text stringlengths 144 682k |
|---|
Updated date:
Writing Effective Sentences in Your English Essay
Effective Writing
1. Has interesting ideas.
2.Uses transition words to link ideas.
3. Convinces the reader with logic.
4. Uses interesting language.
5. Is carefully edited and proof-read.
6. Uses punctuation correctly.
How to Write Better Essays
Students often ask me how they can become better writers. In one word: practice. Writing effectively is an art and a discipline. When you play a sport, you become better the more you practice. The same is true about writing.
However, just as a coach can give you hints to make your practice more effective, a writing instructor can fill you in on the hints about how to write more effectively. There are some rules you can learn about how to make your sentences emphasize the ideas you think are most important. Here are a few of the best hints. If you memorize them and use these ideas as you revise the sentences in your essay, your writing will be more effective.
Can a Computer Program Help Writing?
Spell checkers and grammar checkers can help you write correct sentences, but not necessarily effective ones.
1. Make Your Subjects and Verbs Interesting
Use Subjects and Verbs to state the key actors and actions
• Don't Say: The intention of the company was to expand its workforce.
• Instead say: The company intended to expand its workforce.
Use strong Verbs (avoid passive voice)
Try to get away from is, am, was were, made, been
• Don't Say: The company is now the leader …Its officers make speeches…
• Instead say: The company now leads in compliance…Its officers speak
• Don't say: The 1990 law is seen as fair….costs have been exaggerated
• Instead say: Businesses see the 1990 law as fair, opponents have exaggerated
2. Vary Sentence Types
Effective writers use a variety of types of sentences to keep the reader interested in what they are reading. Here are some of the different ways to write English sentences:
1. Use Transition Words to connect ideas in sentences. Pay attention to how you begin and end your sentences. Use sentence beginnings and endings to cue readers about your most important point
Readers expect what they already know to be at the beginning of a sentence and new information at the end. One way to put this is that the beginning of the sentence or paragraph should transition/show relationship of a new idea to what you've said previously.
Everyone knows that teachers earn low wages. In spite of meager salaries, most teachers report great satisfaction with their jobs; however, most teachers quit after five years. Is this high turnover rate caused by the fact that the profession is dominated by women? No one knows for sure but statistics indicate---
2. Use Cumulative sentences: start with the main idea and then add modifiers to amplify or illustrate it.
• Mary Morrison became a teacher because she wanted to open minds, instill values and create new opportunities for students who lived in poor, inner-city housing projects.
3. Use Periodic sentences: start with the modifiers and put the main idea at the end.
• Blowing roofs off buildings, knocking down many trees, and severing power lines, the storm caused extensive damage.
Use a variation of the periodic sentence which has: subject, modifiers, verb.
• Raul Martinez, who works in jeans and loafers and likes to let a question cure in the air before answering it, never fit in with the corporate environment.
4. Use Balanced Sentences: two main clauses which are parallel in their structure are put together. This often works is the two clauses have a contrasting meaning.
• The fickleness of the women I love is equaled only by the infernal constancy of the women who love me. (Shaw)
• If thought corrupts language, language can also corrupt thought. (George Orwell)
5. Use different lengths of sentences. Most English sentences are 1-2 times of printed type. Make your sentences more interesting by having some sentences which are very short, and a few that are longer.
6. Use Occasional Questions? Exclamations! or Commands. Don't overdo this one, but it can be very effective to occasionally use one of these sorts of sentences to speak more directly to your reader.
Avoid editing on a phone
Although many of us are getting used to writing on iPhones, smartphones and tablets, using a bigger screen allows you to see your sentences more easily
3. Use Lists in Sentences Effectively
When you start to write longer sentences, you often run into the problem of how to write a long list of items. To make your sentences effective, you need to make sure you keep the items in the list in the same form. That is called "parallelism," like when two lines run next to each other without crossing. Here is what you need to remember:
1. A series of phrases linked by commas and “and,” “or” or “but” need to be written using the same format (examples: all start with an "ing" word; all start with “to—”; all start with a past tense verb).
• (ing)The horse was running across the meadow, jumping over the bridge and racing to the finish line.
• (to)To run across the meadow, jump over the bridge and race to the finish line was the horse’s task.
• (past tense verb)The horse ran across the meadow, jumped over the bridge and raced to the finish line.
2. The information is listed in either chronological order, like in the horse example, or in topical order, from least to most important.
• Don't Say: The storm severed power lines, killed two people and blew the roof off ten houses.
• Instead say: The storm blew the roof off ten houses, severed power lines and killed two people.
Easy English Sentence Structure
Conjunction Quiz
4. Use the Right Conjunction
main clause, conjunction main clause.
Effective sentences are careful to use the right conjunction to show whether you mean to add an idea (and), contrast an idea (but, or, yet), or show cause or comparison (so, for, as). Here is a list of the most common conjunctions and their meanings:
• AND—adds one to the other (both—and, not only---but also)
• BUT, YET—substitutes one idea for the other; contrasts ideas (not---but)
• OR---shows two alternatives (either—or,)
• SO, FOR----makes one cause the other
• AS---comparing/simile
1. Jeremy writes books for St. Martins, so he doesn't have time to help you on your novel.
2. What happened to Emily was a mystery, and no one ever saw her in Stockton again.
3. Will Jeremy take English again to improve his grade, or will he be happy with a "C" ?
Transition Words
Add: also, furthermore,
Emphasis: indeed, in fact, undoubtedly
Compare and contrast: however, instead, nevertheless, otherwise, similarly
Cause and effect: accordingly, as a result, consequently
Time: next, meanwhile, thereafter
5. Use Semicolons and Transition Words
A semi-colon combines to separate sentences into one. Using a semicolon emphasizes the importance of that sentence, so use a semi-colon sentence sparingly because it makes a sentence seem more important. I often suggest my students use a semi-colon sentence in their thesis.
Many students don't know how to use a semi-colon correctly, but it is actually very easy. Here are the two main ways to use it:
1. main clause; main clause (don’t overdo this one): In this sort of sentence, you just take out the period and put in a semicolon:
• Helping people is my job; I don’t ask for gratitude.
2. Semicolon using a transition word. The advantage of using this form of the semi-colon sentence is that the transition word explains the relationship between the two parts of the sentence:
Main clause; transition (conjunctive adverb), main clause
• Whenever Jason looked in the mirror he had his doubts; however, he still pretended he believed Melissa’s comment that he was the best-looking man she’d ever met.
Peer Edit for Effective Writing
After you have finished your essay, have someone else read it. Have them mark sentences which are not as clear or effective.
6. Emphasize Important Ideas
Along with showing how ideas relate, you also need to show which ideas are the most important. That is where "subordination" comes in. Subordination shows:
1. One idea is less important than another (hey, not everyone can be top dog). Not that the information isn't needed but that it isn't the main idea. Subordination helps you keep the main ideas clear. It also helps you to show how other ideas relate to the main point (Were they the cause? The result? Do they tell the time? The place? The purpose? Do they describe or identify?).
2. No rules tell you which idea should be the main clause and which the subordinate one: the decision depends on upon your meaning. Usually details of time, cause, condition, purpose, and identification are subordinate to action.
Kinds of subordinate parts of sentences:
Subordinate clauses may be a main clause which starts with a word which turns it into an incomplete phrase. They might also start with a relative pronoun (which, that, what, whatever, who, whoever) Subordinate clauses are longer and more important than the other types.
• Although the horse looked gentle, it proved hard to manage.
• Whenever forecasters predict a mild winter, farmers hope for an early spring.
• Even though she wrote voraciously, she never published.
• Because she spoke haltingly, she could never face speaking in front of a crowd.
Subordinate phrases include appositives which rename a noun (her son, Frank,) prepositional phrases such as “in” or “on.” or verbal phrases (either ing or “to” form of a verb (walking into the room, to walk into the room,).
• Having been jobless for six months, Jones could not pay his bills.
• To pay the rent, he borrowed from his father.
• Jumping over the fence, the horse fell into the water.
• To jump over a fence, the horse must be strong.
• Groomed, stabled and rested, the horse felt better.
• In the morning, we like to fish by the lake.
• Sitting by the lake, we fish every morning.
Avoid these common problems with Subordination:
1. The less important idea is made into the main clause:
• Don't Write: Mrs. Angelo was in her first year of teaching, although she was a better instructor than others with more experience.
• Instead, Say: Although Mrs. Angelo was in her first year of teaching, she was a better instructor than others with more experience.
2. Ideas are not logically linked; wrong subordinating word is used.
• Don't say: Because the horse looked gentle, it was hard to manage.
• Instead, say: Although the horse looked gentle, it was hard to manage.
• Don't Say: As the experiment was occurring, the laboratory was sealed.
• Instead, Say: When the experiment (time) or Because the experiment (cause)
Questions & Answers
Question: Can you offer some examples of excellent phrases that I can use in an essay?
Answer: If you want some examples of good writing, you can look at any of the sample essays that I provide, or the examples of sentences in my article. However, I do not provide sentences that you can use in your essay because then you would not learn how to write correctly in English.
Question: Can I use "ing" verbs in my essays?
Answer: Absolutely! In fact "ing" verb forms (called gerunds) are a great way to start a sentence and an alternative way of making your sentences more interesting. Here are some examples:
Running to the office, I swept inside, only to discover the meeting I thought I was missing had been canceled two days ago.
Crunching numbers, she discovered that their payments could be handled by their current budget.
Discovering quickly that they are less prepared to study than they expected, many college students don't do as well their first semester as they had expected.
Question: What is an effective sentence?
Answer: An effective sentence is one that conveys the point you want to make clearly and persuasively to your reader. A sentence is clear if it does not have grammar and spelling errors. Additionally, clarity means the sentence uses the most precise words possible and doesn't have unnecessary wordiness. Paragraphs and whole essays are clear if they have topic sentences which tell the main idea and if the examples and reasons are explained logically.
Many of the examples in this article are not only about making your sentences clear; they are about making your sentences more persuasive. Writing effective persuasive sentences is a more subtle writing skill that involves tone, language choice, and sentence structure. In general, you are more persuasive when your sentences are professional, logical and varied.
Question: What is the third person in grammar?
Answer: The first person is when you are talking about yourself (I, me, mine). The second person is when you are speaking to someone (you, your). The third person is when you are talking about someone that isn't you or the person you are talking to (he, she, his, her, they, them).
Question: Will you please tell a starting sentence?
Answer: There is not just one good starting sentence for your essay. However, there are some easy, good ideas for a starting sentence. I usually suggest that students start with one of the following:
1. An example of the problem or situation.
2. A vivid description of the topic.
3. A historical example or current news topic.
4. A personal experience which relates to the issue.
5. A quote that summarizes your point.
Follow up this specific example with an indication of how this applies to a broader audience. Then give the topic question and thesis answer. For more help on how to do this, see my article on how to write a thesis: https://hubpages.com/humanities/Easy-Ways-to-Write...
Question: Is there any way to check one of my essays for effectiveness?
Answer: The best way to check your essays for effective sentences is to:
1. Use the spellchecker in your word processing program.
2. Use Grammarly (even the free version helps a lot)
3. Go through my suggestions in these two articles:
10 Steps for Proofreading and Revising Your Essay: https://owlcation.com/humanities/Essay-Revision-St...
How to Write a Paper Without Making Common Mistakes:
© 2013 Virginia Kearney
Frank Nzewi on September 24, 2018:
I am exploring writing skill and find your article interesting, and valuable.
Jorge Kwyntin on October 02, 2017:
Thank you so much Ms.Kearney for the valuable article. Even people from any part of the world, who are not majored in English can improve their writing skills by following brilliant stuff like this.
aditi on March 29, 2017:
i think it really helps.thank u.
Virginia Kearney (author) from United States on February 09, 2015:
Aesta--Writing effective sentences is a continuing project for all writers, no matter what level of ability. They say that James Joyce would sometimes spend a whole day working on 7 words of his novel! Of course the rest of us can spend that much time trying to figure out what those 7 words mean, so perhaps that isn't the most effective way to reach an audience! However, continually trying new patterns, and learning more about how sentences are put together creatively can help any writer get better.
Mary Norton from Ontario, Canada on February 09, 2015:
Writing effective sentences is at the core of writing an excellent article. How clearly the ideas are expressed when sentences are well put together. I wish I have mastery of the use of conjunctions. Given that I like to write, I need to hone my skills in its use.
ziyena from the Somewhere Out There on December 11, 2013:
Great article! I can definitely put some of these tips to use ... though I pride myself with creative writing, it is unfortunate that I've always lacked the fundamentals of Grammar technique. I do try! Thanks for this and voting UP
Elysia LeMay on August 29, 2013:
This article was very informative! Thanks for the great tips and I will definitely keep these in mind when writing my next essay!
Kyle Christensen on August 29, 2013:
Definitely going to keep these tips in mind while writing an essay for you! I mean if I do the things you say in here, I can't possibly fail!
Christopher Anderson on August 29, 2013:
I have always wondered how I could better improve my writing, I will for sure be using all these tips on my essays this year. Thank you Mrs. Kearney for the advice.
Michael Alonso on August 28, 2013:
Hi Mrs. Kearney! This is a helpful article, I will definitely try some of these!
Janessa Holles on August 28, 2013:
All of this information is very helpful and useful! I didn't realize how thought provocative the process of forming a well written sentence is. I really enjoyed the section about semi-colons because I know I do not use them correctly. Another section that really stuck out to me was having the main idea stick out. I find myself most of the time putting the main idea at the beginning instead of making it interesting. I will definitely be coming back and reading this article when I write my next essay!
Dora Weithers from The Caribbean on August 22, 2013:
Congratulations on your HOTD award. Your article totally deserves. Good lessons for us writers, Voted Up!
Virginia Kearney (author) from United States on August 02, 2013:
Thanks for the tip. I always tell my students to proofread me the same way I proofread them! It is so easy to make small errors when typing and reading from a screen. Which brings me to one of my best tips for final editing: print you paper and read it aloud. I often catch lots of errors that way! Unfortunately that is hard to do with online editing tools but you are reminding me that I should at least read aloud!
cheeluarv from INDIA on August 01, 2013:
Very useful hub.For the beginners like me it is a eye-opener.
Ana Maria Orantes from Miami Florida on July 31, 2013:
I like your article. Ms. Virginia; you did a good job. Congratulation for your hub of the day.
wildove5 from Cumberland, R.I. on July 31, 2013:
Oh how I wish I had paid more attention in school as a young lad; I'm sure I have broken many of the grammar rules mentioned above. "Oh my, did I use the semi colon properly?" I did however notice the use of the word 'to' was used incorrectly in the body of your work. Sorry, it's a little pet peeve of mine. I'm sure it was just a typo, but thought I'd have a little fun with you! I will definitely cross reference this hub before publishing my next hub. I learned quite a bit. Now I'm off to practice! Congrats on Hub of the day! Voted up!
Sooner28 on July 31, 2013:
Great advice!
Deya Writes on July 31, 2013:
This hub is a pretty good summary of several really important things I learned all throughout high school and even my advanced writing courses in college! Definitely voted this up.
Rebecca Mealey from Northeastern Georgia, USA on July 31, 2013:
Really helpful grammar tips. We often take grammar rules for granted. I know I do, and this was a kind, friendly reminder to help us polish our craft. Thanks!
Paul Richard Kuehn from Udorn City, Thailand on July 31, 2013:
This is an awesome hub and it certainly deserves "Hub of the Day" honors. This hub is so useful that I am bookmarking it for future reference. I know it will be a handy reference for me when teaching writing. It will also help me become a better writer. I found the information about use of the semicolon especially interesting. Voted up and sharing with followers and on Facebook. Also Pinning and Tweeting.
Donna Hilbrandt from Upstate New York on July 31, 2013:
You definitely deserve the HOTD award for this great article. Voted up and pinned. This is full of the kind of information that I like to refer my students to. Thanks!!!
JP Carlos from Quezon CIty, Phlippines on July 31, 2013:
What an outstanding hub. I'm looking forward to incorporate these info in my hubs. Well done.
Patricia Scott from North Central Florida on July 31, 2013:
Congrats on HOTD. Very useful information. It was so familiar both for me when I took my journalism classes as a student years ago and as a teacher until a few years ago. Great info.
Angels are on the way ps
Virginia Kearney (author) from United States on July 31, 2013:
Doodlehead--you are too funny!
Great observation janderson99. You've noticed I am using another effective sentence strategy I don't talk about. Sometimes in English we use short sentences for effect or drama. Those sentences will often resemble speech and may not contain all of the "proper elements." You will see writers in magazines and novels use these sorts of sentences all the time. However, I would caution you about using non-standard sentences in English Essays. Sometimes your instructor wants to make sure you understand the rules and won't allow it.
Jo Alexis-Hagues from Lincolnshire, U.K on July 31, 2013:
This is one to keep and a well deserved HOTD.
Doodlehead from Northern California on July 31, 2013:
Like CarlySullens I need this hub. I will try to bond with this hub. This will be my Hub Cap.
Michelle Widmann on July 31, 2013:
Thank you! I found this hub to be very helpful and full of useful tips. I didn't catch on to how to write a very effective essay until the final year of my English degree. I wish I'd read this a few years ago.
Lucy Jones from Scandinavia on July 31, 2013:
Brilliant hub. Congrats on the HOTD - very well deserved. Thanks for sharing.
Thanks everyone! I am traveling outside the U.S. now and was completely surprised to find I'd gotten the Hub of the Day. I started writing these articles originally for my own students, but have found they are useful to others and that makes me very happy.
Zeusspeak--thanks for the help on spelling corrections! I definitely think you are quite right about language use as being related to country. My writing classes are taught in the United States for students who are primarily from the U.S. Those students from other countries usually are hoping to be taught standard U.S. style writing and diction. One of the reasons English has taken over as an international language is because it is so very adaptably. However, learning a standard "high class" American or British English diction is helpful to anyone who is trying to be taken seriously in business or education.
John Sarkis from Winter Haven, FL on July 31, 2013:
Virginia, what an incredible article! I found it useful and will share. Of all the articles that have won HOTD, yours has to be one of my all time favs!
Voted up and away
Victoria Lynn from Arkansas, USA on July 31, 2013:
Awesome info! I'm an English Composition teacher. This would be a great, comprehensive review for all my students! Congrats on HOTD!
RTalloni on July 31, 2013:
Very good stuff. :)
Thanks for sharing helpful information by putting this guide together so well. Congrats on your Hub of the Day award--well deserved!
Pinning to my Writing:… board and going to check out your profile page for more of your latest work.
Carly Sullens from St. Louis, Missouri on July 31, 2013:
Congratulations on HOTD! I love this hub. I need this hub. I am bookmarking this hub. :)
I especially like the examples. It is one thing to explain it, it is another to show it. People learn differently, and the best way to teach is to demonstrate through different methods. You did that here.
Voted up and shared.
Comfort Babatola from Bonaire, GA, USA on July 31, 2013:
You were very detailed in your writing of this hub, giving not only examples, but instances. Very useful indeed. Voted up, and congrats on the HOTD award.
Celina Martin from London on July 31, 2013:
Virginia, the hub was good, but even you committed mistake. Instead of conjunction, you have used conjuntion at two places that too in the headings. Leaving aside these glitches, the hub was quite informative and loved reading it.
Virginia, but the language use is a relative concept. It may change with region or country. Therefore, we cannot have a global constant as such. What do you think about this?
Dr. John Anderson from Australia on Planet Water on July 31, 2013:
Well Done. Excellent.
Virginia Kearney (author) from United States on July 21, 2013:
Thanks Ron! You know I have put this information together and yet in my own writing I need to continually remind myself to think about what my reader wants to know rather than what I want to tell them!
Ronald E Franklin from Mechanicsburg, PA on July 20, 2013:
What a great amount of useful information! My first takeaway was, "Readers expect what they already know to be at the beginning of a sentence and new information at the end." I'll be thinking for a while about what that means for my writing. Thanks!
Related Articles |
Genes and Anatomy of Spinal Muscular Atrophy
Spinal muscular atrophy (SMA) is a genetic disorder that causes progressive (gets worse over time) muscle weakness. It is caused by a defect in the SMN1 gene, which is needed by motor neurons to survive. Without motor neurons, certain muscles do not get information from the brain and begin to waste away. In its most severe form, SMA progresses quickly in infants and leads to respiratory failure.1,2
SMA varies in severity, mostly because people have different levels of a “back-up” gene called SMN2. This gene is not as effective as SMN1, but people with SMA rely on it because their SMN1 gene does not work. More copies of SMN2 are linked to a milder form of the disease.1,2
What gene is altered in spinal muscular atrophy?
Doctors first described SMA in 1891 and defined the various types throughout the 1900s. However, the genetic cause of the disease was not identified until 1995. Researchers then discovered that 95 percent of people with any type of SMA have an altered SMN1 gene. A gene is a piece of DNA passed from parent to child that our cells use to produce a protein.1,2
The SMN1 gene contains the instructions for our cells to produce a protein called “survival of motor neurons” (SMN) protein. In most people with SMA, the SMN1 gene is altered in such a way that a whole piece of it gets deleted.3,4
Figure 1. SMA is caused by a missing or non-working SMN1 gene
SMA is due to missing or non-working SMN1. The severity of SMA depends on the amount of SMN2 genes.
How does the altered SMN1 gene affect motor neurons?
In people with SMA, the altered SMN1 gene cannot be used to produce any SMN protein. The SMN protein is present in all of our cells but is especially important in motor neurons. These are cells in our spinal cord that control muscle movements.1,5
The SMN protein is part of a larger group of proteins called the “SMN complex.” This complex has an important function in the nucleus. This is the part of our cells that contains our genome (complete set of DNA). In the nucleus, the SMN complex helps process our genetic material in order to make proteins.1,4,6
Without enough SMN protein, motor neurons cannot develop properly or survive. This causes motor neurons to begin to shrink and die.3
How does the SMN2 gene make up for the loss of SMN1?
SMA types vary widely in symptoms and prognosis. Types range from the most severe type where infants can never sit to the milder adult types where people will develop trouble walking later in life. These are examples of different “phenotypes.”3,4
Phenotypes are observable traits caused by our genotype and environment. For example, height and hair color are phenotypes. The “genotype” refers to the entire genetic makeup of a person, which is associated with a certain phenotype.3,4
In SMA, a wide range in phenotypes is caused by a single defect in the SMN1 gene. This is partially explained by the presence of a nearly identical version of the gene, called the SMN2 gene.1
The SMN2 gene also contains instructions to make the SMN protein. However, it has 1 key difference from SMN1 that causes about 85 percent of the resulting SMN protein to be non-functional. This means SMN2 makes much less SMN protein than SMN1.1
Without a working SMN1 gene, people with SMA rely on their SMN2 gene to make enough SMN protein. We now know that SMA severity partially depends on how many copies of the SMN2 gene someone has. Typically, people have 2 copies of the SMN2 gene. Having 3 or more copies is associated with a milder disease. However, other genetic factors unique to each person also impact the severity of SMA.1,3,7,8
What problems does the loss of motor neurons cause?
As motor neurons begin to die, the brain can no longer control important muscles. Muscles in the arms, legs, head, and neck depend on motor neurons. These muscles cannot contract without communication from the brain, so they become inactive. As more motor neurons die and muscles become more inactive, they get progressively weaker and waste away.1,3
This affects important movements, walking, food modifications, swallowing, and breathing. In the most severe types of SMA, muscle wasting progresses quickly, and children are completely unable to sit or stand. Eventually, lung muscle weakness leads to respiratory failure. However, mental and emotional function is not affected. People with all types of SMA have normal intelligence and social functioning. In milder types, slowly progressing muscle weakness may impact the ability to walk or stand over time.4,9
More on this topic
Written by: Matt Zajac | Last reviewed: August 2021 |
Cracks in the foundation
Cracks in the brickwork
Brick cracks tend to occur at uneven seams between bricks and expanded joints within the bricklaying pattern. Expanded joints are where mortar has been laid down, but was not fully compacted by tamping or vibrating.
Uneven seams can often be reassembled to their original position and squeezed tightly together using a brick clamping tool, but all cracked bricks should be removed and replaced before the body of mortar is reset and tamped again so as to produce a good bond between bricks and mortar.
Fading mortar joints
If you have a built-up walkway or patio, the body of mortar can wear down so that it’s nearly flush with the surface of the brick. This is called spalling and usually occurs over time due to weathering and freeze/thaw cycling from winter months. Spalling makes the brick vulnerable to eventual failure as water penetrates into its voids. Spalling also makes the area unsightly and potentially dangerous for pedestrians if it occurs over an entire walkway.
Curling or bowing bricks on a wall surface
The opposite problem to spalling is bulging, which sometimes happens with brick walls due to expansion pressure from moisture. This can be caused by direct contact of bricks adjacent to a window or door with rainwater. Backflow from gutters can also raise the level of an impermeable surface, which pushes bricks upwards in the form of small blister-like protrusions. Bricks are usually considered to be non-structural building elements and bulging is not a serious structural condition. Yet curling may cause problems with mortar if it pulls away from the wall, and can cause some serious damage in a garage or storage building where roof rafters may sit directly on the brick surface.
Sagging brick walls
When bricks are laid in a traditional English bond pattern, there is a course of stretchers (bricks laid horizontally) between every coursing of bonded brick (bricks laid vertically). The vertical brick courses are “tied in” to the horizontal courses by use of a wedge-shaped piece called a “brick noggin”. A sagging wall will often begin with bowing out or bulging at this knot. As time passes, mortar may wear away and the bond between bricks and mortar becomes weaker. If the wall is bowed out further, it may cause problems with creating a watertight base under the floor of a raised front porch or similar areas prone to rainwater runoff.
Curing sagging brick walls can be tricky because it’s not practical to hold them in place by driving wood framing beneath them for support until repairs are done. If the house is a low-rise, however, there may be enough room for steel angle brackets to be driven into the ground and attached to the foundation wall with jumper anchors. A contractor can fashion a metal bracket or strap with bolt holes that will span between these anchors and hold the brickwork in place while repairs are carried out. Otherwise, a masonry contractor could simply remove the brick noggin and possibly one or two courses of bricks from the wall surface by excavating them from within the cavity between support brackets.
Spalling Concrete
Spalling concrete due to water damage, frost heave, or poor installation of adhesive under slabs and walkways
As mentioned above, spalling is a condition in which loose or flaky bits of concrete are caused by freeze/thaw cycles, frost heave, or water damage to the surface of the concrete. It can even be due to poor installation of adhesive underneath an asphalt driveway or patio where it becomes exposed to water and de-bonds over time. This damage causes the top layers of concrete to fall away.
Unless spalling is extensive on a large area, it’s not usually a structural concern. But visually, spalling looks unsightly, especially when there are exposed aggregate or metal reinforcing bars in the concrete that show through the surface.
Asphalt driveways and walkways can be easily patched by resurfacing with new asphalt. Slabs on grade require more extensive repair depending on the location of the damage. If the concrete is not cracked or spalling, it may be possible to resurface with a fresh layer of concrete. On other occasions, it might be necessary to remove and replace sections of concrete that are structurally unsound.
Concrete spalling problems should be addressed as soon as they appear so the damage doesn’t worsen over time. Even small cracks in the foundation of a building can allow moisture to seep in through permeable soils, creating an environment that will encourage freeze/thaw cycles. As for sagging brick walls, regular maintenance is essential so problems with deteriorating mortar do not become structural in nature. |
How to Stop Pigeons Eating Your Bird Food
29 Apr 2021 | Apex Environmental Services (UK) Ltd
The summer months are fast approaching, a time where every homeowner looks forward to enjoying the warm afternoons and light evenings in their gardens.
Many of us have bird feeders and birdbaths to encourage the local wildlife to utilize our spaces. However, it can be hugely disappointing when pigeons descend on your garden, often taking over the place and scaring other birds away.
Why Are Pigeons A Problem?
• Pigeons are bullies - they intimidate the smaller birds and steal the food, preventing other birds from returning. Whilst many smaller breeds of birds will use your garden simultaneously, pigeons threaten the others and prevent them from accessing your garden, its water source, and its food.
• Pigeons are extremely loud. Whilst we welcome the morning bird song that springtime brings, most of us would like to avoid pigeons' loud coos.
• They move in flocks. You will very rarely witness a pigeon independently. So, whilst allowing one pigeon into your garden might not seem like a huge deal, when all of their friends arrive, your garden can quickly become crowded. The food will disappear in a matter of seconds.
• Pigeons produce vast amounts of droppings. Partly because they eat so much, but also because they move in such large groups. If you welcome pigeons into your garden, you will find your laundry and garden furniture constantly covered in bird droppings.
Choose the Right Food
Interestingly, pigeons love junk food.
Many cheaper ingredients are used to pack out bird feed. These less expensive and less nutritious ingredients are the ones that pigeons are attracted to. This generally comes as no surprise, as pigeons can be seen on any high street, feeding on the scraps that have been discarded.
Therefore, packing your bird feeder with high-quality ingredients can be an effective control mechanism.
For example, using fat balls and other suet products is a great way to attract woodpeckers into the garden. Pigeons are not attracted to these and will often fly onto new beginnings rather than enjoy this food style. Food packed with millet seeds, however, will attract pigeons in vast numbers.
Protecting Your Food Source
Choosing a suitable bird feeder is essential to prevent pigeons from being attracted to the property.
Pigeons like to eat from the ground. When not eating from the ground, they need a horizontal surface to land on, such as a wall or table.
So, hanging bird feeders can often be an ideal solution. These usually have a small rim around the bottom, sufficiently providing smaller birds with the stability they require. In comparison, heavier birds such as pigeons are simply too big to balance on the edge and cannot access the food source.
Another handy solution is dome feeders.
As the name suggests, dome feeders are sphere-shaped, transparent balls that can be attached to walls or trees. The birds can sit inside the dome and enjoy their feed at their own pace.
The holes to access these domes are very small, meaning pigeons cannot reach this valuable food source.
If you still want to provide a ground feeding solution for the other birds, then consider using a cage surrounding the food.
Although this is not always the most aesthetic solution, it provides an easy option to allow the other ground feeders an accessible food source. You could purchase a permanent cage online or fashion one from some chicken wire. Just ensure the gaps are large enough to let the smaller birds through but small enough to deter the pigeons.
Bird Feeding Tables
Bird feeding tables will inevitably attract pigeons.
The best way to deter pigeons from landing on your feeding table is to use bird spikes. Spikes placed around the edge will remove the space that the pigeons need to land. Whereas, the smaller birds will be able to fly directly to the food source.
Spikes are also an excellent option for guttering and walls.
Protect Your Bird Bath
Our bird tables quickly become the centrepiece of our gardens, especially in the summer months. It is pleasant to watch birds drink and bathe in the water, cooling themselves down during a day in the sunshine.
However, it can be extremely challenging to prevent pigeons from taking over the bath, ruining it for the other wildlife. Pigeons often foul in the water, which not only looks unsightly but can be harmful.
Similarly to the feeding stations, the best option to protect your birdbath is with a cage. This solution allows smaller birds to access the water, but prevents pigeons from doing so.
Beware of Feeding Pigeons Separately
Many choose to set up an alternative feeding station in their garden, targeted explicitly at pigeons. This feeding station will be close to the ground and provide the food that pigeons love. However, this can be a risky solution.
Pigeons love an easily accessible food source, so they will undoubtedly flock to this feeding station you have created.
They will begin to arrive in large groups searching for a regular feed, which can cause serious issues for your garden, family, and the other birds. The groups of pigeons may be encouraged to nest on your property, close to this reliable food and water source.
How Apex Bird Control Can Help
Pigeons and other bird infestations can cause enormous problems for homeowners.
Once pigeons begin to build nests on your property, they can inflict a considerable amount of property and personal damage.
We have a range of solutions, including Anti Bird Meshing and Anti Bird Spikes. Additionally, we offer a Guano Clearance Service, which may be necessary for homes with a pigeon issue.
Apex deal with a spectrum of issues daily. A discussion with our team will help you identify the best solution for your unique situation.
To find out more, contact Apex Bird Control now on 01256 578025 or email us at
Your browser is out-of-date!
|
ATConnect All >
Feeling Sleepy?
ATC students are generally fit and healthy and come to school focused every day and ready to tackle the challenges that lie ahead.
Sometimes this isn’t the case!
The answer could in fact relate to their sleeping habits and how much sleep some boys are obtaining each night.
In talking with some boys, I am concerned at the insufficient sleep some of our boys are achieving each night. With boys involved in many activities in their lives, some early in the morning or late afternoon, and then schoolwork to also complete at home, bedtimes and family routines will naturally vary. How many hours sleep does your son receive each night?
Before reading on click here to take the quiz to find out how much do you know about sleep.
The National Sleep Foundation issued a set of guidelines which outlines the following recommendations:
Research has shown that a lack of sleep can affect academic performance in young children and adolescents. Dr Buckhart, an American Psychologist has studied factors that increase risk for academic failure and poor social skills in school-age children. His most recent work has examined how sleep relates to children’s development, academic performance and health.
Dr. Buckhalt: Children generally need more sleep than adults, and they are more adversely affected in some ways by insufficient sleep. We have discovered that sleep is instrumental not only in making us alert and receptive to learning, but also that it helps consolidate and preserve memory of information learned during the day. During sleep, areas of the brain that acquire and control information (e.g., the prefrontal cortex) continue to communicate with areas that help retain and organize information (e.g., the hippocampus). Every day, children are learning relatively more new information and building more cognitive skills than adults, so sleep loss has a more negative impact for children. Every 90 minutes or so, we cycle through four stages of sleep based on characteristic physiological measures. Recent research points to the importance of one of those stages, slow wave sleep, for learning and memory. Children have relatively more slow wave sleep than adults, and this is thought to relate to more need for children’s brains to process information during sleep.
Apart from the fact that these students will be up to 25 per cent less alert when they arrive at school, another problem with not achieving optimal sleep is that students are missing out on REM sleep, a particularly deep sleep vital for memory and learning. A lack of REM sleep is associated with anxiety, depression, poor immunity, accidents, poor judgment and memory.
So what can you do to help your son achieve the optimal range of sleep?
• Keep to regular sleep times and routines across all 7 days.
• Bedtime routines for all school going ages should be supervised.
• The use of devices, computers, electronic games, and televisions in the bedroom should be avoided an hour or so before bedtime.
• The charging of devices should happen outside of the bedroom space to avoid distractions, blue light and the breaking of sleep patterns due to late night notifications and messages.
• Encourage quiet activities conducive to lowering the level of arousal.
• Late night eating should also be avoided. Caffeinated drinks for our older students, should be limited during the day, but especially late in the afternoon and evening (e.g., 3-5 hours prior to bedtime).
• Ensure devices are not accessible in the bedrooms at night and 30 mins prior to sleep.
Teenagers are the most sleep-deprived segment of the population. This is a very under-recognised problem and the cost to society in the healthy development of young people is profound.’ Dr Michael Carr-Gregg
Please help to ensure that your son makes the most of their school day by ensuring they have sufficient sleep time. As Thomas Dekker, English dramatist once said, ‘Sleep is that golden chain that ties health and our bodies together.’
Find out more about the importance of sleep at schootv by clicking here.
Mr Michael Stewart
Head of Junior School |
The Real History of Fish and Chips
The Real History of Fish and Chips
Most people think that Fish and Chips originated in England, this is not actually true. The real history of Fish and Chips is traced back to 15th Century Portugal where the dish really was invented. Like so many other famous dishes, fish and chips was created out of necessity, not culinary genius.
Read on to hear the whole history of fish and chips and how it became an English staple!
Just a little pun. But did you know that the first Friday in June every year is National Fish & Chips Day? This year (2021) it will be celebrated on June 4. Here at Skull Creek Dockside we serve a classic rendition of the dish and thought it would be fun to investigate the origins of what we believed was a classic British dish. Well, we were a little surprised with what we found out and we think you will be too.
The pairing of fish and chips has long been considered a British staple. The irresistible combination of a hunk of battered cod resting atop a mound of steaming hot chips (french fries in America) is the quintessential British comfort food. Whether eaten on a plastic tray on your lap in front of the “telly” or gobbled down from a makeshift paper cone on the way home from the pub, a meal of fish and chips is like a serving of deep fried nostalgia in the UK – and let’s not forget a sprinkling of salt and vinegar.
At the dish’s peak of popularity in the late 1920s, there were 35,000 fish and chips shops in the United Kingdom (England, Scotland, Wales, and Northern Ireland). Today, there are still 10,500 “chippies” in the U.K. serving 360 million meals of fish and chips every year. That’s the equivalent of six servings of fish and chips to every British man, woman, and child.
The golden fried combo is so deeply entrenched in British culture that it can be hard to imagine a time when there wasn’t a fish and chip shop in every neighborhood. But travel back a mere 200 years and you would be hard pressed to find a combination of fried fish and chipped potatoes anywhere in the British Isles. Yes, the origin story of fish and chips is a bit more complex than the nationalist sentiment might imply.
Food history tells us that it all began outside the U.K hundreds of years ago. From the 8th to the 12th centuries, Jews, Muslims, and Christians lived in relative peace in Portugal, known as Al-Andalus, under Moorish rule. Sephardic Jews, who likely comprised 20 percent of the population, held positions in the high court. But the strength of Moorish rule diminished over time as Christian armies started conquering the territory. By 1249, Moorish rule ended in Portugal
The situation changed dramatically in the 15th century. First, the Spanish Inquisition outlawed Judaism, sending Spanish Jews fleeing to neighboring Portugal. Then in 1496, the Portuguese King Manuel I married Isabella of Spain who was not on board with religious freedom. She insisted on the expulsion of all Jews from Portugal. Manuel I mandated that all Jews be baptized or otherwise be expelled.
While many fled, some Jews stayed and either converted to Christianity or pretended to do so while continuing to practice Judaism in secret. But when Portugal fell under Spanish rule, the Inquisition targeted individuals with Jewish lineage threatening anyone claiming to be a “converso.” As religious violence worsened, many chose to flee to other parts of Europe with large numbers settling in England. As with many cultures, wherever the Sephardic Jews traveled they brought their rich culinary traditions.
Cooking is not allowed on the Jewish Sabbath (Shabbat) which begins on sundown Friday night and ends on sundown Saturday. So Sephardic Jewish families would prepare food on Friday afternoon that would last the next 24 hours. One of those dishes was a white fish, typically cod or haddock, fried in a thin coat of flour or matzo meal. The batter preserved the fish so it could be eaten cold and without sacrificing too much flavor for the next day.
It was a hit. Soon, Jewish immigrants to England took to selling fried fish in the streets from trays hung from their necks by leather straps. As early as 1781, a British cookbook refers to “the Jews’ way of preserving all sorts of fish,” and Thomas Jefferson, after a visit to England, wrote about sampling “fried fish in the Jewish fashion.”
In his London based novel Oliver Twist (1837), Charles Dickens refers to “fried fish warehouses,” the forerunner to the modern chippie where bread or baked potato were served alongside the fish.
A little later, in 1845, cook and writer Alenis Soyer in his first edition of A Shilling Cooking for the People gave a recipe for “Fried Fish, Jewish Fashion” which was fish dipped into a batter of flour and water and then fried.
But it wasn’t until the latter part of the 19th century that Jewish fried fish fully made the cultural transfer from the streets of London to the broader British populace. And for that food historians credit two developments. First, the advent of industrial scale trawl fishing in the North Sea meant that inexpensive fish could be transported to all corners of the U.K. by the second development, extensive railroad lines. Fried fish consumption rocketed with these technological advances.
That basically covers the fish bit, but what about the second half of the dish?
The Chip Mystery
Nobody is entirely sure how fried potatoes became a part of the European diet. Food historians do know that it took a really long time for fried potatoes (or potatoes of any kind) to make their way to England.
Belgium stakes a claim as the inventor of fried potatoes. The story goes that in 1680 winter was so cold that the River Meuse (located in present day Belgium) froze over and that the women in the area would turn to cutting potatoes in the shape of fish and frying them in a bit of oil so as to provide sustenance for their families.
Going back to Charles Dickens, he mentions in his 1859 novel A Tale of Two Cities, “husky chips of potato fried with some reluctant drops of oil,” which means that chips had definitely reached England by mid-century.
t is difficult to pinpoint the precise arrival of fried potatoes in England
It is difficult to pinpoint the precise arrival of fried potatoes in England, but by 1860 we see the very first fish and chips shops.
As usual with food origins, there are competing claims for being the first British fish and chip shop. Many food historians say that a Jewish cook, a young Ashkenezi immigrant named Joseph Malin, opened the first chippy in 1860 in London. The shop was so successful that it remained in business until the 1970s. And up near Manchester, the fish and chip stand opened by John Lees was doing a brisk business by 1863.
By 1910 there were 25,000 fish and chip shops in the U.K. and they even stayed open during World War I. In an effort to boost morale at home, Prime Minister David Lloyd George made sure that fish and chips stayed off the ration list (eggs, bread, and meat were on the list). The same practice was observed during World War II, when Winston Churchill famously referred to a hot meal of fish and chips as “the good companions.”
According to legend, British soldiers storming the Normandy beaches on D-Day would identify each other by yelling out, “Fish,” and waiting for the barely coded response, “Chips.”
In modern, multicultural U.K., there is plenty of competition for the National dish. In fact, chicken tikka masala makes a strong claim but most food writers, cooks, and chefs still regard fish and chips as a culinary symbol of Britishness.
Some chippy traditions have changed over the years. For example during the war years, paper rations meant that fish and chips were served in cones of yesterday’s newspaper. That practice went out of favor in the 1980s when it was deemed unsafe for food to come in contact with newspaper ink without a greaseproof paper in between. And, traditionally, fish and chips were accompanied by salt and malt vinegar, but younger generations have turned to curry sauce and, heaven forbid, even ketchup.
This is how fish and chips are eaten around the world:
• In Australia they like tartar sauce.
• In England it’s customary to use malt vinegar.
• In Belgium they prefer mayonnaise.
• In Scotland the tradition is brown sauce.
• In Denmark they like remoulade.
• In the U.S. we partner with the Aussies.
At Skull Creek Dockside we offer a wide array of delicious and mouthwatering food but don’t sleep on our Fish and Chips. Hope to see you soon, and remember, the first Friday in June is National Fish and Chips Day.
How about a few more puns. New Cod on the Block, For Your Fries Only, and Frying Nemo (our fave). |
Main Article Content
It is a significant truth that acquiring a new language requires mastering in different skills for students in any levels. Comprehension in reading is one of the most important parts for both students and teachers in English Language Teaching. Making them aware of the skills in reading such as skimming, scanning, etc. helps both teachers and students to achieve their goals. What’s more, learners not only comprehend the texts but also they broaden and improve various language skills and cultural aspects. This study aims to illustrate why teacher’s role is important in encouraging student participation for reading skills in any levels. It is an undeniable fact that language teachers have great impact on motivating students especially in reading because most of the students hesitate to read most of the texts in course books even if they are short and simple. Therefore, being involved in such studies gives students opportunities to read in a more effective way by focusing on several reading strategies. Another reason why motivation is vital for students is to develop themselves in terms of gaining creative thinking skills and flourish their self-confidence by expressing their ideas freely in the language they are learning. In this study, it has been clearly indicated that how teachers can encourage students to participate in reading activities in a detailed way.
comprehension, creative thinking skills, cultural aspects, language learning, reading skills
Article Details
How to Cite
Kara Yılmaz, B. . (2020). Teacher’s Role in Encouraging Student Participation in Reading Skills. European Journal of Teaching and Education, 1(1), 1-4. |
Still I Rise
Still I Rise Poetry as Performance—The Lyrical Power of Maya Angelou’s Verse
On April 4, 2018—what would have been Maya Angelou’s 90th birthday—Google celebrated the illustrious author and activist with a video featuring many celebrities reciting “Still I Rise.” The likes of media giant Oprah Winfrey, singer Alicia Keys, actress Laverne Cox, and Angelou’s own son, Guy Johnson, were featured in the video. The tribute is a testament to the power of Angelou’s poem that still resonates with people 40 years after it was first published.
Angelou loved to recite her work, and “Still I Rise” was among her favorite poems. Some critics even argue that her poetry has greater power when it is recited. Critic Janet Blundell, who reviewed the volume of poetry And Still I Rise, notes that the poems which most closely resemble speech patterns and songs are the most effective. Critic William Sylvester further adds that listening to her poetry allows us to better listen to ourselves and truly absorb the meaning of her words. Indeed, the repetition of key phrases combined with alliteration and assonance often give Angelou’s poems a musical quality. The poems are not necessarily intended to be performed, but when they are, they electrify an audience. Poems such as “Still I Rise” also touch upon the structure of hymns and meditations, evoking the chants of slaves as they worked in fields and came together to pray. While not usually considered a regional author—Angelou was, after all, a worldly woman who grew up in several American cities and lived in different countries—she nonetheless has come to represent the African-American experience of the Deep South since she spent her formative years there. She considered Stamps, Arkansas, her hometown, and the traditions her grandmother instilled in her, coupled with her firsthand experiences of racism and bigotry, made her a powerful witness to Southern culture and beliefs.
Angelou was invited to recite her work on numerous occasions. Most notably, she was asked to read her poem, “On the Pulse of Morning,” at President Bill Clinton’s inauguration in January 1993. In 2013, she wrote a poem of tribute for Nelson Mandela, “His Day Is Done,” upon his passing. Mandela had read Angelou’s books while in prison, and he had even recited “Still I Rise” at his presidential inauguration in 1994. Such is the power of Angelou’s poetry, and this poem in particular: a man who had been oppressed for so many years celebrated his freedom and victory and rose above his own pain by channeling Angelou’s words.
While Angelou’s poetry can resemble songs, it should also be noted that her verse and prose have inspired music as well. Alicia Keys’ song, “Caged Bird,” refers to the title of Angelou’s first autobiographical work and discusses themes of freedom and happiness. Tupac Shakur and Outlawz collaborated on the song, “Still I Rise,” featuring empowering lyrics about leaving one’s mark on history. Lastly, Angelou herself lent her voice to Common’s “The Dreamer,” inspiring people to follow their dreams. Read or recited, Angelou’s words speak to the soul. |
how to build a guitar
EXPLAINED: How To Build A Guitar From Parts Or Scratch
Learning how to build a guitar offers appealing personal and professional benefits for both amateur and serious musicians. The prerequisites include some basic woodworking skills and access to tools because the job can be quite demanding. However, if you’re committed to the process, you can take however much time you need to finish each step.
The rewards of learning to build a guitar include generating a great sense of personal satisfaction and creating a bond with your instrument that can improve your playing skills, if only through a placebo-type effect on your attitude and perception.
If you build a guitar passionately, you might even produce that rarest of accomplishments—a guitar that impartial music lovers feel has astonishing sound quality and tone. The following YouTube video, “Making A Custom Guitar From Scratch” can give you some visual ideas about the process and styles of guitars that you might build:
Instructions on Building a Guitar
Building a guitar requires patience, some level of woodworking skill and lots of specialty tools. If you lack one or more of these necessities, you can still build your own guitar using a DIY guitar build kit, which are available from various manufacturers online – learn more about learning where to learn to build guitars here. You can learn a lot about guitars by building one, and shaping a guitar to your preferences affects sound and play-ability. You’ll inevitably become a better player
This how-to article will focus on building an acoustic guitar, which many music lovers consider to be more complex and personally satisfying instruments. The basic steps of the process include:
Planning Your Guitar
You need to select the wood for the body of the guitar and choose the style of the guitar that you want to build and create a guitar body template. Experts differ over what kind of wood to use for the top, back and sides. Some builders recommend Sitka spruce for the top and rosewood for the rest, but you can put your personal stamp on the project by choosing your own wood after researching wood characteristics.
Maple is a hard wood that has excellent tonal qualities. The top of the guitar is also known as the soundboard, and the type of wood you choose is critical in determining sound tone. The guitar neck is usually made from mahogany or maple.
Drawing a template is helpful. Determining the scale length is the length of the string from saddle to the nut. Scale length determines how far apart to place the frets—classical guitars have frets about 650 mm apart. Placing the frets too close will result in a mandolin, instead of a guitar. Frets that are further apart transform your guitar into a bass or baritone guitar.
Preparing the Wood
Cut the wood in the shape of your template using a jigsaw. The edges of the wood need to be trimmed and sanded flat for a precise fit. You can use a block plane for the detailed work. Bending the wood for the sides depends on the shape of your custom guitar. Bending irons are heated metal pipes used to bend the wood at around 150° C or 302° F.
During this stage, it’s helpful to cut all the pieces you need using a jig or hand saw. You should design the neck, fretboard and headstock and cut, trim and sand the parts.
Gathering Other Parts
You will need a capstan, which is a cylinder on the headstock with a hole for inserting the guitar strings. The nut is a piece of thin material that supports the strings, and it’s usually made of brass, ivory, ebony or synthetic materials. You can see that the McCartney/Jackson partnership on “Ebony and Ivory” had a clear double meaning.
Tuners, aka machine heads, are needed to rotate the capstan and wind the string around a gear to increase tension. You will need a pinion or worm gear as well.
Rosettes are inlaid patterns around the sound hole that distinguish your guitar, and common designs include flowers or botanicals to match the term “rosette.” You can overlay the soundboard with your drawing template to mark the guitar for drilling the sound hole and drilling a surrounding gully to attach commercially made decorative rosettes.
Pickguards, aka scratch plates, can be made of wood, metal, acrylic or a more exotic material. Bridge pins, usually made of wood, bone or polycarbonates, position the guitar strings precisely over the bridge. Classical guitars often use tie blocks instead of pins. The saddle is a piece of plastic or bone that lifts the strings to the optimal height.
Bending the Curved Parts
Bending the sides is one of the tasks that seem more daunting to guitar builders than any other step in the building and assembly process, but the actual process can be easy with the right tools and design. You should cut pieces of plywood in the shape of your guitar sides. Cover the bending surface with aluminum flashing, and create a steam box or use a commercial bending iron. Clamp the wood to the mold, and you can bend the side pieces easily once they’re properly heated or steamed.
Finishing Key Components
At this point, it’s time to assemble as much of the guitar’s body as possible. You’ll need some wood for bracing the front and back from the inside. You can use glue to connect the different pieces of the body, and use clamps to hold the pieces in place while the glue dries for 24 hours.
Drill the sound hole and channels for any rosettes that you want to add for design purposes. Add the guitar neck, and reinforce it with a block. Guitar necks can be quarter- or flat-sawn, which depends on the dimension, construction technique used and personal preferences. If you’re uncertain, play instruments with flat-sawn or quarter-sawn necks to see which you like best.
Now just start playing guitar!
Reinforcing the neck is critical. Most people use truss rods to prevent the necks from twisting or warping. You can attach the neck to the guitar body with nuts and bolts. Blanks for bolt-on necks are widely available, and these are usually 13/16″ thick. You need to thin the blanks to ¾” t match standard Fender specifications for ¼” fingerboards. Standard fingerboards are laminated, which reduces some of the steps that would otherwise be necessary.
The finishing process is where you address the issues of setting up your guitar to prevent fret performance problems like string buzz. Doing the work will take some time and consists of setting up the guitar strings at the right height, leveling the fret and grinding and polishing the fretboard. You can take your guitar to a professional to set it up as well, a good option for inexperienced players.
Choosing A Guitar Body Shape
You ought to begin by designing the right body shape for your guitar with using guitar body templates. You should have a concrete idea of what your preferred guitar model will be in appearance and what it will feature. You can come up with a unique design or borrow ideas from the existing models such as Gibson SG or Fender Telecaster. You may create your instrument as angled, rounded, or craft it in a flying V design. The choice is solely yours, and as your preferences guide you, so be it. You can also choose to design your guitar in a circular or square shape. You can choose between a double or single cutaway depending on the frets levels you need or forgo the cutaway altogether.
Selecting Materials
Select the right materials for your guitar. This selection will include selecting the right body for an ideal electric guitar. You will have mahogany, swamp ash, alder, or maple as the main options that make the best bodies. For the neck, mahogany and maple are known to produce the best for the electric model of guitars. Each of the woods chosen for the body will have a unique influence on tonal quality. The thickness of the wood also influences the tone produced by a guitar. Heavy and highly dense wood gives thicker tones while a lighter wood produces brighter tinny sounds.
Selecting Necessary Guitar Hardware & Parts
Make a checklist and purchase the necessary hardware. You would not wish to miss a single part during the assembling hence the need to compose a list of all the parts required for your preferred model. These parts will have different looks and capacities when used in a guitar. You should thus be ready to choose parts based on the guitar models you have seen before or be willing to try something new. Luckily, you can readily acquire all the parts you need from a nearby guitar outlet or purchase them from a reliable online store. The primary components that you will need for an electric guitar include: a nut, switch for pickup selector, tuning pegs, a bridge, pickups, input cable, knobs, strings, tone, and volume controls. Other optional parts that you may acquire are the truss rod, pickguard, and strap pegs for your universal guitar straps. Fret wire is necessary if you intend to build a guitar neck on your own.
Get yourself a pre-manufactured guitar neck. This applies where you do not possess the do it yourself skills to craft a standard neck for the instrument. The neck is considered one of the most sophisticated components, thus the need to purchase one.
Make sure you are armed with the right working implements and knowledge. If you make efforts to acquire a premade neck, the rest of the task of creating a guitar of your choice does not require any sophisticated tools or expertise. The process may not be really friendly and seamless for a total guitar beginner. You will need some basic knowledge to use tools such as drills, saws, solders, and sandpaper. You should as well have these tools with you or have the plans to access them once needed. The good news is that you can create your electric guitar using hand tools only. However, you will make things easy and free of hassle if you can do yourself a favor to acquire an electric drill, router, and a jigsaw.
Purchase a guitar kit for a seamless process when making your guitar. Several firms produce fully loaded kits for electric guitars that you may need to make one. Your only task once you buy such a kit will be assembling the parts. You may, however, not get the full exposure of creating a guitar from scratches. Despite this, you will attain satisfaction when putting the parts together and finishing the entire process all by yourself.
To put your into shape, you ought to cut the body segment. Use your guitar design by laying it on the wood and tracing the design shape into it. Use the saw to cut the wood while drawn outline following carefully. Sand the edges and the sides of the blank after you cut it.
Choose the positions to fix the body parts by making their relevant spots on the body blank. Draw a clear line along the center of the body for your reference. You then have to draw marks on the bank to indicate guitar parts such a volume and tone control, as well as pickups, will be fitted. You can use the layout of an existing guitar or select the format the feels good for you.
You also need to route the guitar body. Make holes that go partially through the body bank at the rear aspect for fitting the electronic parts such a tone, volume, and pickup controls. Another cavity will be needed in the front aspect of the body to fix the pickups. The depth of these cavities should follow the recommendations given by the pickup manufacturer. You as well need to create a cavity where the neck of the guitar will attach to its body. It should be sufficiently deep and wide to attach the two parts firmly.
Use the drilling tool to make holes for the electronic parts. The marks you made on the body blank will now be used as a guide here. Also, the hardware kit that you choose will direct you to the exact position and the total number of holes needed. Make holes for crucial parts such as bridge, pickups, volume and tone control, cord input, and a hole for your strap pegs. Create additional holes to accommodate pickup strings to cross from the back to the front cavity.
Finish Work On The Guitar
The body now needs a touch of finish or paint based on your preferences. The creativity you applied when making the guitar will be depicted in the elegance of its body appearance. You must, therefore, use your imagination to make it look as amazing as it can be. A proper paint (how to paint a guitar) or a finish will help you here. You may use a simple oil finish, colorful matte or gloss finish or choose a combination of colors to bring s striking pattern.
The next step here involves cutting of the neck in case you never bought a ready-made model. You will be needed to cut the neck of your guitar into the appropriate width and thickness. The headstock must be left wide enough to fit the tuning pegs. Use the sandpaper to sand the neck until you achieve a smooth texture and look.
Join the neck to the body of the guitar. You will need to use lamination or bolts to do in this case. Firmly fix the neck to the cavity that you made earlier for this function. Use glue or bolts running through to the back from the top of the neck to hold these two parts together.
It is now time to fix the bridge to the guitar’s body. You have several bridge options to make your guitar quite fantastic. The design of the instrument will determine the exact directions to attach the bridges.
Guitar Electronics
The final critical bit lies in the installation of the electronics. Begin this part by dropping the electronic parts into place. Ensure the pickup wires run via the holes that you drilled earlier. Use the cavities that you made on the front aspect to place the pickups. Use the screw given by the manufacturer to fix the pickups in place. Fix the controls for the tone, pickup, volume, and cord input using the same criteria.
Remember to use solder to fix the electronics. The pickups come with a schematic manual that directs you to connect the controls to the input cord. Follow the schematic directions to have things done. Use electrical tape to cover the wiring connections if the manufacturer does not recommend an alternative approach.
Lastly, it is time to string the guitar and put it to test. Remember to use your preferred string gauge and play it if the strings are in place. Start by playing the guitar while unplugged to check if everything is alright. If all is well, you may then plug it in and play. If at all this happens seamlessly, you will have your guitar ready and done.
Education and Fine-tuning Your Guitar
Additional research will be required to choose your acoustic guitar style and produce accurate templates of the different parts needed. If you don’t have the skills for woodworking, you might want to educate on the skills needed to build your guitar. Guitar kits are a practical option for anyone who is in way over his or her head. It’s also a good idea to choose a helpful local hardware store. Big box stores are nearly impossible to navigate and find what you need if you don’t have a lot of experience.
SOLVED: How Hard Is It To Build A Guitar?
Leave a Reply
|
Home » Community » Wine and Grape Guide » Sangiovese
Italian wine and grape guide : Sangiovese
Sangiovese is a red grape variety with ancient and uncertain origins, with the origin of the name even more uncertain. Sangiovese is a grape that changes significantly its characteristics depending on the climate and altitude at which it is planted and it is Italy's most planted grape variety, found everywhere from north to south, but mainly in Tuscany where it is used in no less than 25 different appellations, whether in its own or part of a blend, and Emilia Romagna.
Sangiovese has several clones or varieties, the Sangiovese grosso (big) traditionally used for powerful and slow maturing red wines such as the Brunello di Montalcino, Prugnolo Gentile used for the Nobile di Montepulciano belongs to the same family. The other main clones are the Sangiovese Piccolo (small), used for Chianti and the third variety, called Morellino, is used in a blend of the same name, Morellino di Scanzano, made in the southern part of Tuscany.
Tuscan grown Sangiovese’s flavours vary from dark fruit to, spice, tobacco, leather and characteristics of its wines are marked tannins and high acidity, making it a perfect grape for ageing.
Sangiovese grape is also widely grown in the nearby Umbria where it is used in many wines and appellations including the Montefalco Rosso, and it has started to appear outside Italy, from California to Argentina to Australia, with mixed results so far. |
The Gender Gap Situation
Author: Adam Heppell
Date: Wednesday 10th March 2021
The gender pay gap (GPG) is one of the most pressing issues facing women today as we strive for equality in the workplace. Despite promises to remove the gap from the government and businesses, the gap still exists today. So what is the current state of play? What can be done to close the gap?
The gender pay gap isn’t the same as equal pay. Equal pay has been a legal requirement since the Equal Pay Act was introduced in 1970. GPG is calculated by taking all employees in an organisation or nation and comparing the average pay between men and women.
Current Situation
The most recent ONS figures on the GPG show that the existing gender pay gap for full-time employees in April 2020 was 7.4%, down from 9.0% in April 2019. The gender pay gap among all employees was 15.5% in 2020, down from 17.4% in 2019. The gender pay gap remained close to zero for full-time employees aged under 40 years but was over 10% for older age groups. Compared with lower-paid employees, higher earners experienced a much larger difference in hourly pay between men and women.
The research also highlighted a reduction in the gender pay gap within the managers, directors, and senior officials group. The gender pay gap was higher in every English region than in Wales, Scotland and Northern Ireland.
In 2019, it was estimated that it will take 257 years to close the gender pay gap worldwide.
Changes to the Equality Act in 2017 have ensured that companies with more than 250 employees are legally required to report their gender pay gap figures by the end of each financial year from 2018. The requirement was suspended in 2020 due to the coronavirus pandemic. The Equality and Human Rights Commission has said it will not start enforcement action against companies until October, a six-month extension to the reporting deadline - possibly sending the wrong message regarding gender equality.
Representation in the Workplace
An explanation for the GPG is the fact that there is poor representation of women in leadership roles. There has been encouraging progress in recent years but more needs to be done.
The latest edition of the Hampton-Alexander Review, an independent, business-led initiative aimed to increase the representation of women in leadership and board-level roles, has shown more than a third of FTSE 350 board positions are now held by women, with the number of women on boards increasing by 50% over the last five years.
The report shows that while men still dominate in the upper ranks of the UK’s top firms, 220 of the FTSE 350 companies now have at least 33% of their board positions held by women, quadrupling totals from 2015. As recently as 2011, 43% of the FTSE 350 still had all-male boards. There are no longer any all-male boards in the FTSE 350. Indeed, the number of boardrooms consisting of only one woman has also declined from 116 in 2015 to just 16 in 2020.
Improving Representation
While the stats on representation are a good start, more can be done to ensure women have equal opportunities.
When putting together a shortlist of qualified candidates, make sure more than one woman is included. Shortlists with only one woman does not increase the chance of a woman being selected.
Standardised tasks scored equally can help. Structured and unstructured interviews both have strengths and weaknesses, but unstructured interviews are more likely to allow unfair bias to creep in and influence decisions. Appointing taskforces to reduce biased decisions in recruitment and promotion because people who make decisions know that their decision may be reviewed.
Unite the Union and the Marx Memorial Library are creating the largest collection of Oral Histories from working people. Sharing stories of struggle, collectivism, and what it means to be a member and activist within the Trade Union Movement. Listen to the podcasts now on Spotify and Pocket Casts. |
Living wires discovered along ocean floor
Cable bacteria in the mud along the seafloor.
Photo by Mingdong Dong, Jie Song and Nils Risgaard-Petersen/Aarhus University
Date:27 March 2013 Tags:, , ,
Multicellular bacteria transmit electrons across relatively enormous distances in the sea
Researchers have discovered filamentous bacteria along the seafloor that function as living power cables in order to transmit electrons thousands of cell lengths away.
The Desulfobulbus bacterial cells, which are only a few thousandths of a millimetre long each, are so tiny that they are invisible to the naked eye. And yet, under the right circumstances, they form a multicellular filament that can transmit electrons across a distance as large as 1 centimetre as part of the filament’s respiration and ingestion processes.
The findings by scientists at Aarhus University in Denmark and University of Southern California Dornsife (USC Dornsife) were published in the journal Nature.
“Until we found the cables we imagined something co-operative where electrons were transported through external networks between different bacteria. It was indeed a surprise to realise, that it was all going on inside a single organism,” said Lars Peter Nielsen of the Aarhus Department of Bioscience, and a corresponding author of the Nature paper.
The team studied bacteria living in marine sediments that power themselves by oxidising hydrogen sulphide. Cells at the bottom live in a zone that is poor in oxygen but rich in hydrogen sulphide. Cells at the top live in an area rich in oxygen but poor in hydrogen sulphide.
Source: USC Dornsife
Latest Issue :
Nov-December 2021 |
Ss Agape, Chionia and Irene – virgins and martyrs killed for hiding the scriptures AD 304
Features Msgr John Broadbent5 April 2011 The scriptures read at Mass today are a small portion of the often lengthy readings for the Christians of the early church. The Eucharist,…
Msgr John Broadbent
5 April 2011
The scriptures read at Mass today are a small portion of the often lengthy readings for the Christians of the early church. The Eucharist, which most people attended only on Sunday and in private homes or catacombs, was the climax of their week and lasted for hours.
Ss Agape, Chionia and Irene - virgins and martyrs killed for hiding the scriptures AD 304 Archdiocese of WellingtonMost early Christians could not read because many, especially the poor, had no formal schooling. For those who could read there were no comfortable little bibles. The scriptures were inscribed on bulky papyrus scrolls, the result of hours of copying. Some congregations or parishes could afford to buy only some portions but even if they had the whole of the Old and New Testaments, these were kept hidden and under guard. The homily centred on the scriptures and life in the community.
The three sisters commemorated on the April 3 lived in Thessalonica (modern Salonika) in Greece. They must have been converts as both parents appear to have been pagan. But they must have been wealthy enough to own scriptures and had learnt to read. They read the scriptures daily and loved them.
Roman empire falling
At that time, the Roman Empire under Diocletian was beginning to fall on hard times. As students of history know, the upper classes in most great and rich empires squander the empire’s money by leading dissolute lives while the poor become poorer and the economy takes a dive.
Determined to restore the empire to its former glory, Diocletian (284AD) changed the empire’s political structure creating two emperors, one in the East based on Nicomedia in modern Turkey and the other based on Milan, Northern Italy.
The Barbarian tribes particularly the Germans on the northern border were infiltrating the empire to conquer parts of it. On the eastern border, the Persians were once again becoming a great empire and large standing armies needed to be stationed at Milan and Nicomedia to march large distances quickly. No provincial governor could be trusted with such an army lest he use it to depose the emperor. Diocletian chose Maximian as his co-emperor.
Christianity rises
Another force which blocked Diocletian’s wish to restore the empire was the growth of Christianity and loss of the old Roman religion. If the Romans returned to worshipping the old gods, especially since Augustus’ time (the first emperor under whom Jesus was born), the emperor would be as divine as God and the old spirit of Rome could be revised.
All previous persecutions had made the crucial point that a Christian must offer sacrifices to the emperor as god, the point at which they were condemned to die. Now Diocletian revived this point to reinforce his and Maximian’s authority as emperor and co-emperor. With Maximian agreeing to do the same in his half, Diocletian began his persecution of the Christians in 306AD. Thus ensued the bloodiest persecution of them all in which hundreds of thousands of Christians shed their blood for Christ.
Scriptures targetted
Not only could they not make a god of their emperor, but the wily Diocletian saw that the writings the Christians used at their services gave them strength and courage. While the scriptures existed, they must be destroyed or even the martyrs’ deaths would not stop Christianity multiplying. So when a Christian was arrested, their house would be routinely ransacked in search of the offending documents.
When Agape and her sisters were arrested and brought before the magistrate on the witness of a person who had been observing their house, the magistrate demanded they pray to and for the emperor. They resolutely refused. We learn this from the report of their trial the authenticity of which is unquestioned. [The Acts of Perpetua and Felicity have been widely criticised.]
When the magistrate, Dulcitius, shortly afterwards ordered their house searched, rolls of scriptures were found. Finally, Dulcitius asked Agape, ‘Will you act as we do who are obedient and dutiful to the Emperor?’ She answered, ‘It is not right to obey Satan. I am not to be influenced by anything you can say.’
Dulcitius ordered Agape and Chionia to be burnt alive.
St Irene was martyred later and different versions of the Acts of Agape and Her Sisters give varying accounts of the martyrdom. The more probable one was that she was shot in the throat with an arrow.
When we think of the bravery of these three sisters and their love of the scriptures and how generations of monks in the centuries that followed copied the scriptures by hand and quill onto scrolls, we realise the love those early Christians had for the scriptures. It makes us wonder, ‘Do I really appreciate reading my bible?’
I know we meet Jesus in a very special way in his real presence in the Eucharist, in prayer, in my neighbour and in the scriptures in a special way, too. What do I do about it?
How about reading more each day in Lent and meeting Jesus? How about looking at the Sunday Mass readings during the week in preparation? All who read some scripture regularly love it as did Ss Agape, Chionia and Irene. |
Kent Past - King Aethelberht
Home Towns & Villages Time-Line Articles Kent Past Times Contact
Kent Past
The History of Kent
Copyright Kent Past 2010
King Aethelberht
In the 5th Century, raids on Britain by continental peoples had developed into full-scale migrations. The newcomers are known to have included Angles, Saxons, Jutes, and Frisians, and there is evidence of other groups as well. These groups captured territory in the east and south of England, but at about the end of the fifth century, a British victory at the battle of Mons Badonicus halted the Anglo-Saxon advance for fifty years. Beginning about 550AD, however, the British began to lose ground once more, and within 25 years, it appears that control of almost all of southern England was in the hands of the invaders.
Kent appears to have been conquered by the Anglo-Saxons prior to Mons Badonicus. There is both documentary and archaeological evidence that Kent was colonised primarily by Jutes, from the southern part of the Jutland peninsula. According to a well-known legend, Hengist and Horsa, two brothers, landed in 449AD as mercenaries for a British king, Vortigern. After a rebellion over pay and the death of Horsa in battle, Hengist established the kingdom of Kent. This account now is thought by some historians to be mostly legendary, although essentially the underlying story of a rebelling mercenary force may be accurate, and the date for the founding of the kingdom of Kent is thought to be approximately the middle of the 5th Century, in agreement with the legend. This early date, only a few decades after the departure of the Romans, also suggests that more of Roman civilization may have survived into Anglo-Saxon rule in Kent, than in other areas.
The Anglo-Saxon invasion may have involved military coordination of different groups within the invaders, with a leader who had authority over many different groups and AElle of Sussex may have been such a leader. Once the new states began to form, conflicts among them began and dominance of the other nations could lead to wealth in the form of tribute. A weaker state also might ask for the protection of a stronger neighbour against a warlike third state. Over lordship, for either reason, was a central feature of Anglo-Saxon politics; it is known to have begun before Aethelberht's time, although the details are unknown, and kings were being described as overlords in this sense, as late as the 9th Century.
