a grass seed specialist for assistance. They are well versed in  lawn maintenance and what it takes to help you reach your goals. Hidden Florida Beach Spots You Have to See on Your Next Vacation 4 reasons to Visit the Small Isles of Lochaber
Sister Cities of the World Sister cities of Veliky Novgorod Veliky Novgorod (also Novgorod the Great) (Russian: Великий Новгород, IPA: [vʲɪˈlʲikʲɪj ˈnovɡərət]), or Novgorod Veliky, or just Novgorod, is one of the most important historic cities in Russia which serves as the administrative center of Novgorod Oblast. It is situated on the M10 federal highway connecting Moscow and St. Petersburg. The city lies along the Volkhov River just downstream from its outflow from Lake Ilmen. UNESCO recognised Novgorod as a World Heritage Site in 1992. Population: 218,717 (2010 Census); 216,856 (2002 Census); 229,126 (1989 Census).
Images of The Meteora Monasteries Greece Pictures, Images & Photos of the Meteora Monasteries, Greece. In the sixteenth century there were 24 monasteries but today only 6 remain. Each monastery has a winch house with a rope net that is lowered to haul up provisions. Originally pilgrims had to climb up precarious rope ladders to make their devotions in the monastery churches. Today a visit is less hazardous as steps have been cut into the cliffs that snake up to the monasteries. In 420 Simeon, a Syrian Christian Monk, decided to escape the world and become a Hermit. He built a 15.2m (50ft) high pillar and somehow lived on the top, exposed to the elements, until his death. This inspired Christians for centuries like the hermits that originally inhabited the caves in the lower pillars of the Pindos Mountains from the 10 century. In the fourteenth century monastery building started in earnest when a monk from Mount Athos, Athanasios Koinovitis, climbed a pinnacle known as the Plathy Lithos because of its wide plateau on top. Here, with a group of followers, he built the first buildings of the Metéoron monastery. In 1388 Thessaly was ruled by a Serbian King and his son, Loasaf, became a pupil of Athanasios at the Metéoron. The King extended the monastery which became an important center of learning with many fine illuminated codecs and important Byzantine frescos in its church. 23 more monasteries were built over the next 2 centuries and precious relics and icons found safety in the impregnable monasteries such as the finger of St John and the shoulder blade of St Andrew in the monastery of Varlaám. It is a marvel that 600 years ago men could build such wonderful buildings at the top of high isolated rock pillars without cranes or mechanical aides. Since the building of a paved road into the mountains in the 1960s, tourists have been able to visit the Meteora Monasteries and marvel at beauty and serenity of the captivating Byzantine buildings set against the dramatic backdrop of the Pindos Mountains. UNESCO added the Meteora to its world heritage list and from 1972 the 6 remaining monasteries have been under renovation repairing damage from neglect and earthquakes. The Meteora Monasteries are one of the most extraordinary sights in the world and are a reminder of how religious devotion can drive men to great feats of architecture and art in search of salvation. Buy pictures or photo art prints on line. "Blue Domes" Selective Colour Photo Art Collection Selective Colour "Blue Domes" Gallery. Blue Domes selective colour picture gallery with photos of The Blue Domed churches of Santorini to download on line or buy as prints Pictures of Konya, Turkey Pictures, Images & Photos of Konya Turkey. Pictures, images and photos of Konya, Turkey. Konya is a holy Islamic city where the Persian Sufi poet & ascetic Jalāl ad-Dīn Muḥammad Rūmī known as Mevlana or Rumi lived and is buried. Mevlana was "not a prophet — but surely, he has brought a scripture". He believed in the use of music, poetry and dance as a path for reaching God which allowed devotees to focus their whole being on the divine. Dervishes are Sufi Muslim ascetics and the Mevlevi order of Dervishes in Konya developed under Melvana's teachings. It was Mevlanas belief in dance and music that created the whirling Dervish as a form of devotion. Following his death, his followers and his son Sultan Walad founded the Mevlevi Order, also known as the Order of the Whirling Dervishes, famous for its Sufi dance known as the Sama ceremony. In the 1920's when the modern Turkish state was formed under the rule of Ataturk, Dervish's were banned as part of the Ataturks move to make Turkey a secular country. The Mausaloeum of Mevlana was made into a museum where his sarcophagus and those of his family are a major shrine for Islamic pilgrims. Buy stock photos and photo art prints on line Pictures of Istanbul, Turkey Pictures, Images & Photos of Istanbul Turkey. Originally the Greek city of Byzantium, the strategic importance of its peninsula was recognised by Emperor Constantine who made it into the Imperial City of the Roman Empire in AD 330. The city was founded on the Seraglio Point, a peninsular with the sea of Marmara to the south and the natural harbour known as the Golden Horn to the north. The peninsular overlooks the southern entrance to the Bosphorus, a narrow channel that links the Mediterranean via the sea of Marmara to the Black Sea. The importance of this was not lost on Constantine who saw that the city would not only control trade from the West north into the Black sea but being at the end of the Silk road, which brought precious goods from the far East to the West, Constantinople would be at the hub of East West trade. This gave Constantinople far more power and economic potential than Rome which Constantine never liked. Constantine built his new city at an incredible pace looting whole buildings and statues from Rome and the other cities of the Empire. This new city was also a Christian city and Constantine built the first great churches of the Roman Empire. As Constantinople prospered its Emperors took less interest in the Western Roman Empire which slowly weakened and was taken over by Barbarians that swept into the Empire from the north. With what is called the Fall of The Roman Empire in the 5th century history starts calling the Emperors of Constantinople Byzantine after the Greek city of Byzantium. The Emperors of Constantinople would not have understood themselves as Byzantine as they were Emperors of The Roman Empire and remained so until the fall of Constantinople in 1453. Even Mohammed refers to them as Romans in his writings but by the time of Mohammed they were Greek speaking Romans not Latin speaking. Constantinople became fabulously rich and powerful and therefore a target for conquest. The massive land walls that protected the peninsular and its sea walls made it impregnable to many attempts to take it by force. It did though fall in 1204 to the stealth of the Venetian Dodge Enrico Dandolo when he diverted the 4th Crusade to Constantinople to help "protect" it from the Islamic onslaught that had conquered most of Asia Minor. The taking of Constantinople led to a 3 day sack of the city during which time the Venetians loaded all of its treasures onto their ships and sailed off to Venice. The four bronze horses that adorn the from of St Marks Basilica come from Constantinople as do the marble columns and decorations that adorn the palaces of the Grand Canal. Even though the Byzantine Roman Emperors retook Constantinople it never regained its glory and went into slow decline. In 1453 it finally fell to Ottoman Sultan Mehmed II and it became the centre of the Ottoman Empire until its fall at the end of the First World War in 1918. Buy stock photos and photo art prints on line Pictures of Hydra Island Greece Pictures, Images & Photos of Hydra Island Greece. Pictures, Images & photos of Hydra Island Greece. Located in the Aegean sea between the Saronic and Argolic gulfs Hydra is a fascinating island with no roads or cars. Hydra, the main town nestles on steep hills that rise up from a natural harbour full of small fishing boats. Steep flights of steps lead up from the harbour through small alleys to beautiful Greek villas that would have been the homes of the wealthy ships captains that came from Hydra. Everything from the building materials to the new fridges that are delivered at the dock are moved by donkeys or pack horses that climb nimbly up the steep flights of steps. Hidden high in the mountainous interior of Hydra are the Orthodox monasteries of Profitas LLias and Ayia Efpraxia. Small paths lead up from the harbour at Hydra through the wooded slopes of the island revealing breathtaking views of the tiny island. The remote monastery of Profitas LLias sits on top of the central mountain and you will be welcomed by one of the monks who will offer you water and Greek delight and a seat to rest on. There is no beach in Hydra but a 30 minute walk along the coast, or a short boat ride leads to Vylcosh Village which has a lovely small beach with umbrellas. The harbour of Hydra with its cafes & tavernas contrast with the serene uninhabited mountains and the beautiful little beaches of Hydra to make a fantastic and unique Greek stop over for a few days. Buy stock photos and photo art prints on line
Online Google Dictionary misleading 中文解釋 wordnet sense Collocation Usage Font size: Giving the wrong idea or impression, 1. Giving the wrong idea or impression • - your article contains a number of misleading statements 1. deceptive: designed to deceive or mislead either deliberately or inadvertently; "the deceptive calm in the eye of the storm"; "deliberately deceptive packaging"; "a misleading similarity"; "statistics can be presented in ways that are misleading"; "shoddy business practices" 2. (mislead) lead someone in the wrong direction or give someone wrong directions; "The pedestrian misdirected the out-of-town driver" 3. (mislead) misinform: give false or misleading information to 5. Deceptive or tending to mislead or create a false impression 6. (mislead) To lead astray, in a false direction; To deceive by telling lies or otherwise giving a false impression; To deceptively trick into something wrong; To accidentally or intentionally confuse 7. (Mislead) To lead astray in action or conduct, to lead into error, to cause to err; A representation may be literally true but misleading 8. To lead into error; deceive or delude. 9. inviting a false belief 10. Misleading is when a person tells a statement that isn't an outright lie, but still has the purpose of making someone believe in an untruth.