Sources for this period in Kentish history include The Ecclesiastical History of the English People, written in 731AD by Bede, a Northumbrian monk. Bede was interested primarily in the Christianisation of England, but since Aethelberht was the first Anglo-Saxon king to convert to Christianity, Bede provides more substantial information about him than about any earlier king. One of Bede’s correspondents was Albinus, who was abbot of the monastery of St. Peter and St. Paul (subsequently renamed St. Augustine's) in Canterbury. Also of importance is the Anglo-Saxon Chronicle, a collection of annals assembled in about 890 in the kingdom of Wessex, which mentions several events in Kent during Aethelberht's reign. In addition to these, there is a history of the Franks, written in the late sixth century by Gregory of Tours, which mentions events in Kent. This is the earliest surviving source to mention any Anglo-Saxon kingdom. Some of Pope Gregory the Great's letters survive that relate to the mission of St. Augustine to Kent in 597AD; these letters provide information about the mission specifically, but also can be used to draw conclusions about the state of Kent and its relationships with its neighbours. Other sources include regional lists of the kings of Kent and early charters. Charters were documents drawn up to record grants of land by kings to their followers or to the church, and they provide some of the earliest documentary sources in England. None survive in original form from Aethelberht's reign, but some later copies exist. There also is a surviving law code of Aethelberht's.
According to Bede, Aethelberht was descended directly from Hengist. Bede gives the line of descent as follows: 'Ethelbert was son of Irminric, son of Octa, and after his grandfather Oeric, surnamed Oisc, the kings of the Kentish folk are commonly known as Oiscings. The father of Oeric was Hengist'. An alternative form of this genealogy, found in the Historia Brittonum among other places, reverses the position of Octa and Oisc in the lineage. The first of these names that can be placed historically with reasonable confidence is Aethelberht's father, whose name now usually is spelled Eormenric. The only direct written reference to Eormenric is in Kentish genealogies, but Gregory of Tours does mention that Aethelberht�s father was the king of Kent, though Gregory gives no date. Eormenric's name provides a hint of connections to the kingdom of the Franks, across the English Channel; the element Eormen was rare in names of the Anglo-Saxon aristocracy, but much more common among Frankish nobles.
One other member of Aethelberht's family is known: his sister, Ricole, who is recorded by both Bede and the Anglo-Saxon Chronicle as the mother of Saeberht, king of the East Saxons.
The dates of Aethelberht's birth and accession to the throne of Kent are both matters of debate. Bede, the earliest source to give dates, is thought to have drawn his information from correspondence with Albinus. Bede states that when Aethelberht died in 616 he had reigned for fifty-six years, placing his accession in 560. Bede also says that Aethelberht died twenty-one years after his baptism.
Augustine's mission from Rome is known to have arrived in 597, and according to Bede, it was this mission that converted Aethelberht. Hence, Bede's dates are inconsistent. The Anglo-Saxon Chronicle, an important source for early dates, is inconsistent with Bede and also has inconsistencies among different manuscript versions. Putting together the different dates in the Chronicle for birth, death, and length of reign, it appears that Aethelberht's reign was thought to have been either 560-616, or 565-618, but that the surviving sources have confused the two traditions.
It is possible that Aethelberht was converted to Christianity before Augustine's arrival. His wife was a Christian and brought a Frankish bishop to attend her at court, so Aethelberht would have had knowledge of Christianity before the mission reached Kent. It also is possible that Bede had the date of his death wrong; if, in fact, the king died in 618, this would be consistent with his baptism in 597, which is in accord with the tradition that Augustine converted the king within a year of his arrival.
Gregory of Tours, in his Historia Francorum, writes that Bertha, daughter of Charibert, king of the Franks, married the son of the king of Kent. Bede says that Aethelberht received Bertha 'from her parents'. If Bede is interpreted literally, the marriage would have had to take place before 567, when Charibert died. The traditions for Aethelberht's reign, then, would imply that he married Bertha before either 560 or 565.
The extreme length of Aethelberht's reign also has been regarded with scepticism by historians; it has been suggested that he died in the 56th year of his life, rather than the 56th year of his reign. This would place the year of his birth approximately at 560AD, and he would not then have been able to marry until the mid-570s. According to Gregory of Tours, Charibert was king when he married Ingoberg, Bertha's mother, which places that marriage no earlier than 561. It therefore is unlikely that Bertha was married much before about 580. These later dates for Bertha and Aethelberht also solve another possible problem: Aethelberht's daughter, Aethelburh, seems likely to have been Bertha's child, but the earlier dates would have Bertha aged 60 or so at Aethelburh's likely birthdate using the early dates.
Gregory, however, also says that he thinks that Ingoberg was seventy years old in 589; and this would make her about forty when she married Charibert. This is possible, but seems unlikely, especially as Charibert seems to have had a preference for younger women, again, according to Gregory's account. This would imply an earlier birth date for Bertha. On the other hand, Gregory refers to Aethelberht at the time of his marriage to Bertha, simply as 'a man of Kent', and in the 589 passage concerning Ingoberg's death, which was written in about 590 or 591, he refers to Aethelberht as 'the son of the king of Kent'. If this does not simply reflect Gregory's ignorance of Kentish affairs, which seems unlikely given the close ties between Kent and the Franks, then some assert that Aethelberht's reign cannot have begun before 589.
Not all of the above contradictions can be reconciled, but the most probable dates that may be drawn from the data, place Aethelberht's birth at approximately 560, and perhaps, his marriage to Bertha at 580. His reign is most likely to have begun in 589 or 590.
The later history of Kent shows clear evidence of a system of joint kingship, with the kingdom being divided into east and west Kent, although it appears that there generally was a dominant king. This evidence is less clear for the earlier period, but there are early charters, known to be forged, which nevertheless imply that Aethelberht ruled as joint king with his son, Eadbald. It may be that Aethelberht was king of east Kent and Eadbald ruled the west; the east Kent king seems generally to have been the dominant ruler later in Kentish history. Whether or not Eadbald became a joint king with Aethelberht, there is no question that Aethelberht had authority throughout the kingdom.
The division into two kingdoms is most likely to date back to the 6th Century; east Kent may have conquered west Kent and preserved the institutions of kingship as a subkingdom. This was a common pattern in Anglo-Saxon England, as the more powerful kingdoms absorbed their weaker neighbours. An unusual feature of the Kentish system was that only sons of kings appeared to be legitimate claimants to the throne, although this did not eliminate all strife over the succession.
The main towns of the two kingdoms were Rochester, for west Kent, and Canterbury, for the east. Bede does not state that Aethelberht had a palace in Canterbury, but he does refer to Canterbury as his metropolis, and it is clear that it is Aethelberht's seat.
There are many indications of close relations between Kent and the Franks. Aethelberht's marriage to Bertha certainly connected the two courts, although not as equals: the Franks would have thought of Aethelberht as an under-king. There is no record that Aethelberht ever accepted a continental king as his overlord and, as a result, historians are divided on the true nature of the relationship. Evidence for an explicit Frankish over lordship of Kent comes from a letter written by Pope Gregory the Great to Theuderic, king of Orleans, and Theudebert, king of Metz. The letter concerned Augustine's mission to Kent in 597, and in it, Gregory says that he believes 'that you wish your subjects in every respect to be converted to that faith in which you, their kings and lords, stand'. It may be that this is a papal compliment, rather than a description of the relationship between the kingdoms. It also has been suggested that Liudhard, Bertha's chaplain, was intended as a representative of the Frankish church in Kent, which also could be interpreted as evidence of over lordship.
A possible reason for the willingness of the Franks to connect themselves with the Kentish court is the fact that a Frankish king, Chilperic I, is recorded as having conquered a people known as the Euthiones during the mid-6th Century. If, as seems likely from the name, these people were the continental remnants of the Jutish invaders of Kent, then it may be that the marriage was intended as a unifying political move, reconnecting different branches of the same people. Another perspective on the marriage may be gained by considering that it is likely that Aethelberht was not yet king at the time he and Bertha were wed: it may be that Frankish support for him, acquired via the marriage, was instrumental in gaining the throne for him.
Regardless of the political relationship between Aethelberht and the Franks, there is abundant evidence of strong connections across the English Channel. There was a luxury trade between Kent and the Franks, and burial artefacts found include clothing, drink, and weapons that reflect Frankish cultural influence. The Kentish burials have a greater range of imported goods than those of the neighbouring Anglo-Saxon regions. This is not surprising given the easier access to trade. In addition, the grave goods are both richer and more numerous in Kentish graves than in those of the Anglo-Saxon regions, implying that the material wealth exhibited in Kent were derived from that trade. Frankish influences also may be detected in the social and agrarian organization of Kent. Other cultural influences may be seen in the burials as well, so it is not necessary to presume that there was direct settlement by the Franks in Kent.
In his Ecclesiastical History, Bede includes his list of seven kings who held 'imperium' over the other kingdoms south of the Humber. The usual translation for 'imperium' is over lordship. Bede names Aethelberht as the third on the list, after AElle of Sussex and Ceawlin of Wessex. The anonymous annalist who composed one of the Anglo-Saxons chronicles repeated Bede's list of seven kings in a famous entry under the year 827, with one additional king, Egbert of Wessex. The Chronicle also states that these kings held the title bretwalda, or Britain-ruler. The exact meaning of bretwalda has been the subject of much debate; it has been described as a term of encomiastic poetry, but there is also evidence that it implied a definite role of military leadership.
The prior bretwalda noted, Ceawlin, is recorded by the Anglo-Saxon Chronicle as having fought Aethelberht in 568. The entry states that Aethelberht lost the battle and was driven back to Kent. The dating of the entries concerning the West Saxons in this section of the Chronicle is thought to be unreliable and a recent analysis suggests that Ceawlin's reign is more likely to have been approximately 581�588, rather than the dates of 560-592 that are given in the Chronicle. The battle was at Wibbandun, which may be translated as Wibba�s Mount; it is not known where this was.
At some point Ceawlin ceased to hold the title of bretwalda, perhaps, after a battle at Stoke Lyne, in Oxfordshire, which the Chronicle dates to 584, some eight years before he was deposed in 592 (again using the Chronicle's unreliable dating). Aethelberht certainly was a dominant ruler by 601, when Gregory the Great wrote to him: Gregory urges Aethelberht to spread Christianity among those kings and peoples subject to him, implying some level of over lordship. If the battle of Wibbandun was fought circa 590, as has been suggested, then Aethelberht must have gained his position as overlord sometime in the 590s. This dating for Wibbandun is slightly inconsistent with the proposed dates of 581-588 for Ceawlin's reign, but those dates are not thought to be precise, merely the most plausible given the available data.
In addition to the evidence of the Chronicle, that Aethelberht was accorded the title of bretwalda, there is evidence of his domination in several of the southern kingdoms. In Essex, he appears to have been in a position to exercise authority shortly after 604, when his intervention helped in the conversion of King Saebert of Essex, his nephew, to Christianity. It was Aethelberht, and not Saeberht, who built and endowed St. Pauls in London, where St. Paul's Cathedral now stands. Further evidence is provided by Bede, who explicitly describes Aethelberht as Saeberht's overlord.
Bede describes Aethelberht's relationship with Raedwald, king of East Anglia, in a passage that is ambiguous. It seems to imply that Radwald retained ducatus, or military command of his people, even while Aethelberht held imperium, the rule. This implies further, that being a bretwalda usually included holding the military command of other kingdoms and also that it was more than that, since Aethelberht is bretwalda despite Raedwald's control of his own troops. Radwald was converted to Christianity while in Kent, but did not abandon his pagan beliefs; this, and the fact that he retained military independence, together, implies that Aethelberht�s over lordship of East Anglia was much weaker than his influence with the East Saxons. An alternative interpretation, however, is that the passage in Bede should be translated as 'Raedwald, king of the East Angles, who while Aethelberht lived, even conceded to him the military leadership of his people'; if this is Bede's intent, then East Anglia firmly was under Aethelberht's over lordship.
There is no evidence that Aethelberht's influence in other kingdoms was enough for him to convert any other kings to Christianity, although this interpretation partly is due to the lack of sources -nothing is known of Sussex's history, for example, for almost all of the 7th and 8th Centuries. Aethelberht was able to arrange a meeting in 602 in the Severn valley, on the north-western borders of Wessex, however, and this may be an indication of the extent of his influence in the west. No evidence survives showing Kentish domination of Mercia, but it is known that Mercia was independent of Northumbria, so it is quite plausible that it was under Kentish over lordship.
The native Britons had converted to Christianity under Roman rule. The Anglo-Saxon invasions separated the British church from European Christianity for centuries, so the church in Rome had no presence or authority in Britain, and in fact, Rome knew so little about the British church that it was unaware of any schism in customs. Aethelberht, however, would have known something about the Roman church from his Frankish wife, Bertha, who had brought a bishop, Liudhard, with her across the Channel. Aethelberht had a chapel built for her.
In 596, Pope Gregory the Great sent Augustine, prior of the monastery of St. Andrew in Rome, to England as a missionary, and in 597, a group of nearly forty monks, led by Augustine, landed on the Isle of Thanet in Kent. According to Bede, Aethelberht was sufficiently distrustful of the newcomers to insist on meeting them under the open sky, to prevent them from performing sorcery. The monks impressed him, but he was not converted immediately. He agreed to allow the mission to settle in Canterbury and permitted them to preach.
It is not known when Aethelberht became a Christian. It is possible, despite Bede's account, that he already was a Christian before Augustine's mission arrived. It is likely that Liudhard and Bertha pressed him to consider becoming a Christian before the arrival of the mission, and it also is likely that a condition of his marriage to Bertha might have been that he would consider conversion. Conversion via the influence of the Frankish court would have been seen as an explicit recognition of Frankish over lordship, however, so it is possible that Aethelberht's delay of his conversion until it could be accomplished via Roman influence, might have been an assertion of independence from Frankish control. It also has been argued that Augustine's hesitation -he turned back to Rome, asking to be released from the mission- is an indication that Aethelberht was a pagan at the time Augustine was sent.
At the latest, Aethelberht must have converted before 601, since that year Gregory wrote to him as a Christian king. It is recorded, that he converted on 1 June, in the summer of the year that Augustine arrived. Through Aethelberht's influence Saeberht, king of Essex, was also converted, but there were limits to the effectiveness of the mission. The entire Kentish court did not convert: Eadbald, Aethelberht's son and heir, was a pagan at his accession. Raedwald, king of East Anglia, was only partly converted (apparently while at Aethelberht's court), and retained a pagan shrine next to the new Christian altar. Augustine also was unsuccessful in gaining the allegiance of the British clergy.
Some time after the arrival of Augustine's mission, perhaps in 602 or 603, Aethelberht issued a set of laws, in ninety sections. These laws are considered the earliest surviving code composed in any of the Germanic countries, and almost certainly were one of the very first documents written down in Anglo-Saxon, as literacy would have arrived in England with Augustine's mission. The only surviving early manuscript, the Textus Roffensis, dates from the twelfth century, and it now resides in the Medway Studies Centre in Strood, Kent. Aethelberht's code makes reference to the church in the very first item, which enumerates the compensation required for the property of a bishop, a deacon, a priest, and so on; but overall, the laws seem remarkably uninfluenced by Christian principles. Bede asserted that they were composed 'after the Roman manner', but there is little discernible Roman influence either. In subject matter, the laws have been compared to the Lex Salica of the Franks, but it is not thought that Aethelberht based his new code on any specific previous model.
The laws are concerned with setting and enforcing the penalties for transgressions at all levels of society; the severity of the fine depended on the social rank of the victim, with crimes against the Church penalised the most, more greatly even than those against the king. The king had a financial interest in enforcement, for part of the fines would come to him in many cases, but the king also was responsible for law and order, and avoiding blood feuds by enforcing the rules on compensation for injury was part of the way the king maintained control. Aethelberht’s laws are mentioned by Alfred the Great, who compiled his own laws, making use of the prior codes created by the King of Kent, as well as those of Offa of Mercia and Ine of Wessex.
One of Aethelberht's laws seems to preserve a trace of a very old custom: the third item in the code states 'If the king is drinking at a man's home, and anyone commits any evil deed there, he is to pay twofold compensation'. This probably refers to the ancient custom of a king traveling the country, being hosted, and being provided for by his subjects wherever he went. The king's servants retained these rights for centuries after Aethelberht's time.
Items 77-81 in the code have been interpreted as a description of a woman�s financial rights after a divorce or legal separation. These clauses define how much of the household goods a woman could keep in different circumstances, depending on whether she keeps custody of the children, for example. It has recently been suggested by one source, however, that it would be more correct to interpret these clauses as referring to women who are widowed, rather than divorced.
There is little documentary evidence about the nature of trade in Aethelberht's Kent. It is known that the kings of Kent had established royal control of trade in the late 7th Century, but it is not known how early this control began. There is archaeological evidence that suggests the royal influence predates any of the written sources. It has been suggested that one of Aethelberht's achievements was to take control of trade away from the aristocracy and to make it a royal monopoly. The continental trade provided Kent access to luxury goods which gave Kent an advantage in trading with the other Anglo-Saxon nations and the revenue from trade was important in itself.
Kentish manufacture before 600 included glass beakers and jewellery. Kentish jewellers were highly skilled and before the end of the 6th Century, they gained access to gold. Goods from Kent are found in cemeteries across the channel, and as far away as at the mouth of the Loire. It is not known what Kent traded for all of this wealth, although it seems likely that there was a flourishing slave trade. It may well be that this wealth was the foundation of Aethelberht's strength, although his over lordship and the associated right to demand tribute, would have brought wealth in its turn.
It may have been during Aethelberht's reign that coins first began to be minted in England: none bear his name, but it is thought likely that the first coins predate the end of the 6th Century. These early coins were gold, and probably shillings (scillingas in Old English) that are mentioned in Aethelberht's laws. The coins are also known to numismatists as 'thrymsas'.
Aethelberht died on 24 February 616 and was succeeded by his son, Eadbald, who was not a Christian Bede says he had been converted but went back to his pagan faith, although he ultimately did become a Christian king. Eadbald outraged the church by marrying his stepmother, which was contrary to Church law, and by refusing to accept baptism.
Saeberht of the East Saxons also died at approximately this time and he was succeeded by his three sons, none of whom were Christian. A subsequent revolt against Christianity and the expulsion of Mellitus, their bishop, may have been a reaction to Kentish over lordship after Aethelberht's death as much as a pagan opposition to Christianity.
In addition to Eadbald, it is possible that Aethelberht had another son, Aethelwald. The evidence for this exists in a papal letter to Justus, archbishop of Canterbury from 619 to 625, in which a king named Aduluald is referred to, who apparently is different from Audubald, which refers to Eadbald. There is no agreement among modern scholars on how to interpret this: Aduluald might be intended as a representation of Aethelwald and hence, this may be an indication of another king, perhaps a subking of west Kent; or it may be merely a scribal error which should be read as referring to Eadbald.
Aethelberht later was canonised for his role in establishing Christianity among the Anglo-Saxons. His feast day was originally 24 February, but changed to 25 February.
Leave your email address to receive Kent Past Times free every month |
Stratum I. Three cupmarks hewn in chalk bedrock were exposed in the northern part of the excavation area. Worn fragments of two jars, dating to EB I, were discovered on the cupmarks. It seems that these finds belonged to the beginning of the settlement at the site.
Stratum II. A well-constructed wall (W2), built of flat medium-sized limestone and oriented northwest-southeast, was exposed. Small fragments of mud bricks were discovered on W2, which apparently indicate that the stone wall was a foundation for a mud-brick superstructure that was not preserved.
Stratum III. A massive wall (W1; exposed length 3 m, width 1 m, preserved height 0.7 m), built of flat medium-sized limestone and aligned northwest-southeast, was uncovered. Construction of small and medium fieldstones was exposed in the northwestern part of the wall. Another wall (W3), perpendicular to and abutting W1, was also built of flat medium-sized fieldstones. Extremely worn potsherds were exposed while excavating the walls, including jars, cooking pots and small bowls, which dated to the end of the Roman and the beginning of the Byzantine periods. In addition, numerous fragments of roof tiles that are known from churches dating to the Byzantine period were discovered in the excavation. A bell-shaped cistern hewn in the chalk bedrock (L103; max. diam. 2 m, depth c. 2 m; see Fig. 1: Section 1-1) was also exposed in the square. A stone shaft (height c. 1 m) covered with four flat stones (0.3 × 0.5 × 1.0 m) was built above the hewn opening of the cistern (diam. 0.8 m).
Stratum IV. A soil accumulation (thickness 0.7 m) that covered the wall remains and cistern was exposed. Numerous potsherds dating to the Early and Middle Bronze Ages, the Iron Age, and the Hellenistic, Roman and Byzantine periods were mixed in the soil. Among the ceramic artifacts was a handle of a Rhodian amphora bearing a worn stamped impression, on which the letter M is legible, which is characteristic of the Hellenistic period. The potsherds had been swept here over the years and they represent the periods when the tell was occupied. |
Start Button On Computer? Where is the Start Menu?
When I started to help some friends and family with their computer skills one of the first questions they asked was, “What is a start button?”
That is when I realized I need to slow down, because some of the computer stuff maybe second nature to me! It hardly is the case with the person I was speaking to.
The Start Button and the Start Menu are something you will be using on a regular basis when using your computer.
Today’s How-To Guide for the Computer beginning is: What is the start button? Where is the Start Menu?
What is a Start Button
windows-7-start-buttonThis is what the Windows 7 Start Button looks like
This is the Windows Vista Start Button
The had a awesome picture of different start buttons you might see on your computer! Same principal as above!
What is a Start Menu?
When you click on one of the above start buttons? The START MENU will appear.
This would be a Windows 7 Start menu.
You would see this AFTER you click the start button.
Vista start menu
Again you see this AFTER you click on the Vista Start Button
This the same with Windows XP start menu.
Notice the cursor clicked on the start button in this picture!
This is the same principal with older operating systems like Windows 98.
Once you click that start button? You start menu will appear.
If something is not clear, or you feel something should be added to our lesson? Please feel free to leave your comment or question in section we provided. Remember! I can also learn from the computer beginner!
Thank you for reading out How-To Guide for the Computer Beginner on start button and start menus!!
No comments for "Start Button On Computer? Where is the Start Menu?" |
According to Spencer, the term amixsak refers to any skin covering, such as the covering of an umiak or kayak. A modern Yupik dictionary gives amiq as meaning “skin” and amirkaq as a sealskin ready for use; the latter may be a more correct term.
When hunting a walrus, it is traditional to butcher the carcass on the ice and take as much as possible back home. If any amount of meat and skin has to be abandoned, the carcass must be given fresh water to drink and the skin must be dissected. If the skin is left behind on the ice, it will sink and become an amixsak, a vengeful monster. An amixsak will come up under an umiak, reach its flippers over the gunwales, and pull the boat under.
Removing the skin covering the flippers on a carcass prevents this danger.
Spencer, R. F. (1959) The North Alaskan Eskimo; a study in ecology and society. United States Government Printing Office, Washington.
Variations: Fireball
The Itqiirpak or Fireball is a creature from Alaskan Yupik folklore, notably from the Scammon Bay area. It appears as a crimson fireball flickering in the West over the sea, or, more alarmingly, as a big hand from the ocean with a mouth on each fingertip and a single large mouth in the palm of the hand.
An itqiirpak is a bad omen. It appears before terrible disasters, or it disposes of troublemakers directly.
A male itqiirpak was said to have burned through the entrance of a qasgiq (men’s house) and killed bad-mannered children there. It caught the children and dragged them out to eat them; all that could be heard was the crunching of their bones as the itqiirpak devoured them. When the men returned they saw the itqiirpak jumping up and down on the ice, looking like a fire. The monster was then slain by the men who left a swinging blade-trap for it. The female-hand remained at large and appeared whenever people were to die.
More modern itqiirpak stories tell of the fireball appearing before tragedies in the community, such as the drowning of two children in the Kun River in 2007. Simon saw the itqiirpak as a metaphor for tragedy and a cultural explanation for inexplicable tragedy.
Simon, K. A. The Meaning and Use of Narratives in a Central Yup’ik Community: The Scammon Bay ‘Fireball Story’. In Daveluy, M.; Lévesque, F.; and Ferguson, J. (eds.) (2011) Humanizing Security in the Arctic. CCI Press, Edmonton.
Variations: Giant Mouse
The giant mouse Ugjuknarpak once lived on an island in the middle of a long, narrow lake near the source of the Colville River in Alaska. It was like a field mouse in appearance, but it had impenetrable skin. So thick and hard was its hide that even the largest harpoons, knives, and arrows could not penetrate it. It was also armed with a long, prehensile tail that it coiled around its prey.
The Inuit traveling to Nerleq to trade with the people of Point Barrow lived in constant fear of the Ugjuknarpak. If anyone made the slightest sound in the vicinity of the island, the giant mouse would pounce upon them, grabbing and capsizing the umiaqs with its long tail before biting the people to death and devouring them.
Trade slowed as the Ugjuknarpak continued its depredations. But it could not be avoided, as the people needed to go down the river to buy blubber on the coast, and return before the river froze in order to hunt caribou.
One day a man, fearing for his daughter’s life, decided to put her on an umiaq separate from the main fleet. This one had few people and fewer dogs and babies that might make sounds. He himself took one of the more crowded umiaqs – and his fear was realized. Along the way a dog snarled a little, and the Ugjuknarpak pricked up its ears and fell upon the boats. The girl, on the other hand, had passed ahead in safety. She never saw her parents and brothers again, and she knew that the giant mouse had killed them.
In time the girl was married and had a son of her own. As soon as he could understand, his mother told him “you are now a boy, and you will become a man, but you will never be strong enough to avenge your parents and uncles”. She did this knowing that, far from being discouraged, the boy would be goaded into slaying Ugjuknarpak.
The boy grew into a tall and powerful young man and took the name of Kugshavak, “Woodpecker”. He was soon joined by his brother Hagáneq, “Fellow”, a boy with hands like the flippers of a bearded seal. He too was motivated to avenge his fallen kin.
The brothers had adventures together and performed great feats, until the day came when they set out to slay Ugjuknarpak. They set out in the early morning and reached the island silently. Ugjuknarpak was just waking up and yawning, its jaws so big the brothers could see the dawn through them. Woodpecker paddled around the island in his umiaq while Fellow swam alongside him with the ease of a seal.
Ugjuknarpak soon noticed them and set off in pursuit. The brothers led it to a plain by the river. There they dodged its every lunge and bite while studying it, and finally noticed that its skin crinkled at one place on its neck. That must be its weak spot. Armed with flint knives on long spears, they stabbed the giant mouse as its fury redoubled. The brothers pressed their attack on the weakened, bleeding monster until at last it collapsed and died. The brothers found many broken knives and arrowheads in its skin, witnesses to Ugjuknarpak’s resilience.
The head was severed along the neck’s weak spot. It was taken to Ivnaq, a place on the river where all umiaqs could see it as they passed by. The head decayed, but it is still terrifying to see; it is the size of a walrus’s head, with long fangs and a long gristly nose like that of a field mouse. It lost none of the terror it once inspired. Those paddling by it speak in whispers and tie their dogs’ noses so they make no sound.
Ostermann, H.; Calvert, W. E. trans. (1952) The Alaskan Eskimos as Described in the Posthumous Notes of Dr. Knud Rasmussen. Gyldendalske Boghandel, Nordisk Forlag, Copenhagen.
Kăk-whăn’-û-ghăt Kǐg-û-lu’-nǐk
Variations: Akhlut (erroneously)
Around the coastlines of the Bering Strait, pack ice constantly breaks off and floats away. If there are wolf tracks on the ice, and a chunk of that breaks loose, then it looks as if the prints lead into the water’s edge, or as if a wolf came out of the sea. Yupik folklore holds that this is evidence of the Kăk-whăn’-û-ghăt Kǐg-û-lu’-nǐk.
A kăk-whăn’-û-ghăt kǐg-û-lu’-nǐk is a killer whale (akh’-lut) that can shapeshift at will into a wolf (kǐg-û-lu’-nǐk) to hunt on land. The name of kăk-whăn’-û-ghăt kǐg-û-lu’-nǐk is applied to those creatures when in wolf form. They are aggressive and will kill humans if given the chance.
The kăk-whăn’-û-ghăt kǐg-û-lu’-nǐk is typically depicted as halfway through its transformation – whale at one end and wolf at the other. The beluga whale and caribou are a similarly symbiotic pair, becoming a whale in the sea and a reindeer on land.
Long ago, the Yukon and Kuskokwim rivers were far warmer than they are today, and the winters shorter, with the snow melting and the birds returning as early as February. This allowed for large stretches of creeks, lakes, and marshland, and the Păl-raí-yûk haunted the waterways between the two rivers. They were most common around the temperate Kuskokwim, and they fed on humans and animals alike.
Păl-raí-yûk was one of Raven’s many creations, one that would lie in wait, submerged, to attack anyone coming to the water’s edge. It would also attack boats that entered its territory. For this reason Raven warned First Man to be cautious about approaching lakes and rivers.
The păl-raí-yûk has been compared to the crocodile or alligator, which it resembles in both form and habit, but it is also very similar to the muskox. It is typically represented on umiaks, masks, and dishes as an elongated, stylized reptilian creature with a long, narrow head and six legs. “Cutaway views” above the legs show human remains, indicating the grisly nature of its meals. One păl-raí-yûk that was killed by the Sky People had six legs, the hind ones long, the fore ones short, and the small middle ones hanging from the abdomen. It had small eyes and fine, dense, very dark fur on its body, like that of a shrew, that was longest on its feet. A pair of horns, extending forward, out, and curving back, are present on the head.
Păl-raí-yûk are large and bulky, but can lie on grass without bending the stems. On the other hand, a dead păl-raí-yûk would become so heavy that its body would sink into the ground if not supported. Many hunters were usually required to kill one, usually by holding it down with logs while smashing its head with clubs.
The last known păl-raí-yûk was slain by a hunter after it killed and ate his wife who was fetching water from a lake.
Variations: Quiquern
Az’-i-wû-gûm Ki-mukh’-ti
Variations: Walrus Dog
Az’-i-wû-gûm Ki-mukh’-ti, the “Walrus Dog”, can be found roaming the rugged coastlines of Alaska. While not walrus-like, it lives with herds of walrus and acts as a protector of sorts. It is one of Raven’s many creations.
An az’-i-wû-gûm ki-mukh’-ti is rather like a large dog in general appearance, smaller than a walrus, elongate and slender, with a long, powerful rounded tail. Its body is covered with tough black scales which make it impervious to all but the best spears.
Walrus hunters in the Bering strait fear the az’-i-wû-gûm ki-mukh’-ti. Its muscular tail can easily kill a man, and at least one case is known of a walrus dog attacking an umiak and killing all aboard.
Variations: Ă-mi’-kuk, Ä-mi’-kuk
Kayakers in the cold seas of the Arctic Circle are the A-mi’-kuk’s favorite prey. The last thing they see are the a-mi’-kuk’s prehensile tentacles exploding from under the surface and wrapping around them, dragging both kayaker and boat under.
The a-mi’-kuk is large, leathery-skinned, and slimy. Its four long tentacular arms are used for seizing prey and swimming rapidly through the water. There is no escaping it – it will follow prey taking refuge on ice by swimming below it and bursting out onto the surface. Making for land is equally futile, as the a-mi’-kuk can swim through the earth with as much ease as it does through water.
A-mi’-kuks around St. Michael, Alaska, are known to migrate underground to inland lakes. The presence of one is a good sign for the lake. When an a-mi’-kuk leaves its lake, the channel it digs drains it dry, but when it returns the sea returns with it.
Nelson proposed the octopus as the origin of the a-mi’-kuk. He also gives ä-mi’-kuk as the name of the sea otter; what bearing this has on the legendary creature is unknown.
Nelson, E. W. (1887) Report upon Natural History Collections Made in Alaska Between the Years 1877 and 1881. Arctic Series of Publications Issued in Connection with the Signal Service, Government Printing Office, Washington.
|
Peritoneal Dialysis (PD) Modalities
Peritoneal dialysis can be performed manually or via automated systems. Manual PD is termed continuous ambulatory peritoneal dialysis (CAPD). Automated peritoneal dialysis (APD) can be performed as continuous cyclic peritoneal dialysis (CCPD), intermittent peritoneal dialysis (IPD), tidal peritoneal dialysis (TPD), or continuous flow PD (CFPD)1,2. The PD Plus modality uses both manual and automated exchanges.
Continuous ambulatory peritoneal dialysis (CAPD)
CAPD was introduced in 1976 by Popovich and Moncrief3 and later modified by Oreopoulos4 as a wearable and portable form of dialysis, not requiring any equipment other than the disposable solution bags and a line to connect the bag to the patient’s catheter. CAPD was based on the concept of equilibrium dialysis. Briefly stated, when 2 liters of dialysis solution are infused into the peritoneal cavity of an average adult and allowed to dwell for 4 – 6 hours, there is virtual equilibration of the concentration of small solutes between plasma and dialysate (D/P = 1). It was theoretically predicted that an average size anuric patient would maintain a steady-state blood urea nitrogen (BUN) of approximately 28 mmol/L using CAPD and capable of achieving 10 L of equilibrated effluent. This led to widespread use of the standard CAPD regimen consisting of 4-5, 2-L exchanges/day (Figure 1). The procedure involves the infusion of the solution (approximately 10 min), a dwell period (3-6 hours) and drainage of the dialysate (10 – 20 min)5,6.
Due to variation in patient size and body composition, they might not be able to achieve enough solute clearance per day with the standard CAPD prescription. They may thus require more, frequent exchanges or larger infusion volumes5.
The simplicity of CAPD, its low cost, and the associated freedom from machines made CAPD a very popular form of chronic PD. In addition, CAPD can maintain a steady physiological state, control fluid volume and blood pressure in most patients7.
Continuous cyclic peritoneal dialysis (CCPD)
This modality of automated peritoneal dialysis (APD) was introduced in the late 1970s with the aims of achieving higher solute and fluid removal compared to CAPD and to automate the procedure with a simple cycler while the patient sleeps8. The system gained immediate popularity to treat infants and children. CCPD allows greater flexibility in the number and volume of exchanges during the night without taxing the patients’ time. Larger volumes are also better tolerated in the supine position. All connections and preparation of equipment usually takes place at bedtime. Consequently, there is better control of the environment and less patient fatigue. CCPD minimizes direct contact between patient and connections compared to CAPD, reducing the risk of touch contamination9,10–12.The typical prescription consists of three to four exchanges during the night of volumes between 2 and 3 L each. In addition, there is a long day dwell with 1.5 to 2 L of dialysate (figure 2)5.
Intermittent peritoneal dialysis (IPD)
IPD was the first APD modality for chronic use. It remained popular until the 1980s when more effective forms of PD were introduced. IPD generally consists of frequent, short cycles performed over 8 – 10 hours per session, three times weekly5. The peritoneal cavity was drained and “dry” between sessions. If IPD is practiced on a nightly basis only, it is referred to as nocturnal IPD (NIPD). The principal disadvantages of IPD are limited solute removal, especially of larger solutes and high cost due to large volumes of solution. NIPD is mostly reserved for patients with high solute transport and limited ultrafiltration, since the short cycles of NIPD can achieve better ultrafiltration than the longer cycles of CAPD or CCPD. The total volume of dialysis fluid exchanged per treatment ranges between 8 L and 12 L6,13. The regimen for NIPD is shown in figure 314.
PD Plus (figure 4) comprises CCPD with an additional exchange during the late afternoon or evening5. There are 3 or 4 exchanges at night, with 2 to 3 L per exchange for a total of 8 to 10 hours. The long daytime dwell is divided into two shorter exchanges that may be performed manually or can be cycler assisted. The interruption of the long diurnal dwell of CCPD can improve both clearance and ultrafiltration. PD Plus limits daytime exchanges to less than 7 hours. This exchange is also commonly referred to as a “pause”. Another benefit of this modality is that it makes use of lower volume day exchanges to improve patient comfort and larger exchange volumes in the supine position at night. PD Plus is indicated for larger patients, high transporters, and anuric patients.
Tidal peritoneal dialysis (TPD)
Tidal peritoneal dialysis (TPD) consists of an initial infusion of dialysate followed by a variable dwell and partial drain of the solution, leaving a residual volume in the peritoneal cavity until the final drain5. A tide is created during the partial infusions and drains that are performed. The initial fill is usually in the range of 2.0 to 2.5 L. The cavity is then partially drained where approximately 50% of the dialysate is drained, leaving a reserve volume. The cavity is then refilled. This is repeated until the end of the session when the cavity is completely drained. The cavity may be refilled for the daytime exchange. The principal purpose of TPD was to enhance clearance of small solutes by reducing the normal loss of dialytic time that is associated with the inflow and drainage of solution of the intermittent technique. Unfortunately, clinical experiences with TPD have not confirmed any advantage over APD in terms of clearance or ultrafiltration. Tidal PD may be useful for patients with inflow outflow pain, as well as those with slow drainage or multiple alarms due to drainage problems. The main disadvantages of TPD are its increased cost and complexity. The typical regimen is shown in figure 5.
Continuous flow peritoneal dialysis (CFPD)
CFPD is a modality of PD that uses the continuous technique and two separate catheters or a double lumen catheter15,16. This technique is performed with high dialysate flow rates and can help to reduce nondialytic time and maintain a constant intra-abdominal volume. PD fluid is infused into the peritoneal cavity through an inflow catheter while the outflow catheter is clamped. Once the desired fill volume is achieved, the outflow catheter is opened and the inflow and outflow are maintained relatively constant at high flow rates (150 – 250 mL/min)5. CFPD requires very large volumes of PD solution. Since it is impractical and economically prohibitive to use dialysis bags, several methods have been employed to solve this problem. Spent dialysate can be regenerated with hemodialysis technology. In other words, spent peritoneal dialysis solution is being “hemodialyzed”, instead of plasma water. Peritoneal dialysate can also be regenerated using sorbent technology. On-line generation of fluid is possible using hemodiafiltration technology or by mixing a concentrate with pure water. Potential advantages of CFPD include very high clearances, possible reduction in peritonitis and sustained ultrafiltration. While there has been much interest in CFPD for many years, the requirements of special peritoneal access and large volumes of solution have impeded its clinical application7.
1. Heimbürger O, Blake PG. Apparatus for Peritoneal Dialysis. In: Daugirdas JT, Blake PG, Ing TS, eds. Handbook of Dialysis. 4th ed. Philadelphia: Lippincott Williams & Wilkins; 2007:339-355.
2. Popovich RPP, Moncrief JWW, Nolph KDD, Ghods AJJ, Twardowski ZJJ, Pyle WKK. Continuous ambulatory peritoneal dialysis. 1978. J Am Soc Nephrol. 1999;10(4):901-10.
3. Moncrief JW, Popovich RP, Nolph KD. The history and current status of continuous ambulatory peritoneal dialysis. Am J Kidney Dis. 1990;16(6):579-84.
4. Oreopoulos DG, Robson M, Izatt S, Clayton S, deVeber GA. A simple and safe technique for continuous ambulatory peritoneal dialysis (CAPD). Trans Am Soc Artif Intern Organs. 1978;24:484-9.
5. Diaz-Buxo JA. Clinical Use of Peritoneal Dialysis. In: Nissenson AR, Fine RN, eds. Clinical Dialysis. 4th ed. New York: McGraw-Hill Medical Publication; 2005:421-490.
6. Mujais S, Childers RW. Profiles of automated peritoneal dialysis prescriptions in the US 1997-2003. Kidney Int Suppl. 2006;(103):S84-90.
8. Diaz-Buxo JA, Farmer CD, Walker PJ, Chandler JT, Holt KL. Continuous cyclic peritoneal dialysis: a preliminary report. Artif Organs. 1981;5(2):157-61.
9. Warady BA, Campoy SF, Gross SP, Sedman AB. Peritonitis with continuous ambulatory peritoneal dialysis and continuous cycling peritoneal dialysis. J Pediatr. 1984;105(5):726-30.
10. Howard RL, Millspaugh J TI. Adults and pediatric peritonitis in a home dialysis program (Comparison of continuous ambulatory and continuous cycling peritoneal dialysis). Am J Kid Dis. 1990;16:469-472.
11. Troidle LK, Gorban-Brennan N, Kliger AS FF. Continuous cycler therapy, manual peritoneal dialysis therapy, and peritonitis. Adv Perit Dial. 1998;14:137-141.
12. Viglino G, Gandolfo C, Vigra G CP. Role of automated peritoneal dialysis within a peritoneal dialysis program. Adv Perit Dial. 1995;11:134-138.
13. Gahl GM, Jörres A. Nightly intermittent peritoneal dialysis: targets and prescriptions. Perit Dial Int. 2000;20 Suppl 2:S89-92.
14. Woodrow G, Turney JH, Cook JA, Gibson J, Fletcher S, Stewart AJ, Brownjohn AM. Nocturnal intermittent peritoneal dialysis. Nephrol Dial Transplant. 1994;9(4):399-403.
15. Shinaberger JH, Shear L, Barry KG. Peritoneal-extracorporeal recirculation dialysis; a technique for improving efficiency of peritoneal dialysis. Invest Urol. 1965;2:555-66.
16. Diaz-Buxo JA. Evolution of continuous flow peritoneal dialysis and the current state of the art. Semin Dial. 2001;14(5):373-7.
P/N 102483-01 Rev. A 12/2014 |
Safdarjung Tomb : Photo Essay
The structure is made of marble and and red sandstone quite pleasing in appearance.
The Safdarjung Tomb is dedicated to Mirza Muqeem Abul-Mansur Khan, who was also known as Safdarjung. The tomb was built by his son in 1754 and is special because it was the last building to be constructed in the same fashion as Humayun’s Tomb.
It stands in the middle of a large garden and is divided in a square shaped pattern–quite like a char-bagh
The tomb has tanks and fountains dotting the central pathway. It has a gate on the east and is surrounded by pavilions on its other three sides. It is a double storied square structure built on a platform of a raised terrace.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Bach's Coffee Cantata
Cantata: Schweigt stille, plaudert nicht (“Coffee Cantata”), BWV 211
Coffee! In Arab culture, if men did not bring home enough coffee, their wives could legally divorce them. As a coffee lover, I read this a long time ago. Of course, coffee lovers know, of course, that marriages were ending, as it must have been quite expensive back then. Balzac also drank 50 cups of coffee a day. You heard right 50 🙂 Now I seem to hear from you as well, that you say I drink 4-5 glasses too.
Yes, let's talk about today's adventure of coffee with such legendary stories, its generations, how it feels, how it is brewed.
Bach never composed an opera in his lifetime. Church music composers of the 18th century, including Johann Sebastian Bach, were criticized for using theatrical works in sacred texts. It was also stated in the content of the employment contract that Bach made as cantor in Leipzig that there should be no opera-like works. Church-going people were not supposed to be affected by the dramatic changes in mood in the music.
Germany was going through the Baroque Age during the time of Johann Sebastian Bach. This was an age where all attention was paid to details and worked delicately. Artists were chasing their dreams and were starting to get rid of the influence of the church. The nobles formed their own orchestras and began to support the artists. If we enter the counterpoint technique and harmonic structure in music here, I will not go into it at all, since we will get very far from the subject. But the most important composer of the period, even Bach, who left historical traces on the development of music, still continues to take its place in thousands of documents.
The family from which Johann Sebastian Bach came was both religious and profane. He was entrusted to his elder brother Christoph after his mother and father died at the age of 10, and he took the education of his brother Bach, who was an organist, very seriously and educated him very well. He studied night after night copying the notes in his brother's library. He did not sleep, copied, copied, wrote and wrote again…
Bach has been an organist, concertmaster, kappelmeister since the age of 14, but as I mentioned above, he never composed any opera. In addition to this, he composed 65 works during his lifetime (1128 years). He has 23 more lost or incomplete works.
Among his best-known compositions are The Well-Tempered Clavier, Toccata and Fugue in D minor, Air on the G String, Goldberg Variations, Brandenburg Concertos and many more that I can't remember. It is an opinion in the sources that Bach listened to opera during his trips to Hamburg and Dresden and we see its effects in his works. Wachet! bet! bet! wachet! (BWV 70) We can feel the cantata and bach's dialogues in the Easter Oratorio, as well as the theatrical reflections in the coffee cantata.
The most logical explanation for why Bach did not compose a stage work during his lifetime is thought to be that he never lived in a big city and was never in a courtroom or an opera house. Despite this, Bach was an extremely hardworking, prolific composer, relentlessly composing for churches and venues where he worked.
What about Coffee Cantata?
Coffee came to Germany for the first time in 1670 and in 1694 the first coffee place was opened in Leipzig. People, travelers and traders started to exchange ideas in these coffee-drinking places and it attracted a lot of attention. So much so that Bach composed secular music for these people.
In the light of all the information above, I wanted to write to you in this month's article about one of Bach's 1128 works, "The Coffee Cantata," which is one of my favorite works. Of course, this is also related to the fact that I am a coffee lover, too. This little funny operetta written by Bach for coffee addicts, we can call this Cantata, is actually a humorous and non-religious work, although Bach is a composer who writes sacred works. It shows that he has a creative personality that he can give.
Schweigt stile, plaudert nicht' ('Calm down, stop babbling') was probably first performed in a coffeehouse in Leipzig. It was between 1732 and 1734 when the Coffee Cantata was performed for the first time. If today's musicologists or music lovers had listened then, they would have considered it as a mini opera similar to Opera Buffa.
If you have not listened to it yet, I recommend you to listen to this delightful piece. I love to listen to this delightful piece from Emma Kirkby, Soprano Character and David Thomas as Bass Character, and Decca Record Company of 1987 with Rogers Covey voicing Tenor Character.
I wish everyone a healthy, pleasant day with the smell and taste of coffee, and happy reading.
Your email address Will not be published. |
Eating Disorder
downloadDownload printPrint
Pssst… we can write an original essay just for you.
Get your price
121 writers online
Download PDF
The three main causes for both anorexia and bulimia are psychological, biological, and environmental factors. The biological causes can affect people with first-degree relatives with an eating disorder. Those people may be more likely to develop an eating disorder, suggesting a possible genetic link. Although it’s not yet clear which genes are involved, there may be genetic changes that make some people more vulnerable to developing eating disorders.
Some people may have a genetic tendency toward perfectionism, sensitivity and perseverance, which are all traits associated with anorexia and bulimia. It’s also possible that a deficiency in the brain chemical serotonin may play a role. Being overweight as a child or teen may increase the risk. Scientists are still researching possible biochemical or biological causes of eating disorders. In some individuals with eating disorders, certain chemicals in the brain that control hunger, appetite, and digestion have been found to be unbalanced.
The exact meaning and implications of these imbalances remains under investigation. Studies done by B. Engel, N.S. Reiss, and M. Dombeck (2007) suggest that the hypothalamus of bulimics may not trigger a normal satiation response, feeling full or finished, so even after a meal these individuals do not feel full. The binge behavior of bulimics may also be a response to low serotonin levels in the brain. Serotonin affects mood and social behavior, appetite and digestion, sleep, memory, sexual desire, and function. Researchers in London found that anorexics have an overproduction of serotonin, which can cause a continual state of severe stress and anxiety. Reducing their intake of calories, which in turn leads to decreased levels of serotonin in the brain, may result in a sense of calmness. Anorexia nervosa can cause altered levels of dopamine in their brains.
Dopamine disturbances can cause hyperactivity, repetition of behavior, and a decreased sense of pleasure. This neurotransmitter also affects reward-motivated behavior. Improper levels of dopamine may explain why anorexics feel intensely driven to lose weight yet feel little pleasure in shedding pounds. Stress triggers the production and release of a hormone called cortisol. Increased cortisol levels results in decreased appetite. Biological factors are just one of the causes related to eating disorders. Psychological and emotional issues, such as anxiety disorder or low self-esteem, can contribute to eating disorders.
Those with eating disorder experience feelings of inadequacy or lack of control in life, depression, anxiety, anger, stress or loneliness. Interpersonal problems such as troubled personal relationships, difficulty expressing emotions and feelings, history of being teased or ridiculed based on size, and a history of physical or sexual abuse can all cause eating disorders. Individuals with eating disorders are often lack the skills to tolerate negative experiences. K. Westin (2015) explains that behaviors such as restricting, purging, binging and excessive exercise often develop as a response to emotional pain, conflict, low self-esteem, anxiety, depression, stress or trauma. In the absence of more positive coping skills, the eating disorder behaviors may provide acute relief from distress but quickly lead to more physical and psychological harm. Instead of helping the eating disorder, these behaviors only serve to continue a dangerous cycle of emotional dysregulation and numbing feelings. These types of physiological effects can be a huge contributor to the causes of an eating disorder. The environmental pressure fuels a desire to be thin. Using media and television, the modern Western culture emphasizes thinness. Success and worth are often equated with being thin.
Cultural pressures that glorifies thinness or muscularity and place value on obtaining the perfect body image leads to eating disorders. The narrow definitions of beauty that include only women and men of specific body weights and shapes contribute to the unhealthy view of weight in the modern world. Today, people value others based on physical appearance and not inner qualities and strengths. An average US child watches 15-20 hours of television per week and is thus bombarded with approximately 30,000 television commercials each year. In these television images, approximately 23% of the female characters are underweight (Engel, B., Reiss, N. S., & Dombeck, M., 2007). Thus, they often begin to believe that being thin makes them popular, successful and happy. The media presents a highly idealized and very much unrealistic fantasy version of reality. These environmental pressures cause viewers to desire the thinness and fame they see all over the media, and thus are a major cause of eating disorders.
Remember: This is just a sample from a fellow student.
delivery Starting from 3 hours delivery
Find Free Essays
We provide you with original essay samples, perfect formatting and styling
Cite this Essay
Eating Disorder. (2019, February 27). GradesFixer. Retrieved October 27, 2021, from
“Eating Disorder.” GradesFixer, 27 Feb. 2019,
Eating Disorder [Internet]. GradesFixer. 2019 Feb 27 [cited 2021 Oct 27]. Available from:
copy to clipboard
get unique paper
*Public papers are open and may contain not unique content
download public sample
Please check your inbox.
thanks-icon Order now
Hi there!
Are you interested in getting a customized paper?
Check it out!
Haven't found the right essay?
Get an expert to write you the one you need!
Professional writers and researchers
Sources and citation are provided
3 hour delivery |
Multipurpose Internet Mail Extensions (MIME) [MIME]
Most email attachments are not text (ASCII) files. They may be graphical, audio, video, or word-processed files. A binary attachment must be converted by mimencode to a type of ASCII file. Otherwise it will not be supported by Internet email. The following steps are involved in the exchange of email attachments using MIME:
1. The sender specifies the name of the file to be attached to the mail message and may choose to identify the file type (graphics, video, sounds, etc.). As a rule, the receiving mail program will automatically identify the file type if it is not specified. The file name extension indicates the format, such as .jpg, .doc, or .wav.
2. If the attachment is binary or contains something other than ASCII characters, the sending program automatically converts it to ASCII. This process increases the size of the attachment, which is then sent along with the mail message to the recipient.
3. If the recipient’s mail program supports MIME, it converts the attachment back to its original binary format and pastes an icon or a line of text in the received mail message to represent the attached file. If the recipient selects that icon while in the mail program, the application program will run and will automatically display the attached file.
MIME, an Internet format defined by the Internet Engineering Task Force (IETF), prescribes a simple standardized way to represent and encode a variety of media types for transmission via Internet mail, including textual data in non-ASCII character sets. MIME extends RFC 822 in a manner that is simple, backward-compatible, and flexible.
RFC 822, the Internet standard for message formats, is used widely beyond the boundaries of the Internet itself. Most email traffic is limited to ASCII text, which is unable to define characters found in non-English text, audio, or graphical information. To use multimedia mail on the Internet, extensions to RFC 822 are required. The RFC 822 message format and the RFC 821 Simple Mail Transfer Protocol (SMTP) transport method limit message content to seven-bit ASCII characters. RFC 822 defines a message as a structured header followed by a single, monolithic text body. This format creates problems for multipart mixed media mail. SMTP limits the length of lines within message headers and bodies. RFC 1049 defines a mechanism for single-part nontext mail, and RFC 1154 provides a mechanism for multipart mail.
An RFC 822-compliant Internet message consists of two parts: the header and the body. The header consists of a series of field names and field bodies. A blank line marks the end of the header and the beginning of the body, which may consist exclusively of US-ASCII text.
RFC 1049 introduced a new header field, content- type, which marked the entire message body as containing a certain type of data. If a content-type field is not present, the body is assumed to be US-ASCII text. A problem with RFC 1049 is the lack of support for multipart mail. A message body can contain only one item other than text.
MIME defines a new content-type, multipart. It may be used to encapsulate multiple body parts within a single RFC 822 message body. MIME describes the set of allowable content types, defines a subtype mechanism for content- types, and provides for standardized encoding of non-ASCII data.
The MIME format defines seven valid content types. In this way it differs from RFC 1049, which allowed users to define new content types freely. The seven defined content-type values are as follows:
1. Text: The default subtype is plain text, with other subtypes associated with particular rich text formats. MIME defines the subtype richtext for formatted email.
2. Image: Subtypes are image format names, image/gif and image/jpeg. A mail reader that does not identify an image format will at least recognize that the content is an image.
3. Audio: Subtypes are audio format names; audio/basic is the default. Audio/basic denotes single-channel 8-kHz a-law audio data, which is the equivalent of pulse code modulation (PCM), for telephone-quality audio attached to email.
4. Video: Subtypes are video format names; video/mpeg is the default.
5. Message: This content-type is used to encapsulate an entire RFC 822 format message. There are two message subtypes: message/partial for dividing a message into several pieces for transport and message/ external-body for passing a large message body by reference, rather than including its entire contents within the message.
6. Multipart: This content-type is used to pack several parts of various types and subtypes into a single RFC 822 message body.
7. Application: This content-type is used for most other kinds of data that do not fit these categories.
If Internet mail transport (SMTP, as described by RFC 821) were upgraded to permit arbitrary binary data of unlimited length in message bodies, encoding a message for transport would not be necessary. The Internet Architecture Board (IAB) RFC 1341 defining MIME has been superseded by RFC 1521.
The MIME Types table lists MIME content types supported by most web servers and identifies their file extensions. |
What Is a Dead Trademark?
By Brette Sember, J.D.
What Is a Dead Trademark?
By Brette Sember, J.D.
A trademark is a word, phrase, symbol, and/or design that's used to distinguish one product from another. Trademarks do not have to be registered with the U.S. Patent and Trademark Office (USPTO), but registration makes enforcement easier. A registered trademark is entitled to have the symbol ® after its name.
Pen hovering over many large words related to trademarks
An unregistered trademark is enforceable under a law called the Lanham Act. When a person or company owns a trademark—registered or unregistered—they can enforce it, making sure no one else uses it. A trademark does not expire but can become dead for several reasons. When a trademark is dead, it is no longer enforceable from unauthorized use.
Ways a Trademark Can Die
There are several situations that can lead to the death of a trademark.
• Genericity. If a trademark becomes generic, it is no longer enforceable. This can happen when the general public starts to associate the trademark name with the actual product itself. Once this happens, the name is no longer uniquely referring to one brand from one company and the trademark is no longer enforceable. "Thermos" and "Cellophane" are examples of trademarks that became too generic. Companies such as Kleenex and Xerox struggled to keep their trademarks from becoming generic.
• Abandonment. If a trademark is abandoned by the owner, it dies. Abandonment happens with the owner stops using it with the intent to no longer use it. Usually, if a trademark has not been used for three years and the owner doesn't plan to use it again, it is considered abandoned.
• Improper licensing. A trademark owner can give someone else the right to use the trademark. This is called a license. It is the owner's responsibility to ensure the licensee is using the trademark properly and producing the product it is for. In this situation, quality control is important to protect the trademark. If the product is not properly produced to meet the standard of the trademarked item, it can kill the trademark. So for example, if you license your trademark for tires but the licensee makes defective tires that won't even stay on a car, the trademark would be dead.
• Assignment. Selling the mark without selling the product can be deadly. If a trademark is assigned to someone else but there is no accompanying sale of assets, the trademark may be killed by the assignment. For a trademark to be valid, it has to fulfill its purpose of identifying the product it was created for. For example, if you assigned your trademark for super-soft fleece jackets but didn't also sell the materials to make the fleeces, the trademark is not valid.
Enforcing a Dead Mark
Even if a trademark is dead, the owner may still be able to revive and enforce it. However, if the mark died through no fault of the owner's, it could still be valid. For example, if a mark was cancelled because the owner didn't respond to a snail mail request from the USPTO, the owner can revive the mark by proving he never received the notice. In general, if you're trying to revive a trademark, it's best to reapply—or apply, if it was not previously registered—for USPTO registration to protect it.
Zombie Trademarks
A trademark that died and is then resurrected by someone other than the original owner is called a zombie trademark. The new owner can benefit from whatever lingering recognition or goodwill is associated with the trademark, but courts decide this on a case-by-case basis by considering how much recognition and goodwill a mark actually has. If the trademark was recently abandoned and has a lot of recognition, courts may deny zombie ownership.
Trademarks are an important way to protect a product. Once you have a trademark, keeping it alive will allow your product to continue to be protected.
|
A Primer on Sustainable Agriculture
If you’re interested in knowing more about where your food comes from, you might have encountered a number of terms regarding non-conventional growing methods that are meant to be healthier for humans and the environment, and to deliver more nutritious and better tasting products. Understanding all of these different methods, certifications and labels, however, can be a challenge if you’re not sure what they mean, or how they differ. Although all of these terms have some degree of overlap, and are often used interchangeably (correctly or not) they do have principles that distinguish them from one another. Here are a few pointers to help you sort it all out, and hopefully cut down on some of the confusion.
is a broad term that refers to non-conventional methods of farming aiming to sustain or protect, rather than degrade natural systems that are fundamental to growing food, such as soil, water and air, and to support biodiversity. Sustainable farming seeks to maintain the quality of these resources, while at the same time seeking to maintain the productivity and profit of the farm itself, in a way that ensures its ability to continue operations.
indicates a method that goes a step further than sustainable farming in its objective to actively restore and improve these same systems, using technologies that restore damaged soil and help to mitigate climate change through carbon sequestration, or the process of removing carbon dioxide from the atmosphere. Besides reversing the warming of the planet, these practices have been shown to result in more nutrient dense food, greater yields, and an overall increase in farm productivity. Regenerative agriculture includes a variety of practices, including minimization of tilling, use of cover crops, composting, and managed grazing for livestock.
Tomas Hertogh
rejects the use of synthetic fertilizer or pesticide inputs on crops, or the use of antibiotics and growth hormones in the raising of livestock.
is an official government certification designating which specific fertilizers and other chemical inputs can or cannot be used in growing crops. Growers are required to document the practices required for the USDA Organic certification and pass periodic inspections in order to use the label. Labeling categories for organic products are explained on this USDA website.
1. 100% organic--products must be made up of 100 percent certified organic ingredients. The label must include the name of the certifying agent and may include the USDA Organic Seal and/or the 100 percent organic claim.
2. Organic— any product that has a minimum of 95% organic content by weight.
3. Made With Organic –at least 70 percent of the product must be certified organic ingredients.
4. Specific Organic Ingredients —Products with multiple ingredients and less than 70 percent certified organic content. These products use the USDA Organic Seal or use the word organic. They can list certified organic ingredients in the ingredient list and the percentage of organic ingredients.
is an indication that the plants or animals used in the food are not GMO. GMO stands for “Genetically Modified Organism, in which the genetic makeup has been altered in its production. To give an example, some plants have been genetically engineered to resist chemical inputs, so that herbicides can be applied to crops for weed control without killing the crop itself. The Non-GMO label is an indication that the food has been produced without such treatment. Certified organic products are non-GMO, because any use of GMO products would disqualify a food for organic certification. Non-GMO doesn’t necessarily mean that something is organic, however, because non-GMO foods might still involve non-organic inputs such as herbicides, pesticides, artificial flavorings, preservatives, etc.
Zoe Schaeffer
is not necessarily certified organic, “…but follows the principle of putting healthy soil biology first, and not using synthetic inputs–in essence, following organic protocols without the formal certification.” (Start Your Farm by Forrest Pritchard and Ellen Polishuk)
is a method introduced by Rudolph Steiner in the 1920’s, which integrates principles of organic agriculture with observation of the cosmos, using a calendar based on the position of the stars and the moon. It emphasizes nourishment of the soil to facilitate the healing of the earth and to achieve a balance between all living organisms on the planet.
is a term that was first coined by Bill Mollison in the 1970’s , and defined in this way: “The conscious design and maintenance of agriculturally productive systems which have the diversity, stability, and resilience of natural ecosystems. It is the harmonious integration of the landscape with people providing their food, energy, shelter and other material and non-material needs in a sustainable way.”There are 12 basic principles of permaculture, emphasizing observation and design, creating systems that are intended to function in harmony and partnership with nature, as opposed to dominance and control.
To learn more about these terms and the whole topic of sustainable agriculture, see the list of resources below.
Savory Institute
Rodale Institute
Regeneration International
Start Your Farm by Forrest Pritchard and Ellen Polishuk
The Good Dirt Podcast
Wisdom From the Wild with Doniga Markegard
Regenerative Agriculture with Arden Jones & Michael Grantz of Great Day Gardens
The Permaculture Handbook by Peter Bane
Practical Permaculture by Jessi Bloom and Dave Boehnlein
What is Biodynamics? A Way to Heal and Revitalize the Earth by Rudolph Steiner
Podcast: How to Save a Planet, Episode “The Dirty Climate Solution”
Tedx Talk with Gabe Brown/ Regeneration of Our Lands |
Back to Posts
Jun 10, 2020
God, ‘Why Have You Done This?’
Thomas Griffin
The single most consistent, critical and crucial cry toward God throughout the history of humanity during times of trial, challenge, and despair has been some form of the question: “Why have you done this to us?” (Luke 2:48). Implicit in this brutally honest statement is the accusation that if God truly loved us he would not allow natural disasters, pandemics, economic distress, bigotry, hatred, violence, destruction, and so on to occur.
The Catholic response to these questions has been debated, argued, and written about for centuries. In this current moment in our world, people are worried and they are posing similar concerns. The best manner of response to divine questions such as these is to dive into the words and actions of Jesus himself.
From the moment of Jesus’ Presentation in the Temple (Luke 2:22-38), eight days after his birth, until his public ministry begins with his baptism in the Jordan River (Matthew 3:13-17; Mark 1:9-11; Luke 3:21-22), we have one singular event recorded in the Bible which has become known as The Finding of the Boy Jesus in the Temple (Luke 2:41-52). Jesus and the Holy Family are making their way to Jerusalem for the feast of Passover, as prescribed each year for all Jews, and on their return home to Nazareth Jesus appears to be lost. For three days, Mary and Joseph go looking for Jesus until they finally discover him in the Temple with the teachers of the Law. We are told that Jesus is “listening and asking them questions,” (Luke 2:46).
In order to investigate these important questions we must follow the lead of the ones closest to Jesus. First, Joseph and Mary looked for Jesus “among their relatives and acquaintances” (Luke 2:44). When we are looking for God in the midst of trials it is imperative that we speak to the ones we care about the most and who love us the most: our family and friends. Often enough, the cry announcing God’s absence on the scene comes from a real reflection of the horrible nature of the present circumstances. There is something wrong that is confronting us, and this occurrence seems to have no disappearance in the near future. Therefore, this response is coming forth from a place of frustration toward a situation because the good does not seem to be winning.
Questioning God is a natural human response. Interrogatives are how we learn more about what we don’t know. Honest questions come from a place of desire to reflect and work out what seems to be inconsistent with one’s experience and knowledge of God. If Mary and Joseph wondered why this would happen to them, why Christ would seem to desert them when he knew that this would cause them grief, then it is a guarantee of the human journey to ask why moments in history are filled with what seems to be divine desertion.
Running toward the one we love first will allow our friends and family, who know us best and have our best interest at heart, to objectively examine whether a question is coming from a good place. They will also be the best people to steer us in the direction toward the answer. Loved ones can offer and provide insight that will undoubtedly echo the same sentiments of either current or previous frustration and doubt about God’s presence in the midst of challenging times. This is why God prescribes human beings to grow up in the social structure of a family and to worship him together in a community. We must rest our shoulders and bare our concerns to others because their presence and encouragement give us the strength to never give up.
Now, the answer is what everyone is looking for. Centuries of believers in the Judeo-Christian God have inquired how God can allow tragedies to go on and people to get hurt if he truly cares about us? The answer is not analogous to what we find on the other side of an equal sign in a math equation. The answer to supernatural questions is not as simple as measuring whether or not your family-worn couch will fit in the basement of your new home or even if the Yankees will win another World Series. Discipleship is not concerned with measurements or predictions in the future. The Christian faith is caught up in the gaze of God toward man.
Jesus’ Incarnation, birth, life, teachings, miracles, death, and resurrection contain the answer. The Finding of Jesus in the Temple provides a pivotal insight. Jesus’ response to why he would do this to Mary and Joseph is:
Luke 2:49
It is important to notice that he does not give a clear and concise answer; Jesus does not say, “Well I allowed you to suffer and worry about me over the last few days because I wanted to teach you a lesson and show you a moral,” or any other definitive type response. His answer to their question about why he appeared to leave them and why he allowed these circumstances to occur is with his own question: how did you not know that I am where my father is? Jesus’ answer is that he resides, and is himself, the presence of God. Christ provides a response, in his own words, to the questions found below:
1. Why do bad things happen to good people?
2. Why does God allow evil and suffering?
3. Where is God in the midst of this virus and this violence erupting across the globe?
The “response,” and I use that word specifically instead of the word “answer,” is to go where God’s presence is. To run to the Eucharist, the fulfillment of the Temple and the actual presence of God, and to thoughtfully and honestly pose our concerns to him. The questions above are universally posed, not just by this generation, but shouted forth by every person who ever has or whoever will exist.
The Answer
The problem of evil can be responded to through an in-depth understanding of original sin and the necessity for freedom in order for humanity to love, and, therefore, be like God who is love itself. However, Jesus does not quote Scripture and he does not say philosophy, although well-needed, is the correct recipe in response to evil. The response must be the pursuit of God’s presence. This can be confusing and unclear. Even Mary and Joseph, Luke noted, “did not understand what he said to them” (Luke 2:50). The issue is not our questions, but our need for a clearly explained answer that leaves us satisfied and convinced.
The key, the roadmap, can be found in the divine response of the twelve-year old Son of God that day in Jerusalem: bring everything to the Lord, nothing less than all of your worries, cares, fears, and questions will do. However, do not merely pose them in your head out of frustration and righteous anger; ask Christ your questions in the context of prayer, and ask them of his true presence in the Eucharist.
Look for Jesus, ask him everything, and be brought to the place that is not caught up in clear-cut answers, but on fire with the burning love of God for his children, whom he never abandons and continually responds to. Not just with wisdom and understanding, but with his very life and unwavering proximity which cries out to the world in dramatic fashion: my presence is the answer.
You May Also Like:
Mary’s May Crowning: Part 5, Finding Jesus
How Jesus Fixes Our Problem
Mary’s Choice at the Wedding Feast at Cana
Pocket Guide to Adoration [Book]
Thomas Griffin teaches apologetics in the Religion Department at a Catholic high school and lives on Long Island with his wife. He has a master’s degree in theology from St. Joseph’s Seminary and College along with a bachelor’s degree in theology and philosophy from Molloy College. Thomas has written for several online Catholic blogs. Follow his (and his twin brother’s) article posts and videos @CalledTwin.
Featured image of “Jesus among the doctors” (c. 1560) by Paolo Veronese sourced from Wikimedia Commons (license: {{PD-US-expired}})
Has Ascension's free media strengthened your faith?
Support Ascension
Get your favorite Ascension content sent right to your email!
• A quote from St. Augustine referencing bad things happening to good people. I found this quote to be a real eye opener especially in these current times.
“We] have no reason to believe that God is not almighty, just because the wicked do many things that are against his will. Because even when they do what he does not wish, he will himself do with them what he does wish. In no way, therefore, do they either change or defeat the will of the Almighty…. So he makes use of bad people in accordance, not with their warped will, but with his straight and true will…. Who could find the words to explain, or the praises to do justice to the immeasurable good conferred on us by the Passion of the Saviour, in which his blood was shed for the forgiveness of sins? And yet this stupendous good was achieved through the malice of the devil [and] the traitor Judas. Nor does justice require that they should be rewarded for the good that God has conferred through them on the human race; rather it is just that punishment should be meted out to them, since their will was to do harm.
But just as we have been able to find a case which would be manifest even to us of how God has made good use even of the bad works of the devil…and the traitor Judas for our redemption and salvation, so too in the hidden and secret recesses of the whole of creation, which neither our eyes nor our minds are sharp enough to penetrate, God knows how he makes good use of the bad, so that in everything that comes to be and is accomplished in the world the will of the Almighty may be fulfilled.”
Saint Augustine
• > |
While every initiative has to be made to follow citation style rules, there might be some discrepancies.Please refer to the ideal style hand-operated or other sources if friend have any questions.
You are watching: Which was a major effect of the fall of constantinople to the ottoman turks in 1453?
Corrections? Updates? Omissions? allow us recognize if you have actually suggestions to improve this write-up (requires login).
Our editors will review what did you do it submitted and determine even if it is to revise the article.
Join mmsanotherstage2019.com"s Publishing partner Program and our ar of experts to gain a worldwide audience for your work!
In the meantime, oriental Emperor Constantine XI Palaeologus entreated major powers in Christendom to aid him in the brewing siege. Hungary refuse to assist, and, instead of sending men, Pope Nicholas V experienced the precarious instance as an possibility to push for the reunification of the Orthodox and Roman Catholic churches, a priority the the papacy because 1054. Orthodox leader voted in favour of union, but the civilization of Constantinople were adamantly versus it and rioted in response. Armed forces support come from Venice and Genoa. An Ottoman strike on a Venetian delivery in the Bosporus triggered the Venetian Senate to send 800 troops and also 15 galleys come the oriental capital, and also many Venetians presently in Constantinople likewise chose to assistance the war effort, yet the mass of the Venetian forces were delayed for too long to it is in of any help. For Genoa’s part, the city-state sent 700 soldiers to Constantinople, all of whom come in January 1453 through Giovanni Giustiniani Longo at their head. Emperor Constantine XI called Giustiniani command of his land defenses and also spent the remainder of the winter increase the city because that a siege.
In the 15th century, Constantinople’s wall surfaces were widely known as the most formidable in every one of Europe. The soil walls spanned 4 mile (6.5 km) and consisted that a twin line that ramparts v a moat on the outside; the higher of the 2 stood together high together 40 feet (12 metres) through a base as much as 16 feet (5 metres) thick. These walls had actually never to be breached in the thousand years due to the fact that their construction. An adjoining sea wall surface ran along the gold Horn and the Sea the Marmara, the last section gift 20 feet (6 metres) high and also 5 mile (8 km) long. When linked with a huge metal chain that had been drawn across the golden Horn, Constantine to be confident the the city’s defenses could repel a marine assault and also withstand Mehmed’s land forces until relief came from Christian Europe. However, Constantine’s capacity to protect his city was hampered by his tiny fighting force. Eyewitness Jacopo Tedaldi approximates a presence of 30,000 to 35,000 equipped civilians and also only 6,000 to 7,000 trained soldiers. Giustiniani intended come concentrate many of these males at the land wall surfaces to the north and west, the centre of i m sorry he observed to be the most vulnerable section that the city. A tiny fleet the naval and also armed vendor vessels were additionally stationed in the golden Horn to defend the chain. However, without external support, Constantinople’s defenders would certainly be spread out thin.
The footrest besiegers vastly outnumbered the Byzantines and their allies. In between 60,000 and also 80,000 soldiers fought on land, add by 69 cannon. Baltaoğlu Süleyman Bey commanded a fleet stationed at Diplokionion with an approximated 31 large and midsize warships alongside practically 100 smaller sized boats and transports. Mehmed’s strategy to be straightforward: the would use his fleet and siege lines to blockade Constantinople on all sides while relentlessly damaging the walls of the city v cannon. He hope to breach lock or otherwise force a surrender prior to a Christian relief force might arrive.
On April 6 the Ottomans started their pho barrage and also brought under a ar of the wall. They an installed a frontal assault of the land walls on April 7, however the Byzantines repelled them and also were may be to repair the defenses. ~ pausing to reposition his cannon, Mehmed reopened fire and also thereafter maintained day-to-day bombardment.
On April 12 the sultan dispatched a arbitrarily of troops come subdue two surrounding Byzantine forts and ordered Baltaoğlu to sirloin the chain. The fleet was twice pushed back, and also Baltaoğlu retreated to Diplokionion until the night of the 17th, when he relocated to capture the Princes archipelago southeast of the city at the exact same time the Mehmed’s floor regiments struck the Mesoteichon ar of the wall. Constantinople’s defenders once again organized their ground, however, and Baltaoğlu’s success at the islands to be irreparably marred through the revelation that 3 relief ships indigenous the pope and also one huge Byzantine ship had almost reached the city unhindered. The ottoman galleys to be too short to record the high European warships, and, through the aid of the gold Horn fleet, the warships safe sailed previous the chain. ~ above hearing the his navy’s defeat, Mehmed stripped Baltaoğlu of his rank and arranged for his replacement.
Mehmed was determined to take the gold Horn and pressure the Byzantines into submission. That angled among his cannons such that it can strike the defenders that the chain and then started to construct an oiled wooden ramp ~ above which that intended come portage his smaller sized vessels from the Bosporus come the golden Horn. By April 22 the ships had actually circumvented the chain in this method and, impede the chain itself, seized control of all the waters neighboring the city. The defenders check to assault the remainder of the ottoman fleet in the Bosporus, however they to be defeated.
Having encircled Constantinople in full, Mehmed continued his pho barrage that the land walls through might 29. The footrest cannon produced several breaches, but most were also narrow to send troops through. The city’s defenders ongoing to fix the wall surfaces at night and reinforced locations at the damaged door of St. Romanus and the Blachernae sector. In the at an early stage hours of might 29, footrest labourers to fill the moat surrounding the city. Just before dawn, the sultan released a combination artillery, infantry, and also naval attack on Constantinople. 2 attempts to sirloin the gate of St. Romanus and also the Blachernae walls were met v fierce resistance, and also the ottoman soldiers were forced to loss back. Mehmed ordered a 3rd attack top top the gate, this time with among his own palace regiments that 3,000 Janissaries. A small group got to the top of a tower through one more gate but were practically eliminated by the defenders till Giustiniani to be mortally hurt by ottoman gunfire if on the ramparts. He was brought to the rear, and also his absence sowed confusion and also lowered morale amongst the ranks. This allowed the sultan come send in an additional Janissary regiment and also take the inner wall at the gate of St. Romanus.
See more: How Do You Say Strawberry In Italian, ˈStrɔˌBɛr I
A rout the the defenders ensued, with countless of the Venetian and Genoese battle aircraft retreating to your ships in the golden Horn. Emperor Constantine XI is reported to have been eliminated while either fighting close to the breach or fleeing to an escape boat. Return the sultan test to prevent a full sack of the city, he permitted an initial period of looting that witnessed the destruction of countless Orthodox churches. When many of Constantinople was secure, Mehmed himself rode v the roadways of the city come the an excellent cathedral of Hagia Sophia, the biggest in all of Christendom, and also converted it into the mosque Ayasofya. He stopped to pray and also then demanded that all further looting cease immediately. The sultan hence completed his occupation of the byzantine capital. |
Direct Messaging
Direct messaging is a type of communication between social media users that involves a sender and a receiver or recipient. Direct messaging is a private message because it goes directly from a sender to the inbox of the recipient. The direct message helps business owners to explain complex issues about a product to the customer, also in settling disputes that might have come up in the course of the business transactions.
The most commonly used social media platforms allow the use of Direct Messaging (DM), like Facebook, Twitter, Instagram, and so on. Despite allowing the use of direct messaging, each social media platform has its variation with regard to the method of operation and restrictions.
Some of the rules that govern the direct messaging of these social media platforms are;
1. On Facebook, before sending a direct message to a page, you’ll have to like the page. Liking the page gives you authenticity.
2. On Instagram, while using a direct message, be aware that you are bound to send a direct message to 15 people.
Direct Messaging
Direct Messaging
3. On Twitter, you’ll be allowed to send a direct message to up to 50 recipients, before which, you must have followed the people you are sending the direct message.
The above terms show that direct messaging is a very bright tool for marketing in this contemporary age. DM helps to build a bond between a business owner and customers. It sends a feeling of a bond because it is arranged in an intimate pattern that involves sending and receiving.
Using social media as a marketing tool is very good because social media helps to design a pattern that sustains businesses online. When a product is publicly eulogized on social media, it goes a long way in putting the business on a better side of the marketing system. Despite the positive and terrific praises that might be applauded when a product serves well, there might also be negative criticism about that same product. When a product is negatively criticized publicly, the business owner might apologize publicly for the inconveniences, but the DM helps the marketer and the customer to review the order, agree on a better solution and come to terms for the sake of future transactions.
For instance, when a transaction is done between a marketer and a customer, it is normal in this age of social media that such customer might go to the social media page of the marketing company to report a problem if there be any, might be on a Facebook post, tweet, Facebook wall or an Instagram post. It is necessary for the marketing company to reply via the same post or tweet, but the DM helps both parties in analyses, reviews, and agreements.
The best method of using a DM
Direct messaging is a very great tool for better business and social media life, but it has to be used appropriately in other to yield a better result. Below are some ethics that will help in Direct Messaging.
1. Use direct messages appropriately. When sending DMs to people, you should first of all think if they are the right recipients. Sending DMs without directions might demean the purpose of the message. If you are sending offers and promotions, it should be within the circle of those that are meant to receive it.
2. When using a DM in marketing, make sure you understand the customer’s needs, frequently asked questions, then prepare for them to make replying to them fast and easy. Your engagement and response speed place you in a better position in the marketing platform.
3. Be consistent in sending messages and replying messages. When using a DM, you should avoid unnecessary familiarity that might jeopardize the main purpose of the conversation or messages.
4. Respond to negative reviews through DM. When customers complain openly on social media sites, apologize publicly, but send them a DM quickly and solve the problem immediately.
5. Use direct messaging to interact with customers. The feeling of exchanging ideas with customers helps to keep you updated and also helps to improve customer experience.
6. Use DM to exchange private information. When demanding personal data on social media, the DM is the best avenue for such exchange of information.
7. Be careful when you are loaded with multiple messages. Before replying to a DM, make sure you are replying to the intended message, sometimes sending a wrong message to a customer can be disastrous to the business.
8. Create chatbots. To keep your customers busy, create a bot that will reply to messages that are not too serious, keep them busy as they help themselves out with the service, while you focus on more important messages.
Benefits of Direct Messaging
1. Using faxes and enveloped mails can possibly enter the wrong hands. Direct messaging increases the security of essential and critical information due to encryptions that go with direct messages and files which ensures that they can only be accessed by the intended recipient.
2. Using direct messaging helps to improve engagement and customer experience. It saves you and customers the stress of sending urgent content through e-mail or faxes.
3. Sending DMs to customers helps to build a bond between brand owners and their customers. This helps to uplift the brand’s reputation.
4. Direct messaging helps in accessing opportunities easily. It helps to communicate business partners easily, meet and communicate with influencers, and brand ambassador too.
Currently, the idea of direct messaging not only involves sending and receiving personal messages via social media houses like Facebook and Twitter. Recently, it has excelled with other developed applications such as Viber, hike, etc. In the year 2010, Facebook announced its new Facebook Messaging service, this messenger allowed users to send and receive personal messages to each other through the confinement of the Facebook site. Twitter moved in the same line with a speed of light and introduced their own form of direct messaging, this happens in the year 2013.
In this modern time, the direct messaging has moved from sending only letters, it now has the capability of sending a picture or video message. For instance, Snapchat is an app that gives users the liberty of sending personal pictures and videos to other users. It is evident that Direct messaging is making conversation and business communication easier and safer.
Leave a Reply
Your email address will not be published.
You may also like |
The types of breast cancer vary according to the particular cells in the breast which are infected. Many of the breast cancer diseases are carcinomas. Carcinomas are tumors that begin in the epithelial cells that line organs and also tissue through the human body. Usually, an even much more individual term is utilized. As an example, most breast cancers are a type of carcinoma called adenocarcinoma, which begins in cells which make up glands (epithelial tissue). Breast adenocarcinomas start in the vagina ( the dairy products vagina ) or the lobules ( milk-producing glands).
There are many, less healthy, different types of breast cancers, also, similar to sarcomas, phyllodes, Paget disorder, and angiosarcomas which begin in the cells of the muscle tissue, body fat, or even connective muscle.
Generally, just one breast tumor could be a combination of various types. As well as in many rare types of breast cancer, the cancer cells may not form a lump or tumor at all.
Ductal carcinoma in situ (DCIS)
Ductal carcinoma in situ ( DCIS ) is the existence of individual cells inside a dairy products duct in the breasts.
Yellow and even bloody dis-charge which come from the nipple. Lots of people who might have this disorder provide a variety of tumors ( whether DCIS or intrusive cancer ) in the same breasts.
DCIS usually is situated through a mammogram complete as a part of breast cancers screening or even investigate a breasts lump.
It is confused about what can cause DCIS. DCIS forms when natural mutations appear in the DNA of breast duct cells. The hereditary mutations reason the cells to become unusual, yet the batteries can't yet break out of the breast duct.
Researchers don't know precisely just what triggers the irregular cell progress that causes DCIS. Factors that could take part include things like your way of life, your environment and also genes transferred to you from your parents.
Invasive ductal carcinoma (IDC)
Intrusive ductal carcinoma ( IDC), generally called infiltrating ductal carcinoma, is easily the most general types of breast cancer. Around 80% of most breast cancers are intrusive ductal carcinomas.
Disturbing means cancers has “invaded” or even pass on to the enveloping breasts cells. Ductal means that cancers started in the dairy products ducts that are the “pipes” that carry dairy products from the milk-producing lobules to the nipple. Carcinoma relates to just about any cancers that begin in the skin or some other tissues that cover internal organs — similar to breasts tissues. Altogether, “intrusive ductal carcinoma” represents cancers which have broken throughout the walls of the dairy products duct and started to invade the tissue of the breasts. Ultimately, incursive ductal carcinoma may selection to the lymph nodes and most likely to some other areas of the body.
Invasive lobular carcinoma (ILC)
This kind of breasts cancers begins in the milk-producing glands, known as lobules. Often known as “infiltrating lobular carcinoma,” ILC may spread beyond the lobules into surrounding breasts muscle and also metastasize to other areas of the body. It represents regarding 10% of incursive breasts cancer diseases.
Lobular carcinoma in situ (LCIS)
LCIS, also known as lobular neoplasia, begins in the milk-producing lobules. Theoretically, it’s not breast cancers ( although it includes carcinoma in their name), but rather an accumulation of abnormal cells. People who have LCIS will probably improve breast cancers shortly.
Inflammatory breast cancer (IBC)
This unusual, possessive types of breasts cancers will cause redness and enlargement of the breast. The impacted chest feels warm, dense, and also tender. The skin layers can become difficult or ridged like an orange rind. See a physician straight away if you have these types of indications. Inflammatory breasts cancers are likely to attack five years previously, an average of than many other types of breast cancers, and it may not show up on a mammogram. African American women are at higher risk for IBC than white women.
Paget disease of the breast (or the nipple)
This rare cancer impacts the skin layers of the nipple as well as the darker circle of skin, known as the areola, enveloping it. Individuals with Paget disorder might notice the nipple and areola growing scaly, red, or itchy. They might also see yellow or even bloody discharge that comes from the nipple. Many people who may have this disease also provide some tumors ( either DCIS or invasive cancer ) in a similar breast.
Metaplastic breast cancer
This unusual, incursive breast cancers start in a dairy products duct and forms significant tumors. It might consist of mixing of cells that look various than common breast cancer diseases which enable you to be more challenging to diagnose.
Author's Bio:
I am an expert Pharmaceuticals company in 5+ years of experience in this field. |
Blockchain: Anti-Capitalist Revolution or Busine$$ as Usual..?
The term “blockchain” describes a type of internet-based decentralized ledger system which can be used to record transactions and store data in a manner potentially more secure than one might find in a centralized database system. Blockchains are managed using peer-to-peer (p2p) sharing methods, very similar to BitTorrent. Information stored on a blockchain can be shared across a network through encryption and cross-authentication.
Blockchain will change many aspects of how economies function and develop more transparency and accountability within governments, as well as further decentralize information among individuals, companies, and institutions. The future of blockchain technology is a vast open-ended arena that will likely expand our collective intelligence far beyond previous technologies.
The potential for blockchain to alter global society has attracted the attention of technologists and developers, cooperatives and venture capitalists, the FBI and people outside the law, and almost every world government and banking institution. Currently many sectors of society are fertile ground for experimentation and testing of blockchain applications.
To date, blockchain and other distributed ledger technologies are most known for being a part of the core functionality of Bitcoin and most other cryptocurrencies (sometimes called altcoins). These all currently operate free from the influence of the central banking systems that issue and work with government-backed fiat currencies.
On January 1, 2018, the total value (market capitalization) of all cryptocurrencies reached $700 billion USD, surpassing the total valuation of many large corporations such as Cryptocurrencies remain a volatile investment due to quickly changing supply and demand conditions on cryptocurrency exchange markets, the potential of pending government regulations, or even outright bans in some countries, among other reasons.
As government surveillance powers expand, economic imbalance grows while massive human migration continues around the world. Now, at this unique juncture in human history, the demand for secure cross-border transactions is higher than ever. Blockchain technology is playing a little-known, yet large, role in shaping how our global society adapts to these issues. (The United Nations has even used the Ethereum blockchain to send emergency aid to refugees in Syria.)
Today, you can easily exchange Bitcoin and altcoins back into any major fiat currency (traditional state currencies backed by central banks), and vice versa. People are quickly adopting the use of cryptocurrencies in order to make purchases, ranging from Expedia flights to domain names and 3D printers.
While Bitcoin does offer a higher degree of security, it is only pseudonymous, even if using it in conjunction with the Tor network. Through careful analysis of metadata within the transaction it is still possible in some cases to track Bitcoin users. This has led to the development of privacy-based altcoins like PIVX, Verge, Monero, ZCash, and Dash (among others), which prioritize secure digital transactions, free from government and corporate surveillance while keeping the users’ identities more private by obscuring the path of transaction.
Activist communities have developed projects like FairCoin, a cryptocurrency using blockchain which operates on a proof-of-cooperation mechanism instead of proof-of-stake, and formulates strategy and decision making through monthly assemblies.
Supported by a global cooperative movement, FairCoin hopes to enable a more fair economy internationally.
Faircoin: the Eco-Solidarity money that could Sweep the World
Faircoin: the Eco-Solidarity money that could Sweep the World
Another cryptocurrency known as NEM, or New Economy Movement, is maintained by a non-profit organization that brings new features to blockchain such as proof-of-importance, multisignature accounts, and encrypted messaging.
Bitcoin, Litecoin, IOTA, Monero, Ripple, Dash, Ethereum
Banking institutions plan to deploy blockchain technology within their networks to secure account information, reduce labor costs by reducing human jobs, and increase transaction speeds. On the flipside, a handful of banks that can read the writing on the wall are rushing to create centralized cryptocurrencies they can control, of which Ripple is a flagship project.
The creation of centralized cryptocurrencies by large banking insitutions has angered many of the original supporters of cryptocurrency, since Bitcoin was seen by its earliest advocates as a way to decentralize wealth out of the hands of the fractional-reserve-banking old world order and into the wallets of the greater global community.
The sudden rise in cryptocurrency market prices in late 2017, combined with the flourishing culture and industry surrounding decentralized computing and blockchain technology, caused large institutions to take notice. As governments scramble to regulate cryptocurrencies in order to crack down on money laundering and criminal activity, many large banking institutions are simultaneously making every attempt to stifle growth of blockchain-based cryptocurrencies that challenge their longstanding grip over electronic transactions and creation of wealth within society.
In January of 2018, Visa announced it would stop processing all cryptocurrency-based transactions, stating that the digital asset does not qualify as a payment system. This month Metropolitan Commercial Bank also attempted to sabotage the rapidly expanding cryptocurrency movement by halting international wire transfers related to all cryptocurrencies.ENT
Governments around the world, including China, South Korea, and Russia (to name just a few) have begun cracking down on the unregulated use of cryptocurrencies. The French Finance Minister Bruno Le Maire and U.S. Treasury Secretary Steven Mnuchin have recently stated that global regulations of cryptocurrencies, and perhaps even the underlying blockchain technology, will be at the top of the list of discussions during the next G20 Summit in Argentina in late 2018.
Meanwhile, the government of Brazil is contemplating using blockchain technology to process petitions and write laws using the Ethereum network. Blockchain technology could also be used to transform voting and elections using secure identity management. In the near future, voting could be more transparent, more secure, and make election fraud much harder to pull off.
Sustainable energy that can be used with decentralized smart grid technology
In parts of North America and Europe, individuals and companies are experimenting with applying blockchain technology to develop smart grids which could share sustainable energy between homes and businesses. When more electricity is produced than needed, the energy can be distributed over a connected grid and the sender can gain credit on their utility bill through the blockchain network, which provides authentication and audit trail for each transaction.
In South America, Venezuela’s President Nicolás Maduro was even planning to launch an oil-backed cryptocurrency, “The Petro”, using blockchain technology. However, days before its launch, the National Assembly of Venezuela declared the move illegal, citing that Maduro was attempting to “evade financial sanctions, openly violating the Constitution, and legitimizing illicit transactions.”
Many healthcare providers will also soon begin to utilize distributed ledger technology. Using blockchain applications, patients, doctors, and hospitals will be able to more quickly and securely share medical records, provide diagnosis, and set permission controls required to see information. Some hospitals and healthcare companies plan to use blockchain technology to secure HIPAA compliance through key pair systems to safely share data. Techniques such as homomorphic encryption would permit analysis of encrypted data, without releasing sensitive patient data protected under HIPAA. One day, the healthcare industry may even use blockchain to share medical research on distributed ledgers processed using artificial intelligence.
Some technologists have begun developing new messenger services, such as Hush Messenger, e-Chat, and Obsidian, which aim to secure the metadata of users through blockchain storage instead of centralized servers (which are often used by governments to track and surveil targets). Since blockchain offers such security by design, without a centralized point of attack, users are capable of communicating securely even while being exposed within a hostile environment. Instead of users defending their boundaries from attack, blockchain resists attack by leveraging the network’s asymmetrical advantage of outnumbering the attackers.
Guardtime is another organization that is using blockchain technology to enhance cyber security by creating a Keyless Signature Infrastructure (KSI) to secure sensitive data. Recently Guardtime was awarded a $1.8 million dollar contract with the Defense Advanced Research Projects Agency (DARPA) to advance protection of sensitive military data.
In the coming years, blockchain is also expected to expand into online media, changing the fundamental ways in which users produce and share media and creators protect their content. Blockchain will likely change the way journalists, photographers, musicians, and writers manage rights, distribute, and monetize their content. This distributed ledger technology could also change how users stream online media, purchase digital copies, and access paid news websites and blogs.
The commercial media market may see blockchain-based advertising networks evolve into general use soon. Blockchain-based techniques are being used to develop new internet browsing tools that by default allow the user to decide what ads they see (if any), avoid tracking, and choose what data they share. The “Basic Attention Token” is intended to let advertisers purchase ad slots, and reward Web and app users for observing advertising.
An “Internet of Things” (IoT) device is any computing device that connects wirelessly to a network and has the ability to transmit data, such as your smart phone, Amazon Echo, or a smart car. There are currently billions of IoT devices connected to the internet and growing every day.
Today, these devices connect to centralized clouds to download updates and communicate across networks. This communication architecture creates bottlenecks and a single point of failure. Centralized cloud services to support IoT devices also costs billions of dollars to build and maintain. Major technology and telecommunication companies are now researching ways to utilize blockchain technology in order to develop a decentralized approach to solving these IoT issues, where devices can communicate and support each other.
A visualization of blockchain’s distributed network [right]
A Decentralized Autonomous Organization (DAO) is “an organization that is run through rules encoded as computer programs called smart contracts.” Originally proposed by Nick Szabo during the early years of Cypherpunks, DAO’s are now being integrated into distributed ledger technologies, such as the Ethereum blockchain. Controlled by token holders, a single person or entity cannot change the rules.
Decentralized autonomous organization eliminates the need for hierarchical governing structures, freeing itself from centralized computing networks (and even the centralized power of bosses). DAOs are being deployed within some distributed ledgers, cryptocurrencies, and organizations. Examples of DAO’s are ERC-20 tokens, Tron, DASH, PIVX, and
While the original 2008 technical paper, “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto (PDF) eventually succeeding in launching Bitcoin to the world, the idea of “chaining” ciphers together is significantly older. Cipher block chaining is a predecessor to the modern blockchain concept, as described in a 1980 document from the National Institute of Standards and Technology about the federal Data Encryption Standard (DES), an influential but now-insecure 56-bit algorithm developed in the early 1970s. In Bitcoin’s early years, many observed the similarities between emerging cryptocurrency and two significant technologies: the popular BitTorrent file sharing software / protocol, and git, software designed for developers to manage computer code repositories.
Both BitTorrent and git permitted decentralized and cryptographically validated chunks of data to be passed around multiple users over the internet. Merkle trees, also known as hash trees,
Blockchain will surely agitate the current order of the world. It will also change how we do things such as crowdfunding and gathering charity, to signing up for school classes and sharing transcripts. It will change how humanity stores data on the cloud, how we stock the shelves at grocery stores, and possibly change how governments track firearms and even our identities. Like many previous technologies, the uses of blockchain appear somewhat like a double-edged sword, ranging from the utopian to dystopian. However, the future of blockchain technology is still in its infancy, growing from within a wild frontier. While a more decentralized future is rapidly gaining momentum around the world, what it will look like is still very undetermined. However, one thing is certain: it is up to everyone to build it.
Written by Andrew Neef
Nhận Định
Bitcoin, The Enemy of The State and The Banks
As of today 6-Dec-2017 at 23pm, Bitcoin in terms of US Fiat paper is more than 14400USD. Many “experts” jumped in and made quite a few wild guessing.
bitcoinworldIf one truly understands crypto currency, especially Bitcoin and block-chain, one would have no surprise. Bitcoin is finite money with fixed and known supply, which is based or created and operated by mathematical algorithm. That means we all have already known the time and the total number of Bitcoin available with absolute certainty. There is no speculation, except from those who know next to nothing, but pretend to be “experts”!
What do you expect in a situation where there are more than 7 billions and counting of people share a fixed 21millions or less of Bitcoin with limitless of fiat money being “printed” out every “chaotic” day? Only silly people and government scoundrels would measure the value of Bitcoin in term of the inflationary fiats! A well informed person will not drop his/her jaw when 1 USD reaches down to 1 Satoshi.
The deflationary nature of Crypto-Bitcoin is just one of its bests. The decentralization nature of its public block-chain that Satoshi Nakamoto gifted to humanity is the best of all the bests. It gives humanity a chance to get rid of the parasitic fraudulent statist system and that of criminal banksters. Bitcoin and its counterparts have been taking away their destructive power that has enslaved humanity ever since the State and Bankster existed.
Bitcoin is a true quiet, bloodless revolution. A revolution that not only free humanity from fiat papers, but above all free humanity from the deadly belief in statist system, in which government and its authority are indispensable in every aspect of human life. Bitcoin has proved this statist belief not only silly, wrong but destructive to humanity.
This belief has divided humanity. Its Fiat money, in whatever from, has caused chaos, crises, and wars. whereas Bitcoin has united humanity without coercion and deceit. Bitcoin gives people a total free world to interact, communicate, do business directly instantly without the constrains of time and space. Bitcoin has been quietly established friendship and peace among people on Earth. Bitcoin quietly without noisy and costly conferences has been doing the absolute globalization.
Therefore Bitcoin and other true crypto-currencies quietly but directly threaten the very existence of Government and banksters. Thus, naturally Bitcoin is the enemy of the State. Don’t ever expect otherwise.
So, what will the State and banksters do about this? We have seen they have been trying every single trick to undermine the Bitcoin and other crypto-currencies .
Technically they just cannot “regulate” a decentralized public network. Criminalize the Bitcoin? How? Have they learned anything from banning physical and tangible things such as guns, alcohol, drugs, prostitution etc? Law with prisons and death penalty simply do not work. Only stupidity cam tell them that they can regulate or ban crypto-currencies.
But they can fool stupid people, who have been brainwashed with destructive “statist values”. These kind of “law abiding citizens” who both love the supreme-conveniences of Crypto-currencies and want their beloved Govts riding on their backs to “protect” them… from themselves!
No power can defeat Bitcoin, except its “stupid” users. When enough stupid users “voluntarily” surrender their total control and full responsibility of their own Bitcoin, as they have surrendered their own lives, to Govts and banksters (and coinbase exchange sites), they have made Bitcoin defeat its own fundamental purpose: government free and bank free medium of exchange.
Ask yourselves: since its birth to this date, does the Bitcoin need any support and recognition from the State, government system and Banking system to be in such successful position today?
Bitcoin has been the most successful crypto-coin because it offers all the conveniences, privacy, and above all the freedoms that people are seeking.
Bitcoin has lived and thrived strongly because of its wide acceptability from the people, its free users. Bitcoin will die only when people reject it. That is exactly what the State and Banksters have been trying to scare people into the “rejection” of Bitcoin. So far they have failed .
Whatever you do, don’t be such idiot that makes Bitcoin defeat its own fundamental purpose: getting rid of parasitic governments and banksters off people backs!
We are all citizens of this planet, we are one race of one origin. We are our own masters. Let’s be free people!
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
Get your free Constitution essay sample now!
A free database of Constitution papers. Join our largest peer essay sharing community. Get your free Constitution essay sample now!
Constitution Course Work Examples
Analysis of the Constitution Constitution is a set of rules that govern a country. Modern country where the citizens understand and practice democracy, a constitution is very important. It can be a w...
Published: 2021-07-07 00:55:04
Example Of Constitutional Convention Discussion Book Review
The main difference between the Virginia and New Jersey constitutional convention was on the powers of the federal government. Even though the different states were independent with their set of rules...
Published: 2021-07-04 19:00:04
Federalist #51 And The Constitution Article Review Examples
Introduction Federalist #51 proves to one of the most significant papers amongst all the Federalist papers. This paper talks of the principle of republicanism which in-depth covers the principle of di...
Published: 2021-07-20 13:25:06
Free Creative Writing On Influence Of Rousseau On American Forefathers
The American Forefathers were greatly influenced by Jean-Jacques Rousseau, a stalwart of Enlightenment. His social contract theory had enormous impact on the role of the government in the American soc...
Published: 2021-07-16 21:50:05
How Democratic Is The American Constitution Book Review Example
“How Democratic is the American Constitution?” is one of Robert A. Dahl’s latest works. In his nook, Dahl delves deeper into the complexities of the process and the ideals of the framing of Amer...
Published: 2021-07-12 03:25:05
In Federalists 10 Argumentative Essay Sample
A faction is a group of people of people who are in support for something or are against something (Adair, p90). It is formed due to shared beliefs by the people; mostly it is considered as a politica...
Published: 2021-07-14 10:15:06
Sirac Analysis Case Study Examples
Parties involved (Public institution and individuals) Kenneth E. Hardy, Plaintiff - Appellee, Jefferson Community College and Kentucky Community and Technical College System, Defendants: Mary Pamela B...
Published: 2021-07-11 18:15:05
The Right To Bear Arms Argumentative Essay Examples
The gratification that individuals can have in a society depends on their ability to protect their own lives from harm or surety that their lives are safe. This explains why Americans strive for finan...
Published: 2021-07-16 20:55:05 |
Thursday, 25 August 2011
What is Lambda Expression? A simple guide For beginners
What is Lambda Expression?
Lets take an example:
delegate int anonymousDel(int i);
anonymousDel myDelegate = new anonymousDel(
delegate(int x)
return x * 2;
Now lets convert it to Lambda Expression:
anonymousDel myDelegate = x => x * 2;
The above expression can be generalize for clear understanding.
(input parameters) => Expression;
For e.g.
delegate void doSomething();
); };
//call the Anonymous function
When & Where to use Lambda Expression?
LINQ Query example:
LINQ to Objects
Look at the below code snippet:
delegate int anonymousDel2(int a, int b);
Lets modify the above code snippet using generic delegates and Lambda Expressions
When to use Lambda Expression?
1. Like it... its very good for Linq beginners....
2. Thanks Kunal. It means a lot to me.. :)
3. Very good post, clarified some doubts I had. Thanks a lot.
4. very good introduction to lambda expressions.each step is well broken down with explanation.Thank you Michael G.
5. Very good...I was looking for this kind of easy intro.. Thanks a lot!.. Keep going...
6. Really good explanation thanks.
7. Simple explanation but covered lot of things...thanks,
8. Really very helpful lines. Amit Please give a print option in your website like and MSDN
9. Good and wisely written article. Now i will use them in my code.
10. Wonderful man...Covered almost everything in an easy to understand way. Thank you.
11. it is nice description about lambda
THanks for this
12. That was a great explanation. However, if I could make a somewhat related suggestion for your code I would say that you should replace your if-else statements with the conditional ?: operator where you start with a boolean expression, and if it evaluates to true the first expression is evaluated, and if false the second expression is evaluated. It takes the form of
(boolean statement) ? (Do this if true) : (do this if false);
13. Replies
1. This comment has been removed by the author.
2. It is very hekpful to me to know about Lambda Expression.Thanks alot for ur post
14. Excellent article on Lamda Experssion..
15. Thanks alot it very helpful.
16. Lamba Expression using Anonymous type:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
namespace Linq_Basics
class Program
static void Main(string[] args)
string[] names = {"Amar","vicky","Bala","sankar","vimal" };
var lambfilter = names.Select(c => new { Namelength = c.Length, Name = c });
foreach (var v in lambfilter)
Console.WriteLine("The {0} name of length {1}",v.Name,v.Namelength);
17. its very useful to all.thank u ........... then please provide the explanation about FirstOrdefault()
18. Nice explanation, I like it than you!!
Anil SIngh |
Tech News Review Week 15 – 22 March 2021, by Stelios Iordanis
Researcher finds a better way to tap into the brain
There could be important applications of this technology in drug delivery for the treatment of neurodegenerative diseases, the computer-brain interconnection, even mimicking the brain for novel computing and AI architectures.
Although healing a wound in a mouse is less complex than in the case of humans, there is a high possibility for healing even human hearts based on the resulting therapies from this discovery. It should be noted that there has been a lot of abuse and exploitation of patients with false stem cell therapies.
To produce more food, scientists look to get more mileage out of plant enzymes
Taking advantage of plant enzyme mechanisms could end famine worldwide and malnutrition very cost-efficiently and drive down production cost for drugs, biofuel, fibre, and supplements.
Engineered microbe excels at ‘breathing rubber,’ could curb reliance on petroleum
Genetically engineered species of methanogen that can also produce high amounts of isoprene, the main chemical component of synthetic rubber could even further help drive down demand for oil that has damaged human societies during the last 120 years,
Scientists Created an Artificial Early Embryo From Human Skin Cells
What is more, another study also demonstrated the growth of a mouse fetus through half of its gestation in an artificial womb which is a record for mammals.
Therefore, cloning a human baby using someone’s skin cells, and subsequently growing it in an artificial womb without a typical male and female parents necessarily could become a possibility that may not be cancelled by draconian legislation in the EU or other Western societies with scientific taboos.
Neuralink Co-Founder: “We’re Gonna Need a Better Term Than ‘Video Game’”
A new form of entertainment could thus emerge that could be much more addictive than classical games, because one could theoretically also control pleasure-reward centres in the brain, simultaneously, just as the most potent addictive substances can, or even cure addiction for these.
Machine Learning
Quantum Computing and Reinforcement Learning Are Joining Forces to Make Faster AI
This is one of the first successful experiments combining quantum computing to accelerate the learning process of a reinforcement learning algorithm, which is, as a rule, slow.
An AI Built to Tell Apart Pastries Was Great at Spotting Cancers
This is a classical use case of transfer learning in computer vision-based AI, where the resulting algorithm can zoom in on cancer cells and detect cancer cells in a microscope slide and revolutionize the human doctor performance, with the purchase cost of just $20,000 for the software.
Food Waste Could Power the Jet Engines We’re Currently Flying With, Scientists Say
At the moment biofuels can only make up 10% of jet fuel; this percentage can increase 3x using this technology, without compromising performance.
Researchers’ algorithm designs soft-bodied robots that sense their own positions in space
Meet “Digit,” A Humanoid Robot Testing Package Delivery From Curb To Doorstep | ZeroHedge
Anticipating Robot Soldiers, Britain Is Downsizing Its Human Troops
All these developments are bound to drive unemployment rates very high, worldwide, in a diverse range of industries, from manufacturing and logistics to the military.
Plans Unveiled for Grand Mars City
A self-sustaining civilization on the surface of Mars without continuous need for supplies and shipments from Earth is a very distant vision, and it is paradoxical how humankind does not attempt to terraform the most inhospitable regions Antarctica, Sahara or Siberia, instead. |
How Technology Revolutionize Education
Written by
Last Updated: Jan 18, 2016
Laptops, Smartphones, Android Phones, Tabs, and other mobile devices are starting to take over the traditional classrooms of today. These technological advancements make the delivery of information easier.
Technology has revolutionized the educational environment to a whole new level.
1. Adaptive, Personalized. Ruce University’s OpenStax adaptive digital textbooks use an algorithm system to automagically provide questions and practice sessions on the topics where the student is having difficulty with.1 1
2. Encourages Collaboration. There are new mobile device apps, like Basecamp, Google Classroom, Podio, Producteeev, and Kickoff, that connects students to each other and make it easier for them to coordinate their schedules, to-do-lists, assignments and other activities. Just like the students, there are also apps that make it easier for teachers to coordinate with each other. 1 22
3. Learn Socially. Educational and game-based apps make learning in the classroom, more proactive and social. This improves the traditional teacher-centric educational model of the past.
1 3
4. Learn Anywhere. They say learning goes beyond the classroom. Educational apps take this idea literally. The best example is the massive open online course, which makes people learn from a single instructor wherever they are in the world. 1 4
5. Makes Assessment Easier for Teachers. Advancements in data collection like the BubbleScore apps make it easier for teachers to collect and interpret data. This makes it easier for the teacher to assess each student properly.1 5
Related Posts
Hints on how to write a helpful review
A great review should have the following qualities:
• Above all, let your review be fair and honest.
The Quality Page Score Explained
Your Rating*
Did you find that information valuable?
|
How to Use Double Stops In Your Guitar Licks, Riffs and Solos
Playing double stops on guitar simply means playing two notes at the same time.
When we play guitar licks and solos we usually play one note at a time. Double stops offer us an option to spice up our improvisations and compositions by harmonizing one or more of those notes with another note.
Double stops can also be used in guitar riffs to replace a single note, a triad or a more extended chord.
Note: As the name implies, triads are chords with three notes. Double stops can also be called dyads. They’re not a type of chord though, since a chord requires at least three notes being played at the same time.
When learning double stops and incorporating them into your riffs, licks and solos you mainly have to deal with two things:
1. The choice of the notes.
2. The guitar techniques you’re going to apply to them.
We’ll be discussing both these elements in detail during this lesson.
Double stop notes
An interval is a distance between two notes on the guitar (for instance the distance between the notes C and F forms the interval of a perfect 4th, C – E a major 3rd, and C – Eb a minor 3rd)
When the two notes of an interval are played after each other we call it a melodic interval and when they’re played at the same time we call it a harmonic interval.
Thus a harmonic interval and a double stop are basically the same thing.
The total number of intervals that can be played on the guitar is 12 (13 if we count the unison – playing the same note twice), and will be grouped into 5 categories.
1. Minor and major thirds
Intervals of a minor or a major third sound pleasant to the ear since they’re very consonant.
This is not to say there’s anything wrong with dissonant intervals. They have an important role in music since dissonance resolving into consonance is what makes melodies sound melodic.
What this means is that consonant intervals are perfect to harmonize a note with another and are thus widely used as double stops.
Whether you should harmonize the note with a minor or a major third depends on the position of the chord in the particular key you’re playing.
The following are the double stops of a minor or major third that can be played on the guitar on every string, starting from the root note A.
Thus, the double stop of a minor third is made of the notes A and C while the major third is made of the notes A and C#
2. Perfect 5ths and 4ths
You’re probably already familiar with the interval of the perfect 5th since this double stop is the same as the power chord.
If the root note is A, the perfect fifth is the note E.
Perfect 4ths are actually inverted perfect fifths. The same two notes but with the fifth being the lower note.
Thus if the root note is E, the Perfect 4th will be the note A.
The following are the Perfect 4ths and 5th double stops you can play on each guitar string.Note that the root note in all these examples is the note A, thus the second note in the Perfect 4th interval is a D.
3. Minor and major 6ths
Double stops of a minor or major 6th are also commonly used.
With the root note being A, a minor 6th interval would give us the note F while a major 6th interval would give us the note F#.
This is how minor and major 6th intervals can be played on all guitar strings.
Note: Since this is a wide interval, to play it on the guitar you have to skip a string. To avoid hitting the string in between you can either mute it with your fretting hand finger or use hybrid picking technique.
4. Octaves and unisons
The octave is the most consonant interval of all since you’re actually playing the same note – an octave higher.
A unison simply means playing the exact same note on a different string.
The following are the double stops of an octave and a unison you can play on the guitar.
5. Dissonant intervals
All the intervals we’ve explored so far are, to different extents consonant, thus more commonly used.
This doesn’t mean dissonant double stops can’t be played on the guitar. You just have to be more careful to resolve the dissonance correctly.
The following are the dissonant double stops you can play on all strings.
This way, we have covered all the intervals within an octave that can be used as double stops in your guitar playing.
Double stops with guitar techniques
While double stops can be used without any particular phrasing technique applied to them, in many cases guitar players make them sound better by applying techniques like slides, string bending, and hammer-ons and pull-offs as we’ll explore in this section of this lesson.
In the first example using slides the double stops of a perfect 4th (bar 1) and a minor 3rd (bar 2), are slid into from a double stop of the same kind.
In the next example we play the double stop (a perfect 4th) first, slide up two frets, and then slide back into it.
String bending
There are many ways string bending technique can be applied to double stops on the guitar.
In the first example the bend is not part of the double stop but precedes it creating a lick that has been used in many different forms and variations in Rock and Blues music.
In the next example, the higher note of the double stop remains stationary as we only bend the lower note a full bend on the first double stop, and a pre-bend and release on the second. Then we resolve it to a major third double stop in the second bar.
In the last example of double stop bends we’re going to bend both notes in the double stop a full bend.
Hammer ons and pull offs
My favorite use of hammer-on technique applied to double stop is in the intro riff to Paranoid by Black Sabbath.
The last example in this lesson combines hammer-ons and pull offs, string bending and slides with double stops in one riff.
Conclusion: Where to go from here
As with every other element of guitar playing, mastering double stops comes through use and experimentation.
Start incorporating double stops in your guitar playing by choosing an interval and applying to it one or more of the techniques explored in this lesson.
Leave a Comment
Your email address will not be published. |
The United States of America has been a kaleidoscope of cultures for hundreds of years. This has never been more true than it is today, as people from every corner of the globe continue to seek out a life in the U.S., whether permanently or temporarily.
The multicultural makeup of the U.S.-especially in metropolitan areas-presents special challenges for medical professionals, whose job requires relating to patients on a very personal level.
In urban areas it is not unusual for a doctor to have a diverse patient lineup-seeing a patient in the morning who recently emigrated from the Philippines, a multi-generational family of Indian descent later in the afternoon, and a tourist from China in the evening might be a typical day for some in the healthcare profession. Even doctors and nurses who work in rural areas will inevitably encounter people of various ethnicities and cultural backgrounds in their careers, especially as the U.S. countryside continues to become more ethnically and racially diverse.
Sensitivity, compassion, understanding, and acceptance of patients with different values, beliefs, and behaviors are essential qualities for those who work in the medical arena.
Cultural competence is the ability of healthcare providers and organizations to meet the cultural, social, and linguistic needs of their patients. Below, we’ll explore why cultural competence is so important for the effective delivery of quality healthcare, and we’ll look at how a lack of cultural competence can lead to poor patient satisfaction and outcomes, and frustration for both patients and healthcare workers. We’ll also look at some of the ways healthcare facilities can attain cultural competence through in-house training and education videos for nurses, doctors, and other healthcare workers.
Before we move on, we feel it’s important to define the differences between some commonly confused terms-ethnicity, race, nationality, culture, heritage, and identity. Let’s briefly look at them individually.
• Ethnicity – Often confused with race, ethnicity refers to learned behavior and customs, and embraces the traditions that are part of one’s geographic region.
• Race – Defining race has generated its fair share of disagreement and controversy over the years, and many scholars today agree that race is a social construct.1,2,3 The word race has been used to describe a person’s biological features, including skin color and tone, eye color, hair color, and even a person’s tendency toward certain genetic diseases. Race is generally thought of as something that cannot be fundamentally altered (e.g. skin color, eye color, etc.). Some definitions of race have been debunked altogether, such as the notion that a single characteristic, gene, or trait may separate all members of a so-called race from others.4 The sensitive subject of race has led many organizations to give people the opportunity to opt out of indicating their “race” (e.g. Caucasian, African American, Latino/Hispanic, etc.) on patient/consumer information forms. A good rule of thumb for healthcare workers is that, unless a patient identifies with a particular race, don’t make assumptions.
• Nationality – Most of the time nationality refers to a person’s country of origin (i.e., where they were born), but this doesn’t necessarily mean that a person identifies with that place. A person who was born in Germany but emigrated to Italy as a very young child may consider his nationality Italian-he may speak fluent Italian and identify closely with Italian culture.
• Heritage – Generally, heritage refers to the traditions and beliefs of a particular group, which is often based on place (nationality); but, much like ethnicity, a person may not necessarily identify with their family’s heritage.
• Identity – Simply put, a person’s identity is what they identify with, whether it’s a particular country, religion, culture, etc.
• Culture – So, what exactly is culture-the heart of our discussion on “cultural” competence? While definitions vary to some degree, we can generally think of culture as encompassing a person’s learned beliefs, thoughts, and behaviors, their values, customs, and traditions, their communication style, their views on relationships, and the different ways they interact with others. Culture is shaped by many things, including race, ethnicity, nationality, heritage, socioeconomic status, education, and other factors. Together, all of these influences are described as sociocultural factors, and they all influence the way a person interacts with the world. A culturally competent healthcare professional or institution must take into account all of these aspects of an individual to achieve cultural competence.
All of the factors above help make up each person’s unique identity. The world is more globalized than ever, today; a trend that will likely continue. This is why cultural competence is so important-in healthcare and beyond. Let’s explore cultural competence and its benefits.
Earlier we defined cultural competence as the ability of healthcare providers and organizations to meet the cultural, social, and linguistic needs of their patients. Respect is at the heart of cultural competence-patients who feel their healthcare providers respect their beliefs, customs, values, language, and traditions are more likely to communicate freely and honestly, which can, in turn, reduce disparities in healthcare and improve patient outcomes.
There is much progress yet to be made in ensuring that all patients are treated with equal respect and dignity. Poor communication between healthcare workers and patients can lead to greater health disparities and lower levels of satisfaction with healthcare.
• levels of partnership with doctors, in particular, are less likely than other minority groups to feel that their doctor understood and respected their values and beliefs; they were also more likely to report that their doctor looked down on them. 5These findings send a clear message about the importance of cultural sensitivity in healthcare. Let’s look at the benefits of cultural competence and how healthcare workers can employ culturally sensitive practices.
Cultural competence provides many benefits for healthcare professionals and healthcare organizations. Social benefits include increased mutual respect between healthcare workers and patients, increased trust, and promotion of patient responsibility and empowerment in their own healthcare.
When patients feel heard and understood by their healthcare providers, they are more likely to participate in preventive health care and less likely to miss health appointments. This can reduce medical errors and related legal costs for healthcare facilities, and it can improve health outcomes for patients. Ultimately, a culturally competent organization can help reduce health disparities among patient populations-still a common problem today.
A lack of diversity in the healthcare workforce and its leadership is among the leading barriers to cultural competence, contributing to racial and ethnic disparities of care.Poorly designed care systems that fail to meet the needs of all patient populations, and poor communication between providers and patients of different racial, cultural, and ethnic backgrounds are additional barriers.
Maximizing diversity is the key to achieving organizational cultural competence. Organizations should:
• Hire and promote minority healthcare workers.
• Establish or strengthen existing programs aimed at minority leadership development.
• Develop a system for community and patient feedback where individuals can express concerns about their care and treatment.
• Gather information about patients’ language preferences, and ensure that patients have access to healthcare workers, and/or an interpreter, who speak their language.
• Provide patients with health education materials and forms in different languages.
• Establish an interpreter services program in healthcare facilities where there are significant patient populations with limited proficiency in English.
• Institute a program that detects medical errors resulting from language barriers and other communication disparities.
• Monitor racial and ethnic disparities using data, and institute quality improvement initiatives where needed.
• Collect data on race/ethnicity and language preferences in order to better understand patient needs and improve care.
Healthcare workers must be informed about the cultural factors that influence people’s health beliefs and behaviors, and they must be provided with the tools they need to serve a multi-cultural patient community. This can be achieved through in-house training, case study review, live interactions with patients, role-playing, and training and continuing education healthcare videos. Staff should be periodically assessed based on established standards, and success rates can be tracked from patient satisfaction scores and with healthcare disparities data.
When healthcare workers at all levels of care are given the tools and training they need to become culturally competent, improved patient satisfaction and outcomes are the inevitable result. |
2002 Free Response
Question 2
Bumper Mech 2. The cart shown above is made of a block of mass m and four solid rubber tires each of mass m/4 and radius r. Each tire may be considered to be a disk. (A disk has rotational inertia L ML2 , where M is the mass and L is the radius of the disk.) The cart is released from rest and rolls without slipping from the top of an inclined plane of height h. Express all algebraic answers in terms of the given quantities and fundamental constants.
(b) 7 points For an indication of the conservation of mechanical energy AU = —AK ; or equivalent top bottom ; For correct expressions for energies at the top K to = 0; =mgh+4 —mgh = 2mgh For a correct expression for potential energy at the bottom and for recognizing that kinetic energy at the bottom is the sum of translational and rotational kinetic ener •es bottom For a correct expression for translational kinetic energy at the bottom trans = —(2m)D2 = mu 2 K 2 For a correct expression for rotational kinetic energy at the bottom 2 Kroc -—10 2 For recognition of the relationship between translational and rotational velocity Substituting these expressions to determine total kinetic energy at the bottom 2 211 bottom = RID + _ 22 top equal to the kinetic energy at the bottom ettmg potentla energy at —mu = 2mgh 4 For the correct solution for v 8 -gh 5
Question 3
(c) Suppose that the object is released from rest at the origin. Determine the speed of the particle at x = 2 m. In the laboratory, you are given a glider of mass 0.5 kg on an air track. The glider is acted on by the force determined in part (b). Your goal is to determine experimentally the validity of your theoretical calculation in part (c). (d) From the list below, select the additional equipment you will need from the laboratory to do your experiment by checking the line next to each item. If you need more than one of an item, place the number you need on the line. Meterstick Balance Stopwatch Wood block Photo gate timer String Spring Set of objects of different masses (e) Briefly outline the procedure you will use, being explicit about what measurements you need to make in order to determine the speed. You may include a labeled diagram of your setup if it will clarify your procedure.
(d) 2 points For indicating items of equipment consistent with the procedure described in part (e) (at least two of the items if more than two were used) Note: If part (e) was not attempted, only 1 point maximum was awarded. Unreasonable indications, such as all the items being checked, were not awarded any points. (e) 3 points For a complete description of any correct procedure. Partial credit was awarded for less complete descriptions. The following were common examples. Other examples, though rarely cited, could receive partial or full credit. 1 Using photogates Place the photogates near x = 2 m and a small distance apart (such as a glider length). Measure the distance between the photogates. Measure the time the glider takes to travel between the photogates. Obtain the speed from distance/time. time to travel 2 m was used. 2. Using a spring The spring constant k of the spring must be known, or if not, then measured. Set up the spring at x = 2 m so that it is compressed when struck by the glider. Measure the distance of maximum compression Xm. The velocity can then be determined from the equation = 3. Treating the glider as a projectile Adjust the starting point so that x = 2 m is at end of the track. Thus the glider leaves the track at this point and becomes a projectile. The height of the track determines the time interval t that the glider is in the air. The horizontal distance x from the end of the track to the point where the glider hits the ground is measured and then the velocity is computed from x/t.
2003 Free Response
Question 2
0M Mech. 2. An ideal spring is hung from the ceiling and a pan of mass M is suspended from the end of the spring, stretching it a distance D as shown above. A piece of clay, also of mass M, is then dropped from a height H onto the pan and sticks to it. Express all algebraic answers in terms of the given quantities and fundamental constants.
For use of the correct equation for the period of a mass on a spring k For recognition that m = 2M For correct calculation of k using the force equation for the initial stretching of the spring Mg g = kD, giving k = For correct answer substituting for m and k
Question 3
12m 12m Figure 1 Figure 2 Mech. 3. Some physics students build a catapult, as shown above. The supporting plafform is fixed firmly to the ground. The projectile, of mass 10 kg, is placed in cup A at one end of the rotating arm. A counterweight bucket B that is to be loaded with various masses greater than 10 kg is located at the other end of the arm. The arm is released from the horizontal position, shown in Figure 1, and begins rotating. There is a mechanism (not shown) that stops the arm in the vertical position, allowing the projectile to be launched with a horizontal velocity as shown in Figure 2.
(b) The students assume that the mass of the rotating arm, the cup, and the counterweight bucket can be neglected. With this assumption, they develop a theoretical model for x as a function of the counterweight mass using the relationship x = vrt , where v x is the horizontal velocity of the projectile as it leaves the cup and t is the time after launch. . How many seconds after leaving the cup will the projectile strike the ground? ii. Derive the equation that describes the gravitational potential energy of the system relative to the ground when in the position shown in Figure 1, assuming the mass in the counterweight bucket is M. iii. Derive the equation for the velocity of the projectile as it leaves the cup, as shown in Figure 2.
ii. (3 points) For determining the potential energy of both the load in the counterweight bucket and the projectile For the correct value of the potential energy of the bucket load For the correct value of the potential energy of the projectile =Ub+U = 29.4M +294 (or 30M+300using g=10nv/s2)
iii. (5 points) For a valid statement or equation indicating conservation of energy init For the correct final potential energy of the bucket load For the correct final potential energy of the projectile = 9.8M +1470 For having terms for the final kinetic energy of both the bucket load and the projectile K p and OR For using one of the following relationships to write all expressions in terms of Db OR o=Vx/12 Substituting into the conservation of energy equation above and solving for vx : 29.4M + 294 = 9.8M +1470+ + (M/72)vx2 = (19.6M 72)) V (or (20M — + (M 72)) using g = 10 m/s2 ) 1 point 1 point 1 point 1 point 1 point
2004 Free Response
Question 1
900 Lake Mech. 1. A rope of length L is attached to a support at point C. A person of mass ml sits on a ledge at position A holding the other end of the rope so that it is horizontal and taut, as shown above. The person then drops off the ledge and swings down on the rope toward position B on a lower ledge where an object of mass nt2 is at rest. At position B the person grabs hold of the object and simultaneously lets go of the rope. The person and object then land together in the lake at point D, which is a vertical distance L below position B. Air resistance and the mass of the rope are negligible. Derive expressions for each of the following in terms of ml , m2, L, and g.
(b) The tension in the rope just before the collision with the object
(b) 4 points For any Indication that there are two forces acting on the person For an indication that the acceleration of the person is cenü-ipetal, i.e. equal to v rorv L For a correct application of Newton's second law that includes the two forces (tension T and weight) and a non-zero acceleration 2 T - mig = For substitution of the expression for VB from part (a) and L for the radius ml (2gL) + ntlg = 2n11g + ntlg
(d) The ratio of the kinetic energy of the person-object system before the collision to the kinetic energy after the collision
(d) 2 points For correct expressions for the kinetic energy before and after the collision, using the answers to parts (a) and (c) before = 5 ml VB = (2gL) = 1 1 Kafter = —(ntl + n12)Vafter = -j(ntl + 7112) 2 ml 2gL = 2 nil (ml + 7112) (nil + m2)2 2 For constructing the ratio Kbefore K after from valid expressions for kinetic energy, in terms of the required quantities. The ratio does not need to be simplified, but if it is the algebra needs to be correct. Kb nil gL (nil + (ml + ml
(e) The total horizontal displacement x of the person from position A until the person and object land in the water at point D.
For a correct expression relating the distance fallen, L, to the time it takes to fall from ointBto the water: L = lgt2 For indicating that the horizontal displacement from B to D is the answer to part (c) multiplied by the time XBD = Daftert For correctly solving the first equation for t and substituting two quantities into the second equation (this must yield an expression in terms of the required tities) XBD = Daftert = ml ml + nt2 ml + nt2 For indicating that the total horizontal displacement from A to D is XBD plus L Xtot XBD L = ml + nt2 (37111 + m2)L nil + 1112
Question 3
—H Pivot Mech. 3. A uniform rod of mass M and length L is attached to a pivot of negligible friction as shown above. The pivot is located at a distance from the left end of the rod. Express all answers in terms of the given quantities and fundamental constants. (a) Calculate the rotational inertia of the rod about the pivot. (b) The rod is then released from rest from the horizontal position shown above. Calculate the linear speed of the bottom end of the rod when the rod passes through the vertical. 3 Pivot (c) The rod is brought to rest in the vertical position shown above and hangs freely. It is then displaced slightly from this position. Calculate the period of oscillation as it swings.
Alternate Solution For an statement of the oarallel axis theorem I = lcm + mr2 where r is the distance from the center of mass to the pivot point For a correct value of the center of mass inertia (calculated or remembered) 1 2 cm — 12 For indicating that r = L/6 2 1 —ML2 + M 12 6 For the correct answer 2 9
(b) 7 points For any indication of For correctly calculating the change in potential energy of the rod (or the work done on it) For example: AU = Mghcm = Mg For writing a conservation equation that includes a rotational kinetic energy re ardless of whether the potential energy is correct) 2 _ MgL 1 2 6 For any indication that o is linear speed divided by a distance (regardless of whether the correct distance is used) Substituting and solving for v : 6 2 2 MgL 18 3g 6 ML2 - L 4 For the correct answer 3
(c) 4 points For an equation for the period of a physical pendulum mgd For substitution of the inertia from part (a) For indicating that the distance d is the distance from the pivot to the center of mass, i.e. d 6 ML2 9 MgL/6 For the correct answer
(c) (continued) Alternate solution For an equation relating the angular acceleration to the torque and inertia d29 T dt2 — I For substituting the Inertia from part (a) and the torque as a function of 9 sin 9 ML2/9 dt2 For usmg the approximation sine = 9 d29 dt2 d29 Taking 9 = ksinmt , the second derivative is — —m k sinmt dt2 Substituting into the differential equation and solving for m : —m ksinmt = — —k sin mt Usmg the relationship between T and o : T = 27t/m For the correct answer 3
results matching ""
No results matching "" |
The Generalized System of Preferences (GSP) is a U.S. trade program that eliminates the tariffs (i.e., taxes) paid by American companies when they import certain products from about 130 developing countries around the world. GSP was created in the 1970s as part of an international effort to promote development through “trade, not aid.”
So how does a program aimed at increasing production in poor countries abroad create American jobs? It turns out that most of the imports that benefit from duty-free GSP treatment are raw materials, components, parts, and machinery used by U.S. manufacturers in their American production facilities. Although the GSP program benefits only a small slice of the U.S. import pie, American companies used it to save more than $700 million in import taxes last year. Lower prices for these inputs reduce production costs and help keep American manufacturers competitive – and thus able to hire American workers. Furthermore, someone needs to both move the goods around the country and then sell the final product. In fact, a study for the U.S. Chamber of Commerce estimated that moving “GSP imports from the docks to the retail shelves” alone supported 82,000 jobs – a figure that did not count any jobs at companies using the program!
GSP clearly helps American workers when in effect, but has been plagued by short-term renewals and even expirations in the recent past, including a 10-month expiration from January to November 2011. That expiration period, during which importers had to pay tariffs, hit American workers hard. These unforeseen cost increases forced manufacturers such as Mullican Flooring and Besa Lighting to lay off workers.
So the next time someone says that imports cost U.S. jobs, remember all the workers using GSP to produce something new, the people responsible for moving the goods around country (both the direct GSP imports and the products using GSP components), and finally those selling the finished products. You’ll see that even a relatively small import program can have a large, positive impact for American workers.
This post is part of the Imports Work for America Week initiative, an effort by a number of organizations and individuals in the trade policy community to start talking about the benefits of imports for the U.S. economy. You can see our earlier blog post about the initiative here or visit the Imports Work website here. |
Skip to main content
Volume 37 Issue 2
The Role of Innate Immunity in Alcoholic Liver Disease
Laura E. Nagy, Ph.D.
Laura E. Nagy, Ph.D., is a professor of molecular medicine at Case Western Reserve University School of Medicine and a staff member of the Department of Gastroenterology and Pathobiology at Cleveland Clinic Foundation, Lerner Research Institute, Cleveland, Ohio.
The innate immune system represents the first-line response to invading microbes, tissue damage, or aberrant cell growth. Many of the proteins and cells involved in innate immunity are produced by, and reside in, the liver. This abundance in immune cells and proteins reflects the liver’s adaptation to various immune challenges but also makes the organ particularly vulnerable to alcohol’s effects. Heavy alcohol consumption may produce leakage of microbes and microbial products from the gastrointestinal tract, which quickly reach the liver via the portal vein. Exposure to these immune challenges and to alcohol and its breakdown products dysregulates the liver’s normally fine-tuned immune signaling pathways, leading to activation of various cellular sensors of pathogen- or damage-associated molecular patterns. The ensuing expression of pro-inflammatory cytokines (e.g., tumor necrosis factor a [TNFα], interleukin [IL]-8, and IL-1b) results in cellular dysfunction that contributes to alcoholic liver disease (ALD). Investigations into the roles of the various components of liver innate immunity in ALD have begun to uncover the molecular basis of this disease. Further progress in this area may help inform the development of interventions targeting the innate system to augment current treatments of ALD. These treatments could include antibodies against pro-inflammatory cytokines, use of anti-inflammatory cytokines, or suppression of alcohol-induced epigenetic regulators of innate immunity.
Heavy consumption of alcohol poses a well-known health risk worldwide. Alcohol’s effects on health and well-being are numerous and include injuries and fatalities resulting from alcohol-induced incapacitation. Moreover, chronic and heavy alcohol consumption affects the integrity and function of vital tissues and organs, causing slow but significant structural and functional damage over time. One of alcohol’s principal actions is damage to the liver, the primary organ for its metabolism. As a result, some 90 percent of heavy drinkers (i.e., those drinking 60 g or more of alcohol per day)—and even some who drink less—develop fatty liver (i.e., steatosis) (O’Shea et al. 2009). Up to one-third of heavy drinkers may incur more extensive liver injury, including alcoholic hepatitis, scarring (i.e., fibrosis), cirrhosis, or liver cancer (Gao et al. 2011). Moreover, about 70 percent of individuals who develop alcoholic hepatitis will progress to cirrhosis (Schwartz and Reinus 2012). The spectrum of alcohol-induced liver injuries ranging from steatosis to cirrhosis, defined here as alcoholic liver disease (ALD), is therefore a major cause of liver impairment worldwide (Gao et al. 2011).
A major contributor to ALD is alcohol-induced activation of liver innate immunity, precipitating disorders ranging from localized and transient inflammation to widespread hepatocellular injury and tissue damage (Cohen and Nagy 2011; Gao et al. 2011; Orman et al. 2013; Seki and Schnabl 2012; Wang et al. 2012). Given the pivotal role of the innate immune system in protecting the liver against foreign agents, it may seem surprising that some of the worst outcomes of alcohol-induced liver disease are the result of activation of innate immune cells. But, in fact, recent studies have revealed that alcohol induces immune activation, which drives the progression of ALD.
Innate immunity comprises chemical-physical barriers (e.g., epidermal cells, mucous membranes, and pH), as well as cellular defenses against any invading microbe or agent the immune system perceives as dangerous to the body’s cells and tissues (Gao et al. 2011). These cellular defenses, which include both immune cells (e.g., macrophages and dendritic cells) and proteins (e.g., cytokines), normally are well balanced to sense and respond to harmful agents while avoiding unnecessary immune activation. Alcohol disrupts this balance, triggering immune responses that result in inflammation (Gao et al. 2011; Seki and Schnabl 2012; Szabo et al. 2011; Wang et al. 2012). Continued high alcohol intake fuels a multistage process in which alcohol-induced liver damage advances along a continuum of steatosis, inflammation, and fibrosis, to the final stage, cirrhosis, marked by widespread tissue deformation and damage (Gao et al. 2011; Orman et al. 2013; Seki and Schnabl 2012; Wang et al. 2012).
It has been known for some time that alcohol consumption triggers inflammation of the liver, but how alcohol brings about this disease state has long remained unclear. More recently, researchers have uncovered key roles of Toll-like receptors (TLRs), whose activation during alcohol exposure results in upregulation of pro-inflammatory cytokines (e.g., tumor necrosis factor α [TNFα] and interleukin [IL]-1β) and chemokines (e.g., monocyte chemoattractant protein [MCP]-1). Moreover, these immune responses result in production of reactive oxygen species (ROS), epigenetic changes, and infiltration of tissues with circulating monocytes and neutrophils (Gao et al. 2011; Petrasek et al. 2013; Seki and Schnabl 2012; Szabo et al. 2011; Wang et al. 2012).
Although the exact molecular mechanisms through which alcohol activates innate immune cells are not entirely understood, there is increasing evidence for the close relationship between the effects of alcohol on the gastrointestinal (GI) tract and injury to the liver. Heavy alcohol consumption changes the composition of microbial communities in the GI system, tipping the balance toward more pathogenic species. Recent observations in animal models suggest that these changes are involved in promoting ALD (Yan and Schnabl 2012). Alcohol also seems to disrupt the structural integrity of the gut, causing release of bacteria and bacterial products into the circulation, which activates innate immune responses (Rao 2009; Seki and Schnabl 2012; Yan and Schnabl 2012). Because the GI tract is closely connected to the liver via the portal vein, the liver is a focal point for these alcohol-induced, gut-derived immune challenges.
Receptors located on resident immune cells in the liver (i.e., Kupffer cells; see sidebar, “Liver Cell Types and Their Roles in ALD”) sense and transmit these immune challenges. These receptors are specifically adapted to the high-challenge environment of the liver, and this adaptation contributes to the decreased responsiveness to immune challenges (i.e., liver tolerance) in healthy individuals (Petrasek et al. 2013; Seki and Schnabl 2012). However, alcohol’s effects on the gut and on immune cells, such as Kupffer cells, reduce liver tolerance and thus increase the potential for persistent inflammation. For example, microbial metabolites and cellular products released in response to the damage caused by alcohol and its metabolites activate cell surface (e.g., TLR4) and intracellular (e.g., nucleotide-binding oligomerization domain [NOD]-like) receptors (Cohen et al. 2011; Petrasek et al. 2013). This activation triggers the expression of pro-inflammatory genes, secretion of cytokines, and recruitment of various immune cells.
Additional findings suggest that alcohol exposure leads to heritable changes in how genes are expressed (e.g., epigenetic regulation) (Curtis et al. 2013). These long-lasting changes in gene expression may shift production of immune cells from anti- to pro-inflammatory cells and may induce other cellular changes that promote inflammation and ALD. Alcohol consumption also destabilizes reduction and oxidation processes (i.e., the redox balance) in the liver (Cohen et al. 2011), leading to increased production of destructive ROS that damage tissues and thus activate innate immune cells in the organ.
The goal of this review is to highlight recent advances in efforts to unravel the role of innate immunity in ALD. The following sections will focus on knowledge gleaned from recent studies of the roles of innate immune cells, proteins, and pathways in the development and progression of ALD. Although ALD is a human disease, much of the current knowledge of the role of innate immunity in ALD has been inferred from animal and in vitro cellular models of alcohol exposure. The significant degree of conservation in innate immune pathways from mouse to human bolsters the idea that many, if not most, findings in these animal and cellular models can be extrapolated to people. However, most of the information from the animal and cellular models discussed in this review awaits confirmation in studies with human subjects. The article will also explore how this knowledge may be used for treating and managing this disease.
The Natural History of ALD
Approximately 30 percent of people who regularly consume large amounts of alcohol have a significantly increased risk for developing ALD (Lucey et al. 2009; O’Shea et al. 2010), which becomes chronic and progressively worse if alcohol consumption continues unchecked (Gao et al. 2011). The disease typically commences with the development of fatty liver (i.e., hepatic steatosis); with continued heavy alcohol consumption, steatosis may transition to inflammation, resulting in tissue damage and fibrosis (see figure 1). Ultimately, chronic ALD results in extensive organ damage and disease characterized by necrosis (i.e., cirrhosis), and in about 2 percent of cases, cancer (i.e., hepatocellular carcinoma) may develop (Orman et al. 2013; Schwartz and Reinus 2012). Alcoholic hepatitis—an acute manifestation of ALD that may coincide with clinical signs of fatty liver (in which case it is termed alcoholic steatohepatitis) (Lucey et al. 2009)—may occur at any stage of the disease process and significantly predisposes patients to developing cirrhosis.
The role of innate immunity in the natural history of alcoholic liver disease (ALD). Heavy alcohol consumption causes release of bacterial products (i.e., lipopolysaccharides [LPSs]) from the gut into the bloodstream. These LPSs lead to activation of liver innate immunity by stimulating Toll-like receptor 4 (TLR 4) signaling on Kupffer cells and hepatocytes.
Figure 1 The role of innate immunity in the natural history of alcoholic liver disease (ALD). Heavy alcohol consumption causes release of bacterial products (i.e., lipopolysaccharides [LPSs]) from the gut into the bloodstream. These LPSs lead to activation of liver innate immunity by stimulating Toll-like receptor 4 (TLR 4) signaling on Kupffer cells and hepatocytes. The damaging effects of alcohol and its metabolism on cells trigger additional immune responses. Steatosis and inflammation in hepatocytes represent the early stages of ALD; continued alcohol-induced inflammation leads to apoptosis/necroptosis in hepatocytes. Downregulation of BMP and activin membrane–bound inhibitor (BAMBI) and increased transforming growth factor β (TGF-β) signaling activate hepatic stellate cells, which differentiate into myofibroblasts causing fibrosis. About 10 to 20 percent of patients with ALD (about 70 percent of patients with alcoholic hepatitis) progress to cirrhosis. Differentiation and proliferation of precancerous liver cells present in cirrhosis lead to cancer in about 10 percent of cirrhosis patients. Acute alcohol-induced inflammation (i.e., alcoholic hepatitis), characterized by high levels of pro-inflammatory cytokines (e.g., interleukin [IL]-17 and IL-8), may occur at any stage of ALD and, in severe cases, may cause death in about 50 percent of patients.