Château d'Hougoumont (originally Goumont) is a large farmhouse situated at the bottom of an escarpment near the Nivelles road in Braine-l'Alleud, near Waterloo, Belgium. The escarpment is where British and other allied forces faced Napoleon's Army at the Battle of Waterloo on June 18, 1815. The name "Hougoumont" is derived from "Gomme Mont" which means "Gum hill". It was built on a little hill with pine trees around it, from which pine gum was collected to make turpentine. June 1815 Napoleon planned to draw Wellington's reserve to Wellington's right flank in defence of Hougoumont and then attack through the centre left of the British and allies' front near La Haye Sainte. Before the battle started, Hougoumont and its gardens, located on the allies' right flank, were garrisoned and fortified by the 1st Battalion, 2nd Nassau Regiment, with additional detachments of jägers and landwehr from von Kielmansegge's 1st (Hanoverian) Brigade. The light company of the 2nd Battalion, Coldstream Guards under the command of Lt-Colonel Henry Wyndham, was also stationed in the farm and chateaux, and the light company of the 2nd Battalion, Third Guards, under Lt-Colonel Charles Dashwood, in the garden and grounds. The two light companies of the 2nd and 3rd Battalions, First Guards were initially positioned in the orchard, under the command of Lt-Colonel Lord Saltoun. Lieutenant-Colonel James Macdonnell, Coldstream Guards, had overall command of Hougoumont. (The Guards units were all drawn from General John Byng's 2nd (British) Brigade.) Wellington recorded in his despatches "at about ten o'clock commenced a furious attack upon our post at Hougoumont" Other sources state that this attack was at about 11:30. The historian Andrew Roberts notes that, "It is a curious fact about the battle of Waterloo that no one is absolutely certain when it actually began." The initial attack by Maréchal de Camp Bauduin's 1st Brigade of the 6th Division emptied the wood and park, but was driven back by heavy British artillery fire and cost Bauduin his life. The British guns were distracted into an artillery duel with French guns and this allowed a second attack by Maréchal de Camp Baron Soye's 2nd Brigade of the 6th Division. They managed a small breach on the south side but could not exploit it. An attack on the north side by elements of the 1st Brigade of the 6th Division was more successful. This attack led to one of the most famous skirmishes in the Battle of Waterloo " Sous-Lieutenant Legros, wielding an axe, managed to break through the north gate. A desperate fight ensued between the invading French soldiers and the defending Guards. In a near-miraculous attack, Macdonell, a small party of officers and Corporal James Graham fought through the melee to shut the gate, trapping Legros and about 30 other soldiers of the 1st Legere inside. All of the French who entered, apart from a young drummer boy, were killed in a desperate hand-to-hand fight. The French attack in the immediate vicinity of the farm was repulsed by the arrival of the 2nd Coldstream Guards and 2/3rd Foot Guards. Fighting continued around Hougoumont all afternoon with its surroundings heavily invested with French light infantry and coordinated cavalry attacks sent against the troops behind Hougoumont. Wellington's army defended the house and the hollow way running north from it. In the afternoon Napoleon personally ordered the shelling of the house to cause it to burn, resulting in the destruction of all but the chapel. Du Plat's brigade of the King's German Legion was brought forward to defend the hollow way, which they had to do without any senior officers, who were then relieved by the 71st Foot, a Scottish light infantry regiment. Adam's brigade, further reinforced by Hugh Halkett's 3rd (Hanoverian) Brigade, successfully repulsed further infantry and cavalry attacks sent by Reille and maintained the occupation of Hougoumont until the end of the battle. The battle's significance The Hougoumont battle has often been characterised as a diversionary attack to cause Wellington to move reserves to his threatened right flank to protect his communications, but this then escalated into an all-day battle which drew in more and more French troops but just a handful of Wellington's, having the exact opposite effect to that intended. In fact there is a good case that both Napoleon and Wellington thought Hougoumont was a vital part of the battle. Certainly, Wellington declared afterwards that "the success of the battle turned upon the closing of the gates at Hougoumont". Hougoumont was a part of the battlefield that Napoleon could see clearly and he continued to direct resources towards it and its surroundings all afternoon (33 battalions in all, 14,000 troops). The French forces sent in to attack Hougoumont included: • nearly the entire II Corps under the command of General Count Honore Reille, consisting of detachments of the 6th Division under the command of Jerome, (Napoleon's brother), the divisions of Comte Maximilien Foy (9th), Guilleminot and Joseph Bachelu (5th) • Kellermann's cavalry corps Hougoumont today Hougoumont remained an active farm until the end of the 20th century after which it became the property of the Intercommunale (1815). By June 2006, the farm appeared to be in a degraded state. The walls which were once near pristine white had become a dirty yellow. Several walls are cracked and parts are clearly damaged, most notably the right-hand door post of the north side gate. Project Hougoumont, supported by amongst others, the current Duke of Wellington, writer Bernard Cornwell and historian Richard Holmes, has been set up to oversee the funding through to restore and preserve Hougoumont for the long-term future. 5 photos Building Activity • removed 2 media and updated a digital reference about 5 years ago via OpenBuildings.com • updated a digital reference about 5 years ago via Annotator
Crime Prevention Through Environmental Design (CPTED) The arrangement and design of buildings and open spaces can encourage or discourage undesirable behavior and criminal activity. CPTED works by decreasing opportunities for crime and increasing the chances that a legitimate user will see and report crime as it occurs. The proper design and effective use of the built environment can lead to a reduction in the fear and incidence of crime and an improvement in quality of life. Municipalities throughout the world are adopting CPTED ordinances requiring site plan reviews with crime prevention and safety in mind. CPTED is based on a few overlapping concepts. Natural Surveillance: “See and be seen” is the overall goal. A person is less likely to commit a crime if they think someone will see them do it. Natural Surveillance increases the threat of apprehension by taking steps to increase the perception that people can be seen. Lighting and landscape play an important role. Natural Access Control: Strategically designing streets, sidewalks, building entrances and landscaping to physically obstruct or guide access by people and vehicles. This strategy works by deterring access to potential targets of crime. If criminal behavior does occur, the access control makes it easy for legitimate users to notice and report the crime to police. Territorial Reinforcement: Creating or extending a “sphere of influence” by utilizing physical designs such as pavement treatments, landscaping and signage that enable users of an area to develop a sense of proprietorship over it is the goal of this CPTED principle. Public areas are clearly distinguished from private ones. Potential trespassers perceive this control and are thereby discouraged. Maintenance CPTED supports the “Broken Window Theory” that one “broken window” or nuisance, if ignored, will lead to others and ultimately to the decline of an entire neighborhood. Neglected and poorly maintained properties are breeding grounds for criminal activity. PalmettoPride brings CPTED to your South Carolina community without cost. You provide the location and audio-visual equipment. We provide training and continuing support as you implement these crime fighting techniques in your community. Contact Esther Wagner at or call 803-758-6034 for further details and to schedule courses.
Plant Guide > Grasses > Italian Rye Grass Italian Rye Grass Italian Rye GrassITALIAN RYE GRASS (Lolium multiflorum Lam.) Botanical description: Italian Rye is perennial and very similar to Perennial Rye Grass in general appearance. The tufts are alike, but the branches of the Italian Rye rootstock are generally shorter and the whole plant forms a denser tuft. The stems on an average are higher and more delicate than those of Perennial Rye, from which they also differ in being decidedly rough to the hand when rubbed upwards below the inflorescence. When the plants are young they can be distinguished from those of Perennial Rye Grass by the leaves being rolled together when in bud. When fully developed, the leaves are comparatively broad, soft in texture and bright green. The inflorescence has the same general appearance as that of Perennial Rye but differs in some important points. Thus a spikelet contains a greater number of flowers, generally from ten to thirty. When the spike is developed, the grass can be easily distinguished from Perennial Rye by the flowers. These are enclosed within two glumes like those of Perennial Rye, but the outer glume carries a long awn at its top. Some varieties, however, are awnless and may be distinguished by their rolled young leaves and upwardly rough Geographical distribution: Italian Rye Grass is indigenous to western and southern Europe, northern Africa and Asia Minor. It has been sparingly introduced into North America and is found in only a few places in Canada. It grows naturally in meadows, along ditches and roads, in gardens, openings in woods, etc. Cultural conditions: Habits of growth: Agricultural value: Italian Rye Grass picture Italian Rye Grass seed
Ecological art Ecological art By Rod Myers, Naturalist If conditions are right, a camera can capture reality as well as the human eye—unless the eye belongs to an artist. One pair of famous artistic eyes belong to Terry Redlin, a painter from South Dakota. Redlin captures the outdoors with a unique style, painting landscapes most often bathed in the yellows and oranges of sunset or sunrise. His low suns usually light a winter or late fall scene in early to mid-20th century Midwest rural America. Redlin started his career painting game wildlife, but later incorporated humans, buildings, livestock, horse-drawn wagons, and occasionally a truck or automobile. Many of his works depict game wildlife encroaching a farm house, barn or small town property. However, his later works contain more small-town folk than wildlife. Redlin’s art has been popular with Midwesterners for years. In fact, his paintings, prints, calendars and books still sell at a brisk pace. With his romantic, realistic style, Redlin more than others may have captured the visual ideal of Midwest America’s small towns and their wild surroundings of days gone by. And he, more than any other painter, may have captured the alteration of the Midwest’s plant landscape. His works continually show a lackluster ground cover, a ground cover typical of dullish drab European and Eurasian grasses. If Redlin had painted native prairies in his works, the brilliance would knock you down. It’s the colors and textures that tell you his ground cover is not native. He’s made it difficult to identify plant species in his paintings; nonetheless, I consider him a plant historian of sorts. Why didn’t Redlin paint native plants in landscapes? Because they are virtually absent. Americans readily accept his rural ideals, and they’ve made him wealthy, meaning most Midwesterners are content with their plant-altered landscape, but let’s face it, that’s all they’ve ever known. You could go to the abode of most rural-loving people and hang on the wall a painting or print of pheasants in a cornfield without objections. I guess you could use the theory that the landscape is so boring, you need the pizazz of Chinese Ring-necked pheasants to liven it up. When the Europeans settled the Midwest, they brought disturbance-loving plants with them from the old country. The non-native plants outcompeted the natives because they had no natural enemies. Then, after John Deere patented the self-cleaning plow in 1837, the prairies were really doomed. There were prairie remnants left in the mid-20th century, but there was only a fraction of what was here before white settlers arrived. Thanks to visionary conservationists such as Aldo Leopold, who recognized the value of original prairie, and thus helped achieve permanent preservation for many prairie remnants while advocating prairie restorations. Leopold taught at the University of Wisconsin, and one of his students, Doug Wade, who lived in the Oregon, Ill. area, became a champion for prairie preservation and restoration in the northern Illinois region. Wade personally scoured northern Illinois looking for virgin prairie remnants and tried his diplomacy at getting the remnant owners to protect and manage them. Over the last three decades, prairie preservation and restoration has turned into a strong movement, but there are some who feel the alteration of our landscape during and after white settlement should be left alone. They contend that we are seed-dispersing species like many other seed-dispersing species; therefore, what the Europeans did is acceptable and normal. Terry Redlin’s work has done a remarkable job of showing alteration, especially his paintings of non-crop fields and small-town edges where you would expect to find surviving prairie. My hope is that in 2103, an artist will find wealth and fame by painting a reverse alteration of the Midwest plantscape. This artist will have spent 50 years painting ecological plant restoration in the Midwest, not only in rural areas and small towns, but in cities of all sizes. By 2103, urban sprawl may have sown the seeds for mass native plant restorations. Picture a Midwest so covered with Puri-type development that lawns are mandated to be partially planted in untrimmed native plants, creating large ecosystems made up of thousands of ecologically sound micro ecosystems, i.e., lawns. All this is done in the name of preventing a total Midwest ecological collapse. Imagine some employee from the city finding bluegrass in your yard beyond the legal limit. Then, a week later, employees from the city’s prairie department knock at your door. You answer the door to find each city employee with a canister of Roundup to use on your illegal extra bluegrass. I hope someday prairie chicken art will replace Ring-necked pheasant art in Midwest living rooms. I’ve just painted you a picture; show it to your friends. Enjoy The Rock River Times? Help spread the word!
Brain Cell Communication: Why It's So Fast Billions of brain cells are communicating at any given moment. Like an organic supercomputer they keep everything going, from breathing to solving riddles, and "programming errors" can lead to serious conditions such as schizophrenia, Parkinson's Disease and attention-deficit hyperactivity disorder. Vesicle with three "linking bridges". (Credit: Image courtesy of University of Copenhagen) The brain uses biochemical signal molecules Today, the biochemical language of the nerve cells is the subject of intensive research right down at the molecular level, and for the first time researchers, some from the University of Copenhagen, have described just how nerve cells are capable of transmitting signals practically simultaneously. The brain cell communication network, the synapses, transmit messages via chemical neurotransmitters packaged in small containers (vesicles) waiting at the nerve ends of the synapses. An electrical signal causes the containers and membrane to fuse and the neurotransmitters flow from the nerve ending to be captured by other nerve cells. This occurs with immense rapidity in a faction of a millisecond. The vesicle uses three copies of the "linking bridge" Researchers from the Universities of Copenhagen, Göttingen and Amsterdam have been studying the complex organic protein complexes that link vesicles and membrane prior to fusion, in order to find an explanation for the rapidity of these transmissions. They have discovered that the vesicle contains no fewer than three copies of the linking bridge or "SNARE complex." "The precursors for the SNARE complexes are present in the vesicles before they reach the target membrane," said Professor Jakob Balsev Sørensen from the Department of Neuroscience and Pharmacology at the University of Copenhagen. "Fast (synchronous) fusion is enabled when at least three of them work in tandem. If the vesicle only has one SNARE complex it can still fuse with the target membrane, but it takes much longer." The discovery has just been published in Science. "Our next step will be to investigate the factors that influence and regulate the number of SNARE complexes in the vesicles. Is this a way for the nerve cells to choose to communicate more or less rapidly, and is this regulation altered when the brain is diseased?", professor Sørensen says. Share this:
Eyed Hawk-moths Identify It >   Butterflies Section >   Eyed Hawk-moths > Eyed Hawk-moth Scientific name:  Smerinthus ocellata Size:  Wingspan up to 95mm Distribution:  Found mainly in the southern half of the UK Months seen:  May to September Habitat:  Mainly found in rough grassland and woodlands Food:  The adult moths do not feed.  The caterpillars feed on various trees including willow, aspen and apple Special features:  The camouflaged olive and green forewings of the Eyed Hawk-moth hide a startling pair of blue eyes on the hind wings.  If the moth feels threatened it flashes these eyes to frighten whatever is disturbing it.  To add to the effect, the Eyed Hawk-moth moves its body up and down. The bright green caterpillars can be found between June and September. Related Pages Bookmark and Share
What is Wing Chun? Wing Chun is a traditional Chinese martial art which combines the most important and effective principles and techniques of Shaolin Kung-Fu into a simple but complete system of self-defense.  Over 300 years ago a Buddhist Nun named Ng Mui mixed the Snake and Crane styles of combat into a combination hard/soft form, close-quarters, street-fighting style, brutally effective even when used against bigger, stronger, faster opponents.  Ng Mui's first student, the art's namesake, a young girl named Yim Wing Chun actually used her training during a challenge fight and won her freedom.  Since then the art of Wing Chun has been passed down through the generations in secret and in recent years has gained international recognition thanks to famous Wing Chun practicioners such as Ip Man, Bruce Lee, Donnie Yen, Robert Downey Jr. and many others.