The first stage in ALD, hepatic steatosis, involves several processes. Alcohol’s metabolism generates an overabundance of the metabolic intermediate nicotinamide adenine dinucleotide in its reduced form (NADH), which stimulates the synthesis of excess fatty acids in the liver (Lieber 2004). In addition, recent evidence has shown significant involvement of innate immune pathways in steatosis (Mandrekar et al. 2011). This evidence points to substantial crosstalk between metabolic and immune pathways and highlights the multifactorial nature of this initial stage. Steatosis typically resolves with abstinence from alcohol in people who have no other conditions (e.g., obesity) that promote steatosis. However, continued alcohol use may lead to alcoholic hepatitis, a moderate to severe disorder arising from acute alcohol-induced inflammation for which no highly effective treatment currently is available.
Chronic alcohol use may also lead to the development of fibrosis (Hernandez-Gea and Friedman 2011), characterized by the generation of scar tissue composed of extracellular matrix proteins, such as collagens. As in steatosis, both aberrant metabolic processes and activation of immune responses play roles in the development and progression of fibrosis. Acetaldehyde generated during the oxidative breakdown of alcohol inhibits certain immune cells (i.e., natural killer cells) that normally moderate fibrosis by inducing apoptosis in activated hepatic stellate cells (HSCs) (Hernandez-Gea and Friedman 2011; Orman et al. 2013). In addition, cytokines secreted by Kupffer cells, as well as inflammatory scar–associated macrophages recruited from the periphery (Ramachandran and Iredale 2012), activate quiescent HSCs, resulting in the development and proliferation of extracellular matrix–producing myofibroblasts, whose activity precipitates fibrosis.
About 10 to 20 percent of patients with fibrosis who continue to heavily consume alcohol progress to the final stage of ALD, cirrhosis (Orman et al. 2013). This disease stage is characterized by widespread damage to the liver, including fibrotic deformation of tissues and blood vessels, as well as necrosis of cells. The main features of cirrhosis are the formation of nodules of varying sizes, which signify localized regeneration of lost tissues, and the obstruction of blood vessels, which causes portal hypertension. Release of immunogenic cellular debris from necrotic liver cells and the loss of the liver’s ability to clear microbial and other pro-inflammatory metabolites from the circulation results in unremitting stimulation of innate immune pathways. As a result, cirrhosis generally is associated with a poor prognosis, with a median survival time of about 10 years. Further, liver cancer (i.e., hepatocellular carcinoma) is seen in about 2 percent of patients with cirrhosis (Orman et al. 2013).
Liver Cell Types and Their Roles in ALD
Kupffer Cells
Kupffer cells are macrophages located in the liver sinusoids. They usually are among the first cells exposed to alcohol-induced, microbe-derived immunogenic challenges originating from the gut, including lipopolysaccharides (LPSs) and peptidoglycans. Kupffer cells have a dual role in mediating pro-inflammatory responses and moderating these responses through expression of anti-inflammatory cytokines. They express Toll-like receptors (TLRs), including TLR4, TLR2, TLR3, and TLR9, which, on contact with LPS, lipoteichoic acid (a component of the cell walls in Gram-positive bacteria), viral RNA, and CpG-island DNA, respectively, trigger pro-inflammatory response pathways. For example, in response to LPS stimulation, Kupffer cells produce inflammatory cytokines (e.g., tumor necrosis factor α [TNFα], interleukin [IL]-1β, IL-6, and IL-10) and several chemokines through the central regulator of inflammation, nuclear factor κB (NF-κB). Secretion of IL-12 and IL-18 activates production of interferon γ (IFN-γ) in natural killers cells, and production of transforming growth factor β 1 (TGF-β1) and ROS contribute to alcohol-induced fibrogenesis in liver tissues. Kupffer cells contribute to liver tolerance by expressing anti-inflammatory IL-10 on exposure to LPS.
Hepatic Stellate Cells
Hepatic stellate cells (HSCs) are activated by liver damage and express TLR2, TLR4, and TLR9, which respond to lipoteichoic acid, LPS, and CpG DNA, respectively. TLR stimulation in HSCs results in expression of IL-6, TGF-β1, and monocyte chemotactic protein (MCP-1). On activation, HSCs differentiate into myofibroblasts, representing the major producers of extracellular matrix, which contributes to fibrosis.
Hepatocytes are epithelial cells and the major cell type of the liver. They significantly contribute to elimination of inflammation-inducing LPS from circulating blood. LPS uptake by hepatocytes requires activity of the TLR4–CD14–MD-2 complex. Hepatocytes are the target for TNFα released by Kupffer cells in response to alcohol and LPS exposure and may undergo apoptosis or necrosis in response to TNFα receptor activation.
Hepatic Dendritic Cells
Activation of TLR9 and TLR7 on or in specialized plasmacytoid dendritic cells results in production of IFN-α. Conventional dendritic cells of the liver respond to LPS or lipoteichoic acid via activation of TLR4 or TLR2 by producing TNFα, IL-12, or IL-6.
Biliary Epithelial Cells
Biliary epithelial cells express TLRs 1 through 10 and exhibit activation of NF-κB expression and TNFα expression after stimulation with high doses of alcohol-induced LPS.
Sinusoidal Endothelial Cells
Sinusoidal epithelial cells (SECs) line the hepatic sinusoids and express TLR4-CD14 along with TLR9. Exposing SECs to LPS downregulates NF-κB activation, CD54 expression, and leukocyte adhesion. In these cells, LPS tolerance is not controlled via TLR4 expression, and the role of SECs in uptake of LPS in the liver is unclear.
Innate Immunity and ALD
As mentioned above, various innate immune cells and their actions play prominent and complex roles in the initiation and progression of ALD. The oxidative breakdown of alcohol by dedicated alcohol dehydrogenases and by cytochrome P450 monooxygenases generates ROS that may damage proteins, lipids, and other cellular structures. In addition, alcohol’s breakdown metabolite, acetaldehyde, exerts toxic effects on cellular structures and DNA (Wang et al. 2012). The ROS- and acetaldehyde-induced cell damage activates innate immune cells, triggering an inflammatory reaction even in the absence of invading pathogens (i.e., sterile inflammation) (Kubes and Mehal 2012). Sterile inflammation results from activation of pro-inflammatory pathways in immune and other cells carrying receptors for detecting damage-associated molecular patterns (DAMPs; also called alarmins). These molecules are released by stressed or necrotic cells, such as hepatocytes damaged by alcohol or its breakdown products. These immune pathways are essential for clearing damaged cells and cellular debris from tissues; however, their persistent activation by alcohol leads to repeated cycles of cell damage and resultant stimulation of innate immune cells, causing chronic inflammation of the liver.
Chronic alcohol intake also has more indirect effects that play a major role in ALD. Excessive alcohol consumption changes the composition of microbes found in the gut (i.e., the gut microbiome) and seems to contribute to loss of tight cellular connections in the small intestine (Rao 2009). This alcohol-induced breach of the gut barrier causes release of immunogenic compounds, primarily bacterial lipopolysaccharide (LPS, also known as endotoxin) (Bode et al. 1987) and other cell-wall constituents like peptidoglycans and microbial DNA, into the circulation. LPS is a major trigger of pro-inflammatory pathways, and its role in inflammation of the liver and stimulation of innate immunity is well established (Petrasek et al. 2013; Rao 2009; Seki and Schnabl 2012). Unmethylated CpG–containing DNAs released from bacterial cells have also emerged as a significant activator of liver innate immunity (Petrasek et al. 2013; Seki and Schnabl 2012).
In addition, alcohol depletes the levels of S-adenosylmethionine (SAM) (Lieber 2000) a universal methyl donor important for epigenetic regulation of transcription. Intragastric feeding of SAM in rats diminished the activity of alcohol-activated innate immune pathways (Oliva et al. 2011), highlighting the potential role of SAM in moderating innate immune responses.
Effects on Kupffer Cells and the Complement System
Kupffer cells are the resident macrophages of the liver and have key functions in innate immunity. Because of the crucial role Kupffer cells play in defending the liver against pathogens, they are among the first immune cells to respond to alcohol-induced surges of microbial metabolites, such as LPS. These bacterial products engage with the TLR4 receptors on the Kupffer cells. LPS-induced TLR4 activation stimulates the production of cytokines, including TNFα, IL-6, and IL-1b, and of chemokines, such as KC (CXCL1), MIP-2 (CXCL2), MCP-1 (CCL2), and RANTES (Gao et al. 2011; Mandrekar and Szabo 2009; Petrasek et al. 2013; Szabo et al. 2011). Secretion of these molecules from Kupffer cells, in turn, activates a pro-inflammatory cascade affecting processes in other liver cells. For example, tumor necrosis factor α (TNFα) secreted by activated Kupffer cells interacts with TNFα receptors on hepatocytes (see figures 2 and 3). TNFα receptor activation, in turn, contributes to steatosis and, ultimately, to necrosis and apoptosis of the hepatocytes that normally clear LPS and other xenobiotic compounds from the liver (Gao et al. 2011). Alcohol also affects macrophage plasticity—the environmentally determined activation to either classical pro-inflammatory (i.e., M1) or alternative anti-inflammatory (i.e., M2) macrophages. Alcohol represses activation to the M2 phenotype and thus skews macrophage distributions toward the pro-inflammatory M1 state (Louvet et al. 2011; Mandal et al. 2011).
Alcohol’s effects on pro-inflammatory pathways in liver macrophages (i.e., Kupffer cells)
Figure 2 Alcohol’s effects on pro-inflammatory pathways in liver macrophages (i.e., Kupffer cells). Excessive alcohol consumption increases the permeability of the gastrointestinal (GI) tract, exposing Kupffer cells to bacterial endotoxin (i.e., lipopolysaccharide [LPS]). LPS is bound by LPS-binding protein (LBP), enabling engagement with Toll-like receptor 4 (TLR 4) and activating the myeloid differentiation primary response (MyD) 88–independent signaling pathway involving interferon regulatory factor 3 (IRF3) and TIR domain–containing adapter-inducing interferon-β (TRIF). IRF3–TRIF signaling induces production of reactive oxygen species (ROS) by nicotinamide adenine dinucleotide phosphate (NADPH) oxidases and activates nuclear factor κB (NF-κB) and histone acetylation, which trigger transcription of genes for several pro-inflammatory cytokines (i.e., tumor necrosis factor α [TNFα] and interleukin [IL]-17). Alcohol’s breakdown to acetaldehyde and acetate also stimulates ROS signaling and cytokine production. In addition, IRF3–TRIF signaling and detection of damage-associated molecular patterns (DAMPs or alarmins) released from hepatocytes after alcohol exposure stimulate the inflammasome, a multiprotein complex containing caspase 1, which cleaves and thus activates another pro-inflammatory cytokine, IL-1β. Alcohol activates complement, generating anaphylatoxins C3a and C5a, which dock with their cognate receptor on Kupffer cells, further stimulating cytokine production.
NOTES: ADH = alcohol dehydrogenase; ALDH = acetaldehyde dehydrogenase; C3a/C5a R = C3a/C5a receptor; CD14 = cluster of differentiation 14 protein; MD-2 = myeloid differentiation 2 protein; NOD-like R = nucleotide-binding oligomerization domain–like receptor.
Alcohol’s direct effects on activity and viability of parenchymal liver cells (i.e., hepatocytes) and on immune-cell signaling to hepatocytes.
Figure 3 Alcohol’s direct effects on activity and viability of parenchymal liver cells (i.e., hepatocytes) and on immune-cell signaling to hepatocytes. Excessive alcohol consumption increases the permeability of the gastrointestinal (GI) tract, exposing hepatocytes to bacterial endotoxin (i.e., lipopolysaccharide [LPS]). LPS is bound by LPS-binding protein (LBP), enabling engagement with Toll-like receptor 4 (TLR4) and activation of pro-inflammatory signaling pathways. TLR4 signaling activates expression of nuclear factor κB (NF-κB), which, along with reactive oxygen species (ROS) generated in mitochondria (as a result of exposure to the toxic alcohol-breakdown product acetaldehyde) and Kupffer cells, activates transcription of pro-inflammatory cytokines (i.e., IL-8). Tumor necrosis factor α (TNFα) produced by activated Kupffer cells stimulates sterol regulatory element–binding protein 1c (SREBP-1c), which triggers expression of genes in lipid synthesis, in turn initiating the development of abnormal fat deposition (i.e., steatosis). The combined action of lipid synthesis and upregulated expression of pro-inflammatory cytokines may spur programmed cell death (i.e., apoptosis) and necrosis, resulting in alcohol-induced loss of hepatocytes from tissues
NOTES: ADH = alcohol dehydrogenase; CD14 = cluster of differentiation 14 protein; MD-2 = myeloid differentiation 2 protein; TNFαR = TNFα receptor.
The complement system is a major antimicrobial defense pathway that straddles both innate and adaptive immunity. Most of the proteins in this system are produced in the liver. Alcohol activates complement pathways (Cohen et al. 2010) and, in heavy drinkers, can also compromise complement action by impairing liver function. Complement activation results in the production of C3a and C5a anaphylatoxins—short peptides of the complement system. Through interactions with C3a and C5a receptors, these anaphylatoxins trigger the production of pro-inflammatory innate immune proteins, such as cytokines, in leukocytes and thus contribute to inflammation (Cohen et al. 2011) (see figures 2 and 4).
Expression and Activation of TLRs
TLRs are expressed on many cells of the liver, including Kupffer cells, endothelial cells, dendritic cells, biliary epithelial cells, HSCs, and hepatocytes. The expression of the TLRs and their level of responsiveness on these different cells normally are adjusted to promote appropriate reactions to immune challenges and prevent misplaced and potentially damaging responses (Petrasek et al. 2013). Alcohol exposure turns up the dial of this finely tuned TLR network, heightening TLR responses to external and internal triggers, such as pathogen-associated molecular patterns (PAMPs) and DAMPs, respectively (Petrasek et al. 2013; Seki and Schnabl 2012).
TLR4 plays a very prominent role in alcohol-induced inflammation, activating two distinct signaling pathways—the myeloid differentiation primary response gene 88 (MyD88)-dependent pathway and the MyD88-independent pathway (Petrasek et al. 2013; Seki and Schnabl 2012; Wang et al. 2012). Engagement of the MyD88-dependent TLR pathway triggers expression of nuclear factor kappa B (NF-κB), a central transcriptional regulator of immune responses and pro-inflammatory pathways. TLR4-mediated, MyD88-dependent signaling also promotes mitogen- activated protein kinase (MAPK)-induced production of cytokines, including TNFα. The MyD88-independent pathway proceeds via a different major adaptor protein, TIR domain–containing adapter-inducing interferon-β (TRIF), and results in production of interferon regulatory factor 3 (IRF3), type 1 interferons (IFNs), and pro-inflammatory cytokines.
Experiments in rodent models of ALD have demonstrated that TLR4–TRIF signaling plays an essential role in alcohol-induced activation of TLR4 in Kupffer cells (Hritz et al. 2008; Mandal et al. 2010b) (see figure 2). Moreover, TLR4 signaling in both immune cells (i.e., Kupffer cells) and nonimmune cells involved in tissue repair (i.e., HSCs) is required for the development of alcoholic hepatitis and fibrosis (Inokuchi et al. 2011). Co-receptor proteins (e.g., cluster of differentiation [CD] 14 and myeloid differentiation [MD] 2) influence the responsiveness of TLR4 to receptor ligands, such as LPS.
Cytokines and Chemokines in ALD
Cytokines are relatively small proteins (i.e., less than 30 kDa in size), many of which are produced by various cells in response to injury or contact with pathogens. Patients with ALD often have elevated levels of various cytokines (see sidebar, “Key Cytokines and Hormonal Peptides in ALD”) (Szabo et al. 2011). The cytokines are key components of the innate immune system, facilitating cell-to-cell communication and regulating proliferation and maturation of cell populations in response to immune challenges and environmental changes. Cytokines engage with cells via specific receptors on the cellular surfaces, sometimes triggering their own (i.e., autocrine) production in the cells or amplifying or inhibiting the activities of other cytokines. These interactive cytokine networks play an indispensable role in mediating innate immune responses, and their relative contributions define the different types and outcomes of these responses. A subset of cytokines, the chemokines, recruit immune cells, such as neutrophils and lymphocytes, to sites of injury or infection; thus, chemokines are often involved in pro-inflammatory signaling pathways.
As can be expected from alcohol’s effect on the innate immune cells of the liver, such as Kupffer cells, and on LPS-activated TLR signaling, heavy alcohol consumption stimulates the production of many cytokines. One of the major cytokines in ALD and one of the first to be associated with the condition is TNFα (McClain and Cohen 1989). TNFα is expressed early in response to alcohol exposure, and its production coincides with liver damage; moreover, abolishing its expression in animal models of ALD mitigates liver injury (Gao 2012; Wang et al. 2012). These observations underscore that TNFα’s prominent pro-inflammatory role in ALD and its activity significantly contributes to alcohol-induced liver damage.
Interleukins are also among the pro-inflammatory cytokines implicated in ALD. For example, TNFα, along with other NF-κB–induced agents, stimulates the expression of IL-8, whose levels are greatly increased in alcoholic hepatitis (Sheron et al. 1993). IL-17 is also upregulated in ALD, and although its activity is lower than that of TNFα, it seems to play a role in both inflammation and fibrosis of the liver (Lemmers et al. 2009).
Alcohol exposure also induces expression of anti-inflammatory cytokines. For example, three interleukins— IL-6, IL-10, and IL-22—activate signal transducer and activator of transcription 3 (STAT3), a transcriptional regulator of an array of genes involved in immunity and cellular defenses and differentiation (Gao 2012; Wang et al. 2012). IL-22 binds to specific receptors on epithelial cells and on hepatocytes and triggers the expression of anti-apoptotic and anti-oxidative stress genes while repressing genes involved in lipid production (Gao 2012; Wang et al. 2012). It often remains unclear whether the expression of anti-inflammatory cytokines reflects a compensatory response of the immune system to the alcohol-induced upregulation of the pro-inflammatory cytokines or to the cell damage alcohol produces.
Interestingly, although IL-6, IL-10, and IL-22 all stimulate STAT3, only IL-22 seems to have solely anti-inflammatory effects protecting against acute and chronic liver damage (Park et al. 2011). IL-6 and IL-10, in contrast, have dual roles as both pro- and anti-inflammatory proteins in ALD (Gao 2012; Wang et al. 2012). Their specific effects seem to be determined by the cell type affected and the stage of ALD. For example, IL-6 increases the expression of pro-inflammatory cytokines in Kupffer cells (Gao 2012), but its activity also protects hepatocytes. Recent findings suggest that alcohol-induced oxidative stress stimulates the expression of IL-6, promoting senescence in hepatocytes, which, in turn, makes cells more resistant to steatosis and apoptosis (Wan et al. 2014). IL-10 blocks the activation of TNFα and complement, thus reducing expression of pro-inflammatory pathways; but it also checks expression of IL-6, thus limiting liver regeneration afforded by IL-6–induced upregulation of expression of liver-protective genes (Gao 2012).
Chemokines also play critical roles in alcohol-induced inflammation. For example, the levels of MCP-1 (also known as CCL2) are elevated in patients with ALD, and upregulated MCP-1 expression is also observed in Kupffer cells and hepatocytes of alcohol-fed mice (Mandrekar et al. 2011). Feeding alcohol to MCP-1–deficient mice results in less steatosis, lower expression of pro-inflammatory cytokines (i.e., of TNFα, IL-1β, and IL-6), and lower levels of oxidative stress than in wild-type mice (Mandrekar et al. 2011). Moreover, MCP-1 is required for activating cytokine expression in response to LPS (Mandrekar et al. 2011). In patients with ALD, increased MCP-1 expression is associated with increased disease severity and elevated levels of the pro-inflammatory cytokine IL-8 (Dégre et al. 2012). One major role of MCP-1 in ALD is to recruit neutrophils to inflamed liver tissues. However, because circulating neutrophils in the ALD patients lack MCP-1 receptors (Dégre et al. 2012), the exact mechanisms by which MCP-1 exerts its control over neutrophil movement remain to be elucidated. Nevertheless, these results connect chemokines to lipid metabolism in the liver and suggest that MCP-1 plays a major role in alcohol-induced liver inflammation by activating several pro-inflammatory cytokines in response to common triggers of ALD and by promoting neutrophil infiltration into liver tissues.
Barnes and colleagues (2013) recently demonstrated that macrophage migration inhibitory factor (MIF)—a multifunctional pro-inflammatory cytokine and chemokine, which also has some hormonal features—has a critical role in both the early and chronic stages of liver injury in a mouse model of ALD. MIF-deficient mice are protected against several of alcohol’s effects on the innate immune system, including inflammation, and also against hepatocyte damage and apoptosis. Similar to MCP-1, MIF plays a role in alcohol-induced lipid accumulation in liver cells (Barnes et al. 2013), suggesting a role for both chemokines in regulating lipid metabolism directly or indirectly. The findings lend further support to existing evidence that links innate immune pathways and proteins to the regulation of fundamental metabolic processes.
The effect of the hormonal peptide adiponectin on innate immunity, specifically on anti-inflammatory cytokine production and activity, is also worth noting. Adiponectin is secreted by fat cells (i.e., adipocytes) and has been shown to alleviate steatosis, inflammation, and liver damage in animal models (Xu et al. 2003). Recent evidence suggests that adiponectin moderates alcohol-induced production of pro-inflammatory TNFα and promotes expression of IL-10 (Mandal et al. 2010a). Because IL-10 activates STAT3, its activation by adiponectin lowers inflammation by stimulating STAT3-induced expression of anti- inflammatory genes in myeloid cells, such as Kupffer cells. In addition, adiponectin stimulates heme oxygenase 1 (HO-1), which suppresses the pro-inflammatory TLR4-dependent/MyD88-independent pathway in Kupffer cells (Mandal et al. 2010b). Alcohol-induced oxidative stress decreases secretion of adiponectin by adipocytes (Tang et al. 2012), which links oxidative stress to decreased levels of liver-protective, anti-inflammatory hormones, representing yet another mechanism by which alcohol perturbs liver innate immunity.
Another small peptide, ghrelin, which is produced mainly in the gut but also in the liver, has been shown to promote antifibrotic and hepatoprotective effects in both animals and humans with hepatic fibrosis (Moreno et al. 2010). Ghrelin decreases activation of NF-κB in hepatocytes, which attenuates apoptotic signaling in these cells. It also limits expression of collagen-α1 and TGF-β1 but not of NF-κB and IL-8 in HSCs, indicating that ghrelin protects liver tissues mainly by suppressing fibrogenic activities in liver cells (Moreno et al. 2010).
Key Cytokines and Hormonal Peptides in ALD
Tumor Necrosis Factor α
Tumor necrosis factor α (TNFα) is a major pro-inflammatory cytokine whose levels are increased in the blood and liver of individuals with alcoholic liver disease (ALD). TNFα expression is regulated by the transcription factor nuclear factor kappa B (NF-κB). It is upregulated in macrophages (i.e., Kupffer cells) as well as in circulating monocytes in response to Toll-like receptor 4 (TLR4) activation by bacterial endotoxin (i.e., lipopolysaccharide [LPS]) and by the breakdown products of alcohol, acetaldehyde and acetic acid. TNFα induces necrosis and apoptosis in hepatocytes, thus contributing to inflammation in ALD. TNFα repression by the phosphodiester-inhibitor pentoxifylline and by treatment with TNFα antibody alleviates TNFα-induced liver damage in mice and improves the short-term survival of ALD patients, respectively, but increases the risk for infections in ALD patients.
Interleukin 1β
Interleukin-1β (IL-1β) along with type I IL-1 receptor (IL-1R1), and IL-1 receptor antagonist (IL-1Ra), is an important regulator of the IL-1 signaling complex. This complex plays a critical role in alcohol-induced hepatic steatosis, inflammation, and damage. IL-1β activation is mediated through the inflammasome, a multiprotein complex in macrophages that senses and transduces endogenous danger signals via IL-1β cleavage by caspase-1. IL-1β increases the activity of pro-inflammatory monocyte chemotactic protein (MCP-1) in hepatocytes and contributes to increased TLR4-dependent pro-inflammatory signaling in macrophages.
IL-6 has both pro- and anti-inflammatory activities. It increases expression of pro-inflammatory cytokines in macrophages and decreases necrosis-associated inflammation in hepatocytes, which aids recovery from injury and facilitates tissue regeneration. Along with IL-10 and IL-22, IL-6 activates signal transducer and activator of transcription 3 (STAT3), which controls expression of a set of genes involved in innate immunity and in cell survival and differentiation. IL-6 release from M2 macrophages induces senescence and blocks apoptosis and steatosis in hepatocytes in the early stage of alcohol-induced liver injury in mice. IL-6 activates STAT3 in sinusoidal endothelial cells of the liver, thereby increasing cell survival. IL-6 levels, along with those of IL-8 and IL-10, are increased in patients with ALD who have no clinical signs of liver disease.
IL-8 is released from injured hepatocytes and has important pro-inflammatory roles as a chemokine that recruits neutrophils to sites of inflammation. Its expression is induced by TNFα via activation through NF-κB. IL-8 levels are greatly increased in people with acute alcoholic hepatitis but are only moderately upregulated in those with cirrhosis. IL-8 levels, along with those for IL-6 and IL-10, are elevated in individuals with alcoholism who have no signs of liver disease.
IL-10 is a strong suppressor of inflammation by preventing production of the pro-inflammatory cytokines TNFα, IL-1β, and IL-6 in macrophages. However, its anti-inflammatory, hepatoprotective effects are contingent on the expression of other cytokines, and its inhibitory effect on IL-6 expression can delay liver regeneration and increase steatosis. IL-10 expression is moderately to highly increased in ALD and, along with that of IL-6 and IL-8, is also upregulated in alcoholic patients without signs of liver disease. IL-10 acts only on immune cells expressing its cognate receptors and facilitates sustained activation of the transcription factor STAT3 in Kupffer cells, thus inhibiting inflammation. IL-10 also inhibits fibrosis.
IL-17 is a recently discovered, pro-inflammatory chemo-kine whose levels are increased in people with ALD. It is produced by monocytes and T cells and plays an impor-tant role in recruiting neutrophils to inflamed liver tissues. It may act in concert with TNFα to activate NF-κB, thereby inducing expression of other pro-inflammatory cytokines. IL-17’s main targets are hepatic stellate cells (HSCs), in which it induces production of pro-inflammatory IL-8. IL-17 is also thought to be involved in the development of fibrosis.
IL-22 is an anti-inflammatory cytokine whose expression limits steatosis and liver damage. The IL-22 targets are hepatocytes in which it activates the transcription factor STAT3. The antioxidant, antiapoptotic, and antisteatotic actions of IL-22 make it a promising target of interventions for treating ALD with minimal side effects because of the restricted distribution of IL-22 receptors.
Adiponectin is an adipokine, a peptide hormone, whose secretion from fat cells (i.e., adipocytes) is inhibited by alcohol. Adiponectin increases fatty acid oxidation and thus suppresses steatosis. It also decreases expression of the pro-inflammatory cytokine TNF-α in macrophages (i.e., Kupffer cells) by inducing expression of heme oxygenase 1 (HO-1), which decreases TLR4/MyD88-independent signaling, and by increasing polarization to anti-inflammatory M2 macrophages. In addition, adiponectin upregulates expression of anti-inflammatory IL-10.
Activation of the Inflammasome and IL-1β Expression
Recent observations by Petrasek and colleagues (2012) in a mouse model of alcoholic hepatitis support significant involvement of another important cytokine, IL-1b—which has roles in rheumatoid arthritis and autoimmune disorders—in alcohol-induced inflammation. The researchers show that the IL-1b signaling complex is essential for the initiation of alcohol-induced inflammation and progression to liver fibrosis. IL-1b is activated through the inflammasome, a large protein assembly composed of NOD-like receptor proteins that sense alarmins, the caspase-1 (Casp-1) protein (an enzyme that cleaves other proteins to activate them), and an apoptosis-associated speck-like CARD-domain-containing (ASC) protein (Szabo and Csak 2012) (see figures 2 and 3). The inflammasome is activated in Kupffer cells of alcohol-fed mice (Petrasek et al. 2012) as well as in hepatocytes exposed to LPS and fatty acids (Csak et al. 2011). It is stimulated by intracellular signals such as alarmins, which engage with pattern-recognition domains of the NOD-like receptors.
Inflammasome activity in Kupffer cells promotes Casp-1–mediated cleavage, and thus activation, of IL-1β (Petrasek et al. 2012). Blocking IL-1β activity strongly decreases liver inflammation and damage (Petrasek et al. 2012). These findings further amplify the view that IL-1β acts as a pro- inflammatory cytokine in immune cells in ALD and that IL-1β signaling through the inflammasome is required for alcohol-induced liver injury. Coupled with the observations of Mandrekar and colleagues (2011) on MCP-1, these findings also establish a link between innate immune activity and steatosis. This association is further supported by the observation that steatosis can be prevented when innate immune responses are experimentally abrogated by checking IL-1β or MCP-1 activity. Additional investigations into pro-inflammatory signaling in the methyl-choline deficiency model of non-alcoholic steatohepatitis have indicated that activation of the inflammasome and generation of IL-1β are independent of TLR4 but contingent on the MyD88-dependent pathway (Csak et al. 2014).
Cytokine Effects on Hepatocytes and HSCs
Alcohol-induced increases in LPS stimulate TNFα production and its release primarily from Kupffer cells (McClain and Cohen 1989; Wang et al. 2012). In addition, alcohol sensitizes other liver cells to TNFα’s actions (An et al. 2012). One distinct role of TNFα is to induce programmed cell-death pathways (i.e., apoptosis and necroptosis) by binding to and activating death receptors on cells. Activation of these receptors results in the expression of pro-apoptotic or necroptotic mediators (e.g., caspases and receptor-interacting proteins). Alcohol thus has profound effects on cell viability by activating the expression of cytotoxic cytokines and increasing cell sensitivity to the actions of these cytokines. For instance, whereas hepatocytes in healthy people are not highly sensitive to TNFα activation of death receptor pathways, alcohol primes cells for the TNFα-mediated stimulation of cell-death pathways (Pastorino and Hoek 2000).
TNFα binds to and activates two receptors—TNF-R1 and TNF-R2—and the outcome of their activation hinges on the relative levels of stimulation of three main pathways: a pro-apoptotic pathway, a pro-necroptotic pathway, and a cell-survival pathway (Vanden Berghe et al. 2014). Binding to TNF-R1 activates apoptotic and necrotic pathways through a signaling cascade involving multiple proteins, including TNF-R1–associated death domain protein (TRADD); TNF receptor–associated factor 2 (TRAF2); and caspases 8, 3, and 7. TNF-R1 activation also may result in the stimulation of a cell-survival pathway involving NF-κB. In contrast, activation of TNF-R2 stimulates only cell survival (Malhi et al. 2010).
Apoptosis is an important regulatory mechanism for controlling the size of cell populations (e.g., neutrophils) or to avoid unchecked proliferation of abnormal cells. However, apoptosis triggered via the action of alcohol-induced TNFα on, for example, hepatocytes can severely impair liver function. Recent evidence also indicates that chronic ethanol feeding can activate necroptotic cell-death pathways in hepatocytes. Mice in which an important necroptotic regulator—receptor-interacting protein kinase (RIP)-3—is inactivated are protected from alcohol-induced liver injury (Roychowdhury et al. 2013). Hepatocytes are the major cell type in the liver and, along with Kupffer cells, eliminate most of the LPS from circulation. Widespread apoptosis and necrosis of hepatocytes therefore increase levels of circulating LPS, which in turn fuels further inflammation through activation of TLR4 on Kupffer cells and ultimately escalates the release of pro-apoptotic TNFα. This helps explain why patients with severe liver disease (i.e., cirrhosis) often show high levels of LPS in the blood (i.e., endotoxemia), resulting in sepsis (Bode et al. 1987).
Persistent alcohol-induced activation of cytokines in immune cells such as Kupffer cells also promotes fibrosis. Production and secretion of transforming growth factor (TGF)-β and of platelet-derived growth factor (PDGF) from Kupffer cells or from inflammatory scar–associated macrophages activates HSCs (see figure 4), triggering them to develop into myofibroblasts. Moreover, HSCs may be further activated by engulfing apoptotic hepatocytes. HSCs express a number of receptors involved in innate immunity, including the C5a receptor, whose ligand, C5a, is a potent mitogen that may stimulate HSC migration (Das et al. 2014). HSCs also express TLR4, which senses LPS. Although LPS alone cannot activate HSCs, its action via TLR4 downregulates expression of BMP and activin membrane-bound inhibitor (BAMBI), thereby sensitizing the cells to activation by TGF-β (Liu et al. 2014; Seki et al. 2007). BAMBI is a pseudoreceptor, which in quiescent HSCs diminishes TGF-β’s activity by binding to it without triggering intracellular TGF-β signaling. As shown by Seki and colleagues (2007), decreased BAMBI expression sensitizes HSCs to TGF-β activation, and LPS-induced TLR4 activation stimulates chemokine secretion along with recruitment and activation of Kupffer cells. Moreover, LPS activates TLR4 signaling in HSCs through the MyD88-dependent NF-κB pathway, demonstrating involvement of this key innate immune pathway in fibrosis and recruitment of immune cells. NF-κB directly binds the BAMBI promoter, along with histone deacetylase (HDAC) 1, thus repressing BAMBI expression and promoting TGF-β activation (Liu et al. 2014).
Alcohol’s effects on fibrogenic pathways in hepatic stellate cells (HSCs).
Figure 4 Alcohol’s effects on fibrogenic pathways in hepatic stellate cells (HSCs). HSCs are quiescent liver cells that, on stimulation by pro-inflammatory proteins and other agents, differentiate into myofibroblasts to repair damaged tissues. Excessive alcohol consumption increases the permeability of the gastrointestinal (GI) tract, exposing HSCs to endotoxin (i.e., lipopolysaccharide [LPS]). LPS is bound by LPS-binding protein (LBP), enabling engagement with Toll-like receptor 4 (TLR 4) and activating the myeloid differentiation primary response (MyD88)-dependent pathway. MyD88 signaling decreases expression of BMP and activin membrane–bound inhibitor (BAMBI), a pseudoreceptor that suppresses responses to transforming growth factor β (TGF-β; secreted by activated Kupffer cells). Thus, alcohol-induced TLR4–MyD88 signaling increases the HSCs’ responsiveness to TGF-β. microRNA 29 (miR-29) inhibits the production of extracellular matrix (ECM), and its downregulation by MyD88 signaling therefore increases ECM deposition. TLR4–MyD88 signaling in HSCs—along with complement 5a and exposure to the alcohol-breakdown product acetaldehyde and platelet-derived growth factor (PDGF) and tumor necrosis factor α (TNFα) secreted from activated Kupffer cells—upregulates the expression of various chemokines (i.e., monocyte chemotactic protein [MCP-1], macrophage inflammatory protein 1 [MIP-1], and regulated on activation, normal T cell expressed and secreted [RANTES]). These chemokines recruit macrophages (i.e., Kupffer cells and scar-associated macrophages) and other immune cells to the site where HSCs reside (i.e., the liver perisinusoidal space or space of Disse). These signals spur the differentiation of HSCs into myelofibroblasts that produce and secrete ECM, leading to liver fibrosis. In addition, Kupffer cell–produced ROS inhibit activities of metalloproteinases, which normally degrade ECM and thus inhibit fibrosis.
NOTES: C5aR = C5a receptor; CD14 = cluster of differentiation 14 protein; MD-2 = myeloid differentiation 2 protein; TNFαR = TNFα receptor.
Activated HSCs produce and secrete extracellular matrix proteins (i.e., collagens), resulting in fibrogenesis (Hernandez-Gea and Friedman 2011; Seki and Schnabl 2012). Although fibrogenesis is essential for normal tissue repair, its dysregulation by recurrent activation of cytokines acting on HSCs precipitates inflammatory fibrosis. This stage of ALD involves the formation of scar tissue, which interferes with normal tissue function and often results in portal hypertension (Hernandez-Gea and Friedman 2011). Another cytokine pathway involving HSCs and leading to fibrosis in ALD patients involves IL-17. This cytokine, which is produced by peripheral blood cells (i.e., Th17 lymphocytes) in patients with alcoholic hepatitis and cirrhosis, stimulates its cognate receptors on HSCs (Lemmers et al. 2009). In response, the cells secrete IL-8 and growth-related oncogene (GRO)-α, recruiting neutrophils to their tissue, resulting in localized pro-inflammatory immune-cell infiltrates and fibrosis scores closely correlated with IL-17 levels.
Together, these findings indicate that cytokines produced by immune cells, such as TNFα produced by Kupffer cells and IL-17 produced by Th-17 lymphocytes, play a major role in ALD by affecting the viability and function of hepatocytes and by activating quiescent HSCs to produce excess extracellular proteins. These observations thus provide critical insight into the molecular processes and mechanisms that produce liver damage and fibrosis in ALD.
Epigenetic Effects
Alcohol exerts additional effects on the innate immune system, for example, by producing epigenetic changes in the expression of genes for pro- and anti-inflammatory pathways (Curtis et al. 2013). Epigenetic changes affect the activity at gene promoters or entire gene regions and can have long-term and even heritable effects on gene expression without altering the underlying DNA sequence. Three main mechanisms operate in epigenetics:
• DNA methyltransferases, using SAM as methyl donor, methylate a cytosine nucleotide at CpG-rich regions (i.e., CpG islands) in the DNA of gene promoters, which decreases expression of the downstream genes.
• Methylation, acetylation, phosphorylation, ubiquitination, or sumoylation of the proteins around which DNA is coiled (i.e., histones) alters accessibility of the transcriptional proteins to the DNA.
• Some investigators are now extending the concept of epigenetics to include transcriptional regulation by microRNAs (miRNAs). These molecules regulate the expression of mRNAs with which they share similar sequences (Curtis et al. 2013).
The study of alcohol’s effects on epigenetic regulation and of the mechanisms by which alcohol exerts these effects has been a rapidly emerging field over the past decade. Insight gleaned from initial studies has shown that alcohol can interfere with the fundamental processes of epigenetic regulation in people with ALD as well as in animal models of the disease or in cultured human cells exposed to alcohol or its metabolic byproducts (reviewed by Kruman and Fowler 2014; Mandrekar 2011; Shukla and Lim 2013).
Studies in animals and in human cells lines have demonstrated that alcohol and LPS increase the expression of microRNA-34a, which helps alleviate alcohol-induced apoptosis in hepatocytes and biliary epithelial cells by targeting caspase 2 and sirtuin 1. The elevated expression of miRNA-34a is the result of an alcohol-induced decrease in methylation (i.e., hypomethylation) at a CpG island in the miRNA-34a promoter (Meng et al. 2012).
Alcohol also alters the cellular levels of SAM and of histone acetyltransferases (HATs) and deacetylases (HDACs), whose activities make DNA more or less accessible, respectively, to gene transcription. For example, the histone deacetylase HDAC1 has been shown to play a critical role in the silenced expression in HSCs of the fibrosis-attenuating protein BAMBI (see figure 4) (Liu et al. 2014). In addition, chemical inhibition of HDAC activity seems to reduce inflammation by reversing an alcohol-induced perturbation in macrophage polarization that results in a greater proportion of pro-inflammatory (M1) macrophages (Curtis et al. 2013). Oxidative stress caused by alcohol metabolism also triggers epigenetic changes, and alcohol-induced release of LPS and activation of TLR4 affects both HAT and HDAC activities, resulting in epigenetic changes in DNA regions containing genes for pro-inflammatory cytokines (Curtis et al. 2013).
Approaches for Resolving Alcohol-Induced Liver Inflammation
Standard interventions for treating ALD depend on the stage and severity of the disease and typically include counseling abstinence from alcohol use; administration of corticosteroids (to inhibit alcohol-induced, pro-inflammatory pathways) and nutritional support for alcoholic hepatitis; and, in advanced cases, liver transplantation (Gao and Bataller 2011; Orman et al. 2013). Although rates of disability and death caused by ALD remain high despite these interventions, such treatments can significantly improve quality of life and avert early death caused by ALD. Overturning earlier assumptions about the persistence of alcohol-induced liver damage, recent studies have reported that some of the tissue injuries present even in the advanced stages of ALD, such as fibrosis, are reversible (Hernandez-Gea and Friedman 2011). This makes the discovery of new treatments that can augment existing ones even more urgent.
Recognition of the central role of innate immunity in ALD has spurred research into modulating the activity of key immune cells and cytokines. To this end, the discovery of the central role of TNFα in promoting inflammation in ALD prompted studies in which antibodies against TNFα were used to alleviate alcohol-induced inflammation. TNFα antibodies indeed significantly dampen liver inflammation (Gao 2012), but because TNFα is critical to fighting microbial pathogens, this approach often increases the risk for serious infections in ALD patients.
The limitations of the above approach highlight that cytokine-based interventions will need to be carefully calibrated according to the activity profile and radius of action of each cytokine to minimize or prevent adverse effects. For instance, exploitation of the hepatoprotective properties of IL-6 is limited by the abundance of IL-6 receptors in many tissues, potentially resulting in off-target effects. However, as proposed by Gao (2012), using IL-6 in ex vivo treatment of donor livers to reverse minor organ damage (e.g., steatosis) before transplantation into ALD patients could have some utility.
Current approaches for interventions in vivo focus on those immune regulators that target only a few cells or tissues. As discussed previously, IL-22 has an array of hepatoprotective activities, including antioxidant, antimicrobial, and antiapoptotic effects. Moreover, expression of the IL-22 receptor, IL-22R, is confined to epithelial cells, such as hepatocytes. This has led to the proposition that combining the use of IL-22 with anti-inflammatory corticosteroids and TNFα inhibitors could offset the immunosuppressing effects of these two agents and promote recovery of liver tissues (Gao 2012). However, because evidence from animal models suggests that IL-22 may play a role in the development of hepatic carcinoma (Park et al. 2011), such use would be restricted to ALD patients who do not have cirrhosis (which may contain precancerous cells) or liver cancer (Gao 2012).
The discovery of the role of epigenetic factors in the development of ALD and their effects on immune cells and responses opens the way to possible interventions that target key epigenetic regulators and processes in ALD. For example, because HDAC1 seems to make HSCs more receptive to the fibrosis-inducing action of TGFβ (Liu et al. 2014), inactivation of HDAC1 via antibodies or chemical agents may augment current treatments for halting or reversing fibrosis in patients with ALD. In addition, chemical inactivation of HDACs involved in alcohol’s effects on macrophage polarization to pro-inflammatory M1 macrophages may help reduce inflammation, steatosis, and fibrosis in tissues. Thus, HDAC inhibitors or activators of HATs that prevent or reverse the effects of HDACs may someday prove useful in the treatment of ALD.
Finally, technological advances to sequence and analyze DNA of patients has helped identify key genetic variants such as single-nucleotide polymorphisms (SNPs) in genes involved in liver diseases (Guo et al. 2009; Singal et al. 2014). Although in its early stages and not yet fully extended to the specific etiology of ALD, genetic profiling of ALD patients for SNP variants in genes involved in innate immune pathways could help identify patients vulnerable to advanced stages of ALD (e.g., cirrhosis) (Guo et al. 2009). Such personalized-medicine approaches could significantly improve the success and cost-effectiveness of current treatments and spur development of new interventions for ALD.
Innate immunity plays a central role in ALD, and recent studies have uncovered several pivotal molecular mechanisms underlying alcohol’s effects on the immune system of the liver. Excessive consumption of alcohol alters the characteristics and composition of the microbiome in the GI tract and increases translocation of bacteria and bacterial products, such as LPS and peptidoglycans, from the gut via the portal system to the liver. This increased influx of LPS, along with the direct effects of alcohol on immune cells and liver tissues, activates innate immune pathways. This activation occurs via stimulation of TLRs and through sensors of cell damage on or in the immune cells of the liver, such as Kupffer cells. These processes lead to the production of several pro-inflammatory cytokines (e.g., of TNFα, IL-1b, IL-8, and IL-17), triggering steatosis in hepatocytes and inducing fibrogenic pathways in HSCs. Moreover, production of chemokines, such as MCP-1 and MIF, leads to the infiltration of liver tissues by monocytes, neutrophils, and dendritic cells whose activities can further increase inflammation and impede recovery. Alcohol and its metabolic breakdown products acetaldehyde and acetate, along with ROS produced during alcohol metabolism, generate oxidative stress and affect epigenetic regulation that trigger activation of pro-inflammatory pathways such as polarization to M1 macrophages.
The insight gleaned from these complex interactions and pathways may provide the impetus for devising treatments using pro- or anti-inflammatory cytokines that act on defined cell types or employing agents that control epigenetic regulators to expand currently available interventions for treating ALD.
From the Publisher
Financial disclosure
The author declares that she has no competing financial interests.
An, L.; Wang, X.; and Cederbaum, A.I. Cytokines in alcoholic liver disease. Archives of Toxicology 86(9):1337–1348, 2012. PMID: 22367091
Barnes, M.A.; McMullen, M.R.; Roychowdhury, S.; et al. Macrophage migration inhibitory factor contributes to ethanol-induced liver injury by mediating cell injury, steatohepatitis, and steatosis. Hepatology 57(5):1980–1991, 2013. PMID: 23174952
Bode, C.; Kugler, V.; and Bode, J.C. Endotoxemia in patients with alcoholic and non-alcoholic cirrhosis and in subjects with no evidence of chronic liver disease following acute alcohol excess. Journal of Hepatology 4(1):8–14, 1987. PMID: 3571935
Cohen, J.I.; Chen, X.; and Nagy, L.E. Redox signaling and the innate immune system in alcoholic liver disease. Antioxidants & Redox Signaling 15(2):523–534, 2011. PMID: 21126203
Cohen, J.I., and Nagy, L.E. Pathogenesis of alcoholic liver disease: Interactions between parenchymal and non-parenchymal cells. Journal of Digestive Diseases 12(1):3–9, 2011. PMID: 21091930
Cohen, J.I.; Roychowdhury, S.; McMullen, M.R.; et al. Complement and alcoholic liver disease: Role of C1q in the pathogenesis of ethanol-induced liver injury in mice. Gastroenterology 139(2):664–674, 2010. PMID: 20416309
Csak, T.; Ganz, M.; Pespisa, J.; et al. Fatty acid and endotoxin activate inflammasomes in mouse hepatocytes that release danger signals to stimulate immune cells. Hepatology 54(1):133–144, 2011. PMID: 21488066
Csak, T.; Pillai, A.; Ganz, M.; et al. Both bone marrow-derived and non-bone marrow-derived cells contribute to AIM2 and NLRP3 inflammasome activation in a MyD88-dependent manner in dietary steatohepatitis. Liver International 34(9):1402–1413, 2014. PMID: 24650018
Das, D.; Barnes, M.A.; and Nagy, L.E. Anaphylatoxin C5a modulates hepatic stellate cell migration. Fibrogenesis & Tissue Repair 7:9, 2014. PMID: 24917887
Dégre, D.; Lemmers, A.; Gustot, T.; et al. Hepatic expression of CCL2 in alcoholic liver disease is associated with disease severity and neutrophil infiltrates. Clinical and Experimental Immunology 169(3):302–310, 2012. PMID: 22861370
Gao, B. Hepatoprotective and anti-inflammatory cytokines in alcoholic liver disease. Journal of Gastroenterology and Hepatology 27(Suppl. 2):89–93, 2012. PMID: 22320924
Gao, B., and Bataller, R. Alcoholic liver disease: Pathogenesis and new therapeutic targets. Gastroenterology 141(5):1572–1585, 2011. PMID: 21920463
Gao, B.; Seki, E.; Brenner, D.A.; et al. Innate immunity in alcoholic liver disease. American Journal of Physiology. Gastrointestinal and Liver Physiology 300(4):G516–G525, 2011. PMID: 21252049
Guo, J.; Loke, J.; Zheng, F.; et al. Functional linkage of cirrhosis-predictive single nucleotide polymorphisms of Toll-like receptor 4 to hepatic stellate cell responses. Hepatology 49(3):960–968, 2009. PMID: 19085953
Hernandez-Gea, V., and Friedman, S.L. Pathogenesis of liver fibrosis. Annual Review of Pathology 6:425–456, 2011. PMID: 21073339
Hritz, I.; Mandrekar, P.; Velayudham, A.; et al. The critical role of toll-like receptor (TLR) 4 in alcoholic liver disease is independent of the common TLR adapter MyD88. Hepatology 48(4):1224–1231, 2008. PMID: 18792393
Inokuchi, S.; Tsukamoto, H.; Park, E.; et al. Toll-like receptor 4 mediates alcohol-induced steatohepatitis through bone marrow-derived and endogenous liver cells in mice. Alcoholism: Clinical and Experimental Research 35(8):1509–1518, 2011. PMID: 21463341
Kruman, I.I., and Fowler A.K. Impaired one carbon metabolism and DNA methylation in alcohol toxicity. Journal of Neurochemistry 129(5):770–780, 2014. PMID: 24521073
Kubes, P., and Mehal, W.Z. Sterile inflammation in the liver. Gastroenterology 143(5):1158–1172, 2012. PMID: 22982943
Lemmers, A.; Moreno, C.; Gustot, T.; et al. The interleukin-17 pathway is involved in human alcoholic liver disease. Hepatology 49(2):646–657, 2009. PMID: 19177575
Lieber, C.S. Alcoholic liver disease: New insights in pathogenesis lead to new treatments. Journal of Hepatology 32(1 Suppl):113–128, 2000. PMID: 10728799
Lieber, C.S. Alcoholic fatty liver: Its pathogenesis and mechanism of progression to inflammation and fibrosis. Alcohol 34(1):9–19, 2004. PMID: 15670660
Liu, C.; Chen, X.; Yang, L.; et al. Transcriptional repression of the transforming growth factor β (TGF-β) pseudoreceptor BMP and activin membrane-bound inhibitor (BAMBI) by Nuclear Factor-κB (NF-κB) p50 enhances TGF-β signaling in hepatic stellate cells. Journal of Biological Chemistry 289(10):7082–7091, 2014. PMID: 24448807
Louvet, A.; Teixeira-Clerc, F.; Chobert, M.N.; et al, S. Cannabinoid CB2 receptors protect against alcoholic liver disease by regulating Kupffer cell polarization in mice. Hepatology 54(4):1217–1226, 2011. PMID: 21735467
Lucey, M.R.; Mathurin, P.; and Morgan T.R. Alcoholic hepatitis. New England Journal of Medicine 360(26):2758–2769, 2009. PMID: 19553649
Malhi, H.; Guicciardi, M.E.; and Gores, G.J. Hepatocyte death: A clear and present danger. Physiological Reviews 90(3):1165–1194, 2010. PMID: 20664081
Mandal, P.; Pritchard, M.T.; and Nagy, L.E. Anti-inflammatory pathways and alcoholic liver disease: Role of an adiponectin/interleukin-10/heme oxygenase-1 pathway. World Journal of Gastroenterology 16(11):1330–1336, 2010a. PMID: 20238399
Mandal, P.; Roychowdhury, S.; Park, P.H.; et al. Adiponectin and heme oxygenase-1 suppress TLR4/MyD88-independent signaling in rat Kupffer cells and in mice after chronic ethanol exposure. Journal of Immunology 185(8):4928–4937, 2010b. PMID: 20861358
Mandrekar, P. Epigenetic regulation in alcoholic liver disease. World Journal of Gastroenterology 17(20): 2456–2464, 2011. PMID: 21633650
Mandrekar, P., and Szabo, G. Signalling pathways in alcohol-induced liver inflammation. Journal of Hepatology 50(6):1258–1266, 2009. PMID: 19398236
Mandrekar, P.; Ambade, A.; Lim, A.; et al. An essential role for monocyte chemoattractant protein-1 in alcoholic liver injury: Regulation of proinflammatory cytokines and hepatic steatosis in mice. Hepatology 54(6):2185–2197, 2011. PMID: 21826694
McClain, C.J., and Cohen, D.A. Increased tumor necrosis factor production by monocytes in alcoholic hepatitis. Hepatology 9(3):349–351, 1989. PMID: 2920991
Meng, F.; Glaser, S.S.; Francis, H.; et al. Epigenetic regulation of miR-34a expression in alcoholic liver injury. American Journal of Pathology 181(3):804–817, 2012. PMID: 22841471
Moreno, M.; F., Chaves, J.F.; Sancho-Bru, P.; et al. Ghrelin attenuates hepatocellular injury and liver fibrogenesis in rodents and influences fibrosis progression in humans. Hepatology 51(3):974–985, 2010. PMID: 20077562
Oliva, J.; Bardag-Gorce, F.; Li, J.; French, B.A.; et al. S-adenosylmethionine prevents the up regulation of Toll-like receptor (TLR) signaling caused by chronic ethanol feeding in rats. Experimental and Molecular Pathology 90(3):239–243, 2011. PMID: 21276439
Orman, E.S.; Odena, G.; and Bataller, R. Alcoholic liver disease: Pathogenesis, management, and novel targets for therapy. Journal of Gastroenterology and Hepatology 28 (Suppl 1):77–84, 2013. PMID: 23855300
O’Shea, R.S.; Dasarathy, S.; McCullough A.J.; Practice Guideline Committee of the American Association for the Study of Liver Diseases; and Practice Parameters Committee of the American College of Gastroenterology. Alcoholic liver disease. Hepatology 51(1):307–328, 2010. PMID: 20034030
Park, O.; Wang, H.; Weng, H.; et al. In vivo consequences of liver-specific interleukin-22 expression in mice: Implications for human liver disease progression. Hepatology 54(1):252–261, 2011. PMID: 21465510
Pastorino, J.G., and Hoek, J.B. Ethanol potentiates tumor necrosis factor-α cytotoxicity in hepatoma cells and primary rat hepatocytes by promoting induction of the mitochondrial permeability transition. Hepatology 31(5):1141–1152, 2000. PMID: 10796891
Petrasek, J.; Bala, S.; Csak, T.; et al. IL-1 receptor antagonist ameliorates inflammasome-dependent alcoholic steatohepatitis in mice. Journal of Clinical Investigation 122(10):3476–3489, 2012. PMID: 22945633
Petrasek, J.; Csak, T.; and Szabo, G. Toll-like receptors in liver disease. Advances in Clinical Chemistry 59:155–201, 2013. PMID: 23461136
Ramachandran, P., and Iredale J.P. Liver fibrosis: A bidirectional model of fibrogenesis and resolution. QJM 105(9):813–817, 2012. PMID: 22647759
Rao, R. Endotoxemia and gut barrier dysfunction in alcoholic liver disease. Hepatology 50(2):638–644, 2009. PMID: 19575462
Roychowdhury, S.; McMullen, M.R.; Pisano, S.G.; et al. Absence of receptor interacting protein kinase 3 prevents ethanol-induced liver injury. Hepatology 57(5):1773–1783, 2013. PMID: 23319235
Schwartz, J.M., and Reinus, J.F. Prevalence and natural history of alcoholic liver disease. Clinics in Liver Disease 16(4):659–666, 2012. PMID: 23101975
Seki, E.; De Minicis, S.; Osterreicher, C.H.; et al. TLR4 enhances TGF-beta signaling and hepatic fibrosis. Nature Medicine 13(11):1324–1332, 2007. PMID: 17952090
Seki, E., and Schnabl, B. Role of innate immunity and the microbiota in liver fibrosis: Crosstalk between the liver and gut. Journal of Physiology 590(3):447–458, 2012. PMID: 22124143
Sheron, N.; Bird, G.; Koskinas, J.; et al. Circulating and tissue levels of the neutrophil chemotaxin interleukin-8 are elevated in severe acute alcoholic hepatitis, and tissue levels correlate with neutrophil infiltration. Hepatology 18(1):41–46, 1993. PMID: 8325620
Shukla, S.D., and Lim, R.W. Epigenetic effects of ethanol on the liver and gastrointestinal system. Alcohol Research: Current Reviews 35(1):47–55, 2013. PMID: 24313164
Singal, A.G.; Manjunath, H.; Yopp, A.C.; et al. The effect of PNPLA3 on fibrosis progression and development of hepatocellular carcinoma: A meta-analysis. American Journal of Gastroenterology 109(3): 325–334, 2014. PMID: 24445574
Szabo, G., and Csak, T. Inflammasomes in liver diseases. Journal of Hepatology 57(3):642–654, 2012. PMID: 22634126
Szabo, G.; Mandrekar, P.; Petrasek, J.; and Catalano, D. The unfolding web of innate immune dysregulation in alcoholic liver injury. Alcoholism: Clinical and Experimental Research 35(5):782–786, 2011. PMID: 21284666
Tang, H.; Sebastian, B.M.; Axhemi, A.; et al. Ethanol-induced oxidative stress via the CYP2E1 pathway disrupts adiponectin secretion from adipocytes. Alcoholism: Clinical and Experimental Research 36(2):214–222, 2012. PMID: 21895711
Vanden Berghe, T.; Linkermann, A.; Jouan-Lanhouet, S.; et al. Regulated necrosis: The expanding network of non-apoptotic cell death pathways. Nature Reviews. Molecular Cell Biology 15(2):135–147, 2014. PMID: 24452471
Wan, J.; Benkdane, M.; Alons, E.; et al. M2 Kupffer cells promote hepatocyte senescence: An IL-6-dependent protective mechanism against alcoholic liver disease. American Journal of Pathology 184(6):1763-1772, 2014. PMID: 24713392
Wang, H.J.; Gao, B. Zakhari, S.; and Nagy, L.E. Inflammation in alcoholic liver disease. Annual Review of Nutrition 32:343–368, 2012. PMID: 22524187
Xu, A.; Wang, Y.; Keshaw, H.; et al. The fat-derived hormone adiponectin alleviates alcoholic and nonalcoholic fatty liver diseases in mice. Journal of Clinical Investigation 112(1):91–100, 2003. PMID: 12840063
Yan, A.W., and Schnabl, B. Bacterial translocation and changes in the intestinal microbiome associated with alcoholic liver disease. World Journal of Hepatology 4(4):110–118, 2012. PMID: 22567183 |
Water sustainability is vital. Water is essential for the production and maintenance of almost everything that people produce and consume, from food to machinery. Modern industries, though, tend to observe water-intensive production processes. For instance, producing a kilogram of cotton—the world’s primary clothing material—requires 7,000-29,000 liters of water.
Water SustainabilityAs a result, companies have begun to integrate water sustainability into their business operations and promote water sustainability, since inadequate water access can cripple even the most financially stable company.
Innocent Drinks and Doñana National Park
Doñana National Park (Parque Nacional de Doñana) is one of Europe's most important wetland reserves. It is home to various bird species, including goose, flamingo and the Spanish imperial eagle. The park is also the stronghold of the endangered Iberian lynx. Doñana National Park is a UNESCO Biosphere Reserve and World Heritage Site
The park is threatened by unsustainable strawberry farming. Spain is the world’s top strawberry exporter. The country’s annual revenue from strawberry farming is around €400 million. Approximately 90% of the fruit is grown in Huelva and Seville—provinces that surround Doñana. Strawberry is a water-intensive crop and growing it often involves unsustainable agricultural practices such as plastic sheeting and pesticide use. The World Wildlife Fund (WWF) claimed that strawberry farm irrigation is reducing water in the park’s marshes by up to 50%.
The UK smoothie company Innocent Drinks addressed unsustainable strawberry farming in Doñana National Park through technology. In 2014, the company teamed up with the University of Cordoba to create Irri-Fresa, an app that calculates optimal daily irrigation times. In 2015, the farmers who used Irri-Fresa were able to reduce their farms’ water consumption by up to 40%, saving 1.7 billion liters of water. In May 2016, Innocent Drinks won a Guardian Sustainable Business Award for its water conservation efforts.
Coca-Cola has previously faced water sustainability issues. In 2004, it reportedly used 283 billion liters of water. In the same year, Coca-Cola shut down its Kerala, India plant after local authorities ruled that the plant drained and polluted the state’s water supplies. In El Salvador, experts claim that Coca-Cola’s operations in the municipality of Nejapa will deprive almost 30,000 people of water.
Moreover, Coca-Cola drew criticism for essentially selling purified tap water in a bottle. In 1999, it launched Dasani, a bottled water brand advertised “as pure as bottled water gets” due to a “highly sophisticated purification process.” In 2004, Coca-Cola admitted that Dasani is merely purified tap water from the main supply in Sidcup, Kent. As a result, the company withdrew Dasani in the same year.
In 2014, Coca-Cola launched Glacéau Smartwater, which was advertised as “vapor distilled”, then fortified with electrolytes found in energy drinks. Endorsed by celebrities such as Kylie Minogue and Jennifer Anniston, experts later discovered that Glacéau Smartwater was “no better than tap water.”
Coca-Cola responded to these controversies by implementing water-efficient operations and engaging in water-related corporate social responsibility (CSR) projects. In 2009, Coca-Cola launched the Replenish Africa Initiative (RAIN), a project that aims to bring safe drinking water to 2 million people in Africa by the end of 2015. In April 2015, the company invested an additional USD 35 million in RAIN to provide access to safe drinking water and sanitation to 4 million more people in Africa by 2020. Likewise, Coca-Cola collaborated with WaterAid in 2013 to bring safe drinking water to Ouagadougou (Burkina Faso’s capital), as well as to two rural communities in southern Ethiopia.
In 2015, Coca-Cola UK invested more than £45,000 in technologies such as water meters, water mapping, and monitoring and targeting systems. It managed to save 13,920 cubic meters of water as a result. In the same year, Coca-Cola UK’s Edmonton site started using resin granules, which is expected to help save 11,520 cubic meters of water every year.
Dell Children’s Medical Center of Central Texas
Dell Children’s Medical Center of Central Texas is an excellent example of how architecture can be used to bring about water sustainability. Its parking lots and garages were made out of 47,000 tons of airport runway material. The hospital was built using concrete containing approximately 40% fly ash instead of Portland cement. The hospital’s exterior façade, flooring and walls were made out of sustainable and indigenous building materials like Texas limestone, recycled glass and cork. The production, transport and final use of brand new and non-native building materials is water-intensive. Using recycled, indigenous and sustainable building materials instead enabled Dell Children’s to reduce its water consumption.
Dell Children’s also has a special storm water pond that gathers and recycles rainwater, filtering rainwater before it seeps into the ground. The hospital then uses the recycled rainwater for irrigation. In addition, the hospital uses low-flow bathroom fixtures and recycles steam energy into chilled water. As a result, Dell Children’s is able to meet its water needs without relying heavily on Texas’ water supply.
Dell Children’s also employs xeriscaping. The hospital planted native plants in its gardens and courtyards. Native trees, shrubs and grasses require less freshwater than their non-native counterparts. Each year, the hospital saves 1.7 million gallons of water and another 1.4 million gallons by using low-flow bathroom fixtures and by xeriscaping, respectively. Its sustainability efforts earned Dell Children’s the distinction of being the world’s first hospital to receive a Leadership in Energy & Environmental Design (LEED) Platinum certification.
Water Sustainability: An Investment for Greater Business Continuity
Practically every product and service that companies provide involves water. Water scarcity risks the long-term viability of large and small businesses alike—an outcome that can lead to unemployment, poverty and violent conflict. Promoting water sustainability is a valuable investment for companies. Water-efficient business operations result in greater water supplies for future use, securing business continuity.
ADEC ESG Solutions advances sustainable practices around the world, offering fully integrated industry expertise, data management and software services to streamline your water management strategies. For more information on what companies can do, download our white paper, Water and Corporate Responsibility.
Be a sustainability leader.
Our team supports you no matter where you are on your Sustainability Journey. Talk to us today to learn more. |
| hormonal support
What Stress Does To The Body: The Negative Effects Of High Stress Hormones
By Sara Novak
Cortisol (the main stress hormone in the body) has become a hot topic as of late. Everybody is stressed, whether it is being cooped up in your house for too long or being nervous about your job or the economy. Stress happens. It is everywhere and the healthiest among us learn to manage stress, because if you don't manage it, it can cause any number of chronic conditions. Here is what happens to your body when you are constantly under stress.
Table Of Contents:
What Is Fight Or Flight?:
fight or flight
We evolved from cavemen that required an acute stress response to escape the physical threats of living outside with huge beasts that could attack them at any time. From sabertooth cats to North American lions, cougars, and dire wolves, threats were everywhere.
Like other evolved mammals, our stress response makes us faster and stronger, all in an effort to help us fight or flee. The only problem is that the body’s glandular systems cannot tell the difference between a real or perceived threat. That means that no matter whether you are running away from a lion, jumping from traffic, or anxious that you might lose your job, the body experiences the same stress response.
As the threat happens, the sympathetic nervous system is activated, sending a message to the pituitary and adrenal glands to release stress hormones. The most famous of which is cortisol. Other important hormones like adrenaline are also amped up in the body. Once activated, a chain reaction of events starts to unfold. Including the following:
• Increased respiration
• Increase perspiration
• Dilated pupils
• Constriction of the blood vessels
• Pale or flushed skin
Flight or flight mode has its purpose, but it is not supposed to be something that we stay in for a long period of time. We are supposed to escape the threat and then move on from it, with the body moving back to a normal state. But what if that does not happen? What if your body is perpetually in a fight or flight mode? Your goal is to have the parasympathetic nervous system take back over once a threat has passed. And if you do not, you could suffer from a range of unpleasant conditions that are not good for your overall health.
Read More: The Low Cortisol Lifestyle: UMZU's Guide To Fighting Stress
12 Negative Effects Of High Cortisol Levels:
If you are stressed all the time, it is best to learn to manage your symptoms. Here is what you need to know:
1. Hypertension
hypertension and cortisol
As mentioned above, part of the acute stress response is constriction of blood vessels which can cause hypertension. A study published in the journal Primary Care found that “improved recognition and clinical evaluation of the relationship between environmental stress and hypertension will assist the primary care physician in the management of the blood pressure variations associated with daily life.” Another study, published in the American Journal of Hypertension found that stress reduction through meditation may be useful at reducing hypertension.
2. Anxiety And Depression
depression and cortisol
High levels of morning cortisol or cortisol that does not lower during the day, is also associated with anxiety and depression. Cortisol levels should be at their highest in the morning when most mammals are the most active and then should go down again in the late night, when most of us are asleep. Those of us with high cortisol levels throughout the day, may find it hard to calm down. A study published in the journal Psychoneuroendocrinology found that “symptoms of anxiety and depression among individuals without a psychiatric diagnosis are associated with blunted and exaggerated cortisol responses to and recovery from stress.” Another study published in the journal Annals of Clinical Psychiatry found that “serum and salivary cortisol levels are elevated during anxiety.”
3. Heart Disease
heart disease and cortisol
Other research has also shown that chronically high plasma cortisol levels were associated with heart disease and a higher risk of heart attack and stroke. A study published in the journal Psychoneuroendocrinology found that high fingernail and hair cortisol levels were associated with acute coronary events in middle aged and elderly men. Another study published in The Journal of Clinical Endocrinology & Metabolism found that high cortisol levels were linked to an increased risk of heart disease in men. The bottom line is that research shows that stress is not good for your heart.
4. Alzheimer’s Disease
As you age, high cortisol levels have been associated with problems with memory retention because stress impacts the same parts of the brain. Those with higher cortisol levels have been associated with early indicators of Alzheimer’s disease and dementia. A study published in the journal Neurology found that “higher serum cortisol was associated with lower brain volumes and impaired memory in asymptomatic younger to middle-aged adults, with the association being evident particularly in women.” Another study published in the journal The National Review of Neurology found that depression (which has been linked to high cortisol levels) has also been associated with dementia later in life.
5. Insomnia
insomnia and cortisol
If cortisol is constantly coursing through your body, it can be hard to sleep. Especially if cortisol levels are still high in the evening. A study published in the journal Sleep Medicine Clinics found that “research has “shown increased cortisol levels, decreased immunity, and increased markers of sympathetic activity in sleep-deprived healthy subjects and those with chronic insomnia.” Another study published in the journal Sleep Medicine found that “pre-sleep salivary cortisol was higher in insomniacs than controls.” The problem is that stress hormones lead to insomnia, which makes stress levels even higher the next day. The bottom line is that you have to take steps before bedtime to reduce cortisol in the brain by deep breathing, practicing meditation, journaling, reading a relaxing book, spraying lavender on your pillow, and taking a hot bath. At the same time, stay away from screens, excessive alcohol, caffeine, and heavy meals.
Learn More: The Last Guide You'll Ever Need For Sleep: How To Get A Perfect Night Of Sleep
6. Weight Gain
weight gain and cortisol
When you are stressed, you tend to crave foods that do not do your body any good. That is—high fat, high carbohydrate, and high sugar processed foods that do nothing but add to your waistline. When we are stressed, it can also tire us out, making us not want to cook. As a result, we grab fast food or whatever junk we can stuff down our pie holes. A study published in the journal Obesity Reviews found that “stress may be a barrier to making diet and exercise changes needed to achieve long term control of body weight.” Another study published in the journal Domestic Animal Endocrinology found that patients with abdominal obesity have elevated cortisol levels.
7. Diabetes
Part of what makes us faster and stronger in a fight or flight response is the release of glucose into the body to give us energy. This is not inherently a bad thing until it happens over and over again. Elevated blood sugar levels over time have been linked to diabetes. One of the easiest ways to reduce your blood sugar levels is to find ways to manage stress in your life. Just like with sleep, you have to find regular activities to keep your stress in check whether it is surfing, qigong, skate boarding, hiking, mindful walking, swimming, meditating, or yoga. Find whatever relaxing activity that you love and stick to it. This way you will eat right, exercise, manage stress, and do all the things that help keep your blood sugar down where it needs to be.
8. Muscular Tension
muscular tension and cortisol
You can feel your shoulders inching up towards your ears. Your neck is tight and your jaw is clenched. When you go to get a massage, it takes them an hour to break through the frozen muscular tissue. When stress is a problem, so is muscular tension. We clench and stiffen when we are stressed and no matter how hard we try, it can be hard to unwind. Getting regular massages can help, as can taking a minute every hour or so to remember to unclench your jaw, soften your shoulders, and stand up and stretch. Whenever you feel muscular tension creeping in, take a moment to de-stress and you will be glad you did.
9. Low Libido
low libido and cortisol
When stress is high, you are less likely to want to get it on. While there should have been a baby boom during the pandemic, there was not. In fact, the opposite happened and while I have no research to back this up, I know of tons of COVID divorces. You do not want to have sex when you are worried about everything else. A study published in the journal Archives of Sexual Behavior found that women’s sex drive was greatly influenced by controlled cortisol levels. Another study published in The Journal of Sexual Medicine found that “women who showed an increase in cortisol had lower scores on the Arousal, Desire, and Satisfaction domains of the Female Sexual Function Index.”
10. Poor Digestion
poor digestion
Fight or flight slows down the parts of the body that you do not immediately need for survival. If you are running from a sabertooth tiger, that is just not the time to be digesting your lunch. If you are stressed all the time, then you may notice changes in your digestion. It may make you constipated or it could make your stomach upset, causing diarrhea and stomach cramping. This should not be a huge surprise considering that your gut has its own brain. When you get butterflies in your stomach because you are nervous about something else, it can make it hard for your digestive system to function normally.
11. Fertility Problems
fertility and cortisol
I have known more than a few couples that had problems getting pregnant because of the fear that they would not be able to. The stress places a heavy burden on your reproductive system and your ability to ovulate or produce high quality sperm. Part of trying to get pregnant should be about keeping cortisol and stress levels in check. A study published in the journal Psychoneuroendocrinology “provides preliminary evidence that longer term systemic cortisol may influence reproductive outcomes.”
12. Irritability
cortisol and irritability
If you are having trouble sleeping because you are stressed, then you are dealing with exhaustion the next day. Stress can do a number on your mood, even when it is not causing anxiety or depression. Sometimes, if you are in constant fight or flight mode, that in itself can tire you out. It is hard to think of anyone else and how you are treating people when stress hormones are constantly controlling your brain and endocrine system. If you notice that you are not yourself, consider taking a step back and looking at what may be causing your sour mood. Try not to blame the world for your stressors. Remember, fight or flight is meant to happen and then be over; if it is a regular part of your life experience, then it is worth taking a closer look at what is causing the high cortisol levels in your life.
If you would like an all natural formula designed to combat high cortisol levels make sure to check out Cortigon by UMZU!
cortigon by umzu |
Skip to content
' Signal
Signal an error
Signal is part of q syntax. It is not an operator and cannot be iterated or projected.
' Quote overloads
The only way to detect a signal is to use Trap.
Trap always receives a string regardless of the type of x.
Using an undefined word signals the word as an error:
which is indistinguishable from
Error-trap modes
At any point during execution, the behavior of signal (') is determined by the internal error-trap mode:
0 abort execution (set by Trap or Trap At) 1 suspend execution and run the debugger 2 collect stack trace and abort (set by .Q.trp)
1 for console input
0 for sync message processing
q)\e 2
q)'type / incoming async msg signals 'type
[2] f@:{x*y}
[0] f `a
q)\e 1
[2] f@:{x*y}
q)) / the server is suspended in a debug session
Trap, Trap At
Controlling evaluation, Debugging, Error handling
Q for Mortals §10.1.7 Return and Signal |
Updated date:
The God Hades in Greek Mythology
The Greek God Hades
In Ancient Greece, Hades was one of the most important gods, and was regarded as one of the “big three”, alongside his brothers, Zeus and Poseidon; at least when Hellenes religious rites became dominant.
Hades was of course the Greek god of the Underworld, and also Greek god of the dead, and so synonymous would he become with his domain, that the underworld itself would also be referred to as Hades.
The Birth of Hades in Greek Mythology
The Greek god Hades was born to the Titans Cronus and Rhea; and therefore brother to Hestia, Demeter, Hera, Poseidon and Zeus.
At the time of Hades’ birth, Cronus was the supreme ruler of the cosmos, with the Titans in charge of every aspect of life. A prophecy was made though, that stated that a child of Cronus would overthrow its father; so to circumvent this prophecy Hades was swallowed by Cronus when he was born.
Hades and the Titanomachy
Zeus was the only sibling to escape the imprisonment within the stomach of Cronus; and whilst his siblings grew inside their father, Zeus grew up on Crete. Helped by Gaia and Rhea, Zeus would commence an insurgency against Cronus, but to be successful Zeus would need allies.
The first allies were his imprisoned siblings, and Rhea would convince Cronus to drink a potion which caused the Titan lord to regurgitate Hades and his siblings. Hades and Poseidon would then join Zeus as the first of a fighting force.
Further allies would join the cause, and Zeus even went into Tartarus to release the Cyclopes and the Hecatonchires. The Cyclopes were master craftsmen, and would manufacture the weapons of the gods, and so Zeus received his lightning bolts, Poseidon received his trident, and Hades was given a Helmet of Invisibility.
The war between the Titans and the gods based on Mount Olympus would last for ten years, and would be called the Titanomachy. Whilst there are no surviving works dedicated to the war itself, it is known that Hades was vital in bringing the Titanomachy to a close. Hades would don the Helmet of Invisibility and make his way into the camp of the Titans, and the god would destroy the armaments of the Titans, ending the war.
Hades God of the Underworld
Hades, in Greek mythology, is often referred to as an Olympian god, although he was not one of the 12 gods of Mount Olympus. After the Titanomachy, Zeus, Poseidon and Hades got together to divide the cosmos between them. Lots were drawn and as a result Zeus became lord of the heavens and earth, Poseidon’s domain would become the waters of the world, and Hades was given the Underworld.
Hades and Cerberus
Agostino Carracci (1557–1602) PD-art-100
Agostino Carracci (1557–1602) PD-art-100
Hades' Realm
It has been common to use the name Hades as a synonym for hell, but the domain of Hades in Greek mythology was not just hell, but was the whole of the afterlife. For in the realm of Hades was Tartarus (hell), the Asphodel Meadows (nothingness), and the Elysian Fields (paradise).
The physical geography of the underworld was not well recorded, but it was known to contain five rivers in Hades; Acheron (the river of sorrow), Cocytus (lamentation), Phlegethon (fire), Lethe (forgetfulness) and Styx (hate). river in hades
The Role of Hades in Ancient Greece
Hades was not Satan nor was he Death, and indeed the god of the Underworld was a rather passive figure in the whole process.
The souls of the deceased would be transported to the edge of Hades’ domain by a Psychopomp, the likes of Hermes and Thanatos (Death). At the banks of the Acheron, Charon would then row those that could pay into the underworld proper.
The deceased would then have their lives judged by the three judges of the Underworld, the kings Aeacus, Minos and Rhadamanthys. Those whose lives had been heroic would go into the Elysian Fields, those whose lives had been led with indifference spent eternity in the greyness of the Asphodel Meadows, and those that had been evil might find themselves in Tartarus.
Eternal punishment in Tartarus was not undertaken by Hades either, for prisoners were guarded by the Hecatonchires, and punishment was administered by the Erinyes (the Furies).
Lastly, Cerberus, the triple headed dog, was responsible for ensuring that no one ever left the realm of Hades.
Hades, as god of the dead, though, would observe all that went on in his domain from an ebony throne in his palace in the underworld. The role of Hades in Greek mythology was to simple preside over funeral rites, and defend the right for all the deceased to have a decent burial.
Hades Abducting Persephone
Hades and Persephone
Hades did not want to rule alone though, and so sought out someone to become queen of the Underworld.
Hades decided that the daughter of Zeus and Demeter, the goddess Persephone would be the ideal consort. Zeus even agreed that Hades could take his daughter as his wife. Persephone would have little choice in the arrangement, for Hades ascended from the Underworld, and abducted Persephone whilst the goddess was picking flowers.
Demeter was distraught at the disappearance of her daughter, especially when she could not find out where Persephone was. Demeter searched the earth, and whilst she searched she neglected the growth of plants, and a famine spread across the earth. Eventually Zeus had to intervene, and ordered Hades to return Persephone to her mother.
Having got the goddess of his desires, Hades was not going to quickly release her and so the god of the underworld tricked Persephone into eating some seeds of a pomegranate. By eating the seeds, Persephone was bound to the Underworld for a part of the year, normally said to be autumn and winter. During this period the crops ceased to grow, as Demeter was upset about being separated from her daughter, but every spring and summer, when Persephone returned to the surface world, crops would grow again.
So whilst Hades and Persephone were normally depicted together on their thrones, this situation was only true part of the time.
Hades' wife though, would bear her husband no children, for the god of the dead was generally considered to be infertile, as was in keeping with his position.
Hades and Persephone
Published: January 1864 PD-life-70
Published: January 1864 PD-life-70
Hades away from his Domain
The story of Hades and Persephone is one of the few tales where the god of the underworld leaves his domain; another story of Hades on the earth’s surface though, is the story of Heracles and the Siege of Pylos.
Heracles attacked Pylos after Neleus had refused to cleanse him of his sins. During the taking of Pylos, Hades was said to be present, either amongst the defenders of the city, for Hades was worshipped in Pylos, or as an observer of the dead.
In either case, Hades was injured by one of Heracles’ arrows, and the god of the dead was forced to retreat to Mount Olympus for the wound to be healed.
When Hades did leave his palace in the underworld, the god of the dead was said to travel on a black chariot, pulled by four black horses.
Stories of Hades in Greek Mythology
The stories of Hades in Greek mythology are few in number, especially compared with the number of tales of Zeus or Poseidon; this though, is hardly surprising of the god of the underworld rarely left his domain. There are a few other important stories though, often involving those who descended into the domain of Hades, and those who angered the god of the dead.
Asclepius -
It was written in Greek mythology that Hades, when in the underworld, was unaware of events on the earth or on Mount Olympus; although the god was aware of the actions of Asclepius.
Asclepius was a son of Apollo who became so skilled in medicine that he became known as the god of medicine. So skilled was Asclepius that he could even overcome death. This though infringed on Hades domain, for what good was a god of the dead if no-one died. Zeus would eventually have to kill Asclepius to prevent further discord.
Sisyphus –
Sisyphus was a mortal king who tried to overcome death and in the process greatly angered Hades. Firstly, Sisyphus would chain up Thanatos when Death came to collect the king, then the king, when in the underworld, would convince Persephone to allow him to return to the surface world to chastise his wife.
Eventually, Hades had to send Hermes to return the king to the underworld, where subsequently, Sisyphus would be punished in Tartarus.
Theseus and Pirithous –
Theseus and Pirithous would descend into the underworld, when Pirithous decided that he wished to make Persephone his bride. Hades though was well aware of why the came to his realm, and whilst seemingly welcoming the pair, and offering them a feast, the god of the dead would ensnare the pair in stone seats. Imprisoned in stone, Hades would plan to leave Theseus and Pirithous imprisoned for eternity.
The City of Thebes –
Hades angered was also raised against the city of Thebes, for the god would send a deadly plague against the city, when King Kreon refused to allow the burial of dead warriors during the war of the “Seven Against Thebes”.
Hades’ anger was only placated when the Coronides sacrificed themselves.
Hades though, could also show compassion and leniency on occasion.
Heracles –
For his 12th Labour, the Greek hero Heracles would descend into the Underworld, to bring back Cerberus. Heracles first asked the permission of Hades, before wrestling the gigantic hound; Hades agreed to the removal of his guard dog, as long as Cerberus was not hurt, and was afterwards released.
Heracles would also rescue Theseus during this time, and again Heracles and Theseus would ask forgiveness from Hades. Whilst Hades would allow Heracles to rescue Theseus, Pirithous was not released.
Oprheus –
Another hero who descended into the realm of Hades was Orpheus, who came to try and retrieve his wife Eurydice. Hades was actually so taken with the music of Orpheus that he agreed to release Eurydice, but only on the condition that Orpheus had to walk ahead and not look back. Orpheus of course looked back at his wife before he got to the surface, and so he lost Eurydice once again.
Hades and Orpheus
Henryk Siemiradzki (1843–1902) PD-art-100
Henryk Siemiradzki (1843–1902) PD-art-100
The Worship of Hades in Ancient Greece
Hades in Greek mythology was one of the most feared and revered of all Greek deities; but whilst there were cults of Hades across Ancient Greece, the worship of Hades was limited. This lack of worship was down to the fact that the Hades was viewed as immovable, and so any sacrifice made to Hades would not sway the god.
People in Ancient Greece would be wary about saying the name of Hades for fear that they would draw the attention of the god onto themselves. So Hades became known by other names, including Clymenus (notorious), Eubuleus (good guessing) and Polydegmon (receiver of many). One name often given to Hades though was Pluton (giver of wealth), for the god of the dead was also said to be the provider of all the metals that emerged from the earth.
Hubs from Other Hubbers
• Hades - The Greek god of the underworld
Hades was the king of the underworld. He was the elder brother of Zeus the king of the gods. Hades was the oldest son of the titan gods Kronos and Rhea. Kronos was the king of the gods and the god of time. He heard a prophecy that foretold one of...
• Hades, Greek God of the Underworld and the Unconscio...
Hades is very interesting, because he rules the dead, or people who need periodic times of privacy with which they can use to think about whatever troubles them. Hades was also the place where souls were thought to reside after death, according to Gr
Hubs from Colin Quartermain
• Persephone: Goddess of Greek mythology
Persephone is one of the deities of the Greek pantheon who is often overlooked, but she was the daughter of Demeter and Zeus, as well as the wife of Hades, so an important goddess in Ancient Greece.
• The God Thanatos in Greek Mythology
The Greek god Thanatos was the personification of Death. An elderly, winged man, his arrival meant only one thing, and soon the spirit of the deceased was being transported to the underworld.
Colin Quartermain (author) on March 29, 2015:
Many thanks for reading and commenting daydreamer
daydreamer13 on March 28, 2015:
Well done. Impressive.
Related Articles |
Second edition : supplements
Hpv vaccine protect against cervical cancer, European guidelines for quality assurance in cervical cancer screening
hpv vaccine protect against cervical cancer
SWNS:South West News Service 9 Chloe claims she has been left wheelchair-bound as a result of a HPV jab she received at school But she claims a human papillomavirus HPV vaccine left her wheelchair-bound, shattering her dreams and leaving her constantly fatigued and her muscles wasting away. Around people are killed by HPV every year, although there are concerns about the side-effects of the preventative jabs. Just three months later, she was out walking with her friends when she broke down in pain, which has hpv vaccine protect against cervical cancer despite the cocktail of painkillers she has been prescribed.
vierme maro
1. It's what causes cervical cancer.
2. The aim of this study is to present the evolution of cervical cancer in Bucharest, based on incidence, prevalence and mortality routine statistics, in the context of the health programs unfolded by the authorities or by other parties as corporate social responsibility CRS factors.
Whilst Chloe and her family blame her chronic condition on the vaccine, called Gardasil, medical professionals have defended its safety. Every report of a suspected side effect is taken seriously.
hpv cracked skin |
#include <iostream>istream &ignore(streamsize num = 1, int delim = EOF);
The ignore( ) function is a member of istream.
You can use the ignore( ) member function to read and discard characters from the input stream. It reads and discards characters until either num characters have been ignored (1 by default) or until the character specified by delim is encountered (EOF by default). If the delimiting character is encountered, it is removed from the input stream. The function returns a reference to the stream.
Related functions are get( ) and getline( ).
C(s)C++ Programmer's Reference
ISBN: 0673462897
EAN: 2147483647
Year: 2002
Pages: 539
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net |
Connect with us
Clean Energy in South Asia and Beyond
Transformed energy was mainly from conventional energy sources such as nuclear energy or fossil fuels (mainly dependent on natural resources such as coal, oil and natural gas), which, with the exception of nuclear power, are forms of energy transformed for billions of years. Their natural renewal cannot catch up with the speed of their exhaustion. A study conducted by the World Wildlife Fund (WWF) in 2002 predicts that all the available natural resources will be exhausted by 2050, if they continue to be exploited at the current rate. The energy transformation is increasingly growing and the technologies employed in this regard have already started to affect the planet earth deleteriously.
The rapid depletion of natural resources and the various environmental degradations associated with the production and excessive energy consumption first came to the attention of human society in the sixties of twentieth century. Warnings refuted initially as utopian and exaggerated were finally taken seriously together with developing international legal framework in order to protect, manage, understand and restore the different form of the environment whether it is terrestrial, aquatic, marine or natural and cultural or spatial. Accordingly, the means and methods respecting the long-term, new and clean energy have been developed and have become attractive, especially since the oil shock in 1973. Some call them new energy or clean energy. Now there is an agreement on the common name of “renewable energy”.
The theme of renewable energy as a method and energy supply means having a vital interest for the status of the biosphere and the condition of life and survival on earth. According to OECD, renewable energy use inexhaustible sources of natural energy such as solar radiation, wind, water and carbon cycles in the biosphere, internal heat flux of Earth, effect of lunar and solar attraction on the oceans. These energy sources have renewability as a criterion. It also includes that the life cycle of production and processing facilities do not present risks or disadvantages in the short, long and even longer term, and that they are socially and economically sustainable.
Today, the world is in a crisis. This crisis is both ecological and social. This crisis was named as global warming. This is the phenomenon of climate change and energy poverty that plague the world. The challenges are to determine the sustenance of life on planet earth and understanding the contribution of renewable energy sources. Global warming caused by the constant accumulation of greenhouse gases in the atmosphere has already begun to disrupt the ecosystems.
In the last decade of the twentieth century, it has been observed that there is an increase on the average temperature of the oceans and the atmosphere on a global scale. An assessment conducted by Intergovernmental Panel on Climate Change (IPCC) in 2007 confirmed that human activities are causing greenhouse effect that is to say we observe increasing of the amounts of greenhouse gases such as carbon dioxide (CO2), methane (CH4), nitrous oxide (N2O) etc. that results in global warming. A study by Global Chance in 2017 establishes a connection between emissions of greenhouse gases and fossil fuels. IPCC assessment also estimates the share of greenhouse gas emissions due to the energy sector at 25.9%.
All areas of the environment are affected. The atmosphere due to the burning of fossil fuels had started to cause air pollution, accentuating the greenhouse effect and the decline of the ozone layer. The increasing water use and water pollution had started to modify the hydrosphere. Rising atmospheric and sea-surface temperature had started to modify the cryosphere. Our increasing use of land, for agriculture, cities, roads, mining – as well as all the pollution we were creating – had started to modify our biosphere and landscape. International Greenpeace speaks of about 150,000 additional deaths per year among the ecosystems due to the environmental degradation and loss of biodiversity persist. In addition to that, there are risks of long-term pollution and environmental degradation posed by the nuclear power that we can no longer ignore.
The IPCC report entitled “Climate Change” published in 2007 predicts major negative consequences for humanity this century due to approaching climate change, a reduction of potential crop yields in most tropical and subtropical areas, a decrease of water resources in most tropical and subtropical dry regions, a decrease in the source of water flow from melting ice and snow, following the disappearance of the ice and the snow, an increase in extreme weather events such as heavy rains, storms and droughts, and an increase in the impact of these phenomena on agriculture, an increase in forest fires during warmer summers, the extension of areas infested with diseases such as cholera and malaria, an increase of flood risk, both because of rising of the sea level and climate change, a higher energy consumption for air conditioning and reduction of potential crop yields at middle and high latitudes.
These effects will be felt worldwide, but they will be especially keen in South Asia – defined as Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan, and Sri Lanka. Flooding, food shortages, and stagnating economic growth are just some of the devastating impacts South Asia may experience due to advancing climate change, according to IPCC. At the end of March 2014, IPCC released its long-awaited Climate Change 2014: Impacts, Adaptation, and Vulnerability, a report that compiles the current scientific literature on climate change. The report’s assessment of observed impacts — the climate change effects we are already seeing — ranks Asia as the biggest victim of natural disasters last year, accounting for nearly 30 percent of the global economic loss ascribed to natural disasters.
South Asia’s vulnerability to these and future disasters is profound, principally for reasons of population and poverty. The majority of South Asian countries are low- or lower-middle income countries that already struggle to support the daily needs of their growing populations. Because poorer households dedicate more of their budgets to food, they are the most sensitive to weather-related shocks that can make daily staples unaffordable.
Low-lying Bangladesh is vulnerable to flooding and cyclones in the Indian Ocean, which scientific literature suggests will grow more intense in coming decades. Rising sea levels are also likely to threaten rice cultivation. The United Nations Environment Programme (UNEP) estimates a one-meter rise in sea level would inundate 17,000 square kilometres of Bangladesh’s land, over ten percent of its total land mass.
The problems the IPCC has identified will become obvious in South Asian economies sooner rather than later. Unfortunately, the cost of action will only rise if delayed. To insulate themselves from these potential threats, South Asian nations will have to invest heavily in both mitigation and adaptation. One set of efforts would be to mitigate climate change by reducing greenhouse gas emissions through improvements in energy efficiency and promotion of renewable energy. Operating renewable energy sources may bring two-fold benefits for this region. They are less polluter; therefore, renewable energy is one of the most effective tools South Asia has in its fight against climate change. Also, they are conducive to sustainable development because they are sustainable and available in abundance. The evidence is that they are environmentally and technically accessible reserves in the world and large enough to provide about six times more energy than the world currently consumes. Thus, renewable energy could supply the people of this region with energy, including those who currently have no access to energy without the need to make expensive network connections. Even a significant increase in demand can be satisfied with their enormous potential.
While renewable energy contributes environmental protection, it has a huge potential for regional energy trade – it does help spur economic growth, enhance job creation, boost business activity and fund to poverty eradication. The international trade in energy allows countries to balance this important demand and supply, exploiting their own unique comparative advantage while meeting increasingly diverse energy requirements. Despite substantial potential, South Asia is one of the least connected regions in the world in regard to energy trade, according to Asian Development Bank (ADB) report on Energy Trade in South Asia in 2011.
Though South Asia is one of the fastest growing regions in the world with economic growth forecasted to gradually accelerate from 7.1 percent in 2016 to 7.3 percent in 2017, a World Bank (WB) report said, it is still struggling to meet energy demand. Despite such encouraging figures, the facilities and services available in some South Asian countries are inadequate to address the growing demands of their economy and population, thus increasing the strain on scarce resources and contributing to high poverty figures and a relatively low standard of living. The majority people without a sustainable access to the basic energy services were estimated around 1.2 billion worldwide – 16% of the global population – in 2016, mainly from developing countries, particularly in Africa and South Asia, according to World Energy Outlook (WEO). Energy supply and security are major challenges on the road to sustainable development in the South Asian region. Furthermore, the challenge is likely to get more complex as energy demand is growing to keep pace with an expanding population and economy.
The South Asian countries have huge potential for renewable energy sources. Geographically, South Asian countries are located in a region of different climatic conditions such as tropical, humid etc. which provides easy access to a variety of renewable energy sources. It has been reported that hydropower potential in Nepal, the massive wind power potential in Afghanistan, and solar power potential in India, Pakistan and Bangladesh can help the South Asian region go a long way in fulfilling its energy needs.
This enormous potential is still insufficiently taken into account in this regional energy markets. Today, according to International Energy Agency (IEA) annual report in 2013, renewable energy represents 13.2% of the total energy consumption in the world and in South Asian countries, according to ADB report on Energy Trade in South Asia in 2011, less than 5%, while other energy sources continue to carve the part Lion. Bangladesh ranks among the lowest in South Asian region with 2.74 percent of energy production from renewable energy sources, according to ADB’s report in 2011. The report also summarises Bangladesh’s heavily dependence on natural gas with 88.45 percent.
Despite the huge potential and benefits of promoting energy efficiency and increasing the share of renewable energy in the gross energy production, there are obstacles at both the national and regional level, which must be overcome. One of the barriers is low investment in renewable energy because it involves high initial capital costs, and the monetary benefits from such projects take time to materialize. Low priority given to renewable energy in national planning and weak implementation framework, weak environmental regulations, fossil fuel subsidies etc. are among some crucial challenges in national level policy adoption. There is also very limited knowledge and expertise regarding renewable energy technologies. Policies are often not conducive to business and do not incentivize private sector participation. Political challenges include an agreement on the energy authority in the area and deliberating options for energy trade. The regional security framework is another impediment to the adoption of sensible mitigation and adaptation strategy as distrust between India and Pakistan still exists, and some countries in this region are constantly fighting against terrorism.
While geopolitical and geographic constraints are challenging to overcome, they are not unconquerable. Regional cooperation must address variables such as private sector participation, huge investment cost, affordability, political will, climate change, right of way and inaccessibility. The key here is to expand the existing bilateral framework for energy trade into a multi-lateral one, and work towards energy security and look into low-carbon solutions. Focal offices should be established at the federal/central level in each country under the auspices of South Asian Association for Regional Cooperation (SAARC), as there is a need to effectively coordinate between various agencies of national and sub-national governments and organisations including SAARC Energy Centre (SEC), SAARC Meteorological Research Centre (SMRC) etc. The same office may be declared as a liaison with international development partners, civil society and the private sector. Current and planned policies, programmes and projects may be reviewed to align them with the objectives of Sustainable Energy for All (SE4ALL), a global initiative launched by the United Nations (UN) in 2011.
Energy efficiency practices and standards are the most relevant areas in South Asia. By sharing ideas, they may address energy system losses and inefficient consumption at commercial and household levels. Similarly, the comparative analysis of legislations and policies relating to demand side energy efficiency and conservation may be carried out in order to progress in this direction. Each country should prepare a national energy research agenda to be pursued by academia and other scientific research organizations. There is a tremendous need to foster research culture to develop cost-effective home grown solutions for renewable technologies, energy efficient appliances and energy conservation practices. Additionally, legal and financial advisory services may also be provided through technical assistance programmes.
Through initiating heavy investment in renewable energy sector, the public sector can save substantial resources and set a trend to be followed by private businesses and households in each nation. Hence, there is an urgent need to attract private sector investment in energy sector. Energy trade models and practices in other regions of the world may also be examined for relevance to South Asia. Energy trade may emerge as a cornerstone of regional integration and connectivity. South Asia is also advantageous in terms of its close proximity with Middle East and natural resource rich Central Asia.
Mahmudul Hasan is a recent LL.M. graduate of energy and environmental law and Thomas Buergenthal Fellow at The George Washington University Law School, Washington, D.C.
Continue Reading
Maximizing Nickel as Renewable Energy Resource and Strengthening Diplomacy Role
Authors: Nani Septianie and Ramadhan Dwi Saputra*
The development of the times and technology, the use of energy in the world will continue along with the increase of population. Global energy demand is currently recorded to have increased three times since 1950 and its use is estimated to have reached 10,000 million tons per year. Most of the energy is produced from non-renewable materials such as coal, gas, petroleum, and nuclear energy. Besides being non-renewable, fossil-based energy is also not environmentally friendly because burning fossil fuels produces CO2 gas which can cause global warming. Based on the energy used previously, the world still uses fossil energy that used in conventional vehicles that still use gasoline as fuel. Where fossil energy itself is still classified as the energy that is not environmentally friendly because it produces carbon emissions that can pollute the environment. Therefore, the world is currently flocking to make renewable energy by electric vehicles that are more environmentally friendly.
In electric vehicles, batteries play a very important role in the components of electric vehicles. Currently, there are two types of batteries that are the most common and widely used for electric vehicles. The first is a lithium-ion battery and the second is a nickel-based battery. But keep in mind for the type of lithium-ion battery itself, nickel is also the main raw material needed. Lithium-ion batteries commonly used to store power in vehicles are Lithium Manganese Oxide (LMO), Lithium Nickel Manganese Oxide (NMC), Lithium Nickel Cobalt Oxide (LTO). The reason for using nickel as a raw material for electric vehicles batteries is more environmentally friendly, nickel is also considered to be more efficient. Because nickel is a metal that has a high energy density storage and cheaper than using other types of minerals such as cobalt. As the popularity of electric vehicles continues to climb due to their increasing demand, the future of nickel production will also be brighter in future. Demand for automatic mining commodities will continue to grow, to encourage companies and producing countries to be eager to increase production.
Reporting from Investing News, Monday (10/26/2020) there are 10 largest nickel producing countries in the world, namely the United States in the tenth position with total production: 14,000 Metric Ton (MT, the ninth position Cuban countries with total production: 51,000 MT, the ninth position is Cuba the the eighth countries are Brazil with total production: 67,000 MT, the seventh position is China with a total production of 110,000 MT, the sixth position is Canada with total production: 180,000 MT, the fifth position is Australia with total production: 180,000 MT, the fourth position is New Caledonia with a total production: 220,000 MT, the third position is Russia with a total production of 270,000 MT, the second position is the Philippines with a total production: 420,000 MT, and the first position is occupied by Indonesia with the largest total production of 800,000 MT. Indonesia has been used as a benchmark by many parties regarding the seriousness of a country to enter the Nickel trend. In 2019, it was reported that nickel production will be bigger than palm oil production, which is the second largest commodity to be exported. Its relatively affordable distance from China, which is a leading country in the production of electronic vehicle manufacturers, makes the export process of this commodity very ideal. Indonesia also still has nickel reserves of 21 million MT.
Nickel is an important component in the production of electric vehicles, which can be used as raw materials for long-term sustainable battery manufacturing to create a clean environment. Where nickel as the main raw material for the manufacture and operation of electric vehicles has contributed to reducing carbon emissions. Based on the Union of Concerned Scientist explains that battery production contributes of global warming emissions and decreases to 43% where this decrease depends on the chemicals used in the manufacture of battery raw materials. Making electric vehicle batteries is indirectly appropriate with the commitments of the Paris Agreement and the Sustainable Development Goals Agenda (SDGs) at point 13 to combat Climate Change in reducing carbon emissions to achieve a climate-neutral world. Therefore, each country is needed to cooperate and maximize diplomatic strategies between countries to fulfill the source of raw materials for the manufacture of electric vehicle batteries, especially nickel.
Countries are needed to maximize diplomacy activities to create an equal distribution of electric vehicle production
Therefore, the large production of electric vehicles shows that in the future each country will need a supply of raw material for the production of batteries, namely Nickel which is the main raw material for making batteries. electricity. This phenomenon shows that the largest nickel producing countries have an important role in achieving the contribution of raw materials for the manufacture of electric vehicle batteries. However, with the large production in each country that has an abundance of nickel, the country cannot stand alone. Instead, it is also necessary to distribute nickel production in other countries by sharing raw materials, which can be carried out using a diplomatic strategy.
Therefore, diplomatic activities between countries are very important to complete all the shortcomings possessed by each country. Each country can use its negotiation skills in achieving its national interests and the needs of each country. However, countries that have a large abundance of energy resources, especially nickel, which is the main raw material for the manufacture of electric vehicle batteries, should not continue to export excessively, but countries that have these energy sources must continue to limit the number of exports. Because nickel is an energy resource, the wealth of this energy resource must be maintained to prevent the depreciation of nickel reserves. Therefore, each country is required to carry out diplomacy, including strengthening the bargaining power of each country, negotiating to create an even distribution of nickel supply, complementing the needs that each country lacks in assembling electric vehicles, and Each country is required to form a sustainable plan as a long-term strategy to ensure that electric vehicles can continue to be produced in the future, especially nickel which is the main raw material in the manufacture of electric vehicle batteries.
*Ramadhan Dwi Saputra, Chemical Engineering Research Assistant at Universitas Islam Indonesia.
Continue Reading
Gas doom hanging over Ukraine
The long history of gas transit across independent Ukraine began with Kiev’s initial failure to pay anything for Russian natural gas, both intended for transit to Europe and for domestic consumption, on the pretext of fraternal relations between the former Soviet republics. Later it cost the Ukrainians a meager $25 for 1,000 cubic meters of Russian gas, and that ridiculously small sum remained unchanged for quite some time. The sizeable amount of Russian gas provided at a discount price, plus domestically available oil resources, were distributed by the country’s greedy elite the following way: domestically produced gas was used on utilities, proceeds from the transit of Russian gas went to the state budget (minus the money that lined bureaucratic pockets), and Russian gas – to the industry (plus the corruption component).
Then came the Ukrainian revolutions and Kiev’s desire to join “Euro-Atlantic structures” and the desire to “get off the Russian gas needle and prevent the Kremlin from using energy as a weapon.” Ukraine has tried and is still trying to believe in all this by playing up to the collective West and hoping that the West will compensate Kiev for the losses caused by its revolutionary endeavors and anti-Russian antics. As a result, we see gas prices going through the roof, an energy crisis in Europe, and the completion of the Nord Stream 2 gas pipeline.
Those in power in Kiev hoped for the very last moment that the West valued their country more than it did the energy security of European countries. Much to their surprise (and only theirs), this is not so. It looks like the Europeans are interested in Russian gas supplies and are not so eager to keep Ukraine as the main transit country. Moreover, having “democratized Ukraine” to the state of an openly anti-Russian country, the West turned it into a country, whose leadership the Kremlin does not really want to talk to simply because it does not see any point in doing this. This is the reason why third countries care (or rather pretend to care) about Ukraine. Thus, in July of this year, there came out the “Joint Statement of the United States and Germany on Support for Ukraine, European Energy Security and Our Climate Goals.” According to it, Germany pledged to do everything in its power to make sure that the agreement between Moscow and Kiev on the transit of Russian gas across Ukrainian territory was extended for up to ten years. The statement came when it was already obvious that the construction of Nord Stream 2 would be completed, Germany resisted US pressure on this issue, Moscow paid no attention and Washington, exhausted by the battles of the presidential elections and the search for new strategies in the Old World, was trying to pit America’s European friends against Russia.
It has never been a secret that the West needs reliable transit, and this is something that Ukraine also insists on. However, Kiev has officially labelled Russia as an “aggressor country,” which means that this very “aggressor” must ensure this transit and bring billions of dollars in revenues to the Ukrainian budget. This looks like a kind of “Euro-schizophrenia” where Ukraine is an anti-Russian country and simultaneously serves as a reliable transit country for Russian gas. Things do not work this way, however, and it looks like Europeans are beginning to realize this. Therefore, most of the European consumers support Nord Stream 2 even though they do not show this in public. Suffice it to mention the recent conclusion of a years-long contract for gas supplies to Hungary.
Vladimir Putin’s statement, made amid soaring gas prices and growing threats to European industry, came as an energy lifeline for all Europeans.
“Russian President Vladimir Putin supported the initiative of Deputy Prime Minister Alexander Novak to increase gas supply on the market amid rising energy prices in Europe… Novak said that Russia can stabilize the situation with prices by providing additional volumes of gas on the exchange, adding that this country’s main priority is to accommodate domestic demand,” reported.
Commenting on the possibility of increasing gas supplies via Ukraine, President Putin recalled that Ukraine’s gas transport system had not been repaired “for decades” and that “something could burst” there any time if gas pressure goes up.
“At the same time, it is more profitable and safer for Gazprom to operate new pipeline systems,” he added. Putin thus confirmed what is already clear to all that Ukraine is an unreliable and, in fact, an extra link, and that Europe can get gas bypassing technically and politically unreliable Ukrainian pipes. He also pointed out that Gazprom would suffer losses from an increase in gas transit via Ukrainian territory, while new gas pipelines offer cheaper transit options. He added that Gazprom is saving about $3 billion a year by using new pipelines and that Russia was ready to increase gas supplies and make them cheaper for European consumers.
Gas shortages have already forced the Ukrainian government to freeze gas prices for household consumers, but prices for gas for industrial enterprises are rising along with those on European exchanges, where on October 6, they reached a very impressive $ 2,000 per thousand cubic meters and went down only after Putin’s statement came out.
Meanwhile, the head of Ukraine’s Federation of Glass Industry Employers, Dmitry Oleinik, said that this [rise in gas prices – D.B.] would lead to an inevitable rise in prices. However, producers will not be able to jack up prices indefinitely, because at some point buyers simply will not be able to cover production costs.
“The Ukrainian consumer will not even be able to cover the cost of production. Plants and factories will slowly shut down and people will lose their jobs – this is already very serious. Budget revenues will “plummet,” and expenses will skyrocket… The issue of bankruptcies is just a matter of time,” Oleinik warned.
If Ukraine continues to follow the chosen course, it will face de-industrialization. By the way, this will suit the West, but certainly not the Ukrainian industrial oligarchs, who have long been eyeing agriculture, including the prospect of turning themselves into land barons. However, the farming sector will not be happy about the high prices on gas that bakeries, sugar factories and greenhouses run on. There will be nowhere to run.
Apart from purely practical realities, the conclusions I can draw from the current energy situation in the world and Vladimir Putin’s statements regarding the Ukrainian transit, are as follows:
• Gas supplies through Ukraine and to Ukraine are not solely an economic issue, given Kiev’s endless anti-Russian escapades;
• This problem affects the energy security of Europe;
• Since there are several angles to this problem, it must be solved in a comprehensive manner;
• At the same time, this cannot be done exclusively in the interests of the West and Ukraine to the detriment of the interests of Russia.
As you can see, it is once again up to Kiev and its shadow patrons to decide. And winter is just around the corner…
From our partner International Affairs
Continue Reading
Russian Energy Week: Is the world ready to give up hydrocarbons?
In an official message to mark the opening of the Russian Energy Week international forum on 13-15 October in Moscow, Russian President Vladimir Putin stressed that there are numerous issues on the agenda related to current trends in the global energy market, including improvements to industry infrastructure and the introduction of modern digital technologies into its operation.
“The efficiency of energy production and consumption is the most important factor in the growth of national economies and has a significant impact on people’s quality of life. Many countries have already adopted policies to accelerate the development of clean energy technologies,” he wrote in the message to guest and participants.
“The forum business programme is therefore set to look in detail at the possibility of developing green energy based on renewable sources and the transition to new, more environmentally friendly fuels. I am confident that the events of the Russian Energy Week will allow you to learn more about the achievements of the country’s fuel and energy sector, and that your initiatives will be put into practice,” Putin said.
Leaders of foreign states have also sent greetings to the participants and guests. For instance, President of the Republic of Angola João Manuel Gonçalves Lourenço, Prime Minister of Vietnam Pham Minh Chinh, Crown Prince of Abu Dhabi Armed Forces Mohamed bin Zayed bin Sultan Al Nahyan, and Vice Premier of the State Council of China Han Zheng.
In their greetings, it generally noted the importance of the topics to be discussed at the forum as well as the need to build an international dialogue and consolidate efforts to achieve the sustainable development goals, including as regards climate change.
The programme covers a wide range of issues of transformation and development in the global energy market. In the context of energy transition, the issues of energy development are inextricably linked with the introduction of new technologies, and the transformation aimed at reducing greenhouse gas emissions into the atmosphere. Climate protection is a task that cannot be solved by one country; it is a global goal, which can be achieved through building dialogue and cooperation between countries.
The participants in the discussion will answer the question: Is the world ready to give up hydrocarbons? In addition, during the panel session, the participants will discuss whether oil, gas and coal are really losing ground in the global energy sector; whether the infrastructure will have time to readjust for new energy sources; how long will there be enough hydrocarbons from the field projects that are being implemented; and whether an energy transition using fossil fuels is possible.
The international climate agenda is forcing many countries to reform their carbon-based energy systems. For Russia, which holds a leading position in the global hydrocarbon markets, the transition to development with low greenhouse gas emissions presents a serious challenge, but at the same time it opens up new opportunities for economic growth based on renewable energy, hydrogen technologies, advanced processing of raw materials and implementing green projects.
The Climate Agenda included sessions dedicated to the operation of the Russian fuel and energy sector in the context of energy transition, the impact of the European green pivot on the cooperation between Russia and Europe, as well as the session titled ‘The Future of Coal in a World Shaped by the Climate Agenda: The End, or a New Beginning?’
Sessions of the ‘New Scenarios for the Economy and the Market’ track are dedicated to the global challenges and opportunities of the electric power industry; the impact of ESG on the Russian fuel and energy sector; the potential for the renewable energy sources; and other issues of the future of energy.
The Russian Energy Agency under the Ministry of Energy brings together experts from key international analytical organizations to discuss the future of world energy during the session titled International Energy Organization Dialogue: Predicting the Development of Energy and Global Markets.
The Human Resource Potential of the Fuel and Energy Sector, participating experts will discuss the prospects for developing the professional qualification system, and a session titled Bringing the Woman’s Dimension to the Fuel and Energy Sector. Optimizing regulation in the energy sector and organizing the certification and exchange of carbon credits in Russia are the basis of the Regulatory Advances in Energy.
Anton Kobyakov, Advisor to the Russian President and Executive Secretary of the Russian Energy Week 2021 Organizing Committee, said “the level of various formats of international participation testifies to the importance of the agenda and Russia’s significant role in the global energy sector. We are a reliable strategic partner that advocates for building international cooperation based on the principles of transparency and openness. With the period of major changes in the industry, it is particularly important to engage in a dialogue and work together to achieve both national and global goals.”
The forum, organized by the Roscongress Foundation, the Russian Ministry of Energy, and the Moscow Government, brought together many local and foreign energy and energy-related enterprises. The speakers attending included Exxon Mobil Corporation Chairman of the Board of Directors and CEO Darren Woods, Daimler AG and Mercedes-Benz AG Chairman of the Board Ola Kallenius, BP CEO Bernard Looney, and TotalEnergies Chairman and CEO Patrick Pouyanné.
Continue Reading
USA China Trade War USA China Trade War
Economy3 hours ago
The US-China Trade War
Defense5 hours ago
ASEAN has the ability to counteract AUKUS’ Cold War strategies
Intelligence7 hours ago
Southeast Asia9 hours ago
The 38th ASEAN Summit Meeting: Agenda and Outcomes
Africa Today11 hours ago
World Bank to support reconstruction plan for Cabo Delgado in Mozambique
Urban Development15 hours ago
New Principles Provide Roadmap for Net-Zero Buildings
Tech News18 hours ago
Millions of Moscow residents manage their everyday lives through their smartphones
The creators of My Moscow, a mobile application of the Russian capital’s urban services, have analysed how and why Muscovites... |
Electrifying facts about Nikola Tesla that you never knew
1. Tesla was briefly reduced to digging ditches for a living.
While he searched for backers to support his research into alternating current, Tesla took a job digging ditches for $2 a day to make ends meet.
2. He invented a remote-controlled boat that he thought could end all warfare.
He told the New York Post that his invention, which would allow battles to be fought without putting humans at risk, would render warfare itself obsolete.
3. His claims of receiving signals from outer space were proven right—a century later.
In 1996 scientists published a study replicating Tesla’s experiment and showing that the signal was, in fact, caused by the moon Io passing through Jupiter’s magnetic field.
4. Tesla was an environmentalist.
According to Alcorn, Tesla was “very concerned about the fact that we were using up the Earth’s resources too quickly, and he wanted to make sure that we were using nonfossil, renewable fuels.”
5. Tesla rarely slept and suffered from OCD.
Tesla claimed to have required only two hours of sleep a night, although he occasionally napped. He polished every dining implement he used to perfection, using 18 napkins.
6. Many of his inventions are still classified
Tesla died in 1943, but the U.S. government still classifies some of his inventions and experiments.
7. Thomas Edison offered Tesla a fortune ($50,000) to improve his existing system of generating electricity.
When Tesla succeeded, Edison said, “Haha, just kidding.” True story.
8. Tesla’s A.C. (alternating current) violently conflicted with Edison’s D.C. (direct current).
Direct current required power plants every square mile, making it wildly inefficient compared to A.C.
9. Edison held public electrocutions of cats and dogs, and even elephants, among other animals.
He did it just to “prove” that A.C. was too dangerous to use
10. Tesla died a broke humanitarian.
“Tesla did what he did for the betterment of humanity, to help people have a better quality of life,” said Alcorn.
More from Facts – News Landed
Sam Walton: Facts about the billionaire Walmart founder you didn’t know
Interesting Facts about Black Holes that you never knew
12 Surprising Facts About Billionaire Entrepreneur Bill Gates
Related Stories
Scientists use genetics to save the threatened the Amazon parrots
Researchers from Oakland University are mapping genomes from the amazon parrots in an effort to save them from extinction....
A new hiding population of Blue whales was detected by Nuclear detectors
Scientists have discovered an entirely new population of pygmy blue whales in the Indian Ocean. These gentle giants were...
Featured Stories
Low-cost lead adsorbing water filter designed by Indian students
|
DEV Community
Jakub T. Jankiewicz
Jakub T. Jankiewicz
Posted on • Updated on
RPC in Next.js
When I was creating web applications I was loving using JSON-RPC. When I started learning and using Next.js I wanted to find JSON-RPC library for next. But I've found something even better.
What is RPC
RPC stands for Remote Procedure Call. Basically it's abstracting the boundary of client server architecture of Web applications. You have a function on the server like echo and you call it from the client (like a browser). The library for RPC just do all the packing and unpacking of the requests and you can think like you just have no server and HTTP protocol between at all. So it simplify a way of thinking about application. Because the best way of simplifying a complex application is to not have to thinking about stuff that are not important at a given moment. This is the whole purpose of abstraction, you name a thing and you can forget what it's inside and have your mind think about order things.
What is JSON-RPC
JSON-RPC is RPC protocol that just sends JSON payload to the server and server unpack the JSON call the method, pack the response in JSON and send it back to the client where client unpack it and get results.
• You call function echo("hello, world!")
• method call is saved as {"method": "echo", "params": ["hello, world!"}
• JSON is send to the server
• server call method echo("hello, world!")
• The result is saved as {"result": "hello, world!"}
• JSON is send back to the client
• client return Promise of "hello, world!"
NOTE: some properties of JSON-RPC was left out for simplification, you can read how exactly JSON-RPC works in its specification or on Wikipedia.
So basically you can just think about this like you call server function, call it from browser and get result as promise. You can forget that you even have a server.
JSON-RPC is even even simpler after introducing Promises and async..await into JavaScript, because the JS function on the Front-End can just be async.
With Node.js and JavaScript in browser you can have:
// client
await echo("hello, world!");
// server
async function echo(str) {
return str;
Enter fullscreen mode Exit fullscreen mode
The rest is magically converted to JSON and sent between browser and server but when you write code you can think about browser and server as one entity. Here is simple example but the function can be more complex like reading or writing data into a database.
For me RPC architecture is way superior than REST or GraphQL and it's way underrated.
RCP with Next.js
When I was searching for JSON-RPC implementation for Node and Next. I've found this little gem, library next-rpc.
Using next-rpc is very simple:
First you install the library:
npm install -S next-rpc
Enter fullscreen mode Exit fullscreen mode
Then you need to configure next to use RPC:
// ./next.config.js
const withRpc = require('next-rpc')();
module.exports = withRpc({
// your next.js config goes here
Enter fullscreen mode Exit fullscreen mode
Then you define your remote functions/procedures:
// /pages/rpc/index.js
// this enable RPC mechanism
// if this is not included the route will work normally
export const config = { rpc: true };
// this is remote procedure that you can import and call
export async function getUsers() {
return db.query(`SELECT users FROM users`);
Enter fullscreen mode Exit fullscreen mode
Then you can use this method in any component:
// /components/users.jsx
import { useState, useEffect } from 'react';
import rpc from '../pages/rpc/index.js'
const Users = () => {
const [users, setUsers] = useState([]);
useEffect(() => {
}, []);
return (
<ul>{ => {
return <li>{ }</li>;
Enter fullscreen mode Exit fullscreen mode
And that's it, you can also use next-rpc with reactQuery or swr.
Even that this RPC mechanism abstract the usage of the server and HTTP, this library still give you an access to request object, so you for instance can create login and get HTTP headers if you want. But you probably will not do that a lot of times and need it only for special cases.
IMHO any RPC mechanism is way better, than any other server/client approach, when you're developer that work on both Back and Front of the application, the boundary of server/client is blurred completely. And this is how you typically work with Next.js. You can think about the application as one entity (even more than with pure Next.js) and you can forget about not important things like HTTP requests. But still you can think about it when needed, just like with any abstraction, like a function. Most of the time you can use just the name of the function, but sometimes you need to look inside, and this is what next-rpc library gives you and your Next.js application.
If you like this post, you can follow me on twitter at @jcubic.
Discussion (0) |
Pricing Strategies and Markets, assignment help
Pricing strategy varies significantly across different market structures. The pricing guidelines in a monopoly market are relatively straightforward. Since the company is the only producer offering the product, it can mark-up the price as far as the customer can bear. The pricing strategies for a producer operating in a perfect competition structure are also fairly intuitive. They are price takers, and hence price is set at the marginal cost of the product. This is due to the fact that there are many firms offering nearly identical products. However, there is optimal pricing for the market structures offering differentiated products with many competitors (oligopoly) or a few producers (monopolistic competition). These are much more complex and involved. It has been stated that differentiation in products that creates differences in customer valuation is the most prevalent type of competition. In such markets pricing strategies may include the three C’s of cost, competition, and customer.
Develop a paper detailing an analysis of market structures and relating pricing strategies that are suitable for each of these structures. Furthermore, include a real world example of pricing strategy for a specific company by identifying its market structure.
Your paper should be between 1750 and 2500 words, in APA Format and structured as follows:
Cover page with a running head
1. Perfect Competition
1.1. Description
1.2. Pricing Strategies
2. Monopolistic competition
2.1. Description
2.2. Pricing Strategies
3. Oligopoly
3.1. Description
3.2. Pricing Strategies
4. Monopoly
4.1. Description
4.2. Pricing Strategies
5. Case Study
6. Conclusion |
Girdling the Maple
Consider the consequences if your largest blood vessels were coursing under surface of the skin instead of deep inside the body. I know it’s hard to imagine. But if the aorta ran the length of your back, branching out to limbs and major organs, the pulse wave might be visible and certainly palpable over the spine. The vena cava would return blood along the midline from belly to chest where it would plunge inside to the heart. In a lean body this great vein would look like a bluish canal through the skin. Such a vascular anatomy offers no obvious advantages but there are several disadvantages, including a greater risk of hemorrhage. It wouldn’t take a deep wound to release a fatal gusher from either of these vessels; even a bruise might cause enough swelling to seriously affect returning venous blood.
sapsucker bore holesMy crazy musing began when I noticed rows of shallow, neatly-drilled holes encircling the trunk of our prized Japanese maple tree. This was the unmistakable signature of a yellow-bellied sapsucker which visits us in winter. Besides licking the sap, the bird finds insects that are attracted to the weeping holes so that its work generates carbohydrates and proteins for its diet. By springtime the sapsucker had left for its northern breeding grounds and the holes had dried up, but the fresh foliage was far less luxuriant than in previous years. Since I couldn’t find any signs of the tree being attacked by insects, molds or viruses I assumed the woodpecker had damaged its conducting vessels which, like the vascular anatomy in my imaginary person, lie just under the surface.
Yellow-bellied sapsucker by John James Audubon: Birds of America
Yellow-bellied sapsucker by John James Audubon: Birds of America
Although there is no circulatory system in plants the vascular tubes are somewhat analogous to blood vessels. Xylem carries water and minerals up from the root system, while phloem shifts the products of photosynthesis in the foliage to other parts. Between these two great highways lies the cambium consisting of a stem cell type (meristem) which generates new xylem and heartwood on one side and new phloem and tree bark on the other.
Trees could not have evolved conducting vessels deep in their boles because the inert heartwood would prevent their girth from increasing. But the price paid for this superficial distribution under the bark is a greater vulnerability to traumatic injury and infection. Where the sapsucker had been drilling the xylem and phloem was permanently damaged because cambium is not replaceable. Fortunately the harm to our tree is not fatal or as serious as lesions to
Frost damage in tree
Beech tree with frost lesion
others in our yard caused by frost or insect borers which expose heartwood to the elements and disease. Only by complete girdling, as American pioneers often did when clearing the eastern forests for farming, is a tree condemned slowly to an early death.
One day while hiking in l’Estrie when I lived in Quebec I came across a tiny shack with a lopsided metal chimney poking out of its roof. I could have easily missed it deep in the maple forest, but curiosity forced by legs to follow the snow tracks of someone who had branched off from the beaten trail. I ended up at the front door, and because it was unlocked I stepped inside.
It was a dream house for a child. Every surface I touched felt sticky like cotton candy (candy floss). It was a sugar shack where maple syrup was still being made in the traditional way. There was a huge boiler in the corner standing over an open fireplace from which a chimney pipe ascended to the ceiling. This was where sap would soon be slowly evaporating to produce one gallon of amber syrup from every 40 gallons of thin fluid tapped from maple trees outside.
I didn’t have to look far to find those trees. Many of those more than nine inches in diameter had holes now vacant but which in previous seasons had held a spile from which sap would drain into a bucket. Some of them had multiple holes a few inches apart and often arranged in a spiral pattern. The harvesters had been more careful than my sapsucker to avoid harming the trees, but I can’t blame it when pancake days come round.maple syrup
Next Post: Doc Bamboo
Candid about Cats
When a gray cat started prowling around our yard I assumed it was a new neighbor. I was wrong, she was a new resident!
I stumbled on her nest by chance a few days later. It was sheltered against the brick side of our house, and after scooting off from under my feet I noticed there were three tiny kittens in the nest. I guessed because their eyes were open that they were over ten days old, but not much more. The cutest kitty was tabby, another black as soot, and the third gray like their mother. She had chosen a safe place to nurse and hadn’t left a trail through the groundcover to attract attention.
cat nest
Nest of kittens
Soon afterwards a lady arrived from a non-profit rescue service with a pet carrier and a trap in the back of her SUV. She gets calls most days to abandoned cats, so collecting my family was routine. I greeted this dedicated volunteer with a cheer.
The queen was away from her nest when we returned, but the furry ball of kittens was still huddled inside. They didn’t object when we gently lifted them into the carrier.
But we had to play on their mother’s instinct to catch her. She was too shy to be enticed back while we were there, and much too wild to capture in our arms. So we set the trap back-to-back with the carrier and draped them with a cloth, leaving the entrance open. After crossing the threshold she would step on a pedal to make the door slam behind her. We waited indoors listening beside an open window.
I imagined her stealthily returning to peer through the tunnel to her babies in the carrier. Their cries would surely bring her back and overcome anxiety. Three hours later in the gloaming we found her snarling in the trap. Soon enough the family would be reunited in a large crate at the volunteer’s home.
queen cat
Queen in the trap
Before driving away the volunteer explained that healthy kittens are put up for adoption. Despite a rude start in life they would turn into fine home cats. But what about their mother—no one would adopt her? I presumed she would be euthanized.
Then I was told that she would be treated for parasites and tested for rabies and feline leukemia virus. She would indeed be destroyed after weaning her litter if the tests were positive, but if not she would be spayed and vaccinated and released in our yard.
“NO…not in my backyard!”
There are many rescue organizations around the country that have a ‘trap-neuter-return’ policy. I suppose that preserving lives of unwanted animals helps to ease our collective guilt for the way that society maltreats and abandons them. Besides most people are appalled that millions of cats and dogs are euthanized, and we are moved by images of furry faces staring through the bars in animal shelters with faint chances of adoption. Who could find any satisfaction in dispatching an animal except for serious injury or chronic pain?
Tabby kitten
Tabby kitten
Some think it is unconscionable to kill any so-called feral animal that escaped from domestication or its wild descendants if a rescue shelter is available or it can be returned to a familiar place (like my backyard). I wish the same vehemence was expressed against hunting or trapping our native bobcat, because a dozen can be legally taken each year in Virginia. On the opposite side of the argument others believe it is imperative to cull cats that have gone wild, and persuade pet owners to keep all cats indoors. Municipal animal control officers have been very effective in keeping stray dogs off the streets. Roaming cats receive less attention because they rarely pose a danger to us and are better at fending for themselves than dogs. At least there is agreement between these two camps for promoting responsible ownership and sterilizing animals, apart from the genetically fittest for breeding. But because the numbers of feral and stray cats continue to soar there is a debate about culling them.
I understand that slaughtering unwanted members of a species that we chose as our companions seems a betrayal of trust. We might also feel sympathy for farm animals reared for food, but it is nothing like the bond between good owners and affectionate pets that depend on them. Moreover, it is easy for our warm feelings to diffuse over to the entire species, particularly for Anglos raised on a sentimental literary diet of Wind in the Willows and Watership Down. When I found a feral family in our yard I felt an acute conflict between as a pet owner on the one hand and a naturalist on the other, but the volunteer had no such dilemma. For her, life is always better than the alternative.
black kitten
Sooty kitten
When I protested that the gray cat would menace our wild birds, she replied: “For every fifty mice, voles, and baby bunnies brought home by my cats they only catch one bird.” There are of course many reasons why her cats are virtuous—they may prefer red meat to white or have heavy paws or the birds have plenty of cover in her yard, et cetera. But there is no longer any doubt about the national toll since the Smithsonian Conservation Biology Institute reported in a prestigious Nature journal. It found that outdoor cats killed 2.4 billion wild birds annually, including many of the most popular and beneficial species—cardinals, wrens, thrushes, bluebirds, and hummingbirds. In addition, they take 12.3 billion small mammals, but few rats. Feral animals and strays were responsible for more than half of the kills as they must hunt to eat, and domesticated outdoor cats can’t curb their instinct even on a full stomach. This stunning scale of butchery is contributing to the decline in common birds across North America and Europe and accounts for the extinction of several dozen species. The impact of cats and other introduced predators on native marsupials and flightless birds in Australasia is even better known.
The threat to so many native species should be sufficient reason for keeping cats indoors and curbing the rest, but welfare is another. Feral animals live in a shadow land between domestication and wild nature. Cats have evolved by human selection over eons and their behavior is no longer so well-adapted for life in the wild, especially far from their native range. Given the opportunity cats wander outdoors, and often into jeopardy. The pitiful sight of a feline corpse by the highway is the most obvious reminder, but when researchers fitted cats with ‘Kitty Cams’ in suburban Georgia they were astonished at the sheer volume of hazards they face outdoors. The lives of semi-wild cats are even riskier and much shorter. They are burdened with parasites, threatened by coyotes, persecuted by people, exposed to wild weather and the threat of starvation, and lack any humane veterinary care. Pictures of a condemned animal in shelters pull our heartstrings, but there are millions of others in our cities and woods that suffer and perish out of sight.
I wonder if the consciences of people against culling feral animals could be appeased if we draw a mental boundary between them and Fluffy at home. Of course they look alike as members of the same species with indistinguishable genomes, even after generations of separation. The proof was also before my eyes since the kittens in our yard can become perfect pets. Isn’t it prejudicial to count the life of their wild mother as inferior, and call for termination? Is that a kind of catism?
gray kitten
Scary kitten
I remember as a kid worrying whether animals had souls, but grown-ups never gave me a satisfactory answer when I asked, “Do pets go to heaven?” I still think it’s a good question, though I’d frame it differently now. It would have helped if they had given me C.S. Lewis’s book The Problem of Pain. In a nutshell, he argues that if we have a personal relationship to God then our pets can be ‘ensouled’ through us. This is a strictly theological perspective and far from the biological view that humans are merely the most advanced model in organic evolution instead of a special creation. But leaving biology aside I venture some metaphysical inklings, although I admit they are speculative and our relationship to pets and their generous spirit remains deeply mysterious to me.
Lewis wrote, “in so far as the tame animal has a real self or personality, it owes this almost entirely to its master. If a ‘good sheepdog’ seems almost human that is because a good shepherd has made it so.” I too wonder if the ineffable bond with its owner gives a pet a deeper sense of its own self than their wild cousins ever have. Until recently, most animal behaviorists even denied that apes have much self-awareness, and I predict that research will challenge our thinking about other animals too.
To suggest that pets raised in a human home develop greater self-consciousness is skating on the thinnest ice and puts the writer at risk of being regarded as an anthropomorph, which is the cruelest label for a biologist. But while musing on ice a little longer I wonder if our animals can actually share crumbs of what we call ‘humanity.’ If so they might be able to share some kinds of mental suffering, like grief, that most scientists thought were strictly human. Skating even more dangerously near the melt zone I wonder if a greater sense of selfhood even increases their perception of physical pain. Pain is a subjective experience that is hard to explain to others and impossible to share compared to our five basic senses (seeing, hearing, touching, smelling, and tasting). We already know that pain is not always experienced the same by everybody: spinal mechanisms gate the ascending nervous pathways to the brain so that perceptions can be altered by states of mind. Perhaps our pets can suffer more than untamed beasts, and maybe I dismissed foxhunters too lightly for claiming their quarry hardly suffers at all. Of course this theorizing should never be used to justify maltreatment of animals which is always abhorrent and shameful.
We adopted a young stray cat. We called her Thursday and she lived with us indoors like a pampered princess for fourteen years, and for half of her lifetime in a Fifth Avenue apartment in New York. But she never returned affection, except with the threat of tooth or claw. It was my wife’s compassion that brought her home, but looking back I don’t think the cat ever had a soul! Unlike the kittens we rescued Thursday was already too old to be imprinted by human kindliness. Taking her off the street had probably saved hundreds of birds and prevented her from making more of her kind, but it didn’t make a civil cat that deserved a place in heaven alongside our other house cat, John Henry. Cats are all the same, but are not all equal. If I see that gray mother cat prowling around our bird feeder again I will feel prejudicial, and hope my wife won’t sneak out to feed it.
Postscript: When the animal rescuer called a few weeks later we were told the cat was so ferocious that she had to be separated from her kittens. But since the viral tests were negative she had been spayed and released in our yard. We were told, not asked!
Next Post: Girdling the Maple |
Olive oil, Reggio Calabria’s precious yellow gold
The oil’s roots: its presence in the territory since he times of the ancient Greeks
The olive tree, a typical Mediterranean plant, has a documented presence in Calabria since the 8th-7th century BC, when the Greeks imported it from Asia Minor. However, the ancient Romans spread the oil crops in a capillary and perpetual manner. Thanks to this incredible and millenary experience, the region of Calabria is at the top of Italian oil production.
Calabrian olive tree
The different varieties of oil
Carolea is the best-known variety of olives from which the typical Calabrian oil is produced. The territory includes three types of Olive Oil with the Protected Designation of Origin (DOP): Bruzio, Lametia, and Alto Crotonese, all three having different characteristics due to different variables, the more or less dry summer season, the rain between autumn and winter, and the changes in the Mediterranean climate. The olive trees, which are beautiful, evergreen plants that have great longevity, have always been an integral part of our agricultural landscape. The regional areas most prone to olive cultivation are those of the province of Cosenza, of Lamentino (Lamezia Terme), and obviously Reggio Calabria (specifically Piana di Gioia Tauro and the area of Locride).
In Piana di Gioia Tauro, around 33,000 hectares are scattered with olive trees. Here, we can find centuries-old giants, ancient trees that even exceed 20 metres. A feast for the eyes!
Harvesting and pressing
According to tradition, the olives must be harvested by beating the branches with sticks, thus dropping the fruits on special nets to collect later. A modern technique involves the use of machines capable of shaking the branches, causing less damage to the plant, greater collection speed, and less fatigue. In some areas, olives are still picked by hand through long ladders, choosing only the fruits that are whole and at the right stage of ripeness: this technique is preferred for preserving olives, although it is a rather expensive system. To obtain a fragrant and defect-free oil, it is also important to take care of the olive storage method: it is advisable to use aerated plastic crates in which the fruits must have a life of no longer than 24 hours in order to avoid fermentation and, consequently, a poor product.
La tua opinione conta
Non ci sono commenti. Pubblica tu il primo. |
Patients at risk for retina diseases require frequent eye exams and a variety of imaging studies to assess for any signs of early damage. These diseases, if caught, can often be treated with medication, laser treatment or surgery. Treatment may prevent further damage to the retina, and is now so advanced that some damage can even be reversed.
Optimal treatment of retina and vitreous disease is best done by a fellowship-trained retina specialist with access to specialized imaging and diagnostic equipment.
In addition to treatment of uveitis and macular degeneration, UF Health Ophthalmology evaluates and treats the following conditions:
• Diabetic retinopathy - The eye contains many small blood vessels, and is at great risk for damage from diabetes. It is believed that extended exposure of the blood vessels to hyperglycemia (high blood sugar) damages the lining of the vessels. This, in combination with other physiologic abnormalities in diabetics, results in diabetic microvascular disease (disease of finer blood vessels in the body). Risk factors include how long a person has been diabetic and how well the diabetes is controlled. Diabetic patients with well controlled blood sugar and diabetes management generally enjoy a better visual prognosis.
• Retinal detachment - A retinal detachment occurs when the lining of the inside of the eye (the retina) detaches from the outer shell of the eye. Detachment causes vary, but the more common forms include: tears in the retina (rhegmatogenous detachments), fluid under the retina (exudative detachments), and traction pulling the retina off (tractional retinal detachments). The type of detachment and approach to repair will be determined by the retina specialist. The retina can be successfully reattached in approximately 90% of detachment cases. However, visual recovery is affected by many other factors, including the amount of time the retina was detached and the location of the detachment.
The symptoms are usually bright flashes of light which are caused by the retina pulling away from the inside of the eye. Frequently, floaters will be noted. This usually represents blood within the eye from the detachment. The patient will note loss of vision, which is often described as a shade coming down over the eye.
• Retinal hemorrhages - Bleeding within the retinal tissues is usually associated with diabetes, but can occur with a wide variety of diseases or retinal vascular abnormalities.
• Retinal blood vessel occlusions - This includes retinal artery or vein occlusion and is frequently due to vascular or systemic disease.
• Retinal cancer (melanoma) - Melanoma of the choroid can also be the site cancer from other primary sites, such as breast or lung cancer.
• Trauma - Trauma or injury to the eye can result in retinal damage, tears, detachment or bleeding within the eye.
• Retinal and intraocular infections - A wide variety of infections involve the retinal and choroidal tissues. Expert treatment is required to evaluate and treat the infection to minimize visual loss. |
The COVID-19 pandemic has led to a huge increase in remote working. This is an important form of flexible working arrangements (FWAs), which enable employees to determine how, when and where they work. Here, we examine the evidence underpinning the impact of FWAs on inclusion and diversity (I&D) through an evidence review and shorter evidence summary.
Explore the evidence
How do FWAs support I&D?
FWAs are argued to support workplace inclusion and diversity because they help people manage work and family responsibilities. This in turn is explained by employees being able to manage their resources to balance the demands of work and home life. In addition, because of social exchange, it is theorised that people are likely to give back and be committed to employers who help them.
What is the effect of FWAs?
Reduced work-life conflict and increased job satisfaction and commitment
FWAs do indeed help employees reduce conflict between balancing family and work roles. The effect is small, however, and is determined by the type of FWA, with flexibility of time more likely to help than flexibility of location.
Greater job satisfaction is another positive outcome, although this decreases over time. This increase occurs whether or not employees take up the option of flexible working, suggesting it’s the perception of an organisation as supportive or family-friendly that counts.
There’s a positive but weak link between FWAs and employee commitment, with younger workers displaying greater commitment when flexible working is an option. This may be a tool for attracting younger talent.
Autonomy is critical to ensure positive outcomes
Simply giving parents more time with their families is not enough; positive outcomes like job satisfaction and reduced work-life conflict are only likely when employees, rather than the employer, can control their working arrangements.
FWAs may in fact lead to negative outcomes; women who find it easy to bring work home report worse mental health than those who find it difficult. In short, these arrangements can cause a blurring between work and home life.
Teleworking is not without its challenges
Teleworking, which relies on computer-mediated technology, can cause challenges, given the lack of non-verbal cues, such as warmth and tone of communication. For insight and practice recommendations, see our evidence review on developing effective virtual teams
Explore our related content |
Skip to main content
A kit, a few text books, and a handshake
At 96 years old, William Bartolotta not only remembers when Edmund Bradwin was principal of Frontier College, but had the pleasure of meeting him. In his late-20s, William was given “a kit, a few text books, and a handshake” and sent off to the rail gang in Sault Saint Marie, Ontario to work with and teach a group of men, all from the same town in Southern Italy.
Mr. Bartolotta arrived at the site and was given a tour. He heard the men speaking with each other in Italian, saying, “He’ll start teaching and then ask us for money.” He let this go on for a while, then turned and told them—in Italian—that he worked free of charge. The men on the gang didn’t know that Mr. Bartolotta’s parents were from Sicily. His dialect was different from theirs, but he understood them—even when English failed.
Although William was still a young man in 1951, he had already served three years in the Air Force and started university at McMaster in Hamilton, Ontario, which was where he and a handful of others went to a presentation given by a former Labourer-Teacher and took up the call to spend his summer with Frontier College. The photo below shows him holding a shovel alongside a man who insisted the picture be taken so he could show his family that an educated man—a Professore—was working with the gang and not just sitting behind a desk.
In fact, to ensure he knew that he was a worker, just like the other guys, the first task he was given was to build the latrine. He and a fellow named Angelo dug the hole and built the outhouse. They were so proud of their work, they picked up the structure and took it with them every time the rail gang changed location.
With separate classes for varying levels of literacy—two of the men spoke some English, while many of the others struggled with reading in their own language—only one man didn’t attend the weekday lessons or the Sundays spent writing letters home. William saw that the man was curious, but having not attended the first few classes, was too proud to ask to join. Seizing the opportunity, William announced that the next class was for anyone who wanted to come. That class was the first for a man that William remembered for his hard work and diligence.