Pin Me How Investors Use the Behavioral Principle in Competitive Financial Markets In direct relationship with the signaling principle, the behavioral principle suggests that actions convey valuable information. Knowing when and how to use this principle can mean big returns. Learn how investors use the behavioral principle when making investments. • slide 1 of 2 The Behavioral Principle and Investing The behavioral principle is directly related to the Signaling Principle but whereas signaling conveys information, the behavioral principle makes use of the information. Information isn’t inherently useful to an investor unless it can be applied to a specific situation in which it is valuable. Knowing what your boss ate for dinner last night is not useful unless you are inviting him over to dinner tonight and you want to make certain you don’t serve something he recently ate. The key is applying the information when the situation calls for it. Imitate Successful Behaviors Often for investors, there is no clear path to take to ensure profitability. Investors have literally thousands of securities available to them in which to invest funds. A new investor is especially vulnerable to bad decisions simply because of a lack of experience in deciding which securities are most in line with return expectations. One solution is to look at what other investors with more experience are doing. Especially useful is to look at investors with similar situations. For example, young investors have the luxury of time and often invest in riskier securities early in their lives as they can afford to absorb some early mistakes older investors can’t afford to make. Ask Advice Behavioral Principle Asking a broker’s advice is another application of The Behavioral Principle. A broker, someone who makes a living analyzing and recommending security investments, has all the necessary knowledge and tools available to make informed decisions. His/her advice can be invaluable when the cost of gathering and analyzing the data is too cost prohibitive or just too complicated. The Behavioral Principle can be applied in two major situations: 1. When an investor finds that others are better suited to making decisions. 2. When an investor find that it is more cost effective to follow the advice or actions of another. Blind imitation, however, is dangerous behavior. Such behavior is more common than one would think when large amounts of money are involved. The key is first to decide whether the cost of gathering and analyzing information is worth the effort. If not, then identifying an individual or group to follow is the next best thing. The Free-Rider One application of the behavioral principle is what’s known as the free-rider problem. A free-rider is any entity that benefits from another’s expenditure of time, money, and effort. Copyright and patent laws seek to protect innovators from having their valuable ideas stolen or diluted from free-riders. But even these laws have limitations and there is no worldwide set of laws governing intellectual property across national boundaries. The lesson to be learned here is to protect your expenditures of time, money, and effort so that free-riders do not reduce the value of your investments, a clear application of the principle of self-interest. • slide 2 of 2 Image Credit Wikimedia Commons: The Competitive Financial Environment The competitive financial environment is governed by four distinct principles. These principles encompass the idea that attaining value is a matter of competition resulting in winners and losers. The principles outlined here are an overview of this competitive environment. 1. The Principle of Self-Interested Behavior in Competitive Financial Markets 2. The Principle of Two-Sided Transactions in Competitive Financial Markets 3. Signaling in Competitive Financial Environments 4. How Investors Use the Behavioral Principle in Competitive Financial Markets
Need to crunch 150 teraflops per second? Meet first-of-a-kind supercomputer Catalyst Although we can’t “see” unstructured data or the treasures hidden in it, in ten years we could be drowning in it as big data experts predict the global data volume will exceed 35 trillion gigabytes. How is anyone supposed to make the most of it? A massive and mind-blowing amount of crunching power from Catalyst, a “first-of-a-kind” supercomputer in California, is now available to American industry and academia for collaborative research. At Lawrence Livermore National Laboratory, or LLNL, “The 150 teraflop/s (trillion floating operations per second) Catalyst cluster has 324 nodes, 7,776 cores and employs the latest-generation 12-core Intel Xeon E5-2695v2 processors.” You hear about big data every day; now IT is being urged to assume responsibility for “wearables” so the data from those devices can be better exploited. Even the White House issued an 85-page report, urging agencies to find a way to harness big data without harming privacy and civil liberties in "a world where data collection will be increasingly ubiquitous, multidimensional, and permanent." "Over the next decade, global data volume is forecasted to reach more than 35 zettabytes," (a zettabyte is a trillion gigabytes) explained Fred Streitz, director of the HPC Innovation Center (HPCIC). "That enormous amount of unstructured data provides an opportunity. But how do we extract value and inform better decisions out of that wealth of raw information?" LLNL believes the answer is the sexy beast Catalyst. Supercomputing beast Catalyst at Lawrence Livermore National Laboratory "The Catalyst supercomputer at Lawrence Livermore employs a Cray CS300 architecture modified specifically for data-intensive computing. The system is now available for collaborative research with industry and academia." Credit: LLNL What would anyone do with that kind of power? Sorry bitcoin miners. Instead of thinking along the lines of hijacking the supercomputing cluster to mine cryptocurrency like at Harvard, think in the realms of “science and technology in the national interest” as LLNL is a federally funded research and development center. Its strategic missions include bio-security, counterterrorism, intelligence, defense, energy, weapons & complex integration, and science, technology and engineering. "YouTube claims that 100 hours of video are uploaded to its website every minute," and analyzing video – “the fastest-growing type of content on the Internet” – is something Catalyst can do. Doug Poland, computational engineer working on video analytics, noted that “consumer-produced videos are a wealth of information about the world that's essentially untapped." Catalyst “will serve to host very large models for video analytics and machine learning.” Poland pointed out that “current tools are unable to search through the richness of video elements such as visual, audio and motion, and associated metadata like semantic tags and geo-coordinates.” His team is “looking to build more complex models that consider the sum of those features, and that can be recognized in real-time for user-specific search needs. Catalyst allows us to explore entirely new deep learning architectures that could have a huge impact on video analytics as well as broader application to big data analytics." Other suggested collaborations utilizing Catalyst’s crunching power are “bioinformatics, big data analysis, graph networks, machine learning and natural language processing, or for exploring new approaches to application checkpointing, in-situ visualization, out-of-core algorithms and data analytics.” Companies interested in access to Catalyst should check out the Notice of Opportunity posted on Federal Business Opportunities. After being developed by Intel, Cray and Lawrence Livermore, LLNL announced Catalyst in Nov. 2013, but LLNL had over 30 supercomputers before this; the Livermore Lab has a history of “acquiring and exploiting the fastest and most capable supercomputers in the world.” Superheavy Element 117 Lawrence Livermore National Laboratory Element 117 LLNL is also in the news due to a superheavy element formerly discovered by Lawrence Livermore scientists in collaboration with researchers from the Joint Institute for Nuclear Research in Russia. Element 117 has now been reproduced by an international consortium for heavy ion research. In the German experiments that confirmed its existence, “scientists bombarded a berkelium target with calcium ions until they collided and formed element 117. Element 117 then decayed into elements 115 and 113.” If that zipped over your head like it did mine, it basically means element 117 is one step closer to being named. Fix Windows 10 problems with these free Microsoft tools Shop Tech Products at Amazon
Powered by Blogger. Follow by Email Latest News 728x90 AdSpace Recent Post Random Post Thursday, April 21, 2016 What is Diamond Weights? Diamonds are measured in Size. One carat weighs 200 milligrams. In the event an diamond is referred to as four grains, simply buy means that it is an one carat diamond. A lot of Carat comes from statement carob. A carob is really a bean that grows on a tree in the Mediterranean sea. In times past, if a diamond weighed in the same way a carob bean, has been one carob, or one carat. What is Diamond Weights? What is Diamond Weights? However, in the far east, where Carob trees don't grow, rice was used to measure the weight of something like a diamond. If a diamond weighed as much as four grains of rice, it was four grains – or one carat as we know so that it is now. The majority of diamond purchases are for diamonds that are 1/3 of a carat.  Beware when shopping for diamonds that are already set or mounted. If more than one diamond is used the piece, the tag on the jewelry can offer the CTW or Carat Total Weight – although it not tell you the carat weight of each stone in the piece of land. You need to ask the jeweler for the total carats of the largest diamond in the piece fat understand what you are purchasing. 1 comment: 1. thank about What is Diamond Weights? I'll share free download Hack Game Unlimited Money+Gems here:
View more articles about Brain signals say ‘yes’ to sugar cravings U. MICHIGAN (US) — For the brain, “wanting” and “liking” are separate processes. When the two converge—in pursuit of sweets—the combined effect is powerful. These amplified signals can trigger an intense desire to satisfy a sweet tooth, a new University of Michigan study shows. Findings are published in the Proceedings of the National Academy of Sciences. When a sugary treat is about to arrive, the person can predict it, want it, and like it. All are part of the same reward experience, but to brains they are three separate processes—prediction, wanting, and liking—kept as different neural signals. “Understanding the difference between a brain’s liking and wanting signals should lead to better treatments for binge eating, drug addiction, and other compulsive pursuits,” says Kent Berridge, professor of psychology and neuroscience. The neural separation of these signals creates a vulnerability to drug addiction, eating disorders, and related compulsive pursuits and mood disorders that tap into specific signals. Researchers studied the activity of a brain reward circuit in rats. Rats learned that hearing one sound for a few seconds followed by a different sound predicted a sugar reward. Painless tiny microinjections of drugs increased either dopamine or opioid chemicals to stimulate neurons within the brain. “Addictive drugs might specifically hijack the motivation signals to exaggerate desire for more,” says Kyle Smith, the study’s lead author and a researcher at Massachusetts Institute of Technology. More news from the University of Michigan: Related Articles
content1 - definition and synonyms Your browser doesn’t support HTML5 audio 1. 1 The entire contents of the house were put up for auction. He emptied out the contents of his pockets onto the table. 2. 2 1. a. a list at the beginning of a book or magazine, showing the parts into which the book or magazine is divided I can’t find it in the contents. 3. 3 The show’s content is not suitable for young children. 4. 4 5. 5 [singular] the amount of a substance that something contains a breakfast cereal with a high sugar content
- which is the best language course or software - compare Learn French with Frantastique Fanagalo (Fanakalo) Fanagalo is a Zulu-based Pidgin which emerged during the 19th century in KwaZulu-Natal. It also has some vocabulary from English, Afrikaans, and is spoken mainly among miners of gold, diamonds, coal and copper in South Africa, and also to a lesser extent in the Democratic Republic of the Congo, Namibia, Zambia, and Zimbabwe. It is used as a lingua franca between people who come from various countries and who have no other common language, and has maybe several hundred thousand speakers. The name Fanagalo means something like "do it like this", and this form of speech is also known as Pidgin Zulu, Fanakalo, Fanekolo, Isikula, Lololo or Isilololo, Piki or Isipiki, and Silunguboi. In Zimbabwe it is known as Chilapalapa and is influenced by Shona, and in Zambia it is called Cikabanga and has influences from Bemba. Fanagalo pronunciation Fanagalo pronunciation Information about Fanagalo pronunciation compiled by Wolfram Siegel Sample text in Fanagalo Zonke nyoni pezulu yena khala kakhulu Skat izwile yen' ifile inyoni Cocky Lobin Skat izwile yen' ifile, skat izwile yen' ifile Cocky Lobin Ubani bulalile Cocky Lobin? Mina kuluma lo sparrow Indaba ka lo bow and arrow ka mina, mina bulalile Cocky Lobin. All the birds above, they cry loudly/a lot When they heard he was dead, the bird Cocky Lobin When they heard he was dead, when they heard he was dead Cocky Lobin Who killed Cocky Lobin? I said the sparrow Because of the bow and arrow of mine, I killed Cocky Lobin Sample text and translation provided by Philip Taylor Information about Fanagalo Pidgins and Creoles Other languages written with the Latin alphabet Cheap Web Hosting
Table tennis is considered to be the smaller version of tennis, which follows almost the same basic rules as the later. If you are a sports enthusiast, who has spent most of your life in front of the television watching sports channels, its likely that you have come across couple of games of table tennis. Over the years, the game has become very popular. Easy rules and extremely fun are the two main factors behind its huge popularity. One can easily play this game with just enough space to handle the table. You don't need big courts like tennis to start playing this game. Another, interesting factor about the game is that it doesn't require fancy and expensive equipment to have a table tennis set. All you need is a table, paddle, and a set of balls. Table tennis was originally known as ping-pong game and was originated in England during the late 18th century. The game was earlier started as a fun after-dinner diversion. Few rumors suggests that the game was earlier played on the dinner tables, while there are others who believe that it began as a lawn and garden game, closely resembling game like badminton. During this time, they didn't have ping pong paddles, and so the players used vellum bats to play the game. In the year 1890, the famous Parker Brothers developed an indoor version of the popular lawn tennis. The game consisted of net, paddles, and ball. In the very beginnings, the game was one of the most popular games to be played especially in England. Even though, it was still looked at as solely casual, certainly not as a sport. It was during the period of 1905-1910, when table tennis/ping pong game spread to other countries like Japan, China, and Korea. Finally, with the purpose of recognizing the pastime as a sport, England created the first official Table Tennis Association. What made this game highly competitive and popular was that most countries adopted table tennis as their pastime hobbies. With the increase in the commercialization of the game and its equipments, more and more people got attracted to this sport. In 1902, the first ever tournament for table tennis enthusiasts was started and by 1921, the Table Tennis Association was inaugurated in England. All these factors led to the worldwide phenomenon of table tennis. The game has underwent various changes to make the game more exciting. These changes have led to the creation of table tennis as a competitive and a favorite for many people.
Today is World Mental Health Day When we don't take care of our minds, our overall health suffers. Check out this table from the Mayo Clinic on the common effects of stress: Why should we pay attention to mental health? Taking care of our mental health is a major contributor to our happiness and sense of balance, goals that most people strive for. Not listening to your mental state on a daily basis or doing things to maintain your mental balance, stability and positivity can lead to more serious issues. Over 18% of adults in the U.S. have excessive anxiety and nearly 7% had at least one depressive episode in the past year, according to the National Institute of Mental Health. What are some things you can do to improve and maintain your mental health? Different things will work for different individuals, but here is a quick list of 10 things you may want to learn more about and try: 1)   Relaxed breathing exercises 2)   Meditation 3)   Spending time outdoors 4)   Practicing yoga 5)   Regular exercise 6)   Progressive muscle relaxation 7)   Massage 8)   Acupuncture 9)   Reducing your caffeine and sugar intake 10) Improving your sleep quality and creating a relaxing bedtime routine If you feel you could use some extra guidance in how to better address your mental health, please get in touch. We would be more than happy to guide you as you develop a plan to care for this essential piece of your overall wellbeing.
Government 301 Assignment # 2 Essay by suckulantpeachUniversity, Bachelor'sA+, April 2005 download word file, 2 pages 0.0 Downloaded 31 times Question #1. A: Research: Are females more likely to vote Democratic or Republican? B: Directional Hypothesis: Females are more likely to vote Democratic. C: Unit of Analysis: Individual level D: Dependent Variable: Party vote E: Independent variable: Gender Question #2. 1.Interval 2. Ratio 3. Nominal 4. Ordinal 5. Interval 6. Interval Question # 3. Hypothesis 1: · Unit of Analysis: State-level · The Dependent Variable: Voter turn out rate · Independent Variable: The percentage of high school graduates Hypothesis 2: · Unit of analysis: Individual level · The Independent Variable: Married Voters · The Dependent Variable: More likely to vote Republican. Question # 4. The research design that would be used is a cross-sectional design, which includes: Single point in time, survey research is a common example, and lack of pretest. Also non-experimental designs can be used to determine the population of females in different regions of the country. Hypothesis: To categorize the number of female voter turnouts from each region. · Unit of analysis: Individual and or regional level · The independent variable: female voters · The dependent variable: party voters · The control variable: To determine the region of the country in which to study the population of females. Question #5. A. Cross-sectional B. Time Series C. Case Study D. Panel Study Design Question #6. For the mean, median, and mode see attached pages. Using the States.sav dataset, I am going to analyze the results of the following: 1. Out of 50 states the average abortion per 1,000 women are 18.06 per state. The mean is appropriate for ratio and interval-levels. When one sums all the case's individual values on a variable, and divides by the number of cases, and then one can arrive at the variable's mean value. 2. Out of...
About Declawing Cats, by Dr. Corrine Brown Declawing cats is a commonly performed procedure in which the entire claw is surgically removed. It is a technically challenging surgery as the claw must be completely removed from the end of the digit without damaging the bone that remains in the foot. If the claw is not completely removed, the bone tissue remaining may attempt to regrow, resulting in deformed, defective claw tissue which is either entirely under the skin or which breaks through the skin allowing infection to develop. This regrowth may occur in the weeks, months or even years after the procedure. The most difficult claw to remove during the surgical procedure is the dewclaw. As with any surgery, the skill and experience of the surgeon plays a significant role in the outcome of the procedure. There are few veterinarians with extensive experience declawing large cat species, which may be one reason these cats often develop complications after the declaw procedure. Declawing a cat is the equivalent of removing a human’s finger tip, including the nail and bone up to the first joint of the hand. Ethically, the procedure is up to debate, but certainly medically one can imagine physical difficulties that can arise from this entirely elective procedure. The cat spends the rest of its life living and ambulating without the benefit of its entire anatomically normal feet. In the case of Boudreaux and Batman, the front dewclaws were the problem. They were apparently inappropriately removed initially. As a result, over the course of years, the bone attempted to regenerate and claws attempted to regrow. The problem was not detectable by care takers until the deformed claws finally ruptured the skin and caused draining abscesses. Surgery was then required to make incisions in the skin over the claws and entirely remove the bone and associated deformed claw tissue. Had the declaw procedure not been performed initially, the animals would not have had to endure years of chronic pain culminating in another surgical procedure to repair the prior damage. Written by Dr. Corrine Brown Posted in Special Announcements and tagged , , ,
Scientific Method — Exercise reverses brain volume loss in the elderly Our aging population might be able to stave off some of the mental effects of … The study involved a cohort of 120 older adults who were randomized into two groups: one that went on a program of three moderate-intensity aerobic workouts a week, and a second that spent an equal time doing stretching and toning exercises. Obviously, this sort of thing is difficult to do a double-blind study with—the participants presumably are aware of what their bodies are doing—but the researchers apparently kept themselves blinded to who did what when performing their analysis. MRI and memory tests were performed at the start, six months in, and when the program wrapped up after a year. Over the course of the year, the control group that performed stretching exercises saw a small, 1.4 percent decline in the volume of the hippocampus, a brain region associated with memory. The exercising elderly, in contrast, saw the volume increase by a bit over two percent. The changes were specific to the anterior end of this structure, and weren't apparent in other areas of the brain, like the thalamus. The magnitude of the volume changes also correlated with the improvements in fitness, as measured by the change in VO2max. Exercisers also had higher levels of a brain growth factor called BDNF at the end of the year. The good news for stretchers is that their volume loss didn't seem to cause problems for spatial memory; both the experimental and control groups saw their performance on the memory test improve over the course of the year. Within the group doing aerobic exercise, memory test performance and hippocampal volume changes did correlate, but given the results for those doing non-aerobic exercise, it's tough to ascribe too much importance to this finding. The authors point out that exercise is a pretty cheap and easy-to-implement intervention, and we've got a growing population of people who could benefit from it. But they don't even discuss the possible parallels between this finding and those that suggest that mental activity can protect against the impact of aging. It's possible that the walking exercises pushed the spatial memory system more than the stretching did. Or, exercise may have simply increased the blood flow to the brain more generally, and acted a bit like neural activity in that regard. It would be nice to see these addressed in a future publication. PNAS, 2011. DOI: 10.1073/pnas.1015950108  (About DOIs). You must to comment.
exam 2 - TEST 12 Name _ Section _ TA _ Chemistry 112 EXAM I... View Full Document Right Arrow Icon TEST 12 Name _________________________ Chemistry 112 Section ____________ E X A M I T o t a l P o i n t s = 1 2 5 TA ___________________________ Thursday, 6:30 PM February 5, 2009 Directions: 1. Each student is responsible for following directions. Read this page carefully. 2. Write your name and other requested information on this page and on the separate answer sheet. 3. CODE your name on the answer sheet using an ordinary (#2) pencil. 4. CODE your correct 10-digit identification number (PUID) on the answer sheet. THIS IS VERY IMPORTANT! 5. CODE your lab section number on the answer sheet. Please use all four digits, 0101, 0102, 0201, etc. This is also very important! 6. CODE the test number shown in the upper right-hand corner on the answer sheet in the block labeled “Test/Quiz Number”. This is Test 12. 7. Put all calculations on the examination pages. DO NOT PUT ANY EXTRA MARKS ON THE COMPUTER ANSWER SHEET! 8. This exam consists of 20 multiple-choice questions worth 6.25 points each. Choose the one best or correct answer for each question and write it both on your exam paper and on the computer answer sheet. The computer answer sheet is the only one that will be graded! 9. This exam consists of 5 pages plus a Periodic Table. Please check to be sure that you have them all! Useful Information : 1 atm = 14.7 psi = 101.325 kPa = 760 torr R = 0.082 L·atm/K·mol STP: 0ºC; 1 atm K = ºC + 273.15 Background image of page 1 View Full DocumentRight Arrow Icon Chem 112 – Exam 1 (Test 10) – 02/05/09 2 _____ 1. A car tire is inflated to a total pressure of 155 psi. What is the pressure in Pa? [1 atm = 14.7 psi = 101.325 kPa] (a) 1,070 Pa (b) 10.5 Pa (c) 1,070,000 Pa (d) 22.5 Pa (e) 22,500 Pa _____ 2. It requires 0.255 L of air to fill a balloon to 1.00 atm pressure at 25 C. If the balloon is placed in a freezer at 15ºC, what is the new volume of the air in the balloon? (a) Background image of page 2 Image of page 3 This note was uploaded on 04/03/2011 for the course CHEM 112 taught by Professor Harwood during the Spring '11 term at Purdue University-West Lafayette. Page1 / 6 View Full Document Right Arrow Icon Ask a homework question - tutors are online
Cost and Insurance Coverage of Garadsil, the HPV Vaccine How can you pay for the gardasil HPV vaccine? HPV vaccine HPV vaccine. Getty Images/Peter Dazeley/Photographer's Choice What Is Gardasil and HPV? HPV stands for human papillomavirus. HPV is a virus that is sexually transmitted. In some cases, HPV causes genital warts; in other cases the virus has no obvious harmful effect. In some cases, however, HPV can cause cervical and other cancers. HPV 16 and HPV 18 have been identified as the viruses most likely to cause genital warts and cancer.  The HPV vaccines, called Gardasil®, Gardasil 9®, and Cervarix®, protect against the types of HPV that cause cervical cancer and genital warts. The vaccine is specifically recommended for both boys and girls ages 11 or 12, though others can benefit from its protection. According to the CDC: What Does Gardasil Cost? A patient paying out of pocket for Gardasil will pay $120 per dose.Three doses are required over a 6-month period, making the total cost for the HPV vaccine $360. On top of that, some doctors are charging office visit fees when the vaccine is given. The vast majority of large health insurance providers cover Gardasil, but that varies from company to company. Most that offer coverage for Gardasil only do so for females age 9 to 26, the age group for which the vaccine is FDA-approved. There is no current legislation that requires insurance providers to cover the costs of Gardasil. You can always call your insurance provider to determine if it covers the vaccine. Your doctor's front office staff may be able to tell if your provider covers the costs as well. Merck, the manufacturer of Gardasil, does have a patient vaccine patient assistance program, and offers financial support if needed for patients up to age 26. Gardasil is also covered under a federal program available to uninsured and Medicaid eligible children under 18. This makes the vaccine free to eligible children. According to the CDC: More information: 3 Things Parents Need to Know about Preventing Cancers American Cancer Society. What is the HPV vaccine? Web, 2016. Centers for Disease Control and Prevention."Sexually Transmitted Diseases." HPV and HPV Vaccine - Information for Healthcare Providers. Aug 2006. Planned Parenthood Website, 2016. HPV vaccine."Web. Continue Reading