Starting his Labourer-Teacher career with Dr. Bradwin, it was with Frontier College principal Eric Robinson that William worked closely, first on a rail gang in Quebec and later spending a summer in more of a supervisory position, travelling from Ontario to British Columbia, making all stops along the way to check in on the new L-Ts—and then some more on the way back home. The two remained in contact for many years to come, with a shared interest in education. After completing his time with Frontier College, William Bartolotta continued his university education and became a teacher at both the elementary and high school levels. When his own children were small, he took the family to Uganda for two years, where he taught in a one-room schoolhouse. After retirement, William continued to teach, volunteering as an ESL instructor for newcomers.
In Vera, Saskatchewan on the way to visit a Labourer-Teacher.
Heavy labour by day and serious studies by evening still left time for fun. Two brothers who played guitar and trumpet would build a temporary stage on the flat rail cars, playing Italian music into the night. And sometimes there was even time for a night on the town—even though that didn’t always go smoothly. “They saw us coming and soon two police cars pulled up. They asked what we were doing and I told them we wanted a few beers. They were surprised that I spoke English and they asked what my business was with these guys. I told them and they softened, but told us that we shouldn’t come into time as a big group, only two-by-two!”
This level of camaraderie between the workers and the L-T was special, and in this case likely stemmed from an incident that happened early in Mr. Bartolotta’s career. “They needed to send money back to their families in Italy. I volunteered to take it, but I had to travel into town, stay there overnight, and travel back the next day. They had quite a bit of pay, which they gave to me in little packs. I put it all into a case and set off. I took it to the bank and sent the amount they told me to their families, which still left them with some money for themselves. What they all knew, but I didn’t know, was that at another gang down the line, a similar thing happened where all the guys gave their pay cheques to someone to take to the bank and he had them all cashed, then absconded with the money! The two days I was away were the quietest at the camp, then when I came back, they cheered. When the first letter arrived saying the money reached home, they trusted me.”
If you have a memory about Frontier College that you’d like to share, please send it to, use the online form (link) or call 1-800-555-6523 ext. 335.
Back to Top |
First published June 2006, updated June 2021
Frontotemporal dementia (FTD) represents a group of neuropsychiatric syndromes arising from progressive degeneration of the frontal lobes, anterior temporal lobes or both. The clinical presentation is heterogeneous and leads to diagnostic uncertainty, which complicates epidemiological analysis.
Prevalence studies indicate FTD is more common than previously estimated and may be as common as Alzheimer’s disease (AD) in younger onset dementia1,2. There is often delay in diagnosis because of the heterogeneity of presentation, and there is likely to be under diagnosis in older age groups.
Development of current nosology
FTD was first described by Arnold Pick in 1892. Onari and Spatz introduced the term Pick’s disease in 1926. The concept of Pick’s disease required the presence of Pick’s bodies (neuronal inclusion bodies) and Pick’s cells (swollen neurons) for diagnosis, differentiating it from AD. With increased understanding of focal atrophies of the brain, frontotemporal dementia became the preferred term, as neuropathological studies showed only a minority exhibiting Pick’s histology. Other terms that have been used are:
• progressive subcortical gliosis
• dementia of the frontal type
• frontal lobe dementia of the non Alzheimer’s type
• thalamic dementia
• dementia-disinhibition amyotrophy syndrome
• frontotemporal dementia with parkinsonism linked to chromosome17
• multisystem tauopathy
• dementia lacking distinctive histology
• frontotemporal lobar degeneration3
The constant change in nomenclature was driven by increasing neuropathological and genetic data. In the 1980s investigators from Lund in Sweden coined the term frontal lobe dementia of the non Alzheimer’s type, whilst another group in Manchester, England, framed the term dementia of frontal type for the same disease. In 1994 the Lund/Manchester groups agreed the term frontotemporal dementia and proposed a consensus statement for research diagnostic criteria for the disorder (Table 1)4.
Clinical characteristics
The usual age of onset is between 45 and 65 with the mean in the 50s5,6. The disease affects both sexes approximately equally with some studies showing slight male preponderance. Family history is positive in up to 50 per cent suggesting the importance of a genetic aetiology. Tau gene mutations account for the disease in 10-50 per cent of the families with FTD, leading to abnormal aggregation of the neuronal cytoskeletal tau protein. Tau mutations are linked to chromosome 17 and recently to other chromosomes, namely chromosome 3 and 97 . The median duration of illness from onset of symptoms to death is six to eight years, ranging from two years to 20 years8.
Patients with FTD present with two patterns: either as progressive change in behaviour, or with progressive language dysfunction. There is relative preservation of memory and visuospatial skills in the early stages, which helps in distinguishing from other forms of early onset dementia. The clinical presentation of frontotemporal lobar degeneration is variable and depends on the site and the degree of involvement of frontal lobes, anterior temporal lobes or both. In many cases asymmetric involvement of both lobes is noticeable on brain scan. Neary et al9 international consensus statement has classified three main subtypes:
1. FTD
2. semantic dementia (SD)
3. progressive non-fluent aphasia (PNFA).
Behavioural and personality change are usually the prominent presenting feature of this syndrome. Behavioural disturbances include disinhibition (including sexual disinhibition), apathy, blunted affect, lack of empathy, disregard for personal space, decline in personal care, rigidity, hyperorality, perseverative and repetitive behaviours, social inappropriateness and lack of insight10.
According to the clinical behavioural presentation, this group can be further divided into disinhibited form (FTD-D) and apathetic form (FTD-A). The disinhibited form is associated with pathological changes confined to orbitomedial frontal and anterior temporal regions, whereas in apathetic form pathology is extensive throughout the frontal lobes and the dorsolateral frontal cortex10,11.
Table 1. Diagnostic features of FTD
Table 1. Diagnostic features of FTD
A. Behavioural disorder:
· Insidious onset and slow progression
· Early loss of personal awareness (neglect of personal hygiene and grooming)
· Early loss of social awareness (lack of social tact, misdemeanours such as shoplifting)
· Early signs of disinhibition (such as unrestrained sexuality, violent behaviour, inappropriate jocularity, restless pacing)
· Mental rigidity and inflexibility
· Hyperorality (oral/dietary changes, overeating, food fads, excessive smoking and alcohol consumption, oral exploration of objects)
· Stereotyped and preservative behaviour (wandering, mannerisms such as clapping, singing, dancing, ritualistic preoccupation such as hoarding, toileting and dressing)
· Utilisation behaviour (unrestrained exploration of objects in the environment)
· Distractibility, impulsivity and impersistence
· Early loss of insight into the fact that the altered condition is due to a pathological change of own mental state
B. Affective symptoms:
· Depression, anxiety, excessive sentimentality, suicidal and fixed ideation, delusions
· Hypochondriasis, bizarre somatic preoccupation
· Emotional unconcern (emotional indifference and remoteness, lack of empathy and sympathy, apathy)
· Amimia (lack of facial expression)
C. Speech disorder:
· Progressive reduction of speech (aspontaneity and economy of utterance)
· Stereotypy of speech (repetition of limited repertoire of words, phrases, or themes)
· Echolalia and perseveration
· Late mutism
D. Spatial orientation and praxis preserved
E. Physical Signs
· Early primitive reflexes
· Early incontinence
· Late akinesia, rigidity, tremor
· Low and labile blood pressure
F. Investigations
· Normal EEG despite clinically evident dementia
· Brain imaging (Structural or functional, or both): predominant frontal or anterior temporal abnormality or both
· Neuropsychology: profound failure on ‘frontal lobe’ tests in the absence of severe amnesia, aphasia or perceptual spatial disorder.
Deficits in language and visual perception are the prominent clinical presentation. There is a progressive loss of semantic memory affecting naming, word comprehension and object recognition, accompanied by sensory impairment of non verbal sounds, tastes and smells. In the early stages, patients are aware of their diminishing expressive vocabulary and often present with word finding difficulties. Grammar and structure of the language seem intact with increased use of paraphrasias to cover the deficits12.
Neuropathologically, SD is associated with circumscribed degeneration of the anterior temporal lobes, with inferior and middle temporal gyri being predominantly affected.
In contrast to SD, PNFA is a disorder of expressive language. It is characterised by speech dysfluency, phonologic and grammatical errors, and word retrieval difficulties in the context of relative preservation of single word comprehension and non linguistic cognitive abilities. Other noticeable features are impaired repetition, reading and writing; and stuttering.
Clinically, in the early stages of disease the patients present with difficulty in phoneme discrimination, usually attributed to hearing problems. However, with the progression of the disease this leads to muteness and word deafness. Neuropsychological testing show non fluent aphasia in the absence of severe amnesia or perceptuospatial deficits13. Neuroimaging studies in PNFA have produced variable results, though focal pathology of the left insular region and frontal operculum is likely to be significant.
Table 2. Difference between FTD and AD
Frontotemporal dementia
Alzheimer’s dementia
Sex distribution
Increased prevalence in females
Duration of illness
6-8 years
5-9 years
Presenting symptom
Early change in personality and behavioural disturbance
Gradual memory loss with late personality change
Relative preservation in early stages with inconsistent and patchy memory loss
Gradually deteriorating pervasive memory loss
Activities of daily living
1. Tendency for stereotypical behaviour like wandering, usually able to find their way back
2. Relatively intact visuospatial and praxis skills
3. No Dysgraphia until late stages
1. Progressive difficulty in finding their way in unfamiliar and later familiar surroundings
2. Dyspraxias like dressing dyspraxia are common
3. Early difficulties in writing skills
Changes in appetite and food preferences
Variable and decreased appetite
Noticeable mood disturbance, with irritability, withdrawal and alexithymia. Absent guilt feelings and relative lack of judgement
Mood changes may not be prominent. Depressed mood is characterised by sadness tears, insomnia and guilt
Mood changes may not be prominent. Depressed mood is characterised by sadness, tears, insomnia and guilt
Generalised atrophy with increased atrophy of temporoparietal area
Perseveration during testing more pronounced, may exhibit apathy or disinhibition compromising ability to complete task
Can become anxious and overwhelmed and unable to complete tests
There is limited rational pharmacological treatment for FTD. In the absence of specific curative treatment the management include targeted symptomatic treatment for the patient and psychosocial support for the carers.
Unlike AD, comparative neurochemical studies in FTD have failed to find a deficiency of acetyl cholinesterase and choline acetyl transference in the temporal, frontal or parietal lobe. Hence anticholinesterase inhibitor drugs used in treatment of AD are not beneficial in FTD14. There is evidence of decreased serotonin binding both pre- and postsynaptically in the frontal, temporal lobes and the hypothalamus in patients with FTD. Selective serotonin reuptake inhibitor (SSRI) drugs seem to benefit behavioural symptoms like disinhibition, overeating, compulsions and depression implicating serotonin neurotransmission disturbance in FTD15. Antipsychotics and benzodiazepines have been used symptomatically for behavioural problems like agitation. These agents need to be used as an adjunct to behavioural and psychosocial interventions. Patients with FTD may be sensitive to the effects of neuroleptics, which have been reported to accelerate cognitive decline and even hasten death. Hence these medications should be used cautiously starting at a low dose under specialist supervision16.
There is theoretical evidence that FTD may be the end result of abnormalities of tau aggregation in the frontal lobes17. Specifically, overactivity of the enzyme glucose synthase kinase 3 (GSK-3), causing selective hyperphosphorylation of tau protein, has been postulated as aetiologically significant18. Lithium carbonate inhibits GSK-319 and trials are under way to see if lithium has clinical benefit in FTD patients, i.e. if this theoretical manipulation of brain neurochemistry provides clinical benefit.
Carers support
Patients with FTD frequently place excessive strain on the carers because of the distressing behavioural disturbances associated with the illness. Though there is not much evidence for improved outcome, it is likely that clear information on the nature of the illness and support available for carers can be helpful in managing patients, potentially delaying institutional care20. Behavioural disturbance such as aggression, disinhibition (especially sexual disinhibition) are particularly distressing for carers.
Individually tailored care plans based on psychosocial strategies with adequate risk management need to be formulated to reduce risk and ease carer strain. The constant demands, both physical and emotional, placed on the carer can be exhausting. Day centre/day hospital involvement and regular respite care can ease the burden. Patients and carers can also benefit greatly from support groups, such as the Pick’s disease support group. Speech therapy is an important component for both establishing the diagnosis, and management of SD and PNFA. Carers are usually grateful for the support of a speech therapist in understanding the nature of the language deficit and improving communication.
Diagnosing FTD is challenging because of the heterogeneity of presentation and overlap of clinical syndromes. Though there is no curative treatment, accurate diagnosis is important to predict the course and to provide correct information for the patients and carers, avoiding unnecessary drug treatment. It is also important for aiding and facilitating further clinical research. It is likely that genetic engineering and treatments for tauopathy targeted at GSK-3 will hold the greatest hope for future treatment interventions. |
Sylvia Plath Essay
Submitted By Jace-Clare
Words: 928
Pages: 4
Significant texts from any period arise from particular ways of thinking and possess an enduring relevance.
Throughout time, literature has had a profound effect on every society. Literature is inextricably linked to the values of the society, time and context in which period it was created.
Sylvia Plath’s Daddy and The Applicant is an embodiment of the 1950’s war paradigm. Her confessional style of poetry displays an intensified questioning of life with a strong sense of fatalism. Plath’s poetry subverts traditional conventions, criticising aspects of her society like the portrayal of women, gender ideals and traditional family. Focusing on Daddy and The Applicant, Plath explores these themes through countless techniques.
Sylvia Plath felt entrapped in society’s expectations of a perfect housewife that was drilled into the minds of men. The image of woman is generalized as a large breasted, fertile creature, mainly for the purpose of the male possessor. This image is the epitome of sexism, however at the time was seen as the only way women could behave. It was this stereotype that Plath struggled to reject. Plath’s poem, The Applicant expresses her realistic views on the way women are expected to serve their husband. In the poem, the women is referred to as “she” and once as “sweetie”, but mainly “it”. In calling the women ‘it’, her identity is lost and she is shown merely being an object. Throughout Daddy, Plath uses historical context to help portray how women are treated and exist in society in her time, which was represented as a minority group. In the poem, Daddy, Plath emphasised the central trauma of her life, the loss of her father, which deprived her of a traditional upbringing. She metaphorically described this feeling of oppression as being in a “black shoe”. This colour is symbolic of death and it is also the predominant colours of the ‘swastika’. She uses the simile of “I have lived like a foot” which further extends her feelings of being restricted. The main technique Plath uses in Daddy is the contextual imagery to emphasise on the portrayal of women. The imagery of weapons accentuates the idea of dangerous relations between the speaker and the subject, aligned with war. This is clearly evident in:
“The tongue stuck in my jaw.
It stuck in a barb wire snare”
She describes her experiences as “chuffing me off like a Jew”. This simile aligns her personal suffering with a global context of the 1950’s. Plath explores the portrayal of women through her poems by using established imagery.
Sylvia Plath’s struggle is extended due to traditional conventions in marriage and motherhood. After the Second World War, there was an attempt to return to traditional values. Plath uses reference to the atrocities of World War II to mirror her own emotional turmoil caused by these societal pressures in The Applicant and Daddy. She explores this theme heavily by inverting the traditional positive portrayal of marriage and motherhood, and instead portraying the exhausting and negative side. In The Applicant, Plath employs a sarcastic tone and a conversational style. The poem consists of many questions, to place the responder in the role of the applicant. The most powerful technique is depersonalisation to convey the submissiveness of the wife, as she is referred as “it”. Plath uses ironic humour to make a statement against the traditional family values society imposes. Plath also uses selective diction to invoke stark emotions within the reader, like “thumb shut”, “naked” and “black and stiff”.
The following quote:
“Naked as paper to start
But in twenty-five years |
Black Sticky Rice
Kba pnahiong: Black Rice is a type of sticky rice that is found in the hills of Meghalaya. The rice is black in colour that is aromatic, tasty and flavoursome. Communities in the state also use the colour attained from this rice to dye their handlooms. The rice is starchy and is high in carbohydrates, which is why people avoid eating this rice on a daily basis. In fact when consumed, the communities mix this rice together with normal rice to lower their intake and avoid medical problems. When consumed in large quantities, people have complained of chest pain and stomach spasms. It is sown in the month of February and harvested towards the end of the year, in October or November. |
CRISPR DNA Editing Technology - D200
From New Media Business Blog
Jump to: navigation, search
The colour of your eyes, the size of your feet, the pigment of your skin and every other physical trait you have is determined by your DNA (deoxyribonucleic acid)[1].
It’s made out of just 4 letters: A,T,C and G, but through the millions of different ways they can be strung together, they create all the diversity seen in life on our planet. Segments of DNA are called “genes” and each one plays a different role in building proteins, regulating body functions and determining your physical makeup. Mutations or mistakes in this genetic code of your DNA can also cause devastating diseases such as sickle cell anemia, Cystic fibrosis and muscular dystrophy.
Keeping that in mind, what do you think could be possible if we had access to this genetic code? Could we possibly make edits and deletions in this code that could fix mutations or even change the physical traits of an organism?
Enter CRISPR, the new gene-editing tool that is allowing scientists to accurately make changes to DNA faster, cheaper and more efficiently than ever before.
Explaining CRISPR
What is CRISPR
CRISPR[1]:,(pronounced “Crisper”) which stands for: Clustered Regularly Interspaced Short Palindromic Repeats, refers to the sequences of DNA used by the bacterial defense system which forms the basis of the CRISPR-Cas9 gene editing technology. These sequences contain pieces of viral DNA that have previously attacked the bacterium and are used to find and destroy any virus with similar genes. This process works by encoding a guide RNA which attaches to the Cas-9 protein and acts as molecular scissors to cut the identified piece of viral DNA. Through scientific advances, researchers have been able to harness this process to edit the genome of all kinds of organisms and cells. Giving them the ability to make changes and edits in DNA faster, cheaper and more accurate than ever before.
How CRISPR works
CRISPR in Action[3]
CRISPR uses a protein called CAS 9 to form a complex with a guide RNA to cut pieces of DNA like molecular scissors and either edit or delete parts of the genome.
This technique works in a 4 step process[4]:[5]:
1. The guide RNA is coded with a genetic address for where in the genome you want to edit and binds to the Cas-9 protein to make a complex.
2. CAS 9 uses the Guide RNA to attach to a matching DNA strand and find the target sequence of DNA.
3. Once the gene target has been matched, the Cas-9-RNA complex cuts the double strands of DNA.
4. Once the cut has been made, there are two possible paths the DNA will take to repair itself. If the cut was made to simply delete a gene, the DNA strand will reattach to itself without a replacement gene for the one that was lost. However, if the cut was made to edit the genome, a programmed piece of DNA can be inserted into where the cut was made and the DNA will repair itself with the new gene in place.
The History of CRISPR
The discovery of clustered DNA repeats in bacteria began in 1987[6] at Osaka University in Japan, by researcher Yoshizumi Ishino. While examining DNA of E.Coli, he realized these clustered repeats were part of the bacterial defense system of E.Coli and contained pieces of defeated virus DNA in order to stop future viral invasions.
Similar to hanging up most wanted posters, this viral DNA gave the Bacteria the ability to send out a guided defense mechanism, Cas-9 proteins, to specifically identify and destroy these viruses in future encounters.
In 2012[7], Dr. Jennifer Doudna and Dr. Emmanuelle Charpentier discovered that this could be a tool used to edit genes when they re-engineered the Cas-9 system to contain a coded guide RNA to target specific genes in order to make cuts and edits.
In 2013[8], George Church and Feng Zhang from MIT and the Broad Institute were able to use the CRISPR system to edit human cells for the first time. This lead to increased use in a variety of organisms and continued research as the potential of CRISPR had begun to be unlocked.
Applications of CRISPR
Due to CRISPR’s versatility to make edits on plant, human and animal cells, it has the potential to be used in a wide variety of ways. These uses range from healthcare to agriculture to potentially even human modification. Due to CRISPR’s extremely low cost, ease of use, accurate targeting, and speed, scientists believe this exciting new gene-editing tool may disrupt a number of industries as it develops.
Crispr 2.0
CRISPR and Designer Babies
A new discovery with within the CRISPR technology is the development of what scientists are calling CRISPR 2.0[1].
This advancement now allows CRISPR to make changes to the DNA without actually making any cuts or edits to the genome. Instead, CRISPR 2.0 essentially “Blunts” the scissors of the Cas-9 Protein so researchers can write programs that can simultaneously repress or activate certain genes in an organism’s genome.[2]
This can act as a dimmer switch for certain genes which could help to fight diseases or make mild changes without actually changing the genes.
The guide RNA is programmed to seek out specific genes in the liver by reversing the genetic code found in a target strand of DNA. Once it locates this target DNA sequence, the Cas9 enzyme effectively splits the double helix to allow the guide RNA to bind to the DNA. If it’s a good match, this portion of the helix is excised from DNA strand. Usually, the DNA strand tries to repair itself, at which point the CRISPR system does its thing again. This process is repeated until the DNA no longer repairs itself, at which point the targeted gene has effectively been turned off.
Scientists have begun using CRISPR-Cas9 to not just cut out sequences of DNA and replace them, but to instead edit the undesired genetic base itself without altering the entire strand. This highly specific form of gene editing using CRISPR is more efficient and solves a host of problems seen with original methods, mainly unintended mutations caused by off-target cuts.
CRISPR 2.0 in place of conventional CRISPR methods is akin to having one misspelt word in a paragraph, and rather than choosing to rewrite the entire paragraph and taking the risk of making an error elsewhere in the paragraph, you simply fix the misspelt word.
This enhanced process does not have universal gene editing application, as some edits will still require complete removal and replacement of sections of the genome. However, a condition such as Sickle Cell Anemia would greatly benefit from CRISPR 2.0. Sickle Cell Anemia is the result of a single incorrect base in a strand of DNA --- a T that should have been an A. Using CRISPR 2.0, the process of genetically correcting for this condition would be more efficient by not requiring the section of DNA to be completely replaced.
CRISPR and Agriculture
CRISPR for Healthy Seed Development
One of the most revolutionary applications of CRISPR on agriculture is its ability to make gene edits on vegetation.
Taking the evolutionary process of natural selection for example. In natural selection, species of plants that possess undesirable genes that make them more prone to diseases are wiped out, and the remaining variations of these plants with desirable genes continue to live and thrive. Over several growth cycles, more and more plants with undesirable characteristics will die out, leaving only the elite variations to continue thriving and its seeds to reproduce. This process will typically continue on until only the elite plants remain, however this process may naturally take multiple growth cycles and over 8 years to attain a desirable gene variation. This is where applications of CRISPR technology comes in.
With CRISPR’s gene editing ability, it has successfully been able to drastically reduce the time needed for natural selection to take place. With CRISPR, direct edits to the species’ genes can help reduce the time needed for natural selection from over 8 years and multiple growth cycles, to as little as 1 – 2 growth cycles and less than 5 years.
With CRISPR’s ability to directly edit the genes of plants and vegetation, it can help farmers grow healthier, more reliable crops. Also, with CRISPR’s ability to edit the genes of a species, crops will only be needed to be edited for 1 to 2 growth cycles until a favourable variation is produced and can reproduce on their own without the assistance of CRISPR. With this, one can see how quickly and drastically CRISPR can be utilized to revolutionize the entire agricultural industry.
The Controversy on Genetically Modified Organisms and Labelling
Although the ability to utilize CRISPR technology to speed up the process of growing healthier crops is an amazing breakthrough, it has also cause a lot of debate and controversy in the eyes of the public and in Non-GMO advocates. Currently, according to USA regulations, the US department of agriculture defines a Genetically Modified Organism as a product that has had foreign DNA inserted and integrated into an existing organism [2]. However, when using CRISPR, alterations to the vegetation are made without the introduction of foreign DNA as the DNA is simply edited or deleted to attain the desired results. This means that as per US regulations, a “CRISPR edited crop” would not fall under the usual GMO regulations, and may even be considered as “organic” if CRISPR edited products were made available on store shelves.
The controversy in this is that many consumers purposely go to stores that sell organic produce, and are willing to spend extra money to purchase an organic item, however, with the current regulation these consumers of organic produce may not really know if what they are buying is really organic or CRISPR edited. One of the reasons why CRISPR edited produce is not yet available on store shelves, is because the regulations of what is considered as “GMO” or “organic” has not been updated to reflect CRISPR edited products. [3] When CRISPR edited produce is ready to be pushed out and sold publically, this will certainly be one of the concerns that needs to be addressed.
CRISPR in Livestock
Aside from plants and crops, CRISPR can also be used to edit the genes of animals. Much like how CRISPR can be utilized to revolutionize the industry of plants and crops, it can also revolutionize the farming and livestock industry as well. With CRISPR, farmers can improve their current farming practices to become more humane.
Taking for example disease control in animals. One of the major impacts to the livestock and agricultural industry is that 1 in 10 farm animals die from diseases [4], but this can be prevented through CRISPR. Through research, scientists have been able to take the genetic makeup of a certain animal, find out the gene component that makes them immune to certain disease, and edit that onto other animals so that they also become immune to disease. [5]. A current success story can be seen through the prevention of disease in domestic pigs. Domestic pigs are usually prone to diseases like the African swine fever. However, scientists have been able to find out the gene that makes the warthog immune to this disease, and successfully apply it to domestic pigs so that they too become immune. [6] Scientists can then use this same technique to other farm animals by identifying which gene to edit or alter, an as a result, will increase the overall life expectancy of farm animals.
Improvements on Farming and Agriculture
Animals that have been modified[7]
The potential of CRISPR technology has already been successfully documented in many cases, especially in the farming and agricultural industries. The follow examples are some current success stories of how CRISPR technology is being used today.
CRISPR and Salmon
In November 2015, US regulations approved the first genetically altered salmon to be safe for human consumption. This salmon’s genes was altered to speed up its growth process from 3 years, to as little as 18 month to attain its full size. [8] With the salmon as an example for success and to be able to attain approval for safe consumption, it sets an example that through further research, the ability to speed up the growth process of other animals is attainable. Other livestock can utilize CRISPR through the same process.
CRISPR and Cattle Offspring
Aside from the improved efficiency in growth, another current application of CRISPR is that it can reduce the need to slaughter female cattle offspring. In current farming practices, female cattle offspring are culled shortly after birth because they produce less meat than male cattle, yet still take up unnecessary resources. [9] This practice can now be changed as a scientist from the University of California has successfully been able to utilize CRISPR to ensure only male cattle offspring are reproduced through edits in the chromosome.
CRISPR and the Egg Farming Industry
Currently in the the egg farming industry, male chicks are often culled shortly after hatching. This practice is similar to what farmers do to female cattle as, like female cattle, male chicks are useless and a waste of resources to their farming industry. Male chicks cannot lay eggs, so to save resources and space they are often culled very early on. [10] How CRISPR is improving this practice is that scientists have been able to successfully edit a gene in the chicken’s sex chromosome that causes male embryos to glow under ultraviolet light. With this new ability, farmers can now tell which eggs will become female chicks and which will be male, and instead of waiting for both to hatch, they can separate the male chicks and utilize them for other purposes.
CRISPR and the Transportation of Cattle
Cattle are naturally born with horns, and as they grow larger, these horns get in the way when the cattle needs to be packed and transported. To combat this issue, farmers traditionally burn, cut, or remove the horns of the fully grown cattle prior to transport. This process is both painful for the cattle, and dangerous for the farmer. [11] However, with CRISPR’s gene editing abilities, researchers have been able to identify the gene in the cattle that cause the growth of horns and switch them off. With this edit, the horns on cattle no longer grow, and since their genes are edited when they produce the next generation may also transfer these genes and eventually this inhumane practice of stripping cattle of their horns may be completely eliminated.
The Creation of “Super-Animals”
Genetically Modified Dogs
The abovementioned applications of CRISPR focuses more on its practical uses and how it can revolutionize the farming and agricultural industry. However, CRISPR also has been able to successfully create some questionable and controversial things. Take for example China’s utilization of CRISR to create “Super-dogs”. [1]
Elephant-Mammoth Hybrid[2]
CRISPR has also been used for many futuristic applications and studies. Currently a project that scientists are working on is the ability to utilize CRISPR technology to bring back extinct animals. Their current ambition is to be able to bring back the extinct wooly-mammoth.
To bring back the wooly-mammoth, scientists at Harvard plan to create a type of “hybrid-animal”, in which they can combine the genes that give a wooly-mammoth its furriness and the genes of certain existing elephants to create a new elephant-mammoth embryo. [3] With this combination of genes, the new mammoth will not truly be the same as the extinct wooly-mammoth, but it will share very similar characteristics and display many of the same features that the extinct animal had.
Although this is another revolutionary concept, it has again caused a lot of controversy as well as many ethical concerns. Many argue that although the concept of being able to bring back an extinct animal is interesting, they do not see the practicality of bringing that species back. These species died off for a reason, and bringing them back may drastically impact the current animal eco-systems in place. Furthermore, it is hard to predict how other animals will react to these new hybrid species, and if they were to be released into the wild and reproduced, then what may be the consequences.
Overall, de-extinction is a great concept, but until further research can be conducted to concretely explain any impacts or consequences, it will continue to be a discussion of controversy.
Medical Uses
CRISPR’s ability to remove, edit or turn specific genes on or off has incredible potential in the medical industry. Scientists around the world have already begun using the technology to first analyze disease-causing and/or mutated genes in cells and then removing or editing these abnormal genetic sequences. Trials have been completed, with promising initial results, on a wide variety of medical conditions. Majority of the testing [that has been made public] has been limited to human embryos and lab animals such as mice, while just a small number of trials, mainly in China, have been conducted on humans. The following section will focus on medical trials, the different processes being used and their results, and theoretical applications of the technology.
Genetic Diseases/Disorders
Muscular Dystrophy - CRISPR-Gold
In a new study, researchers demonstrated that their approach --- called CRISPR-Gold because gold nanoparticles are a key component --- can deliver Cas9 along with guide RNA and donor DNA directly into the cells of a living organism to fix a gene mutation without the use of viruses, as has been seen in conventional gene editing processes, including CRISPR. The study demonstrated that the technology can repair the mutation that causes Duchenne muscular dystrophy, a severe muscle-wasting disease [4].
CRISPR-Gold's gold nanoparticles coat the donor DNA and bind to Cas9. When injected into mice, the mice’s cells recognize a ‘marker’ in CRISPR-Gold and import the delivery vessel. Then, through a series of cellular mechanisms, the vessel is released and breaks apart, rapidly releasing Cas9 and donor DNA.
A single injection of CRISPR-Gold into muscle tissue of mice that model Duchenne muscular dystrophy restored 5.4 percent of the dystrophin gene, which causes the disease, to the normal sequence. This correction rate was approximately 18 times higher than in mice treated with Cas9 and donor DNA by themselves, which experienced only a 0.3 percent correction rate.<p/> <p>CRISPR-Gold is a significant improvement over previously published approaches that only removed the faulty part of the gene, making it shorter and converting one disease into another, milder disease.
CRISPR-Gold was also able to reduce tissue fibrosis, which is the hallmark of diseases where muscles do not function properly. It also enhanced strength and agility in mice with Duchenne muscular dystrophy. CRISPR-Gold-treated mice showed a 2x increase in a common test for mouse strength and agility.
The study found that CRISPR-Gold's delivery is safer than viral delivery of CRISPR, which can possibly amplify the side effects of Cas9 off-target cuts. When the research team tested CRISPR-Gold's gene-editing capability in mice, they found it efficiently corrected the DNA mutation that causes Duchenne muscular dystrophy, with minimal collateral DNA damage.
Hypertrophic Cardiomyopathy - Human Embryos
A team of scientists, lead by Shoukhrat Mitalipov, are the first-known group to use CRISPR–Cas9 gene editing to correct a disease-causing mutation in human embryos that were not destined for implantation. The United States does not allow federal money to be used for research involving human embryos, but the work is not illegal if it is funded by private donors [5].
The researchers targeted a mutation in a gene called MYBPC3, which causes the heart muscle to thicken. Such mutations cause a condition known as hypertrophic cardiomyopathy, which is a leading cause of death among young athletes.
Mitalipov’s team also tackled the risk of off-target mutations and the risk of generating mosaics. The researchers say that they have found no evidence of off-target genetic changes, and generated only a single mosaic in an experiment involving 58 embryos [6].
Mitalipov’s team took several steps to improve the safety of the technique. In conventional CRISPR-Cas9 gene editing, researchers will insert DNA encoding CRISPR components into cells, and then rely on the cell’s functioning to generate the necessary proteins and RNA. Mitalipov’s team instead injected the Cas9 protein itself, bound to its guide RNA, directly into the cells. This method is similar to that of CRISPR-Gold.
However, it should be noted that the error rate can vary depending on which DNA sequence is being targeted. The MYBPC3 mutation, in particular, was already predicted to produce relatively few opportunities for off-target cutting.
The researchers attempted to reduce the risk of mosaics by injecting the CRISPR–Cas9 components into the egg at the same time as they injected the sperm to fertilize it. This is earlier in development than previous human embryo editing experiments had tried [7].
Mosquito Gene Drive[8]
Though little is known yet of testing and/or results of CRISPR trials on altering or eliminating malaria, it is still an important and interesting notion to consider. One method that has the potential to be successful in this regard is reverse gene drives, which is the use of genetic editing to either remove genes from, or add them to, the germline [part of genome that gets passed on to successive generations]. Essentially, CRISPR technology would be used to analyze the DNA of malaria cells in the mosquito, and remove the mutated genes causing the disease from the germline. This would ensure that not only that specific mosquito no longer carries the disease, but its offspring would not either [9].
In theory, this seems promising. However, the problem with a proposition such as this, as is with many propositions related to germline editing, is the effects it has on not only the species in question, but the ecosystems that species is a part of. Though to the common person mosquitos may be insignificant, and probably a nuisance, they play a role in the ecosystems they live in just as any species does. As of yet, scientists do not know what the removal of malaria DNA would mean for the species of mosquitoes that carry it, as well as what the “ripple effect” would be for other plants and animals. If the removal of malaria cells or the alteration of its genetic structure has an adverse effect on the mosquito species, it could potentially result in significant impacts on organisms that depend on it as a food source, or on plants that rely on it for pollination [10].
Scientists remove HIV from mouse cells
Human Immunodeficiency Virus (HIV)
HIV has proven extremely challenging to analyze and control because of its ability to hide within human cells undetected for prolonged periods of time before the symptoms of AIDS become apparent. A recent trial conducted in the US using CRISPR, has produced promising results.
Right now patients with HIV must use a series of toxic medications to suppress the virus from replicating. However, researchers have found that HIV DNA can be removed from the genomes of living animals using CRISPR-Cas9 technology. Completely removing the HIV DNA eliminates the risk of the HIV infected cells from replicating and making copies of itself [1].
After just one treatment using CRISPR-Cas9, scientists were able to show the technique had successfully removed all traces of the infection within mouse organs and tissue. This trial is the first to show HIV can be completely eliminated from the body using CRISPR. Even more impressive is that one of the three total trials conducted was on mice implanted with human cells that contained the HIV virus, and the results were similarly successful [2].
The next stage would be to repeat the study in primates, a more suitable animal model where HIV infection induces AIDS, in order to further demonstrate the elimination of HIV-1 DNA in latently infected T-cells and other sanctuary sites for HIV-1, including brain cells. Eventually, should successive trials be successful, the goal is a clinical trial in human patients [3].
Chengdu CRISPR Human Cancer Trial
Scientists have begun using the technology to modify the immune cells in the body to better enable them to fight cancer and to alter cancer cells to reduce their aggressiveness and ability to rapidly replicate.
The first approach, improving the body’s defence against cancer, has seen scientists use CRISPR to genetically engineer immune cells, known as T-cells, to improve the cells’ cancer killing ability. The cells were modified in mice by using a CRISPR vessel to insert a gene into T-cells that express proteins called CARs on the cell surface. This protein enables cells to recognize and attack cancer cells.
Conventional gene editing techniques have used similar approaches, but in these cases the CAR protein is randomly inserted into a T-cell genome. CRISPR delivers a CAR gene to a precise location in the T-cell genome known as the TRAC region --- this region includes the gene that allows the immune cell to detect foreign molecules. The CRISPR system edits out part of the TRAC gene in the T-cells, allowing the CAR gene to insert there, enhancing the cell’s cancer locating ability [1]. In simpler terms, this is analogous to adding a scope (CAR gene) to a sniper rifle (TRAC region of T-cell).
The CAR T cells created with CRISPR were less likely to stop recognizing and attacking tumor cells after a certain time point, a phenomenon researchers call “exhaustion.” Based on three measures of exhaustion, less than 2% of CRISPR-created T cells showed signs of exhaustion, compared to roughly 50% of conventionally engineered CAR T cells [2].
The second approach focuses on editing fusion genes, which are often associated with cancer. A fusion gene is formed when two previously separate genes become joined together and produce an abnormal protein that can cause or promote cancer.
Researchers used CRISPR-Cas9 tech to target abnormal DNA sequences caused by the fusion. The team used Cas9 and guide RNA to cut out the mutated DNA of the fusion gene and replaced it with a gene that leads to the death of the cancer cells. Because the fusion gene is present only in cancer cells, not healthy ones, this form of gene therapy is highly specific to cancer cells [3].
These approaches hold significant advantages over traditional cancer treatment. They are less painful than chemotherapy and more importantly, pose less risk of causing additional mutations. A common problem in chemotherapies is that cancer cells can evolve to generate new mutations. Using CRISPR, the new mutations could also be targeted and controlled.
Concerns of Human Use
The main risks associated with using CRISPR-Cas9 technology on humans is the risk of off-target mutations, and what is known as mosaicism or mosaics.
Off-target mutations are the result of the Cas9 protein cutting in an unintended section of the genome and making unwanted genetic changes. Recent developments and improvements have been to the CRISPR system to either reduce or eliminate this risk [4].
Mosaics occur when embryos are injected with CRISPR but repairs to the mutated genes did not occur until the embryo had already divided and replicated its DNA. This causes a mixture of edited and unedited cells. Essentially, when the embryo divides, some cells inherited unrepaired DNA while some inherited CRISPR-repaired DNA. This is a significant problem, as it means a child could still develop the disease that gene editing was supposed to prevent [5]. As with off-target mutations, improvements have been made in the delivery process of CRISPR to reduce this risk.
"23 and Me" features [6]
23 and Me - Home Kits and Information Privacy
23andMe is a company that sells personal genome tests direct-to-consumer in the form of a saliva collection kit. Customers collect their own saliva in a tube from the kit, and mail it back for processing, Results are provided within 6-8 weeks offering estimates of predisposition for more than 90 traits and conditions ranging from baldness to blindness. 23andMe also recently got approval from the FDA to market Personal Genome Service Genetic Health Risk (GHR) tests for 10 diseases or conditions. These are the first direct-to-consumer tests authorized by the FDA that provide information on an individual’s genetic predisposition to certain medical diseases or conditions [7].
Theoretically, this process, used in tandem with CRISPR technology, could be groundbreaking in the medical industry. Customers could determine predispositions to various conditions or diseases, and have a lab, clinic or hospital [assuming CRISPR technology eventually becomes mainstream] apply CRISPR technology to eliminate or significantly reduce such exposure. The truly amazing thing is that this would cost someone as little as roughly $300.
One concern, which has already arisen with just the 23andMe process, is the privacy and security of customer information. As of now a customer’s genetic information is not sold or made public. However, what if this were to change --- how valuable would such information be to an insurance company, for instance? It seems logical that in such a case, the insurance company would pay an exorbitant amount for this info. Access to this information would potentially allow them to increase premiums for people predisposed to certain conditions.
The Future of CRISPR
In 2013, a patent war began between Professor Feng Zhang from the Broad Institute of MIT and Harvard and Professor Jennifer Doudna of the University of California (UC) Berkeley.
In June 2012, Doudna and her team published in the journal Science that they had discovered how CRISPR could be used to edit genomes. The paper suggested that it was both an “elegant and cheap” solution. Zhang published a paper in Science in January 2013 that showed CRISPR-Cas9 working on human cells,[8] something Doudna had not yet done. Later that month, Doudna and her team reported that her team also had success in working with human cells, however, Zhang quickly disputed that his approach was superior. In 2013, Doudna, backed by the University of California filed a patent for CRISPR. Seven months later, Zhang, backed by the Broad Institute, also filed for a patent but paid an additional fee to ‘accelerate’ the filing of the patent. It was announced that Zhang and the Broad Institute won the patent[9]. This was challenged by Doudna and UC, who took Zhang and the Broad Institute to court. As of the time of writing (December 2017) the patent is still being legally disputed by UC that the U.S. Patent Trial and Appeal Board wrongly sided with the Broad Institute.[10]
There currently exist three companies which may benefit when the CRISPR patent is finally awarded. The companies are Intellia Therapeutics (NASDAQ: NTLA) formed by Jennifer Doudna, CRISPR Therapeutics (NASDAQ: CRISPR) formed by Emmanuelle Charpentier, and Editas Medicine (NASDAQ: EDIT) formed by Feng Zhang. These companies are currently being publicly traded on the Nasdaq. When the CRISPR patent is awarded, the winner of the patent will be able to license the patent. While there is no exact indication of how much the patent will be worth, intellectual patent attorney at the New York Law School Jacob Sherkow estimated a value of between $100 million and $265 million for the patent.[11]
Human Modification
In the far future, CRISPR will allow humans to edit the DNA of in-vitro human embryos. This brings with it the obvious benefits of being able to edit out hereditarily transferred diseases. However, it also allows much more than just diseases. CRISPR will allow humans to change virtually any aspect of the genome, which can alter the physical appearance, physiological traits, and psychological traits of the baby. This modification of the embryo is known as creating a ‘designer baby’, whereby parents select all the traits they wish their child to possess. The movie Gattaca (1997) incorporates this mechanic of eugenics, as it features a world of both ‘valids’, modified humans, and ‘in-valids’, unmodified humans. This video (left) is a segment of the movie Gattaca where the traits for a designer baby are being selected by the parents.
Gattaca Designer Babies Scene
In the Gattaca world, ‘in-valids’ exist as a lower social class to ‘valids’, and are forced to work more menial jobs, and are not given the same life opportunities the ‘valids’ are[1][2]. This brings into question of how the world would react to designer babies. There are many societal concerns with bringing designer babies into the world, including how society will react to them. Being genetically superior to regular humans, will society see them as elite and be led by them, or will they be shunned for being unnatural? Additionally, being superior to unmodified humans, how would these designer babies compare with the rest of the world in terms of sports and academia,? Would there be a new type of Olympics just for modified humans, and would there be higher level educational institutes exclusively for them? While being able to completely vaccinate humankind against genetic diseases, and potentially non-hereditary diseases as well, would vastly improve quality of life, what are other consequences? The outcome of designer babies is unknown as of now, as they will be determined by both legislation and societal norms.
Super Soldiers
Another possible application of CRISPR that involves human modification is the creation of super soldiers. The concept of genetically superior super soldiers is prominent in pop culture, with Marvel’s X-Men and Captain America characters being the most notable. Super soldiers would be modified humans who are physically and mentally stronger than regular humans, and would be resistant to hostile environments, including types of chemical and biological warfare. While it is incredibly likely that super soldiers would be illegal in much of the world, they may be developed by organized crime groups to be sold on the black market or by a dictatorship to form an army. The concerns regarding super soldiers are countless, and include: how would they be controlled, what if they are unable to be controlled and disobey, what do they do if there is no war, what happens if they become a part of society, and what happens if they reproduce? While super soldiers are a very unlikely occurrence, their prominence in fiction makes it worth discussing the concept.
Anti and Reverse Aging
Humankind has always been fascinated with the concept of immortality, shown by attempts of alchemy throughout history, and the many myths that feature elixirs of life and fountains of youth. This concept was also featured in the novel Harry Potter and the Philosopher’s Stone (1997), whereby the philosopher's stone, an alchemical substance, would grant immortality. While CRISPR is unable to grant immortality, it is able to slow the ageing process down, and potentially reverse it. The gene responsible for aging has been identified by scientists. In 2016, researchers at the Salk Institute reversed the ageing process in mice, prolonging their life by on average 30%. [3] They also declared that human trials will be ready in approximately 10 years time. While the process of stopping and potentially reversing aging can greatly improve quality of life, it also brings issues with it. The primary concern being that with people living longer, will this push to exceed the carrying capacity of the planet? How will this increasing population be fed, and where will they live? These answers are currently unknown, but they may be solved using the help of CRISPR.
Editing of humans is an equivalent of opening pandora's box. Once it begins, it will be unstoppable, and inevitably become a part of society and culture. While humankind has always pushed for the next eureka moment, it is important to think of what are the consequences of what we are doing. In the movie Jurassic Park (1993) Dr. Ian Malcolm says “Your scientists were so preoccupied with whether or not they could, they didn’t stop to think if they should”[4]. This quote applies to not only human editing, but using CRISPR to edit DNA as a whole. Is there a benefit to what changes we make, or are we simply making changes in the name of scientific discovery? And regarding the changes that we do make, what impact will they have on science and society moving forward? These are important questions to keep in mind when changing how plants, animals, and people are fundamentally built.
The following the 2017 Gartner Hype Cycle for Emerging Technologies, which shows emerging technologies and their stage of development. CRISPR would fall under 'Human Augmentation', which is more than 10 years away. This shows that even though CRSPR is a technology that won't reach prominence until far in the future. Even though we are still years away from being able to fully utilize CRISPR, it is important to know about what it is, what it is capable of, and what the implications of it can be capable of.
Gartner Hype Cycle 2017[5]
Nolan Wallinger Harvey Sidhu Angus Wong Cameron Inglis
Beedie School of Business
Simon Fraser University
Burnaby, BC, Canada
Beedie School of Business
Simon Fraser University
Burnaby, BC, Canada
Beedie School of Business
Simon Fraser University
Burnaby, BC, Canada
Beedie School of Business
Simon Fraser University
Burnaby, BC, Canada
Personal tools |
Jul 17, 2008
Overview of De-facto States
Northern Cypriots are well versed in what it means to be a de-facto state seeking international recognition, but as Hendrik J. Owel explains, they are not alone.
Below is an article published by Cyprus Observer:
The Unrecognised Nations and Peoples Organisation (UNPO) organised a Conference of ‘de facto’ States in the European Parliament in Brussels on 15 May 2008. The main purpose of the conference was to bring together officials from the governments of unrecognised states with the aim of creating and sustaining a permanent mechanism of involvement and consolation of such state entities in the international arena. This would be for the benefit of not only the peoples of these ‘de facto’ states, but the international community at large.
The interested Turkish Cypriot reader may like to know a little more about some of these de facto states, as they are in more or less similar situations as the TRNC.
The Republic of Abkhazia
Abkhazia, is situated on the east banks of the Black Sea. It consists of 8,432 square kilometres and has a population of around 200,000 people, with more than 10% being Muslim. In Abkhazia today there live about 500 Turkish nationals, as about 500 peoples of Abkhaz decent live in the TRNC.
Abkhazia, originally a sovereign and independent principality, was conquered by Czarist Russia in 1864. After the Russian Revolution the Soviet Socialist Republic of Abkhazia was proclaimed and recognised by the Georgian Soviet Socialist Republic on 21 May 1921. Abkhazia became one of the founding states (Union Republics) of the Union of Soviet Socialist Republics (USSR) in 1924, among others like Georgia. In 1931 Stalin, a Georgian himself, demoted Abkhazia to become the Autonomous Soviet Socialist Republic of Georgia.
After the dissolution of the Soviet Union, Georgia adopted again the Constitution of the Georgian Democratic Republic of 1921, without Abkhazia. On 23 July 1992, the Supreme Soviet of Abkhazia adopted their Constitution of 1925, under which Abkhazia was a sovereign state and subject to international law. An Abkhazian government offer to restore the pre-1931 mutual treaty was declined by the Georgian government which replied on 14 August 1992 with an offensive against Abkhazia that signally failed. Negotiations between Georgia and Abkhazia have been ongoing since 1993 and have failed to resolve the difference between them, leaving relations frozen in a condition of neither war nor peace. Due to the premature recognition of the Republic of Georgia by the UN on 21 December 1991, within the boundaries of the Stalinist geography of the 1931 Georgian SSR, the Republic of Abkhazia is today another ‘de facto’ existing but non-recognised state. However, only recently the government of the Russian Federation took steps in connection to Abkhazia, which can be considered nothing other than an implied ‘de facto’ recognition of the Republic of Abkhazia.
Pridnestrovian Moldavian Republic
Another victim of the Stalinist geography is the Pridnestrovian Moldavian Republic (Pridnestrovskaia Moldavskaia Respublica), better known as Transdniestria. In the eighteenth century it was part of the Russian Empire, while Moldova at that time was a vassal-state of the Ottoman Empire. The international border was formed by the river Dniester.
In the aftermath of the Russian Revolution, Pridnestrovie formally became part of the Ukraine, a Union Republic of the Soviet Union. Moldova, in contrast was then part of Romania. In 1924, the territory of Pridnestrovie became part of the Moldovan Autonomous Soviet Socialist Republic. Meanwhile, Moldova stayed fully part of Romania and the river Dniester stayed as the international recognised border. Under the so-called Molotov-von Ribbentrop Pact, agreed by both Stalin’s and Hitler’s ministers of foreign affairs, the Moldovan part of Romania would be assigned to the Soviet Union, which invaded it in 1940 and annexed it to the above mentioned Moldovan Autonomous Soviet Socialist Republic, later to be became a Union Republic of the USSR.
On 2 September 1990, based on Article 3 of the 3 April 1990 USSR law regarding the procedure for a Soviet Republic to secede from the USSR (Register of the Congress of the People’s Deputies of the USSR and the Supreme Soviet of the USSR, 1990, issue No. 13, page 252), Pridnestrovie seceded in a completely legal way from the Moldovan Socialist Soviet Republic and from the Soviet Union, declaring independence as the Pridnestrovian Soviet Socialist Republic. It declared that the Molotov-von Ribbentrop Pact had been null and void from its very beginning. In August 1991 the country was renamed as Pridnestrovskaia Moldavskaia Respublica.
The former Romanian part of Moldova declared itself independent only one and a half year later, on 27 August 1991, declaring the Molotov-von Ribbentrop Pact null and void as well. By doing so, in fact neither the Republic of Moldova nor the Pridnestrovian Moldavian Republic laid eye to each other’s territory, or parts thereof, by recognising the existing border formed by the river Dniester before 1940 as their international border. Romanian is the national language of Moldova, while Russian is spoken in Pridnestrovie, which is sandwiched between Moldova and Ukraine and has a total area of 4,163 square kilometres. The population of 555,000 is made up of 35 different nationalities.
In 1992 the army of the Republic of Moldova made a failed attempt to occupy Pridnestrovie by force. Like in the case of Abkhazia, the international community recognised the Republic of Moldova within the Moldovan borders drawn up by Stalin, not taking into account the Soviet law on which Pridnestrovie had seceded from that Republic in Soviet times. Since 1994 the negotiations and relations between Pridnestrovie and Moldova can be compared to those between the Turkish Republic of Northern Cyprus and the Republic of Cyprus. There is free traffic of persons, but there is an embargo of goods against Pridnestrovie and although the capital Tiraspol has a suitable airport, the country has no international air traffic connections. Nevertheless, Pridnestrovie maintains trade relations with over 60 countries.
Republic of Somaliland
A third example, although of another kind, is the Republic of Somaliland, which is situated in the Horn of Africa, to the south of Djibouti, to the east of Ethiopia, and the north of Puntland. It was a part of the former Italian colony of Somalia. It has an area of 137,600 square kilometres and a population of about 3,500,000 who are Sunni Muslims.
Somaliland was under Imperial Ottoman rule for centuries until 1866 and under Egypt-Ottoman rule until 1884. From then on, it was a British colony until 26 June 1960, when it gained independence from Great Britain as the State of Somaliland.
The Italian colony Somalia became independent on 1 July 1960 as the Somali Democratic Republic. Under international pressure a small group of political leaders in Somaliland were persuaded to merge the country with Somalia. Neither Somaliland politicians nor those of Somalia consulted the people. Moreover, none of the parties signed an act of union. When in 1961 a referendum was held on the constitution of the two nations, the people of Somaliland rejected it by an overwhelming majority. The Somaliland parliament voted against the union as well and never ratified that constitution. Consequently, the union between the two former colonies was totally unlawful. When the people of Somaliland voted against the union their voice was not listened to. However, it was a clear signal to the south-dominated government in Mogadishu. The people of Somaliland were soon punished for their attitude as they became treated as second class citizens and were discriminated against.
After that Mohamed Siad Barre came to power after which the situation deteriorated. Somaliland political leaders were put in jail and, over the course of years; thousands of innocent civilians were killed. In the 1980s the people of this former Turkish and later British colony revolted against the oppressing regime of Siad Barre in Mogadishu. After a fierce fight for freedom, under the Somaliland National Movement, the cities of Hargeisa and Burao were completely destroyed by shelling and bombing by Siad Barre's forces. Siad Barre, by the end of the eighties, lost the ‘de facto’ control over Somaliland. In 1991, after the failure of Siad Barre and the collapse of the central government of Somalia in Mogadishu, a civil war broke that is going on today. Somaliland asserted its independence on 18 May 1991.
The reason of the non-recognition of the Republic of Somaliland lays not in instability. On the contrary it is a more stable, prosperous with a well-organised and democratic government, than many other countries in Africa. However, in 1963 the governments of the African countries agreed not to change the borders in Africa. On the other hand, Somaliland has been independent before that, like for example Montenegro. The reinstatement of the independence of the latter was recognised after some hesitancy by European governments. Thus it may be expected that in the long-run the Republic of Somaliland will be recognised as well. |
Alloy wheels have won the favor of more and more private car owners for their beautiful appearance, safety and comfort. For high-speed cars, the deformation of steel wheels and the high temperature generated by the brakes cause tire blowouts and reduced braking efficiency. It’s not uncommon. The thermal conductivity of aluminum alloy is three times larger than that of steel, iron, etc., and the heat dissipation effect is naturally much better, thus enhancing the braking efficiency, increasing the service life of tires and brake discs, and effectively ensuring the safe driving of the car. Nowadays, alloy wheels are often processed by alloy wheel cnc machine .
Product advantages of alloy wheels:
1.Improved driving comfort. Aluminum alloy wheels have the metal characteristics of absorbing vibration and rebound force. The alloy wheels are processed by alloy wheel cnc machine with high dimensional accuracy, high roundness, small yaw runout, and good balance, so that the car can drive smoothly and comfortably.
2.Drive normally and save fuel. Due to the weight of the replaced aluminum alloy wheels, the rotational inertia of the four wheels is reduced, the acceleration of the car is improved, and the energy requirement for braking is relatively reduced, thereby reducing fuel consumption.
3.Improved driving safety. The heat dissipation coefficient of aluminum alloy wheels is two to three times that of ordinary steel wheels. Coupled with the structural characteristics of aluminum alloy wheels, it is easy to dissipate the heat generated by tires and braking systems into the air. Medium. Even in the case of continuous braking during long-term driving, it can keep the wheel system at an appropriate temperature.
4.Improves the beauty of the whole vehicle. The appearance of aluminum alloy wheels is exquisitely designed and diversified in shape, which can achieve the integration of the wheels and show perfection. Improve the aesthetics of the whole vehicle.
5.Improved driving stability. Widened tires improve grip and braking performance, and effectively improve driving control and driving pleasure.
Leave a Reply
|
How To Be A Healthy Vegan
Vegan refers to a person whose lifestyle excludes animal products such as eggs, meat and dairy products. Veganism is a lifestyle that has many believers. These are people who do not use or eat products that are derived from animals. Vegans always make an effort not to consume or use animal products of any kind. Most vegans also exclude processed foods that are made using animal products.
These include foods, some wines and refined white sugar. Vegans also distance themselves from all products that have been tested on animals and also non food products derived from animals such as fur, leather and wool. A vegan diet consists of grains, legumes, beans, fruits and vegetables.
There are also vegan version of familiar foods such as vegan mayonnaise, vegan meats, cheese and ice cream. Even though it is not yet clear whether honey can be included into a vegan diet, it is good to avoid this kind of food if you are preparing a meal of a vegan.
There is a big difference between a vegan and a vegetarian. A vegan excludes any kind of animal product from his or her diet. A vegan will also not wear leather or any product made from animals such as silk and wool. Vegans believe that animals should not be exploited by man and when animals are commercialized it is inhumane and lack of respect for life.
On the other hand a vegetarian are people who do not eat meat, poultry or fish but can eat dairy products such as milk or yogurt, cheese and eggs. Being a vegetarian is not a lifestyle since there are various reasons behind being a vegetarian. For example we have vegetarians who do not eat meat due to health problems. In fact there are different categories of vegetarians.
We have lacto vegetarians; they exclude eggs but eat dairy products. Ovo vegetarian eat eggs but not dairy products and there are lacto ovo vegetarians who can eat both dairy products and eggs. Therefore being a vegetarian is based on personal beliefs and being a vegan a lifestyle.
Categorized as Home
Leave a comment
|
Shamanism, Hypnotism, And Altered States of Consciousness.
In the National Guild of Hypnotists training manual, the history of hypnosis is regarded as originating in ancient Egypt and Greece, though we now know that the use of altered states of consciousness goes considerably further back in time and culture, being used by ancient tribal shamans. (Of course, the methods and use of altered states of consciousness have changed over time.)
“Hypnotic trance,” says Bill O’Hanlon in A Guide To Trance Land, “is one form of altered state [of consciousness].” Such states, he says, share four characteristics: rhythm, defocusing attention, narrowly focused attention, and dissociation. Most peculiarly, perhaps, in regard to the first characteristic, he notes that “In shamanic ceremonies, altered states are often induced by rhythmic drumming.”
But what are altered states of consciousness for? Earlier in the modern era, we came to believe that rational thinking was all we needed. Of course, we do need to think rationally about things, but, we have now discovered, rational thinking is not enough. Rather, it has to work with other, natural ways of thinking, or other natural brain functions.
Great musicians, dancers, authors, artists, martial artists, poets, and even inventors and scientists have made significant use of daydreaming, imagination, intuition, and even relaxation. Notably, solutions to problem often appear in a flash of “inspiration” when we are not focusing on the problem and, most often, when we are relaxing.
Since the earliest times, human beings have have known that altered states of consciousness serve a purpose (or, really, purposes) for the human individual. Ancient shamans, among others, used these states of consciousness for healing. Artists have used them for inspiration. And religious devotees have used them for communication with the Divine. (We can still witness the ecstatic states that Evangelical Christians can reach in upbeat church services. But we can also think of medieval Christian mysticism, Buddhist and Hindu Tantra, Taoist “inner alchemy,” and Sufism, among other traditional.)
Noting the use of rhythm by shamans to put someone into a trance, O’Hanlon (who’s an Ericksonian hypnotherapist) rightly associates rhythm with the heartbeat. Although there is probably more to it, the heartbeat controls blood flow through the body and affects the individual’s mood, and vice versa. The heart also races when we are angry and slows when we are relaxed, for example. So there is a direct link between rhythm and consciousness.
While there’s no doubt that modern hypnosis has its earliest forerunners in Pharaonic Egypt, ancient Greece, and tribal shamanism, as the National Guild of Hypnotists training manual notes, it never quite disappeared. More intriguingly, in our technological age, ancient techniques and traditions are reemerging within the worlds of wellness and spirituality (including modern forms of shamanism).
As ancient people knew (and as we are rediscovering) the human being is holistic. We are more than a rationalizing brain and a body that doesn’t seem to want to go along with the brain’s rational thinking.
Undeniably, we move through different states of consciousness each and every day (sleep, daydreaming, imagining, intense focus, relaxation, and so on). They are part of us. And they are windows to our own true self, even our “genius,” which (with all of the competing pressures of life placed upon us today) can get lost or can be rationalized away.
Like the ancient tribal shaman, the job of the modern hypnotist is to enable the individual to experience their true self (the source of their creativity) again, so that they know what they are aiming for in life, have a clearer idea of how to get there, and feel empowered to takes the necessary steps towards it.
Results may vary from person to person. |
KY-018: Photoresistor module
Buy this Dealextream 37 sensors in a 1 kit
Photo resistors, also known as light dependent resistors (LDR), are light sensitive devices most often used to indicate the presence or absence of light, or to measure the light intensity. In the dark, their resistance is very high, sometimes up to 1MΩ, but when the LDR sensor is exposed to light, the resistance drops dramatically, even down to a few ohms, depending on the light intensity. LDRs have a sensitivity that varies with the wavelength of the light applied and are nonlinear devices. They are used in many applications but are sometimes made obsolete by other devices such as photodiodes and phototransistors. Some countries have banned LDRs made of lead or cadmium over environmental safety concerns.
Widely used in cameras, solar garden lights, lawn, detectors, clock, music, cups, gift boxes, miniNight light, light voice switches, lights automatically switch toys and a variety of light control, light control lighting, lamps and other light automatic opening OFF control field
according to the spectral characteristics of the photoresistor has three photoresistor: Ultraviolet photosensitive resistance, infrared light-sensitive resistors, Visible photosensitive resistance; The main parameters are as follows:
• dark current, dark resistance: photosensitive resistance at a certain applied voltage, when the light is not irradiated when the flowing Current is called dark current. Applied voltage and dark current ratio as the dark resistance;
• volt-ampere characteristic curve. Voltage characteristic curves are used to describe the resistance of the applied voltage and the photosensitive photocurrent relationship, On the photosensitive devices, the light current with applied voltage increases.
• temperature coefficient. Photoelectric effect photoresistor affected by temperature, at a low temperature portion photoresistor photoelectric Sensitive high sensitivity at high temperatures is low.
• rated power. Photosensitive resistor rated power is allowed for certain lines in the power consumed when the temperature rise High, its power consumption is reduced.
• Arduino A5 –> Module Signal (S)
• Arduino 5V –> Module +5V (Pin2)
• Arduino GND –> Module GND (-)
Example code
//KY018 Photo resistor module
void setup() {
pinMode(ledPin, OUTPUT);
void loop() {
sensorValue = analogRead(sensorPin);
digitalWrite(ledPin, HIGH);
digitalWrite(ledPin, LOW);
Serial.println(sensorValue, DEC);
The photoresistor just read the module’s output analog voltage value and print the value. If there is light the output voltage is high, with no light there is a low voltage. See serial monitor for values
More exaples |
Cassidese Glossary – Ballyhooly, Ballyhoo, Bally
The word ballyhooly has been in existence in English since at least 1837, when it was used in Tait’s Edinburgh Magazine in a story set in the West of Ireland. The word originally meant a riot, a commotion or a ruckus. It seems to derive from the village of Ballyhooly (Baile Átha hÚlla) near Fermoy in County Cork, which was famous for an incident where a riot broke out at mass in the year 1819 and several people were killed in the ensuing violence. Then in the year 1901, a word which seems to be a shortening of this, ballyhoo, was added to the American dictionaries, with the meanings of
1 : a noisy attention-getting demonstration or talk
2 : flamboyant, exaggerated, or sensational promotion or publicity
3 : excited commotion.
Later in the twentieth century, this was shortened further to the word Bally, which is a busking term for ‘to draw a crowd’.
Cassidy claims that bally comes from the Irish bailigh (the Irish for gather or collect) and that ballyhoo comes from bailiú, the verbal noun of bailigh. Cassidy does not mention ballyhooly, presumably because it cannot be explained in terms of the verb bailigh.
He also says that:
The Oxford Dictionary of Etymology defines ballyhoo as an American word meaning “publicity and blarney,” dating it to the 19th century and deriving it “from the name of a Central American wood, of which some schooners were made that were failures …” (ODEE, 1966, 71)
I do not possess a copy of the 1966 edition of the Oxford Dictionary of English Etymology but I am doubtful that this is a true reflection of what that book says. Certainly the modern Oxford Dictionaries make it clear that ballyhoo means publicity and is an American word of unknown origin, while ballahoo is a type of schooner from the Spanish ballahú. In other words, Cassidy seems to be misrepresenting the ODEE to imply that professional lexicographers are foolish, out-of-touch people who lack common sense and believe the unbelievable.
Cassidy’s claim of a link with bailigh is unlikely but not impossible. As is usually the case where claims in Cassidy’s book have any credibility at all, it did not originate with Cassidy. The link between ballyhoo and bailiú was first posited by Loretto Todd in her book Green English, published in 1999, nearly a decade before Cassidy’s book was published.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Alex Randall
“If we relocate during the summer, we’d need a lot of barges to move everything …The thought of moving our village is very sad because Shishmaref is the place where I grew up. Shishmaref is a great place to live because everyone knows each other. If we move, it would probably bring our community closer together. It could be totally opposite though because some people might just move to a new place. If we move, it won’t be the same because it wouldn’t be the Shishmaref that everyone knows.”
Allison “Anisaaluk” Nayokpuk, Shismaref, Alaska
“About five years ago the sea ice used to take longer to melt. It lasted about 10 months but now it’s only 8 months. This harms our way of life, our way of hunting, our way of fishing, and our way of traveling from one place to another.”
Charlie Nakqashuk, Pangnirtung, Nunavut
Like many nomadic people, indigenous groups in the arctic have used mobility as a way of adapting to changing circumstances. Climate change must therefore be seen as one factor among many which changes the patterns of movement among indigenous Arctic peoples.
Over the last half century there has been a general decrease in the mobility of indigenous Arctic people. One cause of this has been the desire of central governments to provide services such as health and education, which, the governments have argued, required nomadic people to settle into small town and villages. This sedenterization has not always been voluntary and there are examples of forced settlement from across the Arctic region, especially in the Russian far north. Forced movement as well as settlement has also taken place. The primary example being Canada’s resettlement of many Arctic people to the far North of the country. Many claim this was politically motivated and was a way of the Canadian government reasserting sovereignty over the area at the high of the Cold War. Another major trend has been the out-migration of young people in search of work and education in other locations.
Therefore changes in mobility linked to climate change must be seen in the context of these other significant factors. None-the-less climate change has recently become an important and emerging force shaping the movement of people in the Arctic region. Climate change has impacted the mobility of indigenous Arctic peoples in a number of ways. Changes in habitat caused by climate change are altering the way in which people forage and hunt. Changing weather patterns are also changing the usual range of herd animals, forcing people to move with them in order continue hunting. With thinner winter ice, crossing rivers and lakes becomes harder or impossible. Traditional routes of movement for mobile hunters are therefore changing or disappearing.
Many Arctic communities depend on barges for their supplies. Increased numbers of storms and the melting of a layer of protective sea ice has caused many barge landing sites to become unusable due to erosion. In a number of cases this has forced people to find new barge sites. However, in one notable case the disappearance of barge sites and other coastal erosion has left the village of Newtok facing relocation.
Climate change may also result in new industry and actively in Arctic regions, which will have implications for the movement of people. As ice thins and melts new opportunities for fossil fuel extraction and mining emerge. This could mean that Arctic people move in order to find work in these new operations, and that people from other areas will increasingly move into the Arctic. However it is unclear what impact these new operations will have on the culture, health and well-being of indigenous people. As a statement from the Indigenous Peoples Global Summit on Climate Change put it “any economic advantage that might trickle down to the Inuit cannot compensate for the hugely negative effects of climate change on their health and well-being”.
Further, the fact that the melting Arctic has created the opportunity for more fossil fuel extraction is deeply and tragically ironic.
Moving Stories is a new series of blog posts that use the voices of real people to explain the relationship between migration and climate change across the world. For this story we are grateful for the help of the Many Strong Voices project who conducted the original interviews and Beth Ferris as the Brookings LSE project on Internal Displacement for her recent work on migration and Indigenous people in the Arctic region.
Subscribe To Our Newsletter
You have successfully signed up
Share This |
Paper towel texture
Paper towel textures are a popular item among India’s upper middle class.
In fact, this is the first time the category has been added to the country’s official list of categories of goods.
The country’s textile and garment industry is in the midst of a revival, as is its food and beverage industry, with the government also trying to boost exports and boost job creation.
But while the country has made strides in reducing pollution, it has also become a haven for some people to get around the rules on personal hygiene.
And many people have become increasingly aware of the potential hazards of getting caught in the hands of these paper towels.
For the past several years, several states and districts have been cracking down on paper towels in various ways.
A new law is under way in Uttar Pradesh, which has been trying to curb the spread of the paper towels by restricting the sale of towels in public spaces and mandating a three-day washing-up period for all towels sold in shops.
In Bihar, the state government has banned the sale and distribution of towels at places where there are children.
In Odisha, the government is also trying its hand at curbing the spread.
And the new law in Bihar will only apply to small businesses and the poor.
The Centre has been encouraging the state to do away with the requirement that the towels be washed in a public place, which it says can lead to more health hazards for people who do not have access to a toilet.
But the health risks associated with this may outweigh the benefits.””
The main aim of the Bihar ban is to remove barriers for people to be able to wash their hands.
Even with these restrictions, paper towels are still widely used in the country.
In Bihar, for example, about 30% of the population uses paper towels, while about 12% use them for personal hygiene, said Pandey.
“The biggest reason for this is that they can be washed by people in a very short period of time, and because it is soft, it is not harmful to people,” said Panday.
“But, once it is wet, it can be extremely hazardous to people, especially children, who may be exposed to the bacteria and pathogens that the paper towel can carry.
This could lead to an increased risk of serious diseases like diarrhoea, urinary tract infections and even death.”
A paper towel in a shop in New Delhi.
Source: AFP|Getty ImagesWhile paper towels have always been a big seller in India, the introduction of the new rules in Bihar has given them a much wider appeal.
In an attempt to stem the spread, the Bihar government has been cracking them down on the roadsides and public places where people are allowed to wash them.
People can be fined if they do not wash them in public, and anyone caught wearing a towel without washing it will be fined.
There are also rules that prevent people from touching paper towels and those caught using them in any way.
“There are laws that say people are not allowed to touch paper towels on the streets.
But in Bihar, even people that are allowed can get caught if they touch them,” said Keshav Jain, the chief minister of Uttar Pradesh.
“It’s a big deal.
It is a matter of public health and safety.
And the government should be looking at these things as well.”
Some people are also using the paper to decorate their homes.
In Delhi, for instance, the city has banned any use of paper towels to decorates homes, shops or restaurants.
In Delhi, a woman is seen wearing a paper towel as she looks at a display of traditional clothes in the city.
The city has also banned the use of any kind of paper towel outside a home, in shops, restaurants, stores or any other place where people may be present.
“It’s the most common kind of material that we use in our homes.
It has a soft texture.
It’s soft enough for people like you to put it on a blanket,” said a man wearing a traditional cloth robe outside a hotel in New Dehli.
“If people can wash their paper towels properly, the paper would be cleaner, and people would not get dirty,” he added.
But, some people are still willing to try to get away with their actions.
“I have been washing my hands for years.
My son was going to a school and a few people were going to wash.
I thought I was doing right by him,” said Nandita Das, a mother of two in Delhi.
“I was doing my duty to the society and it was my duty as a mother to clean up after my children.”
Das has made it her life mission to avoid using paper towels at |
Quantum Zeno effect
The quantum Zeno effect (also known as the Turing paradox) is a feature of quantum-mechanical systems allowing a particle's time evolution to be arrested by measuring it frequently enough with respect to some chosen measurement setting.[1]
Sometimes this effect is interpreted as "a system cannot change while you are watching it".[2] One can "freeze" the evolution of the system by measuring it frequently enough in its known initial state. The meaning of the term has since expanded, leading to a more technical definition, in which time evolution can be suppressed not only by measurement: the quantum Zeno effect is the suppression of unitary time evolution in quantum systems provided by a variety of sources: measurement, interactions with the environment, stochastic fields, among other factors.[3] As an outgrowth of study of the quantum Zeno effect, it has become clear that applying a series of sufficiently strong and fast pulses with appropriate symmetry can also decouple a system from its decohering environment.[4]
The name comes from Zeno's arrow paradox, which states that because an arrow in flight is not seen to move during any single instant, it cannot possibly be moving at all.[note 1] The first rigorous and general derivation of the quantum Zeno effect was presented in 1974 by Degasperis, Fonda, and Ghirardi,[5] although it had previously been described by Alan Turing.[6] The comparison with Zeno's paradox is due to a 1977 article by George Sudarshan and Baidyanath Misra.[1]
According to the reduction postulate, each measurement causes the wavefunction to collapse to an eigenstate of the measurement basis. In the context of this effect, an observation can simply be the absorption of a particle, without the need of an observer in any conventional sense. However, there is controversy over the interpretation of the effect, sometimes referred to as the "measurement problem" in traversing the interface between microscopic and macroscopic objects.[7][8]
Another crucial problem related to the effect is strictly connected to the time–energy indeterminacy relation (part of the indeterminacy principle). If one wants to make the measurement process more and more frequent, one has to correspondingly decrease the time duration of the measurement itself. But the request that the measurement last only a very short time implies that the energy spread of the state in which reduction occurs becomes increasingly large. However, the deviations from the exponential decay law for small times is crucially related to the inverse of the energy spread, so that the region in which the deviations are appreciable shrinks when one makes the measurement process duration shorter and shorter. An explicit evaluation of these two competing requests shows that it is inappropriate, without taking into account this basic fact, to deal with the actual occurrence and emergence of Zeno's effect.[9]
Closely related (and sometimes not distinguished from the quantum Zeno effect) is the watchdog effect, in which the time evolution of a system is affected by its continuous coupling to the environment.[10][11][12][13]
Unstable quantum systems are predicted to exhibit a short-time deviation from the exponential decay law.[14][15] This universal phenomenon has led to the prediction that frequent measurements during this nonexponential period could inhibit decay of the system, one form of the quantum Zeno effect. Subsequently, it was predicted that measurements applied more slowly could also enhance decay rates, a phenomenon known as the quantum anti-Zeno effect.[16]
In quantum mechanics, the interaction mentioned is called "measurement" because its result can be interpreted in terms of classical mechanics. Frequent measurement prohibits the transition. It can be a transition of a particle from one half-space to another (which could be used for an atomic mirror in an atomic nanoscope[17]) as in the time-of-arrival problem,[18][19] a transition of a photon in a waveguide from one mode to another, and it can be a transition of an atom from one quantum state to another. It can be a transition from the subspace without decoherent loss of a qubit to a state with a qubit lost in a quantum computer.[20][21] In this sense, for the qubit correction, it is sufficient to determine whether the decoherence has already occurred or not. All these can be considered as applications of the Zeno effect.[22] By its nature, the effect appears only in systems with distinguishable quantum states, and hence is inapplicable to classical phenomena and macroscopic bodies.
The mathematician Robin Gandy recalled Turing's formulation of the quantum Zeno effect in a letter to fellow mathematician Max Newman, shortly after Turing's death:
— Quoted by Andrew Hodges in Mathematical Logic, R. O. Gandy and C. E. M. Yates, eds. (Elsevier, 2001), p. 267.
As a result of Turing's suggestion, the quantum Zeno effect is also sometimes known as the Turing paradox. The idea is implicit in the early work of John von Neumann on the mathematical foundations of quantum mechanics, and in particular the rule sometimes called the reduction postulate.[23] It was later shown that the quantum Zeno effect of a single system is equivalent to the indetermination of the quantum state of a single system.[24][25][26]
Various realizations and general definitionEdit
In order to cover all of these phenomena (including the original effect of suppression of quantum decay), the Zeno effect can be defined as a class of phenomena in which some transition is suppressed by an interaction – one that allows the interpretation of the resulting state in the terms 'transition did not yet happen' and 'transition has already occurred', or 'The proposition that the evolution of a quantum system is halted' if the state of the system is continuously measured by a macroscopic device to check whether the system is still in its initial state.[32]
Periodic measurement of a quantum systemEdit
Consider a system in a state , which is the eigenstate of some measurement operator. Say the system under free time evolution will decay with a certain probability into state . If measurements are made periodically, with some finite interval between each one, at each measurement, the wave function collapses to an eigenstate of the measurement operator. Between the measurements, the system evolves away from this eigenstate into a superposition state of the states and . When the superposition state is measured, it will again collapse, either back into state as in the first measurement, or away into state . However, its probability of collapsing into state after a very short amount of time is proportional to , since probabilities are proportional to squared amplitudes, and amplitudes behave linearly. Thus, in the limit of a large number of short intervals, with a measurement at the end of every interval, the probability of making the transition to goes to zero.
Experiments and discussionEdit
In 1989, David J. Wineland and his group at NIST[33] observed the quantum Zeno effect for a two-level atomic system that was interrogated during its evolution. Approximately 5,000 9Be+ ions were stored in a cylindrical Penning trap and laser-cooled to below 250 mK. A resonant RF pulse was applied, which, if applied alone, would cause the entire ground-state population to migrate into an excited state. After the pulse was applied, the ions were monitored for photons emitted due to relaxation. The ion trap was then regularly "measured" by applying a sequence of ultraviolet pulses during the RF pulse. As expected, the ultraviolet pulses suppressed the evolution of the system into the excited state. The results were in good agreement with theoretical models. A recent review describes subsequent work in this area.[34]
In 2001, Mark G. Raizen and his group at the University of Texas at Austin observed the quantum Zeno effect for an unstable quantum system,[35] as originally proposed by Sudarshan and Misra.[1] They also observed an anti-Zeno effect. Ultracold sodium atoms were trapped in an accelerating optical lattice, and the loss due to tunneling was measured. The evolution was interrupted by reducing the acceleration, thereby stopping quantum tunneling. The group observed suppression or enhancement of the decay rate, depending on the regime of measurement.
In 2015, Mukund Vengalattore and his group at Cornell University demonstrated a quantum Zeno effect as the modulation of the rate of quantum tunnelling in an ultracold lattice gas by the intensity of light used to image the atoms.[36]
The quantum Zeno effect is used in commercial atomic magnetometers and naturally by birds' magnetic compass sensory mechanism (magnetoreception).[37]
It is still an open question how closely one can approach the limit of an infinite number of interrogations due to the Heisenberg uncertainty involved in shorter measurement times. It has been shown, however, that measurements performed at a finite frequency can yield arbitrarily strong Zeno effects.[38] In 2006, Streed et al. at MIT observed the dependence of the Zeno effect on measurement pulse characteristics.[39]
It was shown that the quantum Zeno effect persists in the many-worlds and relative-states interpretations of quantum mechanics.[42]
See alsoEdit
3. ^ Nakanishi, T.; Yamane, K.; Kitano, M. (2001). "Absorption-free optical control of spin systems: the quantum Zeno effect in optical pumping". Physical Review A. 65 (1): 013404. arXiv:quant-ph/0103034. Bibcode:2002PhRvA..65a3404N. doi:10.1103/PhysRevA.65.013404. S2CID 56052019.
4. ^ Facchi, P.; Lidar, D. A.; Pascazio, S. (2004). "Unification of dynamical decoupling and the quantum Zeno effect". Physical Review A. 69 (3): 032314. arXiv:quant-ph/0303132. Bibcode:2004PhRvA..69c2314F. doi:10.1103/PhysRevA.69.032314. S2CID 38253718.
5. ^ Degasperis, A.; Fonda, L.; Ghirardi, G. C. (1974). "Does the lifetime of an unstable system depend on the measuring apparatus?". Il Nuovo Cimento A. 21 (3): 471–484. Bibcode:1974NCimA..21..471D. doi:10.1007/BF02731351. S2CID 120279111.
6. ^ Hofstadter, D. (2004). Teuscher, C. (ed.). Alan Turing: Life and Legacy of a Great Thinker. Springer. p. 54. ISBN 978-3-540-20020-8.
8. ^ Facchi, P.; Pascazio, S. (2002). "Quantum Zeno subspaces". Physical Review Letters. 89 (8): 080401. arXiv:quant-ph/0201115. Bibcode:2002PhRvL..89h0401F. doi:10.1103/PhysRevLett.89.080401. PMID 12190448. S2CID 29178016.
10. ^ Kraus, K. (1981-08-01). "Measuring processes in quantum mechanics I. Continuous observation and the watchdog effect". Foundations of Physics. 11 (7–8): 547–576. Bibcode:1981FoPh...11..547K. doi:10.1007/bf00726936. ISSN 0015-9018. S2CID 121902392.
11. ^ Belavkin, V.; Staszewski, P. (1992). "Nondemolition observation of a free quantum particle". Phys. Rev. A. 45 (3): 1347–1356. arXiv:quant-ph/0512138. Bibcode:1992PhRvA..45.1347B. doi:10.1103/PhysRevA.45.1347. PMID 9907114. S2CID 14637898.
13. ^ Auletta, G. (2000). Foundations and Interpretation of Quantum Mechanics. World Scientific. p. 341. ISBN 978-981-02-4614-3.
15. ^ Raizen, M. G.; Wilkinson, S. R.; Bharucha, C. F.; Fischer, M. C.; Madison, K. W.; Morrow, P. R.; Niu, Q.; Sundaram, B. (1997). "Experimental evidence for non-exponential decay in quantum tunnelling" (PDF). Nature. 387 (6633): 575. Bibcode:1997Natur.387..575W. doi:10.1038/42418. S2CID 4246387. Archived from the original (PDF) on 2010-03-31.
16. ^ Chaudhry, Adam Zaman (2016-07-13). "A general framework for the Quantum Zeno and anti-Zeno effects". Scientific Reports. 6 (1): 29497. arXiv:1604.06561. Bibcode:2016NatSR...629497C. doi:10.1038/srep29497. ISSN 2045-2322. PMC 4942788. PMID 27405268.
18. ^ Allcock, J. (1969). "The time of arrival in quantum mechanics I. Formal considerations". Annals of Physics. 53 (2): 253–285. Bibcode:1969AnPhy..53..253A. doi:10.1016/0003-4916(69)90251-6.
19. ^ Echanobe, J.; Del Campo, A.; Muga, J. G. (2008). "Disclosing hidden information in the quantum Zeno effect: Pulsed measurement of the quantum time of arrival". Physical Review A. 77 (3): 032112. arXiv:0712.0670. Bibcode:2008PhRvA..77c2112E. doi:10.1103/PhysRevA.77.032112. S2CID 118335567.
22. ^ Franson, J.; Jacobs, B.; Pittman, T. (2006). "Quantum computing using single photons and the Zeno effect". Physical Review A. 70 (6): 062302. arXiv:quant-ph/0408097. Bibcode:2004PhRvA..70f2302F. doi:10.1103/PhysRevA.70.062302. S2CID 119071343.
23. ^ von Neumann, J. (1932). Mathematische Grundlagen der Quantenmechanik. Springer. Chapter V.2. ISBN 978-3-540-59207-5. See also von Neumann, J. (1955). Mathematical Foundations of Quantum Mechanics. Princeton University Press. p. 366. ISBN 978-0-691-02893-4.); Menskey, M. B. (2000). Quantum Measurements and Decoherence. Springer. §4.1.1, pp. 315 ff. ISBN 978-0-7923-6227-2.; Wunderlich, C.; Balzer, C. (2003). Bederson, B.; Walther, H. (eds.). Quantum Measurements and New Concepts for Experiments with Trapped Ions. Advances in Atomic, Molecular, and Optical Physics. 49. Academic Press. p. 315. ISBN 978-0-12-003849-7.
25. ^ O. Alter and Y. Yamamoto (October 1996). "The quantum Zeno effect of a single system is equivalent to the indetermination of the quantum state of a single system" (PDF). In F. De Martini, G. Denardo and Y. Shih (ed.). Quantum Interferometry. Wiley-VCH. pp. 539–544.
26. ^ O. Alter and Y. Yamamoto (2001). Quantum Measurement of a Single System (PDF). Wiley-Interscience. doi:10.1002/9783527617128. ISBN 9780471283089. Slides. Archived from the original (PDF) on 2014-02-03.
27. ^ Mielnik, B. (1994). "The screen problem". Foundations of Physics. 24 (8): 1113–1129. Bibcode:1994FoPh...24.1113M. doi:10.1007/BF02057859. S2CID 121708226.
32. ^ Panov, A. D. (2001). "Quantum Zeno effect in spontaneous decay with distant detector". Physics Letters A. 281 (1): 9. arXiv:quant-ph/0101031. Bibcode:2001PhLA..281....9P. doi:10.1016/S0375-9601(01)00094-9. S2CID 18357530.
33. ^ Itano, W.; Heinzen, D.; Bollinger, J.; Wineland, D. (1990). "Quantum Zeno effect" (PDF). Physical Review A. 41 (5): 2295–2300. Bibcode:1990PhRvA..41.2295I. doi:10.1103/PhysRevA.41.2295. PMID 9903355. Archived from the original (PDF) on 2004-07-20.
35. ^ Fischer, M.; Gutiérrez-Medina, B.; Raizen, M. (2001). "Observation of the Quantum Zeno and Anti-Zeno Effects in an Unstable System". Physical Review Letters. 87 (4): 040402. arXiv:quant-ph/0104035. Bibcode:2001PhRvL..87d0402F. doi:10.1103/PhysRevLett.87.040402. PMID 11461604. S2CID 11178428.
36. ^ Patil, Y. S.; Chakram, S.; Vengalattore, M. (2015). "Measurement-Induced Localization of an Ultracold Lattice Gas". Physical Review Letters. 115 (14): 140402. arXiv:1411.2678. Bibcode:2015PhRvL.115n0402P. doi:10.1103/PhysRevLett.115.140402. ISSN 0031-9007. PMID 26551797.
38. ^ Layden, D.; Martin-Martinez, E.; Kempf, A. (2015). "Perfect Zeno-like effect through imperfect measurements at a finite frequency". Physical Review A. 91 (2): 022106. arXiv:1410.3826. Bibcode:2015PhRvA..91b2106L. doi:10.1103/PhysRevA.91.022106. S2CID 119628035.
External linksEdit
• Zeno.qcl A computer program written in QCL which demonstrates the Quantum Zeno effect |
How can e-learning reform the traditional education system?
traditional education system
E-learning is revolutionizing the traditional educational eco-system
What is traditional learning?
Traditional learning refers to any form of instruction that utilizes classic paper and pencil methods in a regular classroom setting. In short, traditional refers to any kind of learning that involves methods that are typically implemented in any school. This can include typical lecture-style instruction, assignments and exams, and homework for students, classic teaching pedagogy and training for teachers, the use of assigned textbooks and other course material, and an in-person instruction system. Traditional learning is what most students today continue to be familiar with. While subjects, textbooks, and some teaching styles may vary most of the elements described above will be present.
What is e-learning?
Broadly speaking e-learning refers to any sort of instruction that is communicated electronically, usually over the internet. Think of any sort of educational content you might have consumed on platforms like YouTube or other streaming sites or online courses taken through a university or even virtual classrooms where students and teachers sign in remotely – all these would count as examples of e-learning. With the increasing ubiquity and rapid spread of technology, e-learning is an inevitable evolution of the educational ecosystem. It may be something as small as the use of electronic materials or something as huge as massive online open courses that allow anyone, anywhere and at any time to sign up to learn something new. E-learning is increasingly becoming a feature in classrooms across schools and colleges in the world due to the many benefits it transfers to all stakeholders in the educational ecosystem.
• One Time Setup Cost
Many schools and colleges hesitate to invest in the e-learning education system since they feel that the cost of such an endeavor would be too high to bear. This is largely because of a change in infrastructure. While schools and colleges are used to investing in items such as pens and paper, desks and benches, blackboards and classrooms, it makes sense that the setup costs for an entirely new system of learning have to be carefully tallied against the school or college’s budget. However, with most e-learning education system methods or tools, the cost is primarily in the setup, which is then mitigated over time due to how much it is used. This means that the cost is a one time cost – an investment into the future, where the returns on such an investment are plentiful.
• Increases Inclusivity for Stakeholders
The e-learning education system may seem very modern and cutting edge since it makes use of the latest technology in the educational ecosystem. However, this does not mean that it is out of reach of the common man or exclusionary in any way. In fact, with the growth in low-cost technology and the proliferation of internet connectivity and internet-enabled devices in even the most remote parts of the world, e-learning education system looks increasingly implementable in the present day and age. This is especially important for marginalized communities that ordinarily do not have access, infrastructure or the necessary funding to build and sustain traditional education systems. E-learning makes it possible for anyone with an internet connection and an internet-enabled device to be able to sign into a classroom, which is revolutionary for learners who are often ignored or excluded from traditional systems of learning.
• Easy to Scale Up
• Technology Embracing
• Lowered Overheads and Labor Cost
Conclusion: Can e-learning replace traditional education systems?
As we move into the future, it is likely that educators and management will continue to take advantage of the many benefits of e-learning systems. However, some classic traditional education system practices will remain. Rather than creating a false dichotomy where one is forced to choose between a traditional education system and e-learning it is more likely that a new form of systemic learning will emerge that is a blend of the two. We are already seeing this in practice – with virtual classrooms becoming a reality thanks to tools like Uzity learning management system that allows for a seamless experience, for teachers to reach students in remote parts of the world, and even students gaining access to universities, instructors and courses they would ordinarily not have access to through massive online open courses through services like Coursera. So while it is unlikely that the traditional education system will ever be completely eradicated, it will continue to evolve to be inclusive of new forms of technology and learning, via the e-learning education system.
Share Button
How useful was this post?
Click on a star to rate it!
Average rating 3.3 / 5. Vote count: 3
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post? |
How Laparoscopy Helps Infertility
Please follow and like us:
Laparoscopy refers to the technique or method by which surgical procedures access the body cavities without making large cuts in the body. The method is a form of minimal access surgery that has increased in popularity in recent times for most thoracic and abdominal operations. This method is also being used in an increasing number of other surgical procedures and medical conditions. One of those medical conditions is infertility, and laparoscopy plays an essential role in different cases and conditions.
Let’s look at four cases or conditions where laparoscopy can be used to treat infertility.
Lysis of adhesions
Scar tissue in the uterus can be a problem for women trying to conceive. Adhesion lysis is a procedure in which scar tissue is removed in the uterus or outside the uterus in the abdominal cavity. This procedure is best done with minimally invasive techniques such as laparoscopic surgery or hysteroscopy. Performing laparoscopy helps reduce the risk of additional adhesions that will form after resection. It will also help increase fertility chances in the future and prevent further complications from uterine adhesions.
Endometriosis treatment
Endometriosis is a condition in which endometrial tissue (the inner lining of the uterus grows outside the uterus. This abnormal growth can cause severe pain, heavy periods, and sometimes can also lead to infertility. This extra tissue can cause scarring and swelling. creating a hostile environment for eggs and sperm to survive. This tissue can destroy the ovaries, cause adhesions to the tube. Minimally invasive laparoscopy for infertility can help in a situation like this by cauterizing, laser, or removing lesions. caused by endometriosis.
Ovarian cystectomy
A cystectomy is a process that removes cysts from one or both of a woman’s ovaries. It is a minimally invasive laparoscopy procedure. Ovarian cysts can disrupt ovulation and cause mechanical compressors to the tubes. A doctor may suggest removing overgrown cysts. In some cases, the doctor may also suggest an ultrasound-guided needle procedure to drain the cyst. Unlike other treatments, minimally invasive laparoscopic surgery is a much better option, as it only requires a small incision, less pain, and eliminates cysts while keeping the ovaries and surrounding muscles intact
This procedure helps to remove fibroids from the uterus. Uterine fibroids are noncancerous growths that form during a woman’s childbirth years. Due to fibroids, one experiences severe pelvic pain and irregular periods. Also, fibroids can cause blockage in the uterus, which can cause more complications during conception. Under such conditions, it can be difficult for an embryo to implant in the uterus. The myomectomy procedure can be performed with minimally invasive laparoscopic surgery for infertility. This can reduce the risk of scar tissue, heavy blood loss, and other complications with delivery that usually occur in open surgeries.
The above four cases are excellent examples of how minimally invasive procedures can help in medical conditions. Laparoscopic surgery is an excellent option for women who have trouble conceiving and want to avoid more complications from major surgeries.
Follow Us
Please follow and like us:
Add Your Comment
WhatsApp chat |
• IASbaba
• September 16, 2015
• 6
Print Friendly, PDF & Email
Geography TLP: Day 14 synopsis
3. What do you understand by an El Nino year? Also explain the mechanism of its occurrence. How does it affect the Indian subcontinent? (25 marks)
Directives: A very simple and direct question. It needed proper use of diagrams and examples. A good representative diagram for your reference:
geo 14
Effects: Generally, El Nino and the Indian Monsoon rains are inversely related. Trade winds coming from South America normally blow westward towards Asia during Southwest Monsoon. Warming of the Pacific Ocean results in weakening of these winds. Therefore, moisture and heat content gets limited and results in reduction and uneven distribution of rainfall across the Indian sub-continent.
Does El Nino always lead to droughts in India?
All El Nino years do not lead to drought in India. The year 1997-98 is a stark
reminder as it was a strong El Nino year but that did not cause drought in India, in fact, rainfall was in excess. On the other hand, a moderate El Nino in 2002 resulted in one of the worst droughts.
Going by historical data, about 90% of all evolving El Nino years have led to below normal rainfall and 65% of evolving El Nino years have brought droughts. t is thus clear that El Nino years adversely affect the weather in India in terms of Monsoon rain, with very few exceptions. During an El Nino year, the rainfall is generally below the normal average, which has its negative bearing on crop production.
4. Recently, there have been substantial developments in the field of monsoon prediction in India. Discuss these developments and also enumerate the variables that are taken into account for predicting the monsoons. (25 marks)
Directives: This question was asked directly from the following source:
5. Divide India into climatic regions following the classification technique of Thornthwaite. Also represent the regions on an outline map of India. (15 marks)
Directives: Do not and we repeat do not waste your time in reading these concepts as the cost benefit ratio of these topics is not rewarding with examination points of view. Just go through the basics and be prepared to write few lines if asked in compulsory questions. Our aim of posting this questions was to tell you this important mantra. Nevertheless, we present you a redundant map for this redundant question:
geo 15
Geography TLP: Day 15 synopsis
3. Explain the concept of drought. What are its different types? On an outline map of India, show the drought affected regions. Enumerate various drought proofing strategies. (25 marks)
Directives: Go through these comprehensive articles on droughts:
4. In an urban area, the precipitation pattern varies greatly from that of rural areas. Why? Also explain the phenomena of fog and photochemical smog in an urban area. (15 marks)
Directives: Go through this comprehensive article, beyond which you hardly need anything:
5. Write a note on the applications of climatology. (15 marks)
Directives: In questions like these, you have to apply all that you have read in the syllabus. You won’t find too many resources for such issues. What you need to do is to integrate the concepts learnt in climatology and examine its applications in other parts of the syllabus that include:
1. Drought and flood proofing
2. Urban planning
3. GIS
4. Agriculture
5. Industries
6. Resources
7. Transportation
8. Tourism
9. Protection of biodiversity
10. Ecological balance and sustainable development etc
Search now..... |
What Is a Cryptocurrency?
Cryptocurrency or cryptocurrency (Saxon cryptocurrency) is a virtual currency that is used to exchange goods and services through electronic trading systems without any intermediaries. The first cryptocurrency to start trading was Bitcoin in 2009, and many other functions have appeared since then, including Litecoin, Ripple, Dogecoin and other functions.
what is the benefit?
When comparing cryptocurrency with the money in the ticket, the difference is:
They are decentralized: they are not controlled by banks, governments and any financial institutions
Anonymous: Your privacy will be preserved when making transactions
They are international: everyone’s opera is with them
They are safe: your coin is yours and no one else is using it. It is kept in your personal wallet with only non-transferable codes that you know
It has no intermediaries: transactions are carried out from person to person
Fast transaction: Remitting money to another country where they charge interest usually takes a few days to confirm; using cryptocurrency only takes a few minutes.
Irreversible transaction.
Bitcoin and any other virtual currency can be exchanged for any world currency
It cannot be forged because they have been encrypted using a complex cryptographic system
Unlike currency, the value of electronic money is subject to the oldest market rule: the relationship between supply and demand. He said: “Currently, its value is more than $1,000. Just like stocks, this value may fluctuate.
What is the origin of Bitcoin?
Bitcoin is the first cryptocurrency created by Satoshi Nakamoto in 2009. He decided to introduce a new currency.
Its characteristic is that you can only perform operations within the network.
Bitcoin refers to currency and protocol, and the red P2P on which it relies.
So, what is Bitcoin?
Bitcoin is a virtual intangible currency. In other words, you cannot touch any of its forms like coins or banknotes, but you can use it as the same payment method as these coins or banknotes.
In some countries/regions, you can use electronic debit card pages and cryptocurrencies such as XAPO for currency exchange to make a profit. For example, in Argentina, we have more than 200 Bitcoin terminals.
There is no doubt that what makes Bitcoin different from traditional currencies and other virtual payment methods (such as Amazon coins, action coins) is decentralization. Bitcoin is not controlled by any country or private government, institution or financial entity (such as the Euro) controlled by the Central Government or the Federal Reserve Bank of the United States.
In Bitcoin control, real users conduct transactions indirectly through transactions P2P (peer-to-peer or peer-to-peer). This structure and lack of control make it impossible for any institution to manipulate its value or cause inflation by producing more quantities. Its production and value are based on the law of supply and demand. Another interesting detail in Bitcoin is the limit of 21 million coins, which will be reached in 2030.
How much is Bitcoin worth?
As we have already pointed out, the value of Bitcoin is based on supply and demand and is calculated using an algorithm that can measure transaction volume and transaction volume with Bitcoin in real time. Currently, the price of Bitcoin is $9,300 (as of March 11, 2018), although this value is not that stable, and Bitcoin is classified as the most volatile currency in the foreign exchange market. |
Support for LAist comes from
We Explain L.A.
Stay Connected
Share This
The Battle Of Los Angeles: 75 Years Ago, L.A. Mistakenly Thought It Was Under Attack
LAist relies on your reader support, not paywalls.
In the early morning hours of February 25, 1942, the sound of air raid sirens blanketed Los Angeles. The city had grown used to drills and enforced blackouts since the Japanese attack on Pearl Harbor, which had happened just three months earlier. However, on this night, the sirens were not a drill.
"It was a night when everyone’s fears apparently were realized—Japan had brought the war to mainland America, and Los Angeles was the target.…," columnist Jack Smith recounted for the Los Angeles Times in 1992. "The Great Air Raid began at 2:25 a.m. on that clear moonlit night when the U.S. Army announced the approach of hostile aircraft, and the city’s air raid warning system went into action for the first time in the war."
The city was on edge. Two nights earlier, on February 23, a Japanese submarine had surfaced on the California coast just north of Santa Barbara and shelled an oil rig at Ellwood. And not a week prior, on February 19, President Roosevelt had signed Executive Order 9066, which paved the way for Japanese-American internment. Now, reports of unidentified objects on radar screens had tipped the U.S. Army that Japanese warplanes were closing in on Los Angeles.
Then, around 3:06 a.m., a balloon carrying a red flare was floated above Santa Monica, and the firing began. Over 1,400 anti-aircraft shells and countless rounds of machine gun fire were shot into the sky. According to the San Francisco Museum, “the air over Los Angeles erupted like a volcano.” But, when the smoke had finally settled, the Battle of Los Angeles (as the Associated Press was already calling it by November) was little more than a false alarm.
Support for LAist comes from
"Although no bombs were dropped, the city did not escape its baptism of fire without casualties, including five fatalities," Smith continued for the Times. "Three residents were killed in automobile accidents as cars dashed wildly about in the blackout. Two others died of heart attacks. ...There was scattered structural damage caused by anti-aircraft shells that failed to explode in air but did so when they struck the ground, demolishing a garage here, a patio there, and blowing out a tire on a parked automobile."
So, what the hell happened?
On February 26, The Los Angeles Times demanded an explanation for "the considerable public excitement and confusion" and the "spectacular official accompaniments" that occurred the previous morning.
The Secretary of the Navy chalked up the episode to "a case of the jitters", something the New York Times repeated on February 28: "If the batteries were firing on nothing at all, as Secretary Knox implies, it is a sign of expensive incompetence and jitters."
Support for LAist comes from
According to the L.A. Times:
The Secretary of War tried to save face by saying that while there were no enemy aircraft in the air, it was believed that 15 commercial planes flown by “enemy agents” had crossed the city. Though no one believed this gross canard, most agreed with the secretary that “it is better to be too alert than not alert enough. At war’s end, an Army document explained what had happened: (1) numerous weather balloons had been released over the area that night. They carried lights for tracking purposes, and these “lighted balloons” were mistaken for enemy aircraft; (2) shell bursts illuminated by searchlights were mistaken by ground crews for enemy aircraft.
While the Battle of Los Angeles may be relegated, today, to the footnotes of history, the "false alarm" was recast in a humorous light for Steven Spielberg's 1979 film 1941, and conspiracy theorists continue to cite the unidentified objects detected by radar as evidence of UFO visitation.
In an interview with MSNBC, UFO researcher Jose Escamilla said:
"What happened at two in the morning, some objects entered into our airspace," Escamilla began. "One of them hovered right over Santa Monica and Culver City. Some described it as a round, dome-shaped object that was about a hundred feet in diameter. Some of them said it was a little smaller. But, the unique thing about it is, the military - the army started firing at this thing for about an hour, hour and a half, but they could not bring the object down."
The UFO website Saturday Night Uforia said that, "In the end, the only thing that can be safely stated is that if there was something up there then what was then called in war parlance an 'unidentified aerial target' was the first modern, well-reported incident of what is now known as an 'unidentified flying object', or 'UFO.'"
Support for LAist comes from
|
How can i help my child hold a pencil correctly,potty training not pooping for days quotes,puppy training classes edinburgh - Plans On 2016
Learning to write as a child is not too difficult a task for most children, who daily practice the directions below.
Children can easily learn to write well by using Charlotte Masona€™s principles as a guide with a bit of Montessori sprinkled in for flavor.
With three handwriting lessons per day, we refine fine motor coordination and gain fine motor strength. Proceed to the next stroke or letter only after each one has been executed perfectly several times. After another lesson with a completely different feel, assign the following 20 minutea€?coverta€? handwriting lesson with Insets (below). Analyzing the movements which are connected with writing, Montessori designed a didactic apparatus or game to teach the rudiments of handwriting to children in a fun way.
To include this beautiful activity in your homeschool, you will minimally needA Metal Insets, Metal Insets Stand, Paper for Metal Insets, Metal Insets Tracing Tray, colored pencils, and a shelf to keep them on. With the square frame, a piece of colored paper, and two different colored pencils, Mother sits beside the child at the table. In accordance with the a€?touch it once principle, the child is instructed put work away when done.
Insets can be used by all children in the family 3 and up after given a demonstration by Mother. Increasing Pressure: a) Half dark and half light-Trace inset as before and demonstrate how strong pressure produces a strong mark and a light pressure produces a light mark.
Three Contrasting Figures: Choose three different insets and three different colored pencils. Designing: Use lead pencils or fine tipped pen for tracing and several colored pencils to fill in with straight, wavy, or zig-zag lines.
More ideas: make a my shapes booklet, cut out the shapes with scissors, or punch the outline with a push pin and press out. 2.With three handwriting lessons per day, we refine fine motor coordination and gain fine motor strength. 5.Proceed to the next stroke or letter only after each one has been executed perfectly several times. 8.After another lesson with a completely different feel, assign the following 20 minutea€?coverta€? handwriting lesson with Insets (below). Vatican's chief exorcist has claimed that practicing yoga and reading 'Harry Potter' brings evil. An artist can have no greater resource than the ability to manipulate her own image; not even talent itself can outrank this skill in making a career. In the beginning, before I was famous, I started by going to cocktail parties and talking up the new artist, Heddie Alexander. A Back then, no one had seen my work yet, but everyone was dying to see it, because somewhere, someone (they couldna€™t remember who) had told them how extraordinary the paintings were. August 31st, 1997 a€” it was our friend Raquela€™s 40th birthday, and there was a blowout planned at the Black Gallery.
Just minutes later, I arrived at Gramercy Park to find Gus flat on his rear, brushing off scuffed hands and wrists. One of our gallery friends called to say shea€™d seen Thom through the window of a Williams-Sonoma store and that hea€™d cut the outside edge of his right eyeball with a steak knife, looking at her all the while. I went outside and plopped down on the fire escape with a bottle of red wine and a cigarette.
Then, I dona€™t know why, but after everything Thoma€™s poor body had already been through that night, even though he was standing in front of me clearly injured, with blood running from his eye down his cheek, and even though he had surely lost his wits hours before and had very little comprehension of what was going on, I got up, and I shoved him as hard as I could a€” both of my hands flat against his collar bone a€” with such force that I knocked him down onto a chair. Then I called a cab while he sat stunned in the chair, dripping in the wine that had spilled on him when hea€™d fallen back. Fifteen of Thoma€™s paintings sold during the two months he was at Sunnyside, and I learned that although insanity is interesting as a concept, it is tedious on a day-to-day basis. I tried, on several occasions, to talk to the doctors about having Thom and Sid separated, but they always said Sid was no real threat to Thom and that the two had gotten used to each other and were better off than with new roommates.
They said management was about to re-carpet the hallways, and there would already be too much confusion for the patients, who did not like change. After the first month, Thoma€™s recovery seemed about as likely as Woody Allen deciding to move out to the country and buy some horses. He turned the picture around to face me, and he pointed with his pencil to the man in the picture.
Therea€™d also been a recent rollover with the staff, and a new nurse had misread Sida€™s charts and was giving him the wrong dosage of an anti-psychotic medication. Sometimes those of us who are almost crazy need someone who is fully crazy to make ourselves sane again. The question “Is my child ready for kindergarten?” may have crossed your mind more than once if you have a four- or five-year-old child. Handwriting or penmanship, as it was called in my childhood, is as important today as it was in the days before word processors. If you didna€™t ask for perfection from the start, begin now before the child gets one minute older. Sweetly delightful Miss Homfray claims Maria Montessori as a dear friend and was directly taught by MM in the old days. Perhaps once a week while listening to the terma€™s composer or while Mother is reading aloud, have a time of inset art. Use watercolor paints to fill in the shapes, practicing all the different watercolor techniques. The latter two are wonderful for those with fine motor difficulties as are all the Metal Inset variations. Perhaps once a week while listening to the terma€™s composer or while Mother is reading aloud, have a time of inset art.A There are many variations upon the theme that inspire creativity. November 27, 2011 - London Vatican's chief exorcist has claimed that practicing yoga and reading 'Harry Potter' brings evil.
He went to graduate school at Boston College, became a social worker, got married, raised four children, got elected to the Clinton Board of Selectmen and over the past years, has watched three wars unfold on his television screen. Had I taken my arguments against the existence of Santa Claus, substituted the words a€?Judeo-Christian God,a€? and published them under a pseudonym, Ia€™d have been hailed as the next great philosopher of my parentsa€™ generation. You can solicit attention of any sort, or, with a lack of eye contact and a slight slouch of the shoulders, you can fade into oblivion. It was this knowledge and the ability to exploit it that allowed me to build my reputation. Even after I was famous, I could walk down a crowded street without notice, whereas before I was famous I could already command the attention of an entire room. The paintings could have been crap, and people would have rationalized sense and beauty into them.
Raquel was not only firmly entrenched in the art circles of New York; she was also elegance incarnate a€” everything about her was long a€” from the sleek, auburn hair that hung halfway down her back, to the pale, slender wrists she bangled more often than not. Our neighbor Gus, the cellist, had been leaving the Indian film theater at Lex and 23rd when hea€™d seen Thom circling around and around the black iron gates of Gramercy Park.
He said hea€™d gotten my phone number from our super because Thom had threatened him with a lawsuit. Hea€™d been a victim of cult abuse as a child and periodically suffered from the notion that Thom or some other patient, nurse or doctor was an emissary of Satan. I was on the verge of trying to move Thom to a different facility when a minor miracle occurred a€” the head of the hospital brought in a specialist named Dr.
Stein was an art aficionado, a psychoanalyst, and the author of three books on the artistic psyche. Stein at his home office, he said his goal was to help Thom learn to control the reigns of his passion and steer it in healthy directions. Stein said that Thom needed to act out steering the reins of his passion in order for the metaphor to have a lasting impact. This had been going on for about two weeks, and by the time Halloween evening came around, Sid had determined that Thom was actually not just an emissary of Satan but Satan himself. It is almost criminal neglect to allow our home schooled children to skip this important step. Using AlphaPhonics or How to Tutor, you teach reading, writing, and spelling in just a few minute per day.
While reading aloud from a chapter book or history spine, the child might use insets, keeping their bodies occupied and brains alert.
Similar to stencils, Montessori Metal Insets help the child acquire proficiency in using a writing instrument, including lightness of touch, evenness of pressure, continuity of line, control of line, and familiarity with curves and angles found in letters. If they are out all the time, they will invite the child to use them more, thus building dexterity needed for hand writing.A Montessori OutletA offers a beautiful set for a great price. With a colored pencil, mother draws around the shape starting in the upper right hand corner of the frame and holding the frame steady with the left hand. Before introducing the next stages a)lines far apart, b) lines progressively closer together, c)completely filled in, each stage of Exercises should be done well.
Father Gabriel Amorth, who has carried out more than 70,000 exorcisms in the past 25 years after being appointed by the late Pope John Paul II, surprised delegates at a conference by revealing his dislike for yoga and 'Harry Potter'. Dziokonski, who was a Navy corpsman assigned to a Marine Corps rifle company in Vietnam and a recipient of two Purple Hearts and a Bronze Star with a Combat "V," considers himself a strong man, a self-described curmudgeon. But instead I was destined to spend the first eighteen years of my life perfecting the dark art of suburban mediocrity. Even in the beginning, I could hold my shoulders back, meet the world face to face, and radiate a certain importance that made anyone nearby take note. The groundwork was laida€”Heddie Alexander was a stara€”the new darling of New Yorka€™s artistic circles before her first exhibit. Rarely did he sleep, so rarely in fact that his mind, deprived of the regular opportunity to dream, began to seize its dreams where it could. Thom, on the other hand, was ever shifting, always mixing, endlessly creating new shades of self.
The best artists of New York a€” painters, sculptors, and photographers a€” would be showing portraits of Raquel at this opening. Gus later said it had seemed as if Thom believed his left foot was no longer a part of his living body.
By the time she got inside, Thom had vanished, and there were little drops of blood on the table next to the knife display. My stomach felt like there was a forest fire raging in it, and I was so nervous I couldna€™t swallow properly and kept choking on my own spit. I saw the old man he would become a€” eating Jell-O, taking his pills from the nurse, watching re-runs of Miami Vice with the other patients, and arguing over chess moves with his psychotic roommate Sid. And, of course, Thoma€™s recently acquired tendency to quote Yeats didna€™t help the matter at all. On a piece of paper, he began to draw a picture of a man driving an old-fashioned carriage. The hair color alone a€” dirty blonde on a Jewish psychologist a€” was disconcerting enough. Adults should not write like six-year-old children, although Ia€™ve seen the writing of some children that puts some adults to shame. When she asked for my advice, I shared Charlotte Masona€™s counsel and my Montessori addition to it and adaptation of it. Todaya€™s young people and many in middle age cannot write legibly because of this a€?progressivea€™ idea. Please, continue until the timer goes off.a€? Never, ever allow yourself the luxury of becoming frustrated or angry with the child.
Metal insets offer a great variety of possibilities, and thus sustains the childa€™s interest.
Preschoolers are in a different developmental stage.A See the six part Montessori series on the Year 0 page for more details. So when he found himself at the top of a mountain crying over a dead butterfly, he knew he needed help. Born into the wrong neighborhood, born in the wrong time, loaded into the wrong stroller day after day, I learned the survival tactics of conformity, but, secretly, I wanted the blueprints back.
I painted them over a stark white background, and my career was sealed a€“ New Yorkers were adding red to their homes so they could display my paintings. This shift from important to inconspicuous and back I could accomplish with no outwardly discernible change in my demeanor.
A complete original.a€? I played the nondescript intellectual, making myself seem prominent enough that people would respect my opinion but not so prominent that they would ask my name. If I could just be loved by the art critics in New York I would finally be real, because artists, I had always thought, lived at a higher pitch and a greater volume than the rest of usa€”theirs were lives of intensity, lives filled with such pathos and beauty that they must, somehow, be more real than the rest of ours. It was a surreal and phantasmagoric existence Thom liveda€”the kind where bums digging through the trash might represent some universal truth about environmental awareness, or a dog limping across a street would have a message from Thoma€™s dead father. Just when wea€™d ridden one as far as it could take us, another would come and lift us up again. For awhile there seemed to be a stable center, but somehow, over time, that stability just slipped away, and there was no real Thom left in his house of mirrors a€” there were only reflections of a source long gone a€” like light traveling through space years after its original emission has ceased. His wallet was found on a subway car, and his drivera€™s license on a sink basin at The Back Door, a popular pub that caters to homosexual men. When he spoke, his eye twitched, and everything he said was a non sequitur or a quote from some apocalyptic poem.
Stein had decided to devote his lifea€™s work to helping disturbed artistic geniuses like Thom. The drawing was good, and I mean professional artist good, and it was getting better by the minute. Beyond the easel was the likeness of me, sitting on a blanket, surrounded with picnic items and painting supplies. Sid had stabbed Thom in the chest with a piece of jagged metal hea€™d filched when the carpet was being replaced.
Smile your serene Mona Lisa smile even if you must bite your tongue or clench your teeth behind it. As the directress read aloud Italian history, she and the children created inset masterpieces.
Using a second colored pencil, Mother covers the square with the inset and trace around the inset, keeping the point of the pencil always against the inset and changing directions. To keep a record of progress, the inset designs should be part of the childa€™s learning journal.
Fifteen minutes in any direction, and you were in the same spot: fast food, dry cleaner, gas station, grocery store. They would have called me an a€?art faga€? as they did the other kids who took art classes at my school.
By the time he met with Thom, he had already managed to track down almost everything Thom had ever painted and look it over with loving attention. But seeing an ear sans the head certainly recalled artistic insanity more than almost any other conceivable image.
Stein running through the halls of the asylum, weaving in and out of the rolls of new carpet, with hobby horse sticks clutched between their knees. After Thoma€™s funeral, I went back to the studio, and I got the biggest canvas I could find.
Using a third colored pencil, she fills in a small part of the drawing with light, horizontal, straight parallel lines that go exactly from one side of the drawing to the other closely together so that no paper can be seen between the lines.
At some point, show the child how to make a booklet with construction paper as a cover folded around several inset designs and stapled.
So I just shook my pompons, shook my ass, and floated my way through alcohol-soaked parties. Even when we just sat talking in the middle of our huge, paint-splattered floor, we were in the foreplay of creation. But after a couple of months, I caught on a€” Thom was hiding a background as ordinary as mine. He said it was where psychologists of past generations had tried to steer out-of-control creatives, and that the effects had been disastrous. I began the final Red Heddie, the culmination of the vision: Sida€™s fist, larger than the fist of God, held the jagged metal, blood running past his wrist, dripping from his elbow into a pool that reflected Thoma€™s face. All handwriting but especially cursive develops finely tuned hand-eye coordination, which helps with writing mathematical symbols and all hand work work in general. Children enjoy the ovals, the rainbows, the ups and downs, humps, and the tear drop that will become an a, m, n, s, i, t, o, and so on.
Cimini, the founding director of Central Mass Yoga and Wellness in West Boylston, designed to alleviate the symptoms of combat stress or post-traumatic stress disorder. The conversation would always turn to painters or painting, and then one of us would see something, an image or a concept, floating by, and boom, we were both back up and painting again. His extraordinary looks a€” copper-flecked eyes and caramel skin, the curly black locks -- were just flukes, aberrations from an otherwise very plain lineage.
Stein knew far more about Thoma€™s mind, motives, desires, impulses and fears than Thom ever would, and he treated Thom with more compassion and basic human dignity than anyone ever would, including me. Stein was even working on the hospital doctors to try to get them to separate Thom and Sid.
You were given the blessing of motherhood to learn patience and grow into a better woman, not to lower yourself back into childhood temper tantrums.
I mean, here my art was my profession, my life, and this psychologist could draw nearly as well as I could. His secular obsession with psychology must have supplanted any religious training from his youth. Speaking on the subject of People And Religion at a fringe event at the Umbria Film Festival in Terni, Father Amorth spoke of his distaste for JK Rowling's young wizard. This exercise should be a part of the daily curriculum of children between 6 and 8.A Children choose any frame that strikes their fancy to practice the exercise.
Toilet training an aspergers child ebook
Advice when parents separate
Potty training visual schedule dementia
Comments to «How can i help my child hold a pencil correctly»
1. BI_CO writes:
Discover some of the several potty instruction any kind - and the move the youngster to the.
2. ANTIXRIST writes:
Older and does not stay dry signs that your.
3. kama_189 writes:
You can try taking encourage him stand have just began.
4. Apocalupse writes:
We had about 6 how can i help my child hold a pencil correctly pairs of undies, so even though he was that nearly every your kids to hold. |
Italian Language and Culture
Italian is a major language of international organizations such as the European Union; and of countries in South America, northeastern Africa, and southern Europe. It also is Vatican City's primary language and therefore a main communications vehicle in the Roman Catholic Church worldwide. Typical contributors seek information about the language's regional variations; and wide ranging use in business, cooking, literature, and religion.
4,783 Questions
|
The history of... La Trappe
Koningshoeven Abbey has been brewing its own Trappist beer, named La Trappe, since 1884. La Trappe beer is now known worldwide, and the beers themselves are still brewed under the supervision of a monk.
At its core, La Trappe has remained the same all these years: the water comes from the abbey's own source, and their secret ingredients ensure that all La Trappe beers are unique.
What’s interesting is that La Trappe beer was not originally intended as a commercial product. The monks of Koningshoeven brewed a beer with 3% alcohol for their own consumption. Thanks to the public interest in craft beer, the brewery eventually started brewing other beers as well and selling them outside the monastery walls.
La Trappe
Available at Beerwulf Beers of this brewer
Abbey and Trappist Beer Case
12 Items
£ 40.99
Beer Tasting Case + Beer Glasses
14 Items
£ 42.99
Dutch Brewers Beer Case
12 Items
£ 36.99
Authentic Trappist
La Trappe is an officially registered Trappist beer and therefore the brewery generates no profit. Trappist beer is brewed within the walls of the monastery, under the watchful eye of a monk. All profits go to the maintenance of the monastery or to a charity.
A good example is Isid'or, their amber-coloured beer, brewed for the 125th anniversary of the brewery. The beer is named after the first brewer of the abbey, Brother Isidorus. With the money made from this beer, the monks could build a new monastery for their brothers in Uganda, who had to flee their monastery in Kenya because of the violence in the country. This is certainly a beer with a story!
Origin of the quadrupel
Whereas the honour of creating the original Tripel is one generally attributed to Westmalle, the Koningshoeven seems to be responsible for the term ‘Quadrupel’. A Quadrupel is actually a barley wine, but La Trappe was the first in 1991 to call this beer a Quadrupel. Since then the term has been used by many other breweries. |
Home > Information Center > Pelvic Inflammatory Disease >
Many people are tired of hearing about pelvic inflammatory disease, but some still don't take it seriously. This gynecological disease, if left untreated, can significantly damage female health. The harm that pelvic inflammatory disease brin...[read article]
Both endometritis and pelvic inflammatory disease belong to gynecological inflammation, so you may wonder what are the differences between them?...[read article]
During spring and summer, the weather is changeable, and temperature varies widely from day to night. If you don't pay enough attention to keeping warm and cooling, your body will easily get wet or catch a cold, leading to a decrease in body...[read article]
Pelvic inflammatory disease can cause many physical problems, such as painful menstruation and abdominal pain. So, can it cause diarrhea?...[read article]
Pelvic inflammatory disease seriously affects the female physical and mental health, and even affects marital life and feelings. Therefore, attention to pelvic health and improvement of pelvic function should be regarded as an important part...[read article]
Pelvic inflammation is a very common gynecological disease. The high incidence of this inflammation is due to the fact that many details of life are overlooked by women. There are some high-incidence factors about pelvic inflammation that yo...[read article]
Pelvic inflammatory disease is a very common gynecological disease in women, which is an inflammation that occurs in the pelvic cavity. Commonly, the pelvic cavity refers to the female internal genitalia and surrounding connective tissues an...[read article]
• Reviews
Send us an email or add on Live Messenger
• Questions |
The Definitive Guide To The Pearson PTE Listening Module
The Listening Module is the final part of the PTE Academic exam. It assesses a candidate’s ability to comprehend spoken English in a number of situations that occur in an Academic environment, such as lectures and presentations. The conversations also include a variety of Native and non-Native accents. During this part of the test, candidates are required to listen to a number of audio or video clips and answer various questions based on these recordings. The audio is played only once via an automatic timer. Test takers can only manipulate the volume of the audio to suit their level of comfort.
Listening Test Format
The recordings usually relate to topics like humanities, natural sciences and social sciences. However, even if you are not knowledgeable about these topics, you will still be able to follow the audio and answer accordingly.
There are a total of 8 tasks present in this part of the test and it lasts for about 45 to 57 minutes, depending on the combination of tasks that you are asked to complete.
Here’s a short summary of the listening test format:
LISTENING: (45 – 57 minutes)
• Summarize spoken text.
• Multiple choice questions
• Fill the blanks
• Highlight the correct summary
• Highlight incorrect words
• Select missing words
• Write from dictation
Why Knowing The Test Format Is Important
One thing is for sure, the better prepared you are for the test, the more you will improve the time it takes for you to complete the test. Knowing what to expect can also help you to greatly improve your confidence when you actually take the test. it ensures that there are no nasty surprises on test day and that you are well aware of how much time you have for each task.
Which Skills Are Assessed During The Listening Test?
The PTE Listening test is designed to assess your listening comprehension skills. It gives a good indication of whether or not a candidate will be able to understand the real-world listening situations that one might encounter when studying in or moving to an English-speaking country. It also checks your understanding of English as spoken with different accents (American, British, Australian as well as other non-native accents).
Listening Question Types
Summarize Spoken Text
This question tests both your listening and writing skills. In this question candidates are required to write a short summary based on the contents of an audio recording. You will have 12 seconds to read the instructions before the recording automatically plays. The recording lasts for between 60 to 90 seconds. You will then be required to type out your summary into a small text box below the recording. Your summary should be between 50 to 70 words and should only include the important points of the lecture.
It helps to take notes while the recording is playing. Use these notes as a guide when deciding on the important features to include in your summary. You should spend about 3 to 4 minutes on this question.
Here's how this question will be displayed:
Multiple Choice
There are two types of multiple-choice questions. Candidates will either be required to choose a single option or choose multiple answers from a list of options in order to answer a question that is based on an audio recording. The type of question depends on the wording of the question, so be careful and make sure that you read the instructions carefully before attempting to answer.
The recording will start after 7 seconds and last for between 40 to 90 seconds. Once the recording has stopped you will be able to select multiple options. You should spend a maximum of 1.5 minutes on each MCQ
It’s important to note that listening multiple choice, multiple answers are graded using negative scoring. This means that 1 mark will be deducted for every incorrect answer.
You can easily recognise whether a multiple-choice question has negative marking or not by taking a look at the way the options are displayed. Options that have squares next to them mean that the question is a multiple choice, multiple answers question, with negative scoring.
Options that have circles next to them mean that the question is a multiple choice, single answer question, with regular scoring and only one correct answer.
Fill In The Blanks.
In this question candidates will be required to fill in the blanks of a short transcript, that has multiple key words removed. The transcript will be presented below an audio box. The recording plays after 10 seconds and lasts for around 30 to 60 seconds. The recording is simply and audio version of the displayed transcript. You will have to type out the missing words as you hear them.
Tips For This Question
Use the words surrounding the blank to predict the type of word needed. You need to have a good understanding of how articles and prepositions are used in order to be able to predict the type of word needed. Certain prepositions signal that a date or specific place follows. articles like a and or the signal whether or not a singular or plural noun should be placed in the blank. A simple error like using a plural noun instead of a singular noun can result in an incorrect answer, so it is important to practice these grammar topics.
Here's how this question will be displayed:
Highlight The Correct Summary
This question is similar to a multiple-choice question. The recording will play after 7 seconds. Candidates must listen to a 30-90 second recording and choose the correct summary of the recording from several passages. Candidates must choose the option that accurately summarises the gist (overall meaning) of the recording.
It’s important to choose the summary that contains only the main features of the recording and avoid those that focus on supporting details and examples.
Here's how this question will be displayed:
Select The Missing Word
This question type is very similar to the Fill in the blanks type of question. However, there is only one missing keyword.
Candidates will be required to listen to a 20-70 second audio recording of a sentence or paragraph that has a keyword missing. You will hear a beep instead of the missing word. You will then have to select the word that best completes the text from a list of possible options.
Here's how this question will be displayed:
Write From Dictation
In this question type candidates will see an audio recording box on the top of the screen with a blank text box beneath it. The recording plays automatically after 7 seconds and you will then listen to it and then type out a word-for-word transcript of what was said. Each audio for this question type is 3-5 seconds long. You will receive one correct point for every correct word present in your answer.
Here's how this question will be displayed:
Highlight Incorrect Words
In this question candidates will be required to point out alterations made to certain parts of a short transcript. The transcript will be present below an audio box. The recording plays after 10 seconds and lasts for around 15 to 50 seconds. The recording is simply and audio version of the displayed transcript. You will have to highlight the incorrect words as you hear them, using your mouse cursor.
This question type also includes negative marking, and one point will be deducted for incorrect answers.
Here's how this question will be displayed:
Skills Needed For The Listening Test.
In order to score well in the listening test, or any other part of the PTE exam, you need to know more than just the types of questions and how to answer them. You also need to develop you basic English language skills (both communicative and enabling skills), without these you will not be able to ace the exam.
Here’s a list of things you should be able to:
• Can identify main and supporting ideas
• Can summarise
• Can understand academic vocabulary
• Can understand context
• Can understand implicit information
• Can understand abstract ideas
• Can classify and organize information
• Can form conclusions
• Can predict
• Can identify transcript errors
• Can identify speakers' purpose and attitude
• Can identify various accents, speed and tone
• Can understand links between points
Now that you have a clearer picture of what expect on test day and what skills are required for the PTE listening test, you can move on to the next step of your preparation – identifying your listening skills strengths and weaknesses.
I think the easiest way to do this is to take a mock test. this will help to familiarise yourself with the test format and you will also get a clearer idea of which question types you struggle with.
Once you gain a better idea about your listening comprehension strengths and weaknesses, it will be easier to decide on the best way to move forward with your preparation. However, it’s important to note that simply taking practice tests will not help you improve in any way. This is merely the first step in determining the correct direction to move forward in regarding your PTE preparation.
It’s extremely important to use authentic PTE Practice tests, in order to get a realistic idea about your actual level of proficiency. Use full-length exams in which you’ll find questions that reflect what you’ll see on the test day and that give you all the necessary help and information needed to guide you through the test before you start.
A great way to aid in your preparation is to familiarize yourself with how native English speakers speak. There are many ways in which you can do this. You could watch English TV programmes or News channels, listen to podcasts about topics that interest you or find content that is somehow PTE related. This will also help acclimatize you to the sounds and unique pronunciations used by speakers with different accents.
During the Listening test, many of the words used by the speaker might be unfamiliar to you. For this reason, it’s also important to widen your vocabulary You need to change the way you learn new vocabulary. Each time you learn a new word, make sure that you note down the possible synonyms of this word as well and try to use that word in a few sentences so that you are aware of its use.
Once you have mastered the necessary skills needed to complete the PTE Listening Test, you should try to complete an PTE Listening practise test under exam conditions in order to also help you to learn how to be fast enough to answer all the questions on time, without making mistakes, as well as gauge the effectiveness of your preparation.
How To Best Manage Your Time During The Listening Test.
Only the summarise written text is timed individually. The rest of the listening test questions are not. This means that you should utilize each second wisely. In my opinion you spend no more than 1.5 minutes on each individual question and make sure that you check your work thoroughly before clicking the ‘next. Button to move on to the next question.
A countdown timer will be present on the top right of the screen during the listening test. It displays the number of items and how much time you have left.
Why Is It Important To Take A PTE Preparation Course?
The most efficient and convenient way to pass specified exam is to take counsel of expert online PTE tutorials and practice using authentic PTE Mock tests.
Taking a listening course that is designed to equip you with all the information, strategies and skills needed for you to ace the Listening test is important. This is because having an experienced teacher will significantly impact the time it takes for you to prepare. It’s also the fastest way to identify the areas of your Listening skills that are holding you back from the result you need. |
Open Letter to Educators & Families on Nonviolence
Every generation experiences historical events that become defining moments in our students' lives, some of which can lead to trauma. With every crisis, there is an opportunity for learning and building trusting relationships.
In the spirit of nonviolence, as promoted by Dr. Martin Luther King Jr., “Peace cannot be kept by force; it can only be achieved by understanding.” The California Association of School Counselors (CASC) denounces all acts of violence and promotes teaching nonviolent communication in our schools. The storming of the U.S. Capitol and the attack on the United States Congress have left many wondering how to move forward. The events that took place on January 6, 2021, were an attempt to overthrow the will of the people and a threat to a diverse democracy that aspires to be inclusive of all voices and perspectives. The United States is historically a divided nation with a long history of racial division and oppression. As a nation, we must confront the hard truths that white supremacy and racism are rooted in the structures and systems of our society. Adults and children alike witnessed America's racist roots on full display with images of Confederate flags, a noose hanging at the Capitol, and references to concentration camps. With the threat of continued violence and the uncertainty surrounding the current political and racial climate, our youth are struggling to feel safe and make sense of it all. The repeated trauma our nation is experiencing, paired with the plethora of bias, nonfactual information, and influences of social media greatly impact students' mental health, interpersonal relationships, and emotional well-being.
All individuals who work within the school system have the ethical obligation to address historical and current events that weigh heavily on our students and infringe upon equity, social justice, and anti-racism. Educating students about the differences between free speech and hate speech, along with the historical legacy of extremist movements in the United States, are essential to the conversation. We appeal to all school administrators to provide guidance and support to staff and promote open dialogue. We understand that these are difficult conversations with varying perspectives, and there may be an inclination not to talk at all. Silence implies complicity. We must speak up and speak out when injustice happens, and we must promote a positive school climate for all students. Educators hold a responsibility to teach digital citizenship, media literacy, critical thinking and promote empathy and understanding. We encourage families to reinforce these skills. Such courageous conversations are more than just politics; they are matters of human rights and human life.
So what do we do? Children are bombarded by images of violence in the media and must be given the tools, support, and a safe space to process their feelings and questions in line with their developmental stage. If you notice that your child is impacted by these traumatic events, set boundaries and limit social media and news consumption. It is crucial that we listen with unconditional positive regard and without interjection, and that we encourage peaceful, nonjudgmental conversations. We may not have all the answers, but these conversations can be teachable moments.
Here are some suggestions for dialogue starters:
• What do you know about the events that occurred?
• How do you feel about what happened?
• What questions do you have?
• How do you determine what is fact versus opinion?
For more resources, please visit the “Anti-Racism and Equity” page on the website. There you will also have access to CASC's position statement on “Equity, Social Justice, and Anti-Racism”, published June 2020. If your child needs additional support, please reach out to your school counselor.
This is a pivotal time in the psyche of the American collective. We are in a period of societal reckoning and self-reflection. Our children will remember and reflect on what we, as adults, did or did not do. CASC continues its commitment to provide support and work with state leaders to establish policies and advocate for the inclusion, safety, and respect of all students. |
Diet Menu
Reasons to Make Tomatoes a Diet Menu
Reasons to Make Tomatoes a Diet Menu – Tomatoes have a lot of nutrients in them. Including tomatoes are also petrified for a diet program. Tomatoes can be a good diet menu for body health. Approximately, what are the benefits of tomatoes that can help in losing weight? Here’s the full review:
Reasons to Make Tomatoes a Diet Menu
1. Low-calorie diet menu
Tomatoes contain low calories, so they are safe for consumption as a diet menu. In every 100 grams of tomatoes contains only 18 calories. That way, we can eat it in large quantities without worrying about gaining weight.
2. Rich in antioxidants
Tomatoes are high in the antioxidant lycopene. These antioxidants can prevent free radical damage and premature aging of cells. Not only that, lycopene also helps reduce levels of oxidative stress in the body, making it easier for us to lose weight.
3. Rich in fiber helps to lose weight
A cup of tomatoes contains about 2 grams of insoluble fiber and 0.20 grams of soluble fiber. Both soluble and insoluble fiber can play an important role in weight loss.
According to a study entitled The effect of fiber on satiety and food intake: a systematic review, the soluble fiber in tomatoes forms a gel in the large intestine, making it a food source for good bacteria.
That way, the absorption of food can slow down, and the feeling of fullness will increase. Meanwhile, insoluble fiber binds to fat molecules and prevents their absorption by the body.
Also Read : Myths About Diet You Must Know
4. Increase metabolism
Research published in the European Journal of Nutrition in 2013 found that consuming tomato juice can improve lipid metabolism by stimulating genes involved in fatty acid oxidation. That way, the amount of fat that is burned into energy is even more and does not accumulate in the body.
In addition, tomatoes also contain amino acids that can burn fat. Consumption of tomatoes can stimulate the production of carnitine, an amino acid that increases the body’s ability to burn fat.
5. Low glycemic index
Compared to processed foods and other fruits and vegetables, the glycemic index in tomatoes tends to be low, at 38. This glycemic index is a measure of how long a food can raise blood sugar levels. The longer, the better.
Foods with a low glycemic index such as tomatoes can make blood sugar more controlled and stable. That way, we will avoid overeating, and will be more helpful in losing weight. |
Category: Operation in the Field
Piece work labor tracking, RFID, Barcode, GPS, Citrus, Precision agriculture
QuickPick is the preferred 2nd Sight labor tracking and yield mapping system for manual citrus harvesting. QuickPick system consisted of a handheld computer, integrated RFID reader, and receipt printer. QuickPick can be mounted on a fruit bin or truck, being used to handle fruit collection in the citrus grove.
1. The harvester places the citrus fruit in the tub or bin.
2. The harvester scans their RFID badge on the QuickPick.
3. The harvester prints a receipt (Optional)
4. The action records harvester, date, time, GPS, and other information pertinent to the harvesting operation (crop variety, field, row)
5. The system tallies the number of containers each harvester had harvested for the day
List of applicable citrus fruit |
sample why emory essay autobiography story book essay short essay on merits and demerits of computer place where i want to visit essay essayist thomas sartor resartus narrative essay prompts 5th grade
Image Alt
What is NLP?
NLP is the study of what works….in thinking, in language and in behaviour.
It is about ‘the difference that makes the difference’ to achieve / get results / succeed.
The world around us is constantly changing. These changes impact us at an individual, personal, unit and organisational level.
We therefore need the capacity and the ‘how’ to keep continuously moving towards our goals and objectives and yet experience the richness of the change, without being derailed.
neuro linguistic programming certification
“To develop as a professional you have to first develop as a person.”
NLP thinking and processes are making a big impact on the way that we do business today and on the world of personal and professional development.
It shows you how to communicate more effectively with yourself and with others.
You will learn how others have achieved success and how to manage your behaviours in such a way that you can model theirs and achieve your own dreams.
It will teach you about human behaviour. Why we do what we do in given situations, and how we can change those behaviours for the better by adjusting the mental images in our minds.
NLP tools and techniques work on building sets of strategies that work for us in
Decision making Building relationships
Business strategy Coaching your team
Inspiring and motivating people Negotiating your way through the day
Creating balance in our lives And lastly, learning to learn |
/ The Secret of Running
How to use Stryd power to calculate your VO2
In our book (www.thesecretofrunning.com) we have described our initial treadmill research on 14 test runners in the physiological laboratory of the Dutch Sports Medical Center SMA Midden Nederland. We were quite impressed by the results which showed that the Stryd power data closely correlated to the VO2, which has always been considered as the gold standard in physiological research.
Recently, we have carried out a new research project in cooperation with the physiological laboratory of prof. Maria Hopman at the Radboud University of Nijmegen (RUN), the Netherlands. A full scientific paper on the project has been submitted to the Journal of Sports Sciences and Medicine. In order to share our results with the running community at large, we have written 4 short popular papers (numbered 24-27) on the main findings:
1. The (close) relationship between Stryd power and VO2
2. The impact of speed on the running economy (ECOR and RE)
3. The impact of cadence on the running economy (ECOR and RE)
4. The physiological differences between trained and untrained runners
This paper is the first of this series. The pictures below show the authors during the treadmill tests as well as some of the laboratory equipment at RUN. The left picture also shows the primary investigator, MSc-student Rick Sniekers.
The close relationship between Stryd power and VO2
The project included measuring the VO2 (in ml O2/kg/min) and Stryd power (in Watt/kg) of 21 runners (11 trained and experienced distance runners and 10 untrained students) at 5 different speeds (maintained during 3 minutes, increased in 4 steps of 1 km/h to lactate threshold). This means that we got a total of 21*5 = 105 data of VO2 and power. The figure below shows the data base (the colors correspond to the different speeds and test groups, trained or untrained). The correlation between VO2 and Stryd power is quite impressive and even more so when we realize that these data points represent a heterogeneous set of runners (trained and untrained) and test conditions (low speed up to lactate threshold speed). This confirms our earlier findings that the daily Stryd power data can be used very well to provide an alternative for the once-a-year determination of the VO2 max in a physiological laboratory.
Trained runners need less oxygen to produce the same Wattage
A striking result is that we found that most of the scatter in the data can be eliminated when we divide our test runners in 2 groups, i.e. trained and untrained runners. Trained runners need about 4% less oxygen, so they have a somewhat lower VO2 (in ml O2/kg/min) at the same power P (in Watt/kg). This means that their Metabolic Efficiency (ME) must be higher. In our book, we have derived the following relationship for the ME:
ME = Mechanical power/ Metabolic power = P/(VO2/60*EY)
The EY is the energy yield of oxygen which can be approximated at 19 J/ml O2. As an example, we use a VO2 of 50, an EY of 19.0 and a P of 3.5, so the result is an ME of 0.22 or 22%. The figure shows that the untrained runners had an ME close to 23%, whereas the trained runners were 4% more efficient with an ME close to 24%. The 2 lines closely match the data. We note that most of the remaining scatter between the data points is caused by the differences in speed. This leads to a change in the fuel mix (less fatty acids and more glycogen as speed increases) and the EY. Consequently, the VO2 at low speeds tends to be relatively high; the reverse is the case at high speeds.
How to calculate your VO2 from your Stryd power data
We conclude that the following 3 formulas can be used to calculate the VO2 from Stryd:
We have derived the formulas for the untrained and trained runners from our data, using an average EY of 19 J/ml and a ME of resp. 23% and 24%. The accuracy of the formulas might even be increased by incorporating the speed of the test, as at high speed the EY is 19.5/19 =1.03 higher and at low speed the EY is 18.3/19 = 0.96 lower. Consequently, the VO2will be 3% lower at high speed and 4% higher at low speed.
We note that our trained runners were experienced distance runners with many years of training. However, they were not of the elite level. We expect that the ME of elite athletes may approach the theoretical maximum of 25%. Consequently, elite athletes could use the formula: VO2 = 12.63*P.
The above formulas approximate the VO2 for all power ranges. In order to estimate your VO2 max, you should use the power that you can maintain during 10 minutes.
|
Heavy rainfall dilutes a complex chemical that helps control chlorination costs.
Heavy rainfall dilutes a complex chemical that helps control chlorination costs.
El Niño, La Niña, dust storms in the Sahara… quite frankly, we don’t really understand all the weather lingo too well, but we DO know a bit about water chemistry. We also know that recently it has been either really sunny and hot, or stormy with monsoon levels of rain. Either of these conditions can cause elevated chemical consumption by themselves, but together they can cause exponential consumption, potentially costing you thousands a year. Read on….
The problem: Heavy rains dilute the cyanuric acid (CYA) levels in your pool, and it (aka stabillzer or conditioner) is a key chemical in protecting chlorine residual in your pool. CYA serves as “window tinting” for the chlorine molecule, and protects or “stabilizes” chlorine from UV destruction.
About cyanuric acid: In 1956 it was discovered that chlorine would stay in the water longer if CYA was added… about 4 to 8 times longer to be more exact. As an example, 10 PPM of stabilizer will protect about 1.5 PPM of chlorine, but any chlorine in excess of 1.5 PPM in the pool is unprotected and is subject to UV destruction at a rate of 90-95% in 2 hours. That’s your money going down the drain. Our rule of thumb in the 80’s was that 30 PPM would cut your chlorination costs in half.
In general it takes about 8-10 times the CYA to effectively protect free chlorine… so it takes 25 PPM to protect 3.0 chlorine (give or take), and so on. This is widely misunderstood, as many felt that holding ANY level of CYA gave them a license to hold their pools at elevated chlorine levels, but we know that the aforementioned “excess chlorine” (which is not protected) is being stripped out at a rapid rate.
How much to use?: How much stabilizer to use is a HOT topic which deserves some conversation.
While the 2016 Department of Health Code allows 100 PPM of stabilizer MAX in pools, and Zero in spas and indoor pools, best practice has traditionally been to maintain 20-30 PPM in normal condo and hotel pools, and 10-15 PPM in heavily used activity pools and water parks. Anything over 50 PPM is generally considered wasted as 100 PPM does not provide substantial protection over 25 PPM, and the minimal additional protection it DOES provide does not justify the additional cost.
stormcloud 2
It gets more complicated: With the new codes and studies that confirm CYA slows down the “rate” of disinfection to the point that treating for fecal accident WITH and WITHOUT CYA are very different indeed. This led to the updated CDC 2016 guidelines for shocking pools after fecal accidents which shows:
*Formed stool:
*2 PPM (chlorine) for 25 minutes (no CYA)
*2 PPM for 50 minutes (with CYA)
*Diarrheal stool:
*20 PPM for 12.75 Hours (no CYA)
With CYA… lower CYA to <15 PPM, then:
*20 PPM for 28 hours
*30 PPM for 18 hours, or
*40 PPM for 8.5 hours.
This means that if your pool is prone to fecal accidents, you may be best off keeping your CYA levels below 15 PPM, so that you won’t need to drain the pool before shocking. While you will use a BIT more chlorine at 15 PPM than you will at 20-30 PPM, the time savings are normally very appreciated by your patrons.
Oh yes… about the rain!: During times of heavy rainfall, your team needs to be more vigilant in testing and adjusting stabilizer levels. Most customers have found it better to use an accurate digital test kit like the Spin Disk, or Palintest tester as the standard “look for the dot” CYA tests don’t normally measure down to these low levels. They also seem to prefer using CES’s quick dissolve powdered CYA which is considerably easier to apply than waiting for the traditional granular CYA to dissolve…..
Plesae contact your CES rep for more information or with any questions on testing methods, stabilizer, etc. Our goal to assist you in maintaining moderate chlorination cost in the long haul.
Leave a Reply |
Good and bad debt examples
Most people face debt from time to time, but often they do not know that there is good and bad debt, but this is true. While one debt can help you achieve your financial goals, another can make them much more difficult. Not only the type of debt taken but also its cost can influence how it affects your credit.
Thus, it is important to understand the difference between good and bad debt in order to achieve your financial goals. Explore some information on good and bad debt and how to handle both of them.
Loans for ANY NEEDS
APR from 4.99%
What is good debt?
Good debt is money owned for things that give you the opportunity to increase income or gain wealth over time. Thus, low-interest debt that helps you increase your income or net worth can be defined as good. However, it should be understood that any debt (both good and bad) should not be too big.
However, what are the good debt examples?
In order to better understand what good debt is, you need to study specific examples. Below are a few of them.
• Student loan
A student loan is often a good debt as it can be seen as a kind of investment in your future. It is a student loan that gives you the opportunity to pursue an education that can lead you to wealth. Thus, student loans have lower interest rates. However, in order for a student loan to remain a good debt, certain requirements must be met.
It is good if your student loan payment does not exceed 10% of your estimated monthly salary (after taxes) one year after graduation. If you are unsure of how to deal with a large student loan debt, you need to create an income-based repayment plan and consider refinancing your loan.
• Car loan
A car loan is also considered an example of good debt, as for many people a car is an indispensable part of life as it makes it possible to get to work or take children to school. However, in order for the debt to be considered good, you need to keep the loan payment within 20% of the monthly salary you receive. The loan term is also important and it is desirable that it does not exceed 4 years. If you find it difficult to deal with paying off your car loan, you can also use refinancing.
• Mortgage
Of course, a mortgage is also considered a good debt, as it is not only the place where you want to live, but also an investment in the future. As you know, real estate is becoming more expensive and perhaps in the retirement age you will want to sell a large house, move to a small one and have a fairly large amount of money. In order to take out a mortgage, you must understand how big and expensive a house you can afford. It is recommended that the mortgage payment be up to 36% of your income. Also note that relocating to a less expensive area and refinancing may help you deal with your mortgage.
What is bad debt?
Bad debt is any consumer debt that can do little to improve your credit. Thus, expensive debts that undoubtedly worsen your financial situation can be classified as bad. If you take out a loan to buy an item that is of little value or loses it quickly, that is bad debt. Also, if you take out expensive credit cards and loans with a high or variable rate - this is also definitely a bad debt.
Also, as already mentioned, even good debt can turn bad if you are not good at budgeting. If you take out any loan at high interest rates, it can lead to the fact that you will not be able to repay the debt in the future and your credit history will be worsened.
By looking at specific examples of bad debt, it will be easier for you to understand what it is and how you can avoid it.
• Personal loan for purchases
Of course, getting a personal loan to afford the latest bag, expensive clothes, a vacation you can't afford, or birthday dinner at a fancy restaurant is not only bad debt but a waste of money. Moreover, such debt is addictive. If you once allowed yourself something that you could not buy before, you will want to continue. Thus, you will fall into a debt trap and very soon you will not be able to cope with your financial difficulties.
Of course, this does not mean that you should completely forget about personal loans. This example is about unnecessary purchases or things you can live without. You can take out a personal loan if you need emergency help or want to consolidate debt, then that makes sense and wise.
• Payday loan
You probably know that most payday loans have extremely high interest rates. Thus, even if you borrow a small amount, the interest will be so high that it will be difficult for you to cope with the loan. The short payment terms (on the day of the next paycheck) further complicate the situation, since you will have to return the money in just one month. Just imagine having an interest rate of 300%. This debt is not worth it. In many cases, people who take payday loans cannot repay them, so they have to pay a late payment fee, which only gets bigger. This is a debt hole that can be quite difficult to get rid of.
If you are in a difficult situation and you need several hundred dollars to paycheck, you should not think about a payday loan - this is clearly not the best option and there is a big risk that you will not be able to repay the loan. Instead, ask friends or family for help, and as a last resort, contact lenders with minimal interest rates.
• High interest credit card
Many people do not even think about how much they overpay using high-interest credit cards. Of course, if the interest rate on your card is more than 20%, your debts become more expensive and it becomes more difficult for you to pay off. Moreover, most people do not use credit cards to cover emergencies, but to buy new clothes, gadgets, and other things they don't need to buy.
Many people who want to pay off credit card debt are faced with the fact that they pay as much as they can, but the debt does not go away. Of course: this is due to high interest rates.
What can you do? If you have the opportunity, then contact a financial advisor who can continue you with several ways to solve the problem. If you do not have the financial ability to do this, you can take out a personal loan and consolidate the debt. If you compare the offers of different lenders, you can find the one that offers the best interest rates. Thus, it will be easier for you to pay off a low-interest personal loan than a card debt with a 20% interest rate. |
Eli Grey
ECMAScript 5 accessors
Here are two examples of using Object.defineProperty and Object.getOwnPropertyDescriptor:
Using accessors
(function() {
// this creates a document.foo accessor
var foo = 0;
Object.defineProperty(document, "foo", {
get: function() { return foo },
document.foo = 5;
(document.foo = 4) === 9;
Setting a property
window.foo === "bar";
window.x = 0;
Cross-browser accessors
Xccessors is a script I made which implements the legacy methods for defining and looking up object accessors (getters and setters) of objects in JavaScript using ECMAScript 3.1’s accessors standard. This is aimed at adding support for the legacy method in IE8 RC1. Read more on the Xccessors project page. There is also a demo you can try out.
Update: I just tested the script in IE8 RC1 and it seems that IE8 RC1 only supports getters and setters on the DOM and the window object. So as long as you are setting an accessor on the window object or a DOM element, Xccessors should work fine. |
The idea of creating a device that’s inserted into the vagina to collect menstrual fluid is one that has intrigued women from ancient times through the beginning of the last century. It wasn’t until 1937, however, that the menstrual cup was patented by an American actress, author and inventor, Leona Chalmers.
After long years of trying unsuccessfully to bring her product to market, she sold the rights to Robert P. Oreck, who launched the Tassaway line of menstrual cups in the 1960s. However, the product was made of rubber—not the most comfortable or hygienic material—and Oreck was unable to promote the products commercially by using words like "period" or "vagina," so his efforts led to failure.
The Mooncup changed everything in 2001. It was made from medical-grade silicone that was both durable and hypoallergenic. Manufactured in the United Kingdom, this menstrual cup provided a direction for other companies to follow, and now there are many different devices available.
Health concerns over period products |
Tangent arcs
From Glossary of Meteorology
tangent arcs
A halo in the form of an arc tangent to a circular halo.
The most common of these are the upper and lower tangent arcs to the halo of 22°. They form separate arcs when the sun is low, but as the sun climbs they join to produce the circumscribed halo. These arcs are explained by refraction through the 60° prism sides of columnar crystals oriented with their long axes horizontal.
See 46° lateral arcs. |
What to Do: Fawns
Black-tailed deer, a subspecies of the mule deer, are common throughout the Bay Area. Fawns are born in spring or early summer. They begin foraging for their own food when they are a week old, but will nurse heavily for at least two months.
Does will hide their babies and go off to feed, often for an entire day. If you find a fawn, leave the area and keep dogs and people away from it. The mother will not return if she senses you are too close.
Do not pick up the fawn or try to give it food. Only if the fawn is injured, or if the mother is injured or dead, should you bring the fawn to the wildlife rehabilitation hospital. If you have any questions, please call the museum, 925-935-1978, between 9 AM and 5 PM. |
Lucas de Ruiter
Countryside, The Future
Project details
↳Internal exhibition design for OMA/AMO
↳Exhibited in the guggenheim New York
A central thesis of ‘Countryside: The Future’ is that our current form of urban life has necessitated the organization, abstraction, and automation of the countryside at an unprecedented scale. Data storage, fulfillment centers, genetic engineering,
artificial intelligence, robotic automation, economic innovation, worker migration, and the private purchase of land for ecological preservation are in many cases more actively explored and experimented with in the countryside than the city.
ATLANTROPA WAS A MEGA-ENGINEERING PROJECT by Herman Sörgel (1885–1952), a German architect and engineer, who devoted his life to the project. Begun in the late 1920s, Atlantropa was a proposal to join Africa and Europe into a single, new continent as a way to answer both the potentials and needs of each, and to assert its rightful place between Asia and the Americas, as one of the “three A’s”…
Only when coupled in a single entity could the exchange of goods, technologies, and labor be organized at the right scale. In the plan, the level of the Mediterranean would be lowered by 328 feet (100 meters): New land would be cultivated on the north and south coasts, hydroelectric dams would generate huge amounts of energy at Gibraltar and Suez, and water from the lowered sea would be used to restore the fertility of the Sahara.
THE NAZIS FETISHIZED WAR AND THE COUNTRYSIDE – the second part of their Blut und Boden motto. In a quasi-idyllic publication, the German autobahn system, typically interpreted as an efficient network to roll out a future war machinery, was presented to the German population as a network of landscaped motorways that would offer them unlimited access to beauties of ‘their’ countryside.
Only six years later (1945), the American Henry Morgenthau Jr, the former Secretary of the Treasury, prepared a report for President Roosevelt to propose what the US should ‘do with’ Germany when America would win/would have won the war.
EUROPE: 2D vs. 3D When the European Union (EU) was formed in 1958 with six states—France, Belgium, Luxembourg, the Netherlands, Italy, and (West) Germany—the European countryside was in dire straits. WWII, poverty, archaic practices,
conflicting national interests and conservative rural “values” created a compelling case for a drastic rethinking of the future role and presence of agriculture in the “old” continent and to consider, how a balance could be maintained between urban and rural opportunities.
CRISIS AS A BLESSING: On June 5, 2017, food imports to the peninsular Arab country of Qatar – 90% of its food was imported – were abruptly stopped by its neighbours CCG (the United Arab Emirates, Bahrein, and Saudi Arabia…), who sought to change its politics.
That it overcame that crisis with remarkable speed was due to a very thorough, data driven analysis of Qatar’s ‘food insecurity’ initiated in 2008: 90% of its food was imported, of which 50% by Saudi Arabia. |
Why does Avanti Gas promote LPG?
Why is it crucial we constantly think of ways to improve our surroundings? We have asked the question many times. Respecting our place of living means nurturing it so we can improve it for future generations.
An argument for LPG
Now you may think about the reason behind the introduction of a new fuel source called LPG. It has been recently introduced to battle global warming and the increased content of greenhouse gasses in our atmosphere. LPG emits almost non-existent soot and very little carbon content upon use.
This new power source is highly versatile. Besides being environmentally friendly, LPG is used for cooking, heating homes, driving, and camping. The number of car and bike enthusiasts using LPG has also increased to shift from diesel or petrol. LPG also provides financial benefits since it is priced at half the rate of petrol and CNG. LPG has also lowered road and smoke pollution considerably,
LPG’s carbon footprint is less than fifty percent of coal and twenty percent of oil fuel. Since LPG has emitted less carbon content, it reduces carbon dioxide in the air. LPG has been termed a clean and environmentally friendly fuel that can fuel many people. LPG is hugely advantageous to industrialists, such as Avanti Gas, and customers alike due to its efficiency and innovative compound structure.
Rural communities have particularly appreciated LPG. They have switched from traditional sources of cooking such as wood and charcoal and dung flames to LPG. Using this new innovative gas has increased their standard of living and quality of life. LPG has freed rural people traveling miles to cut down trees or gather power sources for their dated kitchens. LPG has also provided employment opportunities as the demand for transporting LPG to rural areas increases.
LPG vs. Petrol
• Petrol and diesel have been harmfully contributing to the environment for ages. People and customers are becoming more conscious of the reduced LPG expense. The conversion cost to LPG from petrol is also reduced, so more people switch to LPG fuel needs.
• LPG does not contain odors which is an advantage and letdown. An odor gas does not harm the environment or cause health deterioration among people with sensitive health. However, odorless gas is also challenging to detect. When LPG leaks or collects on the ground, it evaporates. LPG’s particles are heavier than air. They become a cloud which can cause cold burns on the skin.
• LPG is also lead-free. LPG has a lower octane number than petrol. Lead is added to increase petrol octane content.
• LPG provides engines with a longer shelf life. It keeps the components clean and working efficiently. On the other hand, petrol requires a regular oil change and provides a smaller useful life than LPG.
• LPG also contains a minimum carbon footprint. This is the primary reason for its growing popularity. The spark plugs may sparkle when the engine uses petrol to produce energy. This decreases life significantly.
Future Thoughts
Recent developments have suggested shifts to more environmentally conscious fuel resources to increase air quality and lower carbon footprint.
Share on facebook
Share on twitter
Share on pinterest
Share on linkedin
Share on reddit
This Post Has 2 Comments
Comments are closed. |
Tue 9 Jan 2018 14:00 - 14:30 at Museum B - Talks II
Dafny is a programming language designed to make reasoning possible and fun. It features standard imperative constructs like assignments, loops, and dynamically instantiable classes as well as functional constructs like datatypes, co-datatypes, and recursive functions. The language also features constructs for writing specifications and authoring proofs. The cross-platform development environments for Dafny continuously apply an automated program verifier to the programs being written, providing immediate feedback on the programs and proofs being authored.
Owing in part to its gentle learning curve and familiar programming feel, Dafny has been used in systems, security, and PL projects, in academia and industry, in verification competitions, and at several dozens of universities in teaching. Dafny can be used as an intelligent assistant in programming and modeling, and it can be used as a logical framework.
Now, Dafny comes to you in this 30-minute overview tutorial. Come see Dafny in action, learn how to use Dafny to reason about code, algorithms, and meta theory, and get inspired for how to apply or extend Dafny yourself.
slides (Leino PLMW 2018.pdf)618KiB
Tue 9 Jan
Displayed time zone: Tijuana, Baja California change |
arthurian literature
Malory’s Le Morte D’Arthur Book 3 – The Round Table
In Book 3 we get back to what most people would think of as “core” King Arthur: the founding of the Round Table. Arthur has won his early wars, and everything is going fine, but his barons are on his case about getting married; possibly they don’t want another Uther situation, and the kingdom without an heir. Arthur has his heart set on Guenever, daughter of King Leodegrance (whom Arthur and his Continental allies delivered from a siege back in Book 1). Despite Merlin’s warning that she won’t be faithful, Arthur’s mind is made up.
There are several versions out there of where the actual Round Table came from; in this one, it belongs to Leodegrance, who was given it by Uther and now gives it (back) to Arthur as a wedding gift along with 100 knights. The Round Table seats 150, so Merlin goes out looking for 50 more to make up the shortfall, but he can only find 28. Every seat has a name except two, so we are left looking for 20 knights as the wedding festivities start.
Malory loves numbers.
The only one actually added to the Round Table here is Pellinor, but two other notable knights are created at the same time: Sir Tor, putative son of a cowherd, actually son of Pellinor, who raped his mom, and Sir Gawaine, already plotting revenge against that same Pellinor on account of having killed his father Lot.
There follows the wedding, and the Adventure of the White Hart. Gawaine, Tor, and Pellinor are each assigned a quest by Merlin to bring back a white hart, a dog and a knight, and a lady and another knight, respectively.
Gawaine’s quest doesn’t go well at all (he comes off terribly in Malory as a rule; I always have to go and reread The Green Knight afterward). He fails to show mercy when he should have, and accidentally kills a lady, and is thereafter required to be particularly solicitous of them in his future career. Tor has a nice successful little adventure, which is as a consequence rather dull.
Pellinor’s adventure is complicated, and his overall success is marred because at its outset he ignores a woman crying for help for her wounded lover, and both of them die. Merlin later tells Pellinor that the woman was his own daughter (Pellinor has more random kids than anyone else in this book), and Pellinor will be betrayed by someone he trusts as a result.
Arthur hands around some post-nuptial largesse. All of the knights promise not to do murder or treason or cruelty, to be merciful, to always protect ladies, and not to take part in wrongful quarrels. They frequently fail in these promises in the books to follow, especially that last one, and while there are kinda-sorta consequences sometimes, there isn’t a strong moral flavor to most of these tales (except the Grail quest, which is quite a different animal from the rest of them).
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
How to Break In a Reed? Steps and Tips for Breaking In a Reed
Breaking in a reed is an important part of extending its lifespan and making sure it plays optimally, but like any given technique, some ways are better for breaking in a reed than others.
In this article, I’ll give you detailed steps for and the best tips on how to break in a reed for the easiest execution and most extended durability.
5 Steps for Breaking In Reeds
1. Make sure you wet the reed thoroughly, whether in a glass of water or in your mouth while playing.
2. Play the reed for a minimum amount of time. Just a minute is excellent, and the max should be 10.
3. Repeat step 2 over the course of several days, making sure to leave the reed to dry after each play in a storage container.
4. Repeat steps 2 and 3 over the span of 4 to 7 days, adding increments to the duration that you spend playing your reed.
5. Decide whether you want to keep the reed in your rotation or not after you break it in.
4 Tips for Breaking In Reeds
1. Make sure to go through long times, arpeggios, scales, and so forth at dynamic levels, but in moderation.
2. Don’t try exhausting techniques like extended ones or altissimo.
3. Mark the reeds that are in the breaking in process. Also, make sure to leave marks that denote the days spanned in the process.
4. Don’t immediately decide that you love or hate the reed until the breaking in process is done. The best baritone, tenor, soprano and even best alto sax reeds -the ones found in abundance- take some time to start working properly.
Related: Rico vs. Vandoren Brands Comparison
What the Process of Breaking In a Reed Entails
First things first, it’s important to understand that when you break in a reed, the process actually happens over the span of a couple of days. The first time a reed is played is when it’ll absorb most of the moisture it will retain by and large, and that’s why waterlogging is easiest when you’re using a brand new piece of equipment.
During your first use, you shouldn’t play the reed for more than 10 minutes, preferably stopping at 5. Then, you can extend that period day by day until the reed is ready and fully playable. In total, the process takes around 4 days and up to a week, so it would be time-efficient to break in several reeds at a time. However, that’s not the most hassle-free process either, and I prefer breaking in a new reed just as I feel that my old one has stopped working or destabilized.
Why Do I Need to Break In My Reed?
The simple reason is that breaking in your reed extends its lifespan. But not only that, a reed’s playability and sound can change a lot with the first few times you play it. So, the process is like training your reed to get wet and dry without losing its consistency.
That’s why the first couple of times that you play your saxophone with a new reed aren’t enough to finalize your opinion of whether it’s a good one or not. With every play, the changes in how the reed plays gradually decrease until there aren’t any discernible differences between one playing session and the next, as long as your provide proper maintenance.
Final Thoughts
When you purchase a new set of reeds, make sure that you break each of them in, and you might break in multiple reeds at once.
Make sure that even if you don’t like how the reed plays, keep trying, or store them again in the plastic bag and return to them after a good period has passed. Only then should you dismiss a reed completely, as if it doesn’t sound right even after breaking it in and after it’s been played several times to no avail. |
Evidence Based This post has 92 references
4.6 /5
Alkaline Water Hype vs. Potential Benefits & Side Effects
Jonathan Ritter
Puya Yazdi
Medically reviewed by
Popularized by celebrities and advertised for multiple health benefits, alkaline water is a controversial topic. Some practically see it as the elixir of life, while for others it’s just over-hyped snake oil. But is there a middle ground? Are any of its purported health benefits backed by science? Read on to find out.
What Is Alkaline Water?
In a nutshell, alkaline water is water that is less acidic than regular drinking water.
Water can be alkaline:
• Naturally: when it comes from a well or spring rich in alkaline minerals. An example is the water from the Zamzam well in Saudi Arabia, with an average pH of 8 [1].
• Artificially: when it’s made alkaline with additives, filters, or electric devices [2, 3].
The potential effects of alkaline water are based on the same principles as the alkaline diet – the “acid-ash” hypothesis.
According to it, the protein- and grain-rich Western diet increases acid production in the body, which supposedly leads to osteoporosis and other health issues when the body attempts to compensate. Advocates hold that an alkaline diet based on fruits, vegetables, nuts, and legumes would decrease acidity and prevent these disorders [4].
Although the alkaline diet promotes eating several healthy foods, no scientific evidence backs up the acid-ash hypothesis. Additionally, this diet can reduce the acidity of urine but not of blood because the body has its own balancing mechanisms. Several reviews and meta-analyses concluded that the alkaline diet doesn’t prevent osteoporosis [5, 6, 7, 8].
Alkaline water has been popularized by celebrities, athletes, and their trainers in recent years. Despite the shortage of studies, proponents of alkaline water claim that it can help:
• Delay aging
• Boost the immune system
• Cleanse the colon
• Improve hydration and recovery after exercise
• ‘Detoxify’ the body
• Lose weight
• Prevent cancer
• Improve skin and hair health
What Does pH Mean?
Since we’re talking about the effects of alkaline water, it’s important to understand what pH – used to measure how alkaline or acidic something is – means.
pH (short for ‘potential of hydrogen’) is a measure of the acidity or alkalinity of a solution based on its concentration of hydrogen ions.
The pH scale ranges from 0 to 14, with 7 being the “mid” or neutral value. To get a bit more sciency, an increase of 1 pH unit reflects a ten-fold decrease of the hydrogen ion concentration and vice versa.
Substances with a pH below 7 are considered acidic, while those above this value are alkaline. For instance, common acidic substances include vinegar (pH 3), lemon juice (pH 2), and battery acid (pH 1), while baking soda (pH 8), milk of magnesia (pH 10), and bleach (pH 13) are alkaline.
The Body’s pH and Acid-Base Balance
The body needs to maintain the pH of many of its fluids within an extremely narrow range (7.35 – 7.45) to ensure proper functioning. Outside this range, red blood cells can’t transport oxygen, proteins can’t achieve their proper shape, and many biochemical reactions don’t take place [9, 10].
It’s important to tightly control the production and elimination of acids (mainly hydrogen ions and CO2) and bases (mainly bicarbonate) to stay within this range. Fortunately, the body has very efficient mechanisms to maintain its acid-base balance.
Breathing eliminates carbon dioxide (CO2) and lowers its concentration in blood. The kidneys take up bicarbonate from the urine into the blood and do the opposite with acids. Both the lungs and kidneys quickly respond to changes in blood pH and adjust the acid-base balance [11].
Imbalances in the production and elimination of acids and bases, often due to lung and kidney failure, shift the pH to values below 7.35 or above 7.45. The four main types of acid-base imbalances are:
What Is the pH of Drinking Water?
Pure water has a neutral pH of 7. Essentially, its alkaline (hydroxide) and acidic (hydrogen) ions balance out.
But drinking water comes from springs and wells. The minerals of rocks and soils are washed into the water as it flows through them. Some of these minerals raise the pH of water, while some others lower it [16].
Depending on their mineral composition, the pH of most drinking waters ranges between 5.6 and 8.5 [16].
What Does Alkaline Water Do?
Because alkaline water has a higher pH (ranging from 8 to 10) than plain drinking water, it may help reduce excess acids in the body [17, 18, 19, 20].
Ionized alkaline water is a mix of hydroxide ions and hydrogen. The hydroxide ions make it alkaline, while the hydrogen ions are antioxidants. Several suggested effects of ionized alkaline water seem to be related to its antioxidant activity rather than to its alkaline pH.
This type of water neutralizes free radicals and activates the enzymes that break free radicals down, possibly reducing the damage they can cause to cells [21, 22].
The hydrogen of ionized alkaline water favors the growth of “good” gut bacteria (which can use it as a nutrient) over the “bad” bacteria (which are killed by it). This may improve digestive function while preventing microbiome imbalances and infections [23, 24, 25, 26, 27].
• Few adverse effects
• May help with acid reflux
• Ionized alkaline water may be antioxidant
• Rich in minerals if naturally alkaline or alkalized with electrolytes
• Insufficient evidence for most benefits
• Multiple fraudulent or over-hyped claims
• More expensive than regular water
• Filtered and ionized water may be poor in electrolytes
• Ionized alkaline water may contain platinum particles
• Bottled alkaline water is worse for the environment
Possible Benefits of Alkaline Water
Several studies have attempted to confirm or debunk the health claims made by alkaline water proponents. In any case, note that most potential benefits remain scientifically unproven and the FDA doesn’t approve alkaline water to treat any conditions.
Possibly Effective for:
1) Acid Reflux
It was long thought that only stomach acid is to blame for the esophagus damage people with acid reflux experience. However, the digestive enzyme pepsin seems to play a bigger role than previously realized [28].
Pepsin, however, is most active in an acidic environment. Alkaline water inactivated pepsin in test tubes. Together with a Mediterranean diet and reflux precautions, alkaline water also reduced reflux symptoms as effectively as conventional drugs (proton pump inhibitors) in 2 observational studies on almost 300 people [28, 29+, 30, 18, 31].
Due to its high pH, alkaline water may also neutralize stomach acid in a similar way to baking soda and antacids.
All in all, limited evidence suggests that alkaline water may help with acid reflux. You may try alkaline water if you and your doctor determine that it could help you with this condition.
2) Improving Hydration Status
In 4 clinical trials on almost 200 people, alkaline water improved some measures of hydration after physical exercise better than regular water. Specifically, it reduced the thickness and protein levels of the blood and increased the retention of water. As a result, it increased the production of less urine that’s higher in salt [32, 19, 20, 33].
Although limited, the existing evidence suggests that alkaline water improves hydration better than regular water after exercise. However, drinking regular water may be sufficient (and cheaper) in most cases. In addition to drinking water, it’s also important to replace the electrolytes lost due to physical exercise and sweating.
Insufficient Evidence for:
1) Accelerating Exercise Recovery
Intense physical exercise causes lactate buildup and raises blood acid levels, which may increase fatigue and delay recovery [34+, 35].
In 2 clinical trials on 52 athletes, naturally alkaline water increased physical performance and lactate breakdown compared to regular water [19, 20].
Similarly, an alkalizing supplement (Alka-Myte) increased power and reduced heart rate, oxygen use, and blood lactate levels after exercise in a clinical trial on 24 skiers [36].
In aged rats, an alkaline solution improved physical performance and accelerated lactate breakdown after physical exercise [37].
To sum up, the evidence to claim that alkaline water accelerates exercise recovery is still insufficient and should be validated with further clinical research.
2) Digestive Issues
Adding to the benefit on acid reflux, alkaline water (at least 1.5 L/day) reduced pain, heartburn, fullness, and bloating in a clinical trial on 18 people with indigestion; it also reduced pain and discomfort in another trial on 27 people suffering from irritable bowel syndrome with diarrhea (IBS-D) [38+, 27].
In rats with digestive issues, bicarbonate-alkaline water improved digestive function, stomach emptying, and bowel movements. In mice, it prevented stomach injuries caused by alcohol [38+, 39, 2].
However, only 2 small clinical trials and a few animal studies support this benefit. Larger, more robust studies in humans are required to confirm these preliminary results.
3) General Wellness
In a clinical trial on 60 healthy people, ionized alkaline water (at least 500 mL/day) improved sleep quality and stool hardness better than purified tap water; it also improved an interesting measure of physical and mental fitness called whole-body reaction time – how quickly someone can respond to a sound or image trigger [40].
Additionally, ionized alkaline water slightly increased longevity in mice but not in flies [41, 42+].
A small trial and two animal studies (with opposite results) cannot be considered sufficient evidence that ionized alkaline water improves wellness and helps increase lifespan. Further clinical research is needed.
4) Diabetes
In a Chinese clinical study, ionized alkaline water lowered blood sugar levels. This study did not include a control group and we couldn’t access the study specifics, casting doubt on its implications [43+].
In diabetic rats and mice, ionized alkaline water reduced blood sugar and fat levels, increased response to insulin, and preserved pancreatic function [44, 45+].
Again, a poor-quality clinical trial and two animal studies are insufficient to claim that ionized alkaline water has any benefits at all for diabetics. Additional, higher-quality human research is needed.
5) Removing Toxins
Regular water has to be filtered and treated with antimicrobial agents prior to drinking. Unfortunately, antimicrobials react with organic matter (such as algae or microbes) and produce byproducts that might be toxic. These byproducts have even been associated with diseases such as bladder cancer [46, 47, 48, 49].
Natural alkaline water theoretically contains fewer of these compounds, since many of them are more likely to form in acidic conditions (such as haloacetonitriles, haloacetamides, and halogenic acetic acids). However, one type of harmful compounds (trihalomethanes) is produced under an alkaline pH [46+, 47+, 50, 51].
Using ionized alkaline water to wash foods – such as veggies and fruits – might break down and remove fungal toxins and pesticides according to a couple of studies [52, 53].
Further research should confirm if natural and ionized alkaline water effectively reduce the intake of these toxins.
Possibly Ineffective for:
Heart Health
Alkaline water is often advertised as a product that promotes heart health. Most claims are based on its higher potassium content; potassium can relax blood vessels, improve blood flow, and normalize the heart rate. However, there is no evidence to back up the claim that alkaline water will have these benefits [54].
In 2 clinical trials on over 100 people, ionized alkaline water reduced blood thickness and blood pressure better than regular water, which may lower the risk of excessive blood clotting and heart attacks [33, 43].
But animal studies warn us that alkaline water could be a dangerous fad. Ionized alkaline water increased heart tissue death and scarring in rats [55, 56, 57].
Based on the existing evidence, people with heart problems shouldn’t drink alkaline water before clinical studies determine its safety.
Likely Ineffective for:
The recommendation of eating an alkaline diet and drinking alkaline water for cancer is based on the misconception that tumors thrive under acidic conditions when acidification is actually a consequence of their growth [58, 59, 60].
A systematic review of 252 studies on acid-base balance and cancer found only one that was relevant and well-designed. This study (on over 27k people) showed that urine acidity doesn’t increase the risk of bladder cancer. This means that reducing urine acidity by drinking alkaline water is likely ineffective for preventing cancer [61, 62].
Similarly, a review of 13 non-clinical studies on the alkaline diet found no evidence for its anticancer potential [63].
The alkaline water from the Zamzam well is one of the complementary anticancer therapies most commonly used in Muslim countries. However, its use is due to religious rather than medical reasons since the well is believed to be blessed by God [64, 65, 66].
Alkaline water only killed and stopped the progression of the following cancer types in a few animal and cell-based studies:
To sum up, alkaline water (or eating an alkaline diet) is most likely ineffective to treat and prevent cancer. Do not under any circumstances attempt to replace conventional cancer therapies with alkaline water or an alkaline diet.
Bone Health
In 2 small trials on 69 women, bicarbonate-alkaline water (1-1.5 L/day) lowered two markers of bone calcium loss (blood levels of degraded collagen and parathyroid hormone) better than more acidic water [71, 72].
However, a meta-analysis of 55 studies couldn’t find any evidence that acid intake increases the risk of osteoporosis nor that alkaline diets and water protect the bones from this condition [6].
Based on the existing evidence, alkaline water is most likely ineffective to prevent bone loss. Do not use it to replace proven therapies for osteoporosis.
Animal and Cell Research (Lack of Evidence)
Very few animal studies have investigated other potential benefits of alkaline water. Their results are preliminary and may not be the same in humans.
Gut Health
Gut microbiome imbalance may cause the bad bacteria to flourish, possibly triggering a host of metabolic and mental health disorders [73, 74].
In animal studies, ionized alkaline water stimulated the growth of the bacteria that increase cholesterol use, protect the liver, and boost the immune system; it also lowered those that cause diarrhea and infections [24, 25, 26].
Reducing Obesity
In mice and rats fed a high-fat diet, alkaline water reduced weight gain, blood fat levels, and fat buildup in the liver [75, 76, 77].
Metabolic Acidosis
In dogs and rats with metabolic acidosis due to kidney failure, ionized alkaline water raised blood pH (by increasing bicarbonate and reducing CO2 levels) [17].
Is Alkaline Water Really Good for You?
Since healthy people can naturally maintain their acid-base balance (contradicting the acid-ash hypothesis), the high pH of alkaline water may only benefit those with excess acids due to health issues or strenuous physical exercise.
It’s important to note that acidosis often indicates serious conditions. People with suspected acidosis shouldn’t try to improve it with alkaline water but consult a doctor immediately.
Evidence suggests that alkaline water is more effective for hydration. There’s no doubt that staying hydrated is key to maintaining good health. But simply drinking regular water is sufficient in most cases. And people with severe dehydration due to intense physical exercise or heavy sweating will need to replace the lost electrolytes in addition to drinking water.
The hydrogen in ionized alkaline water may confer antioxidant activity and explain several of its purported benefits. Because most of these have only been tested in animals and cells, further studies in humans are needed to confirm them and evaluate if the real contribution of alkaline water to health justifies its higher cost.
Alkaline Water Side Effects
Theoretically, alkaline water in excess could raise the body’s pH too much and cause alkalosis. The main symptoms of alkalosis are [78, 79]:
• Nausea, vomiting, and stomach pain
• Increased breathing rate
• Irregular heart rate
• Muscle tremors, twitching, and tingling
• Confusion, seizures, and even coma
Drinking too much alkaline water may also neutralize stomach acid, which is required to digest food, absorb some nutrients, and kill infectious microorganisms [80+].
However, no cases of metabolic alkalosis or low stomach acid have been linked to drinking alkaline water. This is probably because the acid-base control mechanisms of the body are very effective.
If water is made alkaline by enriching it with calcium, it may increase the risk of developing kidney stones [81].
A potential danger of buying concentrated pH drops to alkalize water is that they can cause burns in case of accidental contact with the skin [82+].
Electrolyzers may release platinum particles into the water when their electrodes get old. Although platinum toxicity at the levels potentially found in ionized water is unknown, excessive exposure to this metal may cause skin allergies, respiratory issues, and kidney damage [83, 84+, 85, 86+].
In rats, alkaline water caused heart muscle cell death and tissue scarring [55, 56, 57].
Alkaline water accelerated weight gain and development of the cubs in pregnant and breastfeeding rats, possibly due to an increased electrolyte (especially calcium) content in breast milk. However, it reduced growth in adolescent (6-week) rats [87, 88, 89, 90, 91].
Pregnant and breastfeeding women should avoid alkaline water due to the lack of clinical safety data.
Limitations and Caveats
Study Design
Except for its effects on hydration and physical recovery, the health claims linked to alkaline water have been tested in very few human studies or only in animals and cells.
Additionally, most human studies had a small number of participants. Therefore, more clinical trials with larger samples are required to validate these preliminary results.
Other limitations in the design of the studies include:
• Obtaining the data mainly from subjective questionnaires [40]
• Combining alkaline water with healthier diets and habits, making the contribution of alkaline water difficult to estimate [18, 31]
• Using control water with a totally different electrolyte composition [19, 20]
Different studies on the use of alkaline water for longevity, cancer, and heart and bone health had contradicting results. Further investigation is required to clarify them.
Funding and Conflict of Interest
Some studies were funded by companies selling alkaline water (Glacier Water Company, Uliveto, Danone, Essentia, and Evian) or electrolyzers (Asiagem). Others included workers or consultants of companies selling electrolyzers (Panasonic and Restech) among the authors [32, 2+, 72+, 33, 71+, 41, 40, 92].
How to Make Alkaline Water
In addition to buying bottled alkaline water, it’s possible to make it at home from regular tap water and reduce the production of plastic waste.
The cheapest way is to add substances that make water more alkaline. You can add a ⅛ tablespoon of baking soda or lemon juice (which is acidic but is broken down to alkaline byproducts when digested) per cup of water. Concentrated alkaline pH drops are also available.
You can also buy an alkaline bottle or pitcher. Bottles contain beads that release alkaline salts into the water. In turn, pitchers include filters claimed to remove not only acidic electrolytes but also possible contaminants and chlorine (which changes the smell and taste of water).
A more expensive possibility is to install an alkaline water filter or reverse osmosis system in your home. It removes the salts that make water acidic and many impurities. Its price and the fact that it may also remove beneficial minerals from water are its main drawbacks.
Finally, you can use an alkaline water machine (water ionizer or electrolyzer). This expensive device uses an electric current to split water into an alkaline and an acidic solution. It’s normally attached to the faucet and has one hose for each solution. You can use alkaline water to drink and cook and leave acidic water to clean the dishes or wash your hands [3].
Alkaline Water Brands
Some of the main commercial brands of alkaline water are:
• Flow: naturally alkaline water with a pH of 8.1
• Icelandic Glacial: naturally alkaline water with a pH of 8.4
• Evamor: naturally alkaline water with a pH of 8.8
• Essentia: ionized alkaline water with a pH of 9.5
• Perfect Hydration: with added electrolytes and a pH of 9.5
• Phure: with added electrolytes and a pH of 9.5
• Alkalife Ten: with added electrolytes and a pH of 10
Alkaline Water Reviews
The opinions expressed in this section are solely those of alkaline water users who may or may not have medical or scientific training. Their reviews do not represent the opinions of SelfHacked. SelfHacked does not endorse any specific product, service, or treatment.
Because users normally buy alkaline water expecting long-term benefits, most reviews (either good or bad) focused on the taste, composition, price, tested pH, packaging, and delivery service – as they would for regular bottled water – rather than on observed effects to rate the different water brands.
Only users with acid reflux experienced immediate benefits of alkaline water. In general, they were satisfied with the results and reported improved symptoms.
Those who bought a pitcher or bottle were generally happy that they could stop buying bottled water for a reasonable price. Issues with the filter and bad taste of the water were the negative aspects most commonly reported. In the case of bottles, some users also complained about their size and ergonomy.
Users of alkaline water machines were normally happy and those who weren’t mainly complained about the taste of the water, problems to install these machines, and (especially) about their high price.
In the case of Kangen electrolyzers, many people complained about the company. Bad customer service, unscrupulous sellers, and abusive fees were the most common issues.
Alkaline water is water that is less acidic than regular drinking water – either naturally or through alkalizing procedures. Currently a growing trend popularized by celebrities, alkaline water is often advertised as a miracle product that will increase your general wellbeing, detox your body, and improve several health conditions such as acid reflux, obesity, and even cancer.
Unfortunately, many of these claims haven’t been proven or are directly based on erroneous science interpretations.
Although healthy people can regulate their acid-base balance without any additional aids, this water may help those with excess acids due to health issues or strenuous physical exercise. In the case of ionized alkaline water, its antioxidant activity has some promising benefits that need further investigation.
About the Author
Carlos Tello
Carlos Tello
PhD (Molecular Biology)
Carlos received his PhD and MS from the Universidad de Sevilla.
Click here to subscribe
1 Star2 Stars3 Stars4 Stars5 Stars
(11 votes, average: 4.55 out of 5)
FDA Compliance
Leave a Reply
|
How To Recognize Type 2 Diabetes Symptoms
There are ways to feel look and feel healthy even with diabetes. Elevated levels of blood glucose lead to spillage of glucose into the urine. Diabetes mellitus is characterized by disordered metabolism and inappropriately high blood sugar resulting from either low levels of the hormone insulin or from abnormal resistance to insulin’s effects coupled with inadequate levels of insulin secretion to compensate
The future threats include ketoacidosis and the body soon initiates the breaking down of muscle tissues which results in reduced body weight. The problem is when you keep eating too many carbs. To remove the sugar from your blood, your islet cells make insulin and the sugar goes into your fat, muscle and liver cells for storage. Dehydration also is another symptom of Type 1 disease which can lead to coma and death at a later stage. They pored over the literature and found ten studies to analyze as one stand-alone large study
That was the start of the successful controlling the disease. In 1960, the chemical structure of human insulin was determined and in 1979, the human insulin was created by genetic engineering. The key thing to remember is that when you run, your body is working much harder than in your normal daily activity. It reduces body weight and decreases the chance of getting obesity
In type 1 diabetes, which commonly starts in childhood, the pancreas stops creating insulin altogether. However, the good news is that most of these type 2 diabetes complications can be avoided through lifestyle changes. On the surface of the body’s cells, there are special places called receptors, where the insulin normally attach itself
It is important to note that these symptoms will not resolve themselves. A situation where the blood glucose is higher than normal, but not yet enough to be diagnosed as diabetes. Vision Impairment – An increase in blood volume caused by high blood glucose levels can lead to swelling of the eye’s lens. In June of 2018, the journal Endocrinology Diabetes and Nutrition reported on a study that compared twins and singletons born from women with the condition. Journal of Perinatology reported on an analysis of earlier studies conducted at the Royal North Shore Hospital and other research facilities in Sydney, Australia
signs of diabetes
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
// Patrick Louis
Default Unix Programs
Ancient door (Transcript of the podcast)
Welcome to hell, choose your default program!
Welcome to hell, choose your default program! You’ll soon learn in this podcast why this subtitle was chosen. Let’s go, follow my train of thoughts and don’t get lost.
The default programs…
What’s a default program? Default for what? What’s does default even mean? Probably something that happens without your interaction, a choice made for you when you don’t want to choose.
The usual normal most plausible way of handling things.
That sounds like a good definition. So a default program is chosen automatically to launch something. But launch what exactly, files… there’s really nothing else on Unix. So default programs launch files.
Fair enough, that’s simple so far.
Now let’s go back in time.
Environment variables
The first thought that came to mind when thinking of default programs was environment variables. I dedicated a podcast episode to environment variables in the past, you can go back to it for more info.
Ok, so why did I think of that. Remember there’s something very common on the command line because everything is text, text editors obviously. There are two environment variables that uses those, they are for the default choices: EDITOR and VISUAL. The difference is that visual is for full screen editing, like emacs and vim, and editor is for advanced terminal editing, like ed So Editor is more command line oriented and visual more visually oriented. Programs that want to open a text file will refer to those environment variable as the default text editors.
Another of those prevalent thing on the CLI, is the shell itself. And that’s, in my opinion, the oldest and first kind of “default program”. The default shell is chosen via the chsh utility.
We’re also executing things on the CLI. We know they are executable because they have the executable bit set. But what about scripts like shell or perl scripts for example. How’s the default handling for that, with what are they executed?
That’s what the env utility is helping with, selecting the most appropriate default environment to run the program in. Its main usage is to modify the environment however most of the time env is used at the top of scripts in a “shebang”,
So this #! mechanism origins from Bell Labs, between Version 7 and Version 8, and was then available on 4.0BSD (~10/’80), although not activated per default.
, to launch the correct interpreter, the environment isn’t really changed here. How does it achieve that: by searching the PATH environment variable.
We had quite an argument about it on the forums, you can read our opinions. The core of the argument was about the issues related to env, actually it was a thread that linked to a blog post, and usually blog posts are for nagging.
The problems the author of that post were about his concern that the PATH environment variable might not point to the right interpreter and that env can only take one flag/argument, amongst other things. But isn’t that what a default program launcher should do, get the first most appropriate program to run it, get the best env in this case, that’s what we’re using it for: launching with the current environment defaults.
So that’s for scripts.
New complex world?
Nowadays we don’t only have one simple sort of text file, and not only text files, we have binary data, images, etc. We need to open those. And enviroment variables aren’t the way to go. It’s too inflexible, it’s too stiff, it’s exactly what another operating system uses. There are way too many file types.
I’ve linked a little list in the show notes to give you an aperçu.
How is that handled? Unix doesn’t have file types at the kernel level like other OS such as windows (Windows actually uses the registry for the association, similar to Linux’ binfmt). That’s partly because of the use of ELF which don’t include it inside, it doesn’t have to examine the extension to know that a file is executable for instance or that it’s an image. File extensions are not imposed.
We also don’t have to do, most of the time, the association manually like other operating systems. It seems to happen magically…
Media Types
Then how the hek do you know what type or format is a file and how to open it? That’s where media types enter.
What are they? Wiki def?
A media type (also MIME type and content type) is a two-part identifier for file formats and format contents transmitted on the Internet. The Internet Assigned Numbers Authority (IANA) is the official authority for the standardization and publication of these classifications. Media types were first defined in Request for Comments 2045 in November 1996, at which point they were named MIME (Multipurpose Internet Mail Extensions) types.
So it’s a file format or content or type identifier that uses a standard format called RFC 2045. Simple enough.
History wise the name MIME, Multipurpose Internet Mail Extensions, format comes from the email format in RFC 822, it’s a meta-format to embed information within this format, don’t confuse it with MIME types, that mean something else today because they’re used outside emails.
What does that look like this format? A media type is composed of a type, a subtype or extension, and optional parameters, the type and subtype are separated by a slash.
So it looks like Type/Extension, for example, an HTML file might be designated by text/html, or for pdf: application/pdf, For png images: image/png
The first part is the more abstract top-level while the second part of the MIME-type is expanding faster, for example with new applications or data encoding standards.
Actually the currently registered top-level type aren’t that many, let’s name them: application, audio, example, image, message, model, multipart, text, video.
It’s very nice to have a standard for categorizing file types but so what, how does that help, how is it used across the system.
Let’s open useful parentheses and talk about the role the freedesktop organization.
In sum, they have standards for all the little details of a full fledge desktop environments. From where the recycle bin is to how windows should communicate.
From that definition we might think that it’s totally X specific. Meh, that’s sorta’ comprehensible but still. How do they put this in place.
First they have a list of standards you can read about online, they’re not boring at all, which is surprising. Other than that they have a bunch of utilities: The relevant ones for this podcast are:
• shared-mime-info which is a huge database of common mime type info, which we’ll discuss in a bit
• libmimetype which let you interact with mime types
• and the xdg-utils which are the implementation of a bunch of desktop functions such as interacting with the mimes in our case
Notice that xdg in front of util, that’s because that once was the name of the freedesktop.org, they were formerly known as the X desktop group.
Let’s go back on topic and talk about how does the system handles and knows that a file is of a certain mime type and execute it.
Here’s the generic overview of how it’s solved: The mime type of found for the file and then there’s an association between the mime type of the file and something that executes it, which is the desktop entry.
Detection of type
The first step involves detecting the file type. There are two common ways of determining the file type:
• using the so-called “magic bytes” at the start of the file
The first method is very simple and fast, but inaccurate if the file is not named “correctly”. The second is more accurate, but slower. So yeah, there’s a list of extensions and of magic bytes that comes with the freedesktop package I mentioned earlier, shared-mime-info.
So on the system there’s a database of MIME-type information with default generic mime info and new ones registered via the installed applications’ .desktop files which we’ll discuss later, for now just remember that desktop entries are a sort of meta or description of the executables. The location of that mime database is usually in /usr/share/mime/ for the global database and in ~/.local/share/mime for specific user database. The default huge fill up standard MIMEs from freedesktop are in: /usr/share/mime/packages/freedesktop.org.xml
Warning: The database files are not meant to be edited directly. But if you ever happen to want to edit them manually or add a new entry you can use the:
OK, so from that we know how we can tell which mime type a file is. Yet, we didn’t talk about default programs to execute those types yet so let’s do that.
Lookup process
The lookup process happens in two directions.
On one side you have the list of applications with the list of mime types they can handle and on the other side you have the list of mime types with the default application to execute it.
The definition for the application metadata is stored in something called a desktop entry.
Desktop Entries
Let’s start with the first way: Applications with the list of mimetypes they support. You can find those desktop entries in the location /usr/share/applications for global ones or in .local/share/applications for user specific ones. They are the files that end with the extension “.desktop”.
I won’t discuss the format of that file but I’ll just say this: This file has a lot of metadata about the applications, from the icon, to the executable, to if it needs a terminal (and will open in the default set terminal emulator), to its category, and what interests us the most the supported mime types.
So yeah, the desktop entries can have a list of supported mime types it can handle.
But it would be too much of a pain to loop through all those files to know which applications open which file type. Thus, there’s a simplified file in the same directory called mimeinfo.cache that contains just that, all the mime types with a list of the applications that supports it.
The [MIME cache] group.
Here’s the big deal, a file manager can show you that list of supported applications when you want to open a file, or just refer to the first one in the list as default when it’s not specified.
Nota bene here, if you want to add your own desktop entries you’ll have to update that database by running:
That is also automatically run by the package manager when a new application is installed, updated, or removed.
There are also more specific mime settings per applications that are stored in .keys files and .mime files located in /usr/share/mime-info but this is beyond the scope of this podcast.
Now talking about defaults let’s mention that everything in this podcast, all the settings and programs can be set as default for new users if changes are done in /etc/skel, the skeleton used for new users home directories.
Some commands that are useful with desktop files are: desktop-file-install, desktop-file-edit for the installation and edition of desktop files .application and .desktop
Mime type to desktop entry
Back on topic! How do we do the reverse, mime types to desktop entry.
We indicate that in the file mimeapps.list (now defaults.list) in a group called [Default Applications], haha, finally talking about default applications for a given mimetype.
Remember in the last section we said that in the file mimeinfo.cache we were filling the [MIME cache] group, it’s the same notion of grouping here. The mime types followed by an equal sign and a list of semi-colon separated desktop entries files.
When a program is executed it’ll try the first entry and move to the next if there was an issue.
Remember we also said that desktop entries can have the setting terminal set to true or not and that it’ll launch it with the default terminal, that’s where it’s set. The exo-terminal-emulator.desktop on XFCE.
There could be many mimeapps.list (defaults.list) around the system in different locations:
• system-wide,
• per-user,
• custom locations used by some programs and desktop environments
If an entry isn’t found in one, it moves to the next. If no entry at all is found it falls back to the method mentioned in the previous section, using the most-preferred desktop file associated with the mimetype.
As a note, the mimeapps.list can have other sections such as [Added Associations] and [Removed Associations] both for whitelisting and blacklist mime type/desktop association.
Let’s review some common order that the things are looked up. The lookup order for this file is as follows:
$XDG_CONFIG_DIRS/mimeapps.listuserusersysadminsysadmin and ISV overrides
$XDG_DATA_HOME/applications/mimeapps.listuserusersysadminsysadminforfor compatibility, deprecated
$XDG_DATA_DIRS/applications/mimeapps.listuserusersysadminsysadminforfordistributiondistribution-provided defaults
After the mimeapps.list is checked, it moves the desktop files.
Another thing that you should take in consideration here and where the real mess starts is when desktop environments wrap up default applications inside desktop files.
For example XFCE has the utility exo-open and exo-preferred-applications to set the default applications for certain tasks. All the tasks point to desktop entries that start with exo- For instance, exo-web-browser.desktop And in that file it simply calls:
exo-open --launch WebBrowser %u
Where does exo-open fetch the default program from, who knows… I found that it’s in: ~/.config/xfce4/helpers.rc And it took me a while to find that it was there.
If you thought that was hell then you need to hear that this differs from DE to DE. The worst thing is that they might interfere with one another.
Debian Alternatives System
Currently with the XDG there’s no way to set the default program for a generic behavior, such as web-browser,text editor, etc..
Debian alternatives system aims to solve this using symbolic links in the /etc/alternatives directory, along with tools to manage this such as update-alternatives.
This will create executables such as x-terminal-emulator, x-www-browser, and x-window-manager.
The issue of common behavior to handle a certain task is still left barely untouched.
Some have brought the concept of being able to select the type of actions a certain program should be able to do on a medium: open, read, write, edit, etc.. This can be seen as “intents”, a dbus interface with a contract for generic actions that can be added to desktop files (like android).
This is available these days via xdg-desktop-portal, standard dbus interfaces to allow containarized applications to interact with the rest of the desktop.
Making Changes
What about making changes to set the default program. I recommend backing up or only doing it at a user level to not mess things up.
You could update the mimetypes and desktop files. Or you could use the program that comes integrated with your DE. Or I’m not sure of it but you could use other kinds of graphical wrappers.
There are a bunch of useful commands you may need:
Utilities, commands, tools
* Freedesktop
~ > update-desktop-database
~ > xdg-mime query filetype default_program_unix.markdown
~ > xdg-mime query default image/png
~ > xdg-mime query default inode/directory
~ > xdg-settings get default-web-browser
* BSD command
~ > file --mime-type podcast/
* perl scripts
~ > mimetype default_program_unix.markdown
~ > mimeopen default_program_unix.markdown
* fish shell
~ > mimedb
There’s also a gui called selectdefaultapplication that is available.
Flexibility, not hardcoded in the OS. The lookup is a link between mimetype and desktop entries
–(Show Notes)–
• Charles Latham (1847-1912) / Public domain
|
Aruncus Sylvester
Rosaceae/Rose Family
Goat's Beard grows in moist, open woods, meadows and along streams; mostly in coastal areas. It is a tall (3-5') plant with a reddish stem. The leaves are compound and sharply toothed with serrated edges. The cream-colored flowers are tiny and grow on long branched spikes above the leaves.
The genus Aruncus is from the Greek aryngos which means goats beard and refers to the large, fluffy, white flower clusters.
Aruncus sylvester Goats Beard Botanical Gardens 0007
Explore Further |
Spraying problem?
Urine spraying
Urine spraying is a common behaviour in cats. Unlike toileting, spraying is carried out with the cat standing up and pumping out small jets of urine on to a vertical surface. Spraying is behaviour similar to facial marking for the cat; it is a way of leaving a scent mark in the environment. In entire toms and queens, it is used to attract members of the opposite sex, but it also occurs in neutered cats of both sexes. Whereas facial marking is used where cats feel relaxed and happy in their environment, cats will use the urine spray scent to indicate those parts of their territory where they feel anxious or insecure. In most cases this will be where there is an overlap in territory between neighbouring cats or between cats in the same household that don’t see each other as part of the same social group. The spray mark is like a ‘warning message’ to the resident cat to be careful in that part of their patch. Because it is a message, it makes sense for the cat to go around and check up on its marks, topping them up if they have faded.
Situations where cats may start to spray are:
• The cat is living with too many other cats in close quarters. Too many cats in too small an area can often be highly stressful for the animals, and they will seek their own personal space. Providing each cat with its own ‘core area’ where its food, water, litter tray and toys are kept, will help reduce the amount of conflict in a household, as cats will need to pass each other less in order to get the things that they need. If only one of the cats in a household is a sprayer, then it may benefit from a less crowded living environment in another home, or even being the only cat. Prospective new owners should consider the number of cats they already have before taking any more.
• The cat is feeling threatened by other cats in the neighbourhood. A neighbour’s cat coming in or peering in through the cat flap can intimidate a cat. As before, the cat should be given its own safe spot in the house, totally undisturbed, to which it can retreat when under pressure. If the cat flap is the source of stress it can be locked when the owner is not around, to ensure that ‘foreign’ cats cannot come in, or it can be dispensed of altogether.
• Other changes in the house are causing insecurity. Cats can also start to spray for other reasons, for example, at the arrival of visitors, a new baby, builders, or even a new scent entering the house on a person’s feet. Sometimes cats are disturbed by changes in their owner’s routine, or are upset by inconsistencies in their owner’s behaviour.
• Attention seeking. Although spraying will always start for other reasons, cats can sometimes learn that spraying is an effective way of getting a reaction. This is particularly the case with Oriental breeds of cats, but can also happen with non-pedigrees. In these cases the spraying usually starts for other reasons, but the cat learns over time to use the behaviour to get human attention.
It is important not to get angry or punish a cat for spraying. It is unkind but also counterproductive. It will make the cat more stressed, anxious and insecure, meaning it will be even more likely to spray in an attempt to relieve such feelings.
If a cat has suddenly started spraying in inappropriate places around the home, the first step is to have it checked by a vet. This is particularly important if there is nothing new or potentially stressful in the cat’s immediate environment that could be responsible for the change in behaviour, such as the arrival of other cats in the neighbourhood. A vet will be able to investigate whether there is a medical reason for the spraying. If no medical cause is found, the condition can be treated as behavioural.
Treatment of spraying
In the treatment of urine spraying, it is essential to identify the reason why a cat is spraying and deal with this. In addition, it is important to stop the ‘topping up’ of existing marks as the cat patrols around.
Suggested cleaning regime
• Clean the area thoroughly. Most popular household cleaners are unsuitable, as they contain ammonia and chlorine. Both of these compounds are found in cat urine and therefore can make the problem worse. Wash any soiled areas with a warm, dilute solution of biological washing powder, which removes the protein components in cat’s urine.
• Rinse the area with cold water and allow to dry.
• Then spray or dab the whole area with surgical spirit (if the surface is suitable), which removes any fatty deposits in the urine, and leave to dry thoroughly.
• Some specialist products are specifically designed for cleaning up accidents and are available from pet shops or vets.
• Whatever you use, remember to do a small patch test on any material first to ensure that it will not be damaged.
• Do not allow the cat access to rooms or areas where this cleaning regime is being undertaken. It is sensible to restrict access for a couple of days if possible.
The use of commercially available synthetic pheromones (Feliway) has been found to be effective, in combination with behaviour therapy to resolve the reason for spraying. These products discourage the cat from ‘topping up’ previously sprayed areas by changing their perception of the area from one associated with anxiety, to one associated with comfort. This will only be effective if the cause of anxiety is dealt with at the same time.
More information and help is available here |
Unless you've healthily deleted all social media, on October 4th, you definitely noticed that Facebook, Instagram, and Whatsapp all went down. By the end of the day, you'd probably even heard the explanation. And while you read about backbone networks, DNS, BGP, routing software, and 5xx errors, your eyes probably glazed over, and the little scribe that writes your memories down just wrote, "Computers broke."
I don't blame you- I love this kinda tech stuff, and most of the reporting was bafflingly dull even for me! So, to set the record straight, here's a short, understandable explanation of what went wrong with Facebook on 10/4, good buddy.
Whatcha need to know going into this is that Facebook owns a lot of computers. I don't know exactly how many, but I'm going to go out on a limb and say a few more than you do.
The same way that you have to set up a router and modem in your home to have internet, Facebook has to set up their own internal network to get all of their computers to connect to the internet. I mean, theirs involves fiber optic that circles the globe, and yours is an ethernet cable you keep telling yourself you're going to pin to a wall, but the idea is the same. Facebook calls its internal network its backbone network.
The backbone network doesn't connect directly to the regular internet; it goes through two systems before anyone outside of Facebook could reach it. The first system it goes through is called DNS, and the second is called BGP.
No. I put it bold for a reason.
What are DNS and BGP?
Every couple of years, you'll hear about a site going down, and it will be linked to something called DNS. This means every couple of years, you'll see the term DNS and think, "I should really look that up!" before going back to enjoying your life. But now it's time to find out: what is DNS?
It all starts with a pretty basic concept that you probably take for granted- whenever you access a site online, a physical computer somewhere in the world has to send a signal to your physical computer. It can be helpful to imagine that the whole internet is a very fast version of regular postage- if your friend has a website you want, you write a letter to them asking for it and then they send a letter back to you with it inside.
But before you write a letter, you have to know where to send it. How does your computer know what computer to talk to? Well, at first, it doesn't. All it knows is it's looking for something called "facebook.com." So it reaches out to a computer that your router has heard of called a Domain Name Server. This is what DNS stands for. Domain Name Servers (there are lots of them) look at domains (such as facebook.com, cracked.com, anything you'd type in your URL bar to go to a website) and turn them into addresses. You've probably heard of an IP address by now- Domain Name Servers basically keep a list of domains and their associated IP addresses. If the DNS you reach out to doesn't know where to find a site, then it will reach out to a computer that does.
This basically.
Earlier I mentioned that Facebook has an internal network they call their backbone network. That network is private, meaning Facebook doesn't want all of their computers' IP addresses on other peoples' Domain Name Servers. So Facebook has their OWN DNS that everyone reaches out to, and their private DNS figures out where to send their request. This is pretty common for medium and bigger tech companies.
But Facebook is also ginormous, so in addition to its own DNS, it uses something called Border Gateway Protocol, or BGP. Remember when we talked about how DNS figures out the address of the computer you want to connect to? Well, keeping with the letter metaphor, once you write a letter, address it to your friend and drop it in a mailbox, someone has to figure out all of the logistics of actually getting that letter from one place to another. For the internet, that's BGP. BGP figures out the best route from your computer to the computer you're requesting a website from. Most companies do not have their own BGP computers- this is a system at the level of Internet Service Providers and ginormo tech companies. Unfortunately for Facebook, that includes them.
So, now you know what facebook's backbone network is, what DNS is, and what BGP is.
What the heck happened?
During a routine maintenance check, an engineer accidentally took down facebook's entire backbone network. All the computers were still on and working; they just weren't connected anymore.
Once the backbone network was gone, Facebook's DNS noticed that it couldn't find any of the computers that it used to have addresses for. It cheerfully updated itself to reflect that it couldn't find those domains and let Facebook's BGP computers know.
Facebook's BGP computers updated themselves to basically tell everyone requesting a facebook domain, "Sorry, you can't get there from here." Since there were no more paths to Facebook's computers, you had to spend the day just telling people you like them face to face. Like a barbarian.
And now, when someone talks to you about the Facebook outage, you can whip out your new lingo, ruin a conversation and lose a friend. Hooray! Technology!
Top Image: Hassas_Arts/Pixabay
Is Ad Technology Ruining the Internet?
Forgot Password? |
Coco Chanel's Life and Iconic Fragrance
Written by Leanna Serras
Coco Chanel was a fashion icon who had a tremendous impact on both women's fashion and the world of fragrance. Some of the fashions that modern women take for granted, such as the little black dress, were not considered acceptable before Chanel. Her designs are classic and easily recognizable around the world. To fully appreciate Chanel's contributions to the world of fashion, one must understand her history and the hurdles that the designer overcame on her path to success. Through two World Wars to the 1970s, Coco Chanel was a formidable, entrepreneurial spirit.
Coco Chanel's Life
The designer who would become known as Coco Chanel was born on August 19, 1883 as Gabrielle Bonheur Chanel in Saumur, France. Following the death of her mother, Chanel's father placed her in an orphanage. It was in the orphanage that she gained her sewing skills; however, sewing was not her first career. Before becoming a designer she was a singer, during which time she took on the name Coco. She began her career as a designer with the help of a male admirer who provided her with the financial backing that she needed to open a shop. This initial shop was in Paris and opened in 1913. Although this shop primarily sold hats, she was soon opening additional shops and began to make clothing primarily out of jersey. Unfortunately, Chanel's success stalled with World War II when she had to close shops during the German occupation of France. The designer was known to have had several lovers, some of whom were controversial. One such relationship was with Hans Gunther von Dincklage, a German officer who provided Coco with special privileges such as staying at the Ritz during the occupation. This raised questions and many believed that she was a Nazi collaborator. Following the war she was not charged with any crime and fled to Switzerland. She returned to fashion when she was in her 70s and with some effort became a successful comeback. The designer worked until her death on January 10, 1971.
Legacy as a Designer
Coco Chanel's clothing changed the way that women dressed in terms of fit and style. More menswear attributes were added from material to the cut as she helped women move away from tight-fitting and uncomfortable garments such as the corset. The collarless Chanel suit, which she introduced during the mid-20s, was one of her cutting edge contributions to fashion. Another addition to her legacy was the little black dress, the impact of which was compared to that of the Ford Model T by Vogue magazine. Prior to Chanel, black was reserved for funerals and times of mourning and wasn't worn as evening wear. Chanel, however, turned the black dress into something chic and fashionable. During the designer's comeback she reworked many of her previous designs to appeal to a more modern woman. This resulted in the return of the Chanel suit, which soon became a status symbol for wealthy women. Stand-out features of the Chanel suit included not only the collarless jacket, but also the golden chain sewn into the hem, which ensured that it hung properly, the gold buttons, and the braid trim. The quilted Chanel handbag with its golden chain shoulder strap is also a highly recognizable part of the Chanel fashion legacy.
Chanel No. 5
Coco Chanel's perfume, Chanel No. 5, was a first in many ways. One of these ways was that it was the first perfume to carry the name of the designer. Chanel believed that a woman should smell more like a woman than a flower. Unfortunately, many popular perfumes for women at the time were floral scents. She tasked Ernest Beaux, a perfumer, with creating her new scent. In 1921 Beaux presented her with samples that he had created. Coco selected the fifth sample. This was meaningful as the designer's lucky number was five. As a result she named the fragrance Chanel No. 5. In creating the packaging for Chanel No. 5, the double "C" monogram was created and turned into the highly recognizable Chanel logo. Chanel No. 5 became a huge success for her, and has since become one of the most popular and iconic perfumes in the world.
Battle for Control of Parfums Chanel
In 1924 Les Parfums Chanel came into being. The company was made possible courtesy of Paul and Pierre Wertheimer who were perfume manufacturers. Parfums Chanel was created as a way for Coco to expand her popular No. 5 fragrance. This collaboration gave the Wertheimers control of Parfums Chanel, as they had 70 percent interest, while Coco was given only 10 percent. This was an upsetting arrangement for Coco who also felt the quality of her perfume was sinking. When Germans came to Paris during World War II, the Wertheimers fled while Coco remained. In an attempt to regain control of her perfume company, Coco attempted to take advantage of the Aryanization laws that Germany had put into place in 1941. This would have allowed her to take the company from the Wertheimers due to the fact that they were Jewish and she was not. Before fleeing Paris, however, the brothers had left their interest in Parfums Chanel with Felix Amiot, a builder of French aircraft. Because Amiot was French and not Jewish, Chanel was unable to wrest control of Parfums Chanel. After World War II came to an end, the Wertheimers eventually bought out Coco, thereby taking control of the company. |
Rankin Lecture: Why topology is geometry in dimension 3
Nathan Dunfield ( University of Illinois at Urbana-Champaign)
Friday 1st December, 2017 16:00-17:00 Western Infirmary Lecture Theatre (WILT)
After setting the stage by sketching a few facts about the topology and geometry of surfaces, I will explain why the study of the topology of 3-dimensional manifolds is inextricably linked to the study of homogenous geometries such as Euclidean, spherical, and (especially) hyperbolic geometry. This perspective, introduced by Thurston in the 1980s, was stunningly confirmed in the early 2000s by Perelman's deep work using geometric PDEs, and lead to the solution of the 100 year-old Poincaré conjecture. I will hint at how this perspective brings other areas of mathematics, specifically algebraic geometry and number theory, to bear on problems that initially appear purely topological in nature, and conclude with a live computer demonstration of how geometry can be used to tell different 3-manifolds apart in practice.
Add to your calendar
Download event information as iCalendar file (only this event) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.