Image Image Image Image Image Image Image Image Image Image Affluent Investor | March 23, 2017 Scroll to top No Comments The Pre-Christmas World of Hunger and Premature Death christmas present PUBLIC DOMAIN The world was flat until 1600. Not the shape of the planet. According to the best economic history, standards of living even in 1800 AD hardly differed from those of 5000 BC. TV shows dealing with the ancient past assume a gradual slope of progress and portray Egyptians or Abraham and Sarah as if they were primitive South American tribes still stuck in hunting and gathering mode. But if economic historians are correct, Egyptians in 3000 BC lived as well as the eighteenth century French. Famine and mass starvation were common. Nobel-Prize winner Robert Fogel wrote in Escape from Hunger and Premature Death that in eighteenth century France 20% of the people could get only enough calories each day to fuel a short walk to the spot where they begged. Of course, some ancient capitals did better than others by looting conquered nations but per capita wealth never increased; it just sloshed from one conqueror to the next. Rome enjoyed wealth and splendor because it had stolen stuff from defeated nations. Economist Deirdre McCloskey in her books on bourgeois virtues (Bourgeois Virtues and Bourgeois Dignity) depicted the flat history of living standards as the shaft of a hockey stick lying on the ice. Then around 1600 living standards shot up like the blade of a hockey stick in the Dutch Republic, then England, the US and parts of Western Europe. Living standards today are thirty times the level of 1600. What changed? There are as many explanations as economic historians. McCloskey knocks out to most of them in Bourgeois Dignity. Usually, the economist who fabricated the false theories commit the sin of attributing the effect to causes that existed in other parts of the world in greater abundance, such as the Ottoman Empire and China, that never experienced growing standards of living. The “hockey stick” effect was unique to Western Europe, Canada, Australia and the US for centuries and so requires a unique cause. The best answer lies within the fields where social science and economic research meet. As Harrison and Huntington report in Culture Matters, institutions decide economic performance, culture creates institutions and religion determines culture. Two books that braid the various strands of thought together into a unified theory of economic development are Helmut Schoeck’s Envy: A Theory of Social Behavior and Larry Seidentop’s Inventing the Individual. They are two sides of the same coin, though published decades apart. Schoeck demonstrates the ways in which envy dominated the morality of ancient and modern cultures, primitive and advanced, and created institutions that blocked economic development for millennia. Envy works by suppressing the genius of individuals who might benefit from innovations that would eventually enrich the entire tribe. Economic development requires innovations that envy destroys. Schoeck credits the Christian culture of Western Europe for managing to restrain envy long enough to allow space for economic growth. Seidentop explains how Christianity accomplished Schoeck’s remarkable feat and that’s where Christmas walks on stage in this historical pageant. Suppressing envy allows individualism to blossom. Before the birth of Christ, respect for individuals did not exist. As Seidentop wrote, we must imagine a pre-Christmas era as …a world where action was governed by norms reflecting exclusively the claims of the family, its memories, rituals and roles, rather than the claims of the individual conscience. We must imagine ourselves into a world of humans or persons who were not ‘individuals’ as we would understand them now…. There was no notion of the rights of individuals against the claims of the city and its gods. There was no formal liberty of thought or action. Participation in the assembly and service as a magistrate, if chosen, were obligatory and enforced. Citizens belonged to the city, body and soul. The premise of moral equality requires a human will that is in a sense pre-social. It is that will which Paul’s great discovery, his mystical vision of the Christ, provides. Christianity taught that all humans are equal before God and must respond individually to his requirements. God had given rights to individuals that the state could not ignore. Most of Seidentop’s book gives the blow-by-blow details of how the Church gradually, painfully over 1,600 years and against great opposition, fought for institutions built around the new idea of individual rights. Those institutions achieved critical mass first in the Dutch Republic of the seventeenth century, which quickly became the wealthiest and most powerful nation in Europe. The Dutch owe their success to the brilliant scholarship of the theologians at the University of Salamanca, Spain. Adam Smith claimed the Dutch had most fully implemented his system of natural freedom in his book, Wealth of Nations. They were the first capitalists. We can still see the effects of Christian individualism today. The work of Geert Hofstede (Culture’s Consequences ) and Shalom H. Schwartz (“A Theory of Cultural Values and Some Implications for Work,” Applied Psychology: An International Review) demonstrate a very high correlation between economic growth and measures of Christian individualism around the world. (I call it Christian individualism because atheists in the French “Enlightenment” invented a different, destructive kind of individualism that Hayek explains in his Counter-Revolution in Science and Individualism: True and False.) Was Paul the greatest revolutionary in human history? Through its emphasis on human equality, the New Testament stands out against the primary thrust of the ancient world, with its dominant assumption of ‘natural’ inequality. Indeed, the atmosphere of the New Testament is one of exhilarating detachment from the unthinking constraints of inherited social roles. Hence Paul’s frequent references to ‘Christian liberty’. The atheists and deists of the French Enlightenment successfully re-wrote history to promote their propaganda that Western culture came from ancient Greece and Rome. Seidentop and Rodney Stark (How the West Won: The Neglected Story of the Triumph of Modernity and The Victory of Reason: How Christianity Led to Freedom, Capitalism, and Western Success) expose the deceit. Western history and success come from Christianity. That is why it is unique and why multicultural propaganda so dangerous. This Christmas, be thankful for the wonderful wealth the US enjoys that ultimately came because of the divine baby born in a manger. Article originally published on ABCT Investing. Become An Insider! The Affluent Mix Become An Insider!
Kamis, 17 Februari 2011 Tugas Metpenstat I 17 Februari 2011 Dosen : Mbak Ike Riset Question : 1. The absolute and relative effects of self-efficacy and stress on these academic out-comes. 2. The effect of demographic factors on academic success and persistence. 3. What is the relationship between academic self-efficacy and stress? 4. How are grades, credits, and persistence related? Hipotesis : 1. We hypothesize that both academic self-efficacy and stress will have an effect on all outcomes, with higher levels of self-efficacy and lower stress being associated with better grades, more accumulated credits, and greater persistence. 2. Older students have been found to earn higher grades than younger, traditional-age students. 3. Sociodemographic characteristics of students are inconsistently related to college outcomes. 4. Black and Hispanic students are more likely than white students to drop out of college. Metode : 1. We examined the data via both exploratory and confirmatory factor analysis to determine (1) whether the stress and self-efficacy items in the questionnaire could be reduced to a smaller subset of indexes capturing different dimensions of each, and (2) whether stress and self-efficacy could be considered distinct constructs, given the approach to measuring them in the survey. In the second part of the analysis, we used structural equation modeling to examine the effect of stress and self-efficacy as latent constructs on each of the three outcomes: college GPA at the end of the first year ,credit hours obtained during the year, and enrollment in college at the start of the third semester. Analisis : 1. Stress and self-efficacy can be considered latent constructs that are imperfectly measured by questionnaire items (or indexes derived from them). 2. Structural equation modeling, as a multivariate method, allows estimation of cross-equation error correla-tion. Ada kesalahan di dalam gadget ini Follow by Email
Ansible is an open source automation tool used to configure servers, install software and perform a wide variety of IT tasks from one central location. It is a one-to-many agentless mechanism where all instructions are run from a control machine that communicates with remote clients over SSH (although other protocols are also supported). Though targeted for system administrators with privileged access who routinely perform tasks such as installing and configuring applications, Ansible can also be used by non-privileged users. For example, a database administrator (using the mysql account) could use Ansible to create MySQL databases, add users and define access level controls to databases. Let’s go over a very simple scenario where a system administrator provisions 100 servers each day and must run a series of commands on each one before handing it off to users. So you run a series of commands that look like this: $ groupadd admin $ useradd -c “Sys Admin” -g admin -m sysman $ mkdir /opt/tools $ chmod 755 /opt/tools $ chown sysman /opt/tools $ yum -y install httpd $ yum -y update $ systemctl enable httpd $ systemctl start httpd $ rm /etc/motd These commands can be placed in an Ansible "playbook" and executed against your 100 servers in one shot: - name: daily tasks   hosts: my_100_daily_servers   - group: name=admin state=present   - user: name=sysman comment="Sys Admin" group=admin   - file: path=/opt/tools state=directory owner=sysman mode=0755   - yum: name=httpd state=latest   - yum: name=* state=latest   - service: name=httpd state=started enabled=yes   - file: path=/etc/motd state=absent This example is very simple but should illustrate how easily commands can be specified in yaml files and executed against pre-defined servers. In a heterogeneous environment, conditional statements can be added so that certain commands are only executed in certain servers (i.e. “only execute yum commands in systems that are not Ubuntu or Debian”). One powerful property of Ansible is that a playbook describes a desired state in a computer system, so a playbook can be run multiple times against a server without impacting its state. If a certain task has already been implemented (i.e. “user sysman already exists”) then it simply ignores it and moves on. Over the next few weeks, I will publish a series of blogs with detailed examples of routine tasks that can be easily be implemented with Ansible, including tasks specific to Dell PowerEdge servers. Although Ansible is also supported on Windows using PowerShell, the blog series will focus exclusively on Linux. Towards the end of the series I will do a brief comparison with other popular configuration management tools such as Puppet and Chef.
Why Be Embarrassed By Your Skin? Skin is the largest organ on the human body. That is why it is so important to take care of it. But perhaps you do not know how to go about taking care of your skin? Don’t worry, by the time you get done reading the following article, you will be well-informed. If you want healthy looking skin and hair, maintain a healthy diet. It’s been proven that what you eat directly impacts your skin and hair health. Research suggests that if your have a diet that’s high in Vitamin C and low in carbohydrates and fats you’ll have much healthier looking skin. If you feel you must absolutely maintain a tan, seriously consider synthetic alternatives. Using bronzers are much better for your skin in the long run. Don’t be ashamed to get your tan out of the bottle. Avoiding sunlight will prevent signs of aging and protect you from skin cancer. Getting more sunlight can be very healthy for your skin in general, and it can have a positive effect on acne. This can be accomplished by heading out to the park during your lunch break. Whatever you do, find excuses for going outside every day. Exposure to the sun encourages vitamin D production, and vitamin D is essential for maintaining skin health. If you want to add nutrients to your skin, then use a facial serum over a moisturizer because a serum allows nutrients to get deeper into the layers of skin. If you use a moisturizer, it does not penetrate as deeply as serums can, but is designed to add moisture to hydrate your skin. Your hands have some of the most sensitive skin on your body. During colder times of the year, it’s very easy for them to dry out and crack so make sure you keep them moisturized. It’s also a good idea to wear gloves to protect your skin when you go out in the cold. If you like to wear wool gloves, make sure you put a think cotton glove underneath it to keep the wool from irritating your skin. As was stated in the beginning of this article, skin is the largest organ in the body, which is why it is so important that it is well take care of. In the above article, you were give crucial information to help you get on the road to having healthy skin.
Religion Wiki Who is a Sikh? 34,322pages on this wiki Add New Page Talk0 Share The word Sikh literally means "a learner" and is derived from the Sanskrit word "shishya" which means disciple or student or learner; the term is also related to "Saknoti" which means "able and strong". In the Punjabi language the word Sikh literally means to learn. A Sikh is a follower of the religion called Sikhi or Sikhism, which is the fifth largest organised religion in the world. A Sikh is a disciple of the Guru Granth Sahib which is more than a Holy book for the Sikhs - It is their perpetual and living spiritual teacher and guide. Who is a Sikh? Fortunately for us, this question has been answered by the Sikh Gurus who created this word; so it is not difficult to arrive at an answer. However, it appears that many politicians and the legal system in India have taken it upon themselves to redefine this word. This is not a wise move. It is always dangerous when some small section of the global community decide to redefine a term that has overtaken them and has now become an international term. The word now does not just apply to people who reside in India; many millions of Sikhs live outside India and many will have never seen India and many will never ever go to India! Further, there are many non-Sikhs who love and follow the teaching of Guru Nanak and are drawn to the faith; how can a few politicians in a small state of India called Punjab decide on the terminology used worldwide? The founder Sikh Guru, Guru Nanak first used the word 'Sikh' in about 1500; since then during the time of the first 9 Guru's, many millions of Sikhs roamed Punjab and the rest of the Indian sub-continent. Many Sikhs were found in surrounding countries like Afghanistan, Nepal, etc. All these Sikhs understood who they were and what there faith was; they knew the message of the Sikh Gurus and they followed it as best as possible. Word established over 239 years The Sikh Gurus over a period of 239 years established the faith known as Sikhi and in so doing gave meaning to the word "Sikh". It appears that the politicians are not satisfied with what the Gurus have said and wish to make their own definitions. This cannot be acceptable to the follower of the Sikh Gurus. Sikhi is an inclusive religion and the term Sikh has a wide coverage; it is not an exclusive term. The meaning of the word has been a reality and a certainty for many hundreds of years; the meaning of the word has been established by the Gurus and must remain so forever. It should be our task to understand what meaning the Gurus gave to this word rather than to tinker it to suit our present political needs. The word "Sikh" appears in the Guru Granth Sahib English translation 156 times as Sikh, Sikhs, Gursikh(s), Sikh(s) of the Guru, etc. In some of these places, the Guru explains and defines this word. The definition of this word is a combination of all these explanations found in the holy Granth in these 156 locations. Only the careful study of these verses, where this word appears would yield a good idea of the meaning of the term. However, one could also, combine with this the explanations found in the Dasam Granth and also the text by historic scholars like Bhai Gurdas, {{Bhai Nand Lal]], etc. 2 Words: "Sikh" and "Khalsa" The word "Sikh" and "Khalsa" are treated differently in the holy Granth and must be treated separately in real life. Although there is some overlap in the definitions of these words, they are two different and distinct terms. There is considerable confusion in some Sikh sections about this distinction and some elements in the restricted establishment have lost the vision to cater for the global Sikh community. This is a un-welcomed situation which could be extremely detrimental to the Sikh panth and to the spread of the universal message of Guru Nanak and the Sikh Gurus. Rather than get unnecessarily involved in any ugly proceedings of the current drama taking place the the Courts and the political arena in India, let us turn to what has been said in the Guru Granth Sahib regarding this word - Sikh or Gursikh? Summary of the message of Gurbani The list below summarises the Shabads found in the next section dealing with Gurbani. Only Shabads that offer an explanation of the term and are different from previous Shabads mentioned are listed. In taking all the Gurbani's definition of a Sikh into cosideration, one can summarise these as follows: • 1. A true Sikh of the Guru mediates on the Lord's Name regularly early everyday. • 2. The Guru's Sikh stays away from evil deeds • 3. Instead of just pursuing the gathering of wealth and property, the Guru's Sikh is happy to meet the Guru and follow the teachings of the Guru. • 4. The true Gursikh will side with the Guru always and not turn his back when things get hard. • 5. Have faith in Gurbani and trust what it says as ordained by the Lord. • 6. Do not mingle with the false and adhere to the path of righteousness as stipulated by the Gurus. • 7. Remember the Guru (the Lord) at all times and acts according to his instructions. • 8. Do not keep company with anyone who wants to deceive and be involved in deception. • 9. Recognise that the mission of the Sikh is the same as that of the Sikh Gurus - to spread the teaching of Gurbani. • 10. Keep your mind clear; do not let your emotional attachments cloud your judgement. • 11. Respect all the people and their implements of those who walk on the path of righteousness for this is the sacred mission of the Sikh. • 12. Conquer the mind and do not let it distract you from the path of Dharam. • 13. Respect and accept Gurbani as the path of the Lord; do not be doubtful! • 14. Only by embracing love for the Lord will this priceless human life's mission be accomplished. 1. This Shabad by the fourth Sikh Guru, Guru Ram Das gives in one compact paragraph the precise definition of a Gursikh. What is interesting is that most of the condition pertain to the frame of mind and the habits that endear the Sikh to the Guru rather than to the physical form. It is accepted that this may have been developed by later Gurus, but what is important to understand where the importance was laid by the Gurus in the initial stage of Sikhism. Further, the later Gurus did not modify this shabad or add anything very different to the holy Granth to reflect any major change in this definition. The important of meditating on the Lord's Name is central and main theme of the whole hymn. Then comes the need to do this yourself and to encourage others to do it; finally the prefered ways to carry out this practise. In the early hours; after bathing but standing or sitting is not important to meditate on His name. Keep the Lord in your mind at all times! ਮ: ੪ ॥ ਉਦਮੁ ਕਰੇ ਭਲਕੇ ਪਰਭਾਤੀ ਇਸਨਾਨੁ ਕਰੇ ਅੰਮ੍ਰਿਤ ਸਰਿ ਨਾਵੈ ॥ ਫਿਰਿ ਚੜੈ ਦਿਵਸੁ ਗੁਰਬਾਣੀ ਗਾਵੈ ਬਹਦਿਆ ਉਠਦਿਆ ਹਰਿ ਨਾਮੁ ਧਿਆਵੈ ॥ ਜਿਸ ਨੋ ਦਇਆਲੁ ਹੋਵੈ ਮੇਰਾ ਸੁਆਮੀ ਤਿਸੁ ਗੁਰਸਿਖ ਗੁਰੂ ਉਪਦੇਸੁ ਸੁਣਾਵੈ ॥ ਜਨੁ ਨਾਨਕੁ ਧੂੜਿ ਮੰਗੈ ਤਿਸੁ ਗੁਰਸਿਖ ਕੀ ਜੋ ਆਪਿ ਜਪੈ ਅਵਰਹ ਨਾਮੁ ਜਪਾਵੈ ॥੨॥ Mėhlā 4. Gur saṯgur kā jo sikẖ akẖā▫e so bẖalke uṯẖ har nām ḏẖi▫āvai. Uḏam kare bẖalke parbẖāṯī isnān kare amriṯ sar nāvai. Upḏes gurū har har jap jāpai sabẖ kilvikẖ pāp ḏokẖ lėh jāvai. Fir cẖaṛai ḏivas gurbāṇī gāvai bahḏi▫ā uṯẖ▫ḏi▫ā har nām ḏẖi▫āvai. Jo sās girās ḏẖi▫ā▫e merā har har so gursikẖ gurū man bẖāvai. Jis no ḏa▫i▫āl hovai merā su▫āmī ṯis gursikẖ gurū upḏes suṇāvai. Jan Nānak ḏẖūṛ mangai ṯis gursikẖ kī jo āp japai avrah nām japāvai. (2) Fourth Mehl: That person, unto whom my Lord and Master is kind and compassionate - upon that GurSikh, the Guru's Teachings are bestowed. Servant Nanak begs for the dust of the feet of that GurSikh, who himself chants the Naam, and inspires others to chant it. (2) ਗੁਰ ਕਾ ਸਿਖੁ ਬਿਕਾਰ ਤੇ ਹਾਟੈ ॥ Gur kā sikẖ bikār ṯe hātai. The Sikh of the Guru abstains from evil deeds. ਨਰ ਪ੍ਰਾਣੀ ਪ੍ਰੀਤਿ ਮਾਇਆ ਧਨੁ ਖਾਟੇ ॥ ਗੁਰਸਿਖ ਪ੍ਰੀਤਿ ਗੁਰੁ ਮਿਲੈ ਗਲਾਟੇ ॥ Nar parāṇī parīṯ mā▫i▫ā ḏẖan kẖāte. Gursikẖ parīṯ gur milai galāte. The mortal man loves to accumulate wealth and property. The GurSikh loves to meet and embrace the Guru. ਸਚਿਆਰ ਸਿਖ ਬਹਿ ਸਤਿਗੁਰ ਪਾਸਿ ਘਾਲਨਿ ਕੂੜਿਆਰ ਨ ਲਭਨੀ ਕਿਤੈ ਥਾਇ ਭਾਲੇ ॥ Sacẖiār sikẖ bahi saṯgur pās gẖālan kūṛi▫ār na labẖnī kiṯai thā▫e bẖāle. The truthful Sikhs sit by the True Guru's side and serve Him. The false ones search, but find no place of rest. ਸਤਿਗੁਰ ਕੀ ਬਾਣੀ ਸਤਿ ਸਤਿ ਕਰਿ ਜਾਣਹੁ ਗੁਰਸਿਖਹੁ ਹਰਿ ਕਰਤਾ ਆਪਿ ਮੁਹਹੁ ਕਢਾਏ ॥ Saṯgur kī baṇī saṯ saṯ kar jāṇhu gursikẖahu har karṯā āp muhhu kadẖā▫e. O GurSikhs, know that the Bani, the Word of the True Guru, is true, absolutely true. The Creator Lord Himself causes the Guru to chant it. ਕੂੜਿਆਰ ਕੂੜਿਆਰੀ ਜਾਇ ਰਲੇ ਸਚਿਆਰ ਸਿਖ ਬੈਠੇ ਸਤਿਗੁਰ ਪਾਸਿ ॥੨੬॥ Kūṛi▫ār kẖūṛi▫ārī jā▫e rale sacẖiār sikẖ baiṯẖe saṯgur pās. (26) The false go and mingle with the false, while the truthful Sikhs sit by the side of the True Guru. (26) ਗੁਰਸਿਖਾਂ ਅੰਦਰਿ ਸਤਿਗੁਰੂ ਵਰਤੈ ਜੋ ਸਿਖਾਂ ਨੋ ਲੋਚੈ ਸੋ ਗੁਰ ਖੁਸੀ ਆਵੈ ॥ ਸਤਿਗੁਰੁ ਆਖੈ ਸੁ ਕਾਰ ਕਮਾਵਨਿ ਸੁ ਜਪੁ ਕਮਾਵਹਿ ਗੁਰਸਿਖਾਂ ਕੀ ਘਾਲ ਸਚਾ ਥਾਇ ਪਾਵੈ ॥ Gursikẖāʼn anḏar saṯgurū varṯai jo sikẖāʼn no locẖai so gur kẖusī āvai. Saṯgur ākẖai so kār kamāvan so jap kamāvėh gursikẖāʼn kī gẖāl sacẖā thā▫e pāvai. Deep within the hearts of His GurSikhs, the True Guru is pervading. The Guru is pleased with those who long for His Sikhs. As the True Guru directs them, they do their work and chant their prayers. The True Lord accepts the service of His GurSikhs. ਜਿ ਠਗੀ ਆਵੈ ਠਗੀ ਉਠਿ ਜਾਇ ਤਿਸੁ ਨੇੜੈ ਗੁਰਸਿਖੁ ਮੂਲਿ ਨ ਆਵੈ ॥ Jė ṯẖagī āvai ṯẖagī uṯẖ jā▫e ṯis neṛai gursikẖ mūl na āvai. One who comes to deceive, who rises up and goes out to deceive - the GurSikhs shall never come near him. ਗੁਰੂ ਸਿਖੁ ਸਿਖੁ ਗੁਰੂ ਹੈ ਏਕੋ ਗੁਰ ਉਪਦੇਸੁ ਚਲਾਏ ॥ Gurū sikẖ sikẖ gurū hai eko gur upḏes cẖalā▫e. The Guru's Sikh, and the Sikh's Guru, are one and the same; both spread the Guru's Teachings. ਸੋ ਗੁਰੂ ਸੋ ਸਿਖੁ ਕਥੀਅਲੇ ਸੋ ਵੈਦੁ ਜਿ ਜਾਣੈ ਰੋਗੀ ॥ ਤਿਸੁ ਕਾਰਣਿ ਕੰਮੁ ਨ ਧੰਧਾ ਨਾਹੀ ਧੰਧੈ ਗਿਰਹੀ ਜੋਗੀ ॥੫॥ So gurū so sikẖ kathī▫ale so vaiḏ jė jāṇai rogī. Ŧis kāraṇ kamm na ḏẖanḏẖā nāhī ḏẖanḏẖai girhī jogī. (5) He alone is said to be a Guru, he alone is said to be a Sikh, and he alone is said to be a physician, who knows the patient's illness. He is not affected by actions, responsibilities and entanglements; in the entanglements of his household, he maintains the detachment of Yoga. (5) ਤਿਨ ਕਾ ਖਾਧਾ ਪੈਧਾ ਮਾਇਆ ਸਭੁ ਪਵਿਤੁ ਹੈ ਜੋ ਨਾਮਿ ਹਰਿ ਰਾਤੇ ॥ ਤਿਨ ਕੇ ਘਰ ਮੰਦਰ ਮਹਲ ਸਰਾਈ ਸਭਿ ਪਵਿਤੁ ਹਹਿ ਜਿਨੀ ਗੁਰਮੁਖਿ ਸੇਵਕ ਸਿਖ ਅਭਿਆਗਤ ਜਾਇ ਵਰਸਾਤੇ ॥ ਤਿਨ ਕੇ ਤੁਰੇ ਜੀਨ ਖੁਰਗੀਰ ਸਭਿ ਪਵਿਤੁ ਹਹਿ ਜਿਨੀ ਗੁਰਮੁਖਿ ਸਿਖ ਸਾਧ ਸੰਤ ਚੜਿ ਜਾਤੇ ॥ ਤਿਨ ਕੇ ਕਰਮ ਧਰਮ ਕਾਰਜ ਸਭਿ ਪਵਿਤੁ ਹਹਿ ਜੋ ਬੋਲਹਿ ਹਰਿ ਹਰਿ ਰਾਮ ਨਾਮੁ ਹਰਿ ਸਾਤੇ ॥ ਜਿਨ ਕੈ ਪੋਤੈ ਪੁੰਨੁ ਹੈ ਸੇ ਗੁਰਮੁਖਿ ਸਿਖ ਗੁਰੂ ਪਹਿ ਜਾਤੇ ॥੧੬॥ Ŧin kā kẖāḏẖā paiḏẖā mā▫i▫ā sabẖ paviṯ hai jo nām har rāṯe. Ŧin ke gẖar manḏar mahal sarā▫ī sabẖ paviṯ hėh jinī gurmukẖ sevak sikẖ abẖi▫āgaṯ jā▫e varsāṯe. Ŧin ke ṯure jīn kẖurgīr sabẖ paviṯ hėh jinī gurmukẖ sikẖ sāḏẖ sanṯ cẖaṛ jāṯe. Ŧin ke karam ḏẖaram kāraj sabẖ paviṯ hėh jo bolėh har har rām nām har sāṯe. Jin kai poṯai punn hai se gurmukẖ sikẖ gurū pėh jāṯe. (16) The food and clothes, and all the worldly possessions of those who are attuned to the Lord's Name are sacred. All the homes, temples, palaces and way-stations are sacred, where the Gurmukhs, the selfless servants, the Sikhs and the renouncers of the world, go and take their rest. All the horses, saddles and horse blankets are sacred, upon which the Gurmukhs, the Sikhs, the Holy and the Saints, mount and ride. All the rituals and Dharmic practices and deeds are sacred, for those who utter the Name of the Lord, Har, Har, the True Name of the Lord. Those Gurmukhs, those Sikhs, who have purity as their treasure, go to their Guru. (16) ਧਨੁ ਧਨੁ ਭਾਗ ਤਿਨਾ ਗੁਰਮੁਖਾ ਜੋ ਗੁਰਸਿਖ ਲੈ ਮਨੁ ਜਿਣਤਿਆ ॥ ਸਭ ਦੂ ਵਡੇ ਭਾਗ ਗੁਰਸਿਖਾ ਕੇ ਜੋ ਗੁਰ ਚਰਣੀ ਸਿਖ ਪੜਤਿਆ ॥੧੮॥ Ḏẖan ḏẖan bẖāg ṯinā gurmukẖā jo gursikẖ lai man jiṇṯi▫ā. Sabẖ ḏū vade bẖāg gursikẖā ke jo gur cẖarṇī sikẖ paṛ▫ṯi▫ā. (18) Blessed, blessed is the good fortune of those Gurmukhs, who live as Gursikhs, and conquer their minds. But the greatest good fortune of all, is that of the Guru's Sikhs, who fall at the Guru's feet. (18) ਗੁਰਸਿਖ ਮੀਤ ਚਲਹੁ ਗੁਰ ਚਾਲੀ ॥ ਜੋ ਗੁਰੁ ਕਹੈ ਸੋਈ ਭਲ ਮਾਨਹੁ ਹਰਿ ਹਰਿ ਕਥਾ ਨਿਰਾਲੀ ॥੧॥ ਰਹਾਉ ॥ Gursikẖ mīṯ cẖalhu gur cẖālī. Jo gur kahai so▫ī bẖal mānhu har har kathā nirālī. (1) rahā▫o. O Sikhs of the Guru, O friends, walk on the Guru's Path. Whatever the Guru says, accept that as good; the sermon of the Lord, Har, Har, is unique and wonderful.(1)(Pause) ਉਪਦੇਸੁ ਸੁਣਹੁ ਤੁਮ ਗੁਰਸਿਖਹੁ ਸਚਾ ਇਹੈ ਸੁਆਉ ॥ ਜਨਮੁ ਪਦਾਰਥੁ ਸਫਲੁ ਹੋਇ ਮਨ ਮਹਿ ਲਾਇਹੁ ਭਾਉ ॥ Upḏes suṇhu ṯum gursikẖahu sacẖā ihai su▫ā▫o. Janam paḏārath safal ho▫e man mėh lā▫ihu bẖā▫o. Listen to these Teachings, O Sikhs of the Guru. This is the true purpose of life. This priceless human life will be made fruitful; embrace love for the Lord in your mind. This article is part of the series on the "Message of Gurbani" These are the Popular Banis of Sikhism Mool Mantar | Japji | Jaap | Anand | Rehras | Benti Chaupai | Tav-Prasad Savaiye | Kirtan Sohila | Shabad Hazaray | Sukhmani | Asa di Var | Ardas Ad blocker interference detected!
Presentation is loading. Please wait. Presentation is loading. Please wait. After the Violencia: Indigenous Activism Kay Warren “Indigenous Movements and their Critics: Pan Mayan Activism in Guatemala” (1998) Similar presentations Presentation on theme: "After the Violencia: Indigenous Activism Kay Warren “Indigenous Movements and their Critics: Pan Mayan Activism in Guatemala” (1998)"— Presentation transcript: 3 Guatemala is a multinational society…That is to say ‘Guatemalan Culture’ cannot be other than a confederation of cultures and languages in which each preserves its originality (Cojti Cuxil, in Kay Warren, 195). 4 Ideological contradictions between the left and the Mayan movement: Ethnicity versus class struggle 5 Pan Mayan Movement Elements of Maya culture utilized to inform the construction of pan-Mayan politics -- traditional, pre-conquest How pan-Mayanism contributes to nation building through reverse orientalism 6 Edward Said’s orientalism (1978) The Orient signifies a system of representations framed by political forces that brought the Orient into Western learning, Western consciousness, and Western empire. The Orient exists for the West, and is constructed by and in relation to the West. It is a mirror image of what is inferior and alien ("Other") to the West 7 Orientalism Orientalism is "a manner of regularized (or Orientalized) writing, vision, and study, dominated by imperatives, perspectives, and ideological biases ostensibly suited to the Orient" (It is the image of the 'Orient' expressed as an entire system of thought and scholarship. 8 What are the paradoxes and politics of reverse orientalism? System of thought and scholarship dominated by ideologies suited to the Mayan 9 Local events and international developments created possibilities for the growth of the Pan- Maya movement New opportunities created with unanticipated results Exposing “democratic” contradictions 10 International developments International law “to freely determine their political status and freely pursue their economic, social and cultural development” 11 Declaration of the right of Indigenous Peoples (UN 1989) To protect their own cultural practices and ceremonial, archaeological sites; To practice their own spiritual traditions; To promote their own language; To control their own educational systems; To have access to mass media; To gain recognition of their own customary laws and land tenure systems, etc 12 The role of international organizations ILO (International labor organization) UN Catholic church NGO’s Amnesty International Human right watch Cultural survival 13 Observers express that: ethnicity could lead to a destructive break up there are not clear ethnic boundaries there is not such thing as transcendent concept of indigenous people 14 For Pan-Mayanists the movement means: Challenging the legacy of colonialism, racism Maya self-representation: Maya is not Static, represent a mix of practices and knowledges Problem with Indigenous identity as the only pathway to social change and self- representation 15 *** Indigenous ideology as a pathway to social change Cultivating common cause Legitimization of political and linguistic claims 16 How do Pan-Mayanists try to achieve inclusion in the Guatemalan political process? Creating a sense of cultural distinctiveness Political essentialism: issues of representation Challenging others who claim to speak for them 17 The development of the pan-Maya movement in Guatemala Is transformed from cultural to a political movement They seek: 1.Recognition of cultural diversity within the nation state 2.A greater role for Indigenous politics in national culture 3.A reassessment of economic inequities 4. Wider distribution of cultural resources and literacy in indigenous languages 18 Mayan Studies: Research Centers Through the research centers these intellectuals have created counter histories Denouncing the racism of national histories Critiquing foreign research practices and scholarship (including anthropological) Challenging western models of development and political psychology to counteract internalized racism 19 From issues of origin to issues of nation building Who are we if we are not the negative stereotype we have been taught? “ Only when a people accepts its history and assumes its identity do they have the right to define their future” New demands on the state: reforms on law, language, etc 20 Pan-Mayanists’ priorities Language revitalization: Literacy The revitalization of Maya chronicles of culture, history and resistance to the Spanish invasion. Popol Vuj and the Annals of the Kaqchikels Revitalization of May leadership norms (community council run by elders, midwives, and May shaman-priests) The dissemination of an internationally recognized discourse of indigenous rights focusing on recognition and self-determination 21 Critiques Ethnic separatism, ethnic polarization Violating the local grounding of indigenous identity in place and community Not appropriate for the country, some regions populated predominantly by a single group The Ladino cultures include indigenous elements Building on a language as a key basis of revitalization, stressing language group endogamy Pan-Mayan leaders and urban participants are seen as a neither indigenous nor ladino but rather a third ethnicity 22 Pan-Mayanists reaction Attempts to disempower the movement They are pragmatic and chose to work with any ideological persuasion 23 Discussion question Can a strategy of tactical essentialism be productive for the Maya? Similar presentations Ads by Google
Effi Briest Test | Mid-Book Test - Hard Buy the Effi Briest Lesson Plans Name: _________________________ Period: ___________________ Short Answer Questions 1. In which town does Innstetten live as Landrat? 2. What do several of the people Effi visits with say she is infected with? 3. What do Effi and her friends give a sea burial? 4. Which of the following is NOT said of Innstetten? 5. Three days after the wedding, where does a postcard arrive from for the Briests? Short Essay Questions 1. What makes Effi feel better after seeing a ghost in her home? 2. What does Effi's father talk about after breakfast on the day after Effi's wedding? 3. What does Effi's father think will be a problem in his daughter's marriage? 4. Who does Effi's father believe would have been a better match for Innstetten? 5. Who does Effi's mother joke that Effi is in love with, and why? 6. What does Effi's sea burial for the gooseberry skins remind her of? 7. How is Baron Geert von Innstetten acquainted with the Briest family? 8. Who are Innstetten's domestic servants? 9. How is Effi Briest described? 10. What are Frau and Major Crampas like? Essay Topics Write an essay for ONE of the following topics: Essay Topic 1 Discuss Fontane's use of allegory in the novel "Effi Briest". Essay Topic 2 "Effi Briest" is an example of literary realism. What is literary realism and what are its characteristics? What makes "Effi Briest" an example of literary realism? Are there any elements of the novel which are not elements of literary realism? If so, why did Fontane choose to write the story in the way he did? Essay Topic 3 Discuss the protagonist of the novel, Effi Briest. What are her defining character traits? What major events take place in her life in the narrative? How is she affected by them? (see the answer keys) This section contains 683 words (approx. 3 pages at 300 words per page) Buy the Effi Briest Lesson Plans Effi Briest from BookRags. (c)2017 BookRags, Inc. All rights reserved. Follow Us on Facebook
Aggression as a learned response, Science Aggression as a Learned Response:  To elaborate  this further,  let us assume that you are preparing for an exam or reading something that requires concentration. Your neighbour plays his radio at full volume. You would probably first go and request him to lower the volume. If  he refuses, you have to think about what to do. you could get very angry and exchange some harsh words or, you might even beat him up, another alternative would be that you let your temper cool off, or move away to a quieter place. This might enable you to take up the matter with your neighbour when both of you are in a reazonable mood. Out of  these  three, the response chosen by you would be one,  that has been the most successful in  the past  in a similar situation. Unpleasant situations  often lead to aggressive behaviour. In a study involving two groups, one group was made to work  in a stuffy and hot room while the other was maie to work in a cooler and pleasant room. A person was made to behave aggressively with each group. The reaction csf  the group working in uncomfortable circumstances was significantly more aggressive to this person than the group that was' working under comfortable  conditions. Children, too, learn to respond aggressively by  imitation of elders. In some studies,  children who watched an adult behave aggressively learned to imitate him and thus behaved  in a more aggressive  fashion like, hitting each other or pushing one another  around. While another groups of children who hadn't been exposed to such adult behaviour showed no increase in  their aggressive attitude.   Posted Date: 9/28/2012 9:10:59 AM | Location : United States Related Discussions:- Aggression as a learned response, Assignment Help, Ask Question on Aggression as a learned response, Get Answer, Expert's Help, Aggression as a learned response Discussions Write discussion on Aggression as a learned response Your posts are moderated Related Questions Define Hypovolemia or Reduction in Blood Volume Hypovolemia leads to a decrease in cardiac output, which causes a fall in the systemic blood pressure. Hypovolemia may be produc TO SHOW WHERE AIR MAY BE FOUND 1) Plunge a narrow-necked bottle, mouth down into ajar of water. Slowly tip the mouth of the bottle in the direction of  the surface of the water Pulse products: The important processed pulse products are puffed chickpea and pea,  besan, papads, pulse-based weaning foods, quick cooking dhals, and canned dry peas   Oils Describe the factors which decide the broad area of scientific activity? How do time and temperature work in soil formation?   The time taken for the soil formation may be more  in some cases  or less in others. Hard rocks  require more time as comp How water acts towards fat Half-fill a tall glass jar with warm water. Add some olive oil or other oil to a depth of about 1 cm. Shake this mixture hard. View how the fat is br The active ingredient in Antabuse, a drug used for the treatment of chronic alcoholism, is tetraethylthiuram disulfide, C10H20N2S4 (fw = 296.54). The sulfur in a 0.4329 g. sample o Explain the Erythropoiesis Erythropoiesis, derived from the word 'erythros' meaning red and 'polesis' meaning making, is a part of a broader process, hemopoiesis, i.e., formati What is movement of the Heart
Maintenance in Romantic Relationship Only available on StudyMode • Download(s) : 158 • Published : December 27, 2012 Open Document Text Preview Describe and evaluate two theories of maintenance of relationships. Thibaut and Kelly proposed the social exchange theory. This claims that social behaviour is due to the result of an exchange process. This is where an individual attempts to maximise their own rewards and minimise their costs. The exchange process alters when an individual receives rewards from others; they feel the urge to return this favour. Rewards are those exchanges that are categorised as being pleasurable and gratifying such as sex, company, and security. In contrast cost are those exchanges that result in a loss or punishment such as physical abuse or opportunity cost. This concludes that reward minus the cost equals the outcome. If rewards outstrip cost, it is seen to be a positive sign in the maintenance of the relationship. However if cost outstrips rewards can be seen to have a damaging effect on the maintenance of a relationship. Thibaut and kellly put forward that we develop a comparison line (CL), a standard against which all our relationships are judged. This provides an answer whether one person offers something better or worse in accordance to our expectations. If our current relationships exceeds our comparison level therefore means it’s worthwhile staying in the relationship. On the otherhand if our current relationships fails to exceed our comparison levels therefore means were dissatisfied with the relationship and may look for alternative partners. Moreover thibaut and Kelly et al also proposed a four stage model providing ways how to maintain a relationships. It is believed that over time, partners are involved in an exchange process to help maintain their relationship. The four stage model includes sampling, bargaining, commitment and institutionalisation. The social exchange theory is supported by rusbult. He found that cost and rewards of a relationship were compared to the cost and rewards of an alternative relationship in order to decide if the current relationship... tracking img
Whooper Swan (Cygnus Cygnus) Appearance: - The Whooper Swan has a completely white plumage, the beak is yellow with a black tip, and the legs and feet are dark-grey to black. The male (Cob) is similar to the female (Pen) but is usually slightly larger. The Whooper Swan is similar to the Bewick's Swan but has more yellow on its beak and is a slightly larger bird. Size: - Typical Adult is 149-160cm (55-63in). Food: - Aquatic plants, sedges, pond-weed which they can reach with their long necks, and they will also graze on grass when out of water. They will also eat animal matter such as insect larvae, tadpoles, small fish, small frogs, worms, and molluscs. Habitat/Range: - Wetlands, lakes, rivers, estuaries, marshes, floodplains, and pasture in Iceland, northern Scandinavia, Russia, and Siberia. Winters further south in western Europe including the UK, Mediterranean Sea, Black sea, Caspian Sea, China, Korea, and Japan. Whooper Swan Map Breeding Habitat/Resident,    Migration or Winter Area. Breeding Season: - Late May in Iceland, or mid-June further north. Eggs: - 5 to 6 (creamy-white colour). Notes: - The Whooper Swan is the Eurasian counterpart of the North American Trumpeter Swan. They are quite noisy birds with a deep honking call and despite their size are strong fliers. Conservation status (IUCN 3.1):   Least Concern.   Classification: - Family: Anatidae, Subfamily: Anserinae, Genus: Cygnus. Compare with other Swan species. Whooper Swan Call: You can search this website by using the custom search box below: Whooper Swan Whooper Swan (Cygnus Cygnus) - Picture: ukwildlife and Animal Photos!
Wisdom Library Logo Varṣā, aka: Varsha, Varṣa; 5 Definition(s) 5 Definition(s) from various sources: Varṣa (वर्ष) is the name of one of the two sons of Saṅkarasvāmin, a Brāhman from in the city of Pāṭaliputra. Their story was narrated to Vyāḍi and Indradatta in the tale called ‘the two Brāhman brothers’, according to Kathāsaritsāgara. The Kathāsaritsāgara (‘ocean of streams of story’) is a famous Sanskrit epic story revolving around prince Naravāhanadatta’s quest to become the emperor of the Vidhyādharas. The work is said to have been an adaptation of Guṇāḍhya’s Bṛhatkathā consisting of 100,000 verses, which in turn is part of a larger work containing 700,000 verses. Added: 20.Mar.2017 | Wisdom Library: Kathāsaritsāgara Rating: - 1a) Varṣa (वर्ष).—A god of Sutāra group.* • * Brahmāṇḍa-purāṇa IV. 1. 89. 1b) The mind-born son of Brahmā in the 16th kalpa.* • * Vāyu-purāṇa 21. 35. 1c) One of the ten branches of Supāra devas.* • * Vāyu-purāṇa 100. 94. 2) Varṣā (वर्षा).—Of the Dhruva Maṇḍala.* • * Vāyu-purāṇa 51. 11. Rating: - Varṣa (वर्ष) denotes primarily ‘rain’, then ‘rainy season’ and ‘year’. Rating: - 1) Varṣā (मध्य, “rainy season”):—One of the six season of the year, comprising the months Śrāvaṇa and Bhādrapada.—This season takes place dusing visarga, when the moon is dominant, and releases nutrient essence to the living being. In these months, Vāyu-doṣa is aggrevated while Pitta-doṣa is accumulated. A skilled physician should moniter these conditions during the treatment of a patient. The Sanskrit word Varṣā is used throughout Āyurvedic (India medicine) literature such as the Caraka-saṃhitā and the Suśruta-saṃhitā. 2) Varṣā (वर्षा) is another name for Bhāraṅgī, which is a Sanskrit word referring to Clerodendrum serratum (beetle killer). It is classified as a medicinal plant in the system of Āyurveda (science of Indian medicine) and is used throughout literature such as the Suśrutasaṃhita and the Carakasaṃhitā. The synonym was identified in the Rājanighaṇṭu (verses 5.149-150), which is a  13th-century medicinal thesaurus. Rating: - Varsha is the Hindu season corresponding to “monsoon” / “rainy season”. The rains or the rainy season is marked by two months called Nabhas and Nabhasya (Shravana and Bhadra). Plants and vegetables (Oshadhis) that grow or sprout during Varsha (the rainy season), are matured in course of time and ripen in their virtues and potency in the season of Hemanta. Subsequently wind thus accumulated in the summer, is agitated by the rains and cold winds in the forepart of Varsha (Pravrit) when the ground is flooded with water and thus gives rise to diseases which are incidental to a deranged state of the bodily wind. Likewise the features, which specifically mark the different seasons of the year are observed to characterise the different parts of a complete day and night, [or in other words] the evening is marked by those of Varsha (the rainy season). During Varsha (the rainy season), the rivers overflow their banks, tumbling down the trees which grow on them. Ponds and lakes are decked with the full-blown Kumud and Nilotpala flowers. The earth is covered with profuse vegetation. All distinction between dry lands and reservoirs of water becomes impossible, and the sun and the planets are enveloped in dark clouds that shower torrents of rain but do not roar. Rating: - Look for other relevant definitions: Search found 65 related definition(s) that might help you understand this better. Below you will find the 15 most relevant articles: Bhāratavarṣa (भारतवर्ष).—After king Bharata, son of Ṛṣabha; Viṣṇu in the form of Kūrma... Ilāvṛtavarṣa (इलावृतवर्ष).—The original name of this earth planet, before it became kn... Jaladavarṣa (जलद-वर्ष):—Name of a varṣa (division of land) assigned to Jalada (one of ... In Kimpuruṣa-varṣa the great devotee Hanumān is always engaged with the inhabitants of that ... According to Vedic geography the northernmost portion of Jambūdvīpa is called Uttarakuru-var... In the land known as Hari-varṣa, the exalted devotee Prahlāda Mahārāja worships Lord Nṛsiḿ... In Hiraṇmaya-varṣa, the Supreme Lord, Viṣṇu, lives in the form of a tortoise [kūrma-śarīra].... Sukumāravarṣa (सुकुमार-वर्ष):—Name of a varṣa (division of land) assigned to Sukumāra ... In the tract of land known as Ketumāla-varṣa, the Supreme Personality of Godhead (Lord Hṛṣīk... In the tract of land known as Ramyaka-varṣa, Manu and all the inhabitants worship Matsyadeva... Kumāravarṣa (कुमार-वर्ष):—Name of a varṣa (division of land) assigned to Kumāra (one o... The residents of Bhadravarsha, the eastern continent, were said to be always happy; they wer... Hiraṇmayavarṣa (हिरण्मयवर्ष).—(Śvetavarṣa); next to Ramya;1 of Jambūdvīpa.21) Vāyu-purāṇ... 1a) Ānanda (आनन्द).——(c)—a kingdom adjoining the Dundubhi hill in Plakṣadvīpa... 1) Kāla (काल) is a Sanskrit word referring to “time”. Acording to the Nāṭyaśāstr... Search through literary sources: Search found 87 books containing Varṣā, Varsha or Varṣa. You can also click to the full overview containing English textual excerpts. Below are direct links for the 20 most relevant articles: - Was this explanation helpufll? Leave a comment: