text stringlengths 144 682k |
|---|
Manipur's Independence and Merger Agreement 1949
The author explains how Manipur attained freedom from the British colonial rule and merged with India.
ByMilan Luwang
Updated on 26 Nov 2021, 5:13 am
Imphal, Manipur (Photo: IFP)
Imphal, Manipur (Photo: IFP)
Manipur, being a part of British India, got freedom the day India got independence from the British colonial rule on August 15, 1947. The then political agent of Manipur, Stewart wrote to Maharaj Bodhachandra, stating that the Maharaj should come at the residency in the midnight of August 14/15, 1947. First, Maharaj Bodhachandra thought Stewart should come to the palace as the later was a lower rank. Maharaj Bodhachandra soon realized that Stewart was a representative of British crown. On a stipulated time, Maharaj Bodhachandra, private secretary Gourahari and ADC Anandmohan came to the residency. Stewart welcomed them warmly. They entered the bungalow. Stewart sat facing east, while Bodhachandra sat in opposite direction. Both private secretary and ADC sat behind the Maharaj. The moment was so still. They waited for a short time. As the clock struck 12 midnight, they stood up. Then Stewart said - the British rule over Manipur will lapse from today. The state administration is handed over to you. Maharaj Bodhachandra and Stewart shook hands. The next moment, the duo said good morning, good morning. Then Maharaj Bodhachandra, the private secretary and ADC left the residency for the palace. Since that moment, Manipur attained freedom.
Viceroy Mountbatten summoned a meeting of all princely states of British India on July 25, 1947. He said that all the princely states should get freedom after the British left. He announced that the British paramountcy will divide the Indian subcontinent into two separate dominions viz dominion of India and dominion of Pakistan. He advised that each princely state should join in either India or Pakistan for their betterment. The princely states must hand over their authority of external affairs, defense and communication to the authority of India or Pakistan, he reiterated. Believing this, Maharaj Bodhachandra signed the Instrument of accession and standstill agreement on August 11,1947 at Imphal. In the morning of 14 August 1947, Maharaj Bodhachandra entrusted his brother Maharaj Kumar Priyobrata to form an interim council, a provisional government. Bodhachandra appointed Maharaj Kumar Priyobrata as chief minister. In the interim council, there were seven council of ministers, including the chief minister. Other ministers were Major Bob Khatting, minister in charge, hills administration and Manipur Rifles, Krishna Mohan finance, RK Bhubansana revenue, Moulavi Basiruddin Ahmed medical, PWD and jail, K Gouro Singh education and local self government and TC Tiankham forest and agriculture.
Later on, the Manipur state Constitution Act 1947 was constituted. Under this Constitution, the first assembly election of Manipur was held in June July 1948. The election was based on universal adult franchise. Total number of seats was 53 - 30 seats from valley, 18 seats from hills, three seats from Muhammadans and two nominee of Maharaj Bodhachandra with the Maharaj being head of the Constitution. MK Priyobrata and E Nilakanta were the two nominees. Hijam Erabot won from Utlou A/C. Md Alimuddin, Laishram Achou, Sekmai Chaoba, Moirang Koireng, Elangbam Tompok, S Somerendra, RK Bhubansana, Dr Leiren, Giri, Major Bob Khatting, etc were worth mentioning elected persons. Manipur state Congress won only 14 seats and failed to form government. A coalition government of Praja Shanti supported by 12 independent MLAs was installed. MK Priyobrata was sworn in as chief minister by Maharaj Bodhachandra. Six other ministers were also sworn in. S Somerendra was the opposition leader in the assembly. The term of the assembly was three years. Manipur state Congress was so disappointed after the election.
The first assembly session was held on 18 October 1948 at Darbar Hall, palace. Maharaj Bodhachandra inaugurated the session by giving speeches. Let us recall some classic speeches of Bodhachandra. Let unity be the strength of Manipur. Let truth be treated as the brave. Sincerity among the pen works and speech works is preferred. Be man in action. Number of buildings is not counted as developed country, honest people indicate development. Shining for the country is always preferred. This will be the rules and regulations. Let us pray the God for country's welfare."
After the election, there was turmoil, unrest in the society despite a responsible government iin place. The political agitations influenced by the Congress movements in India spread to Manipur and they were demanding a responsible government in the state. Among the politicians, there were quarrels, allegations, claims, and counter claims. Tompok Congress agitated, demanding formation of Purbanchal Pradesh. Tomal Congress opined that the sorrow of Manipur will be resolved if it joins in Purbanchal Pradesh. Keeping this in mind, he and his followers went to Assam and agitated demanding Purbanchal Pradesh. At that time, there was a rumour of formation of Purbanchal Pradesh, including Manipur, Lushai hills, North cachar hills, Jaintia hills whose capital would be at Shillong. Jana Neta Hijam Erabot strongly objected to the proposal of formation of Purbanchal Pradesh. At that time, he was an MLA. He organized a public meeting at MDU Hall on 21 September 1948. A crowd from Lamlai side came to participate in the meeting. A team of Manipur police stopped the rally at Pungdongbam. Confrontation between the police and the crowd occurred. A sub inspector Naranbabu was killed in the incident. Consequently the government ordered immediate arrest of Erabot. On hearing this information, Erabot quickly left the meeting. The Government proclaimed him as wanted. Since that incident, Erabot became underground forever. Eventually he died on 26 September 1951 at Tangbo hill Burma.
At this juncture the political leaders of India were thinking of how to annex Manipur in Indian Union. Assam governor Akbar Haidari sent Deveshor Sharma, a politician of Assam Congress to Manipur to observe the political loopholes of Manipur as a dominion agent. He frequently intervened in the political affairs of Manipur. After that the leaders of Delhi after thorough discussion sent one Rawal Amar Singh, giving a post Dewan in place of agent to Manipur. After independence, the political status of Maharaj Bodhachandra was only in namesake. Just only as head of the Constitution. The dewan did many works in place of Maharaj. Maharaj Bodhachandra was disappointed with it. This was a pre plan of Delhi.
It may be mentioned here that there was a plan of Sardar Patel, then deputy prime minister, to form a union of India by annexing all princely states within three years. Assam governor Prakash officially came to Manipur and talked with Maharaj Bodhachandra about the annexation of Manipur to India. However, Maharaj Bodhachandra didn't give any final decision regarding the annexation of Manipur. He thought that he should go to Shillong to meet governor Prakash to restrain the oversmart nature of Dewan Amar Singh and to discuss some political issues.
Bodhachandra sent a telegram to governor Prakash, stating that he would come to Shillong in the first week of September 1949. On hearing this information, governor Prakash and his advisor Rustumji were full of joy. Both were troubled over how to annex Manipur in India. At this time, they had a golden chance to execute the plan. Governor Prakash immediately rushed to Delhi to meet political leaders of India to discuss about Manipur. Then he went to Bombay to meet Sardar Patel to tell about Manipur. Sardar Patel asked, Is there not a single brigadier of Indian Army at your Shillong? Prakash understood that he was given permission to force Maharaj Bodhachandra if the later doesn't sign the merger agreement. Maharaj Bodhachandra left Imphal for Shillong on 16 September 1949. The total number of persons in the team, including private secretary Gourahari and ADC Anand Mohan were 15. They were traveling on vehicles. Next day, they reached Shillong in the evening and halted at Red Lance's Shillong. On 18 September 1949 at around 11 am Maharaj Bodhachandra along with private secretary Gourahari and ADC Anand Mohan went to Raj Bhawan to meet governor Prakash. They were traveling on vehicle. They saw a vehicle of Indian CID chasing them. Soon they came to know that the campus of Raj Bhawan was under tight security.
Governor Prakash warmly welcomed Maharaj Bodhachandra. Then governor Prakash took an envelope from his private secretary TS Krishna Murti and opened it. Governor Prakash gave the documents to Maharaj Bodhachandra and said, please sign it. He told that the Government of India had decided to annex Manipur state in dominion of India. It is for betterment of Manipur state. Maharaj Bodhachandra flashed his eyes and expressed disappointment. He replied that he should consult the council of ministers and the assembly as the matter was a state concern. So I could not sign it. All the efforts of governor Prakash went in vain.
Governor's advisor Rustumji threatened Maharaj Bodhachandra by saying that Maharaj could not leave Shillong unless he signs the merger agreement. Governor Prakash told Rustumji to keep quiet. Then governor Prakash said Maharaj Bodhachandra that the signing of the document will be done tomorrow in the same room. Maharaj Bodhachandra returned to Red Lance's. On that day, the Indian CID personnel surrounded Red Lance's. Bodhachandra didn't come to the governor house on September 19, 1949. Letters were sent to both sides. Maharaj Bodhachandra was like a house arrested person in Red Lance's. He may be compared with the lion caught in a trap. He was helpless there. At last, he decided to sign the merger agreement. On September 21, 1949, Maharaj Bodhachandra, private secretary Gourahari and ADC Anand Mohan went to the governor’s house and signed the Manipur merger agreement. On October 15, 1949, the Government of India announced that Manipur had become a part of India.
(The Views Expressed are Personal)
First published:26 Nov 2021, 5:13 am
Milan Luwang
Milan Luwang
Senior Journalist, Manipur Mail, Imphal, Manipur
Top Stories
Loading data...
Loading data...
|
Skip to content
Skip to table of contents
Creation to the Flood
Creation to the Flood
From where did the heavens and earth come? How did the sun, moon and stars, as well as the many things on earth, come to be? The Bible gives the true answer when it says that they were created by God. So our book begins with Bible stories about creation.
The first creations of God, we learn, were spirit persons somewhat like himself. They were angels. But the earth was created for people like us. So God made the man and woman named Adam and Eve and put them in a beautiful garden. But they disobeyed God and lost the right to keep living.
In all, from Adam’s creation until the great Flood, there were 1,656 years. During this time many bad persons lived. In heaven, there were the unseen spirit persons, Satan and his bad angels. On earth, there were Cain and many other bad persons, including some unusually powerful men. But there were also good people on earth—Abel, Enoch and Noah. In Part ONE we will read about all these people and events.
God Begins to Make Things
The Genesis story of creation is understandable and fascinating—even to young children.
A Beautiful Garden
According to Genesis, God made the garden of Eden a very special place. God wants the whole earth to be just like that beautiful garden.
The First Man and Woman
God created Adam and Eve and placed them in the garden of Eden. They became the first married couple.
Why They Lost Their Home
A Hard Life Begins
Outside the garden of Eden, Adam and Eve faced many problems. If only they had obeyed God, life would have been happy for them and their children.
A Good Son, and a Bad One
The story of Cain and Abel, as recorded in Genesis, teaches us about the kind of people we should be—and what attitudes to change before it’s too late.
A Brave Man
The example of Enoch shows that you can do what is right, even if people all around you do what is bad.
Giants in the Earth
Genesis chapter 6 tells about giants who hurt people. Those giants, called Nephilim, were children of the fallen angels who left heaven and lived as humans.
Noah Builds an Ark
Noah and his family survived the Flood because they obeyed God even though others would not listen.
The Great Flood
People laughed at Noah’s warning message. But they were not laughing when the flood waters fell from heaven! Learn how Noah’s ark saved Noah, his family, and many animals. |
Breaking News
The name Llano Seco means “dry plain.” That surprises some because the ranch land is in a flood plain, which is partly why it’s unique.
Llano Seco Rancho was originally deeded to Sebastian Keyser, an Austrian-born trapper, in 1844 by the Mexican government. He reportedly never saw the land.
Keyser sold the property to Edward A. Farwell, reportedly for 15 heifers worth $5 each.
The ranch changed hands several times.
Meanwhile, John Parrott worked in Mazatlan as the United States consul from 1827-1850. Parrott later worked in banking and exporting and did quite well in San Francisco.
In 1861, Parrott acquired part of the Llano Seco Rancho from Caleb Fay when the property was heavily mortgaged. The last part of the ranch he bought from Fay’s cousin’s widow.
At first the land was used to grow dryland grain, which was shipped by steamboat down the Sacramento River before the railroad came in 1870.
When Parrott died in 1884, he gave half the land to his widow and the other half to his children.
After the San Francisco earthquake in 1906, Abbey Parrott lived on the ranch for a year until her home was rebuilt, said Joe Silveira, a U.S. Fish and Wildlife Service biologist who works on the ranch.
In 1920, W. Hugh Baber became the ranch’s manager, a job he would keep until his death 48 years later. He developed canals and a reservoir, and the ranch started raising barley, wheat, rice, cattle, corn, dairy and pigs and sheep.
In the 1930s, valley oak forests and woodlands were cleared on the west side of the ranch for agriculture.
A white metal cross on the ranch marks the spot where Baber’s heart gave out while he was sitting watching the productive fields he loved, Silveira said.
In the 1950s, a family member married into French royalty, and the family stockholder’s president was Count Marc de Tristan of San Mateo.
A lavish 100-year anniversary party was held at the ranch in 1961, drawing about 750 invited guests.
Feature articles boasted of the festivities, which drew state legislators and the elite of Chico.
The Sept. 15, 1960, Enterprise-Record’s “Chico Centennial Edition” featured a historical article by writer Mary Lemcke.
She wrote: “With the population explosion and the influx of citizens into Northern California, how long will this Mexican land grant with its broad fields and beautiful groves of native oaks and sycamores be able to resist being cut up into smaller parcels? How long will the sole owners be descendants of John Parrott, who have now reached the fifth generation?”
It took until 1991, when wildlife agencies and the Nature Conservancy effectively divided the land grant by providing conservation acquisitions. |
How do people find the superhuman strength to lift cars?
Actually, most people "can lift six to seven times their body weight," says Michael Regnier, professor and vice chair of bioengineering at the University of Washington. But most people don’t push themselves so hard, though athletes often push themselves more than most. Fear, fatigue and pain prevent people from attempting feats of amazing strength in daily life, says Dr. Javier Provencio, director of the neurological ICU at Cleveland Clinic.
Regnier, a former world-class weightlifter, has experienced bouts of incredible strength both as an athlete and as someone who helped after an accident. About 20 years ago, Regnier was driving on a Los Angeles freeway when he spotted a wrecked car on the side of the road. The driver sat slumped over his steering wheel so Regnier pulled over to help. It was instinct; he couldn’t fathom leaving the man without doing something. The driver’s door had caved in and Regnier couldn’t get him out any other way—he ripped the door off to pull the man out.
Regnier remembers his hands hurting from cuts he sustained while tearing off the car door, but he doesn’t know what happened with the driver because he left when the EMTs arrived.
Ripping doors off cars or lifting vehicles from people could be considered hysterical strength. Little medical evidence exists about such cases; most of it remains anecdotal.
Physicians once believed that the adrenaline that flooded the system caused an extra boost to the muscles, allowing people to be stronger. But that’s not quite accurate. Adrenaline certainly primes the body for emergency action, it speeds up the heart and lungs, dilates the blood vessels and releases nutrients, both of which ready the muscles for quick responses.
“Endorphins are very important,” says Provencio. Our bodies release endorphins when we exercise, providing that “runner’s high.”
These neuropeptides make people feel good and suppress pain as well as providing people with an extra boost to finish their superhuman task.
“[Endorphins] sort of make the brain available to handle these stressful situations. You focus on the task you are doing,” says Regnier. “The endorphins will have a longer lasting affect.”
While the body’s stress response enables humans to turn into less angry Incredible Hulks, our emotions truly motivate people to attempt such actions. In most cases, the rescuers believe the victim will die without help. Take 21-year-old Danous Estenor, a University of South Florida football player, who lifted a car off a 34-year-old tow truck driver pinned under a tire in 2011. He believed Pedro Arzola would have perished without his intervention.
“The people who do these things are really under a lot of stress,” says Provencio. “It really touches them personally.”
More from The Body Odd: |
6.5 C
New York
Sunday, January 23, 2022
Scary fish robots could help us control invasive species
Robots could be used to control invasive species, say Australian researchers.
Must Read
This diet may help repair damage from traumatic brain injury
There are currently no treatment options for those who have suffered such injuries, though the ketogenic diet...
Who is more exposed to Arthritis? Early warning signs you should know
According to the US CDC, an alarming number of Americans suffer from arthritis, a severe inflammation of the...
A superfruit that helps you boost eyesight as you age
The more you eat this fruit, the better your chances of avoiding early-stage AMD. It's also beneficial...
Jiya Saini
The researchers created a robot to drive away mosquitofish, an invasive species that eats the tails of freshwater fish and tadpoles, leaving the native animals to perish while feasting on the eggs of other fish and amphibians.
The invasive mosquitofish (Gambusia holbrooki) eats the tails of freshwater fish and tadpoles, causing the native species to die while feasting on the eggs of other fish and amphibians. Researchers used a robot to scare mosquitofish away in a study published in the journal iScience, revealing how fear affects their behavior, physiology, and fertility—and how it could help reverse the tide against invasive species.
The international team, which included biologists and engineers from Australia, the United States, and Italy, took inspiration from the invasive fish’s natural predator, the largemouth bass (Micropterus salmoides). They created a robotic fish that has the same appearance as a real predator and moves in the same way. Thanks to computer vision, the robot strikes when it sees mosquitofish approaching tadpoles of an Australian species (Litoria moorei) that is endangered by mosquitofish in the wild. The mosquitofish were scared and worried, and they displayed anxious behaviors, as well as weight loss, changes in body form, and a decrease in fertility, all of which hampered their survival and reproduction.
Scary fish robots could help us control invasive species
The native Australian tadpole (bottom) species threatened by the presence of the invasive mosquitofish (top)
“Mosquitofish is one of the 100 world’s worst invasive species, and current methods to eradicate it are too expensive and time-consuming to effectively contrast its spread,” said Giovanni Polverino, first author.
“This global pest is a serious threat to many aquatic animals. Instead of killing them one by one, we’re presenting an approach that can inform better strategies to control this global pest. We made their worst nightmare become real: a robot that scares the mosquitofish but not the other animals around it.”
Mosquitofish tended to stick closer together and spend more time near the middle of the testing arena when the artificial fish were present, cautious to venture into unfamiliar territory. They also swam faster than those who hadn’t met the robot, with more frequent and acute turns. Fear persisted once they were away from the robot and back in their own aquaria. The terrified fish became less active, ate more, and froze for longer periods of time, displaying signals of worry that lasted for weeks after their last interaction with the robot.
The robotic fish (left) that mimics the natural predator of mosquitofish (right) induces fear that leads to behavioral, morphological, and reproductive changes in the fish
The presence of the robot was a good thing for the tadpoles that the mosquitofish generally eat. While the mosquitofish is a visual species that uses its eyes to investigate its surroundings, tadpoles have poor eyesight and cannot see the robot clearly.
“We expected the robot to have neutral effects on the tadpoles, but that wasn’t the case,” added Polverino.
Because the mosquitofish’s behavior had been altered by the robot, the tadpoles no longer had predators on their tails and were more willing to venture out into the testing arena.
“It turned out to be a positive thing for tadpoles. Once freed from the danger of having mosquitofish around, they were not scared anymore. They’re happy.”
The study discovered that the mosquitofish spent more energy escaping than reproducing after five weeks of brief contacts with the robot. Male fish evolved slim, streamlined bodies with stronger muscles towards the tail, allowing them to cut through the water when escaping. Male fish had lower sperm counts, and females produced lighter eggs, both of which are alterations that are likely to jeopardize the species’ overall survival.
With the aid of computer vision, the robotic fish (blue) can distinguish between mosquitofish (red) and tadpoles (green) in real time and strike when the fish approaches the tadpoles
“While successful at thwarting mosquitofish, the lab-grown robotic fish is not ready to be released into the wild,” said senior author Maurizio Porfiri.
The crew will still have to deal with technical difficulties. They want to test the technology in small, clean pools in Australia, where two rare fish are threatened by mosquitofish, as a first step.
“Invasive species are a huge problem worldwide and are the second cause for the loss of biodiversity,” added Polverino. “Hopefully, our approach of using robotics to reveal the weaknesses of an incredibly successful pest will open the door to improve our biocontrol practices and combat invasive species. We are very excited about this.”
Source: 10.1016/j.isci.2021.103529
Image Credit: Vrishin Soman
You were reading: Scary fish robots could help us control invasive species
- Advertisement -
- Advertisement -
Latest News
- Advertisement -
More Articles Like This
- Advertisement - |
Identify the Difference within 10
Home > Games > Math Games > Identify the Difference within 10
The game challenges young mathematicians to hone their math skills by solving a set of problems on subtraction to find the difference. It's important that students work at a level appropriate for them. This game requires learners to work with numbers within 10. Students will select the correct answer in order to complete the subtraction equation.
Try SplashLearn for Free
Loved by 40M+ Learners
Learners across 150+ Countries
Used in 1 in 3 Schools |
Hitler: The Rise of Evil Part 1 Timeline
• Linz, Austria 1899-1907
As a child, he was severely abused by his father since he thought that Adolf was God's curse for marrying his own niece. After his father died, he applied for the Vienna Arts Academy but is brutally unaccepted. Shortly after that, his mother was diagnosed with breast cancer and died shortly. Hitler moves to Vienna on a permanent basis but was not able to find a job and became homeless. It was then that he was convinced it was the Jews that caused all of his problems.
• Period: to
Hitler: The Rise of Evil Part 1
• Vienna, Austria 1913
Hitler living in an orphanage, lives on the inheritance from his late father. He meets his step-sister, Angela one last time before setting off to where the real Germans are.
• Munich, Germany May 1914
Hitler departs Austria and goes to Germany.
• Munich, Germany 1 August 1914
The assassination of Austrian Archduke, Franz Ferdinand leads to the 1st World War. England, France and Russia joined forces with Austria, Germany's ally.
• Belgium, 29 October 1914
Hitler has joined the army and sets off to fight for his country. He was the only soldier out of 600 to survive an attack on the Germans which results in him being promoted to the rank of corporal. He was needed to deliver a message to Lieutenant Guttman where he then was saved from an attack on his company after following his dog, Foxl that ran away.
• Belgium, July 1918
Hitler receivers an Iron Cross after delivering a vital message to another post. He then starts to have doubts on the strategy of the Army. He was paralyzed by Mustard Gas and was thus sent to a hospital for recovery
• Pasewalk Military Hospital, 10 November 1918
As he recovers from his injuries at the hospital, he hears news that Germany is negotiating surrender and goes near mad not being able to accept the fact that his country lost.
• Munich, Germany April 1919
Germany is in the midst of political revolution. The Free Corps Militia has successfully took back the city from the Communists.
• Army Barracks Munich, Germany September 1919
Hitler, still employed by the army is to spy on a new political party, the German Worker's Party led by Anton Drexler. He then starts to show his intent on eliminating Jews from the world.
• Munich, Germany 16 October 1919
Adolf Hitler then joins the German Worker's Party and becomes the person to give speeches and propaganda.
• Munich, Germany March-August 1920
His speeches repeats the theme that true Germans are pure humans while Jews should be exterminated. His popularity rises as his speeches connects to more and more people. The German Worker's Party is then named the Party of the National Socialists.
• Munich, Germany November-December 1920
Hitler's speeches catches the attention of Ernst Hansftaengl who then supports him by refining his image and creating a symbol of the party, in the shape of the Swastika.
• Munich, Germany January 1921
Adolf Hitler becomes the Fuhrer of the Nationalist Socialist Party.
• Munich, Germany 26 September 1923
Bavarian Prime Minister Gustav Von Kahr has banned Hitler from making speeches as it is believed that his party is causing trouble around the countryside. Hitler then was introduced by Hansftaengl to Fritz Gerlich to convince him that Kahr could take Hitler as an ally. Unfortunately, Gerlich then concludes that Hitler is a mentally unstable psychopath with a dangerous goal and tells Kahr that he must be stopped. Kahr then tricks Hitler to stop his speeches so that a putsch could be done.
• Circus Krone, Munich, Germany November 1923
Hitler delivers a speech at Circus Krone trying to convince the people so that they would side with the Nationalist Socialist Party. He then realizes then he has been outfoxed by Kahr and plans to lead a march to Berlin by himself after gaining the support of esteemed military general, Erich von Ludendorrff.
• Munich, Germany 8-9 November 1923
Hitler plans his attack on the other parties. He confronts Kahr at gunpoint and forces him to support his own revolution after seeing that Ludendorrff has also supported Hitler. Unfortunately as they attempt to take over the military barracks, Kahr manages to alert the Bavarian Army and the attempted putsch was quickly ended. Frustrated by his failure, Hitler contemplates suicide until Hansftaengl's wife, Helene stops him. Shortly afterwards, he was arrested.
• Munich, Germany 24 February 1924
After three months in prison, Hitler goes on trial after some convincing from Helene who Hitler has affection for. During the trial, he pleads guilty as he inserts some parts of his speeches within his answers of the questions asked by the prosecutor, these glimpses of brilliance that impressed both the crowd and the judge.
• Munich, Germany March 1924
Adolf Hitler continues his trial with brilliant speeches. Gerlich creates an article on his newspaper that shows how Hitler would bring the country to its knees if he was allowed to walk free out of the courtroom.
• Munich, Germany 1 April 1924
The trial of the failed putsch attempt comes to an end. General Ludendorrff is found not guilty, Adolf Hitler is found guilty of high treason and was given a tolerated punishment which included 5 years of imprisonment where he would be eligible and a fine 200 gold marks. |
website source links
ae bk frM ktut lveg nar
phou pic resh scar tig
treg wik20 wik19 wikP
Egypt Middle Kingdom Go to Mediterranean Go to Levant Go to Arabia Go to Africa Go to North Africa
c.2040 FIRST INTERMEDIATE PERIOD ends. Began 2181.
10th DYNASTY ends. At Heracleopolis 2130, it is conquered by MENTUHOTEP-I, rebel king at Thebes from 2060, thus becoming MENTUHOTEP-II of Egypt until 2010.
2052 Sdl 1-23
2040 BHoE,
B76 6-469, MCAW, FHBC 208, GEoP, Grim
c.2040 MIDDLE KINGDOM begins until 1786.
11th DYNASTY begins as pharaohs until 1991.
EGYPT, divided from 2160, reunited until 1750. Capital: THEBES until 1990.
2160 BHoE 598 2133 CAH 1.2
2050 SHWC 14 2040 B76 6-469, FHBC 213, Grim, PW 14, TAWH 58, WCBOT 2025 Sdl 1-23 2000 RAH, SOTS 25 1991 LEWH 38 1989 FLAP 81
c.2026 Rebellion at THINIS. yr 14 Shaw 134, 139
Mentuhotep-2 tomb reconstruction
Mentuhotep-2 tomb
Photo by Olaf Tausch
c.2010 MENTUHOTEP-II dies. King of Thebes from 2060, Pharaoh of Egypt from 2040. His tomb in the cliff at Deir el-Bahri on the west bank of Thebes may not have had a pyramid, as in the reconstruction on the left. MENTUHOTEP-III succeeds to 1998. 2014 DMoN 2010 MCAW 19, MRDK, ae, ktut, pic, resh, wikP 2009 Grim 2004 Shaw, treg
1999 nar 1998 Clay, scar, tig
1995 wikM2 1992 phou
c.2000 Rulers are entombed on edge of desert near the pyramids. -
c.2000 BRONZE, common in the Mid East, only now becomes common in Egypt. 2000 SHT 1-588
c.2000 Polished stone axheads mostly superceded by bronze. 2000 SHT 1-503
c.2000 KAHUN in the Fayum founded in an area already containing tombs. Its layout shows a workmens area in the west with very small houses, notables in the north with big houses of several hundred rooms, courts, and corridors, the market in the east, and probably a temple area in the center. Mud-brick town walls have been found on 3 of its 4 sides. 2000 B76 18-1066
no date: wikEL
c.2000 DYEING of linen and leather is an individual craft and temple industry. Urine is used to dissolve the dye. 2000 SHT 1-248-9
c.2000 OIL LAMPS begin in Egypt, using castor oil at first. (See Europe 2000, Crete 1500) 4000 epld
1300 EOET 133
c.2000 shadufSHADUF V - a long pole balanced on a pivot with a bucket on one end and a counter-weight on the other - used to lift water in Egypt and Mesopotamia. drawing {{PD-US}}
2000 TTT, wikSdf
1700 rgnms
1500 B76 11-232
c.2000 BALANCE SCALE V used in Egypt and Mesopotamia. 2000 TTT
c.2000 BEER V, in Egypt from ?, has laws governing manufacture, sale and consumption.
(See Gilgamish 2000)
2000 prtmt
c.2000 DRILL turned by a bow is used to make holes in stone. 2000 TTT
c.2000 TOOTHPASTE made of pumice powder and wine vinegar. 2000 EOET 210
c.2000 CONTRACEPTIVES V (honey & crocodile dung) introduced. 2000 TTS, TTT
c.2000 Pointed BATTERING RAM operated from a portable hut covered with reeds and hides. 2000 CWH, TTT
c.2000 DOGS bred into diverse forms. 2000 CWH
c.2000 Egyptians abandon effort to domesticate antelope, gazelle, & oryx. Devote more time to hunting, fishing, gathering to supplement cultivated crops. 2000 TTPC-5
c.2000 Oldest Egyptian SHOE V is a sandal made of braded papyrus found in a tomb. 2000 EOET 294, TTT
c.2000 Earliest known textiles are linen mummy wrappings. Dyes include blue from indigo or woad leaves which contain indigo. Safflower is used for yellow and red. 2000
B76 5-1099
c.2000 Solid WHEEL V carts and wagons appear in Egypt.
(See Europe, Asia, Crete, Syria, also in 2000, and Anatolia 1800)
1650 MCAW 25
1600 B76 5-970, SHT 211
c.2000 SPOKED WHEELS (4 spokes until 1300) appear in Egypt, Aram, Asia, and Mesopotamia. (See Europe 1500, Crete 1500) 2000 B76 X-643 1600 TTT
soon after 1600 SHT 1-212
c.2000 Tomb (TT60) of Antefoker (Intefiqer), Vizir of Senusret-I, has pictures of a clay oven with a grate on which is a tray for food. 2000 SHT 1-273
no date: wikTT60
c.2000 DATE-WINE is the most popular liquor. Juice is pressed from soaked dates, and fermented by the wild yeast in the date skins. 2000 SHT 1-276
c.2000 SAFFLOWER seeds stored in Theban tombs. 2000 SHT 1-246
c.2000 TATTOO practiced by Egyptians, evidenced on mummies. 2000 B76 IX-841
c.2000 Prisse Papyrus PRISSE PAPYRUS contains earliest complete text of Maxims of PTAHHOTEP . photo {{PD-US}}
2000 CHJ 2-491
no date: wikPP
Dental implants
pub dom
DENTISTRY: 2 front jaw teeth joined together and attached to natural teeth by gold wires. Surgery was performed in the mouth of the living person; not after death. Mummy skull found at Giza.
2000 AEDA, fbHF, blgsp
c.2000 Nubian archersNubian archers, probably mercenaries under Prince Mesehti of Syut (later Asyut, Assiut) in whose rock-cut tomb this painted wood model was found. Syut is capital of the 13th Nome. (Now in Cairo Museum). photo
pub dom
2000 wikNA
c.1998 MENTUHOTEP-III ends. 2nd pharaoh of 11th (Theban) Dyn from 2010, ends. His burial place is disputed. MENTUHOTEP-IV succeeds 1997-91. 2001 DMoN 1998 MRDK 286, ae, ktut, lveg, pic, resh, swar, wikP 1992 Shaw, treg 1991 Clay, scar, tig
1987 nar 1985 phou
c.1997 MENTUHOTEP-IV, 3rd Pharaoh of 11th (Theban) Dyn 1997-91, consolidates southern commerce under control of chief treasurer, Henu, with title: "keeper of the door of the south". no date: BHoE 153, 182
c.1996 AMENEMHET, vizir and governor of south for Mentuhotep-IV, secures route to quaries of Wadi Hammamat, between Coptos and Red Sea, to get stone for king's sarcophagus, establishes 15 watering stations from Coptos to Red Sea, trades by ship with PUNT (unknown location to southeast). yr 2 DMoN
no date: BCoC 153, 182
c.1991 MENTUHOTEP-IV ends. 3rd Pharaoh of 11th (Theban) Dyn from 1998. Burial place unknown. Vizir AMENEMHET-I succeeds to 1962. 1994 DMoN 1991 B76 6-469, FHBC 209, Grim, JIAE, MCAW 20, MRDK, WCBOT 31, WPOT 84, ae, bk, ktut, lveg, pic, resh, swar, wikP 1989 FLAP 126
1987 treg 1985 Shaw 1983 nar
c.1991 11th DYNASTY ends. At Thebes from 2060 as a dynasty,
from 2040, as pharaohs.
1994 DMoN 1991 AYGC 61, B76 6-469, CAH 1.2, Clay, FHBC 209, GEoP, Grim, lveg, MRDK 286, WCBOT 31, WPOT 84, ae, ktut, pic, resh, swar, tig, wikP 1989 FLAP 126 1987 treg
1985 Shaw, phou 1983 nar
12th DYNASTY begins at Itj Towy until 1786.
c.1990 CAPITAL of Egypt, at Thebes from 2040, moved by Amenemhet-I to newly built ITJ TOWY until 1786. 1990 PW 14
no date: TAWH 58, ae
c.1990 KHNUMHOTEP made count of Menet-Khufu by Amenemhet-I until 1980. no date: BHoE 161-2
c.1985 AMENEMHET-I, 1st pharaoh of 12th Dyn 1991-62, with 20 cedar ships, fights unknown enemy on Nile. Drives them from Egypt. no date: BHoE 154
c.1980 KHNUMHOTEP, count of Menet-Khufu from 1990, promoted to Nomarch of Oryx by Amenemhet-I until 1950. no date: BHoE 162, 180
c.1974 AMENEMHET-I, 1st pharaoh of 12th Dyn 1991-61, suffers assassination attempt. no date: BHoE 177
c.1971 AMENEMHET-I, 1st pharaoh of 12th Dyn 1991-62, makes son SENUSRET-I co-regent. 1974 DMoN 1971 Clay, GEoP, JIAE, MCAW 20, MRDK, Murn, RAI2, ae, bk, frM, ktut, pic, scar, tig, wikP 1963 nar
c.1970 AMENEMHET-I: "I grew corn. I loved Neper the grain god. In every valley the Nile greeted me. None hungered. None thirsted during my reign." 2000 SHT 1-537
c.1968 AMENEMHET-I makes 1st recorded 12th Dyn campaign into Nubia. yr 23 1968 Grim 161
c.1962 SENUSRET, son of pharaoh Amenemhet-I, penetrates WAWAT as far as Korosko, for conquest and colonization, but mostly for raw materials, especially gold. He takes prisoners as far as Mazol land and founds fortresses at Semna and Quban at 2nd Cataract. Amen yr 29 BHoE 178, Grim 161, Shaw 148, nar, treg
Amenemhet-I tomb
photo Jon Bodsworth
AMENEMHET-I murdered. 1st pharaoh of 12th Dyn from 1991, murdered by nobles while son, Senusret is fighting in Libya. Entombed in a pyramid at Lisht made of limestone blocks taken from Old-Kingdom monuments.
1964 DMoN 1962 AYGC 62, B76 17-933, MCAW 20, Clay, Grim, FHBC 209, GEoP, lveg, MRDK, Murn, RAI2, WCBOT, ae, frM, ktut, pic, resh, scar, tig, treg, wikP
1956 Shaw, phou 1953 nar
c.1962 SENUSRET, son of Amenemhet-I, in Libya, learns of father's murder, tells no one. 1970 BHoE 179
1964 DMoN 58
c.1962 SINUHE, noble under Senusret in Libya, overhears conversation about murder of Amenemhet-I by tent of Senusret. Fears implication. Flees. V 1970 BHoE 179
1964 DMoN 58
c.1962 SENUSRET, son of Amenemhet-I, in Libya, departs by night to residence at Itjtowe, assumes throne. SENUSRET-I begins until 1928. 1970 BHoE 179 1964 DMoN
1962 Grim, MCAW 20, MRDK 286, resh
c.1959 SENUSRET-I rebuilds temple of Atum-Ra at Heliopolis. yr 3 1959 Grim 164
c.1958 SENUSRET-I, 2nd pharaoh of 12th Dyn 1962-28, resumes conquest of NUBIA in person. 1st campaign ever personally led by a pharaoh. Penetrates beyond 2nd cataract, occupies as far as Buhen. 8 yrs after A-1 dies: BHoE 181
no date: DMoN
AMENI, son of Khnumhotep, under Senusret, commands Oryx soldiers.
Asiatic caravan
photo by NebMaatRa Caravan of "Asiatics" portrayed in tomb of Khnumhotep-II
c.1955 KHNUMHOTEP-II (or III, not a pharaoh), nomark of Oryx from 1980, dies. 37 Aramo-Canaanites are portrayed on his tomb (#3 of the 39 tombs at Beni Hasan). 2000 WCBOT 20
Senusret-II yr 6 wikBeniHasan
1900 wikHk 1892 wljv
1890 Jud 6-480
early 12th dyn: wikBH
no date: BHoE 162, 180
Sons promoted by Senusret: NAKHT made count of Menet Khufu. AMENI made nomarch of Oryx.
c.1955 LOOM V portrayed in Assyrian and Egyptian murals in tomb of Khnumhotep-II. 2000 TTT
c.1953 MENTUHOTEP, general under Senusret-I in Nubia, dispatched south. 1953 BHoE 181
yr 10 Shaw 149
c.1950 Λ SINUHE, Egyptian fugitive, goes to Aram. 1950 MCAW 21
c.1950 NUBIA, independent from ?, conquered by general Mentuhotep. Under Egypt until 1913. 1950 TTPC
no date: BHoE 17, 166, 181
General MENTUHOTEP erects so many boastful monuments that Senusret gets nervous and dismisses him.
One large stele north of 2nd cataract now extant.
c.1950 SINUHE AUTOBIOGRAPHY describes travels thru Aram etc. and penitential return to Pharaoh Senusret-I. Shows that pharaoh is regarded as a god. 1950 MCAW 21
c.1950 POTTER'S WHEEL V, in Uruk from 2000: Evidence of pivoted disks appears in Egypt. Foot wheels also in Greece, and Crete. 2000 SHT 1-203 1950 MCAW 21
1800 SHT 1-200
c.1949 AMENI, nomarch of Oryx 1950-?, with prince Amenemhet + 400 men, dispatched to consolidate NUBIA and mine gold. no date: BHoE 181
c.1932 SENUSRET-I erects 2 obelisks (each weighing 121 tons) in front of temple pylon at Heliopolis. 1 still stands. yr 30 Clay 81, Grim 164
1932 Grim 164
c.1931 SENUSRET-I sends 2 expeditions to alabaster quarries at HATNUB in eastern desert. yr 31 1931 Grim 165
c.1929 SENUSRET-I, 2nd pharaoh of 12th Dyn 1962-28, makes son AMENEMHET-II co-regent. 1932 DMoN 1929 Clay, GEoP, JIAE, MRDK, Murn, RAI2, ae, frM, ktut, pic, scar, tig, wikP 1928 Grim
3 yrs before death: BHoE 182
Senusret-I tomb
Photo by Jon Bodsworth
SENUSRET-I dies. 2nd pharaoh of 12th Dyn at Itj Towy from 1962. Entombed in a pyramid at Lisht.
Son AMENEMHET-II sole rule until 1895.
1935 BHoE 182 1929 DMoN
1928 FHBC 209, GEoP, Grim, FHBC 209, JIAE, lveg, MCAW 20, MRDK, Murn, RAI2, WCBOT, frM, pic
1926 Clay, ae, bk, ktut, scar, tig, wikP
1916 nar 1911 Shaw, phou, treg
c.1913 NUBIA, under Egypt from 1950, goes independent until 1903. War with Egypt until 1903. 1913 wik20
c.1903 EGYPT / NUBIA war from 1913, ends. Nubia under Egypt until 1829. 1903 wik20
c.1900 AMENEMHET-II, 3rd pharaoh of 12th Dyn 1928-1895, resumes trade with PUNT (unknown location to southeast). yr 28 Clay 82
no date: BHoE 182
c.1900 CANAANITES arriving with pack-assess carrying tribute and children depicted at tombs at Beni-Hasan. 1900 SHT 1-706
c.1900 PLOW drawn by two oxen depicted at tombs at Beni-Hasan. 1900 SHT 1-73
c.1900 A GREYHOUND and a mongrel dog depicted at tombs at Beni-Hasan. 1900 SHT 1-330-31
c.1900 INCENSE BURNER depicted at tombs at Beni-Hasan. 1900 SHT 1-298
c.1900 DRIED FOODS: A tomb painting portrays making and storing rasins. Another shows ox meat being hung up to dry. Another - gutted fish hung on a boat mast. Netting and curing of sea fish and fowl is shown at Sakkara and Beni-Hasan. 1900 SHT 1-263-5
c.1900 RaRA, dominant god in Egypt from 2490, at apex during 12th Dyn, becomes so dominant that priests of other gods discover that their own local deity is really RA by a different form or name. photo: Jeff Dahl
no date: BHoE 170, wikRa
c.1900 EXECRATION TEXTS written in Egyptian hieratic: Names of potential enemies of the Pharaoh inscribed on vases include 30 Aramo-Canaanite names. Texts are written on statuettes of bound foreigners, bowls, or blocks of clay or stone, which are subsequently destroyed in effigy. Over 1,000 deposits found, in sites at Semna, Uronarti, Mirgissa, Elephantine, Thebes, Balat, Abydos, Helwan, Saqqara, and Giza. Evidenced also in Canaan. 1925-1875 WBANE 55
1850 IDB 1-252, 4-303
1800 IDB 1-328
no date: wikET
c.1897 AMENEMHET-II, 3rd pharaoh of 12th Dyn 1928-1895 at Itj Towy, makes son SENUSRET-II co-regent. 1900 DNoN 1897 Clay, GEoP, JIAE, MCAW 20, MRDK, Murn, RAI2, ae, frM, ktut, lveg, pic, scar, tig, wikP
1895 Grim 1877 Shaw, phou, treg
3 yrs before death: BHoE 182
Amenemhet-2 tomb plan
photo by Franck Monnier
AMENEMHET-II murdered. 3rd pharaoh of 12th Dyn from 1928, murdered by guard. Entombed in a white limestone pyramid at Dahshur, where stone thieves will steal its casing, leaving the sandstone to erode to shallow humps. Son SENUSRET-II sole rule until 1878.
1903 BHoE 182 1897 MCAW 20, wik19 1896 DMoN
1895 Clay, FHBC 209, GEoP, JIAE, lveg, MCAW, MRDK, Murn, RAI2, WCBOT, frM, ktut, pic, scar, tig, wikP
1877 Shaw, phou, treg 1885 nar
c.1890 FAYUM depression converted to farmland under Senusret-II. 1842-36 4nel
c.1878 SENUSRET-II, 4th pharaoh of 12th Dyn 1895-78, makes son SENUSRET-III co-regent. 1881 DMoN
1878 B76 6-470, Clay, GEoP, Grim, JIAE, MCAW 20, MRDK, Murn, ae, frM, ktut, pic, resh, tig, scar, wikP
c.1878 SENUSRET-II dies. 4th pharaoh of 12th Dyn at Itj Towy from 1895. Entombed in a burial chamber at Al Lahun.
Son SENUSRET-III sole rule until 1843.
1880 DMoN 1879 frM
1878 Clay, FHBC 209, JIAE, MRDK, Murn, Sdl 1-24, bk, lveg, wik19
1877 MCAW 23, GEoP, RAI2
1870 Shaw, treg, phou
c.1872 Confirmed as 7th year of SENUSRET-III by three records of helical risings of Sirius between 2770 and 1314. 1872 B76 6-462
c.1869 SENUSRET-III, 5th pharaoh of 12th Dyn 1877-43, prepares for consolidation of south by reopening canals cut in 2307. Clears out channel at 1st cataract. 1850 MCAW 21
yr 8 Clay 85, DMoN 60, BHoE 183-4
no date: BHoE 183-4
c.1869 A stele at Semna forbids Nubians to take boats or herds north of that location. yr 8 BHoE 184, DMoN 61, Shaw 155
c.1869 SENUSRET-III, 5th pharaoh of 12th Dyn 1877-43, sails war ships into NUBIA.
Sets up forts, Semna & Kummeh south of 2nd cataract as his southern border.
Puts temple to Dedwen, god of Nubia, in fortress Semna.
yr 8 BHoE 184, DMoN 60, Grim 168
c.1867 SENUSRET-III, minor Nubian campaign. yr 10 DMoN 61, Grim 168
c.1861 SENUSRET-III's engineers cut channel through cliffs of the 1st cataract of the Nile so Egyptian war ships may pass through. 1850 MCAW 21
c.1861 SENUSRET-III, 5th pharaoh of 12th Dyn 1877-43, extensive campaign against NUBIA. Sets up victory stele at Semna. yr 16 BHoE 186, DMoN 61, Grim 168
c.1858 SENUSRET-III personally leads campaign against NUBIA. Burns crops, takes cattle. yr 19 BHoE 186, DNoN 61,
Shaw 155
c.1858/7 SENUSRET-III, having built a pyramid complex at Dahshur, now begins an elaborate subterranean tomb complex at Abydos, possibly because of his loyalty to the cult of Osiris. yr 20 or 19 eulr
c.1850 SENUSRET-III, 5th pharaoh of 12th Dyn 1877-43, invades RETENU (Egyptian name for Levant) (a first for any pharaoh) to a place called Sekmem (Shechem?). Plunders and returns. 1850 MCAW 20 1818 Wiki
no date: BHoE 187
Moscow Papyrus
MATH V MOSCOW MATHEMATICAL PAPYRUS : 15' x 3", contains 25 math problems which were already old at this time. Contains practical approximations for measuring, rather than actual mathematical knowledge. Approximates the surface area of a hemispherical basket. Computes the length of a ship's mast given that it is 1/3 + 1/5 of the length of a cedar log originally 30 cubits long. Pi is approximated at 256/81, which is about 0.5% low. (See Mesopotamia 2000)
2000 BHM 19, EIHM 39, wikMMP
1900 B76 11-640
1850 IDB 3-561, lsned
1800 ldkn
1750-01 TTS
c.1850 ASTRONOMICAL V INSTRUMENT: oldest extant, combination plumb line and sighting rod.
Presently in Berlin museum.
1850 EIHM 39
c.1850 GOLDEN RULE V prototype attested in The Eloquent Peasant . "Do to the doer to make him do" 2040-1550 wikGR
c.1843 SENUSRET-III dies. 5th pharaoh of 12th Dyn from 1877 at Itj Towy. Though he had built a pyramid complex at Dahshur, he is entombed in his more recent subterranean tomb complex at Abydos.
1st son AMENEMHET-III succeeds 1842-1797.
1843 BHoE, MCAW 20, GEoP, JIAE, MRDK, RAI2, WCBOT, frM
1842 FHBC 209, Grim, lveg, pic
1841 Clay, Murn, Sdl 1-24, ae, resh, scar, tig 1840 DMoN, bk, nar
1839 ktut, wik19 1831 Shaw, phou
1817 treg
c.1842 AMENEMHET-III, 6th pharaoh of 12th Dyn 1842-1797, exploits copper and turquois of Sinai from now to the end of his reign.
(For copper, see Canaan 2000, Britain 1950, Sumerian cubit 1950, Asia 1800, Ganges Valley 1800, Sinai 1750)
1842 MCAW 21
yr 2 Clay 88
c.1829 NUBIA, under Egypt from 1903, at war until 1818. 1829 wik19
c.1820 AMENEMHET-III, 6th pharaoh of 12th Dyn 1842-1797, creates (or improves) artificial lake of MOERIS in the Fayum, helping to control Nile flooding. 1820 MCAW 21
c.1820 Vast irrigation system created by AMENEMHET-III. no date: TTPC 6
c.1818 EGYPT / NUBIA war from 1829 ends. 1818 wik19
c.1800 HYKSOS, Semites of unknown origin (possibly Amalekites), enter Egypt during 11th Dynasty, but remain obscure until ?. c.1750 1800 wikHk 1750
c.1800 Pyramid of Ahmose BERLIN PAPYRUS: written in hieratic by a Middle Kingdom scribe.
Λ MATH V: Discusses fractions. Contains 2 problems in simultaneous equations, one of which is 2nd degree:
1. You are told the area of a square of 100 square cubits is equal to that of two smaller squares, the side of one square is ½ + ¼ of the other. What are the sides of the two unknown squares.
2. You are told the area of a square of 400 square cubits is equal to that of two smaller squares, the side of one square is ½ + ¼ of the other. What are the sides of the two unknown squares.
(See Plimpton 1800, multiplication 1775)
ANATOMY V: Also has a pregnancy test.
Found at Saqqara.
art {{PD-US}}
1800 mthbf, plnmth
c.1800 Kahun papyrus KAHUN GYNECOLOGICAL PAPYRUS : Oldest known MEDICAL V text on papyrus. 35 paragraphs relating to women's health, fertility, pregnancy, and Λ contraception. Each deals with a specific problem and contains diagnosis and treatment. No prognosis is suggested. Treatments are non surgical: applying medicines to the affected body part or swallowing them. Womb is at times seen as the source of complaints manifesting themselves in other body parts.
(See 1975 physicians, physicians)
photo {{PD-US}}
1800 hstnf, wikEMP 18-1700 rfil
c.1800 ALPHABET: 1st pure alphabets mapping single symbols to single phonemes, but not necessarily each phoneme to a symbol developed by Semitic workers in Egypt. (See Arabia 2000, Mesopotamia 2000, Crete-Hyro 1900, Linear-A 1650 ) 1800 wikHW
c.1798 AMENEMHET-III, 6th pharaoh of 12th Dyn 1842-1797, completes reservoir at Sarbut el-Khadem in Sinai, and wall at El Kab. yr 44
BHoE 208
c.1798 AMENEMHET-III, 6th pharaoh of 12th Dyn 1842-1797, makes AMENEMHET-IV co-regent. 1815 ktut, wikP 1799 ae, tig
1798 Clay, DMoN, GEoP, JIAE, lveg, MRDK, Murn, RAI2, frM, scar
Amenemhet-III pyramid at Dahshur Pyramid at Dahshur
photo by Jon Bodsworth
Pyramid at Hawara
pub dom
Amenemhet-III pyramid at Hawara
c.1797 AMENEMHET-III dies. 6th pharaoh of 12th Dyn from 1842. Though he had started a pyramid on unstable subsoil at Dahshur, he is entombed in his 2nd pyramid at Hawara, made of sun dried bricks covered with limestone which will all be stolen by Roman times. Middle Kingdom begins decline when lowly AMENEMHET-IV begins sole rule until 1790. 1815 wikP 1814 ktut 1799 bk
1797 MCAW 24, Clay, DMoN, FHBC 209, GEoP, Grim, JIAE, lveg, Murn, RAI2, WCBOT, ae, frM, scar, tig
1796 resh 1794 pic 1793 nar
1786 Shaw, phou 1772 treg
c.1790 AMENEMHET-IV dies. 7th pharaoh of 12th Dyn from 1797, leaves no male heir. Entombed in an unfinished tomb at Beni Hassan. Dau of Amenemhet-III, SEBEKNEFRU is Queen 1789-86. 1807 wikP 1806 ktut, wikAm4
1790 MCAW 24, FHBC 209, GEoP, Grim, JIAE, WCBOT, resh
1789 lveg 1788 pic 1787 ae
1786 Clay, Murn, scar, tig
1785 DMoN 1782 nar
1777 Shaw, phou 1763 treg
c.1786 SEBEKNEFRU ends. Queen of 12th Dyn from 1790. Probably married a pharaoh of 13th Dyn, who is not recognized in Thebes. 1803 wikP 1802 ktut 1786 GEoP, JIAE, lveg, MRDK, RAI2, WCBOT, resh 1784 pic 1783 ae 1782 Clay, Murn, scar, tig 1781 DMoN 1778 nar
1773 Shaw, phou 1759 treg
c.1786 12th Dynasty ends. Began 1991. Vizir preserves continuity of power.
MIDDLE KINGDOM ends. Began 2040. (Some sources end it after the 13th Dynasty.)
1792 IDB 2-667, phou
1788 BHoE 17
1786 B76 6-469, 11-896, CAH 1.2, CWH, lveg, MCAW 24, WCBOT, WPOT 86
1785 FHBC 209, 213, RAH
1783 PW 14 1780 SOTS 25
1778 Sdl 1-23 1776 FLAP 81 1750 SHWC 14
13th Dynasty begins in Memphis until 1674, ends 1650.
Rival 14th Dynasty begins at Xois (aka Sais) until 1650. About 76 unrelated kings.
Capital of Egypt, at ITJ TOWY from 1990, moved to MEMPHIS until 1674. |
Search This Blog
Tuesday, January 11, 2022
Conditional Sentences Quiz | English
1. It will be a disaster unless Krishna ______ us.
will help
would help
2. If they _______ our service when we asked them, they would get a discount now.
would support
would have supported
had supported
has supported
3. If I _______ a million dollars, I would start a business of my own.
had won
would win
has won
4. If I had more time, I _________ you.
would have helped
would help
had had helped
have had helped
5. Unless she ________ the test she will get her driving license next week.
would fail
have failed
6. Radhika won't finish it on time if she ________ right now.
would not start
does not start
would not have started
do not start
7. If I ________ in a hurry when I got up, I wouldn't catch the train.
had not been
had been
would have been
have been
8. If Rashmi ________ something to eat in the morning, she wouldn't feel sick now.
would have
would had
had had
have had
9. The dal isn't very good. It _______ better if you had put some spices on it.
would taste
would have tested
had tested
have tested
10. She _____ angry if you had told her.
would have got
would get
had got
have get
Your score =
Score in percentage =
You correctly answered questions number =
Correct Answers 1 =
Correct Answers 2 =
Correct Answers 3 =
Correct Answers 4 =
Correct Answers 5 =
Correct Answers 6 =
Correct Answers 7 =
Correct Answers 8 =
Correct Answers 9 =
Correct Answers 10 = |
March 09, 2014
Guam is the largest and southernmost of the Mariana's Islands located in Micronesia (which is roughly at the half way point between Japan and Australia). Despite its size, Guam's status as a U.S. territory along with its history and demographics create a unique and winning identity which can't be ignored.
Guam has experienced a long history of colonialism, beginning with Spain in 1668, until it was ceded to the United States after the Spanish-American War in 1898. During WWII, Guam was invaded and occupied by Japan which lasted two and a half years and resulted in the death of 10% of the population. The United States recaptured the island in 1944 following the Battle of Guam. Since the war, Guam has become an unincorporated organized territory of the U.S. This means that the people of Guam are U.S. citizens exercising a local democratic government, but do not vote for the president (although they have involvement and influence with elected delegates in the U.S. House of Representatives and national conventions).
The largest ethnic group in Guam are the native Chamorro followed by Filipino, Caucasian, and other Asian (Chinese, Korean, Japanese). While the official languages are English and Chamorro, there is an overwhelming presence of the Japanese language due to 75% of tourists being Japanese. Another unique presence in Guam is that of the U.S. military which covers 29% of the total land area with a Naval Base, Coast Guard Sector, and Air Force Base.
After arriving in the wee morning hours, we picked up our rental car and settled into our (slightly dodgy, but charming) hotel before catching some Zs and waking up to our first of seven sunny days in Guam. We took a wander around our neighbourhood (Tumon Bay) and had lunch before heading to the northern part of the island to take in some sights. Pretty much every day was punctuated by shopping (Hello, world's biggest Kmart).
Ritidian Point:
Two Lovers' Point:
Day two was a drive to explore the southern parts of the island.
Talofofo Falls:
Yokoi Cave: During the Japanese invasion of WWII, one Japanese soldier retreated into the jungle and hid in this cave for 28 years without realizing that the war had ended. He was discovered by locals in 1972 and returned to Japan.
Inarajan Natural Pools:
Merizo Belltower:
The rest of the week was filled with random sightseeing, shopping, eating, geocaching, and laying on the beach. What else could we have asked for?
Plaza de Espana:
Pacific War Museum:
Latte of Freedom: Children of Guam donated their pennies to construct this as a welcoming symbol of American freedom.
Chamorro Village: A bunch of vendors opened up with traditional food, dance performances, and things.
Fish, boats, dolphins:
A place we stopped at called 'Jeff's Pirate Cove' for some Greek food:
Driving around Inarajan:
Perused the island's beaches on our last day and watched one of the best sunsets I've ever seen:
Once back in the land of routine and income, it was time to start up the new semester. I've survived the first week and it should be smooth-sailing from here. I've had some friends return to Korea and more are coming soon, so I'm a happy human at the moment!
Post a Comment
Latest Instagrams
© rindsayloss. Design by FCD. |
According to the Dorland Medical Dictionary a cerebral aneurysm is an abnormal bulge or ballooning in a blood vessel supplying the brain. Aneurysms can rupture and bleed into the area between the brain and the surrounding membrane. A noticeable percentage of the human population, typically 2 to 5% depending on the country, harbors a cerebral aneurysm, but only about 0.1% of those aneurysms rupture annually [1].
This content is only available via PDF.
You do not currently have access to this content. |
Revisiting Mozart’s Great Mass in C minor
Wolfgang Amadeus Mozart
Beethoven’s Piano Sonatas: The New New Testament of Piano Repertoire
BeethovenVonRichardWagner1870 marked the 100th birthday of Ludwig van Beethoven. After denying the invitation from the “Beethoven Committee of Vienna” to appear onstage together with Liszt, Joachim and Clara Schumann to celebrate the event, Richard Wagner decided to write an essay instead. While this essay is notable as a broader investigation of Wagner’s aesthetic philosophy and ideals, it also remains an insightful exploration of both the artistic significance and enduring popularity of Beethoven’s music. For Wagner Beethoven’s music isn’t merely beautiful, a concept that is for him constrained by convention and subject to changing tastes and fashions, but sublime. Beethoven reveals a sort of Platonic ideal of melody, thereby liberating it from its historical moment, and connecting his listeners with a timeless, universal human truth. For Wagner it is Beethoven’s radical defiance against tradition and his intense emotional expressions that make his music a vehicle for revelation.
Though these strains are apparent across Beethoven’s entire oeuvre, it is in his piano sonatas that Beethoven’s boldest thoughts and gestures shine most brightly. Perhaps this is due to the fact that Beethoven was widely known as a brilliant pianist in his own right, giving him the natural freedom to stretch the boundaries of the instrument. Perhaps, though, it is also due to the nature of the piano itself: a solo instrument that lends itself to the realm of the personal and inward, even the diaristic, and one that, by allowing tones only to be struck and not sustained or driven forward, abstracts music into its most intellectually pure form, making it a prime medium for musical exploration and innovation.
Ludwig van Beethoven
To explore Beethoven’s piano sonatas is to explore Beethoven’s musical innovations. In these 32 pieces, we see the concentrated version of the familiar trajectory guiding us from the Classical era into the Romantic: the experimental mimicry of his early years, the ego-driven defiance of his middle years where, at the height of his compositional powers, he most fully challenges convention, and finally his late years where, fully deaf, he introspectively explores the mysteries of life and death. more “Beethoven’s Piano Sonatas: The New New Testament of Piano Repertoire”
Beethoven’s Ninth: How Reading What Beethoven Wrote Changed Everything
Jonathan Del Mar
For a conductor music starts with Beethoven. And for the son of a conductor both can start very early, as they did for Jonathan Del Mar, Beethoven scholar and editor of the new edition of Beethoven’s nine symphonies for Bärenreiter.
In 1949 Del Mar’s father, conductor Norman Del Mar, purchased a copy of the 1924 facsimile of Beethoven’s Symphony No. 9, which he studied with Jonathan when he was still a child. The younger Del Mar, whose career also began as a conductor, remarks, “Had it not been for our possession of this endlessly fascinating document, it must remain doubtful whether my interest in Beethoven’s handwriting, and my work on his autographs, would ever have begun.”
Jonathan Del Mar’s edition of the nine symphonies for Bärenreiter, completed in 2000, has become the preferred edition for many renowned conductors worldwide.
“We all are amongst those of gratitude to Jonathan Del Mar who simply did the work to give us the first, really true edition of what this music was.”
— Sir Simon Rattle
BarenreiterBeethoven9The most monumental symphony of them all, the Ninth, was the first of the new edition to be published, and it was in preparing this edition of this very special symphony that Del Mar made one of his most thrilling discoveries. more “Beethoven’s Ninth: How Reading What Beethoven Wrote Changed Everything”
Dvorak’s Symphony No. 9: A National Culture for the New World
Antonín Dvořák
Even in a cultural era ripe with nationalism, Antonín Dvořák was one of the most nationalistic. Slavic folk music, especially from his native Bohemia, permeates his entire oeuvre. He develops these simplistic folk elements into sophisticated symphonies, operas and concertos through Romantic compositional techniques, while retaining a certain innocence that makes his music approachable and beloved by musicians and audiences alike.
For Dvořák incorporating Slavic folk elements into his music wasn’t so much a political gesture as it was a matter of musical philosophy. Having grown up in the Bohemian countryside playing folk tunes in his father’s tavern, he intuited an intimate relationship between music and the place it came from, and he believed that all peoples of the world should develop their own music stemming from their homegrown culture. more “Dvorak’s Symphony No. 9: A National Culture for the New World”
Discovering Mårten Jansson & Bärenreiter’s Jansson Choral Competition
Mårten Jansson
Every time we listen to Swedish composer Mårten Jansson we can’t help but get swept up in the whirlwind of emotions he creates. His music is full of all of the compositional elements that choristers love to sing: sweeping melodic lines, open chords and expressive dissonance.
Ultimately, though, performers and audiences alike fall in love with his music because they are drawn to the fundamental honesty at its core. Jansson approaches traditional sacred texts with humility, and he openly shares his experience of it through his music in a way that amplifies the text without pretense or contradiction.
This honesty should not be confused with simplicity or naïveté. Jansson’s stunning Missa Popularis, for instance, manages to connect us to a profound range of emotions, while uniting many layers of thought and tradition into the microcosm of a single piece of music. In addition to all of Jansson’s neoromantic tendencies, the Missa sits atop a foundation of Swedish folk dances and also sounds strikingly Medieval. Though perhaps most obvious in the opening of the “Kyrie” and the “Agnus Dei,” the feeling of the chant is present throughout the entire Mass. more “Discovering Mårten Jansson & Bärenreiter’s Jansson Choral Competition”
The Excitement of Editing Debussy’s Works: Interview with Bärenreiter Editor Douglas Woodfull-Harris
Douglas Woodfull-Harris has been working at Bärenreiter as an editor for orchestral and chamber music for more than 25 years and has overseen the production of countless editions. In 2018 we will commemorate Claude Debussy’s death 100 years ago. Among the editions which Woodfull-Harris has personally edited are Debussy’s La Mer, Afternoon of a Faun, his Cello Sonata and String Quartet, Images for piano, Syrinx for Flute, and most recently the Rhapsodie Première for Orchestra with Solo Clarinet (coming in December 2017).
Claude Debussy, c. 1908
Douglas Woodfull-Harris
Why Debussy? What made you turn to his works?
Douglas Woodfull-Harris (DWH): From conversations with musicians I knew that the existing editions had problems such as discrepancies between score and parts of orchestral works. Orchestras had their correction lists and made do with what they had but scholarly-critical editions were badly needed. Also, I simply enjoy the music.
The first work by Debussy which you edited was his cello sonata. How did you proceed?
DWH: Of course, I gathered together all relevant sources as I always do. During this process I investigated a private collection in Winterthur (Switzerland) which nobody appears to have looked into, and there I found sketches to the Cello Sonata.
Now, the final note in measure 18 of the 2nd movement is the lowest note on the cello, a C. In the autograph score, the first edition, and all other published editions a “circle” or “zero” appears above the note (*see example below). This circle today is understood to indicate that the note should be played as an open string. I asked myself why an experienced composer like Debussy would mark a note in such a way that can only be played as the open C string. It simply didn’t make sense to me. The marking seemed redundant. But is it possible Debussy meant something else? more “The Excitement of Editing Debussy’s Works: Interview with Bärenreiter Editor Douglas Woodfull-Harris”
Publisher Spotlight: Bärenreiter
baer_240pixelBärenreiter is a renowned German publisher. Founded in 1923, during an era in which there was a burgeoning interest in early music, Bärenreiter quickly developed its reputation for using musicological research to inform editorial decisions. Their editions are preferred by many musicians worldwide. So what is it about Bärenreiter publications that makes them so popular? Our interview with Bärenreiter staff, below, will answer that question and more!
Question: What is an Urtext edition? Why is it important?
Until the early 20th century, performers and music teachers were principally concerned with passing on their own performance instructions to up-and-coming generations of musicians. This led to the development of “instructive” editions, which included personal interpretations of bowing, dynamics, articulation, etc. Two of the most famous instructive editions were those by Artur Schnabel for the Beethoven sonatas and Clara Schumann for the piano works of Robert Schumann.
Because these editions contained major changes that were not originally written by the composer, there was a movement during the middle of the 20th century to return to a musical text free from any extraneous input. In a nutshell: Urtext editions are edited by specialists who take all available sources of a particular work into account and strive to put together a musical text as close as possible to the composer’s original intentions. more “Publisher Spotlight: Bärenreiter” |
children playing
The new kindergarten - let's play math! [CA-ON]
Printer-friendly versionSend by emailPDF version
Kalinowski, Tess
Publication Date:
18 Jul 2006
See text below.
It used to be dismissed as high-priced babysitting, a place where children learned fingerpainting and played with blocks.
But kindergarten teachers say the pendulum has swung the other way &emdash; and a new kindergarten curriculum being launched this fall in Ontario shows just how much the province expects of its youngest students.
To the untrained eye, kindergarten classes this fall will have the same blocks, pots of paint and puppets. But what students and teachers are expected to do with those materials is specified in copious new detail in the curriculum document, only the second in Ontario's history.
More than ever, the kindergarten curriculum dovetails precisely with the rest of Ontario's crammed school program, outlining exactly which skills a child is expected to have by the time they get to Grade 1.
When they finish kindergarten, students have to be able to write a short piece of text such as a greeting card or grocery list &emdash; even if they haven't spelled the words correctly.
They have to be able to retell a story, with an accurate sequence of events. They must be able to estimate quantities, understand the concept of volume and decipher simple math problems using words instead of numerals.
The new 74-page kindergarten guidelines &emdash; part of the government's ongoing review of the entire public school curriculum &emdash; updates the 23-page, 1998 version.
It includes an added learning unit on health and physical activity, in addition to rigorous expectations on the five key learning areas of language &emdash; math, science and technology, the arts, and personal and social development.
That means by the time they're finished kindergarten, in addition to everything else, students have to demonstrate a basic grasp of nutrition, safety, their emotional well-being and hygiene &emdash; such as being able to tell the teacher what they would do if they encountered broken glass on the playground, or explain they are thirsty after running around at recess.
Increasingly, teachers are facing pressure from parents, boards and principals to make their programs less about play and more about academics.
[Joan] Littleford [of the Elementary Teachers' Federation of Ontario] is hoping the new curriculum document, with its specific examples of how a young child demonstrates knowledge &emdash; such as lining up teddy bears in order of size, or painting a balloon to show the letter "b" &emdash; is the ammunition teachers need to persuade others that a child's work really is play.
It also shows the value of traditional kindergarten teaching tools such as water and sand tables &emdash; unpopular with other school staff because they make a mess but invaluable in teaching a child about volume or recreating the setting of a story.
In sessions ranging from the value of playdough to the best classroom activity centres, kindergarten teachers this summer are learning how to connect the latest research on child brain development and their school programs.
- reprinted from the Toronto Star |
Celebrate National Therapeutic Recreation Week
Every year in the second week of July, National Therapeutic Recreation Week is celebrated in the US. It began in 1984, started by the National Therapeutic Recreation Society to help highlight the significance of engaging in activities that aid in the recovery of various forms of disabilities. Therapeutic recreation also encompasses holistic interventions for people suffering from cancer.
What Do Recreational Therapists Do?
Recreational therapists are responsible for working with a physician to help find activities that can assist patients with disabilities to better cope and maintain a positive sense of self-esteem. They are required to have a bachelor’s degree, usually in recreational therapy, and have courses specific to assistive technology and disease processes. Each program usually requires the student to complete several clinical hours or an internship in order to sit for the National Certification Exam. A certified therapeutic recreation specialist (CTRS) must recertify themselves every five years to remain active.
A CTRS helps develop the emotional and physical well being of the patients they serve through art, sports, and hobbies. Some specific activities for therapy include:
• Creative writing
• Painting and drawing
• Horticulture therapy
• Pet therapy
• Dance or movement therapy
Where Does a CRTS Work?
CTRS can be found working in hospitals, residential facilities, long term care, mental health centers, substance abuse rehabilitation programs, hospices, and even schools. They can also be hired for private practice out of the home.
Who Can Use the Services of a Recreational Therapist?
Anyone who is suffering from a debilitating disease can benefit from using a recreational therapist. They work with all ages and anyone on the autism spectrum. The elderly have a lot to benefit from the use of recreational therapists, as do patients suffering from cancer. The goals for treatment include increasing self-confidence by increasing physical strength and improving frame of mind.
How Can I Celebrate National Therapeutic Recreation Week?
It depends on the specialty you work in, but you can easily incorporate some of our ideas to celebrate National Therapeutic Recreation Week.
For starters, you can recognize your organization by promoting disability awareness. Some other ideas include holding sports tournaments where people with disabilities are encouraged to play, distributing information, and planning a walk where each person pairs up with a friend or family member who suffers from a disability. Hold a lunch and learn to promote recreation ideas to members of your team. Any event that brings awareness to the field and encourages healthy movement and mind are welcome.
Collaborating with Certified Therapeutic Recreation Specialists will make an immense difference in the therapeutic goals set for patients. They are proving to be an integral part of the patient’s treatment plan as they increase self-expression and help improve the mind-body connection and most importantly build self-esteem for our patients suffering from disabilities. |
Photo by Pixabay on
Demonstrating you’re not a robot is getting harder and harder
At some point last year, Google’s constant requests to prove I’m human began to feel increasingly aggressive. More and more, the simple, slightly too-cute button saying “I’m not a robot” was followed by demands to prove it — by selecting all the traffic lights, crosswalks, and storefronts in an image grid. Soon the traffic lights were buried in distant foliage, the crosswalks warped and half around a corner, the storefront signage blurry and in Korean. There’s something uniquely dispiriting about being asked to identify a fire hydrant and struggling at it.
These tests are called CAPTCHA, an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart, and they’ve reached this sort of inscrutability plateau before. In the early 2000s, simple images of text were enough to stump most spambots. But a decade later, after Google had bought the program from Carnegie Mellon researchers and was using it to digitize Google Books, texts had to be increasingly warped and obscured to stay ahead of improving optical character recognition programs — programs which, in a roundabout way, all those humans solving CAPTCHAs were helping to improve.
Because CAPTCHA is such an elegant tool for training AI, any given test could only ever be temporary, something its inventors acknowledged at the outset. With all those researchers, scammers, and ordinary humans solving billions of puzzles just at the threshold of what AI can do, at some point the machines were going to pass us by. In 2014, Google pitted one of its machine learning algorithms against humans in solving the most distorted text CAPTCHAs: the computer got the test right 99.8 percent of the time, while the humans got a mere 33 percent.
Google then moved to NoCaptcha ReCaptcha, which observes user data and behavior to let some humans pass through with a click of the “I’m not a robot” button, and presents others with the image labeling we see today. But the machines are once again catching up. All those awnings that may or may not be storefronts? They’re the endgame in humanity’s arms race with the machines.
Jason Polakis, a computer science professor at the University of Illinois at Chicago, takes personal credit for the recent increase in CAPTCHA difficulty. In 2016, he published a paper in which he used off-the-shelf image recognition tools, including Google’s own reverse image search, to solve Google’s image CAPTCHAs with 70 percent accuracy. Other researchers have broken Google’s audio CAPTCHA challenges using Google’s own audio recognition programs.
Machine learning is now about as good as humans at basic text, image, and voice recognition tasks, Polakis says. In fact, algorithms are probably better at it: “We’re at a point where making it harder for software ends up making it too hard for many people. We need some alternative, but there’s not a concrete plan yet.
The literature on CAPTCHA is littered with false starts and strange attempts at finding something other than text or image recognition that humans are universally good at and machines struggle with. Researchers have tried asking users to classify images of people by facial expression, gender, and ethnicity. (You can imagine how well that went.) There have been proposals for trivia CAPTCHAs, and CAPTCHAs based on nursery rhymes common in the area where a user purportedly grew up. Such cultural CAPTCHAs are aimed not just at bots, but at the humans working in overseas CAPTCHA farms solving puzzles for fractions of a cent. People have tried stymying image recognition by asking users to identify, say, pigs, but making the pigs cartoons and giving them sunglasses. Researchers have looked into asking users to identify objects in Magic Eye-like blotches. In an intriguing variation, researchers in 2010 proposed using CAPTCHAs to index ancient petroglyphs, computers not being very good at deciphering gestural sketches of reindeer scrawled on cave walls.
Recently there have been efforts to develop game-like CAPTCHAs, tests that require users to rotate objects to certain angles or move puzzle pieces into position, with instructions given not in text but in symbols or implied by the context of the game board. The hope is that humans would understand the puzzle’s logic but computers, lacking clear instructions, would be stumped. Other researchers have tried to exploit the fact that humans have bodies, using device cameras or augmented reality for interactive proof of humanity.
The problem with many of these tests isn’t necessarily that bots are too clever — it’s that humans suck at them. And it’s not that humans are dumb; it’s that humans are wildly diverse in language, culture, and experience. Once you get rid of all that stuff to make a test that any human can pass, without prior training or much thought, you’re left with brute tasks like image processing, exactly the thing a tailor-made AI is going to be good at.
“The tests are limited by human capabilities,” Polakis says. “It’s not only our physical capabilities, you need something that [can] cross cultural, cross language. You need some type of challenge that works with someone from Greece, someone from Chicago, someone from South Africa, Iran, and Australia at the same time. And it has to be independent from cultural intricacies and differences. You need something that’s easy for an average human, it shouldn’t be bound to a specific subgroup of people, and it should be hard for computers at the same time. That’s very limiting in what you can actually do. And it has to be something that a human can do fast, and isn’t too annoying.”
Figuring out how to fix those blurry image quizzes quickly takes you into philosophical territory: what is the universal human quality that can be demonstrated to a machine, but that no machine can mimic? What is it to be human?
But maybe our humanity isn’t measured by how we perform with a task, but in how we move through the world — or in this case, through the internet. Game CAPTCHAs, video CAPTCHAs, whatever sort of CAPTCHA test you devise will eventually be broken, says Shuman Ghosemajumder, who previously worked at Google combatting click fraud before becoming the chief technology officer of the bot-detection company Shape Security. Rather than tests, he favors something called “continuous authentication,” essentially observing the behavior of a user and looking for signs of automation. “A real human being doesn’t have very good control over their own motor functions, and so they can’t move the mouse the same way more than once over multiple interactions, even if they try really hard,” Ghosemajumder says. While a bot will interact with a page without moving a mouse, or by moving a mouse very precisely, human actions have “entropy” that is hard to spoof, Ghosemajumder says.
Google’s own CAPTCHA team is thinking along similar lines. The latest version, reCaptcha v3, announced late last year, uses “adaptive risk analysis” to score traffic according to how suspicious it seems; website owners can then choose to present sketchy users with a challenge, like a password request or two-factor authentication. Google wouldn’t say what factors go into that score, other than that Google observes what a bunch of “good traffic” on a site looks like, according to Cy Khormaee, a product manager on the CAPTCHA team, and uses that to detect “bad traffic.” Security researchers say it’s likely a mix of cookies, browser attributes, traffic patterns, and other factors. One drawback of the new model of bot detection is that it can make navigating the web while minimizing surveillance an annoying experience, as things like VPNs and anti-tracking extensions can get you flagged as suspicious and challenged.
Aaron Malenfant, the engineering lead on Google’s CAPTCHA team, says the move away from Turing tests is meant to sidestep the competition humans keep losing. “As people put more and more investment into machine learning, those sorts of challenges will have to get harder and harder for humans, and that’s particularly why we launched CAPTCHA V3, to get ahead of that curve.” Malenfant says that five to ten years from now, CAPTCHA challenges likely won’t be viable at all. Instead, much of the web will have a constant, secret Turing test running in the background.
In his book The Most Human Human, Brian Christian enters a Turing Test competition as the human foil and finds that it’s actually quite difficult to prove your humanity in conversation. On the other hand, bot makers have found it easy to pass, not by being the most eloquent or intelligent conversationalist, but by dodging questions with non sequitur jokes, making typos, or in the case of the bot that won a Turing competition in 2014, claiming to be a 13-year-old Ukrainian boy with a poor grasp of English. After all, to err is human. It’s possible a similar future is in store for CAPTCHA, the most widely used Turing test in the world — a new arms race not to create bots that surpass humans in labeling images and parsing text, but ones that make mistakes, miss buttons, get distracted, and switch tabs. “I think folks are realizing that there is an application for simulating the average human user… or dumb humans,” Ghosemajumder says.CAPTCHA tests may persist in this world, too. Amazon received a patent in 2017 for a scheme involving optical illusions and logic puzzles humans have great difficulty in deciphering. Called Turing Test via failure, the only way to pass is to get the answer wrong.
Exit mobile version |
Guide to the
Our Robin bird guide will help you to get to know your red-breasted garden friend better. You can spot Robins all year round, but are a familiar sight in winter and on Christmas cards. It’s impossible to tell the difference between male and female birds as they look identical. Young birds are golden brown in colour with no red breast. Despite their cute appearance, they can be very territorial and aggressive to unwanted intruders. They love eating insects, fruit and seeds.
How to identify Robins?
A small brown bird with a red breast and a white belly. Males and females are similar. Juveniles lack the red breast for their first few months. Instead, their whole plumage is brown and finely spotted.
What do Robins sound like?
Their call is a short, sharp ‘tick’, which is often repeated. The song is a distinctive warble, that can sometimes be heard after dark under street lighting.
What do Robins eat?
Insects, especially small beetles and spiders, but they also take fruit and seeds during the winter.
What predators do Robins have in gardens?
Mainly Sparrowhawks.
How numerous are Robins?
The last population estimate of this species was undertaken in 2016. It showed that there were 6,650,000 pairs in Britain and 7,350,000 in the UK.
How long do Robins live for?
On average, Robins live for around two years. However, the current longevity record for this species is eight years and five months.
When are Robins most frequently seen in gardens?
According to Garden BirdWatch data, which has been collected since 1995, they are most frequently seen during January in around 93% of gardens. On average, the highest monthly maximum count of this species tends to be in February, of around 1.56 birds per garden.
Are Robins increasing or declining in gardens?
Robin numbers in gardens have remained relatively stable since Garden BirdWatch began. However, they are quite susceptible to cold winters, which do tend to have a negative effect on the population.
When do Robins nest?
Robins nest between March and July, and usually have two broods in a year. They typically lay up to five eggs that are incubated for around 14 days. The young tend to fledge after another 14 days.
Do Robins use nest boxes?
Yes, Robins tend to nest in open fronted nest boxes. Size: base 150 x 120mm, front 150 x 100mm. Siting: one to three metres off ground, well hidden by thick vegetation.
What can I do to help Robins in my garden?
Provide food and a fresh, clean supply of water for them. Also, put up nest boxes for them in your garden.
Did you know?
Despite what you may see around the festive season, Robins are not only seen in gardens around Christmas! They are seen in gardens all year round. This species’ association with Christmas is thought to derive from the fact that Postal employees in Victorian times used to wear red uniforms in the winter months so were known as ‘Redbreasts’. They delivered cards around Christmas, so this is what is thought to have brought about this association.
This bird guide has been written in collaboration with experts at the British Trust for Ornithology. To find out more about their vital work, visit: |
Spilling the Beans: volatile Qualifier
It is interesting to see that some aspects (mostly unintended) can stimulate lots of good and fruitful discussions. So this happened with “Spilling the Beans: Endless Loops” (recommended to read 🙂 where using (or not using) volatile for inline assembly created thoughts which warrant an article on that subject.
The volatile qualifier in C/C++ is misunderstood by many programmers, or wrongly used.
Photo by Tara Winstead on Pexels.com
Still, ‘volatile’ is very useful if you know what it means for the compiler and what is good use of it.
Code like the one below is simply fully wrong, only trying to hack around the real problem (lack of re-entrancy). So if you see something like this, you better don’t use that code, because that coder clearly did things the wrong way :-(.
Wrong usage of volatile
In essence, the volatile qualifier marks an object or variable as ‘it can change outside of what the compiler might assume‘, both for read and write operations. And it should be only used for hardware registers.
Assuming the following (illustrative, non-hardware) example:
int var;
Whenever this variable is read, the next read operation might return something different.
Consider the following (simplified) example:
var = 5;
An optimizing compiler could combine the two operations into a single ‘var= 6;’ because previously it had stored the value of 5. If that variable would be marked with ‘volatile’
volatile int var;
then the compiler has to assume that the write might have side effects (changing other variables) or that a read of ‘var’ will not return what has been previously stored.
Now many developers wrongly reduce ‘volatile’ to ‘prevents compiler optimizations’ which is not the full story: yes, the net effect is kind of like that, but that not the full story.
So the compiler has to do read and writes whenever that variable is accessed, because things might have changed. Nothing more and nothing less. I highly recommend that you read “Nine ways to break your systems code using volatile” by John Regehr.
So don’t think you can ‘control’ the code beyond of telling the compiler that he needs to generate extra read and writes.
What are legitimate uses of volatile? The above example with ‘var’ for sure is not (was for illustrative usage only!).
A good usage of volatile is for hardware registers. Below is a simplified case for an Analog-to-Digital converter hardware which is memory mapped:
typedef struct {
volatile uint32_t CTRL; /* ADC control register */
volatile uint32_t VAL; /* ADC result register */
} ADC;
The registers are marked as ‘volatile’, because the reading or writing to the control register will start or stop a conversion (has a hardware side effect), the register content might change anytime by the hardware, or some parts or bits of it are writable only and cannot be read. Similar to the VAL register which contains the conversion result: it can be changed anytime. So here the ‘volatile’ is appropriate because it warns the compiler about side effects and that the compiler cannot make any assumptions about read and write accesses. You still cannot make assumptions about how the read/write accesses are made (single 32bit? two 16bit accesses? 4 8-bit accesses? order of it?). Here only assembly code will be to the rescue.
And if you have seen volatile for inline assembly code:
__asm volatile("nop");
This is not wrong, but strictly speaking not needed, as the compiler shall not touch/change the assembly instruction. If you need it, then it is probably a sign of a compiler bug.
So in my view volatile should be used for hardware registers only, or in most cases. One use case where it is OK is something like this:
static volatile bool done = false;
void UART_Completed_Interrupt(void) {
done = true;
void foo(void) {
done = false;
UART_SendString("hello world!"); /* shall trigger UART_Completed_Interrupt()! */
while(!done) {
/* wait, should add a timeout here! */
The above assumes that read and write to ‘done’ is atomic, and that it is used just in the above instances and not somewhere else. While the above ‘works’, I rather would use a semaphore or other signalling.
There is another legitimate use case where ‘volatile’ has to be used to work-around a compiler bug, and where it is not appropriate to rewrite the code. In that case the ‘volatile’ could cause the compiler to skip (wrong) optimizations which in that (very rare) case is appropriate in my view.
I recommend that you search in your code base for the ‘volatile’ qualifier. You might be surprised in how many places it is used: if it is not used for hardware registers, it is very likely wrong.
That example below I showed earlier is such a case:
/* receive state structure */
typedef struct _debug_console_write_ring_buffer
uint32_t ringBufferSize;
volatile uint32_t ringHead;
volatile uint32_t ringTail;
} debug_console_write_ring_buffer_t;
The underlying problem is that the code using this ring buffer is not re-entrant and is not using the correct critical sections to make it re-entrant. Adding the ‘volatile’ hides the problem only: it makes the code ‘working’ in ‘most cases’ only, because it reduces the changes that things can go wrong: but again: it is simply wrong. Now: if you have not read “Nine ways to break your systems code using volatile” yet, that would be a good time. 🙂
Again: I recommend that you have a look at the good previous discussion in “Spilling the Beans: Endless Loops“.
Happy volatiling 🙂
37 thoughts on “Spilling the Beans: volatile Qualifier
1. Good point about the reentrancy problem.
What about memory which is affected by DMA? Surely by “hardware register” you mean any memory mapped location that can be altered by external events?
Also, very interesting to read about the C on PDP-11… I wrote for PDP 11/73’s but only in assembler! those were the days! 🙂
2. Thank you for this nice article (as all yours about embedded programming .. keep writing).
But I think that using volatile ONLY for registers is too conservative statement in bare-metal embedded systems. And John Regehr’s example (realy nice article) with interrupt software flag is what I mean – a very common situation in practice (that caused me headaches several times). So, especially this situation, must be kept always in mind.
int done;
__attribute((signal)) void __vector_4 (void) {
done = 1;
void wait_for_done (void) {
while (!done) ;
Liked by 1 person
• Hi Yasen,
thank you, and yes, this has been noted: indeed it is too restrictive, and in this case it would be fine. I think I need to add this to the article. Still I prefer a semaphore or similar so I don’t have to block, but this usually requires a runtime environment like an RTOS which is pretty standard for many embedded applications too, at least for the ‘medium’ or ‘larger’ ones.
3. More great information, Erich, thankyou.
My “rule of thumb” or my default assumption for volatile is this:
If I’m writing a driver, then I will need volatile as some places in my code.
If I’m writing control code that uses the driver, then I don’t need to use volatile in my code.
Your next article is surely ‘static’ 🙂
Liked by 1 person
4. I’m enjoying these daily refreshers on the basics.
What about this common construct that I’ve been using forever?!
volatile int done_flag;
void ISR_TIMER (void) {
done_flag = 1;
void wait_for_done (void) {
while (!done_flag) ;
// do something at regular interval
It’s also mentioned in the article you linked as a valid use in addition to hardware register access.
– “The volatile qualifier forces stores to go to memory and loads to come from memory, giving us a way to ensure visibility across multiple computations (threads, interrupts, coroutines, or whatever).”
Liked by 1 person
• Hi Paul,
yes, agreed, that’s for me one of the few cases where it is valid. However, one needs to keep in mind that it only works properly if only one is writing it, and only one is reading it, and if read and write operations are atomic.
In general, I avoid such ‘interrupt polling flag’ as this is wasting CPU cycles. I rather use a synchronization with a semaphore or similar so I don’t have to wait.
• I remember that in the Linux kernel volatile is almost strictly forbidden.
If I recall correctly the argument was that it wasn’t variables what should be marked volatile, but particular reads or writes to a memory address, whose behaviour can be made more specific than just “volatile” (e.g. hardware specific caching behaviour, etc.) . And in some cases, volatile-like and non volatile accesses may make sense to be mixed.
I found this on a quick search: https://www.kernel.org/doc/html/latest/process/volatile-considered-harmful.html
Liked by 1 person
• Thanks for that article link, really interesting. And it confirms for me that ‘volatile’ is overused and used in wrong places, just to ‘fix’ things in a in-proper way. For dealing with hardware caching it would be the wrong way too: there ‘sync’ barriers or ‘pipeline flush’ instructions are my choice solving these problems.
5. Why do you think you need re-entrancy when you work with ring buffers?
If you have multi-write point, you need to guard anyway, same for read.
For me, its not the best example.
Where I see a bigger problem is for example multiplication)
square(volatile int16_t* in) {
return (*in) * (*in);
Here result may not really be square.
Liked by 1 person
6. Here is another article to add to the reading list, and it is interesting that it came out about the same day this discussion started (Something in the Aehter?):
“Preventing an optimising compiler from removing or reordering your code.”
A separate issue where volatile can appear is ‘Code Motion’. The above discusses it in terms of C++ rather than the embedded level. John did address it to some degree in his article.
When you see “The compiler is broken. My code works when I turn optimization off, my code runs fine.” in the messages boards you can be reasonably sure (I have found real compiler bugs in the early days of GCC-AVR) that there is either a missing volatile or an issue with code motion reordering things unexpectedly.
In the foo() example I have never cared for the whole set/clear flag methodology. Consider a timer IRQ setting a ‘done’ flag. With the main loop clearing the flag, here can be race conditions setup such that IRQs can be missed. Because the timer IRQs are periodic, the fact that timer IRQs are being missed can be hard to notice. The error would show up as a long term time drift rather than an overt bug.
A simple approach to the problem, if not RTOS is around with semaphores etc., is to increment a volatile event variable in the IRQ. Then in the main loop compare it with a last saved copy to see if the saved copy and the event variable are now different. This prevents the whole done set/clear race between the IRQ and the main loop. The event variable needs to be atomic sized for the processor at hand to not introduce other subtle bugs. There are also issues of IRQ rates vs main loop rates that need to be considered etc.
Liked by 1 person
7. The compiler optimization level can make these bugs hard to find. The answer to many of these problems is RTOS. Mostly I have decided that I only write RTOS programs…. that being said these multi cpu mcus can inject all-kinda-brain-damage.
Liked by 1 person
• Yes, that’s usually what I do. Using semaphore or other RTOS notification mechanism might seem like an overhead, but this all makes the ‘always works’ from a ‘might work with volatile’ thing. Again, volatile only should be used where it is the right thing, for example hardware registers.
8. Maybe it’s a stupid question, but I couldn’t understand why the first piece of code (from fsl_debug_console.c) in the article is wrong.
It’s just a struct definition of a ring buffer. Because the presence of volatile attribute on ringHead and ringTail, I suspect they can be changed in interrupt context and can be used in the mainline code too.
Most probably the mainline code copy new data to transmit in the buffer at ringHead position, incrementing it; ISR get new data from ringTail and increment it. Moreover ISR checks ringTail==ringHead to detect buffer empty condition.
What’s wrong with this? I think volatile is important in this scenario.
• In the first place, it is a ‘code smell’ which should be flagged by any source code review: using volatile (as with the whole discussion in this and the previous article) is justified in very, very few places. I did not check all border conditions, but I would not trust it. First, it is not necessary from the DbgConsole_SendData() point of view, because this one is disabling all interrupts to create a critical section (that’s fine). So if you create a critical section, you don’t have other accesses, so the volatile is simply not needed, as it is reentrant.
There is DbgConsole_SendDataReliable() which does the same: disabling interrupts and creating a critical section.
DbgConsole_Flush() is not ok as it is not using a critical section: it compares ringHead with ringTail, and in-between the two accesses an interrupt might happen and invalidate the return value: the flush function might return success even if this is wrong which is not good.
The bigger issue is with DbgConsole_SerialManagerTxCallback() which does not create a critical section at all which accesses and modifies both ringTail and ringHead the same time, in a non-reentrant way without critical section. I don’t see that there is a critical section established outside calling the callback() which could be implemented, but that would be not a good solution as this extends the section beyond what is needed. Especially if the CS is done with disabling all interrupts, creating lots of latency in the system.
The implementation *might* work in all cases, but the volatile is not warranted here in my case, as it does not do this ‘polling loop’ as explained as a possible exception. So if the volatile here really makes or breaks the implementation, then it only hides a true reentrancy issue imho.
I hope this helps.
• I’m sorry but I don’t know the full code of this source file, so I can’t follow you throughly.
I agree with you about critical sections (disabling interrupts): if you disable interrupts before accessing variables changed in ISR, volatile keyword isn’t needed and should be avoided.
However there are many situations where disabling interrupts are not desired (because of latency) or at least it isn’t strictly needed.
Even Nigel Jones, that you cited, in one of his article[1] suggests to use volatile attribute for variables accessed in ISR. He talks about “Global variables modified by an interrupt service routine”. He write “Global variables”, but they can be static variables used in a well-confined single source file (a driver?).
Your article is very critical against volatile and this is ok for an uncontrolled use. IMHO is very useful in writing ISRs in bare metal systems where you don’t have locks, mutexes, semaphores and similar tools.
I understand volatile could be sub-optimal in some cases, because it forces the compiler to skip optimizations. However the same thing can be said for critical sections.
Entering a critical section only for reading and incrementing ringHead (while ringHead is only accessed for reading in ISR) isn’t necessary and can lead to a sub-optimal solution (increased interrupt latency).
In bare metal and simple systems, entering critical section means disabling all interrupts. I don’t know if this could be better than define volatile a couple of variables, in a well confined and well controlled part of code (a uart driver).
[1] https://barrgroup.com/embedded-systems/how-to/c-volatile-keyword
• >>However there are many situations where disabling interrupts are not desired (because of latency) or at least it isn’t strictly needed.
‘Global variables’ mean objects with a static (not dynamic address), their linkage (static or external) does not matter in this context. If they have a static address are not ‘private’ to a single usage, they are subject of a reentrancy problem (I recommend the article about that topic by the legendary Jack Ganssle: http://www.ganssle.com/articles/areentra.htm).
It is important to understand that the ‘volatile’ only tells the compiler to do explicit read and writes, nothing else. It does *not* solve the reentrancy problem, these are two separate things. But many developers mix the two things. I disagree that it is needed to use volatile in general in ISRs: if you need to make sure that writes are done in a certain order, volatile does not help here. You will need proper memory barriers and flushing.
The only place where volatile is ensured (apart for hardware registers) is for something like this in the application code polling a flag like:
volatile bool flagSetByInterrupt;
while(!flagSetByInterrupt) { /* wait */ } // variable is volatile to ensure reading it during every access by the compiler
The above only works correctly if the access is atomic.
My point is exactly against this: ‘volatile’ is *never* a replacement for mutexes, semaphores or similar tools. Volatile is never the correct tool to ensure reentrancy, you need a critical section for this!
The point is that volatile aims *not* at disabling optimizations. Yes, the net effect can be looked like this, but it only tells the compiler that the object might change between read and writes, therefore it has to do forced read operation for reading it and doing forced write for writing it. As pointed out by point 5 in https://blog.regehr.org/archives/28 it does not give any guarantee about the code ordering.
And: a critical section does not provide this to you neither!
A critical section is well needed even for read operations, if an interruption of the control flow can cause inconsistent states. It is a common misunderstanding that only reading things is safe. For example
if (ringHead==ringTail) { /* buffer is empty */
are just two read operations. But what if between the two reads it gets interrupted and an item added to the buffer? The code following the comparison is then wrong and leads to wrong results :-(.
In summary:
– ‘volatile’ only tells the compiler that the object might change after a read or write, forcing the compiler to do explicit reads and writes. Nothing else. Really nothing else.
– ‘reentrant’ or ‘reentrancy’ is an attribute to section or piece of code, ensuring correctness of that this piece of code, that it can re-entered at any time (for example by a task or interrupt or whatever which can re-enter it). Reentrancy is a topic of shared code with shared data which can be changed, so it would affect self-modifying code as well (not usually a subject in embedded programming, but just added here for completeness).
– a ‘critical section’ is a tool or method to ensure reentrancy: tools to ensure reentrancy are disabling interrupts, semaphore, mutex, etc
– ‘access order’ is yet another topic: none of the above solves that: for this you need proper flushing/memory barriers/etc to make it happen.
>>In bare metal and simple systems, entering critical section means disabling all interrupts.
No, not necessarily: it is just one way (brute force). And in most cases you even don’t need to disable all interrupts. I recommend the series starting with https://mcuoneclipse.com/2016/08/14/arm-cortex-m-interrupts-and-freertos-part-1/ which shows that for example you only need to disable some interrupts (depending on your hardware). As pointed out above: reentrancy needs to be ensure that the code can be re-entered correctly under all circumstances, protecting it from interrupted. So if you have a ring buffer for UART, you might just need to protect it from interrupted by that specific UART interrupt, not by every interrupt. There is a common misunderstanding that you always need to protect things against all interrupts: there are many cases where you only need to protect against a few. But: you need to make sure that your protection is reentrant too!
Last but not least: I recommend reading yet another article I wrote: https://mcuoneclipse.com/2014/01/26/entercritical-and-exitcritical-why-things-are-failing-badly/
I hope this helps. I know this is a complex topic, and still many embedded applications fail to implement things correctly.
9. Hi Eric
Is this a bad use of volatile to solve a GCC optimisation issue?
// Called to activated an endpoint, calling the hardware activation after setting endpoint variables
static void fnActivateEndpoint(const USB_ENDPOINT_DESCRIPTOR *ptrEndpointDesc, unsigned short usMaxLength, int iChannel)
volatile unsigned short usEndpointLength = ptrEndpointDesc->wMaxPacketSize[0];
…. (non-relevant code removed)
usEndpointLength |= (ptrEndpointDesc->wMaxPacketSize[1] <wMaxPacketSize[1] << 8);
when -Os is used, when usEndpointLength is not declared as volatile.
The reason is due to packed struct USB_ENDPOINT_DESCRIPTOR as follows
typedef struct _PACK stUSB_ENDPOINT_DESCRIPTOR
unsigned char bLength; // descriptor size in bytes
unsigned char bDescriptorType; // device descriptor
unsigned char bEndpointAddress; // direction and address of endpoint
unsigned char bmAttributes; // endpoint attributes
unsigned char wMaxPacketSize[2]; // endpoint FIFO size
unsigned char bInterval; // polling interval in ms
which means that wMaxPacketSize[0] is possibly at an uneven address.
With optimisation at high the compiler tries to optimise the calculation of the length by reading the array as a half-word. On a Cortex-M7 this is not allowed and so it hard faults.
By declaring usEndpointLength as volatile it doesn't hard fault since (if I understand correctly) the compiler is then 'forced' to do the operation as coded, which is reading the two array entries as bytes and then constructing the 16 bit length value (since it can't assume that its own value hasn't changed between the two operations)..
As your article states, some use of volatile may be incorrect and mask the real issue. Do you consider this 'workaround' to be a misuse of the volatile keyword and is there are better way, or is it a legitimate use case?
Liked by 1 person
• Hi Mark,
I don’t see this as a valid use case of volatile. I see a valid use case where the compiler optimization is somehow wrong. But in this case it is not: there is no guarantee or way to specify the memory access in a high level language as C or C++. To me this would be a good use case to use some assembly access routines. The correct way to deal with this would be to have/use some pragma of some kind which would specify the memory access (half-word, full-word, etc) for an object. Using volatile will cause some performance penalty too, so here again: I would use assembly code for such low level accesses.
The other (less ideal too) way would be to compile the module/function accessing/using the data structure with a lower compiler optimization: but here again there would be a performance drawback.
• Hi Eric
I want to avoid assembler because the code above is used for 7 different processor architectures and so would need 7 different assembler solutions (as assembly code is generally dedicated to the processor) to be developed and maintained, Also, if used in the future on further architectures it will need the same additional work.
In some cases I build the file with -O1, which solves it but that is a nuisance since it has to be set up for the file for every IDE and also for every project it is used in and if forgotten someone can lose a day’s work trying to identify the same crash again.
Pragmas are also a big nuisance since that are typically not standardised and so again need to be maintained as different IDE and different versions are used: again a very sub-optimal solution in practice even if purists may be of the opinion that they would be cleanest.
Optimising of individual routines (again using pragmas) works (with the pragma hassle of course) but reduce performance of the complete subroutine.
In this practical case the volatile variable definition causes only 4 additional assembler instructions and the instructions to then represent the C code exactly (where two byte reads are made and the two bytes concatonated) so doesn’t actually represent any loss in performance over the designer’s intention.
I have also had this problem in code like this:
unsigned long ulBlockLengthInBytes = ((ptrCapacity->ucBlockLengthInBytes[0] <ucBlockLengthInBytes[1] <ucBlockLengthInBytes[2] <ucBlockLengthInBytes[3]);
where with high optimisation the newer GCC versions optimise this to (equivalently)
unsigned long ulBlockLengthInBytes = (unsigned long *)(ptrCapacity->ucBlockLengthInBytes); (as it recognises that it is just reading 4 bytes and shifting their bits into a long work position) and again hard faults on any architecture that can’t access the pointer if it happens to not be long word aligned, whereby I solved it by setting -O1 in the projects that are using it (but looking for a better solution due to the maintenance overhead (and risk of projects initially crashing when forgotten) when used as a part of a library shared between many projects.
I have also noted that mbedTLS based projects (for AWS IoT) built with -Os and newer GCC versions can crash during TLS handshakes and so I have had to drop these down to -O1 until the causes have been analysed. This shows that even if new optimsation techniques may not be wrong they can cause widely distributed libraries to have new problems.
Since I have found that “volatiling” affected variables is a simple and effective solution to these difficulties up to now (since it effectively de-optimises just the variable access use in a very compatible way) it is a shame that it is frowned upon, especially as all other solutions that I have looked into have less that ideal characteristics since they have little standarisation and rely on specialities of assembly languages or individual tools chains. In the case of the use of volatile I have analysed the assembly code with and without volatile so understand how it is affecting the instruction generation and how it is avoiding the issue (as far as I can see in a 100% guaranteed way that will not break with time) so I am still toying with finding other workarounds or accepting the volatile use when accompanied with an analysis of why it may be a decent method in each use case (????????).
Liked by 1 person
• Hi Mark,
thanks for all the details. Strictly speaking, in your case you are using volatile to band-aid or cover a compiler/code generation problem with hardware accesses.
I have used volatile in the past as a workaround for wrong compiler register optimization until this was fixed by the compiler. But this was clearly a compiler bug (happening even without optimizations), so volatile was the band-aid because rewriting that particular code sequence was not possible. Later on the volatile has been removed as the compiler had fixed that bug.
I think in your cases the usage of volatile for that ulBlockLengthInBytes falls into the same category.
I feel it is not the right approach if it is about specific memory layout (packed), because there really the code needs to be tight to the hardware, and the programming language has no way to properly deal with such things, hence my thinking that if there is such a thing, then really the solution would be using assembly. Because who knows if a newer version of the compiler might reorder things in a different way, etc? If the access and order of accesses needs to be guaranteed, then I think assembly is the only way. And yes, it is painful.
As for mbedTLS: I have faced similar issues, in different projects. I did not dig down too much on it, but here I think there are code bugs involved (maybe even reentrancy issues?) and there I feel the compiler optimization levels simply uncover the bugs.
Back to the original question/problem: hats off that you checked the generated overhead with volatile! I feel that using volatile for it is not the ‘correct’ solution. But as an engineer sometimes you have to cut corners, and it is not only about getting it ‘right’, but as well ‘getting it done and working’. So in an ‘academic’ sense, volatile would not be justified. But in an ‘engineering’ sense I feel you have justified the usage of it in that case.
I hope this helps, and keep going your outstanding work with the uTasker project!
• Hi Eric
After much deliberation I have done this:
unsigned short usEndpointLength = fnSafeGetBufLittleShort(ptrEndpointDesc->wMaxPacketSize);
static unsigned short fnSafeGetBufLittleShort(const unsigned char *ptrBuf)
volatile register unsigned short usValue = *ptrBuf++;
usValue |= (*ptrBuf << 8);
return usValue;
so that I have a 'special' routine which I can use to control this.
I have also gone for the volatile workaround, noting the following:
A. If volatile is not used the new routine (in-lined anyway with high optimisation level) in the assembler code is
ldrh r2, [r4, #4]
which crashes on M7 processors if the buffer location is not aligned, and is a single instruction as the optimiser realises that the operation can be performed by a short word read (on little-endian processor) since the byte ordering results in the bytes being in the correct place.
B. If volatile "is" used the assembler code is (still in-lined)
ldrb r0, [r4, #4]
ldrb r1, [r4, #5]
orr.w r0, r0, r1, lsl #8
and so uses byte accesses and is still efficient.
C. I will comment the routine explaining the back ground and the use case in case anyone is against its use – the can then remove the volatile keyword and edit the routine (according to their IDE / compiler) to remove optimisation from it.
D. I have the following argument as to why I consider that, in this case, the volatile key word is in fact suitable:
D.1 Consider a driver case where a watchdog (accessible only as bytes – other accesses are not allowed) needs to be written with an exact sequence:
WDOG_R1 = 0x55; // address is 0x40020001
WDOG_R2 = 0xAA; // address is 0x40020002
and the programmer 'not' using volatile to define the registers.
With optimisation the compiler decides that two byte writes is as waste of time and writes 0xaa55 as short word instead. I am sure most people have experienced such HW requirements and the failure that results when C code is used with an optimising compiler.
D.2 In this case every experienced engineer and academic will say that 'of course' the volatile keyword should be used so that the compiler doesn't change ordering or make assumptions of the register contents or behavior. Setting the keyword then results in the compiler writing the 0x55 as a byte, followed by writing the 0xaa as a byte, to the correct registers, in the same order as the C code writes it. It works and everyone is happy.
D.3. Now I compare this case with my code (the routine that I want to operate exactly as I have written it). And I find that it is, apart from the fact that it reads instead of writes, almost identical: it want to read two bytes in the defined order. The big difference is that this is not necessarily 'driver' code that is accessing registers. Instead it is 'general purpose' code that is accessing memory (although the pointer could also be to memory mapped register space)
D.4 Now I ask myself, if the two pieces of code are essentially the same (wanting two byte accesses in the written order) and the theory and idea of the volatile keyword ensure that the generated accesses and order are respected, which is it that everybody would be happy with the use in the "watchdog" case (as it is defined as "driver code") but may be against it in the other case (because it is not "driver code")?.
After much deliberation I haven't been able to identify any logic between being required to treat the two cases differently and now am confident that the volatile use is justified, good and even correct. As noted, if any library user is of a different opinion they can easily adapt it to use whatever solution they are more comfortable with – but at the end of the day I don't expect that better code, long term reliability, efficiency or portability will result in doing it differently.
Liked by 1 person
• Hi Mark,
hats off for all the details provided, thank you. I too believe that in this case using the ‘volatile’ does what it is necessary, even if it might not be intended for this. The example with the watchdog is something I have seen (and used) too. But here again volatile is not a synchronization point, it just ‘makes it the way I wish it should be’, but only as a part of a side effect. So from an ‘academic’ point of view it is not appropriate, but from a practical one it is indeed appropriate (or better: does the job).
• Hi Eric
Try this one!
VECTOR_TABLE_OFFSET_REG = (unsigned long)RAM_START_ADDRESS_ITC; // position the vector table at the bottom of instruction RAM
ptrVect->ptrNMI = irq_NMI;
ptrVect->ptrHardFault = irq_hard_fault;
ptrVect->ptrMemManagement = irq_memory_man;
ptrVect->ptrBusFault = irq_bus_fault;
ptrVect->ptrUsageFault = irq_usage_fault;
ptrVect->ptrDebugMonitor = irq_debug_monitor;
ptrVect->ptrSysTick = irq_default;
VECTOR_TABLE_OFFSET_REG is VTOR in Cortex-M7 and RAM_START_ADDRESS_ITC is the start of RAM, which happens to be at address 0x00000000 in this process.
GCC (with optimisation, but maybe without any optimisation level(?) – I actually had the problem 2 years ago with a new GCC release and don’t remember any more).
The code runs but the subsequent interrupts operation fails since the vectors ptrVect->ptrNMI, etc. are not filled out by the above code.
If I do this
It fails too if VECTOR_TABLE_OFFSET_REGISTER is “not” volatile.
If VECTOR_TABLE_OFFSET_REGISTER “is” volatile it works.
Another detail: If RAM_START_ADDRESS_ITC is not at the address 0x00000000 but, say, 0x00000400 it works in all three versions.
I used volatile to solve it but is it the right way????
Happy puzzlin’
Liked by 1 person
• Hi Mark,
I tried to reproduce it (GNU ARM Embedded 2021.07), and here things are correct. So I think this has been really a compiler bug. And to me, using volatile to work-around a compiler bug is good usage of it, and I have used it that way in the past too. It is interesting to see that it fails in your case with the value of zero: It could be because of wrong register constant propagation in the compiler? But I did not find any specific entry in the forums/release notes about this one.
• Eric
My taking on that (it started when I ported the project to i.MX RT since its ITC is at 0x00000000, where the interrupt vectors table is best located) is that the compiler rejected the use of a zero pointer.
In fact it was completely removing “all” code that used the zero pointer without any error or warning being generated.
I found that if I set the pointer to any non-zero value the code was present so the reasoning was that if the compiler couldn’t be sure that it was zero (by reading the 0 from a “volatile” register that was set with the same required value) it couldn’t presume its value and so needed to keep the code; which it then does.
I had never see a compiler removing the use of a zero pointer before although, since a NULL pointer may be considered as invalid, I didn’t think of it as a compiler error but rather as the compiler purposely restraining the use of a NULL pointer (the fact that it could remove large chunks of code without even issuing a warning was more like an error).
It happened over two years ago with the compiler version integrated in MCUXpresso at -Os and I haven’t tested how the latest one handles it – as we know, these details can change with each version…in any case the workaround avoids the potential issue and have no side effects like code size increase.
• Hi Mark,
Yes, I had the same thinking that the compiler somehow tries to ‘optimize’ NULL pointer accesses.
But the compiler cannot make any assumption about what the NULL pointer value is. It is a macro with just a special value indicating that it is ‘invalid’. Most systems use zero for it, but it could be -1, it could be anything. I have used other architectures which do have valid data at address zero, and never seen a problem with it, an never had to use volatile for it. So not sure what was triggering this, but this definitely looks like a compiler bug to me.
10. Pingback: Spilling the Beans: storage class and linkage in C, including static locals | MCU on Eclipse
11. From previous post (there is no reply button):
So what about „local static variable”? This is also a global?
Liked by 1 person
• Yes, static local variables are treated like global variables. They have static addresses, are initialized in the startup code, and because they are static they have static linkage. The only difference is that their scope (visibility) is limited to the function in which they are defined.
I hope this helps?
Leave a Reply to Erich Styger Cancel reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
How did the Treaty of Paris affect Louisiana?
How did the Treaty of Paris affect Louisiana?
All French territory on the mainland of North America was lost. The British received Quebec and the Ohio Valley. The port of New Orleans and the Louisiana Territory west of the Mississippi were ceded to Spain for their efforts as a British ally. It should have been a time to revel in the spoils of war.
Who got Louisiana in the Treaty of Paris?
Great Britain
Is the Treaty of Versailles still in effect?
J, marks the centenary of the Treaty of Versailles, which formally ended World War I. The major parties to the war negotiated among themselves to resolve the issues under dispute, making Versailles a classic peace treaty. Support our journalism. ... The United States abstained from signing this treaty.
Why is the Treaty of Versailles unfair?
The Treaty of Versailles was flawed in many ways as it put the complete blame of the War on Germany. Germany was forced to pay heavy reparations, lost its colonies, and forced to reduce its army. Just think about how unfair this is.
Was the Treaty of Versailles fair or unfair?
Explanation: The Treaty was fair in the sense that it could be justified by the Allied powers. It was not wise in that the harsh conditions of the treaty set the stage for world war II. Germany had declared war on France Russia and England after Russia declared war on the Austrian Hungarian Empire.
What ended World War 2?
1 September 1939 – 2 September 1945
Is there a World War 3?
World War III (WWIII or WW3) and the Third World War are names given to a hypothetical third worldwide large-scale military conflict subsequent to World War I and II. The term has been in use since at least as early as 1941. |
You are here
Deconstructing and Reconstructing the Multiplication Principle
Elise Lockwood, Oregon State University
John Caughman*, Portland State University
Zackery Reed, Oregon State University
Talk Abstract:
The multiplication principle ("MP") is fundamental to combinatorics, underpinning many standard formulas and providing justification for counting strategies. Given its importance, the way it is presented in textbooks is surprisingly varied. In this talk, we identify key elements of the principle and present a categorization of statement types found in a textbook analysis. We incorporate excerpts from a reinvention study that shed light on how students reason through key elements of the principle. We conclude with a number of potential mathematical and pedagogical implications of the categorization.
Time Slot:
Saturday, April 2, 2016 - 14:25
Room Number:
STAG 262 |
Skip to content
Shop Best Selling Dinosaur Toys!
Shop Best Selling Dinosaur Toys
Doedicurus Toy
Sale Sale
Original price $2.63 - Original price $2.63
Original price
$2.63 - $2.63
Current price $2.63
SKU 283129
Doedicurus was first described by Richard Owen in 1847 based on part of a tail. Owen originally gave it the name Glyptodon clavicaudatus, the species name meaning ‘club-tailed’. However, nearly three decades later in 1874, Burmeister reclassified the species and gave it a new genus, Doedicurus. This name means ‘pestle tail’ and refers to the similarity of the shape of the tail to the grinding tool of a pestle and mortar.
Doedicurus was the largest of a diverse array of large glyptodonts - extinct relatives of modern armadillos. Remains of Doedicurus have been found in Argentina, Brazil, and Uruguay. It lived relatively recently during the Pleistocene, beginning around 1.8 million years ago, and went extinct just 11 thousand years ago. This means that the first human settlers to South America probably encountered Doedicurus and maybe even hunted it for meat.
Glyptodonts such as Doedicurus used their powerful claws to dig up their vegetarian diet of roots, tubers, and tough grasses. They chewed this up with deep jaws of strong grinding teeth. Their striking armor plates may have protected them from predators during the Pleistocene, but not from the catastrophic climate changes that contributed to their extinction 11,000 years ago.
Liquid error (quick-shop line 3): include usage is not allowed in this context
Customer Reviews
Based on 7 reviews Write a review |
Indigenous Religions and Christianity: Acculturation and Assimilation–A summary
“…a continuous conflict between two mutually exclusive views of the world” (Deloria, 238)
This is how Vine Deloria describes the history of conflict between Indigenous peoples of America and the White settlers. My project is a response to this statement. I had three questions I wanted to answer in my project:
1. 1. Are Christianity and Indigenous Religions truly mutually exclusive?
2. 2. What attempts have been made towards a synthesis of the two (or at least a peaceful and productive coexistence)
3. 3. Given the violent history of contact between Natives and “representatives” or Christianity why do Natives choose to be Christians?
“For generations, indigenous civilization in this continent had evolved a sophisticated monotheism. Much like Christianity, there were variations on the central theme, but basically the core vision of a creator God who remained in contact with life and invited humanity to live in harmony now…was constant” (Rev. Steven Charleston, 100)
Additional info on Rev. Steven Charleston: He is a citizen of the Choctaw Nation of Oklahoma, Episcopal Priest, and served as President of Episcopal Divinity School for 9 years in Cambridge Massachusetts from 1999-2008
This statement stands in direct contrast to Deloria’s statement above. Stevenson is claiming that, far from being mutually exclusive, many Indigenous Religions held similar beliefs to Christianity before Christianity ever came across the ocean. Regardless of the validity of a statement like this, it demonstrates that not all Native people agree with Deloria’s stance, and it begs the question: if it is not differences in the core beliefs of Christianity and Indigenous Religions, what prevented the two from coexisting peacefully?
Message Vs. Cultural Medium: “We have heard all that you have said and it is good, but now we will wait a while to see if your people live these words –Red Jacket, Chief of the Seneca People, 1750 – 1830” (Charleston, 100)
The message preached by missionaries was agreeable to many natives, but the gap between the Christian principles taught and the actions of white men was large. The issue was not with the message of Christianity, but the cultural medium within which it was presented—the White culture that wanted to dominate and exterminate the Indigenous cultures in order to “Christianize” them.
“The real ‘crime’ of historical Christian missions is…that they were not willing to receive Native American missionaries in return. There was no honest dialogue, no true exchange. Racism prevented that and left us with the legacy of a stunted Christian experience” (Charleston, 102).
There was no cultural dialogue or exchange between Western and Indigenous cultures. The interactions between Western and Indigenous were cultural one-way streets. The natives were expected to conform completely to the white culture that went along with Christianity without Christianity adapting at all to Native cultures.
Assimilation Vs. Acculturation
It seems that the argument for or against the possibility of synthesis/coexistence between Christianity and Indigenous religions becomes one of Assimilation or Acculturation.
1. Assimilation: when a minority culture adapts to the majority culture by losing its traditions and beliefs and becoming essentially indistinguishable from the majority culture.
For Vine Deloria, assimilation is the inevitable outcome whenever Indigenous religions and Christianity interact.
1. Acculturation: When a minority culture adapts to certain parts of minority culture while also maintaining their traditional culture and identity
“But then I was told I needed to become a Christian too, specifically a Euro-American Christian. I learned that only English speakers had the “Authorized” version of the Bible. I discovered the Christian culture, complete with Christian music, Christian T-shirts, and even Christian haircuts. It was almost as if the Bible read, “When a person becomes a Christian they become a new creation. Old things pass away and all things become white.” -Richard Twiss
This quote by Richard Twiss, a Lakota and Christian, demonstrates the problem of assimilation that many Natives run into when they want to become a Christian. There is often an assumption within the broader Christian culture that white culture is a necessary part of the Christian experience. Thus it is often difficult for Natives to become Christian while also holding onto their traditional beliefs and culture. After reading this I went looking for examples of acculturation between indigenous cultures and Christianity.
Acculturation: Kiowa Hymns
“With regards to meaning, Indian hymns are located within very particular tribal traditions. Hymns belong to tribal song repertoires as much as they belong to Christian song repertories…In this way, hymns simultaneously communicate a combination of Christian and tribal-specific experience” (Lassiter, 343)
Many see Christian hymns in traditional languages as an example of Native Acculturation. The hymns connect traditional language, song structure, and the traditional practice of group singing with the western Christian experience. It is a way of expressing Christian beliefs in a form that is familiar and in line with more traditional practices.
“The use of native language also communicates a connection to that which has come before, that which is traditional, and, for many, that which is godly. Many elders say they pray in their language because it is the language that God gave to them specifically and uniquely” (Lassiter, 346)
“But with time, the translated hymns took on a life of their own in the oral tradition. For many Ojibwe people today, the ritualized singing of these hymns…has become emblematic of who they are as a distinctive people with distinctive values” (McNally, 841)
Here are two more quotes that demonstrate the importance of the use of traditional language and traditional song structure, even though the content and message of the songs is Christian, as a way of holding onto and expressing a unique cultural identity. The prevalence of Christian hymns translated into the native language in Kiowa, Ojibwe, and other Indigenous cultures helps support Stevenson’s idea of cultural medium vs. message—when it comes to the interaction between Christianity and Indigenous religions it is the cultural medium that is often more important than the message.
The link above is a video of a Kiowa hymn. The structure of the hymn is similar to the structure of more traditional songs like the ones we heard during ceremonies at Pine Ridge.
The Native American Church: The Acculturation of Peyote as a Sacred Symbol
“To us [peyote] is a portion of the body of Christ,” Hensley said, “even as the communion bread is believed to be a portion of Christ’s body by other Christian denominations. Christ spoke of a Comforter who was to come. It never came to Indians until it was sent by God in the form of this Holy Medicine.” –Albert Hensley, 1908 (Albert Hensley was a Winnebago and member of the Native American Church)
Peyote has not been traditionally used religiously in all tribes, but its use was documented in tribes, particularly tribes in Mexico, since Europeans set foot in the New World. And if not used religiously, it has been used medicinally (it has many antibiotic properties) within many Indigenous tribes throughout America. Hensley’s statement demonstrates the acculturation of a traditional native symbol—peyote—into the Christian belief system. In the Native American Church Peyote is similar, if not equivalent to, the wine and bread of communion—both symbolize the body of Christ.
Why Choose Christianity?
The next section of my presentation attempts to answer the question above. After some research, I found three main reasons that Indigenous peoples choose to be Christians:
1. It is what they are used to
Natives whose parents and grandparents practiced Christianity due to the extensive and successful effort of the government to infuse the Native population with Christianity via boarding schools, etc. are likely to practice Christianity as well. It is for the same reason that many Natives prefer to call themselves Indian despite the negative connotations associated with the word—it is how their parents and grandparents referred to themselves.
1. It speaks to them
2. It heals them
These last two reasons are the same reasons that people all over the world choose Christianity—they find a kind of truth and healing in it.
“When Jesus came into my life and overwhelmed me with his love, I wanted nothing more than simply to follow him. I began a life of transformation because he rescued me from a life of addiction, abuse, self-destruction, and likely from a premature death. I longed for the same transformation for our people. Yet I found myself tripping over the cultural trappings of American Christianity. Following the ways of Jesus seemed one thing; becoming a white Christian quite another.Yet, in spite of all of this, I find in Jesus the possibility for forgiveness [and] reconciliation…” –Richard Twiss (A bit more info. on Richard Twiss: When he was 18 he helped take over and occupy the Bureau of Indian Affairs in D.C. Later he became an alcoholic, spent some time in jail, and began to suffer from depression. )
In this quote Richard acknowledges the difficulties of becoming a native Christian—the same difficulties that Vine Deloria thinks are too large to overcome—but believes they can be surmounted. And his story represents a reality that Deloria does not acknowledge or speak to: the reality that for many Natives Christianity is a real source of truth and healing. Deloria never acknowledges that there could be any inherent value in Christianity for Natives, and this stance ostracizes that many Natives that do find value in Christianity. For Deloria it is choice between traditional beliefs and Christianity, but that opinion implies that for people like Richard Twiss who find healing in Christianity it is a choice between traditional beliefs and alcoholism or Christianity and recovery. This doesn’t strike me as a fair choice.
The Environmental Movement and the Intersection of Shared Beliefs
As an example of what coexistence and finding common ground might look like with regards to a current issue, I went to the environmental movement because it is where I think the native concepts of the importance of land are most easily expressed in a way that they can be translated and understood in Western Thought.
Resolution of the Assembly of the Orthodox Diocese of Sitka, Anchorage and Alaska Concerning the Sanctity of the Earth and the Responsibility all Alaskan Native People to serve as its Guardians and Protectors
The above bold text is the title of a resolution passed unanimously by the Diocese of Alaska of the Orthodox Church that urges federal agencies to deny permits to any commercial or economic project that threatens to damage or pollute the environment. The Diocese of Alaska is comprised in part by about 20,000 Alaska Natives in 95 Aleut, Yup’ik Eskimo, Athabaskan and Tlingit communities. The striking aspect of this resolution is that it is based on purely theological beleifs, not ecological ones. And these theological beliefs are beliefs that both the Alaska Orthodox Church and the Native peoples of Alaska share. Below I will paste a bit of the text from the actual resolution that explains in what ways the Christian church and the Alaskan Natives share beliefs that would result in such a resolution.
“Whereas, according to the traditions and teachings of Alaska Native peoples, the Earth and the whole creation have always been perceived and experienced as filled with the sacred presence of Life, and
Whereas, historically Alaska Native peoples have approached all living and life-sustaining elements with reverence and respect, and
Whereas, in the Sacred Scriptures our Orthodox Christian Tradition, the creation of the world began with the Spirit of God moving on the face of the Deep, and
Whereas, God so loved the KOSMOS, meaning the whole creation, that He sent His Son into the world to bless, renew and sanctify it…”
This section of explains the religious beliefs regarding the sacredness of land that the Alaskan Orthodox Church and the Alaskan Natives share. This is an important point to make because for so long the way in which Natives view land (the sacredness of land has always been a integral part of Indigenous religions in America) and the way in which Western Christians view land has been a central source of conflict. This resolution demonstrates that Christianity does not necessarily result in differing views regarding the importance and sacredness of land than Indigenous religions.
“You must remember all the good our people have known and taught. Compare it to what you are now learning. Do not be ashamed of the good that we have taught and do not be ashamed of the good to be learned. Our way of life is changing, and there is much we must accept. But let it be only the good. And we must always remember the old ways. We must pass them on to our children and grandchildren so they too will recognize the good in the new ways”
-The words of an Ojibwe grandfather to his granddaughter as she goes off to boarding school
This is the quote I would like to end the presentation on because I think it beautifully and eloquently describes the ideal attitude with which one must approach the intersection of two cultures. It acknowledges the good in both new ways and old ways, and sets the two up in such a way that the good in the new ways is only good if it exists next to the good in the old ways. If the good in the new ways can only be apparent if it completely takes over and extinguishes the good in the old ways, then it is no longer good.
This quote, however, also has a slightly darker side. The grandfather and granddaughter may be hopeful of finding the good in the new ways while holding onto the old ways, but we know from history that the teachers at the boarding schools had no interest in finding any good in the old ways. And they had no intention of allowing their students to either. Like Rev. Steven Charleston points out, interactions between cultures and religions must be a two-way street, a dialogue, and opportunity for learning and growth for all involved—otherwise it is assimilation, not acculturation.
I will leave the reader with a final question that may or may not be a hopefully one: I believe that I have demonstrated that there is possibility and hope for synthesis/peaceful coexistence between Christianity and Indigenous religions, as long as the process is approached in a way that allows for the possibility of acculturation. However, mainstream American culture is becoming increasingly secularized. There is a growing expectation that people separate their daily lives from their religion. Is there hope than for indigenous cultures—cultures in which religion and daily life are much more intertwined and inseparable than Western culture—in a society that demands separation and secularization?
Works Cited
Bernstein, Kenneth J. “A Different Approach to Environmental Protection: Orthodox Diocese of Alaska.” A Different Approach to Environmental Protection: Orthodox Diocese of Alaska. KOS Media, 29 Oct. 2009. Web. 2219 Oct. 2014. <>.
Charleston, Rev. Steven. “The Good, The Bad And The New: The Native American Missionary Experience.” Dialog: A Journal Of Theology 40.2 (2001): 99. Academic Search Complete. Web. 22 Oct. 2014.
Deloria, Vine, Jr. God Is Red: A Native View of Religion. 3rd ed. Golden, CO: Fulcrum Pub., 2003. Print.
Lassiter, Luke Eric. “”From Here On, I Will Be Praying to You”: Indian Churches, Kiowa Hymns, and Native American Christianity in Southwestern Oklahoma.”Ethnomusicology 45.2 (2001): 338-52. JSTOR. Web. 22 Oct. 2014. <>.
McNally, Michael D. “The Practice Of Native American Christianity.” Church History 69.4 (2000): 834. Academic Search Complete. Web. 18 Oct. 2014.
“Native American Church {First Nation} – History.” RSS. Oklevueah Native American Church, n.d. Web. 19 Oct. 2014. <>.
Twiss, Richard. “Another Path of Jesus.” Christianity Today. Christianity Today, 8 Oct. 2012. Web. 19 Oct. 2014. <>.
–Isaac Radner
Leave a Reply
|
First Nations housing and child welfare
A tribute to the Olsen family’s knitting vocation and a wonderful reminder of love and creativity every time we enter our house
by Chris Paul
In a landmark settlement the federal government designated “$20 billion over five years to improve services in Indigenous communities so children will no longer be removed from their homes.” (National Post) Another $20 billion is earmarked for compensation for people who suffered from past inadequate services.
Indigenous Relations Minister Patty Hajdu said, “Poverty cannot be a reason that a child cannot stay with their family.”
Years of good work by Cindy Blackstock and her team resulted in a well deserved and much needed victory. But what is missing in the narrative is the role housing has played on reserves. Improving services so children will no longer be removed from their homes presumes that the children have adequate homes. It presumes that the children’s parents have the same opportunities as other people to acquire housing. But that has not been the case for almost a century. The federally designed and delivered housing system in Canada, has prevented First Nations people on reserves from housing themselves.
Furthermore it is not necessarily poverty that prevents children from staying with their family. Even families with adequate incomes have been and, in many cases, still are prohibited from access to the financing needed to build or repair their homes. It is the absence of opportunity that prevents children from having adequate homes. It’s time to turn the narrative around. While poverty, on reserves, produces substandard housing, it must also be said that the disastrous effects of government designed and controlled housing actively created the poverty in the first place.
The problem can best be illustrated by telling a story I read in the national archives when I examined the Indian Department records while doing research into the history of government control over housing on reserves. In order to protect peoples’ privacy the details of this story are a composite of several families’ housing struggle. The archival records expose a lot of personal information making it necessary to mask individual identities.
In 1959 Roland was a 36-year-old woodcutter in the Maritimes. He hauled logs out of his First Nations territory and chopped them into firewood. He had many customers in neighbouring villages. He made decent money but wood selling was a seasonal business so Roland augmented his income with fishing and odd jobs when he had time.
Roland lived in a 400 square foot cabin with his 32-year-old wife Annie and their nine children ranging in age from less than a year to 17. They heated the cabin with a metal wood heater and lighted it with kerosene lanterns and candles so it’s not surprising that winter the crowded little dwelling burned to the ground. Luckily none of the family was hurt but they were houseless.
Houselessness meant they needed to find relatives they could live with. The trouble was all their family members lived in similar conditions and no one had room for Roland’s children. You might think they could rent something in town but even if there was an available house that could shelter eleven people harsh racism targeting First Nations people prevented Roland and his family from even trying to find such a home.
Furthermore Roland didn’t qualify for a bank loan because the Indian Act prohibited Indians, living on reserves, from acquiring loans no matter how much money they made. In the Indian housing system there was only one place to go for assistance. So Roland began his letter writing campaign to the Indian Department pleading the case for his family. “We need material so I can rebuild our cabin.” “We have nowhere to live. Our families don’t have room for us.” “We are going to have to live in the bush this winter—all eleven of us.” “The baby is sick.”
The Indian agent sent a letter of recommendation to Ottawa saying, “Roland is a hard working fellow. He takes good care of his family. We need to help him but we are out of funds here. Please send emergency funds.”
Roland didn’t get any assistance that winter. He continued to desperately request help in the spring but by the following summer his letters ceased.
Even more troublesome was what showed up in subsequent files. Their poor housing conditions wreaked havoc on their health and within the year Annie and the oldest daughter were sent to the tuberculosis hospital. With no house and no one to care for the rest of his family the school age children were sent to residential school and the little ones were put into foster care.
There was only one reason why this hard working, committed husband and father ended up losing his family to the medical, school and child welfare systems. It wasn’t poverty. It was because Canada had a racist housing system on reserves that prohibited First Nations people from accessing the necessary financial tools and building materials that were available to every other Canadians. It was because First Nations people living on reserves were restricted from opportunities to house themselves.
While changes have taken place over the past fifteen years or so the same system is still in place today and young families with small children are still commonly living in shared accommodations, often in one room of a grandparent’s house.
There are more First Nations children in care now than in the height of the residential school era. When the ministry takes children from young families they are often caught in a housing catch 22. One common condition for the children’s return is that the parents get adequate housing. Yet even if a First Nation has housing, young people usually do not qualify for it unless they have their children full time.
Additionally, when they try to find housing in mainstream the same racism Roland would have faced still excludes First Nations from the rental market. Rejection is an experience young First Nations families know all too well.
“I want my son to feel okay to go out there in the world and to feel that he’s equal to everyone else but I know that’s not the case. He’s going to have trouble because of our skin colour. He’s been with me when I’ve been denied. He understands the struggle unfortunately.” (Shawntay Garcia, W̱JOȽEȽP –Tsartlip First Nation)
First Nations are working towards transferring the care and control of housing from government to their own organizations. Like in the child and family sector, their challenge is to avoid simply replacing what currently exists. They have the opportunity to build a system that eclipses both the First Nations and mainstream housing systems. That dream requires telling the real story and building a new vision. It also requires tremendous commitment and resources on the part of First Nations and government. One of the problems with housing is that the approach is fragmented. Organizations all over the country are taking control and what is still missing is a central voice that advocates for the whole sector and that holds the government’s feet to the fire both for current issues and past compensation.
But it can be done–Cindy Blackstock has proven it is possible. The same sort of focussed attention needs to be given housing because if is way past time for government to relinquish control of the on-reserve housing sector and to enable First Nations to regain the tools they need to house themselves.
What First Nations are saying about their housing
Over the past couple of years the First Nations Housing and Infrastructure Council of BC managed the most comprehensive research project ever conducted into what First Nations people are saying about housing and infrastructure in BC First Nations. Over 90% said they want to take back control of their own housing and infrastructure services.
That’s not surprising given the abominable job the federal government has done of managing First Nations housing for close to a century.
There isn’t a Canadian who has driven through a First Nations reserve who hasn’t wondered why the housing is so substandard compared to neighbouring communities. We’ve all asked, “What is wrong…with those people…with the First Nation…with the system…with the government?” Most of us haven’t known which question to ask because we don’t understand how housing is acquired on reserves. We mistakenly start with what we know about housing in the rest of Canada and that will not get us even close to how housing works in First Nations. From that assumption we presume the first question is the right one. “What is wrong with those people?”
I got a job working in Tsartlip First Nation as their housing manager in the mid 1990s. I had lived in the community for more than 20 years by then and had just finished a Masters Degree and it still took me several years to figure out what questions to ask.
The questions were difficult because it was hard to believe that Canada had actually bungled the First Nations housing file so badly for so long.
A little background: In the 1930s the country was reeling from the Great Depression and housing, including First Nations housing, was in a crisis. The federal government responded by creating two housing systems…one system for the mainstream; focused on providing affordable and accessible lending mechanisms, establishing building standards and driving job creation, and one system for First Nations; a welfare-style distribution of small batches of building supplies designed by an Indian agent (often from afar). There was no thought of standards, financial tools or jobs.
The reserve system blocked First Nations from housing themselves and literally forced them to accept the government programs. Oh a person could move off the reserve, you might say. Yes but if you did, as a First Nations person you would not be welcome in mainstream communities and so your housing prospects would not necessarily improve. The same is still true today.
By the 1940s it had become blatantly obvious that the system the government had for housing on reserves—let’s be perfectly clear, First Nations people and their leadership had no control of the system whatsoever—had never and could never produce adequate housing.
Now here’s the rub. When the system failed, as it did over and over again, government agents took that to mean First Nations were unable to be successfully housed and that they needed more ‘help’. The history of housing in First Nations is a series of government fixes—one program after the other trying to fix the previous failure. Never once, that I could find in the records, did the Indian Department contemplate that the problem might rest with government, not the First Nations.
Of course I didn’t, because, in the deeply rooted racist worldview of Canadians, we believed that Indigenous people were not capable of managing their own affairs.
So when you drive through a reserve and wonder why the housing is in such disarray there is an easy answer. Because Canadians believed that First Nations people were not capable of managing their own affairs the government did the managing. The Indian Department designed the programs and controlled how they would be delivered and the lion’s share of government funding for First Nations housing returned right back into the pockets of the enormous “Indian industry” of bureaucrats and professionals who operated the system. And what you are looking at, when you drive through a community and see the ramshackle houses, is the outcome of that arrangement.
Of course housing on Indian reserves (legal name) looks different than in the rest of Canada. Nowhere else in this country has such a housing system existed. No other group of Canadians has been subject to so many state controls over their houses. No one else in Canada is refused the opportunity to go to a bank borrow money to build or renovate a house simply because they live in a certain community.
It takes a bit to grapple with. Long after most residential schools had closed their doors government agents still controlled how First Nations people would be housed. The ill health and social disruption caused by unimaginably substandard housing continues in many communities to this day.
But if we look at it from different angle then think about the time when you drove through a reserve more recently and said, “Hey there’s some really nice houses going up. I wonder what’s happening.” What’s happening is that many First Nations are taking control of their housing. There’s still only a trickle of independently wealthy and sophisticatedly administered communities that have really repatriated control over their housing. But it’s happening for the first time in a century.
So you can see what happens when First Nations are in control. Housing improves and, given time, First Nations housing will meet the same standards as elsewhere.
So as I said earlier, it’s no wonder First Nations want to take back control over their own housing. What is really the wonder is that it wasn’t until this recent federal government took over the reigns of the Indian Department that it decided the government itself was the problem and it ought to get out of the business of delivering services on reserves. It’s still not convinced that First Nations can do it themselves but First Nations are taking control in any case. As my First Nations daughter, Joni, who is an elected councillor for Tsartlip First Nations said, “Mom, at some point it isn’t about what the government does or doesn’t do. The cat is out of the bag. We are taking control over our own lives. The government will just need to figure that out and adjust.”
But there are still so many questions: Will government acknowledge the destruction caused by its housing system? Will there be compensation? Building a new system is a colossal task, will there be enough support to ensure its success? |
Grade: all
Subject: Art
#3850. Research Activity
Reading/Writing, level: Middle
Posted Sun Dec 3 10:01:00 PST 2006 by Carrie (cat_carrie@yahoo.com).
SHSU, Huntsville, TX
Materials Required: magazines appropriate for the age group, a topic for each magazine
Activity Time: 45 mintues
Concepts Taught: conducting research
In groups of 3 or 4, students will work on researching their assigned topic that matches with the magazine they were given. For example, a horse magazine might have information in articles on hoofcare and there might be other resourses found in ads or sponsors of the magazine. I flipped through each magazine before passing them out and got a topic that I knew would be inside.
As the students flip through their magazine, they are to pretend they are doing research for that topic that they were given. Each group compiles information, facts, ideas, etc. from their magazine and creates a list of other possible resources gathered from the magazine.
This lesson illustrates the concept of research and offers practice in using print resources. |
Binary to Octal Converter
Convert binary to octal number instantly and easily
Additional options:
Octal, also known as Oct, is the base-8 number system as opposed to decimals which are base-10. This means that the number system is made up of 8 digits consisting of 0, 1, 2, 3, 4, 5, 6, and 7. In Octal, a binary number is grouped into 3 bits.
How to Convert Binary to Octal With This Tool
In order to convert binary to octal with this tool, you can follow the steps below:
1. Enter the binary data into the textbox above.
2. The tool automatically converts your binary number to octal representation as soon as you type or paste it.
3. If you wish to copy the result, click the Copy button and it will be copied to your clipboard.
How Does Binary to Octal Conversion Work?
Understanding how to convert binary to octal is important in various areas of studies that require mathematical computations. If you wish to learn how binary conversion works for the octal number system, you can watch this video which explains it clearly. |
What is Corporation Tax?
Corporation tax is a business tax.
It applies to incorporated companies in the UK, and is based on self-assessment. That means the taxpayer is responsible for calculating their taxable profits and filing a return.
Navigating your way through the corporate tax system in the UK can be complicated, with various allowances that you can claim.
Here we explain what corporation tax is, who pays it, and what you’ll be expected to pay if you’re liable.
What is Corporation Tax and Who Pays It?
Corporation tax is a corporate tax on the profits of businesses.
What is a corporate tax? A corporate tax is one that applies to limited companies, based on their annual profits.
It is like the income tax that individuals pay, but instead applies to businesses registered at Companies House.
Sole traders and partnerships do not pay corporation tax. However, some other groups may need to pay it, even if they’re not incorporated. These include:
• Members clubs, associations and societies
• Housing associations
• Trade associations
• Groups of individuals in business, such as co-operatives
You should check with HMRC or your accountant if you think you might be liable to pay corporation tax.
The company director is responsible for making sure his company’s tax return is submitted on time and for paying the corporation tax bill.
This responsibility still applies even if the company hires an outside accountant to prepare its accounts.
A company must pay UK corporation tax if:
• It is incorporated in the UK, or
• Its central management and control are in the UK
Companies that are non-UK residents will need to pay corporation tax if they have a branch in the UK that is a permanent UK establishment. Where this is the case, the corporation tax due will only be based on that branch’s activities.
Why is There Corporation Tax?
Corporation tax applies to the taxable profits of businesses. Essentially, it’s charged on the income they receive from trading.
According to recent tax statistics, the UK government raises around £800 billion a year in receipts. Of this figure, £53 billion comes from corporation tax.
This tax on corporate income is an essential part of government revenue. It is the next largest source of revenue from taxation after income tax, national insurance contributions (NIC) and VAT.
Corporate taxes provide the government with income besides personal income tax, and the companies paying corporation tax account for a third of the total businesses in the UK.
Revenue from corporation tax is volatile because company profits will vary considerably, depending on different stages of the economic cycle.
Even with corporation tax rates generally declining over 50 years, broadly corporation tax has remained at around two to three per cent of GDP. The reason for this is that the corporate tax base has grown faster than GDP.
In fact, most corporation tax revenue is raised from a small number of companies that make enormous profits.
According to TaxLab, in 2018-19, companies making tax payments of £1million or more paid 55 per cent of all the UK’s corporation tax.
What is the UK’s Corporation Tax Rate?
Currently, the main UK corporation tax rate is 19 per cent.
For banks and companies in North Sea oil and gas production, the rate is higher.
Meanwhile, for profits related to patented technologies there is a 10 per cent reduction.
Since 2016, banks have had to pay an eight per cent surcharge on their taxable profits. However, their first £25 million is exempt from this.
North Sea oil and gas production has overall higher corporation tax rates but also attracts more generous capital allowances.
The main rate of corporation tax is much lower now than it was in the 1970s. Then, companies could expect to pay a 52 per cent tax rate.
In April 2023, corporation tax is set to rise to 25 per cent.
However, not all companies will need to pay this increased rate:
• Those companies with profits below £50,000 will continue to pay corporation tax at 19 per cent
• Companies earning profits between £50,000 and £250,000 will benefit from a marginal relief system, increasing the tax rate gradually until it reaches 25 per cent.
Companies earning over £250,000 will pay the full 25 per cent corporation tax rate from 2023.
This is likely to add further complexity to the corporation tax system.
Do All Companies Pay Corporation Tax?
All limited companies in the UK must pay corporation tax.
Other organisations may also be liable for this tax, including membership organisations, housing associations, co-operatives, clubs and societies.
However, sole traders and partnerships are not liable for corporation tax.
Limited companies must pay corporation tax on:
• Trading profits
• Investments
• Sale of assets
All a company’s profits are taxable. However, they can deduct specific expenses and there are allowances to reduce overall tax liability.
How Do You Avoid Corporation Tax?
If your company is liable for corporation tax you cannot avoid it. But there are ways in which you can reduce it. These include:
• R&D tax credits
• Capital allowances
• Super deduction
• Relief for losses
R&D Tax Credits
R&D tax credits subsidise qualifying research and development activities. Companies can claim against their expenditure on a range of projects and activities.
The value of your R&D claim will depend on the amount of money you’ve spent on these qualifying activities.
SMEs and larger companies can claim R&D tax relief under two separate schemes:
• SME R&D tax relief – where an SME can claim 14.5 per cent of its submitted R&D expenditure
• Research and Development Expenditure Credit (RDEC) – where a larger company can claim 13 per cent of its R&D expenditure.
Companies must check the eligibility of their work for R&D tax credits. To qualify, a project must be part of work that’s making an advance in science or technology.
A qualifying project must:
• Focus on a scientific or technological advance
• Overcome or attempt to overcome uncertainty
• Be complex enough that a professional in its given field could not easily explain it
Where a project does qualify, you can claim for various expenses, such as salaries, subcontractors, consumables, prototypes and software licences.
You should apply for R&D tax relief at the end of your normal accounting period. The work you claim can cover any relevant work up to two years before this date.
If your R&D projects last for several years, you can continue to claim relief on your corporation tax for them.
Capital Allowances
The capital allowances a company can claim to offset its corporation tax bill will depend on the type of assets it has bought.
The annual investment allowance (AIA) lets you deduct the full value of an item you have bought from your pre-tax profits. You can claim this for most plant and machinery, which is the biggest investment category.
From January 2022, the amount you can deduct under AIA will be a maximum of £200,000 a year.
HMRC treats cars differently. They don’t qualify under AIA but you can claim money off depending on the vehicle’s CO2 emissions. It’s a 100 per cent deduction for low emission, new, or used electric cars. Other cars qualify for deductions of 18 or 6 per cent.
Certain intangible assets such as intellectual property may be treated as plant and machinery or come under R&D tax relief.
There are no capital allowances for shares or other financial assets.
Super Deduction
In his March 2021 budget, the Chancellor announced a super deduction that would run until 31 March 2023.
Under this, companies can deduct 130 per cent of investment in plant and machinery from their taxable profits.
There are no limits on the eligibility of investment for super deduction.
Relief for Losses
If you’ve made a loss in trading in one year, you can use this to offset your taxable profits in a previous year.
If you made a certain amount of profit in one year, but in the preceding year a loss that was greater, then you could choose to pay tax as if you had made zero profit in both years (the loss would offset the total pre-tax profit).
Usually, you can only carry trading losses back one year. The exceptions are losses made in the first four years of trading or in the final year of trading. In these circumstances, you can carry trading losses back three years.
You can also carry trading losses forward. You can deduct a loss you make this year from your next year’s profit, reducing your corporation tax bill. You can do this indefinitely, providing you remain in the same trade.
However, there is a limit to the profits you can offset against the losses you carry forward. In a given year, the maximum you can offset is £5 million of taxable profits and 50 per cent of the remaining profits after this maximum deduction.
You can only offset capital losses against capital gains. Therefore, if you make a loss on the sale of an asset, you cannot offset this against your pre-tax profit. But you can offset a trading loss against a capital gain.
How Much is Corporation Tax for a Limited Company?
A limited company must pay the current rate of corporation tax at 19 per cent.
The corporation tax you must pay is based on your company’s profits and it applies to all income from trading activities.
As we’ve highlighted above, there are ways of reducing this tax bill, including R&D tax relief and claiming capital allowances.
The system can appear complex with a risk that you fail to claim the allowances you’re eligible for. This is where getting professional accounting support can make a positive difference.
Invest in Corporation Tax Services for your Business
Venn Accounts specialises in cloud accounting for SMEs. We can give you the clarity you need when it comes to your business tax affairs, making sure you’re claiming any eligible tax allowances from your pre-tax profits.
We’ll prepare your corporation tax returns and file it on your behalf, making the entire end-to-end process hassle-free.
For more information, please contact us.
Get in touch
|
To install click the Add extension button. That's it.
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Kangaroo emblems and popular culture
From Wikipedia, the free encyclopedia
Kangaroo totemic ancestor - Australian Aboriginal bark painting, Arnhem Land, c. 1915.
Kangaroos, Wallabies and other Macropodidae have become emblems and symbols of Australia, as well as appearing in popular culture both internationally and within Australia itself.
Kangaroos are part of cultural and spiritual significance for many Indigenous Australians. Since its European discovery, Kangaroos have since become an emblem of Australia, appearing in their coat of arms and in many state and city coat of arms, Australian logos such as the Qantas logo, names of Australian sport teams, mascots such as the Boxing Kangaroo and in public art. Kangaroos are also well represented in film, television, songs, toys and souvenirs around the world.
European first encounters
The kangaroo was considered a unique oddity when Captain Cook's HMB Endeavour arrived back in England in 1771 with a specimen on board. Over time it has come to symbolise Australia and Australian values.[1]
Joseph Banks, the naturalist on the Endeavour voyage, commissioned George Stubbs to paint a portrait of the kangaroo specimen. When the official account of the voyage was published in 1773, it was illustrated with an engraving of Stubbs' kangaroo. From that time on, the kangaroo quickly came to symbolise the Australian continent, appearing in exhibitions, collections, art and printed works across Europe.[2]
Kangaroo status
It took a long time for the kangaroo to achieve official recognition in Australia. Despite being a "declared noxious animal" because of its reputation for damaging crops and fences and competing with domestic animals for resources, the kangaroo finally achieved official recognition with its inclusion on Australia's coat of arms in 1908.[3] The kangaroo is now popularly regarded as Australia's unofficial animal emblem.[4]
Kangaroo emblems and logos
The kangaroo and emu are bearers on the Australian Coat of Arms. It has been claimed these animals were chosen to signify a country moving 'forward' because of a common belief that neither can move backward.[5]
Two red kangaroos serve as bearers to the Coat of Arms of Western Australia.
Australia's national airline, Qantas, uses a bounding kangaroo for its logo. The kangaroo has always been part of the Qantas logo,[6] and the airline has previously been known informally as "The Flying Kangaroo".
Tourism Australia makes use of the kangaroo in its logo to "help ensure instant recognition for Australia around the world".[7]
The Australian Grown logo uses a golden kangaroo in a green triangle to show that a product is made or grown in Australia.[8]
The Royal Australian Air Force roundel features a bounding red kangaroo.
Warships of the Royal Australian Navy have red kangaroo symbols (based on the kangaroo on the reverse of the Australian penny) fixed to either side of their superstructure or funnel. This originated during the Korean War: as the destroyer HMAS Anzac was repeatedly mistaken for a British warship, her executive officer had a brass 'weathervane' in the shape of a kangaroo made and mounted to the ship's mainmast.[9]
The kangaroo is part of the official emblem of the Royal Australian Regiment with a kangaroo in between two Lee–Enfield bolt-action rifles.
The Victorian Coat of Arms includes the upper portion of a kangaroo holding an Imperial Crown in its paws.
The red kangaroo is the animal emblem of the Northern Territory.
The kangaroo is the official emblem of Northern Territory Police.
British clothing and headwear company Kangol, known for its berets, features a kangaroo in its logo.
Australian 1961 half penny and 1964 penny with Kangaroos.
Australian 1961 half penny and 1964 penny with Kangaroos.
Kangaroos and coins
The kangaroo has been featured on coins on the pre-decimal Australian pound and decimal coins of the Australian dollar. The kangaroo appears on the pre-decimal penny and half-penny coins. Five kangaroos are featured on the one dollar coin.
Kangaroo mascots in Australia
The boxing kangaroo – mascot for the Australia II team in the 1983 America's Cup. This rendition of the kangaroo has become a sporting icon, known informally as the green and gold "Sporting Kangaroo", and is highly popular with cricket crowds and international sporting events which feature Australian participation.
Matilda, the mascot at the 1982 Commonwealth Games held in Brisbane, Queensland, Australia, was represented by both a cartoon kangaroo and a 13-metre high (42 feet 8 inches) mechanical kangaroo (which winked at the spectators during the opening and closing ceremonies). The 'medal', which was worn by both the cartoon and mechanical versions of Matilda, features the 1982 Commonwealth Games logo — a stylised representation of a kangaroo bounding (in "flight") – similar to the pose of the kangaroo featured on the pre-decimal half-penny coin.[10]
During the First World War, pet kangaroos and toy kangaroos were a popular choice of mascot for Australian servicemen.[11][12]
Kangaroo gargoyles atop The Carlton Club (built 1889) in Carlton, Victoria.
Architectural references
The first uses of Kangaroo ornaments as architectural expression appeared during the Victorian era. This was at first limited to the use of the coat of arms on buildings; however, kangaroos soon became used as decorative motifs on their own in some commercial buildings, particularly in Melbourne.
It was the Federation architecture, however, which brought native ornamentation into the mainstream, so that kangaroos began to be mass-produced as ornamentation on domestic houses in the large cities, as part of an Australiana movement and effort to create a uniquely Australian style. Examples of this decoration include the ornamental terracotta tile capping on residential roofs. Reproduction products using Kangaroos are still used today.
Public art and sculpture
Perth Council house kangaroo sculptures
Perth Council house kangaroo sculptures
Kangaroo motifs have been used as a form of public art.
Notable examples include:
Decorative arts and design
An early depiction of a kangaroo on an item of decorative art is the Macintosh & Degraves Token Shilling 1823.[13] Another early example is the Garret salver. This item of Tasmanian colonial silver incorporates a kangaroo, an emu and wattle branches in its design.[14]
The kangaroo has continued to be incorporated into decorative designs by craftspeople and designers in Australia and elsewhere in the world. The Terence Lane kangaroo collection at the National Museum of Australia consists of more than 150 objects and ephemera in a wide range of styles produced over a period of 150 years. The collection ranges from a one-metre-high Doulton ceramic kangaroo umbrella stand to small items of jewellery.[15]
Cultural references
Kangaroos are extremely well represented in films, television, songs, toys and souvenirs around the world.
Television and films
Skippy the Bush Kangaroo, star of the 1960s Australian children's television series.
Wake in Fright is a 1971 movie which includes a controversial kangaroo hunting scene containing graphic footage of kangaroos actually being shot.[16] In a more comical vein, the 1986 film Crocodile Dundee features a scene in which the title character frightens away kangaroo hunters by making them think that a kangaroo is shooting back at them.[17]
Matilda is a 1978 movie starring Elliott Gould about a promoter working with a kangaroo.
Kangaroo Jack is the title character of an American film of the same name.
A giant kangaroo is featured in the movie Welcome to Woop Woop.
The Hallmark Properties television series Zoobilee Zoo has a character named Whazzat Kangaroo (the Canadian actress and singer Stephanie Louise "Stevie" Vallance plays this role).
Kangaroos are mentioned, or featured, in the Rolf Harris songs "Tie Me Kangaroo Down, Sport" and "Six White Boomers".
Kangaroos are also mentioned in the Peter Allen song "Tenterfield Saddler".
Kangaroos are also mentioned in Holden jingle "Football, meat pies, kangaroos and Holden cars".
Kangaroos are also mentioned in the songs "Christmas Where The Gum Trees Grow", "Christmas in the Scrub" and "The Five Days of Christmas".
There is a "Sour Kangaroo" in the Dr. Seuss tale Horton Hears A Who!.
Kanga and Roo are fictional mother and son kangaroos in the popular series of children's books about Winnie-the-Pooh.
Kidding Kangaroo in the Sweet Pickles book series by Ruth Lerner Perle, Jacquelyn Reinach and Richard Hefter.
One of the several intelligent races described in the fantasy novel Shadowkeep, written by Alan Dean Foster, are high-bounding, fun-loving marsupials, known as "roos" and obviously meant to be intelligent kangaroos.
A kangaroo is shot and killed by Ernest in The Swiss Family Robinson, a book written by Johann Wyss.
Kiko the Kangaroo is a recurring character in the Terrytoons cartoons.
Kanga and Roo are fictional mother and son kangaroos in the popular series of cartoons about Winnie-the-Pooh.
A team of kangaroo basketball players feature in the French cartoon series Kangoo and its spin-off/prequel Kangoo Juniors.
In several Looney Tunes/Merrie Melodies cartoons, Sylvester the Cat is beaten up by Hippety Hopper the baby kangaroo, who always accomplishes this feat after escaping from the captivity of humans who have attempted to take him to a zoo in assorted American cities and whom Sylvester believes to be a giant mouse.
In Tom and Jerry: The Fast and the Furry, the commentators are holding a kangaroo by the leash when the racers reach Australia.
In the British punk style comic strips Tank Girl, the protagonist's boyfriend is Booga, the mutant anthro-kangaroo. There are some other minor kangaroo characters. In the U.S. movie Tank Girl, slightly based on the comic strips, the protagonist is assisted by Rippers - mutant kangaroo genetically engineered supersoldiers (and Booga is among them, of course).
Rocko the wallaby in Rocko's Modern Life
Dot and the Kangaroo was a cartoon juxtaposed on a film of the Australian bush.
In The Simpsons episode "Bart vs. Australia", Homer and Bart try to escape from a crowd in the pouches of two kangaroos, which they ultimately cannot because of the kangaroos' pouches being filled with mucus.
In Adventures of Sonic the Hedgehog, there is a kangaroo named MacHopper, who is also a parody of Crocodile Dundee, another Australian icon.
In the Kick Buttowski: Suburban Daredevil episode "Bwar and Peace", Brad talks about his Australian self, who afterward was punched, and the kangaroo appears before and during his wedding with the girl he is with. Kick also interacted with the kangaroo.
In the fifth season of The Flintstones, the Rubbles adopt Hoppy, a pet hoparoo (a Stone Age version of a kangaroo) from Down Under, for Bamm-Bamm.
Aussie hair products from Procter & Gamble sports a kangaroo hopping on its label, while the magazine and television ads display an animatronic purple kangaroo in them.
Dunkaroos are a snack in the U.S. which used to feature a talking kangaroo in commercials and on product containers.
Video games and other games
Roo is a fighting kangaroo in the Sega Genesis video game Streets of Rage 3.
Ripper Roo, a crazy kangaroo in a straitjacket, is a boss character and antagonist of the video game series Crash Bandicoot.
Kao the Kangaroo and its sequels are a Polish video game series involving an yellow/orange kangaroo in a boxing uniform as its protagonist.
Sheila, a female kangaroo of the video game series Spyro the Dragon.
Roger the boxing kangaroo from the Tekken series of video games.
In the Game Boy Color games The Legend of Zelda: Oracle of Seasons and The Legend of Zelda: Oracle of Ages, there is a kangaroo by the name of Ricky which will help you in your quest.
In Mortal Kombat Trilogy, Johnny Cage turns into a kangaroo.
In Bomberman 3 and 5 on SNES, the animals which hatch from eggs are called rooeys and they are based on kangaroos.
The Animal Crossing series features kangaroos as possible neighbours.
There are at least three homonymous fairy chess pieces called kangaroo.
Austin of The Backyardigans is a young kangaroo.
In Warriors of Virtue, the five main heroes are kangaroos.
In the Pokémon franchise, Kangaskhan is a Normal type based on a kangaroo with reptilian features. Breloom, a Grass and Fighting type, is also partly based on a kangaroo with mushroom and boxing features.
In the anime and manga series Reborn! the character Ryohei Sasagawa has a kangaroo in one of his ring boxes that enables healing and advances abilities of others.
Chimera Punch, a kangaroolike monster in Tokyo Mew Mew.
Kangaroos and sports teams
The kangaroo features prominently in sport. Australian sports teams with nicknames derived from the kangaroo (and wallaby) include the following:
Australian national teams
The Australian national rugby league team is nicknamed the Kangaroos.
The Australia national rugby union team is nicknamed the Wallabies.
The Australia national association football team (men's) is nicknamed the Socceroos.
The Australia national under-23 football team plays Football at the Summer Olympics and is nicknamed Olyroos.
The Australia national under-20 football team is nicknamed the Young Socceroos
The Australia national under-17 football team is the Joeys
The Australian Women's field hockey team is nicknamed the Hockeyroos.
The Australian national ice hockey team is nicknamed the Mighty Roos.
The Australian men's national basketball team is nicknamed the Boomers.
Australian domestic teams
The North Melbourne Football Club in the Australian Football League is nicknamed the Kangaroos.
Perth Kangaroos IFC
United States
Kasey Kangaroo is the mascot for the University of Missouri–Kansas City, whose sports teams were historically known as the UMKC Kangaroos but rebranded as the Kansas City Roos in 2019.
Zippy the kangaroo is the mascot for The University of Akron, athletically the Akron Zips.
The kangaroo is the mascot for Austin College in Sherman, Texas
The kangaroo is the mascot for Terryville High School in Terryville, Connecticut
Lizzie (a purple and white kangaroo) is the mascot of Lake Washington High School in Kirkland, Washington
Stomper is the mascot for the professional wrestling promotion Impact Wrestling.
The kangaroo is the mascot for State University of New York at Canton in Canton (town), New York
The kangaroo is the mascot for Wilmington Friends School in Wilmington, Delaware
Moe the Kangaroo is the mascot for Virginia Military Institute in Lexington, Virginia. However, VMI's sports teams are known as the VMI Keydets.
Nashville Kangaroos
The kangaroo is the mascot for Killeen High School in Killeen, Texas.
Weatherford, Texas High School's mascot is the Kangaroos
Abington Friends School, in Abington, Pennsylvania, has a kangaroo named Roo as its mascot.
Other countries
The Samoa national Australian rules football team is nicknamed the Kangaroos.
The FC Bohemians Praha, a Czech football team is nicknamed the Klokani (Czech for kangaroos) since their tour in Australia in 1927.
Etobicoke Kangaroos
Vienna Kangaroos
Place names
The kangaroo has inspired a number of place names in Australia. They include:
New South Wales
South Australia
Western Australia
• Kangaroo Island
1. ^ Harper, Melissa and White, Richard (eds) (2010). Symbols of Australia, p. 28-29, UNSW Press, Sydney: National Museum of Australia Press, Canberra. ISBN 978-1-921410-50-5
2. ^ Symbols of Australia: Kangaroo, National Museum of Australia
3. ^ Harper, Melissa and White, Richard (eds) (2010). Symbols of Australia, p. 24. UNSW Press, Sydney: National Museum of Australia Press, Canberra. ISBN 978-1-921410-50-5
4. ^ Australian Government Department of Foreign Affairs and Trade: About Australia – National Icons Archived 19 October 2011 at the Wayback Machine
5. ^ Harper, Melissa and White, Richard (eds) (2010). Symbols of Australia, p. 25. UNSW Press, Sydney: National Museum of Australia Press, Canberra. ISBN 978-1-921410-50-5
6. ^ Qantas: The Kangaroo Symbol
7. ^ Tourism Australia: Using the Brandmark
8. ^ Australian Made | Australian Grown
9. ^ Cassells, Vic (2000). The Destroyers: their battles and their badges. East Roseville, NSW: Simon & Schuster. pp. 11–12. ISBN 0-7318-0893-2. OCLC 46829686.
10. ^ "1982 Commonwealth Games Mascot," Australian Commonwealth Games Association
11. ^ Kangaroo soft toy mascot: Red Cross Hut, Rouelles, Australian War Memorial
12. ^ Photograph: Australian nurse with a kangaroo mascot, Harefield, England, Australian War Memorial
13. ^ Macintosh & Degraves Token Shilling 1823, Museum Victoria
14. ^ Garrett salver, Tasmanian Museum and Art Gallery
15. ^ Terence Lane kangaroo collection, National Museum of Australia
16. ^ "Wake in Fright - BBFC Insight". British Board of Film Classification. 28 January 2014. Retrieved 4 January 2015.
17. ^ Croft, David B. (1991). Australian People and Animals in Today's Dreamtime: The Role of Comparative Psychology in the Management of Natural Resources. New York: Praeger. p. 32. ISBN 0-275-93908-1. In Australia's latest version of the bush hero, Mick "Crocodile" Dundee, we find an explicitly totemic being who is a poacher turned conservationist as he chases away a group of kangaroo shooters at the behest of his American girlfriend.
This page was last edited on 22 December 2021, at 09:54 |
Raglan Castle is a significant late medieval castle located just north of the village of Raglan in the county of Monmouthshire in south east Wales. Its origins lie in the 12th century but the ruins visible today date from the 15th century and later. Its ruination came at the end of one of the longest sieges of the English Civil War.
SKU: N/A Category:
Additional information
8 x 12 inches, 10 x 15 inches, 12 x 18 inches |
Yazdegerd II
Sāsānian king
Alternate titles: Yezdegerd II, Yezdegird II, Yzdkrt II
Select Citation Style
Thank you for your feedback
Yazdegerd II
Yazdegerd II
c.401 - 500
Title / Office:
king (438-457), Persia
House / Dynasty:
Sasanian dynasty
Yazdegerd II, (flourished 5th century), king of the Sāsānian dynasty (reigned 438–457), the son and successor of Bahrām V.
Although Yazdegerd was at first tolerant of the Christians, he remained a zealous Zoroastrian and later persecuted both Christians and Jews. He was engaged in a short war with Rome in 442 and also fought against the Kushans (Kuṣāṇas) and Kidarites in the east. Little else is known of Yazdegerd’s reign; he was succeeded in turn by two of his sons, Hormizd III and Fīrūz.
Close-up of terracotta Soldiers in trenches, Mausoleum of Emperor Qin Shi Huang, Xi'an, Shaanxi Province, China
Britannica Quiz
History: Fact or Fiction?
Get hooked on history as this quiz sorts out the past. Find out who really invented movable type, who Winston Churchill called "Mum," and when the first sonic boom was heard.
This article was most recently revised and updated by Amy Tikkanen. |
Historian Jonathan Square on the Relationships Between Fashion and Slavery
The academic speaks to CR about how enslaved people's clothing has shaped the fashion industry today
fashion historian jonathan square , crfashionbook interview with courtney delong
Courtesy of Jonathan Square
“Fashion is a key component to understanding the history of slavery,” Jonathan Square, a professor of History and Literature at Harvard University, tells CR. His work centers on the clothing and expressive culture of enslaved people, particularly within the history of Black America. At the core of his research is a belief in the power of materials and aesthetics to shape the human experience, and a deep sense of empathy and compassion for each person and garment that he studies. Along with this intimate perspective, Square looks outwards towards the development of the fashion system in conjunction with mass enslavement.
As the COVID-19 pandemic highlights the externalities of a fast-paced fashion calendar and the Black Lives Matter movement pushes industry insiders to consider fashion’s structural racism, Square’s work feels particularly relevant. By looking to the past, his work speaks to contemporary questions of how marginalized people use clothing and fashion to express themselves and how individual garments are the product of complex economic and political systems that span the globe.
In American history, slavery designated Black people as capital within a colonial political system. While their experiences were largely shaped by their oppressors, they found opportunities to exercise agency through expressive actions. This is where fashion comes in.
In some cases outfit curation was a method of political statement. “Enslaved people rarely had access to the press or governmental bodies, but they had access to their own bodies and how they style them,” Square says. “There is a lot of political information encoded in enslaved people’s clothing if you take the time to analyze it.”
fashioning the self, slavery
The vast majority of enslaved people’s clothing was, as Square says, relatively uncomfortable or drab. However, this was not always the case for each person or each item. Because most of their clothing was bought or bartered second-hand or handed down from other slaves and their owners, they had to be resourceful. Oftentimes, they were given textiles and would fashion their own designs.
Square calls textiles–the literal threads of garments–the metadata of clothing. Textiles provide insight into the sensory experience of wearing certain garments, as well as illustrate the interconnected nature of slavery and the globalized fashion system. Mass enslavement enabled the production of cheap cotton, which in turn perpetuated slavery. “If you do not consider the genesis of the fashion system, particularly the growth of readymade clothing industry, then you’re missing important information about the development of slavery and its relationship to global capitalism,” Square says.
harvard historian jonathan square and founder of fashioning the self at the new york historical society
Square at the New York Historical Society
Courtesy of Jonathan Square
Though his work focuses on the experiences of people of African descent from the 16th to 19th centuries, Square is quick to highlight parallels to today’s modern industry. The creation of ready-to-wear allowed for standardized dressing, creating status items and strengthening the global textile and clothing trade. Both of these phenomena set the precedents for today’s It-bag-dominated global economy. Moreover, fast fashion and cheap clothing often relies on labor exploitation in developing nations. “Just as slaves made, bought, and sold clothing (more often than not against their will), many people involved in our current fashion system work in conditions predicated on coercion and oppression,” Square explains.
This history remains relevant–large brands today rest on foundations of oppression, labor exploitation, and even American mass enslavement. Brooks Brothers’ archives show that it sold “servants” clothing to Southern plantation owners. Scholars like Square have inferred that this means Brooks Brothers clothing was given to enslaved people by plantation owners who used the ready-to-wear garments as a symbol of status and wealth. This action gets at the question of where the artistry in a garment truly lies. Enslaved people in Brooks Brothers clothing were treated like objects for adornment by plantation owners, and Square has held the brand accountable for its complacency in this phenomenon in his work. But, his scholarship implies, this does not negate the artistry of curation: when enslaved people put on a garment and fashioned their own bodies, they were still defining and constructing their own identities.
fashioning the self issue 2 cover founded by harvard historian jonathan square
Fashioning the Self Issue 2 Cover
Courtesy of Jonathan Square
Square launched digital humanities project Fashioning the Self in Slavery and Freedom to share the importance of these practices. The project began as an academic course, but when not enough students enrolled, Square created a Facebook page to share its content. (The course ultimately came to fruition, and he has since taught the class twice.) He later expanded Fashioning the Self's footprint to multiple social media platforms and created a zine with writing from scholars, artists, and activists.
“I think of how my life has been enriched by the education I’ve been able to obtain, and I wish that everyone could have access to it,” he says.
On social media, Square utilizes archival imagery and offers poignant commentary on current events related to the portrayal and understanding of mass enslavement. He also shares information about contemporary exhibits and performances, such as artist Dread Scott's "Slave Rebellion Reenactment," historian-artist Nell Irvin Painter’s recent show at Harvard, and the Noah Davis exhibit at New York’s David Zwirner Gallery. On the project’s Youtube page are discussions with academics and artists. Recently, Square shared a conversation with British opera singer Peter Brathwaite about recreating famous works of art using family heirlooms.
Through sharing these dialogues, Square highlights how the relationship between fashion and an enslaved past relates to present-day identities. This is not only significant to people of African descent but to contemporary pop culture at large. The legacy and power of Black expression has helped shape culture as we know it. As people work towards anti-racist goals, the history of beauty and aesthetics within the Black community are particularly informative regarding the techniques individuals have historically used to protect themselves and their loved ones in the face of oppression.
Of course, Square has thoughts about how fashion industry leaders can react to the current moment. He claims it is not enough for companies to simply declare their support for the Black Lives Matter movement. “Black lives are trending right now,” Square says. “If [they] really matter, make sure you are treating the black lives that you encounter [in real life] fairly and respectfully before you trot to social media in the name of Breonna Taylor. What annoys me most is when industry leaders wring their hands about how to solve ‘the problem of diversity.’ Here’s a solution: hire more diverse staff now.”
As Square and his work reminds us, though fashion can be a tool for expression or liberation, it can also be a tool of oppression. It's in these pivotal times that looking back on fashion's history with race can inform how we move forward.
Advertisement - Continue Reading Below
More From Culture |
main menu
Healthy Eating - A Detailed Guide for Beginners
The Clean Eating Diet Plan Guide :
When we discuss diet plans we will typically put them along a spectrum where food quantity is on one end and food quality is on the opposite .
Additionally, in direct opposition to diets like IIFYM it imposes guidelines of what sorts of foods to eat and doesn't regulate calories of macros to any meaningful degree.
The main principles of unpolluted eating are centered around that specialize in the standard of the foods you consume and ensuring they're “clean”.
The principles are often summarized in one tenant: Choose whole, natural foods and seek to eliminate processed foods.
The core principles of the diet can be listed as follows:
• Avoid processed foods
• Avoid refined foods
• Avoid artificial ingredients
• Avoid alcohol
• Avoid soda and fruit juice
History of the Clean Eating Diet
As clean eating isn't a well-defined dietary program it's difficult to trace the history of it as a dieting paradigm back to a singular beginning.
One could give credit to the traditional Greek physician Hippocrates who penned one among the primary works on dietary principles and is liable for the famous quote, “Let food by the drugs and medicine be thy food”.
General Overview of Components & Main Principles of The Clean Eating Diet
Clean eating is based on the principle of eating whole, natural unprocessed foods.
Most proponents of unpolluted eating will suggest it's not truly a diet, but rather a view on what to eat and what to not eat.
It focuses on food quality and not quantity, so calorie counting isn't utilized during this dietary framework.
Meal Timing/Frequency
On principle, clean eating doesn't have strict requirements for meal timing or meal frequency (read: what percentage times each day you eat).
However, in application most clean eating programs suggest people eat 5-6 smaller, clean food, meals and snacks throughout the day instead of 3 main meals.
Clean eating places fairly substantial food restrictions on individuals. Clean eating diets require that folks consume only whole, natural foods and eschew everything that's processed.
This excludes pastas, breads, crackers, chips, cereals, and anything that has been processed. This approach also excludes things like condiments (e.g. mustards and spreads) also as dressings.
Additionally most beverages are restricted; this includes alcohol, soda, and juice.
Does It Include Phases?
As traditionally thought of, the clean eating diet doesn't usually include phases.
Most prescriptions of the clean eating diet as instantiated in books, articles, and programs have people initiate the complete spectrum of the diet at the outset. Some even include 30 day challenges during which whole, natural foods must be consumed for everything of the 30 days with no deviation from the protocol.
Who Is It Best Suited For?
Clean eating is best fitted to people that are focused on the health properties of food, don't feel the will to trace the calories in their food, and who don't mind fairly restrictive approaches to nutrition.
Clean eating allows substantial flexibility within the amount of food one eats, the timing and frequency, and with some effort and diligence the diet are often used for a good range of individuals with drastically different goals (e.g. fat loss, muscle gain, or sport performance).
How Easy Is It to Follow?
How easy it is to follow the clean eating diet really depends on what type of person you are and your food preferences. For people who enjoy eating a wide variety of food, do not enjoy food restrictions, and would rather focus on the quantity of their food (i.e. the calories and macros) clean eating may be rather difficult to follow.
For people who are creatures of habit, do not mind eating within restricted dietary frameworks and do not enjoy counting their calories of macros clean eating can be an excellent dietary framework to follow.
Most people who practice clean eating long term usually build in small amounts of flexibility and follow either an 80/20 or 90/10 rule where they allow themselves to eat food on the restricted list 10-20% of the time.
Mainstream Belief Behind Diet
The mainstream belief behind the clean eating diet is that natural, whole foods are optimal for human health and that they naturally control calorie intake.
While there are indeed sound reasons behind consuming more natural foods, one cannot truly rely on the “natural” argument as the sole basis for why this diet is effective as the naturalistic fallacy is a common logical fallacy.
Scientific Studies and Interpretation of Data
To date there are no published studies examining the effect of a clean eating diet which makes it difficult to draw hard conclusions on the scientific efficacy of this diet. However, there are a few things we can glean.
Most whole, natural foods are more satiating than their processed counter parts1. This makes controlling calorie intake much easier for a large majority of people.
Additionally, higher diet quality is associated with improved health markers and a lower risk of developing type 2 diabetes
Clean eating falls on the opposite end of the dietary spectrum from approaches like IIFYM or flexible dieting and focuses almost exclusively on food quality, not food quantity.
The main principles of clean eating are centered around focusing on the quality of the foods you consume and ensuring they are “clean”.
The principles can be summarized in one tenant: Choose whole, natural foods and seek to eliminate processed foods.
The core principles of the diet can be listed as follows: avoid processed foods, avoid refined foods, avoid artificial ingredients, avoid alcohol, avoid soda and fruit juice.
References :
• A satiety index of common foods
• Diet-quality scores and plasma concentrations of markers of inflammation and endothelial dysfunction
• Effects of a short-term intervention with a paleolithic diet in healthy volunteers
reactions : |
Merriam-Webster declares 'vaccine' as 2021 word of the year
"This was a word that was extremely high in our data every single day in 2021," Peter Sokolowski, Merriam-Webster's editor-at-large, told The Associated Press ahead of Monday's announcement.
The selection follows "vax" as word of the year from the folks who publish the Oxford English Dictionary. And it comes after Merriam-Webster chose "pandemic" as tops in lookups last year on its online site.
"The pandemic was the gun going off and now we have the aftereffects," Sokolowski said.
Children Recieve Covid-19 Vaccines
FILE - A person receives the Pfizer-BioNTech COVID-19 vaccine at the Warren Prescott School in Charlestown, Massachusetts, on Nov. 18, 2021. (Photo by Barry Chin/The Boston Globe via Getty Images)
At Merriam-Webster, lookups for "vaccine" increased 601% over 2020, when the first U.S. shot was administered in New York in December after quick development, and months of speculation and discussion over efficacy. The world's first jab occurred earlier that month in the UK.
RELATED: 'Fluffernutter,' 'dad bod': Merriam-Webster dictionary adds 455 new words
The word "vaccine" wasn't birthed in a day, or due to a single pandemic. The first known use stretches back to 1882 but references pop up earlier related to fluid from cowpox pustules used in inoculations, Sokolowski said. It was borrowed from the New Latin "vaccina," which goes back to Latin's feminine "vaccinus," meaning "of or from a cow." The Latin for cow is "vacca," a word that might be akin to the Sanskrit "vasa," according to Merriam-Webster.
Inoculation, on the other hand, dates to 1714, in one sense referring to the act of injecting an "inoculum."
Earlier this year, Merriam-Webster added to its online entry for "vaccine" to cover all the talk of mRNA vaccines, or messenger vaccines such as those for COVID-19 developed by Pfizer-BioNTech and Moderna.
RELATED: Merriam-Webster adds 530 words to dictionary, including 'tallboy' and 'dad joke'
"Many people asked, what is infrastructure if it’s not made out of steel or concrete? Infrastructure, in Latin, means underneath the structure," he said.
PERSEVERANCE: It's the name of NASA's latest Mars rover. It landed Feb. 18, 2021. "Perseverance is the most sophisticated rover NASA has ever sent to the Red Planet, with a name that embodies NASA’s passion, and our nation’s capability, to take on and overcome challenges," the space agency said.
NOMAD: The word had its moment with the 2020 release of the film "Nomadland." It went on to win three Oscars in April 2021, including best picture, director (Chloé Zhao) and actress (Frances McDormand). Zhao became the first woman of color to win best director.
The AP's film writer Jake Coyle called the indie success "a plain-spoken meditation on solitude, grief and grit. He wrote that it "struck a chord in a pandemic-ravaged year. It made for an unlikely Oscar champ: A film about people who gravitate to the margins took center stage."
RELATED: 'Pandemic' named Merriam-Webster's word of the year |
Basic Oracle Interview Questions and Answers
Q1). Difference between varchar and varchar2 data types?
Ans: Varchar can store upto 2000 bytes and varchar2 can store upto 4000 bytes. Varchar will occupy space for NULL values and Varchar2 will not occupy any space. Both are differed with respect to space.
Q2). In which language Oracle has been developed?
Ans: Oracle has been developed using C Language.
Q 3). What is RAW datatype?
Ans: RAW datatype is used to store values in binary data format. The maximum size for a raw in a table in 32767 bytes.
Q4). What is the use of NVL function?
Ans: The NVL function is used to replace NULL values with another or given value. Example is –
NVL(Value, replace value)
Q5). Whether any commands are used for Months calculation? If so, What are they?
Ans: In Oracle, months_between function is used to find number of months between the given dates. Example is –
Months_between(Date 1, Date 2)
Q6). What are nested tables?
Ans: Nested table is a data type in Oracle which is used to support columns containing multi valued attributes. It also hold entire sub table.
Q7). What is COALESCE function?
Ans: COALESCE function is used to return the value which is set to be not null in the list. If all values in the list are null, then the coalesce function will return NULL.
Coalesce(value1, value2,value3,…)
Q8). What is BLOB datatype?
Ans: A BLOB data type is a varying length binary string which is used to store two gigabytes memory. Length should be specified in Bytes for BLOB.
Q9). How do we represent comments in Oracle?
Ans: Comments in Oracle can be represented in two ways –
1. Two dashes(–) before beginning of the line – Single statement
2. /*—— */ is used to represent it as comments for block of statement
Q10). What is DML?
Ans: Data Manipulation Language (DML) is used to access and manipulate data in the existing objects. DML statements are insert, select, update and delete and it won’t implicitly commit the current transaction.
Q11). What is the difference between TRANSLATE and REPLACE?
Ans: Translate is used for character by character substitution and Replace is used substitute a single character with a word.
Q12). How do we display rows from the table without duplicates?
Ans: Duplicate rows can be removed by using the keyword DISTINCT in the select statement.
Q13). What is the usage of Merge Statement?
Ans: Merge statement is used to select rows from one or more data source for updating and insertion into a table or a view. It is used to combine multiple operations.
Q14). What is NULL value in oracle?
Ans: NULL value represents missing or unknown data. This is used as a place holder or represented it in as default entry to indicate that there is no actual data present.
Q15). What is USING Clause and give example?
Ans: The USING clause is used to specify with the column to test for equality when two tables are joined.
[sql]Select * from employee join salary using employee ID[/sql]
Employee tables join with the Salary tables with the Employee ID.
Q16). What is key preserved table?
Ans: A table is set to be key preserved table if every key of the table can also be the key of the result of the join. It guarantees to return only one copy of each row from the base table.
Ans: The WITH CHECK option clause specifies check level to be done in DML statements. It is used to prevent changes to a view that would produce results that are not included in the sub query.
Q18). What is the use of Aggregate functions in Oracle?
Ans: Aggregate function is a function where values of multiple rows or records are joined together to get a single value output. Common aggregate functions are –
• Average
• Count
• Sum
Q19). What do you mean by GROUP BY Clause?
Ans: A GROUP BY clause can be used in select statement where it will collect data across multiple records and group the results by one or more columns.
Q20). What is a sub query and what are the different types of subqueries?
Ans: Sub Query is also called as Nested Query or Inner Query which is used to get data from multiple tables. A sub query is added in the where clause of the main query.
There are two different types of subqueries:
• Correlated sub query
A Correlated sub query cannot be as independent query but can reference column in a table listed in the from list of the outer query.
• Non-Correlated subquery
This can be evaluated as if it were an independent query. Results of the sub query are submitted to the main query or parent query
Q21). What is cross join?
Ans: Cross join is defined as the Cartesian product of records from the tables present in the join. Cross join will produce result which combines each row from the first table with the each row from the second table.
Q22). What are temporal data types in Oracle?
Ans: Oracle provides following temporal data types:
• Date Data Type – Different formats of Dates
• TimeStamp Data Type – Different formats of Time Stamp
• Interval Data Type – Interval between dates and time
Q23). How do we create privileges in Oracle?
Ans: A privilege is nothing but right to execute an SQL query or to access another user object. Privilege can be given as system privilege or user privilege.
[sql]GRANT user1 TO user2 WITH MANAGER OPTION;[/sql]
Q24). What is VArray?
Ans: VArray is an oracle data type used to have columns containing multivalued attributes and it can hold bounded array of values.
Q25). How do we get field details of a table?
Ans: Describe <Table_Name> is used to get the field details of a specified table.
Q26). What is the difference between rename and alias?
Ans: Rename is a permanent name given to a table or a column whereas Alias is a temporary name given to a table or column. Rename is nothing but replacement of name and Alias is an alternate name of the table or column.
Q27). What is a View?
Ans: View is a logical table which based on one or more tables or views. The tables upon which the view is based are called Base Tables and it doesn’t contain data.
Q28). What is a cursor variable?
Ans: A cursor variable is associated with different statements which can hold different values at run time. A cursor variable is a kind of reference type.
Q29). What are cursor attributes?
Ans: Each cursor in Oracle has set of attributes which enables an application program to test the state of the cursor. The attributes can be used to check whether cursor is opened or closed, found or not found and also find row count.
Q30). What are SET operators?
Ans: SET operators are used with two or more queries and those operators are Union, Union All, Intersect and Minus.
Q31). How can we delete duplicate rows in a table?
Ans: Duplicate rows in the table can be deleted by using ROWID.
Q32). What are the attributes of Cursor?
Ans: Attributes of Cursor are
1. %FOUND
Returns NULL if cursor is open and fetch has not been executed
Returns TRUE if the fetch of cursor is executed successfully.
Returns False if no rows are returned.
Returns NULL if cursor is open and fetch has not been executed
Returns False if fetch has been executed
Returns True if no row was returned
Returns true if the cursor is open
Returns false if the cursor is closed
Returns the number of rows fetched. It has to be iterated through entire cursor to give exact real count.
Q33). Can we store pictures in the database and if so, how it can be done?
Ans: Yes, we can store pictures in the database by Long Raw Data type. This datatype is used to store binary data for 2 gigabytes of length. But the table can have only on Long Raw data type.
Q34). What is an integrity constraint?
Ans: An integrity constraint is a declaration defined a business rule for a table column. Integrity constraints are used to ensure accuracy and consistency of data in a database. There are types – Domain Integrity, Referential Integrity and Domain Integrity.
Q35). What is an ALERT?
Ans: An alert is a window which appears in the center of the screen overlaying a portion of the current display.
Q36). What is hash cluster?
Ans: Hash Cluster is a technique used to store the table for faster retrieval. Apply hash value on the table to retrieve the rows from the table.
Q37). What are the various constraints used in Oracle?
Ans: Following are constraints used:
• NULL – It is to indicate that particular column can contain NULL values
• NOT NULL – It is to indicate that particular column cannot contain NULL values
• CHECK – Validate that values in the given column to meet the specific criteria
• DEFAULT – It is to indicate the value is assigned to default value
Q38). What is difference between SUBSTR and INSTR?
Ans: SUBSTR returns specific portion of a string and INSTR provides character position in which a pattern is found in a string.
SUBSTR returns string whereas INSTR returns numeric.
Q39). What is the parameter mode that can be passed to a procedure?
Ans: IN, OUT and INOUT are the modes of parameters that can be passed to a procedure.
Q40). What are the different Oracle Database objects?
Ans: There are different data objects in Oracle –
• Tables – set of elements organized in vertical and horizontal
• Views – Virtual table derived from one or more tables
• Indexes – Performance tuning method for processing the records
• Synonyms – Alias name for tables
• Sequences – Multiple users generate unique numbers
• Tablespaces – Logical storage unit in Oracle
Q41). What are the differences between LOV and List Item?
Ans: LOV is property whereas list items are considered as single item. List of items is set to be a collection of list of items. A list item can have only one column, LOV can have one or more columns.
Q42). What are privileges and Grants?
Ans: Privileges are the rights to execute SQL statements – means Right to connect and connect. Grants are given to the object so that objects can be accessed accordingly. Grants can be provided by the owner or creator of an object.
Q43). What is the difference between $ORACLE_BASE and $ORACLE_HOME?
Ans: Oracle base is the main or root directory of an oracle whereas ORACLE_HOME is located beneath base folder in which all oracle products reside.
Q44). What is the fastest query method to fetch data from the table?
Ans: Row can be fetched from table by using ROWID. Using ROW ID is the fastest query method to fetch data from the table.
Q45). What is the maximum number of triggers that can be applied to a single table?
Ans: 12 is the maximum number of triggers that can be applied to a single table.
Q46). How to display row numbers with the records?
Ans: Display row numbers with the records numbers –
1 Select rownum, <fieldnames> from table;
This query will display row numbers and the field values from the given table.
Q47). How can we view last record added to a table?
Ans: Last record can be added to a table and this can be done by –
1 Select * from (select * from employees order by rownum desc) where rownum<2;
Q48). What is the data type of DUAL table?
Ans: The DUAL table is a one-column table present in oracle database. The table has a single VARCHAR2(1) column called DUMMY which has a value of ‘X’.
Q49). What is difference between Cartesian Join and Cross Join?
Ans: There are no differences between the join. Cartesian and Cross joins are same. Cross join gives cartesian product of two tables – Rows from first table is multiplied with another table which is called cartesian product.
Cross join without where clause gives Cartesian product.
Q50). How to display employee records who gets more salary than the average salary in the department?
Ans: This can be done by this query –
1 Select * from employee where salary>(select avg(salary) from dept, employee where dept.deptno = employee.deptno;
Review Date
Reviewed Item
Really helpful Basic Oracle Interview Questions and Answers. Thanks
Author Rating |
City near Cordova, Spain, magnificently situated, and surrounded by strong walls and wide moats. In early times it was inhabited almost exclusively by Jews who had arrived together with its founders; hence it was called "Jews' City," an epithet applied also toGranada and Tarragona. The Jews of Lucena, who carried on extensive trade and industries, were, according to an Arabic writer, richer than those of any other city. They enjoyed the same freedom as their coreligionists in the large Mohammedan cities. Their rabbi, who was elected by the entire community, was granted special privileges, and acted as judge in the civil and criminal cases arising in the community.
The Jews lived peaceably until the Almoravides came into power. A certain faḳih of Cordova pretended to have discovered a tradition according to which the Jews had entered into an agreement with Mohammed that they would embrace Islam at the end of the fifth century after the Hegira. Yusuf ibn Teshufin thereupon went to Lucena (1107) to induce the Jews of that city to fulfil the promises made by their ancestors. As the Jews suspected Yusuf of caring for their money rather than for their faith, they applied to Ibn Ḥamdin, the cadi of Cordova, or, according to Condé, to the vizier Abdallah ibn 'Ali, who induced the king to compromise the matter by accepting a very large sum of money. The Jews were glad to escape so easily. A worse fate befell them thirty-nine years later under the rule of the Almohades, whose leader, 'Abd al-Mu'min, persecuted and robbed them and forced them to accept Islam; and the flourishing and wealthy city, the seat of Jewish science, was destroyed (1146). At the beginning of the eleventh century several important scholars lived in Lucena, as also their most brilliant pupil, Abu al-Walid ibn Janaḥ. When Ferdinand III. of Castile conquered Andalusia he presented Lucena to the first bishop of Cordova, Don Lope, his former teacher. Isaac Alfasi founded a large Talmudic academy in Lucena, and here also Isaac ibn Ghayyat, Isaac ibn Albalia, and Joseph ibn Migash were prominent.
• Idrisi, Geografia, p. 265, Leyden, 1866;
• Condé, Historia de la Dominacion de los Arabes en España, ii., ch. xxiii.;
• Rios, Hist. i. 287 et seq., 300, 365;
• Dozy, Gesch. der Mauren in Spanien, ii. 388;
• Grätz, Gesch. v. 116 et seq., 187.
G. M. K.
Images of pages |
What is a Harassment Charge?
Lori Smith
Lori Smith
Teacher harassment towards a student may result in criminal charges.
Teacher harassment towards a student may result in criminal charges.
A harassment charge is a legal charge filed against someone who intimidates, threatens, stalks, or otherwise makes another person feel unsafe or annoyed. This charge may also be filed against someone who steals personal information, snoops, or invades other people's privacy. Depending on the violation, the charge may be civil or criminal. Criminal cases can end with a misdemeanor or felony conviction, and can be punishable by prison time.
What Is Harassment?
Unwanted, repeated phone calls can be considered a case for harassment charge.
Many different behaviors can be considered harassment, but the victim's perception that he or she is being threatened is usually the most important factor. Repeated unwanted contact, including excessive phone calls, too-frequent e-mails, or showing up uninvited at another person’s house multiple times after being told to stop are all common forms of harassment. In other cases, a person directly threaten victims or spy on them.
It is important that a lawyer be contacted during a harassment charge.
Victims usually know the harasser, but not always. People from old romantic relationships or someone who's been rejected by the victim may become bitter and start to behave inappropriately. For example, in a divorce, one spouse may threaten the other, causing significant distress that results in a harassment charge. In other cases, the harasser might be someone with a personal grievance against the victim, like an angry co-worker or someone with a childhood grudge. Some people are delusional and believe that they can pressure their victims into accepting them on a personal level if they just keep pushing them.
Civil vs. Criminal Cases
A harassment charge may be civil or criminal, depending on the violation.
Whether harassment is considered civil or criminal generally depends on the relationship between the harasser and the victim and the type of behavior involved. Though laws vary by jurisdiction, civil harassment is generally seen as being done by a person who the victim has not been in an intimate or romantic relationship with, like a neighbor, stranger, or family member that's not a parent, sibling, grandparent, or in-law. A criminal harassment charge is generally brought against people who a victim has been in a close relationship with, like a former spouse or romantic partner. Similar behavior from a close family member may be considered domestic violence rather than harassment.
The United States, Australia, and the United Kingdom have enacted cyberstalking laws.
The type of behavior is more important than the status of the relationship in some jurisdictions. For instance, a stalker would usually face criminal charges, regardless of his or her relationship with the victim. Sexual harassment can also be subject to special statutes in some places. It is actually a form of discrimination, which is a civil rather than criminal charge. Other forms of discriminatory behavior, such as bullying based on ethnic differences, sexual preferences, or religion is also typically seen as a civil crime.
Misdemeanor vs. Felony Cases
Repeatedly causing damage to a neighbor's property is considered a form of neighbor harassment.
Laws vary by jurisdiction, but generally speaking, misdemeanor harassment charges are filed in less serious cases, or for first time offenders, while felony charges are brought against very serious, threatening, or repeated offenders. This is especially true for people who violate a no-contact order or have previous convictions. In some areas of the US, the type of person being harassed determines whether the charge is a felony or misdemeanor. For example, felony charges may be brought against someone who harasses a public official, but misdemeanor charges against someone who does the same thing to a private person.
Steps for Victims
Excessive phone calls are considered a form of harassment.
Excessive phone calls are considered a form of harassment.
Once someone feels like he or she has been threatened, it is usually possible to file a restraining order through the court system. This prohibits the accused person from having any contact with the victim. If the order is granted and then violated, the suspect can be arrested on a harassment charge. In cases where violence occurs, a person may be able to file for an order of protection, which specifically prohibits any act of violence, and orders the assailant to do specific things to increase the safety of the victim, such as not being in the same area.
Responding to a Harassment Charge
A suspect may be face arrest for a harassment charge.
A suspect may be face arrest for a harassment charge.
Anyone who is being charged with harassment should contact a lawyer and get to know the laws in his or her area to understand what types of behavior have led to the charge and avoid them while the case is pending. For instance, in some areas of the US, a person can be charged with harassment even if he or she has never made threats to a person's face, but has done so through a third party or repeatedly talked in a threatening way about someone to mutual friends. Someone who doesn't know that might keep doing behavior that is legally considered harassment without knowing it. He or she should follow any court directives strictly, and be sure not to contact the person making the charges without first consulting a lawyer.
You might also Like
Readers Also Love
Discussion Comments
I recently fell in love with someone other than my spouse. When I tried to get separated from my spouse, my parents and entire family started threatening me with harassing voicemails, text messages and even went as far as approaching my new love interest, vandalizing his car and having us followed on a daily basis. My family has also disowned me and threatened to have my children taken from me. I moved out of the home which my spouse and I jointly own and into an apartment at the demands and request of my family members. They continue to harass me on a daily basis including the fact that they tried to get me fired from my job. I'm at the end of my rope and don't know how to proceed.
I have a co-worker who constantly makes up lies about me and I have been in my shift supervisor’s office too many times for false allegations. Now my apartment is bugged, and she somehow got my medical records and tampered with them. Then she told many other lies about me. She even turns and twists it around after she does it, that I am the liar. She is very sleazy!
My family knows me better than she does, or anyone that I work with so the joke is on her, when she comes into work laughing about it and bragging about it! We were never friends outside of work. I don’t know how she found out where I live. She broke me and my ex boyfriend up two years ago. She’s made it so I can’t go on dates or have a relationship. I think she is mentally disabled and shows all the signs of a stalker. She’s really weird and I’m at my wits’ end. I am hoping someone will come forward and I can find a roommate and they can keep her away from me! She is the sleaziest of sleazy!
I dropped off a friend at a convenience store where the clerk had been bad mouthing me. I walked inside and asked what her problem with me was and she hit me. I never touched her or threatened her, but the police officer said that I could be charged with harassment. Does anyone know if that's true?
@anon948223: Check with your state's Attorney General's office. Theft of medical records is a *felony* in some states!
If nothing else, you should be able to swear out a warrant for her for breaking and entering in your car. The records were in your car and now she has them, so she obviously got into your car.
Tell her that having her mugshot in the paper for breaking and entering and theft of medical records will be a heck of a lot more embarrassing than her posting your medical records on Facebook.
My ex husband's girlfriend stole my medical records out of my car while we were still married. He was cheating on me with her and I had tried to commit suicide.
She has these records and is threatening to post them on Facebook and has even gone as far as posting my case number. I have the text messages where she has threatened me with this and the post with the case number, as well. What should I do?
I live at St. Monica’s in Cambridge. We are not allowed to smoke illegal stuff or cigarettes in the building. There are two girls who live on the second floor of this building and I live on the third. They keep telling the landlord I am smoking in my house. I am not smoking in my house, but their lies led to me getting an eviction letter.
These girls have been trying to get me kicked out since I moved here last September. We have caught the staff standing at our doors listening to our conversations. I asked the landlord if she has proof I am smoking in my house. She didn’t say anything, which means they don’t have any.
Also on the eviction letter, they state I haven’t been going to the weekly groups which are mandatory. I have doctor’s notes and medical bills stating my kid is very sick and unfit to be near other people. Can they actually evict me? Should I be calling the police for harassment?
My ex boyfriend borrowed some money from me, but now he doesn't want to return it. When I tried to tell his relatives about it, he got very angry and he put my photos on facebook through making a fake ID and writing sexual comments on my photos and he sent so many people sexual messages about me. What should do and where should I go?
Someone has been harassing me for two years. I really don't know what to do. I contacted the police but they just took a report and told me that if I ever know who this person is we could take him/her to court. This person somehow knows everything I do, who I talk to, who I see. He/she even knows when I am home or not and what car I am driving.
It is crazy. I don't know what to do. I have been unfaithful and I confessed to my partner, but this person believes that my partner doesn't know what’s going on. I am thinking about hiring a private investigator, but I don't know. Please advise.
My husband’s crazy ex-wife. I have been married to my husband for two years, I have dated him about five or six years prior. We just celebrated our second anniversary in October.
I do not know how much progress I can make with this. My husband has two girls by his ex-wife. About two months ago, my husband was cleaning one of his guns on our patio while grilling out (my husband enjoys target practicing and hunting.) My husband and I were waiting on the girls to come home from a dental appointment. The girls were living with us at that time. We had temporary legal custody. But whatever the judge signed at the time proved not to be valid enough to keep the ex-wife from taking the children from us.
I was not outside to see all that went on to know for sure. But his ex-wife accused my husband of pointing his gun at them as a threat. The guy she was with said the same thing and the ex-wife got our oldest stepdaughter by her (who is now 11 years old) to say the same thing.
I know my husband would not do that. The ex-wife got crazy, called the cops and had my husband arrested for that night. This was two days before our anniversary (Think about it). The man who was with her at the time wanted to lie, but eventually dropped the charges. The ex-wife has not dropped any charges yet. There has been an ongoing court battle over the children, the charges and custody. I do not go to the courthouse with my husband because he wants to leave me out of it and I am not much of a good witness, for as I said, I did not see what all went on. All I know is the girls are not here now; they are with her.
There is a lot of manipulation, mind games, intimidation and threatening going on. This woman has stalked us, but she did it in such a way where we could not file charges. She dated a man who lived about two houses behind us at our other address and she used to park with her headlights pointing at our patio slide doors (This was about three or maybe four years ago). The ex-wife uses this new case against my husband. She keeps finding reasons to come to my home and I do not want her here because of her craziness and drama.
She gets our oldest to lie, to conspire, and to relay messages and conversations back to her. The oldest daughter does not even hear the whole story, but gives bits and pieces and makes it what she thinks and the ex-wife flips. I get accused of disrespect, meddling, tampering and jealousy. I have no reason to be jealous of someone that evil.
I cannot make her stop. She uses her last name as leverage because her uncle is the county Sheriff. She acts like there is nothing we can do and she can keep doing this to us. She does not have a good criminal record at all. I, however, do not have a criminal record. I am a ghost. I like staying out of trouble. I do not have time to be bothered by this ex-wife. There are better things in life to than to deal with her.
Her problem with me is she thinks that I stole her husband from her. I started dating my husband two months after they were separated. I was warned about her, but did not listen. I wish I had known better. Whatever happened between my husband and her was their own doings and he left her because she cheated on him and she was abusive. This woman is no bigger than four feet tall, but she sure is a mean one. Like a rooster. Do not go into the pen because you will get spurred. That is what I compare this woman to.
Plus, I used to be an exotic dancer. I know people frown on that but I respected myself and I paid my bills and took care of myself with that job. This was when I was younger, of course. Dancing has nothing to do with the problem at hand. Dancing does not define my character. These are the only faults this woman finds concerning me. Other than that it is lies, accusations and drama.
I want to get a restraining order against her, but do not know how to go about it and how much support I have concerning this matter. My husband would help but I guess he is scared that he may get in trouble or make the situation worse. I feel like no on listens and I feel alone.
I am threatened by this woman. I pray for answers every day, for strength, and guidance. I am fixing to graduate and receive my BSHA. I am afraid this woman will go into my job and jeopardize it with her drama. I will be in health care. How can you stop that in a place like that? I am waiting before I find a job; to be sure this does not happen. How much can an employer support someone in matters like this? I do not want this drama keep me from taking care of myself and living. My goal in life is to help people, I want to help fight cancer or be a part of an organization that fights cancer. I cannot expect to be much good use with a crazy ex-wife tampering with my reputation and job.
I am intimidated by the courts because I get nervous and I do not want to be in a position to where I do not know how to answer questions and make the judge mad at me. I feel that even though I do not have a habit with going to court for anything, I still feel threatened by this situation. I am afraid I will be labeled and accused of having a bad character. But if someone looked at my record and did any tests on me, the evaluations will come out straight, for I do not do anything. If there is anything on my record, it would be over a few minor traffic violations, and those ended up getting thrown out and I received my prayer for judgments. My driving record should be straight. This should say a lot about my character and what I do. So how can someone so evil such as this ex-wife manipulate everything the way she does? What right does she have to do what she does and feel that she is above the law? Yes she breaks laws; it is just that most of them she does it in such a way where she is balancing on the line between just and unjust, lawful and unlawful.
My husband says that it is because she is female and the law is more sensitive to a female, regardless of their actions. At least this is what we think or believe. So what is fair about that? If you break the law and harass, than regardless if you are a female or a male. There should be charges filed and convictions.
So the question is, how do I stop her from doing this? How do I make it stop? I am tired of this. I have dealt with this woman for almost seven years. I am tired.
@anon356673: This is not harassment -- it's blackmail, and it's illegal. I doubt you can get the photos removed. What you *can* do, however, is tell this jerk (and make sure you're doing this), that you have saved all the emails where he has threatened you with these photos, and you're going to turn them in to the police and have his butt arrested and charged with criminal coercion if he doesn't stop.
Tell him he can post the pictures all he wants to, but if he does, then you're slapping him with a civil lawsuit. Also, if you're 19, and you were dating for three years, he was over 21 when you started dating and you were 16. That's also statutory rape in some states (in every state if you were 15), and the statute of limitations hasn't run out on charging him with it.
Also, fall off the grid for a while. Get a new email address, disable your social media pages and change your cell number, and block his number. Don't engage with him in any way. Good luck.
I am 19 years old and I recently broke up with my on and off boyfriend of three years, who is 25. I finally was able to get out of his controlling ways and now he is threatening to share pictures that he has stored on a backup website. He is using these images to force me to do things and will not stop holding them over my head. Is there any way I can take legal action and have them removed and him punished for trying to control me via the interent and text messages?
I have neighbor children in an apartment building next to me who harass me when the parents are gone by beating on floors, banging on pipes, bouncing ball on walls, all mostly in their adjoining bedroom.
The children, just to mention a few things, have taken tire valve caps off my car, put yarn in my washer, (we share an open basement), busted up my pumpkins on my stoop, put objects in my walkways, put twigs in sides of hood of car, wrote bad stuff on my sidewalk area, and even caused me to use different bed.
I have not said anything to parents for fear of them not believing their children are so destructive and harassing an older person. What is the best way to handle all this, to say the least, annoyance?
My son is divorced and the father of an 8 year old boy. My son moved out of state in order to find work and pay alimony and child support. When he tried to contact his son, his ex-wife would not let him talk to the son. He called repeatedly, even sent the son a cell phone that he could use to talk to his dad, and she took it away from him.
So one day, my son texted and called repeatedly to his ex's phone trying to get to speak to his son (7 years old) and the ex would not let him but instead filed harassment charges on my son. He had not talked to his son for over a year. I don't understand how she could go against a court order and not allow my son to speak to his son and yet she filed harassment charges because he was trying to.
I was recently dating this married man. He lived with me for five months and I started suspecting he was seeing someone else and I caught him with another woman on the floor in a house without lights and water. He broke my arm.
I thought it was his wife because he was telling me and the wife that I said things about her and would come back and tell me she said things about me. He was arrested for simple domestic assault and a week later, he filed charges on me for stalking.
We went to court and the judge said that I was the aggressive one. The guy got off for breaking my arm. I feel like someone got to the judge and I found out that the guy has two past domestic disturbances and a order of protection against him. He is still seeing the woman and moved back in with his wife.
Now I receive restricted calls once a week late at night. I need some advice on the subject.
There is this girl who is dating an ex of mine. She has been harassing me for over a year and a half now. She has been so rude and hurtful to me. I hardly know this girl at all besides some research I’ve had to do because she seems to think she knows everything about me. She's trying to "ruin me".
She keeps texting me, calling me, threatened my life even, facebooking my friends on facebook. She's gone out of her way to hurt me. I'm at a loss of what to do to make her just leave me alone. She's already got a no trespass order, but this town is too small for a business to get up and running while someone is slandering your name all over town. Does anyone have any legal advice for me? I think I have grounds to get her for slander. I'm just not sure if I feel up to having a long drawn out court case.
I have been under a lot of stress due to people in general and a surgeon harassing me. I feel that this is never going to end. I know that he and others will never stop intimidating me annoying me.
I don't know what to do anymore. I feel that my only option is to contact an attorney and see what my options are, as far as for people to leave me alone. Everywhere I go, someone seems to always say things and make facial expressions and bad things always happen.
I have told the police about what people have been doing and I feel sometimes that it is pointless to even say anything to the police. I feel cornered and really stressed out every day. This surgeon is angry because I have told others what he put me through and other people that he encouraged to have them say things to me.
There is a second person as well who also has something to do with this. I don't understand why I have to go through this hell. These persons know that I have a traumatic brain injury and that I can get very sick with my mental and physical health. These people know that their harassment can lead to many problems such as heart attack, stroke, seizures and maybe death.
I feel that they are asking to be put into real hot water trouble for causing for these things to happen. I think that they want to be liable for me dying. I think that they seem to want to take this risky chance to cause me serious problems.
These people seem to find this issue very funny. If something happens to me, then they will not find this harassment and intimidation funny anymore. I am trying to reach out to may people for help and to make them listen to me, but the people that I am reaching out to keep ignoring that there is a problem that is occurring at this time and has been for a long time. This has been an ongoing problem.
I tried to let my work know what is going on, I have tried to make the police listen, I have tried to make my doctors to understand, I have tried to make an effort to make attorneys to listen to me, but every time I try to reach out, as I said, nobody wants to listen to me. I don't know what else to do. I am concerned that I will end up dying some how because of so much stress. My brain and body eventually will give out. I am a human being not a machine that can take so much harassment and being sabotaged from me moving forward in life.
I am trying to reach out to people, but they look the other way and act like I am either crazy or making things up, when I am not. I am not out to hurt anyone by telling on them, but these people are causing me severe stress and it is affecting my physical health and mental health, but mostly mentally. That is the bottom line of what is happening to me.
All I am asking is to be left alone. I recently posted a dating profile and I feel that someone is trying to make my life miserable by not letting me move on. It seems to me that this person is not letting me find someone decent. I seem to get IMs from men who are older than I am and men that are out of shape, men that are not attractive looking. I seem to be getting men that are are dumpy looking and I don't understand why I cannot have someone who is clean cut, cute and intelligent. I feel whoever again finds it funny that men like that want to talk to me and not men that are what I am looking for in a man. That is cyber harassment.
I cannot believe that this person is even invading my private life as well. I keep warning others if something happens to where I end up in a hospital, that will be a serious issue on their behalf. I can promise that.
I can at least say that I tried to make these people stop and I tried to make them see what others were doing to me. I guess if something happens to me, that I can leave this world knowing that I tried stopping these persons from harassing me constantly.
I am having anxiety attacks, abdominal pain, diarrhea and nausea.
He has pressured me into accepting him on a personal level and he kept pushing me. He is also spreading lies about me to others and people that I would like to get to know.
He is delusional and pressures me into accepting him on a personal level if he just keeps pushing me. That basically says it all that I have been through.
What if you quit a job after a guy mentioned a romantic relationship and got nervous? Obviously, you are not really comfortable in those situations and after an awkward chat, decide to send him a few messages that make you unlikeable. He doesn't give you reassurance that you stopped liking him so you start sending messages and request restraining orders from the corporate counsel.
Next thing you know you are deliberately harassing the guy to make him dislike you and to get a restraining order. What will the court do then?
What if you you are being charged with telephone harassment and there is a no contact order in play and then later the victims wants it dropped but it's the sate pressing charges?
If there is someone making something known about an incident to the public and they are posting it on the internet and the person that was involved is not liking it, can they get in trouble even if they are just stating what happened?
To the woman dating the married man: Anyone can look up public information about you. It's not harassment. If the man's wife finds out your dirty laundry and tells her husband, that is allowed. Until the divorce is final, he is still married.
I have been married to my husband for seven years and my parents and brother have always been stopping at my house uninvited, asking why we don't come over and threatening to mess up my husband's face. They are spreading lies about us and saying he needs to watch his back.
I am tired of having to deal with this drama and threats. The police say unless they do physical harm, then all I can do is wait and then call the cops. Any advice?
Can a family press charges against an ex spouse who is constantly harassing their daughter about seeking custody of the children? She is worried sick, literally. She has anxiety attacks, abdominal pain, diarrhea and nausea.
After being absent from work quite a bit, she took a medical leave to try and get a handle on her health. When she called to go back to work, she was told she didn't need to come back. We feel that if the ex would stop the harassment her health and peace of mind would improve. How do we get him to stop this treatment of her? He is also talking to the children about living with, him which should be an adult decision. Help! Any suggestions?
About 1 1/2 or two years ago, I had problems with neighbors playing loud music all night long. We had to call the cops on them four times, and still they would do it until a family member had talk with the guy who was doing it and got it to stop.
The guy's mom lives down the street and he's always walking to his mom's ex's house, who is right next door, causing the dogs to bark (he has small dog that follows him), and about a week ago I caught him threatening my dog for barking (I had just let him out to feed him and the yard is fenced in).
The topping to this little treat is just three hours ago, he sneaked into our yard, urinated on my house and ran into my parents (causing their dog to bark and making the guy run off). My dad came out in time to see him stumbling off, drunk as can be. Luckily, the town cop came by two minutes after and we told him about it. The cop waited and sure enough, the guy came back down the road and got arrested.
Now this guy's known for drinking and drug use and might be a little handicapped mentally, plus the last time he got in trouble, he threatened my farther.
So because of all this I have to ask if there's a way to have them evicted from land or if a restraining order will work (I live in Oklahoma)?
I'm being harassed by someone who is mentally disabled. She's posting lies about me on facebook, constantly texting me, telling me to kill my self and threatening to kill me.
I was threatened and spied on by my boss through surveillance cameras in public. I still don't know why he did it, since I am a good worker. I have a hunch that he hired a private detective to stalk me.
I am now completely paranoid about being around surveillance cameras, surfing the web outside of work, or using my cell phone outside of work since I was illegally spied on by my boss.
This is my problem. I'm the second manager in a supermarket, and when my boss is not there, I have to run the store and make sure everything is O.K. Or, I have a customer who only goes there to look for trouble. I am the third person she had a problem with.
One day, she just looked at me and told me she is going to mess me up when she sees me in the street. The second time, she almost put her finger on my face because she was arguing with me and I told my boss about it and he doesn't want to do anything because she is a customer (but not a customer all the time).
My question is if I can take my boss to court if something happens to me, because he is not providing a safe environment for me. Can I charge her for harassment against me? She is still going to the supermarket and my boss won't do anything. Someone help me, please.
Someone from an internet discussion board apparently used a private detective to find out my private information and filed a false complaint against me with my employer. The investigation proved I did nothing wrong, but I want this person arrested for invading my privacy. How do I do that?
I need to get advise on how to handle a situation that was brought to me by my mom. An ex girlfriend of my nephew slandered our family's name for her own cause in court, over a break up. My nephew wants to see his son, and get visitation rights. She works as a child advocate in the Montgomery county system and I feel that she is using her powers to slander my mom's family name. My mom is very upset over this. What can I do?
She should look at her own mother's relationship with a convict (a lawyer killing a hunter and left the scene)! Help. What can I do? People who live in glass houses shouldn't throw rocks!
I had lost my phone the other day and my boss had tried calling me into work. I still didn't find my phone so he sent another message wanting me to work the next day (also my day off) saying, "I need you here tomorrow from noon to 4, so don't pull and crap. I have given you enough notice, so see ya then, since you only answer to Adam (my supervisor) and not your boss, and if you don't want to work, I have five write ups on you. Just trying to give you hours!"
Well, I finally found my phone and saw all this and told him I had lost it and to chill out because I told my supervisor I had no phone.
Well, he said, "Just like I said, Adam is not your boss. I am." So I would like to know what I should do? I want to tell him I'm not scheduled and not on call as I have stuff to do since it was my day off but then he will threaten me with my write ups. Is this legal for him to do?
I was to marry my fiance in December. He recently "sweet-talked" me into buying him an 800 dollar camper and giving him an 11,000 dollar vehicle I had paid for. I sold my land to buy us a house, unfortunately while I had all this money he was manipulating me into giving him these items. I bought the house for us and it fortunately is in my name only, as it would have been until we married.
He left me, took the vehicle, kept the camper on his land that he could not sell to help get us a house because his mom was living on it currently (but of course, he told me he would sell it when she died to help pay for our house).
I was beaten, had property damage, harassment from him and his grown children, and he kicked my chihuahua several times. My dog used to let my dad pet him but now he will let no male pet him without shivering and peeing on himself because he is so scared from the trauma to him and me.
I believe this man "played" me because my husband died of cancer years ago and only six years ago my 15 year old daughter died from severe cerebral palsy and pneumonia, so he put all the smooth moves on me as I was lonely and without children and a husband.
I was told I cannot get the vehicle or the camper back as they are considered gifts and we were not married at the time. I do have a warrant out for arrest for the bodily damage and property damage, even though he threatened me if I went to the police, that I would "have more problems than I have already from him and his family".
Long story short: a man is getting a divorce and became involved with another woman. The soon-to-be-ex is snooping into the other woman's past and getting info to share with said man.
Is there anything legal that can be done to stop this ex? This is what I would think be harassment. All info would be helpful.
We live in apartment complex. Since I ended one of my son's long term friendships, a neighbor has been bad-mouthing my son and falsely accusing my son of hurting her son and he wasn't even around at the time of the supposed incident.
This neighbor comes up to my place yelling at me saying all this, and even adding how she phoned the school to share he is a bully to her son, whom I haven't let him be around since ending a long term friendship.
@anon295864: If you're on temporary disability, invoke the Americans with Disabilities Act on your landlord. Get documentation from your doctor that the neighbors' actions are detrimental to your health and welfare. Also see if a disability attorney will work with you on invoking this act. He or she can tell you if you really do have grounds to invoke the ADA. If you do, the landlord will have to do something to make sure you are accommodated.
I live in a apartment complex, and I recently have been diagnosed with epilepsy. The neighbors upstairs are constantly slamming on the floors the kids have been reported to CPS (well the mother has) and multiple reports to the police for breaking into my car and harassing me when I am outside.
The landlord won't kick them out because they still pay their rent. As more and more days go on, my epilepsy has been getting worse because of the constant slamming and worry of even bringing my trash outside because of fear that they will harm me.
I can't get better to go back to work to help out with the bills, to make more than temporary assistance helps me with until they are gone. I feel threatened. I don't feel comfortable in my own home, but I can't afford another apartment.
What can I do to convince my landlord that it is affecting my health and to kick them out?
If our neighbor threatened us by coming inside our house without permission and he said one of you will get hurt right now and accusing that the wife was using only her husband just for the money and screaming and pointing her finger in my face, what case I can file for those couple who did that?
Allow me to say something. I'm going through a situation where my ex wife was actually the abuser. When it came to the end, she went beyond the call of duty in that she has turned my life upside down and had our child taken, etc., so I don't want hear the crap. People who use a child to hurt or seek revenge are a pathetic excuse for life.
Secondly, men and women, there is a thing such as a person wanting answers or closure. but they are being played. Wake up. This is 2012.
@anon293102: It's harassment and it's a criminal act. A police officer once told me, "If you perceive it as a threat, then it's a threat." Meaning, if he threatened to strangle you, it's a threat and it's actionable.
Get an attorney who specializes in employment law and can file the appropriate paperwork. Good luck.
My current boss has threatened me twice this year. The first time he said he was going to hit me and the second time he threatened to strangle to me. Besides he has been screaming really nasty things and making me cry. Can I file a harassment case on him. Would that go against the company since this happened at work? Location is NY State. Please let me know what can I do.
My ex filed false charges against me and then didn't even show up at court. I confronted him in Clermont County about the fact that he didn't have the legal right to be at the high school as I am our daughter's legal guardian (see is now 18 and has Down Syndrome).
He was at probate court so he knows that I am the guardian. I haven't stood up to him for 11 years and now that I have, he has filed for a CPO against me in Hamilton County, claiming I threatened him.
I subpoeaned three witnesses, and then he didn't bother to show up at court. Is this considered harassment by him? He filed false charges in a county that didn't have jurisdiction.
My ex has mental health issues and has been diagnosed with a personality disorder twice. His lawyer has been successful in keeping this diagnosis out of court.
How can any of you say someone is not being abused by their spouse? How dare you make that judgment call? You don't know what happened behind closed doors and many battered and abused spouses hide it from embarrassment. They think that others will think they deserve it and abusers are very good at what they do. This guy probably told you his side of the story and probably used the word "crazy." When a guy says a girl is crazy, it is often a red flag that says he is abusing her. Abusers use words over and over to brainwash their victims, as well as trying to establish to friends and neighbors that the abused person is unstable, because honestly, they want to eventually hurt them or even kill their victim.
There is a ton of information on the internet about the stages of abuse. Also, I know from experience.
I have a neighbor who threatens everyone in the neighbor, kids included, calls the cops on neighbors whose trash is too close to hers or kids playing in the street in front of her house. She once even went in to a neighbor's backyard while the neighbor was at work to have a guy cut the neighbor's tree down because it was too tall and was blocking the sun.
This is a constant thing. Most kids are afraid to play out front because they're afraid they'll police will take them away because that is what she says. She walks the neighborhood with petitions trying to get people in the neighborhood evicted from their houses.
I was just curious if there was anything my neighbors or I could do about this woman in the state of Nevada. I feel bad because her husband and daughters are really nice. She's just known as the "neighbor from hell" though, unfortunately. I hope I worded this correctly.
My father made a verbal agreement with his girlfriend to allow her to stay in our town home for three months to allow her time to find a place of her own. My father did not make me aware of this agreement and Sheila moved in our house during the second week of November in 2011. She has not found another place to live and refuses to leave the house. Also, I believe she is now a legal tenant of our home.
My sister, Samantha informed me that my father contacted a police officer. The police officer told him that she cannot be forced to leave unless she is evicted. I do not feel safe enough to wait for a eviction.
Before her transition into the house, Sheila has displayed irrational behavior in my presence. She has had outbursts of anger and repeatedly has argued in our house with my father. His girlfriend has shown such a temper that seems threatening to the well-being of the inhabitants of this house. Sheila has a license to carry a concealed weapon and owns a handgun. I feel very unsafe living in the same confines as her.
Her temper causes me to fear physical harm even though she hasn't clearly stated threat towards me.
Can I request a restraining order that will not allow her to live in the same dwelling as me and if at all possible, have a police officer escort her out of our home?
@Cupcake15 - I agree with what you are saying, but I also know that some people file false harassment charges especially when they are going through a bitter divorce. A neighbor of mine is going through a terrible divorce and his wife filed a harassment suit against him because she claims that he threw some keys at her and hit her in the face.
She also claimed that he was abusive all through their marriage, but she never pressed charges before. The charges were dismissed by the judge, but this is really frivolous and it also damages their young children. I think that people that file false harassment charges like this should face a criminal charges and a substantial fine because they are taking away from real cases when they resort to this petty behavior.
@Cupcake15 - I think that sometimes people are afraid of filing harassment charges because they are afraid of the repercussions. They don’t want to anger the perpetrator and try to avoid rocking the boat.
I think that the first time someone harasses you should be a huge red flag that they will likely do it again. It is better to get out at that point then to continue on with the relationship because you dismissed the harassment and try to sweep it under the rug.
@Sunshine31 - I know what you are saying and I agree that you should go to the human resources department and keep detailed records about what is happening, but for some people it might be easier to get another job.
I think that if you can avoid people like this you would be better off. I remember when I was managing a department store; I had an employee that was being stalked by her ex boyfriend. She had a restraining order in place, and I don’t know why she did not purse filing harassment charges. Well, a few days before she was to go to college, she was murdered by her ex boyfriend in her home.
It was so sad. Maybe if she had filed aggravated harassment charges when this was going on she would be alive today. I know that sometimes people in these situations have mixed feelings about filing harassment charges, but you really have to protect yourself because domestic violence only gets worse.
I do think that if someone is harassing you that you have to protect yourself because these cases usually escalate. At my husband’s company the former CEO was sexually harassing two women in the company. One was fired and the other remained with the company. Both women filed lawsuits against the company when they felt that the company was not protecting them from this person.
They settled the case out of court and the CEO was fired. So don’t think that because of a person’s stature that you will not be able to make a difference. You can, but you have to keep very detailed records and realize that you may lose your job before it is over because filing harassment charges is never easy.
Post your comments
Forgot password?
• Teacher harassment towards a student may result in criminal charges.
By: Jasmin Merdan
Teacher harassment towards a student may result in criminal charges.
• Unwanted, repeated phone calls can be considered a case for harassment charge.
By: chuugo
• It is important that a lawyer be contacted during a harassment charge.
By: Gina Sanders
• A harassment charge may be civil or criminal, depending on the violation.
By: evgenyi
• The United States, Australia, and the United Kingdom have enacted cyberstalking laws.
By: kanvag
• Repeatedly causing damage to a neighbor's property is considered a form of neighbor harassment.
By: Sergey Mostovoy
• Excessive phone calls are considered a form of harassment.
By: Monkey Business
Excessive phone calls are considered a form of harassment.
• A suspect may be face arrest for a harassment charge.
By: jinga80
A suspect may be face arrest for a harassment charge.
• Harassment charges are typically filed against people caught stalking.
By: Kevin Daugherty
Harassment charges are typically filed against people caught stalking.
• Harassment charges may be filed against someone who won't leave their ex alone.
By: nyul
• A stalker will typically face criminal charges.
By: Kim Schneider
A stalker will typically face criminal charges.
• Purposely leaving garbage on a neighbor's property is considered a form of neighbor harassment.
By: Manuela Manay |
Skip to main content
Shopping story
If you want something, lots has to happen before you get it. Can you turn the stages into a story?
Plan a session with this activity
You will need
• Stages of the shopping story (printed out, written down, or displayed on screen)
Shopping Story Image Cards
PDF – 462.3KB
Activity summary
This activity is all about being aware of where money comes from. It gives everyone the chance to play around with the things that happen between first wanting something and buying it; as they put the stages into order, they’ll be able to think about what influences their spending decisions.
It’s not about getting the stages in the ‘right’ order – it’s about people recognising what influences the process and thinking about what they might choose to do in the future.
Before you begin
• Make sure you’ve risk assessed your meeting, and also have a COVID-19 safe risk assessment that’s been agreed by your line manager. You can check out more detailed guidance here.
• Decide whether you’ll print the stages of the shopping story off, write them out, or display them on screen. It’ll probably depend on how you’re meeting at the moment.
• There are some great games to to with budgeting and saving on the Scout Store: look for Money Bags, Buy It Right Shopping Game and Money Box Tree!
Safety checklist
Use the Safety checklist to help you plan and risk assess your activity. Additional coronavirus-related controls to think about may include:
• Make sure that everyone knows the plan for dropping young people off (and picking them up again).
• Set up a hand washing station that you can use throughout the session.
• Stay socially distanced when moving around the space and when talking to other people.
Step 1: I want... but why?
1. Everyone should chat about what might influence their decisions when they choose to buy (or ask someone else to buy) something.
1. Everyone should chat about what happens once they’ve decided what they want to buy. How could they get the money they need to buy it?
Step 2: out of order
1. Everyone should get into pairs.
2. The person leading the activity should explain that everyone will be thinking about buying a new piece of equipment for a game at camp.
3. The person leading the activity should give each pair the stages of the shopping story.
1. Each pair should put the stages into an order that makes sense to them.
Step 3: tell your story
1. Each pair should choose a way to present their story to the group and make it your own.
1. All of the pairs should take it in turns to share their story.
2. Everyone else should listen and ask questions about why other groups chose their order
3. Once everyone’s had a turn to share their story, everyone should chat about all of the stories.
Step 4: add an ad
1. The person leading the activity should point out that one of the steps talks about seeing an advert.
2. Everyone should chat about how often they think that happens in the story.
3. Someone should tell one of the stories again. This time, everyone should mark out where an advert might influence their decision.
1. Everyone should chat about how the advert might change the story.
What has everyone learned about the order in which people buy things? What have they learned about the things that influence people’s choices? Where could people use this in their lives?
|
SermonIndex Audio Sermons
Access over 100,000+ Sermons from Ancient to Modern
SermonIndex.net : Christian Books : VI. THE PEARL.
The Parables Of Our Lord by William Arnot
|Again, the kingdom of heaven is like unto a merchant man, seeking goodly pearls: who, when he had found one pearl of great price, went and sold all that he had, and bought it.| -- MATT. xiii.45, 46.
So closely allied are these two parables, that if we had regarded repetition as a formidable blemish in our lessons, we would not have proposed to expound them separately and successively. The two lines are coincident throughout their whole length, except at one point; but there the diversity is broadly marked, amounting in one aspect to a specific contrast. In view of this difference on the one hand, and of the example of the Lord on the other, I think it right to open and apply the parable of the pearl as fully as if the parable of the hidden treasure had not gone before it. We need and get not only different pictures of the same objects, but also the same pictures repeated in different colours and on different grounds. One eye may be more touched and taken by this colour, and another by that, although the outline of the objects be in both cases essentially the same. Thus, the conception of a treasure found may convey the meaning more impressively to one mind, and the conception of a pearl purchased may convey it more impressively to another; and so, although the lesson of the second parable had been more nearly identical with that of the first than it is, it would not have been expedient to dismiss it with a cursory notice. By a full examination of the principle under the picture of a precious pearl, we shall obtain the advantage which in moral questions, as in material operations, is often unspeakably great, of a second stroke on the same spot. The usefulness, and even the necessity of this method is acknowledged by all teachers, in whatever department they may be called to exercise their office. The same reasons, moreover, which induced the Master to reduplicate his lesson demands that we should also reduplicate ours: it is our part both in matter and in method to follow his steps.
Pearls seem to have borne a higher value in ancient times than they bear now, both absolutely and in comparison with other kinds of jewels. Romantic ideas prevailed regarding their origin and their nature; but it is well worthy of remark that the parable passes in silence all that was false or fanciful in the ideas of the ancients regarding the production and the medicinal virtue of pearls. There is not a word about their origin in a drop of dew, or the colour imparted to them by the brightness or darkness of the heavens at the moment of their conception: the only circumstance regarding the pearl which the Lord employs in his instructions is its high price. He seizes the obvious and universally known fact, taking no notice of the fanciful theories with which it was connected.
This fact possesses a value in relation to Apologetics which intelligent students will readily appreciate. It is instructive and suggestive to compare the Scriptures on such subjects with other books both ancient and modern. Take, for example, a passage from the comment of Benjamin Keach, which gives both the conceit of the ancients and the endorsement of it at a comparatively recent era. |Pearls,| naturalists tell us, |have a strange birth and original. Pliny saith, Shell fish is the wonderful geniture of a pearl congealed into a diaphanous stone, and the shell is called the mother of pearl. Now at a certain time of the year this shell fish opens itself, and takes in a certain moist dew, after which they grow big until they bring forth the pearl. By which it seems they have their birth from heaven in a marvellous manner.| Planting his foot upon this story, the worthy expositor gravely and devoutly prosecutes the parallel; but already, although it is only a century and a half old, his speculation serves only to provoke a smile. The comment, written in England a hundred and sixty years ago, is antiquated and set aside by the light of the present day; but the parable, spoken in Galilee eighteen hundred years ago, stands in the middle of the nineteenth century, enduring in safety the scrutiny of adversaries, and ministering to the delight of friends, as fair and fresh as on the day of its birth. |Whence hath this man this wisdom?|
For the sake of its bearing on the divine authority of the Scriptures, and the questions that are agitated at the present time, I subjoin a similar example, extracted from a lecture which I contributed to the Exeter Hall series of 1860-61: --
|A very remarkable expression occurs in the Apocalypse (xvi.18) bearing on the work of preparing the earth for man, before man was made: 'And there was a great earthquake, such as was not since men were upon the earth, so mighty an earthquake and so great.' There the advent of man, as an inhabitant of the earth, is formally given as an epoch after which great earthquakes did not occur. It is well known now that earthquakes must have rent this globe before the birth of man, which make all that have occurred since sink into insignificance; but how was John, the fisherman of Galilee, led to employ, eighteen hundred years ago, a phraseology which the researches of our own day have now for the first time shown to be philosophically exact? Speaking of this verse, and quoting it freely, John Bunyan (|Reign of Antichrist,|) says, 'For the earthquake, it is said to be such as never was, so mighty an earthquake and so great.' He thought the phrase, 'since men were upon the earth,' was equivalent to 'never:' so he wrote and fell into the blunder. Who led John the Apostle safely past the mistake into which John Bunyan fell?|
Pearls are the product of certain species of shell-fish, both marine and fluvial. The cause and manner of their formation have not even yet been completely ascertained. They do not constitute any part or organ of the creature that contains them. They are not found in every shell, nor of the same size and shape in any two. They are eccentric and accidental, probably also morbid excrescences, thrown out by some individuals of the species in irregular forms and at uncertain times. They probably owe their origin to the presence of some minute foreign substance within the shell, which is distasteful to its occupant. Not being able to cast out the intruder, the feeble but diligent inhabitant covers it with a sort of saliva, which hardens over it into a substance similar in consistency and sheen to the interior surface of its own shell. The act of covering a base substance of any shape with gold or silver by the process of electrotype is in human art an analogous operation. When the material, distilled in imperceptibly minute portions from the living mollusc, has chemically agglomerated round the original kernel, the pearl is made. The creature having covered the irritant atom with a coating at once hard and smooth, can now endure with equanimity its presence within the shell. Thus unconsciously it manufactures those indestructible and much coveted jewels, for the sake of which its own life is sought and taken by man.
In modern times pearl fishing has become a business, and is prosecuted on a great scale in several far separated regions. Perhaps the increase of production, through superior methods and instruments, may, here as elsewhere, have contributed to depreciate the value of the article.
I have been informed by a British merchant who, under license from the government of India, conducts the pearl fishing in the Bay of Kuratchee, that the method pursued is to bring the shells to shore as they are brought up from the bottom of the sea until a considerable quantity has been accumulated, disposed in a series of small contiguous heaps, and that then the men stand round the heaps, open the shells, and search for the pearls. So much loss accrues from the dishonesty of the men and the facility of secreting a treasure that lies in such a small bulk, that the proprietor of the fishing has had under consideration a suggestion to sell the heaps of shells by auction to the natives, and permit them then to make the best of their bargain. Whether this method of preventing peculation has been actually adopted, I have not learned.
Our own Scottish rivers are frequented by a large bivalve mollusc, which produces true pearls, although their size and number have never been sufficient to attract capitalists or sustain a steady trade. I do not know how others operate in other localities, but here is a method which I either invented for myself or borrowed from a neighbour, and practised with considerable success on the river Earn in Perthshire when I was a boy: -- Provide a long straight rod, thin and broad and rounded at the point after the manner of a paper-cutter. Jump into a light fishing-boat, and bring it right over the oyster bed when the sun shines brightly and no ripple disturbs the surface of the water. Bring the boat into such a position with respect to the sun that your own body, bending over the gunwale, will throw a shadow on the immediately subjacent surface. Through that shaded spot you see the bottom with great distinctness, and can distinguish there the objects of your search lying invitingly still, and open, and unconscious. The depth may be from six to twelve feet. The molluscs lie bedded in the mud, with one edge above the ground, and that edge slightly open. Push your rod now gently down in a perpendicular direction, -- for if you permit an angle the different degrees of refraction in the air and water will make your straight rod crooked, and you will egregiously miss your object at every stroke, -- until its point is within an inch or two of the opening between the shells of the mollusc, and then quickly plunge it in. Hold it still there for a few seconds until the creature has time to close and bite the rod, you may then pull it up at your leisure. Throw your capture into the bottom of the boat, and proceed in the same manner with the next. When you have collected a sufficient store, sit down and open them one by one with a knife, feeling carefully with your thumbs for the little hard round knots among the velvet folds. These knots, when extricated from the fleshy lobes that cover them, turn out to be pearls, in form more or less globular, and in sheen more or less bright. You rejoice more or less, accordingly, in your capture. The day on which a good pearl was found became a day to be remembered in the family group. The price of the finest never rose above a shilling or two; but as riches are relative, and must be estimated by comparison, these were treasures to us, and the sight of a large bright pearl suddenly shining out of the shell was enough to set a boy's heart a-beating in those early days.
During a drought in the summer of 1863 the small river Doon, in Ayr shire, fell so low that some pearl-beds in pools, that had not been noticed in other seasons, were exposed to view, and placed within reach: the consequence was that the people in the neighbourhood, old and young, betook themselves to pearl fishing, and that with considerable success. Among other facts circumstantially related in the local papers at the time, it was stated that one poor woman, during the sickness of her husband, gained as much by the sale of her pearls as made good the loss of her husband's wages for a whole month. In the course of this summer (1864), and since the preceding notes were written, a considerable amount of pearl fishing has been carried on in certain rivers in the northern districts of Scotland, and efforts have been made to organize a regular trade.
I suppose diamonds occupy now the place that was held by pearls in ancient times. While a vast number of goodly diamonds are in circulation, affording occupation to many dealers, here and there one is found which alone constitutes a fortune of almost fabulous amount for its owner. One that was brought from India a few years ago, and is now in the possession of the Queen, has a history extending upward several generations. It passed, like provinces, from potentate to potentate by natural inheritance or the fortunes of war. If it had fallen into the hands of any private person, it would have made him an object of wonder on account of his wealth, even in presence of modern accumulations. The history and fame of the Kooh-i-noor supply the best illustration of this parable that I know.
Conceive a merchant with a moderate capital setting out on a journey with the view of collecting diamonds for sale in the home market. In the course of his travels, in the interior of India it may be, he discovers a diamond such as the Kooh-i-noor in the hands of a countryman. The possessor may know generally the value of diamonds, and know that this one in particular is of greater value than any that had ever come into his hands; yet, because it is unique, and he has nothing in his experience wherewith to compare it, he may dispose of it for a tenth of its value. If the best diamond that the seller had ever seen were worth twenty thousand pounds, he might value this one at forty thousand; and that price the buyer might cheerfully pay down, although it constituted all his property, knowing that at home the prize will command four hundred thousand. Thus, without supposing ignorance on the one side or dishonesty on the other, you have a transaction which will enrich the merchant at once and enable him to retire in affluence. This is the sort of transaction that is supposed in the parable. It was a natural and probable supposition at a time when information did not spread so quickly as in our time, and when pearls held as to value the place which diamonds occupy in modern merchandise.
It is true that the merchant went abroad expressly for the purpose of seeking goodly pearls; yet this pearl was to him an unexpected and surprising discovery. He had provided funds sufficient to purchase many pearls; but when he met with this one, its value was such that he could not make an offer for it until he had returned to his home and converted all his property, including the pearls that he had previously purchased, into money. In this parable as well as in that of the hidden treasure, an object is discovered of a value hitherto unknown and unsuspected. But the lesson here is in one important respect different from that of the preceding parable, and the point of distinction is, that there a man stumbled upon a treasure when he was in search of meaner things, while here the merchant finds in kind the very object which he sought, but finds it in measure far surpassing all his expectation or desire.
Well might the merchant return and convert all his estate into money that he might purchase this jewel; for if it were once in his possession, as there could be no rival, he might command his own price. None but monarchs could aspire to the possession of such a treasure, and these would compete with each other at his desk for a gem that could not elsewhere be obtained.
Although their place is not the highest now, yet pearls even in our own day are sometimes found of a value so great that the history of an individual is recorded and its praises published through the world. The following, for example, are the terms of a paragraph taken from a British journal of last year: -- |One of the finest pearls in the world has been found in the bay of Panama. It is of a perfect pear shape, and of the finest water.|
* * * * *
The application of the parable is, intellectually at least, a short and easy process. It is not precisely the case of a man who finds the kingdom of God when he is seeking something else: neither is it the case of a man who first thoroughly knows the worth of that kingdom and then sets out in search of it. There is no such example: no man knows its worth before he obtains it. The merchant knew the value of pearls and set out in search of them, but such a pearl as that which he found he had never seen before, and never expected to see. So, although a man has some spiritual perceptions and spiritual desires; although by a deliberate judgment he determines to seek the life-eternal in preference to all the business and pleasures of the world, he does not at the outset understand how exceeding rich the forgiving grace of God is. Nay, he thinks, when he first begins his search for salvation, that it may be accomplished by the union of many attainments, such as men may possess. Precious pearls and a number of them indeed; but still such pearls as he has often seen in the possession of other merchants, and such as he has in former times had in his own store. He goes out with cash in hand to buy pearls, but he leaves his house and land still his own. He expects to acquire many excellent pearls and retain all his property besides. He did not conceive of one that should be worth all he had, until he saw it. It is thus that people under convictions set out in search of something that will make them right before God. They want to get righteousness and temperance, and a good case for the judgment to come. In their search they come to the Gospel; they get a glimpse beneath the surface; they see protruding from beneath the folds something that surprises them. Can that be a pearl? No; that is larger than any pearl ever was or can be, and brighter; surely that cannot be a true pearl. What? Pardon of sin to sinners without stipulating for a price in their own repentance and righteousness, -- peace with God and sonship given free to the chief of sinners before he has done anything to deserve it, -- all sin forgiven, and that now and that free, and no condemnation thenceforth, but the place and the favour of God's sons! and these not only to some who stand out from their fellows as great and good, but these to me, -- from God to me to-day as surely as if there never had been a human being on the earth but myself, and the errand of Christ had been only and all for me! These glimpses stagger the man at first; he thinks they are too good to be true. It is as if some one should tell a skilful pearl merchant that under yon covering lay a pearl a thousand times more precious than any he had ever seen before: of course the merchant is incredulous, and demands a sight of it. Then a portion of the covering is removed, and a glittering disc is partially revealed, so vast and so lustrous, that instantly and instinctively the merchant feels, If that be a pearl it is more precious a thousand-fold than any that I have ever seen: but at the same time he secretly fears it is not a pearl, and that, not for want of the true pearly lustre, which his eye has been well educated to detect, but because of its very greatness and goodness. The process in his mind is not that it does not seem a genuine pearl, but that if it were a pearl it would be so inconceivably great and precious that he must conclude there is some deception. But when it is more fully revealed and more thoroughly inspected, he finds that it is indeed a true pearl. Instantly he determines to part with all he has that he may obtain it: he parts with all that he has, and makes it his own. He has not only made a successful bargain, as other merchants may do, or as himself may have done at other times: he has in one moment enriched himself beyond all conception that he formerly entertained. His merchandise has been brought to an end. There is no need now for more buying and selling in order to acquire wealth; his fortune is made.
This is really very like the process that goes on in a human spirit when an anxious inquiry about salvation terminates in finding and closing with Christ the Saviour. The expectations with which the inquirer set out were very low. If he could get his sense of guilt somewhat lightened that he might begin anew and endeavour to please God; if he could get the fear of wrath diminished, and some assurance that the Judge would not visit him to the full extent for all his sins; -- he does not venture to expect more. Expressly he had no conception of all in one: he thought of a multitude of good religious attainments, which, when added together, would make him, if not rich enough, yet as good as any of his neighbours. Some low and little thing he went out to seek, and, lo! he came upon all the fulness of the Godhead bodily treasured up in Christ, and all that fulness offered in return for simple surrender of himself.
Surprised by the greatness of the treasure, he suspects at first that there must be some mistake; but when he becomes convinced of its reality, his resolution is instantly taken, and the transaction irrevocably closed. Like the merchant rejoicing in his fortune is a believer who has found peace with God: henceforth he is rich. He does not need now to huckster in small bargains between his conscience and the divine law every day, and struggle to diminish the ever-increasing amount of guilt by getting small entries of merit marked on the other side of the page. All this is past. He is in Christ Jesus, and to him, therefore, there is now no condemnation.
The treasurer of the Ethiopian Queen was precisely such a merchant. Before he left home he evidently counted himself poor, and longed to possess the true riches: before he left home he was aware that a man is not profited although he gain the whole world, if he lose his own soul. It was an oppressive sense of poverty that compelled him to travel. He occupied the highest office in a kingdom; he stood on the steps of the throne, and had charge of the royal treasury; but he counted himself poor notwithstanding. He must go in search of more precious pearls than these. Peace of conscience, righteousness, hope for eternity, -- these are goodlier pearls than any that can be found in Ethiopia; and the man undertakes a journey to Jerusalem to try if he can find them there. Disappointed there, he was on his way home, seeking still for the pearls, and seeking near the very spot in the Scriptures where the one priceless pearl lay, when Philip met him. By the Evangelist's skilful help he found it then and there; but when he found it at last, it was much more precious than he had ventured to expect. |He was led as a lamb to the slaughter.| |Of whom speaketh the prophet this?| inquired the Ethiopian, |of himself, or of some other man?| Some subordinate benefit he was contemplating, -- the suffering of some good man, perhaps, as an example to his brethren. Even that, as being something that might contribute to the peace of his soul, he was glad to hear of, and would gladly buy, that he might add it to his stock of goodly pearls. But when Philip, beginning from that scripture, |preached to him Jesus,| he found that the lamb led to the slaughter is the |Lamb of God, who taketh away the sin of the world.| The worth of the pearl turned out to be immeasurably greater than the merchant had previously been able to conceive. He exchanged all for it on the spot, and went on his way rejoicing. He did not require to go from country to country any more in search of goodly pearls. He was rich, -- rich toward God.
Das ist Philippus element,
Er uebt sein Predigtamt,
Lebendig wird das Pergament,
Des Mohrenfuersten Herze brennt,
Sein dunkles Auge flammt.
Denn was er im Juwelenschrein
Kandaces nimmer sah,
Die eine Perle, himmlischrein
Die koestlicher als Edelstein,
Er fand am Weg sie da.
Kari Gerok.
I think all speculations about the whiteness and purity and lustre of the pearl as an ornament should be set aside, as being an attempt to bring a meaning out of the parable which its Author did not put into it. Obviously the merchant did not buy it in order to wear it. If after giving all that he had for the pearl, he had hung it on his neck, where could the poor man have found food and clothing? No; the pearl is presented here in one aspect only, -- as being |of great price.| It was worth much -- it was a fortune to a merchant; but when you speak of it as an ornament on the wearer's brow, you turn aside from the line of the parable, and miss its meaning.
The true lessons of the parable, as I understand them, are briefly these: --
1. It represents the experience, not of a careless or a profane man, who stumbles suddenly upon the Gospel when he was in search of other things, but of one who is awakened, and has begun to seek the true religion, endeavouring to add attainment to attainment sincerely, according to his light. His conscience is uneasy. He has tried the old specific, |All these have I kept from my youth up;| but it no longer avails to soothe his spirit. |What lack I yet?| burst from his breast in broken sighs. There is truth in the man, though not wisdom. He is honestly seeking the way, and the Lord leads him. He is seeking; he shall find.
2. It represents the unparalleled, inconceivable richness of God's mercy in Christ, taking away all a sinner's sin, and bestowing on him freely the place and privileges of a dear child.
3. It represents that these riches lie, not in an accumulation of goodly attainments, such as men are wont to traffic in, but in one undivided, indivisible, hitherto unknown and unimagined treasure.
4. It represents that the inquirer, the instant he discovers that this one incomparable, all-comprehending treasure exists and is offered to him, cheerfully, eagerly, unhesitatingly gives away all that he possesses, in order to acquire it. That is, he gives all for Christ, and then enjoys all in Christ.
Let me suppose myself a merchant, travelling in a foreign country in quest of pearls. I have found and secured several lots that I count good. I have still capital remaining sufficient to purchase many more; I therefore continue my search. One day I meet a man who shows me a pearl more precious than any that I had ever seen before. At a glance I perceive that it is worth all I possess twenty times told. I say to the owner, and say it with a beating heart, fearing that he will despise my offer, |I shall give you all I possess for this pearl.| He accepts my offer; he gives me the pearl into my own hands, and I consign over to him all that I have in the world: first, all the pearls that I have bought in my journey; next, all my remaining capital; then houses, lands, books, -- all. I sign the deed with a throbbing heart, not from fear, but from abounding joy. My act does not intimate that I value lightly my possessions and rights: it intimates that my new portion is, in my esteem, so greatly good, that it will repay all my outlay, and give me a fortune beside.
So when I abandon my repentance, and my prayers, and my services and gifts -- when I sign away all my expectations on account of all religious attainments, and accept Christ alone as my soul's portion -- my act does not intimate that I count little on the various graces of the Spirit in a disciple's life: it means that in Christ and with him I have all good things in measure infinite, in duration eternal.
If our suggestion regarding the cause and manner of the pearl's growth is correct, the kingdom of God in the Gospel of his Son was generated in the same way: the pearl and the pearl of great price have the same natural history.
Some foreign, hurtful thing falls on the creature's life. Forthwith the irritation which that invader produces causes the creature to throw out and over the disturber that which forms a covering round it -- hiding, smothering, annihilating the originating evil, and constituting over it and in place of it a gem of the tenderest, gentlest beauty -- impenetrable, imperishable, glorious.
So sin, a corroding drop, a dark, deadly, vexing, torturing thing, fell upon God's fair creation, threatening to inoculate it with a poison that should leaven the whole lump, and change its beauty into corruption. But around the dark sin-spot, and because the sin-spot was there, divine love showered down, like the impalpable silver gathering on its object in the electrotype, embracing, surrounding, covering, killing the evil and bitter thing that threatened to destroy the works of God. Death was swallowed up in victory. The Son of God came into the world because sin was on it. He, the Holy One, took sin into his bosom, that he might quench it in his own embrace. It was sin that summoned the Saviour to the world, and gave shape to the Gospel of God. To the devil's wile in Eden, as the occasion, though not the cause, unfallen angels and ransomed men will for ever be indebted for that specific work of their Creator which will most attract their eyes and inspire their songs. On one side they behold mercy, in spotless, unmingled white; and on the other side they behold judgment, darker, indeed, yet equally resplendent. But here in the midst, in the person of God incarnate, they see mercy and judgment meeting -- the pearl of great price -- where two different and apparently opposite glories mysteriously and beauteously mingle and play. Death swallowed up in victory; sin embraced and so destroyed in the person of Immanuel; sin lost in the holiness and love that agglomerated round it; -- this pearl will shine in heaven with a glory that excelleth, when the sun and stars shall have fallen like unripe figs from the sky.
<< Contents >>
©2002-2021 SermonIndex.net
Promoting Genuine Biblical Revival.
Affiliate Disclosure | Privacy Policy |
For a bird watcher, the song "The 12 Days of Christmas" could be a gift list or a wish list. It's mostly about birds.
Two doves, three hens, seven swans. But, what kind of doves, hens and swans?
A little research provides answers. That work was done several years ago by — what else? — an ornithologist named Jeff Price and his wife, Amy. With his permission, we explain thusly.
The song, believed to originate in France in the 17th century, lists gifts given on the days between Christmas and Epiphany. The song moved high on the Holiday Top 40 when it crossed the channel to England.
The birds that fly out of the melody would be European species, but they have North American equivalents.
The first day, a native British partridge, the gray partridge, is the loner in the fruit tree. Gray partridges have been introduced here for hunting. A better substitution would be a sharp-tailed or ruffed grouse.
European turtledoves are likely the pair of doves given on Day Two. Our substitute could be the non-native Eurasian collared-dove, or our native mourning doves.
The three French hens aren't as fancy as they sound. They're barnyard chickens. Chickens once were wild birds, though, the red jungle fowl of Southeast Asia the first to be domesticated. For something fancy give our native greater prairie chicken.
It's not "four calling birds" which is how I hear it. It's "colly" birds, colly referring to soot or coal black. The Prices think that the colly birds might have referred to the European blackbird (which is really a thrush, related to our robin). Substitute red-winged blackbirds.
As we sing the song today, the fifth day of Christmas brings five golden rings. The Prices believe that the original lyrics used the term "gulderers." Gulderer is Scottish for a turkey or perhaps a guinea fowl. You'll need to nab wild turkeys for this gift, perhaps right out of your backyard.
Six geese a-laying likely refers to the greylag goose of Europe, an ancestor to many of our domestic goose breeds. Our equivalent would be the greater white-fronted goose.
The swans, seven a-swimming, most likely are mute swans. These birds were common on the large English estates, where an elaborate celebration as described in the song might have been held. Mute swans are non-native here, introduced as decorative and regarded by conservation departments as pests. Our native trumpeter swan is what you want to wrap up.
You wouldn't eat your gift birds. The idea is the birds lay eggs for you to cook for guests. (Swan eggs boiled take more than three minutes.)
You get this exotic collection of birds plus eggs for adventuresome meals. You have to feed this feathered crowd, however. We recommend cracked corn.
What species is on my holiday list this year? Chocolate. |
Posts for tag: Bleeding Gums
By Stephen R. Harris, DDS
September 23, 2021
Category: Oral Health
Tags: Bleeding Gums
There are a number of reasons why your gums might be bleeding, as you likely know. However, some reasons are more common than others. The most common reason that your gums are bleeding is gum disease. There are various different stages of gum disease depending on its severity, but it is possible for your gums to bleed even if you only have gingivitis, the first stage of gum disease. However, you can also cause your gums to bleed if you brush too hard near your gum line. Stop by our location in Farmington, MI, and see how Dr. Stephen Harris, a Farmington Dentist, can help you with your gums.
What If Your Gums Bleed When You Floss?
It is most common if your gums bleed when you are brushing your teeth. However, this isn't the only time that they can bleed. It is possible for your gums to bleed when you floss and if this happens, it is usually due to a buildup of plaque on your teeth. This buildup of plaque can make your gums sensitive and inflamed, causing them to bleed when you floss.
The best way to deal with this is to floss regularly. Your gums should bleed less frequently as you make flossing regularly a habit. You can also make your gums bleed if you floss the wrong way. You shouldn't use too much force when you floss your teeth.
What If Your Gums Bleed Even When You're Not Brushing or Flossing?
It is possible for your gums to bleed even if you are not flossing or brushing them. As Dr. Stephen Harris, a Farmington Dentist working in Farmington, MI, would tell you, gum disease can cause your gums to become so sensitive that simply eating makes them bleed. This is more likely if you happen to be eating food that is crunchy or hard. If some food becomes stuck in your teeth, this can make your gums bleed, too. Normally, you can simply dislodge the food by flossing to solve this issue.
When Should You Discuss Bleeding Gums with Your Dentist?
In many cases, better oral hygiene can deal with bleeding gums. However, if your bleeding gums become too serious, you should talk to your Farmington Dentist in Farmington, MI about them. If your gums bleed constantly, you are in quite a bit of pain, or one of your teeth feels like they're loose, make an appointment with your dentist immediately. They can treat the issue and make sure it doesn't become more serious.
Bleeding gums are a fairly common reason to see a dentist. You can trust Advanced Dentistry and Dr. Stephen Harris to give you the right treatment for your gums. If you're in Farmington, MI, and you need dental care from a Farmington Dentist, stop by our practice today. You can call us to make an appointment at 248-478-4755.
Contact Us
Stephen R. Harris, DDS
Farmington Hills, MI Dentist
Stephen R. Harris DDS, PC
34024 W 8 Mile Rd., Ste. 106
Farmington Hills, MI 48335
(248) 478-4755
(248) 478-1139 fax
Tooth icon Call For Pricing Options |
Sentiment Analysis Projects & Topics For Beginners [2022]
Are you studying sentiment analysis and want to test your knowledge? If you are, then you’ve come to the right place. In this article, we’re discussing sentiment analysis project ideas with which you can test your knowledge and showcase your understanding.
We know how tricky it is to find great project ideas. We also know how beneficial it is to complete projects. With projects, you can strengthen your knowledge, enhance your portfolio, and bag better roles.
Join Best Machine Learning Course online from the World’s top Universities – Masters, Executive Post Graduate Programs, and Advanced Certificate Program in ML & AI to fast-track your career.
So without further ado, let’s get started.
What is Sentiment Analysis?
Sentiment analysis is a kind of data mining where you measure the inclination of people’s opinions by using NLP (natural language processing), text analysis, and computational linguistics. We perform sentiment analysis mostly on public reviews, social media platforms, and similar sites. Following are the main types of sentiment analysis:
Fine-grained sentiment analysis gives precise results to what the public opinion is about the subject. It classified its results in different categories such as: Very Negative, Negative, Neutral, Positive, Very Positive.
Detecting Emotion
This kind of sentiment analysis identifies emotions such as anger, happiness, sadness, and others. Many times, you’ll use lexicons to recognize emotions. However, lexicons have drawbacks too, and in those cases, you’d need to use ML algorithms
Based on Aspect
In aspect-based sentiment analysis, you look at the aspect of the thing people are talking about. Suppose you have reviews of a smartphone, you might want to see what the people are talking about its battery life or its screen size.
Sometimes organizations need to analyze the text of different languages. This form of sentiment analysis is considerably challenging and requires a lot of effort because you’d need many resources.
Sentiment analysis has many applications in various industries. As it helps in understanding public opinion, companies use sentiment analysis in doing market research and figuring out if their customers like a particular product (or service) or not. Then, according to the findings of the sentiment analysis, the organization can modify the respective product or service and achieve better results.
All in all, it helps companies in understanding their customers better. Companies can serve their customers better when they know where they lag and where they excel.
In the following points, we’ve discussed some prominent sentiment analysis project ideas, pick one according to your interests and expertise:
Sentiment Analysis Project Ideas
The following are our sentiment analysis projects. Our list has projects for all skill levels so that you can choose comfortably:
1. Analyze Amazon Product Reviews
Amazon is the biggest e-commerce store on the planet. This means it also has one of the largest product selections available. Many times, companies want to understand the public opinion on their product and figure out what’s responsible for the same. For that purpose, they perform sentiment analysis on their product reviews.
It helps them in recognizing the primary issues with their products (if there are any). Some products have thousands of reviews on Amazon while some others only have a few hundred.
It is one of the most sentiment analysis projects because the demand for such expertise is very high. Companies want experts to analyze their product reviews for market research.
You can get the dataset for this project here: Amazon Product Reviews Dataset.
Working on this project will make you familiar with many aspects of sentiment analysis. If you’re a beginner, you can start with a small product and analyze reviews of the same. On the other hand, if you’re looking for a challenge, you can take a popular product and analyze its reviews.
2. Rotten Tomatoes and Their Reviews
Rotten Tomatoes is a review site where you’ll find an aggregate of critics’ opinions on movies and shows. You can find reviews on nearly every show, TV series, or drama there. Admittedly, it’s also a great place to get data from.
You can perform sentiment analysis on the reviews present on this site as a part of your sentiment analysis projects. The entertainment sector takes critic reviews very seriously. By analyzing critic reviews, a production company can understand why its particular title succeeded (or failed). Critic reviews influence the commercial success of a title considerably as well.
With sentiment analysis, you can figure out what’s the general opinion of critics on a particular movie or show. This project is an excellent way for you to figure out how sentiment analysis can help entertainment companies such as Netflix.
You can get the dataset for this project here: Rotten Tomatoes dataset
3. Twitter Sentiment Analysis
Twitter is a great place for performing sentiment analysis. You can get public opinion on any topic through this platform. This is one of the intermediate-level sentiment analysis project ideas. You should have some experience in performing opinion mining (another name for sentiment analysis) before you work on this task. As it’s a popular project idea, we’ve discussed in a little more detail:
You should have a basic knowledge of programming. You can either be familiar with Python or R (it’d be great if you’re familiar with both). However, it’s not necessary to have expert-level knowledge of programming. Apart from programming, you should also know how to split datasets and use the RESTful API because you’ll have to use Twitter API here. You should also be familiar with the Naive Bayes Classifier as we’ll be using it to classify our data later in the project.
This project isn’t easy, and it’ll take a little time (downloading data from twitter takes hours).
Working on the Project
First, you’ll need to get authorized credentials from Twitter to use the Twitter API. It takes some time to authorize a Twitter Developer Account, but once you have it, you can go to your dashboard and ‘Create an app’.
After you have the necessary credentials, you can create the function and build a test set. Twitter has a limit on the number of requests one can make through their API, which they have added this limit for security reasons. The ceiling is 180 requests in 15 minutes. You can keep the test set to have 100 tweets.
After creating the test set, you’ll have to build the training set by using Twitter API, which is the hardest part of this project. Make sure that you save the tweets you gather from the API in a CSV file for future use.
After preparing the training set, you only have to preprocess the tweets present in the datasets. Remember, emojis, images, and other non-textual components don’t affect the polarity of sentiment analysis. To include pictures and other parts in your sentiment analysis, you’ll have to use Deep Learning. Make sure that you remove all the duplicate characters and typos from your data. Data cleaning is vital to get the best results possible.
After cleaning the data, you can use the Naive Bayes Classifier for analyzing the dataset available. Finally, you’ll have to test your model and see if it’s producing the desired results or not.
As you may have realized, this project will take some effort. But performing sentiment analysis on Twitter is a great way to test your knowledge of this subject. It’ll be a great addition to your portfolio (or CV) as well.
Read more: Sentiment Analysis Using Python: A Hands-on Guide
4. Reviews of Scientific Papers
If you’re interested in using knowledge of machine learning and data science for research purposes, then this project is perfect for you. You can perform sentiment analysis on reviews of scientific papers and understand what leading experts think about a particular topic. Such a finding can help you research them accordingly.
Here’s the dataset so you can get started on this project: Machine Learning Dataset. The dataset we’ve shared here has N = 405 instances. And it’s stored in JSON format. Working on this project will make you familiar with the applications of machine learning in scientific research. The dataset has some reviews in Spanish and some in English.
5. Analyze IMDb Reviews
IMDb is an entertainment review website where people leave their opinions on different movies and shows. You can perform sentiment analysis on the reviews present there as well. Just like the Rotten Tomatoes project we discussed previously, this one will help you learn about the applications of data science and machine learning in the entertainment industry.
Reviews of shows and movies help production companies in understanding why their title failed (or succeeded).
The dataset for this project is quite old and small. But it’s an excellent way for a beginner to test his/her skills on a new dataset. Here’s a link to the dataset: IMDb reviews dataset.
6. Analyze a Company’s Reputation (News + Social Media)
You can pick a company you like and perform a detailed sentiment analysis on it. You can also choose a trending topic and cover it in your sentiment analysis for a more precise result. We can discuss the example of Uber here. They are one of the most prominent startups in the world and have a global customer base. You can perform a sentiment analysis to understand public opinion on this company.
To find the public opinion on Uber, we’ll first start by getting data from the relevant sources, which in this case are Uber’s Facebook page and Twitter page. By analyzing the conversations between the users there, we can figure out the overall brand perception in the market. You’ll need categories to separate different datasets. In this example, you can use Payment, Service, Cancel, Safety, and Price.
Now that we know what we want to work on and where we have to go, we can get started.
Sentiment Analysis on Facebook
We’ll first begin with their Facebook page. It has more than 30,000 comments, and after we perform the analysis under the categories we mentioned previously (Payment, Service, Cancel, Safety, and Price) we found that most of the positive comments were about the Price section. On the other hand, the category with the highest percentage of negative feedback was service. However, while performing this analysis, we also kept in mind that Facebook’s comments are filled with spam, suggestions, news, and various other pieces of information.
For sentiment analysis, we only have to look at opinions.
So, we removed all the unnecessary categories, and as expected, our results changed. Now, negative comments held a majority in all sections, and their ratio in respective categories changed. In Price related comments, the percentage of negative comments rose by 20%.
That’s why it’s essential to perform data cleaning. It helps you get accurate results.
Sentiment Analysis on Twitter
We’ve already discussed the sentiment analysis of tweets in this article. So we’ll follow a similar approach here and analyze people’s tweets where they tag Uber or reply to their tweets. Here, the category with the highest percentage of positive tweets was Payment, and the second-highest was Safety. This also shows how different social media give different results.
However, we would have to perform data cleaning here as well. For that purpose, we’ll remove tweets with unrelated intent (spam, news, marketing, etc.). You’d notice how much the percentage of different categories changes here too.
In our case, Payment saw a decline of 12% in its share of positive tweets and Safety became the category with the highest percentage of positive responses. Apart from that, Safety lost around 2-4% in its share of positive tweets. With this data, you can also find out what are the most popular topics among people when they talk about Uber on these platforms.
So, on Twitter, we found that the most popular categories were payment, Cancel, and service.
You should know that brands take this data very seriously. It helps them figure out what problems they need to work on and how they can solve the same. These tweets are, after all, feedback of customers. In this case, Uber can use the findings of these tweets to understand which parts of its services have faults and how they can fix them.
Sentiment Analysis of News
To understand the public opinion on any organization, you’ll have to analyze the news about it as well. In our example, we’ll check the news articles about Uber. After we analyze the content present in those news articles, we’ll segregate our findings in the categories mentioned above (Payment, Service, Cancel, Safety, and Price).
Apart from that, we’ll also classify different articles according to their popularity. The more popular an article is, the more it’ll affect public opinion. You can measure the popularity of every article according to the number of shares they have. A column with higher shares would undoubtedly be more popular than one with fewer shares.
The Results
In our example, we looked at Uber and the public opinion on this company. After we’ve analyzed Facebook, Twitter, and news, we’d know whether the general sentiment on Uber is positive, negative, or neutral.
You can follow this approach to create sentiment project analysis ideas. You can start with a small company that doesn’t have a high online presence and performs sentiment analysis on multiple channels to understand if it’s perceived positively or negatively. If you want to increase the challenge, you can make it more complicated and perform analysis for a major company (like we did in our example).
Also Read: Top 4 Data Analytics Project Ideas: Beginner to Expert Level
Final Thoughts
Sentiment Analysis is an essential topic in machine learning. It has numerous applications in multiple fields. If you want to learn more about this topic, then you can head to our blog and find many new resources.
On the other hand, if you want to get a comprehensive and structured learning experience, also if you’re interested to learn more about machine learning, check out IIIT-B & upGrad’s Executive PG Programme in Machine Learning & AI which is designed for working professionals and offers 450+ hours of rigorous training, 30+ case studies & assignments, IIIT-B Alumni status, 5+ practical hands-on capstone projects & job assistance with top firms.
What problems does sentiment analysis solve?
Sentiment analysis is becoming a crucial tool for monitoring and understanding client sentiment as they share their opinions and emotions more openly than ever before. Brands can know what makes clients satisfied or frustrated by automatically evaluating customer feedback, such as comments in survey replies and social media dialogues. This allows them to customize products and services to match their customers' demands. For example, employing sentiment analysis to examine 4,000+ surveys about your business could help you figure out if customers like your pricing and customer service.
What are the challenges of sentiment analysis?
Even humans struggle to effectively interpret sentiments, making sentiment analysis one of the most difficult tasks in nlp. Every utterance is made at some moment in time, in some location, by and to some people, and so on. All statements are made in context. People convey their negative attitudes using positive phrases in irony and sarcasm, which can be difficult for robots to recognize without a detailed knowledge of the situation in which an emotion was expressed. Another difficulty worth tackling in sentiment analysis is how to handle comparisons. Another issue to overcome in order to undertake effective sentiment analysis is defining what we mean by neutral.
How can you increase the accuracy of a sentiment analysis?
When working on a classification problem, it's critical to pick the test and training corpora wisely. Domain knowledge is required for a set of features to act in the classification process. In most data science situations, using a classification method on a cleaned corpora rather than a noisy corpus is advised. Keywords that appear infrequently in the corpus do not usually have a role in text classification. These infrequent characteristics can be removed, resulting in improved model performance. It's generally a good idea to reduce terms to their simplest versions. Lemmatization is the name for this method.
Lead the AI Driven Technological Revolution
Leave a comment
Your email address will not be published.
Let’s do it!
No, thanks. |
Home>Attractions>Mount Everest
Mount Everest
Mount Everest
A Brief Introduction to Mount Everest
Mount Everest is the highest mountain on earth with a height of 8844.43 meters above the sea level. It is located at the boarder between People's Republic of China and Nepal. In Tibetan, the mountain is called "Qomolangma". The word "Qomo" means goddess and "Langma" means the third one, for there are another four mountains near Mount Everest and Mount Everest ranks the third. Covered with white snow all the year round, Mount Everest is the most impressive and magnificent mountain in both China and the world.
Origin of Mount Everest
In fact, mountains are not just big piles of dirt, they are made of solid rock. The rocks that make up the Mount Everest used to be an ancient sea floor. Over millions of years, rivers washed rocks and soil from existing mountain on the Indian subcontinent and nearby Asia into a shallow sea where the sediment was deposited on the floor. Layer upon layer of sediment built up over millions of years until the pressure and weight of the overlying sediment caused the stuff way down deep to turn into rock. Then about 40 million years ago, in a process called "uplifting", the sea floor began to be forced upward, thus forming many mountains including the Mount Everest.
Ascents of Mount Everest
As the highest mountain in the world, Mount Everest attracts many well-experienced mountaineers as well as novice climbers who are willing to pay substantial sums to professional mountain guides to complete a successful climb. The mountain, while not posing substantial technical climbing difficulty on the standard route, still has many inherent dangers such as altitude sickness, weather and wind. Therefore, you had better think twice if you are about to climb Mount Everest.
The First Successful Ascent of Mount Everest
In 1953, a ninth British expedition, led by John Hunt, returned to Nepal. Hunt selected two climbing pairs to attempt to reach the summit. The first pair (Tom Bourdillon and Charles Evans) came within 100m (300 feet) of the summit on May 26th 1953, but went back after becoming exhausted. As planned, their work in route finding and breaking trail and their catches of extra oxygen were of great aid to the following pair. Two days later, the expedition made its second and final assault on the summit with its second climbing pair, the New Zealander Edmund Hillary and Tenzing Norgay, a Nepali sherpa climber. They reached the summit at 11:30 a.m. local time on May 29th 1953 via the South Col Route. At the time, both of them acknowledged it as a team effort by the whole expedition, but Tenzing revealed a few years later that Hillary had put his foot on the summit first. They paused at the summit to take photographs and buried a few sweets and a small cross in the snow before descending.
Flora and Fauna on Mount Eerest
Euophrys omnisuperstes, a minute black jumping spider, has been found at elevations as high as 6,700 meters (22,000 feet), possibly making it the highest confirmed non-microscopic permanent resident on Earth. It lurks in crevices and may feed on frozen insects that have been blown there by the wind. It should be noted that there is a high likelihood of microscopic life at even higher altitudes. Birds, such as the Bar-headed Goose, have been seen flying at the higher altitudes of the mountain, while others, such as the Chough, have been spotted as high as the South Col (7,920 meters) scavenging on food, or even corpses, left by prior climbing expeditions.
Board and Lodging of Mount Everest
Rongpo Monastery near the Base Camp of Mount Everest is the only place that provides visitors board and lodging. Taking up in the monastery makes it easy for enjoying the sceneries of the morning and evening.
Base Camp of Mount Everest
Climbing Routes of Mount Everest
Mt. Everest has two main climbing routes, the southeast ridge from Nepal and the northeast ridge from Tibet. There are also many other less frequently climbed routes. Of the two main routes, the southeast ridge is technically easier and is the more frequently used route. It was the route used by Edmund Hillary and Tenzing Norgay in 1953 and the first recognized of fifteen routes to the top by 1996.
Best Time for Mount Everest
The climate in Mount Everest area is variable. By and large, it is the rainy season of this area from June to September. During this period, the strong southeastern monsoon leads to frequent rainstorms and hailstorms. From the middle November to February in the second year, influenced by the fierce northwest cold current, the temperature can fall as low as -60℃ with the average temperature of -50℃ to -40℃ and a wind speed of 90 meters per second. Therefore, from March to May and from the early September to the late October in each year are the best time for climbing the mountain because of the good whether. |
Golden Gate Bridge
Golden Gate Bridge
The American Society of Civil Engineers voted the Golden Gate Bridge one of the Modern Wonders of the World. It remains the second longest suspension bridge main span in the United States. For its beauty and charm, the Golden Gate Bridge is one of the most frequently photographed bridges in the world.
Prior to the Golden Gate Bridge, residents commuted between San Francisco and Marin County by ferry boats. Ferry services began transporting customers around 1820. Over 100 years later, the Golden Gate Ferry Company had become one of the largest ferry operations in the world. Customers were charged $1.00 per vehicle per trip. A bridge was needed to keep pace with the growing metropolis of San Francisco.
photo by: Nicolas Raymond ©
The Golden Gate Bridge was officially named when state legislature passed the Golden Gate Bridge and Highway District Act in 1923.
Joseph Strauss, the original designer, said his project could be completed for $17 million dollars, relatively inexpensive to his closest competitor. Although he was the chief engineer for the project, he was very little experience with suspension bridges, so he relied heavily on other engineering and architectural experts. Leon Moisseiff, the designer of the Manhattan Bridge also put his mark on the Golden Gate Bridge by designing the flow of the cable suspension. Irving Morrow is credited with designing the two towers on each side of the bay, as well as much of the visual effects of the bridge. The International Orange color was originally used as a sealant, but residents preferred the orange color to the normal grays, so they requested the bridge continue to be painted the orange color.
Construction on the Golden Gate Bridge commenced on January 5, 1933 and concluded on April 19, 1937. The bridge officially opened on May 27, 1937. The south bound lane does collect tolls for vehicles entering the bridge.
The project had been estimated to cost over $36 million dollars, but the actual cost of the bridge was a little over $35 million dollars. The Golden Gate Bridge is over 746 feet tall and 91 feet wide. It spans the San Francisco Bay at 8,981 feet, a little over a mile and a half. The longest span in the bridge is 4,200 feet long. The bridge is a suspension bridge design with truss arches and truss causeways. Each of the main cables is constructed of 27,572 strands of wire.
The Golden Gate Bridge can carry up to 6 lanes of traffic, including pedestrians and bicyclists. Passenger car traffic estimates approximately 118,000 cars cross the Golden Gate Bridge each day.
quick facts & figures
Construction Start: January 5, 1933
Construction Ended: April 19, 1937
Year Opened: 1937
Tolls: Southbound Lane
Designer: Joseph Strauss
Color: International Orange
Height: 746′
Width: 91′
Length: 8,981′
Total Cable: 27,572 Strands
Total Lanes: 6
Daily Traffic: 118,000 |
Friday, January 15, 2016
Can We Survive the Death of the Sun?
Today on Far Future Horizons we join veteran actor Morgan Freeman in an outstanding episode of the acclaimed Science Channel documentary series “Through the Wormhole” which explores the question - Can We Survive the Death of the Sun?
The focus of this installment of Through the Wormhole is the survival of humanity (or whatever we evolve to become) into the far distant future, as measured on geological and cosmological timescales, by developing the technology to move to another planet, a new "Earth" or star system in order to survive the death of our central star, The Sun.
The Sun becomes a Red Giant
We are all at the mercy of the Sun. It's glowing disc sustains nearly all life on Earth. But the Sun also holds a dark secret: someday, our aging, expanding star will bathe the Earth in a fiery holocaust. Everything we know will turn to hot, bubbling, plasma.
Terraformed Mars
The Sun holds a dark secret: it will someday bathe us in a fiery, planetary holocaust. How will we survive the death of our star? The technology to move our entire civilization to Mars sounds like sci-fi, but it is almost within our grasp. Reaching a second Earth across the galaxy could be possible thanks to a radical new propulsion technology from man made black holes.
This episode of Through the Wormhole is available from Amazon Books.
Through the Wormhole - Can We Survive the Death of the Sun?
through.the.wormhole.s04e03.can.we.survive.the... by HDDocumentary
Copyright Disclaimer
1 comment:
1. Humans won't survive climate change, so 4 billion years into the future? Nope. |
Skip to Main Content
IDST110 Fall 2021 (Anderson)
Before You Start...
Student sitting at desk thinking
Take a few moments to actually sit down and spend time thinking and writing about your topic.
Ask yourself questions like:
• What do I already know about this topic?
• What don't I know?
• What do I assume?
• What questions do I want to answer?
• What do I want to say?
Once you've done that, go back and review what you've written and look for keywords, ideas, and themes to help start your searching.
How to Use This Guide
Use the menu to navigate to resources to help you with your research for your IDST text set. Although the library has a ton of great resources to choose from, your librarian has chosen a selection of the best tools they think are appropriate for your paper. this includes library databases, resources for books and ebooks, reference books for background information and support, and other resources they think might be useful. You will also find Evaluation resources.
If you need help at any point, you can chat with a CSM Librarian, reach out to your IDST librarian for help, or schedule an appointment with any of our qualified CSM librarians.
Make a Research Roadmap
1. Brainstorm
• Think about topics, make notes, look for recurring themes, look for what interests you. Write it all down.
2. Outline
• Sketch out an outline of what you hope to say and find. What major points do you want to touch on? Write it down.
3. Points of Entry
• Think about where this information exists. Who is creating it? How are people talking about your topic? Where can you find it? Write it down.
4. Select Your Tools
• Go to the tools you think are best suited for what you need and start searching.
5. Persevere
• Don't be discouraged if you have to rewrite things, change your outline, or adjust your topic. It's all part of the research process.
6. Present
• Gather and organize your resources and go to work! |
Cyber Security and Emerging Threats Sandra Song
Aircraft Hijackings: Balancing State Security vs. Human Dignity
On the morning of 11 September 2001, four commercial airliners were hijacked and used as weapons for suicide attacks. In the wake of the attacks, some countries have enacted policies allowing a hijacked passenger aircraft to be shot down should it be necessary. This has left these states with the ethical dilemma of deciding which is more important- state security or human dignity. Of the many states facing this concern, Germany has demonstrated to be one of the few to consciously adhere to its Basic Law, striving to balance state security and human dignity.
Germany’s Constitutional Balance
In a new security-oriented paradigm, former Federal President Horst Köhler reluctantly signed Germany’s Aviation Security Act in June 2004, which came into effect on 15 January 2005. This legislation would allow the Bundeswehr (German armed forces) to take down a hijacked aircraft if it were to be used against the life of others. On 15 February 2006, the German Federal Constitutional Court (FCC) deemed the provision of the Aviation Security Act unconstitutional because it was incompatible with Germany’s Basic Law.
A Tornado of the German Air Force.
The FCC declared that sacrificing a small number of innocent lives for the greater good could not be justified. This would violate the human dignity clause in Article 1(1) of the German Constitution, which states, “Human dignity shall be inviolable. To respect and protect it shall be the duty of all state authority.” If a hijacked aircraft were shot down, that would subordinate human dignity by treating it as a quantifiable entity. It converts people into things, subsequently delegalizing them. This correspondingly violates Article 2(2) which articulates, “Every person shall have the right to life and physical integrity. Freedom of the person shall be inviolable. These rights may be interfered with only pursuant to a law.” For this reason, human beings cannot be unlawfully killed by another human, indicating that national security concerns do not supersede the life of individuals.
It is worthwhile to understand how Germany’s administrative security framework operates. The federal government, being in charge of the military, has the authority to shoot down an aircraft in military combat. This is for defence purposes only, and it is to ensure Germany’s state security beyond its borders. Federal states are responsible for police powers. The prevention of potential attacks in Germany thus would be in the jurisdiction of the states. The federal government can assist states in exceptionally grave situations, but they cannot use military powers for domestic purposes. If the federal government were to lend its assistance, it could only do so using the same powers that the police are allowed. If there were ever a case where Germany was attacked, it has the means to protect itself and to respond efficiently, but it would typically be after an attack since the country is against making the first strike. The way that Germany aims to prevent threats against potential terrorist attacks is by providing intensive security checks in high-traffic risk-prone areas, and to reduce the causes of terrorism. The country plans to do this by taking part in missions that promote international peace, build, and maintain order.
The only instance where the Aviation Security Act would be compatible with Germany’s Basic Law would be an aircraft with no hostages on board. Even though the hijackers are human, they are regarded as persons intentionally acting against the Basic Law; therefore they are not treated the same way as individuals with dignity or the right to liberty.
Tipping the Scale: National Security over Life
After 9/11, policymakers everywhere sensed an obligation to tighten defence measures to ensure a certain standard of security. Some states saw the downing of a hijacked commercial airliner to be a countermeasure if clearing the situation was not feasible. In this case, the loss of a hundred lives would be a small sacrifice to save the lives of many more.
In the hours following the attacks on the World Trade Center and the Pentagon, former US Vice President Dick Cheney authorized the downing of any further passenger aircrafts that may have been compromised. The US viewed the hijacked planes as weapons that needed to be restrained from causing greater damage. Within a few short years, US fighter pilots have been prepared to strike commercial aircrafts in the event that a similar terrorist attack would take place. The US may be training its Air Force to handle potential hijackings, but there is no official policy equivalent to Germany’s Aviation Security Act. US Air Force General Ralph Eberhart explained that the fighter pilots practice as often as four times a week, and they undergo extensive psychological evaluations to handle taking down a plane. The General assures that shooting down a suspicious passenger airliner would only be used as a last resort. “If we don’t do this, innocent people on the ground are going to die.”
There are other states that have followed a similar path as the US to prevent such attacks, namely the Czech Republic, France, Hungary, Italy, Russia, and the UK. India is an example of a state that firmly adopted an anti-hijack policy in August 2005. This would allow the Indian Air Force to shoot down a hijacked aircraft so long as there is conclusive evidence that the plane is going to be used as a missile. The policy rules out negotiations with hijackers on their demands; which makes it clear that talks would only be used for the purpose of preventing the loss of life or putting an end to the incident. If the Air Force believes they can prevent shooting a civilian airliner, it is authorized to guard and guide the aircraft and force landing at an Indian airport. Appropriately, all efforts would be made to immobilize the plane from taking off again.
After 9/11, all commercial airliners were given instructions to return to their original take-off location. For the en route flights that did not have enough fuel to return, they were asked to land at the nearest Canadian airport until critical details were sorted out. A Korean Air flight heading to Anchorage, Alaska gave authorities reason to believe that the plane had been hijacked. NORAD was prepared to shoot down the plane in Anchorage. Instead of putting more people at risk in a populated area, NORAD received permission from former Canadian Prime Minister Jean Chrétien to direct the plane to Whitehorse, Yukon. Prime Minister Chrétien also gave instructions to shoot the potentially hijacked airliner if it would threaten any Canadian cities. Canada’s response to hijacked aircrafts is similar to many other countries, although there is no definite policy on how to respond to future hijackings. Over a decade ago, Canada was willing to down a hijacked aircraft. This could be taken as evidence that Canada is willing to sacrifice a few lives in order to preserve the lives of many.
In comparison to the listed states, Poland has presented an interesting case. In January 2005, a new law was passed that gave Polish authorities the power to order a hijacked airliner to be shot down. Civilian and military aircraft could be shot down if its hijackers refused to land. This law was in effect until September 2008. Poland eventually came to the decision that the regulation of downing a hijacked aircraft was unconstitutional. There is no definite evidence proving that Poland was influenced by its neighbour, Germany. Regardless, Warsaw made the conscientious effort to appropriately balance state security with the fundamental rights of human life.
Teetering for Equilibrium
Germany has been an exemplary case of attempting to find that tricky balance between state security and human dignity. It may be criticized for placing individual human life above the security of the masses. Germany’s government and Constitution have been influenced by its historical experience of totalitarianism. This explains why it has particular constitutional limitations that will not allow a hijacked aircraft with innocent people to be materialized as an inanimate weapon. The FCC treats state security as only one of many competing constitutional values as opposed to an absolute value. In the Constitution, state security is not something that can be guaranteed at a cost. Germany can teach other states from its experience with the struggle to respect constitutional commitments to human dignity while maintaining state security.
In the words of Germany’s former Federal Constitutional Court President Jutta Limbach, “Blind revenge and hate only bring self-destruction. If the civilized world hopes to be victorious it cannot allow itself to compromise its respect for its fundamental values. Especially the recognition of the dignity and freedom of humankind distinguishes democracy from totalitarian ideologies. Human dignity and human rights know no weapons; rather, only citizens who make the observation of human dignity and human rights an obligation.”
9/11 has changed the way state officials manage multi-level defence policies. There is now an additional variable involving the value of a human life. There is no correct way to address the moral and practical issues of downing a hijacked commercial aircraft. It eventually comes down to the way in which an individual state values national security and human dignity.
Sandra Song
Sandra is a Research Analyst at the NATO Association of Canada. She was the former Editor for the Canadian Armed Forces program, and she was previously a Junior Research Fellow for the Strategic Reserve Program in 2013. Sandra has a BA Bilingual Hons. in International Studies from Glendon College, York University. She recently completed her MA in International Conflict & Security at the University of Kent, Brussels School of International Studies. Her dissertation examined the political and legal perspectives of balancing security and liberty in the case of civilian aircraft hijackings that would be used as a weapon for terrorism. Prior to her time at the NAOC, Sandra was contracted as an Ocean Energy Plan Project Consultant for a non-profit organization in Belgium and the Netherlands. |
By Amy Leather
Downloading PDF. Please wait... Issue 395
How big oil is fracking to climate disaster
This article is over 7 years, 3 months old
Hydraulic fracturing has rescued the oil and gas industry, producing huge profits and cutting dependence on crude. But the price to be paid will be huge.
Issue 395
Fracking site in the US
In the past few years a new word has entered our lives: “fracking”. This is a method of extracting gas and oil from rocks. It originated in the US, where it was seen as the biggest energy development in decades, and is now coming to Britain. Although only in its exploratory stages here, it has already caused controversy and protests.
While David Cameron and the Tories have made it clear they are in favour of it, for many environmental campaigners the word “fracking” conjures up all that is wrong with energy policy and the failure to deal with climate change. Its supporters have made massive claims as to the benefits of fracking and it has been heralded as the solution to the world’s future energy needs.
Since the 1980s there has been a growing debate about something called “peak oil”. This is often caricatured as an argument between those who say we are running out of oil and those who say we are not. In fact the problem is not whether there is any oil left in the ground. There is. The problem is accessing it physically and at prices people are willing to pay.
Peak oil has always been about timing — not that oil would suddenly run out, but that the era of cheap oil and expanding production is coming to an end.
Fracking is also presented as a solution to climate change because its products, shale gas and tight oil, are cleaner than coal and so will help reduce carbon emissions. But shale gas and tight oil are still fossil fuels. Burning them contributes further to global warming.
The fracking process causes huge immediate environmental problems. It requires enormous quantities of water to blast the shale rocks. Sourcing the water is a problem, as is getting it to the drilling area. It has been estimated that a single well pad cluster may require more than 60 million gallons of water in its short lifetime.
Moving the equipment, water and chemicals for one well can generate between 1,800 and 2,600 lorry trips, with the knock-on effects of road use, noise and air pollution. Then there is the problem of what to do with the waste water which contains a cocktail of chemicals.
There is the risk of contaminating water tables. Although fracking wells are isolated by cemented steel well casings, these have been shown to leak. The cocktail of chemicals has caused contamination of ground water at sites in the US and can cause chemicals to leak into drinking water, even making it flammable.
Fracking has caused earthquakes. In Britain Cuadrilla Resources had to suspend its first test drilling after fluid was blasted into a previously unknown faultline.
Scientists agree that we need to avoid an average temperature increase of 2˚C above pre-industrial levels. It may seem a relatively minor change but this increase would have an enormous impact on the global climate. The worry is that a 2˚C rise is a tipping point, beyond which there is no return.
Some people claim that shale gas is a “transition fuel”, a stop-gap measure while the world makes the transition to renewable energy sources. However, although less carbon dioxide is produced, the process of fracking leaks methane gas. Methane is another greenhouse gas but is up to 100 times more damaging than carbon dioxide. New research has found that methane leaks from fracking are three times greater than forecast.
According to a study by the National Academy of Sciences, the US environment agency “significantly underestimated” the methane emissions from fracking by as much as 100 to 1,000 times. This means that life cycle greenhouse gas emissions from shale gas are 20 percent to 100 percent higher than those from coal on a 20-year time frame.
Meanwhile the US coal industry, faced with competition from the cheap gas, has increased its exports to China. The US power industry has replaced coal with gas produced from fracking in order to generate power. But recent research has shown that around half of the unused coal has been exported, contributing to global climate change.
It is no surprise that fracking companies have faced protests. New York State has a moratorium on fracking and four cities in Colorado have voted to ban it. As the industry starts carrying out surveys and exploratory drilling in Britain, it has faced opposition here too with anti-fracking camps, such as those at Balcombe in West Sussex and Barton Moss in Greater Manchester.
But the Tories want to press on. Cameron, who once pledged his would be the “greenest” government ever, said he wants to “go all out” for shale gas. Chancellor George Osborne promised that Britain would be “at the forefront of exploiting shale gas…and we will make it happen”.
The Tories have cut subsidies for renewable energy and are encouraging the fracking industry by offering bribes to councils. They plan to make it easier to frack for shale gas under private land by changing the law so that trespass laws no longer apply.
Many areas of Britain are threatened. Dozens or even hundreds of wells will need to be built within a few square kilometres. This is much easier in the US where there are big tracts of land as well as an existing infrastructure for onshore drilling. In Britain the shales are far closer to the major population centres.
So an average of 96 people live in each square mile of the key fracking state of Texas, and just 10 in North Dakota, but in the affected parts of North West England the figure is over 1,300 people in each square mile.
Above all else fracking flies in the face of the scientific consensus that to avoid catastrophic global warming we need to leave the vast majority of fossil fuel reserves underground.
Fracking is only one of a number of what are termed “extreme energies” currently being pursued. Others include extracting oil from the tar sands or deep water drilling miles beneath the ocean’s surface.
These resources are of low quality, harder to extract and much dirtier than previous sources. They incur far higher production costs and greater environmental risks and have only become viable because of the high price of oil and recent technological developments.
Capitalism requires huge quantities of energy. Coal drove the industrial revolution for over 200 years. But the 20th century was the century of oil. A barrel of oil contains the energy equivalent of 23,000 hours of human labour. Up until the year 2000 the price of oil (adjusted for inflation) averaged just £12 per barrel in most years.
Industrial capitalist economies were founded on this cheap fossil energy. Oil remains crucial for modern industrial life as we know it. In 1900 the world produced 150 million barrels of oil. In 2000 the figure was 28 billion barrels. By 2006 31 billion barrels were pumped out. In 2009 the US alone consumed nearly 19 million barrels of oil a day, 22 percent of total oil globally.
There are two consequences of this enormous reliance on oil. The first is that the quest to get access to, protect and find new sources of fossil fuels, especially oil, is a major preoccupation of modern states — and particularly shapes their foreign policies.
The second is that modern capitalism has become entwined with the growth of the fossil fuel economy; there are historic investments in the current energy infrastructure.
This has major implications for future energy use. There are enormous vested interests in pursuing more extreme sources of fossil fuels rather than making the change to renewables. In 2011 seven out of the top 20 public companies were oil giants with combined assets of over £1,000bn. This gives them enormous political and economic power.
Since the 1990s the US government, oil corporations and energy analysts have become more and more concerned about the end of cheap oil. In April 1998 for the first time the US imported more than 50 percent of its oil, and in the year 2000 there were blackouts as demand exceeded capacity.
A number of reports were commissioned by the US government. A key one was the National Energy Policy (NEP) of 2001, which was put under the direction of Vice President Dick Cheney, a former chief executive of oil services company Halliburton, as well as the vice chairman of the energy company Enron together with many of their consultants.
These people represent the vested interests of the oil corporations with the aim of ensuring that fossil fuels remained central to energy policies. The report concluded that energy production would have to increase in the Persian Gulf to meet the world’s energy needs, in particular Iraqi oil production.
It is worth noting, however, that relatively little of the US’s imported crude oil comes from the Middle East. In 2012 most of its oil came from Canada, Saudi Arabia, Mexico, Venezuela and Nigeria.
By 2008, five years after the invasion, Iraqi production had fallen below its 2001 level, and there was stagnation on a world scale. Oil prices soared, hitting nearly £92 a barrel in the summer of 2008. These shortfalls combined with high prices were an incentive for drillers to refine and deploy the costly hydraulic fracturing technology to extract the gas trapped in forbidding shale reservoirs.
The result is a fossil fuel boom in the US. Natural gas production is now higher than at any point in US history. Shale gas makes up 40 percent of its total gas production, and prices have now fallen. Domestic oil production has also soared.
The use of fracking has led many commentators to conclude they were wrong about peak oil. Instead they now claim that the “shale revolution” will secure long-term supplies.
However, as Richard Heinberg points out in his book Snake Oil: How Fracking’s False Promise of Plenty Imperils our Future, all the evidence suggests that its success will be short-lived.
Heinberg shows that shale gas and shale oil wells deplete quickly. Production typically declines 80 to 95 percent in the first three years of operation. In order to maintain current production, 7,200 new wells would be needed each year. That would mean drilling on an unprecedented scale.
Although there are vast deposits of tar sands, deepwater oil, oil shales, coal bed methane and other non-conventional fossil fuel resources, their exploration needs such enormous expenditure that increasing production to desired levels is difficult.
Geoscientist David Hughes, who worked for the Geological Survey of Canada for 32 years, predicted that “tight oil production in the US will peak between 2015 and 2017 followed by a steep decline”.
What has been created is a speculative boom, a bubble much the same as that which has hit the housing market. A land rush took place in the early years of the boom, when companies were leasing as much land as possible, as quickly as possible. The terms of the drilling leases required drilling sooner rather than later, even if that meant oversupplying the market.
Overproduction has led to lower prices that are now hurting the industry. Companies are facing declining profits. As Heinberg makes clear, the creative financing engineered by investment banks such as Goldman Sachs has forced drillers to keep drilling even when each new well is run at a loss.
So if fracking won’t solve our energy needs what will? There needs to be a rapid switch from fossil fuel-based energy generation to the use of renewables. In addition there needs to be a massive increase in energy efficiency and, at the same time, a programme of action to reduce emissions from industry and transport. All the studies show that if these were done we could meet the targets set by scientists to prevent catastrophic climate change. But it requires both money and political will.
Our future energy needs cannot be left to the markets. And this is where we have to go back to how the whole system is organised. The short-termism of capitalism, competition and the drive for profit, and the fact that governments are not prepared to break from the vested interests of the fossil fuel industry, present considerable obstacles to tackling climate change.
Over the past 20 years the climate movements have shifted their focus from the demand side and individual behaviour to the supply side with a focus on industries and corporations. The battle to halt climate change is one that has to take on the whole system, one that must break from the short-termism of profit, the chaos of the market and the irrationality of fossil fuels, including those from fracking.
What is fracking?
Hydraulic Fracturing, or fracking, is a method of extracting natural gas trapped deep in the ground in tiny spaces in rocks.
Very high pressure fluids are pumped into the rock, fracturing it and releasing the gas which can then be captured.
This technique was boosted by technology that allowed horizontal drilling that guides wells down into the ground for a kilometre and then bending them to extend horizontally another kilometre.
The technology has enabled the industry to access previously inaccessible natural gas.
Sometimes the shale rocks that yield natural gas contain oil. Since there is already an entirely different resource called “oil shale” this is called “tight oil” rather than “shale oil”.
Sign up for our daily email update ‘Breakfast in Red’
Latest News
Make a donation to Socialist Worker
Help fund the resistance |
“I remember how much I used to love wearing my uniform as a kid. But when I got older, I started to feel more and more uncomfortable in it. Looking back, I realize it’s probably because of how much other people cared about how I looked in it, and how much effort I had to put into looking perfect to my friends, teachers, parents.” – Ritika*, an alumnus from a private school in Bengaluru.
“If you ask me, students are happy to wear their uniforms as long as it makes them feel respected. If they feel that the uniform does not allow them to feel like themselves, if they are not respected while wearing it, they will want to wear something else that they think will get them that respect, whether it’s from their friends or their teachers.” – Guna*, a teacher at a private school in Bengaluru.
No matter what schools we all went to, the one thing we can all relate to as students is the importance given to school uniforms. Uniforms are provided to students in public and private schools across India, with the intention of uniting students under the banners of their schools, irrespective of their socio-economic background. However, despite being markers of homogeneity, uniforms, as they exist today, tend to carry implicit codes of differentiation–especially along the axis of gender.
The majority of Indian schools, public or private, have different uniform sets for boys and girls. By extension, there is also a difference in how students are expected to present themselves in this gendered uniform, codified in the ‘dress code’.
How do dress codes operate?
Although the nature and extent of dress codes vary across different schools, an underlying constant is creating a separation between ‘boys’ and ‘girls’. More specifically, there is a distinction between the ‘masculine’ and ‘feminine’ norms that boys and girls are expected to respectively follow. Therefore, although the uniform intends to dissolve social differences in the classroom, dress coding becomes a tool to reinstate and conform to different social differences instead. It is well known that dress code policies across India tend to heavily police the dressing of girl students, from their hair down to their socks. Feminist authors have extensively written about the harmful effects that dress coding has on the mindset of the youth, in that it perpetuates misogynistic beliefs, sexualises schoolgirls, and reinforces the male gaze.
Yet, boys are not exempted from dress code policies either. In fact, former Teach for India fellows Shreya*, Esha*, and Khushi*, and a private school teacher, Guna*, recall that in their experience as teachers, they witnessed boys breaking the dress code more often, and being punished more harshly for it than girls were.
However, although the physical punishments for boys may be greater in school, one cannot deny that the extended social penalties for girls are equally harsh. Girls are not only subjected to the school dress codes, but also to the gender codes of their communities which are reemphasized through the school dress code.
Shreya, who taught at a government school in Hyderabad, recounts that the reason that the girls in her class were less likely to break the school dress code was because their parents took an active interest in their daughters’ dressing. “Sometimes the school would not be able to provide dupattas to all the students because of shortages in uniforms. But even the girls who didn’t have the school dupatta would come to school wearing one from their mothers’ set.” If not parents, teachers would step in. A student from a CBSE school in Bengaluru recalls that her teachers would often tell their students to wear a slip under their shirt.
Most of the time, such an attitude from parents and teachers is attributed to concern for the safety of their daughters/students, and protecting them from men. However, dress coding does not cease to exist in the absence of men, nor does it stop when students leave school. For example, in 2019 the administration at St. Francis College, an all-girls college in Hyderabad, came under fire for preventing women students from entering the college campus. Why? because their kurtis were shorter than the prescribed length, or had slits on the side, both of which were apparent hindrances to maintaining the standard of the college. Hence, both the arguments–that dress codes are only created to shield women from the male gaze and that dress codes are a mere extension of the uniform–fall apart.
Instead, it is clear that dress coding girls in school often becomes synonymous with blocking any avenue to outrightly ‘flaunt’ physical femininity (which is immediately sexualised), and instead channeling girls towards ideas of modesty, decency, and submissiveness.
What Effect Does Dress Coding Have On Students?
It is more likely then that girls are inclined to follow school dress codes because the schools’ expectations of how they should present themselves overlap with social expectations enforced by their families and communities. To violate a dress code in school also implies violating gendered social norms outside of it. And so, girls’ infringements of the dress code, if any, are usually with respect to their hairstyle, wearing makeup or nailpolish, and the size of their uniform–all of which are either unintentional, subtle, or reversible.
Conversely, teachers and students alike have observed that unlike girls, boys are more likely to intentionally break the dress code in an attempt to reject authority. However, boys also tend to be punished more severely for these infringements. This could take the form of authority figures calling them names, forcefully cutting their hair, or hitting them. Yet, despite these punishments, boys seem to take opportunities to break or find loopholes in the dress code in earnest.
In Esha’s school, “Boys are not allowed to wear jeans. So instead, they would get their trousers tailored in a way that it would taper off at the bottom to look like skinny-jeans.” Similarly, in Shreya’s school, “When boys are caught and punished for having their shirts tucked out, they would ensure to keep it tucked-in in front of the teacher but tuck it out again the moment they are out of sight.” According to teachers, boys relish breaking the dress code and presenting themselves as rebels against authority.
Interestingly, although boys revel in the glory of getting away with breaking dress codes, they feel that girls are not punished enough for similar infringements, such as wearing jewellery. Although breaking the dress code does not warrant the severe physical or verbal punishments inflicted on the boys, that their stance is not against the punishment itself, but against the lack of punishments for girls is telling. As Khushi says, “My students would not want to be punished for something as silly as having long hair. But the fact that they saw the girls not being punished for wearing earrings while they were punished for wearing studs was what made them feel that it was extremely unfair.”
This additionally illustrates the promotion of a crew-cut straitjacketed ideal masculine identity which represses any so-called ‘feminine’ tendency in boys. A lack of explanation for the same can also cause boys to internalise these ideals over time, and project them onto women without acknowledging the subtle social and moral-policing that goes into dress coding girls in schools and homes. Instead, they become another source of critique.
In any case, breaking the dress code for boys may often not take precedence over their academic performance or character–the same is largely untrue for girls. An alumna from a CBSE school recalls her teachers complaining more about her eyeliner than discussing her academic progress during a parent-teacher meeting. Similarly, Shloka*, a student from Coimbatore, says that in her school, girls were not allowed to participate in inter-school events if their dressing was not approved by the school.
Moving Forward
So, how can we redress these issues? Studies have shown that unisex uniforms and agender dress codes have significantly changed the dynamic between boys and girls in the classroom. While there is a decrease in the number of infringements of the dress code itself, there is also an increase in the students’ confidence to express themselves. Khushi recounts that in her school, once the sports uniform was made unisex (track pants and a t-shirt for all students, instead of a churidaar for girls), students became more active on the playground, boys and girls were more interactive with one another, and girls tended to be more outspoken on the days they wore the sports uniform.
Courtesy of Red Mi (CC BY SA-4.0)
Additionally, when students are not dress coded in school, there is more solidarity between students to call out discrimination outside the classroom. Shankar*, a college student says “I did not realise the extent of dress coding until I joined college and we didn’t have to follow uniform policies anymore. Until then, I didn’t even notice how much girls dressed according to what other people wanted. I didn’t even notice that about myself.”
The school uniform can only truly play a uniting role among students if the dress code does not play a divisive role based on gender norms, physically and mentally. Furthermore, in allowing students to dress in ways that transcend norms of masculinity and femininity, especially in their adolescent years, students will be able to overcome significant insecurities, while learning about discipline and professionalism in an environment that does not enforce it through punishment and policing.
Featured image courtesy of Rob Oo on Flickr (CC BY 2.0) | Names changed.
Please enter your comment!
Please enter your name here
|
22/09/16 Do You Know What A Hashtag Really Is?
meaning hashtag
The hashtag is a word or phrase preceded by the “#” sign. #Hashtags are a simple way to mark the topic (or topics) of social media messages and make them discoverable to people with shared interests. On most social networks, clicking a hashtag will reveal all the public and recently published messages that also contain that hashtag. Hashtags first emerged on Twitter as a user-created phenomenon and are now used on almost every other social media platform, including Facebook, Google+, Instagram, Vine and Pinterest.
This thing is called an octothorpe. |
View all topics
Back to CompTIA
The uses of AI inside and outside the factory
• 3 mths ago
Paul Calver, Chairman and CFO of The Data Analysis Bureau, examines how Artificial intelligence (AI) and machine learning (ML) are enhancing manufacturing operations across the board.
Manufacturers are resetting priorities around resilience, sustainability and operational excellence, and meeting the immediate challenges of securing supplies and recruiting workers.
AI and machine learning ML powered technologies are playing a vital part in accelerating manufacturers’ capabilities in these areas and achieving their goals to capture market share and remain globally competitive.
What is AI and ML? Artificial intelligence is the science and engineering of making intelligent machines, especially intelligent computer programs, and machine learning is a branch of AI which enables a machine to automatically learn, using data and algorithms, without explicitly programming, and can gradually improve its accuracy over time.
Manufacturers have been adopting physical technologies, such as robotics and automated machine tools, for many decades and have recently started to focus on additive manufacturing.
But as manufacturers become more aware of the power of data, many are turning to advanced data analytics, AI and ML, supported by IoT platforms, to leverage their key data assets. The adoption rate of these technologies is increasing rapidly.
A recent survey from The Manufacturer and IBM reported that 65 percent of manufacturing decision makers were working towards adoption, implementation or use of AI and ML.
This trend is set to accelerate with AI and ML in the manufacturing market expecting to grow at 57.2 percent CAGR over the next five years as manufacturers realise the low hanging opportunities enabled through data.
From our experience working closely with leading manufacturers across industry and as a successful recipient of an Innovate UK award to build a global predictive analytics service, we want to share with you a vision of AI and ML applications inside and outside the factory.
Continue reading:
Reply Oldest first
• Oldest first
• Newest first
• Active threads
• Popular
Like Follow
• 3 mths agoLast active
• 2Views
• 1 Following
Powered by Forumbee
View all topics |
Opt Ins And Outs
‘Opting-In’ is when you make a choice to be part of something. ‘Opting-Out’ is when someone volunteers you, and you must ask to get out of it.
Story: Dirty Dishes and Junk Mail
Have your parents ever asked you to clean up after dinner? That’s an “opt out” situation.
You can try to “opt out” by saying you have too much homework or are too tired, but that doesn’t always work.
A better scenario is if your parents ask for volunteers to clean up. Then if you say yes, you’re “opting-in.”
“Opt-in” situations are always better than “opt-outs,” because the person gets more of a choice (the word opt means ‘to make a choice’… from the Latin word optare or ‘desire’).
In business, good businesses use ‘opt-ins,’ for example asking if you want to follow them by email or social media.
Bad businesses snare you with opt-out traps like the junk mail that comes to your house, or the spam that comes to your email. They buy your address somewhere and just add you to their list without your permission.
Requesting a junk mail stop or ‘unsubscribing’ from email is a hassle and takes time, so many people don’t bother. They just look at the junk mail and maybe even buy something they didn’t ever want, from those bad companies.
Once you understand opt-ins and opt-outs, you’ll see them everywhere in life. Want to join a club at school? (opt-in) Forced to go on the family outing? (opt-out)
Successful people (and businesses) are usually respectful of other people and give them as many choices as possible. Everyone likes choices!
Comments are closed, but trackbacks and pingbacks are open. |
Search Website
Urdu: A Language of Unity
Urdu: A Language of Unity
رگوں میں دوڑتے پھرنے کے ہم نہیں قائل
جب آنکھ ہی سے نہ ٹپکا تو پھر لہو کیا ہے
This blood is not meant to just run meaninglessly through our veins,
If it does not drip from the eyes, what kind of blood is it?
Mirza Ghalib
Language is rooted in meaning. As human beings we carefully construct the words we speak. We order letters, organise our chosen words and form sentences that communicate our thoughts to each other. In other words, we are social beings. The power of language is often overlooked. The beauty of its richness forgotten. And it’s mastery in an age of emojis and symbols, non-existent. Peoples of a common language possess a deep bond, the ability to know and understand one another. The commonality of a language is indicative of the oneness of society, the hallmark of a civilisation and a bond between neighbours. Regardless of creed, age, lineage and nationality.
Seventy-four years ago, in what became one of the greatest mass migrations in history, neighbours separated in the name of religion. The end of the British Raj was a tumultuous process and the ghosts of the post-colonial world still linger in society today. In 1947 two nation states were formed: India and Pakistan, while the Indo- Pakistan war resulted in the liberation of Bangladesh in 1971. Indian society was a profoundly diverse one, with a rich history and a plethora of cultures. However, one of the many casualties of partition was language. The rise of linguistic nationalism in South Asia contributed to disrupting the unity and exacerbated divisions in society.
The prominent Pakistani Political scientist Eqbal Ahmad remarked:
‘’Urdu is not a Muslim nor a Hindu language. It developed in response to the necessity of two people to discover a common language. It developed out of an honest, genuine, meaningful, creative encounter between Islam and India. Out of that multicultural, multi-religious encounter, has developed a language that is our common heritage. We call it Urdu in Pakistan. It is called Hindustani in India.’’
As such the creation of the Urdu language was a product of the encounter between the rise of Islam and Indian society. The argument that Urdu is in fact a shared language of a plethora of cultures and traditions is also evident through its etymology. Although there is some disagreement, the Oxford dictionary reveals that the word Urdu comes from the Turkic word ‘ordu‘ meaning army. While, in Persian ‘zaban-i-urdu’ translates to the language of the camp. As the Muslim invasions began to occupy more territory in India, the Urdu language was formed and spread subsequently. As such, Urdu is a hybrid language, influenced by Hindi, Turkish, Arabic and Persian. Urdu is a testament to the desire of unity in Indian society despite its divergent cultures.
However, after the creation of Pakistan and East Pakistan (modern day Bangladesh) the problems of linguistic nationalism began to unfold. Pakistani nationalism led to Urdu being declared the lingua franca. The problems of such a move were that in East Pakistan, more than half of the country was Bengali speaking. The imposition of the Urdu language without the approval of the Bengali speaking population led to resistance. Bengali like Urdu, Eqbal Ahmad argues, was a developed language which people did not want to give up. Far from strengthening the unity, Pakistani nationalism, in this regard led to divisions being created through this approach.
On the other hand, Urdu began to be seen as a ‘Muslim’ language in India. As such, efforts were made to introduce more Sanskrit words into Urdu to counter this. However, the fact of the matter is, despite these claims even Indian society after partition has returned to their shared language. One explicit example is the fact that the predominant dialogues and songs in Bollywood movies are in fact all in Urdu. This demonstrates the desire of the revival of the Urdu language among countries that are now long divided.
Refugees escaping the partition often carried with them things to remember their homeland, stones, bricks, and soil. However, they always had with them their love for a language they spoke with their neighbours now separated. Lines and boundaries drawn were successful in dividing the countries but could not destroy the preservation of a language of unity, Urdu.
Leave a Reply
|
If you slowly become become deaf and blind
Ronald Pennings, MD, PhD, ENT consultant and Usher syndrome specialist
Slowly become both deaf and blind. It is hard to imagine. Still, this is reality for people suffering from Usher Syndrome. Usher Syndrome, actually what type of disorder is this? And much more important: is there a treatment for stopping or slowing down the process of becoming both deaf and blind?Ronald Pennings, MD, PhD, ENT consultant and Usher syndrome specialist of the national Usher Syndrome Expert Centre in Radboudumc Nijmegen, the Netherlands, tells about this and answers the most burning questions.
‘Usher Syndrome is a hereditary disorder which affects both hearing and eyesight. In principle, the loss of hearing is always congenital. As opposed to hearing, the eyesight is normal at birth, but this will deteriorate in the course of the years.
There are three different types of Usher Syndrome: types 1, 2 and 3. People suffering from type 1 are born completely deaf and they have a poor balance. This is because the organ of balance – which is connected with the cochlea – does not work. These children will develop their first problems with eyesight at the age of eight or ten. They find it more and more difficult to see in the dark, also called night-blindness. Subsequently – as they get older – their fields of vision narrow down and as a result they will see through a kind of tunnel at a certain moment. The things they can still see will eventually become less sharp. This means that the eyesight gradually deteriorates.’
People suffering from type 2 have a congenital loss of hearing for which hearing aids can be used. These people slowly lose their hearing. The first problems with the eyesight show around puberty, a bit later than with people suffering from Usher type 1. Their eyesight will gradually deteriorate as well. Finally, we also have Usher type 3, which is very rare in the Netherlands. This type is more progressive, so here the loss of hearing as well as the loss of eyesight can go very fast.’
What is the cause of Usher Syndrome?
‘It is a recessive hereditary disorder. Here both parents carry a fault (mutation) in one of the Usher genes without experiencing any trouble. These genes play a major role in the ears and eyes of people, making sure that we can hear and see well. We have two ‘copies’ of each gene. If one copy has a fault, you are carrier but you will not suffer from Usher, because you also have a normal copy. At the moment that both parents pass on their faulty copies of the gene to their child, the child will suffer from Usher Syndrome. In this case the child does not have a normal copy of this gene left.
The copy in which the fault is present will prevent the gene from properly producing its protein. This protein is important for both hearing and eyesight. If you have another good copy, you will have a normal protein on that side. At the moment that both copies are faulty, you will no longer produce a normal protein. When the proteins are not working well, there will be loss of hearing and deterioration of eyesight.’
How big is the change of developing Usher Syndrome?
‘The syndrome is rare, which makes the chance of a child suffering from Usher very small. A child with normal hearing has virtually no chance of Usher Syndrome. In case of congenital hardness of hearing this chance will be larger, about three to six percent. For each form of congenital loss of hearing it is advised to conduct a genetic test for the cause of this. This test can confirm Usher Syndrome, even if there are no problems with seeing yet. When both parents are carriers of a mutation in the same Usher gene, they have 25 percent chance of getting a child with the syndrome.”
How often does this occur?
‘We do not have any exact numbers, but we think that about 800 people suffer from Usher Syndrome in the Netherlands. So this really is a rare syndrome.’
How do people suffering from Usher Syndrome cope with the knowledge that they will slowly become both deaf and blind?
‘In very different ways and with ups and downs. You sometimes see people being seriously confronted with their impairments, as everything costs more energy. On the other hand, there are also periods in which they really try to make things work and make the most of their lives.
There is a lot of power behind this and that is the nice thing about this group of people. That they are still very active despite their impairments. This shows, for instance, in a foundation that have been set up by patients and their relatives, such as Stichting Ushersyndroom. This are a very active foundation that try to improve the lives of people suffering from Usher.’
Is there a treatment?
‘The deaf children suffering from type 1 can be given a cochlear implant. This is an implantable hearing aid with which we place an implant with an electrode in the cochlea. The implant converts sounds into an electric pulse, which then is passed on to the cochlea. After a rehabilitation process, people will be able to hear with this. This makes sure that these children instead of growing up as deaf children grow up as children with a hearing impairment, but they can go to a regular school. To type 2 applies that both children and adults can be rehabilitated with a hearing aid. Sometimes older people suffering from type 2 need a cochlear implant because of the progress of the loss of hearing.
So there is a lot we can do to improve the hearing with the current state of affairs. With respect to eyesight, however, there still really is a problem. Genetic therapies are being developed at this moment, but for this we need to know what is genetically going on. It is important to investigate this and to make a diagnosis based on this. By now, the first steps towards developing gene therapies for the three types have been taken. We are also working on a future treatment for type 2 in our laboratory. However, it will still take many years for a treatment to become available. For the time being, the objective of this study is to slow down or even stop the deterioration of the eyesight in particular.
At this moment, we do not expect that we will be able to give someone who has become blind his or her eyesight again. However, if we indeed manage to slow down or even stop the deterioration process, we have really achieved a lot for the younger patients. This is all still in the future. The first clinical trials have started and we have to wait for the results of these and whether they will lead to medicines for this group of people.’
What can people do themselves?
‘There are indications that exposure to intense (sun)light – also on cloudy days on which the light is intense – it is useful to wear a hat and sunglasses. This could partly protect against increasing damage of the retina. Another important thing is: people suffering from Usher should be careful with their ears, for instance at festivals, clubs or loud music. In these situations they’d better take off their hearing aids or not stand very close to the loudspeakers, although most people suffering from Usher Syndrome will sufficiently take this into account by themselves.’
Dr. Ronald Pennings is ENT specialist and otologist at Radboudumc in Nijmegen, the Netherlands. The Radboud University Medical Centre is an academic hospital and cooperates with the Radboud University of Nijmegen.
Source: Gezondheidsnet [Health net] and NU.nl
Do you have the diagnosis Usher syndrome and you want to know more?
The Usher Syndrome knowledge portal has been developed by and for people suffering from Usher Syndrome with the support of their social environments, physicians and scientists.. Stichting Ushersyndroom [The Usher Syndrome Foundation] makes this portal available and hopes that this will fulfil a need for information and knowledge that has existed among people suffering from Usher Syndrome and their families for many years. |
Whole Food
What Would You Like To Know?
Whole foods are as mother nature intended with the correct balance of fibre, vitamins and minerals
Whole foods are processed and refined as little as possible and are grown in a natural way without chemical pesticides or synthetic fertilisers
When consumed, they should resemble the original ‘whole’ food as closely as possible i.e. an entire apple as opposed to apple juice
What are Whole Foods?
Find out how even "healthy food", like an apple, can become unhealthy
“Whole foods“ are plant foods that are unprocessed and unrefined, or as little as possible.
Whole foods are nutrient dense so the words are often used interchangeably, however, I decided to dedicate a short section to whole foods as there is a subtle differentiation that deserves a mention.
The word “whole’, when used as an adjective,
means “in an unbroken or undamaged state;
in one piece’.
If I pluck an apple from a tree and hold it in my hand it would be in an unbroken state, it is a whole apple. If I decide to take the peel off the apple and put the flesh into a juicer in order to separate the liquid from the pulp. I now have three parts of the same fruit (peel, flesh and juice) and although everyone will agree that it is still an apple it most certainly is no longer whole.
If I take this one step further and decide to use the apple pulp in a cake that I am baking, I will no longer be able to separately identify the fruit once I’ve mixed it in with all the other ingredients.
In this example, I have shown that the more I process this fruit the less identifiable it is as an apple.
A fresh, organically grown juicy whole apple contains dietary fibre in its skin and core. About 10% of an apple is made up of carbohydrate and 4% of an apple is made up from a variety of vitamins and minerals. The rest of the apple, more than 80%, is water. A medium-sized eating apple contains about 40 calories; one Kilogram of fresh apples provides approximately 2100kJ of energy.
Excluding the peel and core of apples from the diet halves the amount of vitamin C and dietary fibre consumed, but makes very little difference to the sugar intake.
The significance of eating a whole apple versus one that is peeled and cored becomes clearer; especially with regards to the way in which it is digested and used for energy.
The apple peel is rich in insoluble fiber, and is particularly beneficial for bowel health and regularity. Insoluble fiber binds to water rather than dissolving in it, a quality that allows it to make stools larger, softer and easier to pass. It also promotes more frequent bowel movements by keeping material moving through the intestinal tract.
By consuming the fibre in the peel, you are also ensuring that the fruit sugar in the apple (fructose) is released slowly into the blood stream thus keeping your blood sugar stable and keeping you feeling fuller for longer.
"If I were to discard the peel and pulp and were to only drink the apple juice, I would be consuming as much sugar as a bar of dairy milk chocolate"
With almost seven teaspoons of sugar in a single serving, apple juice contains more than the recommended daily amount for adults who want to stay healthy.
Furthermore, fructose is metabolised entirely by the liver and is converted straight into fat if not immediately used to supply fuel for the body!
REFERENCE: http://www.dailymail.co.uk/health/article-2811041/Did-know-one-glass-apple-juice-SEVEN-teaspoons-sugar-healthy-fat-free-yogurt-contains-five.html#ixzz5DgogBpJq
Why juicing is not always good for you?
This leads me to my issue with the juicing fad, which has been promoted as a great way to detox and fast. From the example I have given you above, does this seem to make any sense?
Why would you remove all the beneficial pulp and fibre from a piece of fruit or a vegetable and only drink the juice? It’s ludicrous.
There are 54 grams of sugar in 500ml of Coke (if a teaspoon is 5 grams, there are 11 teaspoons in half a litre), compare that with the table above – despite the list being comprised of fruits and vegetables, do those numbers look healthy to you?
If you argue that you are getting healthy vitamins and minerals in fruit juice, I would suggest downing a multivitamin with a glass of coke, at least in that way you are consuming less sugar!
Mother nature knew what she was doing when she designed an apple – a perfect meal containing everything you need in ideal ratios. However, once you start dissecting the components, the parts are most certainly nowhere near as good for you as the whole.
This is what the pharmaceutical industry has done for ages – taken something natural and isolating the active compounds that are synthetically manufactured in a laboratory.
Take valium as an example. Scientists were able to isolate the active ingredient from the valerian root plant and chemically mimic its sedative property, however, the price of doing so meant that the man-made pills come with a list of side effects are as long as my arm!
However, if I chew on some valerian root, I will derive the same calming properties without the list of side effects.
This is because the delicate balance of compounds are still intact and the plant contains substances that minimize the side effects.
So how do I eat fruit then?
There is nothing wrong with eating a piece of fruit every now and then, just make sure to eat it with the peel where possible and where not (as with melons or bananas), eat sparingly or don’t eat at all especially if you have insulin resistance or diabetes.
Foods are healthier in their whole, natural state.
Whole rolled oats are better than highly processed oats, whole full fat milk is better than skimmed milk, sweet potatoes with their skins are better than peeled ones, etc.
How to choose whole foods?
When you choose food of any kind, make sure that it resembles its natural, original form.
Stay away from highly processed, luminous coloured cereals regardless if the box states “with added minerals and vitamins”.
Commercial highly processed cereals are so far removed from any whole grain that in an experiment using mice, the poor rodents chose to eat the box that the cereal came in over the cereal itself!
Don’t let clever marketing and advertising fool you into believing their false claims.
If you still need convincing, watch a documentary called Super Size me directed by and starring Morgan Spurlock an American independent filmmaker. Spurlock's film follows a 30-day period from February 1 to March 2, 2003, during which he ate only McDonald’s food. The film documents this lifestyle's drastic effect on Spurlock's physical and psychological well-being, and explores the fast food industry's corporate influence, including how it encourages poor nutrition for its own profit.
Spurlock ate at McDonald's restaurants three times per day, eating every item on the chain's menu at least once. Spurlock consumed an average of 20.9 megajoules or 5,000 kcal (the equivalent of 9.26 Big Macs) per day during the experiment.
As a result, the then-32-year-old Spurlock gained 11.1 kilograms, a 13% body mass increase, increased his LDL cholesterol, and experienced mood swings, sexual dysfunction and fat accumulation in his liver.
It took Spurlock fourteen months to lose all the weight gained from his experiment following a vegan diet supervised by his then-girlfriend, a chef who specializes in gourmet vegan dishes.
If You Would Like To Stay
Success! Message received. |
Trees are magnificent creatures that require maintenance just like anything else, and Atlanta professionals are here with the information homeowners are looking for.
Facts About the Evergreen and Keeping it Evergreen
Contrary to what the name suggests, evergreen trees aren’t always green! That said, if an evergreen tree exhibits an excessive amount of brown, there is probably something more at play and the homeowner should consult a professional. Evergreen trees are a durable breed, but they still require a little love and attention every now and then, especially in the cold months. There are things that homeowners should look for and be aware of when it comes to caring for their evergreens. Luckily, the information below should give homeowners all they need to keep their evergreen happy this winter. Still, there comes a time when professional assistance is necessary.
Continue reading to learn about this fine line and more about evergreen care!
What Is An Evergreen?
Evergreen leaves may not be what one thinks of when they try to picture a leaf. They are long and needle-like in shape, but just like any other leaf, they require enough sunlight to properly photosynthesize. During the winter, the days are shorter and evergreens might not get enough sunlight to complete the photosynthesis process, thus resulting in brown, dead leaves if the tree isn’t properly cared for.
That said, they typically respond well to weather changes. When the weather gets colder, they enter dormancy. During this time period, the tree is essentially hibernating. It doesn’t do much growing but consumes just enough nutrients to keep itself alive and healthy.
Things homeowners can do to care for their evergreen during the winter:
• Apply a layer of winter mulch just before the season starts
• Water it occasionally
• Wrap the tree
When water evergreens during the winter, it’s recommended to do it twice a month. Homeowners want to make sure they water enough for two feet in depth.
Possible Causes Affecting Evergreens
Winter burn is perhaps the worst thing that can happen to an evergreen during the winter. If the winter burn is bad enough, it could potentially lead to the death of the tree. However, if it’s caught early, the tree will bounce back without much worry.
The best way to tell if winterburn is doing significant damage is to first analyze just how much of the tree is covered in brown leaves. Next, the homeowner can prick off or cut off a small piece of a branch and if the branch is green and moist, the tree should be fine!
Remember to never prune an evergreen tree during the winter, especially if it’s experiencing even a small winter burn.
What To Do About it
The best thing homeowners can do for their evergreen trees is to protect them before winter hits. However, if the tree still experiences winter burn, there are a couple of things homeowners can do.
First, wrap the tree for the rest of winter and continue to water it periodically. Make sure the tree still gets as much sunlight as possible too. Once spring hits, homeowners should then cut off all the dead foliage. The tree will be out of dormant season by then and should sprout new branches quite easily.
If this doesn’t happen, it may be time to remove the tree.
Trees Trust Boutte Tree Inc.
There is no one better suited to keep Atlanta residents safe from dangerous tree emergencies than the professionals at Boutte Tree Inc. They work day-in and day-out to ensure they get the job done right and that their customers are always satisfied. Don’t hesitate to call today! |
Great Depression and the New Deal Flashcards Preview
AP US Period 4 > Great Depression and the New Deal > Flashcards
Flashcards in Great Depression and the New Deal Deck (70)
Loading flashcards...
What is buying on margin, and how did it affect the stock market in the late 1920s?
When an investor buys on margin, the investor puts up a portion of the price for a stock and a broker advances the rest of the money. The wide availability of margin credit fueled an environment of stock market speculation, and stock prices skyrocketed throughout 1928 and 1929.
bank run
Banks don't keep all customer deposits on hand; rather they lend out the funds to individuals or companies. A bank run takes place when many customers withdraw their money simultaneously, out of fear the bank may become insolvent, and was a common feature of the early 1930s.
As money is withdrawn the likelihood of default increases, thus triggering further withdrawals. Although it may be solvent, a financial institution drained of currency in a bank run may be forced to declare bankruptcy.
How had farmers reacted to the decline in crop prices in the late 1920s?
In an effort to make up for the shortfall caused by the decline in prices for crops such as grains, corn, and cotton, farmers planted more crops, driving down prices even further as more crops reached the market.
1929 saw an exceptionally good harvest, outstripping demand and driving prices down to record lows.
In mid-1929, there were already signs that the boom economy of the Roaring Twenties was slowing. What consumer purchase indicators presaged an economic slowdown?
Many consumers were no longer buying on the installment plan, having already purchased dishwashers, cars, and other goods in abundance. With wages stagnant many borrowers simply could not afford further purchases.
Despite the slowdown in consumer purchases, factories still continued to produce consumer goods in large numbers, creating a surplus.
During October of 1929, Congress debated the Smoot-Hawley Tariff, which would establish the highest tariff rate in history. What effect did this debate have on the stock market?
The stock market experienced massive fluctuations, lending an air of uncertainty to the market and leading to record amounts of buying and selling.
On _____ _____, October 24, 1929, investors sold 13 million shares on the New York Stock Exchange, and the market lost some 11% in value.
Black Thursday"
Several leading bankers stabilized the market on Friday, October 25, but the sell-off resumed on Monday, October 28, when the market collapsed 13%, a day known as "Black Monday."
The final "Black" day of the 1929 Stock Market Crash was "Black Tuesday," when the market lost an additional 12% in value. What hastened the market's collapse?
During the pre-crash boom, many speculators had purchased stocks on margin. As the stock market began to fall, brokers were forced to sell off the stocks purchased for their customers on margin. This created a snowball effect; as stocks continued to fall, more speculators were sold out.
How did the 1929 Stock Market Crash affect banks?
Many banks had invested in the market and faced significant shortfall; several faced insolvency. The Crash also prompted a run on gold deposits, further reducing the amount of deposits banks had on hand. As a result, banks curtailed their lending activities, contributing to an economic slowdown.
How did the Federal Reserve react to the 1929 Stock Market Crash?
Although the Federal Reserve was responsible for overseeing the economy's banking sector, it did little to aid banks. In fact, the Federal Reserve raised interest rates in the two years following the Crash, further exacerbating the economic slowdown.
In 1930, Congress raised the tariff to record highs by passing the Smoot-Hawley Tariff. What effect did this have on the economy?
Already slowed by the 1929 Stock Market Crash, the increased tariff led to retaliation by foreign countries, which raised their own tariffs. As a consequence, U.S. exports dropped by 66%, devastating the U.S. economy.
What was the Reconstruction Finance Corporation?
Established in 1932, the Reconstruction Finance Corporation was one of Herbert Hoover's attempts to aid the ailing U.S. economy. The agency gave $2 billion in aid to state and local governments, railroad companies, banks, and other businesses. The Corporation was a model for several of the New Deal agencies.
What was the Federal Home Loan Bank Act (1932)?
Signed into law during the Hoover Administration, the Federal Home Loan Bank Act sought to lower the cost of home ownership by providing funds to federal savings and loans to be used to fund home mortgages.
The Act's purpose was to reduce home foreclosures during the early years of the Great Depression. While foreclosures were reduced, it had little effect on the economy as a whole.
In 1932, Herbert Hoover attempted to revive the U.S. economy by signing the Emergency Relief and Construction Act. What did this act provide?
The Emergency Relief Act was the first ever federal relief act, which released funds for public works projects (such as highways and building projects) throughout the country.
The Emergency Relief Act was expanded by President Roosevelt as part of his New Deal line of programs.
In 1931, at the suggestion of President Hoover, 15 countries agreed to the Hoover Moratorium, which suspended the Dawes Plan and all war debt payments, including reparations. What was the Moratorium's effect?
The Moratorium prompted a number of bank defaults in Europe and the United States, as customers withdrew their funds. Designed to stave off a depression in Europe, the Moratorium had only a negligible effect on the world economy.
What was the Federal Farm Board?
Founded shortly before the 1929 Stock Market Crash, the Farm Board was greatly expanded in response to the drop in crop prices in 1930 and 1931. The Federal Farm Board attempted to drive up prices by holding cotton and grain in storage, reducing the supply.
Unfortunately the Board's efforts were too modest to have much of an effect on the economy.
What was the Bonus Army?
In 1932, thousands of unemployed World War I veterans marched on Washington and demanded immediate payment of bonus certificates that had been awarded to them in acknowledgment of their service, but which weren't cashable until 1945.
The Bonus Army, as it came to be called, arrived en masse at the U.S. Capitol, demanding that Congress enact the Bonus Bill, providing them with their bonuses.
How did President Hoover respond to the arrival of the Bonus Army in Washington, D.C. in 1932?
After the Bonus Army attacked police following the failure of Congress to pass the Bonus Bill, Hoover ordered out the U.S. Army. Douglas MacArthur used troops, tanks, and tear gas to drive the veterans from Washington.
In 1932, the Democratic Party nominated New York's Governor, Franklin Roosevelt, to run against President Hoover. What were the central components of Roosevelt's campaign?
Roosevelt sharply critiqued Hoover's deficit spending, contending that government extravagance had led to the worsening Depression. Roosevelt promised to streamline the government, cut government expenditures by 25%, and balance the budget.
In addition, Roosevelt supported repealing Prohibition, hoping that grain purchases by brewers and distillers would raise crop prices.
What were the results of the 1932 election?
Running for re-election in the midst of a Depression, Hoover was resoundingly defeated by FDR. In addition, Democrats swept both houses of Congress.
In between his defeat in November 1932 and Roosevelt's inauguration in March 1933, President Hoover sought to work with Roosevelt in an effort to cope with the worsening Depression. How did Roosevelt respond?
Hoover sought Roosevelt's permission to issue a joint statement to reassure the country, and to enact a bank holiday, during which banks could sort out their assets and determine their solvency. Roosevelt ignored Hoover's request, and failed to even respond to Hoover's letters.
By the time of Roosevelt's inauguration 1,000 more banks had closed, mainly in agricultural areas.
New Deal
In response to the Great Depression, President Roosevelt announced a "New Deal," composed of the three R's:
relief for the unemployed
recovery of the economy as a whole
reform of America's economic institutions
President Franklin Roosevelt's advisors, many of them professors from elite universities, were known as the _____ _____.
Brain Trust
Members of the Brain Trust were appointed to run several of the new federal agencies that appeared as a result of Roosevelt's Hundred Days Legislation, including Rexford Tugwell who ran the Agricultural Adjustment Administration, and Hugh "Iron Pants" Johnson, who presided over the National Recovery Administration.
Immediately after his inauguration, President Roosevelt called Congress into a one hundred-day session to consider legislation to address the economy. What agencies resulted from the "Hundred Days"?
At Roosevelt's direction, Congress passed legislation which established several agencies directed at stimulating the economy, including the:
Works Progress Administration (WPA)
Civilian Conservation Corps (CCC)
Agricultural Adjustment Act (AAA)
National Recovery Association (NRA)
On his first full day in office, President Franklin Roosevelt announced the closure of what type of businesses?
On March 5, 1933, President Roosevelt announced a "bank holiday" and ordered all banks closed. The measure was necessary, he contended, to prevent further bank runs, and to allow the government and the banks themselves to assess their solvency.
Although many banks would never reopen, on March 9, 1933, Congress passed the Emergency Banking Act, which allowed banks to reopen on March 13, provided they were solvent. The Emergency Banking Act provided an explicit federal guarantee of all bank-held funds, and stopped further runs.
Passed as part of Franklin Roosevelt's "Hundred Days" legislation, what was the purpose of the Public Works Administration (PWA)?
The PWA employed millions of unskilled workers on public works projects, such as building parks, post offices, and bridges.
The Civilian Conservation Corps (CCC) was established in 1933 as part of the "Hundred Days" legislation. What was this agency's purpose?
The CCC focused on forestry, the prevention of soil erosion, flood control, and similar projects. Aimed primarily at young men whose families received $25 (the men only received $5), many of the CCC's camps were set up in National Forests and under the control of the Army.
How did the Agricultural Adjustment Act (1933) seek to remedy the low crop prices that plagued farmers in the early years of the Depression?
The Agricultural Adjustment Act (AAA), passed during the "Hundred Days," paid farmers to let a portion of their land lie unplanted, in the hopes that the crop supply would be reduced and the price of those crops would increase.
Although the AAA did stabilize prices, it had a disastrous effect on sharecroppers in the South, where landowners merely removed the sharecroppers from their land, or failed to pay AAA money forward. Sharecropping became exceedingly rare.
In 1935, the Supreme Court ruled the AAA unconstitutional.
What was the National Recovery Act (1933)?
The National Recovery Act (NRA) was one of the first New Deal programs, passed as part of Roosevelt's "Hundred Days" program. The NRA suspended antitrust laws and required each industry to set amounts for finished products, wages, hours of work, and maximum goods produced.
The NRA, modeled on a similar program established by Benito Mussolini, had only a negligible effect on the economy, and the Supreme Court ruled it unconstitutional in 1935.
A "Hooverville" was a nickname for the shantytowns built by homeless people during the Great Depression, and named after President Hoover, whom they blamed for the Depression.
The term "Hooverville" was coined by the publicity chief of the Democratic National Committee, Charles Michelson.
fireside chat
On occasion during his four terms in office, President Franklin Roosevelt conducted radio broadcasts, during which he explained his perceptions of the problems facing the country and his proposed solutions. These talks with the American people were known as fireside chats.
During his presidency Roosevelt held 30 of these conferences, which typically began, "My friends, I want to talk..." |
Special reportMay 3rd 2003 edition
Catching the tide
Why does so little capital flow from rich countries to poor?
SUPPOSE capital were bottled up in individual countries, not free to flow from one to another. Rich economies would have lots of it. Too much, in a way: the law of diminishing returns would have set in. Poor economies, in contrast, would have less capital than they can put to good use: returns to extra capital there would be higher. Both kinds of country, and the world as a whole, would be better off if people were free to move capital from the one to the other—or so it would seem.
The poor-country capital importers would invest more and produce more. The rich-country capital exporters would invest less, but the income they lost this way would be more than outweighed by the additional income they received from investments abroad offering high returns.
This is the simple theory of international capital flows. Sometimes it works. For sustained periods during the past century or two, capital went where it was supposed to, and made a great difference to the pattern of economic development. In the last quarter of the 19th century, British capital equivalent to 5% of host-country GDP and more flowed out each year to the United States, Canada, Australia and Argentina. France and Germany were big exporters of capital too, though not quite on that scale. The flows paid for a large part of the investment undertaken in the capital-importing countries.
This golden age of financial globalisation ended in 1914. Global financial connections were cut by the first world war, and only briefly repaired in the immediate aftermath. Then, for nearly half a century, from the Depression until the 1970s, international flows of private capital dwindled to almost nothing. In the 1970s, net flows of private capital to the world's poor countries amounted to a little over 1% of host-country GDP. This trickle was sufficient to finance a miserly one-twentieth of what many poor countries spend on investment (and an even smaller share of what they should be spending).
By the end of the 1970s, those meagre figures were increasing, though they still fell far short of the 19th-century boom. And the resurgence, such as it was, ended badly, in the debt crises of the 1980s. By the end of the 1990s, flows had recovered from that setback and endured two more—the Mexican devaluation of 1994 and the East Asian debacle of 1997-98. Taking one decade with another, flows in the 1980s were about equal to flows in the 1970s; during the 1990s, they were substantially larger. By the end of the 1990s, annual flows as a proportion of developing-country GDP were some three times bigger than in the 1970s (see chart 1).
Nonetheless, measured against the apparent opportunities for productive investment in the developing countries, as well as against the flows a century earlier, they were still small. At the end of 2001 (the latest year for which figures are available) the worldwide stock of cross-border bank loans and deposits was $9 trillion. Of that, only around $700 billion was attributable to developing-country borrowers. The stock of global cross-border investment in securities was some $12 trillion, of which developing-country borrowers accounted for just $600 billion. As in the 19th century, moreover, most of the capital exported by rich countries to poor countries still travels to just a handful of recipients.
These figures belie the idea of a steady tide of capital running from rich countries to poor. On average, it is true, creditor countries are richer than debtor countries; in this sense, at least, capital does flow downwards. But there are some notable exceptions even to this broad pattern. Despite its economic slowdown, the United States continues to invest a lot while saving next to nothing: its economy draws in huge amounts of capital from abroad, and its net foreign liabilities currently stand at more than 20% of GDP.
All this raises a question. The most successful developing countries of an earlier era showed that foreign capital can make an enormous difference to their prospects for rapid development. Financial crises notwithstanding, rich-country investors profited too. Why, in that case, does capital today not flow in much larger quantities from rich parts of the world to poor?
One reason is that capital is not the only thing which is lacking in most developing countries. Labour may be plentiful, but workers in poor countries are mostly less well educated and have less training in industrial skills than their rich-country counterparts. In many countries, property rights are insecure and the rule of law is unreliable. The economic infrastructure necessary to get the most out of new investment may not be there. Political risk may be a problem. For these and other reasons, switching capital from countries where there is plenty to countries where there appears to be a shortage yields smaller profits than one would suppose. (America's overwhelming advantages in all these respects help to explain why it attracts so much new capital, despite seeming to have more than it needs.)
Second, most developing countries do not let capital come and go freely. Blanket restrictions on the movement of capital are much rarer than they used to be, but assorted official or unofficial obstacles are still often put in the way of foreign investors. Despite measures to liberalise the capital markets in recent years, they are still far less open to cross-border finance than the typical developed economy (see chart 2).
So where the flow of international capital could do most good—in the developing countries—there is precious little of it. Does that matter? If you take the view that capital flows are more of a curse than a blessing, probably not. Yet history suggests that the most successful developing countries, at least up until the first world war, benefited enormously from foreign capital. And everybody agrees that the flow of capital from one rich country to another is wholly beneficial for both sides. Is anybody suggesting capital controls for the United States? Not even those who consider America's present rate of capital inflow worryingly high. The benefits of access to global capital markets are called into question only for poor countries.
To get an idea of what is at stake, it would be useful to have a rough estimate of the developing countries' gains from capital flows. Unfortunately, no generally agreed estimates exist. The 19th century seems too remote a guide. Careful analysis of the more recent connection, if any, between capital flows and growth in developing countries is still surprisingly sparse, though interest in the subject has been mounting lately. As yet there are relatively few studies, far fewer than of the links between growth and trade, and the results have not settled down to anything resembling a consensus. This is partly because the expansion of rich-to-poor capital flows to significant size is, as noted earlier, a comparatively recent event.
Guessing the benefits
Two other things frustrate efforts to estimate the gains. One is that the main effects of openness to capital can be expected to push in opposing directions: access to capital ought to spur investment and growth, but at the same time it will expose an economy to additional economic turbulence which may slow it down. The net result will be difficult to uncover among all the other factors contending for influence.
Also, “capital flows” is a broad term. It includes quite different kinds of financial transaction: bank lending, short- and long-term; investment in public or private bonds; investment in equities; direct investment in productive capacity. Each has different implications for growth on one hand and exposure to capital-market risk on the other. The gains from capital inflows are going to depend on exactly what kind of capital is flowing. Again, statistical evidence may struggle to provide answers.
Still, one may hazard a guess. According to one recent review of the literature, by Wendy Dobson of the University of Toronto and Gary Hufbauer of the Institute for International Economics, developing countries may have gained roughly as much, overall, from access to global capital markets as from access to trade in goods and services. The authors say it is plausible to suppose that by 2000 developing countries were gaining around $350 billion a year in additional GDP thanks to access to the global market in goods and services. As a result, developing-country GDP was about 5% higher than it would otherwise have been. Drawing on research that aims to separate the effects of different kinds of capital, they calculate that the gain up to now from even the limited access to international capital these countries have enjoyed might be about the same.
If the gains from (incomplete) capital-market integration really are as big as that, they would be worth the price of a financial crisis or two. Over the past few decades, admittedly, the world has suffered more than a few. When it did the sums in 1999, the IMF counted 64 banking crises and 79 currency crises since 1970. (That includes some double-counting, because many countries had both kinds of crisis simultaneously.) Most of these were small affairs, national rather than international in character. Over time, however, the role of international capital in spreading financial breakdown across borders has been growing. And when financial crises happen, the toll on incomes is heavy.
Ms Dobson and Mr Hufbauer have gathered estimates of the cost in lost GDP of 24 banking crises and 36 currency crises during the 1980s and 1990s. Research suggests that the calamities of the 1980s cost Latin America an average of 2.2% of GDP a year over the decade. In the 1990s East Asia's financial traumas cost the region 1.4% of GDP a year.
Within these regional averages, of course, some countries suffered much more than others. Indonesia's output, for example, fell by 14% in 1998 alone, against an earlier trend of 7% annual growth: a one-year GDP shortfall of more than 20%. Overall, though, the cost of financial crises for all emerging-market economies worked out at around 0.6% of GDP a year for the 1980s and 0.7% of GDP a year for the 1990s (see table 3). Set beside Ms Dobson's and Mr Hufbauer's estimated capital-market benefits of 5% of GDP a year, that does not seem too bad.
However, many critics of financial globalisation would challenge these numbers, especially so far as the benefits are concerned. And they have a surprising new ally. A new review of the empirical literature by economists at the IMF, traditionally devoted to the cause of open capital markets, finds no consensus that financial integration yields any net benefits in growth at all (even though, the Fund insists, in theory it ought to). Of 14 papers reviewed, only three find that financial integration has a positive effect; another four find that the effects are mixed; and the rest find no effect one way or the other. The IMF's review also looks at the relationship between other measures of economic well-being and different measures of economic openness. Trade improves economic welfare, according to this research. Financial integration has no significant effect.
The absence of a clear conclusion suggests two possibilities. One is that financial integration is indeed a mixed blessing: it has costs as well as benefits, making net benefits (if any) hard to spot. Second, unlike free trade, financial integration may be good for economies only if certain conditions are met. If countries meet these requirements, they gain; if not, they lose. On balance, the effects tend to cancel out. These theories are not mutually exclusive.
Split the difference
Even so, for some countries, at least, access to global capital is likely to bring advantages as well as drawbacks. And there is no need to come to an all-or-nothing judgment about capital flows. The choice is not between completely unfettered flows and financial isolation. According to circumstances, a middle way may be best. The aim should be to reduce the costs of financial integration without casting aside such benefits as there may be.
Seeking the benefits of financial integration while suffering fewer costs is a difficult task, as the rest of this survey will explain, but by no means a hopeless one. There is little prospect of ever eliminating the risk of financial crisis, short of eliminating finance itself. But the terms of the trade-off between higher incomes (because of broadened economic opportunities) and higher risk (because of exposure to financial hazards) can be improved.
Unfortunately, developing countries face particular difficulties in striking the right balance. The combination of malfunctioning domestic finance, weak regulation and erratic economic policy is perfectly designed to get the worst out of financial openness. In countries where those failures are severe and cannot be corrected, an incautious opening of the economy to foreign capital is likely to do much more harm than good.
Reaching a modest minimum competence in regulation and economic policy is crucial for the emerging-market economies. And there is a lot of work for governments elsewhere too—very much in their own interests, not just for the sake of spurring development in the poor countries. Rich-country suppliers of finance, rich-country regulators and the international financial institutions directed by rich-country governments all need to do better if the full mutual benefits of financial globalisation are to be achieved.
This article appeared in the Special report section of the print edition under the headline "Catching the tide"
Reuse this contentThe Trust Project
The Economist today
Handpicked stories, in your inbox
A daily newsletter with the best of our journalism |
More From Forbes
Edit Story
How Civilization As We Know It Could End ... With A Cough
Mark Gibbs
This article is more than 8 years old.
A coronavirus that may cause SARS. (transwikied from (Photo credit: Wikipedia)
If you've wondered why I haven't posted for a while it was due to a virus.
Not, I suspect, a really serious one but serious enough to put me into what amounted to a deep sleep for the better part of two weeks.
What I'm glad about is that it was probably some kind of rhinovirus rather than an influenza virus.
Influenza is, as I'm sure you well know, not a whole lot of fun and if you're smart, you'll be one of those people who gets their 'flu shot as early as possible every year.
If everyone did this then the progress of seasonal influenza would be dramatically reduced but, alas, every year many people think that because they've heard the current 'flu jab doesn't match the strains of influenza doing the rounds, there's no point in getting a shot. It turns out that this is just not true.
New research from St. Michael's Hospital in Toronto, Ontario, Canada, shows that even when there's a mismatch between the strains a vaccine is designed to protect people from the vaccine still provides a significant level of protection. According to a summary on St. Michael's web site:
The study looked at the two most popular vaccine formulations in Canada – Trivalent inactive vaccine for adults and live-attenuated influenza vaccine for children. They found that both vaccines provided significant protection against matched (ranging from 65 per cent to 83 per cent effectiveness) and mismatched (ranging from 52 per cent to 54 per cent effectiveness) flu strains.
So, if you're thinking that not getting vaccinated this year doesn't matter, think again because even just a little protection is better than none.
Of course, Mother Nature isn't going to make things easy for us hairless apes so in truly Darwinian fashion, evolution has forged ahead in the world of viruses to bring us Middle East Respiratory Syndrome or MERS.
MERS is a very worrying medical development and is reported to have been responsible for at least 70 cases of infection and 39 deaths up until June 22 this year. The majority of cases were mostly in Saudi Arabia although other cases have been reported in France, Germany, Italy and Britain.
What's so worrying is that the mortality rate of MERS makes it far more deadly than the SARS (Severe Acute Respiratory Syndrome) virus which looked like it might become a global pandemic in 2002-2003.
SARS ultimately infected 8,273 people and caused 775 deaths worldwide giving a mortality rate of "less than 10% for people aged 24 or younger, 6% for those 25 to 44, 15% for those 45 to 64, and more than 50% for those over 65."
MERS is far more worrying than SARS with an overall mortality rate of around 59%. Compare that figure with influenza's overall fatality rate of which is usually under 0.03%.
Whether the standard US influenza vaccine will offer any protection against the likes of MERS is unknown but what is certain is that people with immune systems weakened by 'flu viruses are more likely to contract other viral diseases. Should MERS gets a foothold in a weakened population the more likely it is that the virus will spread which could be a disaster that could make the 1918 'flu pandemic look like a case of the sniffles.
So, the bottom line is that your duty as a citizen is to get vaccinated and stay healthy.
If enough of us fall sick and we could fall sick.
Tip o' the stethoscope to |
Physiotherapie Berlin Mitte - Physiotherapie Marsch Berlin-Mitte GmbH
We do not treat the symptom
we treat the cause
Functional training
Functional training is a training method that does not focus on individual muscles, but on several joints and muscle groups. Machines that are mostly known from the gym are not used. These often focus on a specific joint and not on holistic movements that involve several parts of the body. In functional training, several muscles should be trained at the same time, with coordination, sensorimotor skills and strength being the main focus. The aim is to strengthen body awareness so that exercises can be carried out correctly and consciously.
The training includes familiar exercises such as running, jumping, hopping, turning or balance training. The aim is to train the core, which is responsible for the stability and performance of the musculoskeletal system. Abdominal, pelvic, spine and hip muscles remain powerful in the long term if the core is stable.
In functional training, the focus is not on building muscles, but on the athlete’s perception of their own body. After all, muscles are built automatically if you exercise regularly and correctly.
Functional training is particularly suitable for people who want to prepare for a sport or everyday life. The risk of injury should decrease and performance should increase. By performing exercises without equipment, various movements are internalized. With a conscious body awareness that has an impact on sports activities, the body gains strength, flexibility and balance. |
Previous | Next --- Slide 4 of 52
Back to Lecture Thumbnails
Is there a reason why there's some white shades on the bottom half of the picture of the ray tracing method?
Are there any situations for which we would prefer rasterization over ray tracing?
Yutian, I think it's to indicate that we haven't gone through all the samples yet.
Is either one of these approaches significantly better for parallelism? This makes me think ray tracing could be since each sample is non-conflicting whereas parallelizing over primitives would possibly have conflicts at the same samples at once
Is there a reason for the ordering of samples vs primitives for each?
This slide makes it seem like rasterization and raytracing are the two natural ways to render images (i.e. primitive first or sample first). Are there other, unrelated ways to render images?
In what case do we use rasterization or ray tracing?
It seems like ray tracing would be the method generally used to generate an image, when would rasterization be a better method? |
Mobile website
Name: Jiangxi Biological Products Research Institute Co., Ltd.
All rights reserved:Jiangxi Biological Products Research Institute Co., Ltd.
Jiangxi ICP05034294 Powered by
"Dragon Boat Festival"
"Dragon Boat Festival"
Company news
2020/06/22 15:48
Page view
The term "Dragon Boat Festival" first appeared in the records of wind and earth in the Western Jin Dynasty: "the Dragon Boat Festival in midsummer is also the fifth day of May, and the custom emphasizes this day, which is the same as the summer solstice." Duan, ancient Chinese has the meaning of beginning and beginning, which is called "Duanwu" or "junior five". "Shuowen Jiezi": "Duan, the topic of the beginning of things", that is to say, Duan means the beginning, so the fifth day of May is called "Duanwujie". "When the age of Guangji" said: "the capital city dust people, with the first day of may as the end one, the second day as the end two, the number to five is the end five The ancients used to call the first few days of may as Duan. Therefore, the first day of the five (noon) month is called the Dragon Boat Festival.
The Dragon Boat Festival is a mixture of various folk customs, such as evil prevention and epidemic prevention. Therefore, it is believed that the Dragon Boat Festival originated from the ancient people for "evil prevention and epidemic prevention". Chinese culture has a long and profound history. Ancient festivals are the important carriers of traditional culture. The formation of ancient festivals contains profound and rich cultural connotation. Ancient festivals attach great importance to the belief and sacrifice of ancestors. The belief of ancestors is the core of ancient traditional festivals. It is not a folk festival to choose a day to avoid evil spirits and prevent epidemics; Dragon Boat Festival originated from the ancients“ It is a misunderstanding of the cultural connotation of ancient festivals in later generations. Ancestor worship not only covers all the ancient Chinese traditional festivals, but also the eternal theme of Chinese folk festivals. As for the blessing words of the Dragon Boat Festival, most folklorists believe that it is after the Dragon Boat Festival that the legends and historical figures are attached to the festival, giving other meanings to the festival, but these meanings are only a part of the festival. Many ancient poems describe the festive atmosphere of the Dragon Boat Festival. The festival has always been a festive day for eating zongzi and picking dragon boats. The lively Dragon Boat performances and happy food banquets in the ancient dragon boat festival are the embodiment of celebrating the festival. The happy Dragon Boat Festival is the tradition. Dragon Boat Festival is a good day. According to the chronicle of Jingchu years old: because of climbing in midsummer, Shunyang is on. May is midsummer. Its first noon day is a good day to climb in Shunyang.
Among the traditional festivals, there are many and complex folk customs, or only Dragon Boat Festival energy conservation and Spring Festival can be compared. Both festivals have ritual and custom themes such as praying for blessings and eliminating disasters, which place people's desire to welcome the good luck and get rid of evil spirits and disasters. Dragon Boat Festival in the historical development and evolution of a variety of folk customs as one, Dragon Boat Festival customs are many, diverse forms, rich and colorful content, lively and festive. There are differences in the content and details of Customs due to different regional cultures. Dragon Boat Festival customs mainly include picking dragon boat, sacrificing dragon, picking herbs, hanging wormwood and calamus, worshiping gods and ancestors, washing herbs and herbs, beating noon water, soaking dragon boat water, eating zongzi, putting paper kite, watching dragon boat, tying five color silk thread, lavender, wearing sachet, etc. Dragon Boat picking activities are very popular in the coastal areas of southern China. After being spread abroad, it is loved by people all over the world and has formed an international competition. The custom of eating zongzi at Dragon Boat Festival, which has been popular all over China since ancient times, has become one of the most influential and widespread folk eating customs of the Chinese nation. During the Dragon Boat Festival, the traditional folk activities can not only enrich the people's spiritual and cultural life, but also carry forward the traditional culture. As an important part of Chinese traditional culture, Dragon Boat Festival culture reflects the long history and profundity of Chinese culture. Dragon boat culture has a wide influence in the world. Some countries and regions in the world also have activities to celebrate the Dragon Boat Festival. |
Our programs are designed for our students to learn traditional martial arts in a safe, family-oriented environment. Each student is treated as an individual, with instructors targeting their specific strengths and weaknesses. We will guide every student to develop their maximum potential.
JMAC Karate – A way of life.
Kinder Karate (3-5 years old)
The purpose of the Kinder Karate class is to prepare students to enter the kid’s karate program. Students that had the advantage of the Kinder Karate classes have a much easier transition into the Kids program. This allows them to excel much faster because of the fundamentals they learn.
In the Kinder Karate class students are taught social skills including how to ask permission, how to take turns and how to follow directions. Most physical training includes coordination, balance, gross and fine motor skills, as well as basic karate techniques. Students will earn white belts with colored stripes by showing understanding of curriculum and demonstrating the values of karate.
These classes are limited to 30 minutes to accommodate your child’s attention span. Upon graduation from this program students will have a strong foundation of basic karate techniques, traditions, and manners when entering into the kid’s karate program.
JMAC Kinder Karate
Kids Karate (6-8 years old)
The Kids Karate program is focused on the fundamentals of self-defense.
The three main focus points in the Kids Karate program include agility, balance, and coordination. Manners are also very important in this age group as students are required to show respect to their teachers, parents, as well as other students.
Classes are in a group setting as students need to learn how to work in a group. However, all students have different learning processes, and individual attention will be given as well to accommodate learning needs.
Classes are 60 minutes long as students in the Kids Karate program are old enough to train for a longer period of time both mentally and physically. Students who start in Kids Karate will have a solid foundation as they move into Youth Karate.
JMAC Karate Ages 6-8
Youth Karate (9-12 years old)
The Youth Karate program is designed to help children with changes in their developing bodies as growth surges and muscles change shape. Physical size, strength, and maturity vary widely for this age group so classes are geared towards accommodating students.
The six main focus points in the Youth Karate program include agility, balance, coordination, power, reaction time, and speed. Every child is given individual attention and an opportunity for personal growth. Goal setting is practiced through the use of martial arts ideology of bushido by enhancing the students’ motor skills, self-discipline, and self-defense skills. Youth Karate training builds confidence and respect for both oneself and others allowing for confident, well mannered, and strong youth.
JMAC Karate Ages 9-12
Teen Karate (13-19 years old)
Teenagers naturally begin to detach themselves from childish ways and want to proceed in life more independently from parents. Many ways they look for identity, purpose, and direction. In order to not get bored and start picking up bad habits teenagers need something to do.
Teen Karate classes are intended to give the students a positive and safe environment. Teenagers are also much stronger as they grow into adulthood so that classes are much more vigorous. Teenage students are pushed to train very hard and sweat in every class.
Teenagers also have a lot of stress from school as well as being expected to prepare for college and a career. Stress management is emphasized as well as self-defense, personal growth, and self-esteem. Students make friends with like minded individuals and a mutually supportive group naturally develops.
JMAC Teen Karate
Adult Karate (20 and over)
Adult Karate classes are focused on learning and continued learning of self-defense. Also, as adults tend to have jobs and families, stress relief is a focus.
As you get older, it becomes even more important to remain active if you want to stay healthy. Classes benefit adults by helping to control weight, improved mood, better sleep, and a reduction in stress and anxiety. Adults also tend to perform better at work and school as well as have increased self-confidence. Sitting in an office chair for long periods of time is also detrimental to one’s health, so maintaining flexibility as you grow older is very important.
JMAC Adult Karate
Ready to Learn? Click here to register for a FREE Trial Class |
Page images
How To Know the
[ocr errors]
HE Bible is in everybody's house, and is the most
generally read and studied of all books, but it is still in need of simple explanation.
This is partly because it is so old, the latest pages of it having been written at least eighteen hundred years ago; partly because it is a library rather than a book, composed by various writers, in various literary forms, in widely separated countries, and during a period of more than a thousand years; and partly because we read it in a translation which brings the sixty-six books into a single volume, presents them without separate title-pages, makes poetry look like prose, shows no distinction between conversation and description, and deprives the reader even of the benefit of paragraphs. It is an evidence of the extraordinary interest and vitality of the Bible that it has survived the process of printing it in detached and numbered sentences, arranged in double-columned pages of fine type. A better knowledge of the Bible begins with the
perception of order and variety in this confusing and depressing appearance of monotony.
[ocr errors]
It is plain, at the first glance, that the Bible is in two parts, the Old Testament and the New. Everybody knows that the Old Testament was originally written in Hebrew, and that it contains the sacred scriptures of the Jewish religion; and that the New Testament, which contains the sacred scriptures of the Christian religion, was originally written in Greek. The two are bound together for Christian use because the first Christians came out of Judaism, and brought their books with them. Each of these parts is a collection of books.
The Old Testament begins with the five writings called the Pentateuch: Genesis, Exodus, Leviticus, Numbers, Deuteronomy. They give an account of the early ancestors of the Hebrew people, moving out of the valleys of the Tigris and Euphrates into the land between the Jordan and the Mediterranean, then down into Egypt where they lived long in slavery, then escaping, wandering in the wilderness, gradually shaping their political and religious institutions. They contain the codes of laws in which the details of these institutions were recorded.
Two following books, Joshua and Judges, describe from different points of view the adventures and misadventures of the invasion, conquest and settlement of Canaan.
« PreviousContinue » |
なくて Negative て-form - Conjugations - Grammar Discussion
to not…and…
• Verb[な] + くて
行く → 行か なくて
• い-Adj[ ] + く なくて
面白い → 面白く なくて
• な-Adj + で(は) なくて /じゃ なくて
しずか → しずかで(は) なくて → しずかじゃ なくて
• Noun + で(は) なくて /じゃ なくて
先生 → 先生で(は) なくて → 先生じゃ なくて
いい → よく なくて
する → し なくて
くる → こ なくて
[Japanese verbs have two negative て-forms - なくて and ないで. なくて is more limited and is mostly used to express reason/cause]
[Adjectives and nouns only have the なくて form]
View on Bunpro
Is there a reason why 眠い requires you to prompt the whole word and some of the sentences only ask for the ending? For いい it makes sense of course but it’s a bit unfortunate that the others don’t seem to be consistent. Maybe add one of those nice warning texts to them “maybe you forgot to start with the actual word” (or alternatively, “we already added the beginning for you”).
@pasi Hey! All of the review questions for this grammar point require that you conjugate the verb or the adjective in your answer. You should be seeing the verb or adjective that requires conjugation at the end of the Japanese sentence in brackets. If you do not see a word in brackets then you do not need to conjugate anything. Please let us know which sentences you are seeing these inconsistencies and we will be sure to get them corrected. Cheers!
Hello I’ve been following the regular lesson order on bunpro and I wanna ask why なくて is after
なくてはいけない and なくてはならない.
I’ve been strugeling with both of those point because I did not understand what なくて was.
After some reading etc. I got it but now seeing this later I fell like the struggle could have been avoided.
1 Like
Hey :blush:
This is a good question. The idea is that explaining some concepts at a certain level might be too much at once, especially when the grammar point is used very often, or is very important, and there is no real need to understand inner working to use it.
This is a very common approach in textbooks. For example, in “Genki” student learns なければいけない before learning the ば form. Or learning ましょう before the volitional form.
By the way, you might find this interesting:
I hope it helps,
(Though, I think it might be good idea to link the “background” for those who want to understand a bit more!)
I have added the additional information :slight_smile:
1 Like
Similarly, half the stuff you learn in Chapter 1 of Genki (Greetings) is honorific/humble stuff. You don’t really need to know how おやすみなさい or おかえりなさい are formed and you are not taught that until halfway through book 2. It’s worth just rote-learning stuff that’s super common rather than trying to understand it at that level.
What is the difference between じゃなくて and ではなくて?
Because for this one it wants じゃ
But for this one it wants では
But in the lesson point itself it just only says you use では so I’m kind of confused as the rule?
1 Like
You can think of じゃ as casual contraction of では.
Just like ではない and じゃない.
You might also see でなくて without は, which is also correct .
Cheers :slight_smile:
You can see information like this in the structure section:
The 1 super script indicates that では can be replaced with expression that is super scripted at the bottom of the structure section (じゃ here).
1 Like
OOOHH okay I didn’t know what the numbers really showed. I think I get it now I’m just a bit slow :slight_smile:
1 Like |
Importance of Sustainable Food Systems during COVID-19
In a time when food production has been exponentially increased as compared to the past years, what comes as a surprise is that food insecurity among people has also seen a major boost. Despite the increased production of foodgrains to meet the increasing demand, we have never witnessed food insecurity of this level before. Surveys indicated how some households reduced the size of meals or skipped some altogether because there was not enough money for food. In a country where this problem was already severe and extremely prevalent, what aggravated the situation, even more, was the COVID- 19 pandemic.
The whole world seemed to have come to a standstill when the first wave of Covid hit us. The fear and the uncertainty of the situation made people apprehensive. Nationwide lockdowns were observed in many parts of the world which indeed were necessary to curb the spread of this virus. We witnessed how the situation got out of control despite these measures. What ensued was a sudden rise in the unemployment rate. People involved in the service sector were especially hit hard when they lost their jobs. It is important to understand how this affected India, a country that already had high unemployment rates and a population struggling with food security. Needless to say, COVID-19 ended up pushing many vulnerable families over the brink when it came to having food security.
This unfolding crisis had a detrimental impact on the existing food systems and ended up disrupting the supply chains that were in place. This majorly reduced people’s ability to access food. With the slowdown of the economy at the global level, we observed a high price being placed on food along with reduced income for people which rendered a vast number of people helpless and unable to buy food. Along with the inflating prices and the challenges to food distribution, the quality of food was also severely affected. The major disruption in the food systems gave way to widespread hunger, varying from moderate to severe.
Now that we’re hit by the second wave of Covid-19, which is an unfolding crisis, it is extremely important to move towards sustainable food systems, which will guarantee food and nutrition security to people and ensure that they get healthy diets. “ No Hunger” is a Sustainable Development Goal, and it is high time that we learn from the past situations and work for the realization of sustainable food systems.
In 2020, we came across images of people hoarding food, empty shelves at supermarkets, and long queues outside food banks which were a clear indication of how important food systems are to sustain our lives and dysfunctional they have become especially during these unprecedented times.
But what we must also realize is that the challenges of the food system are not just limited to the availability and distribution of food. Malnourished and immuno-depressed people have been placed at a much higher risk and along with this, being obese or overweight has also led to increased vulnerability to diseases, either directly or indirectly. These issues stem from having an improper, imbalanced diet, which are all challenges to a sustainable food system.
As we continuously look for solutions to rebuild the society and its systems after the collapse we have faced due to this pandemic, it is necessary that we take steps to ensure food security and adopt sustainable food systems. Ensuring the efficiency of food distribution channels would go a long way in this regard. Continuous steps to encourage and empower small-scale producers will also help us in achieving this target, especially in rural areas. Curbing the overconsumption of highly processed food especially in developed countries and improving access to food in developing ones will serve as tools to look into the aspect of an imbalanced diet.
Thus, we must make conscientious efforts to adopt a sustainable food security system that will ensure food and nutrition security to each and everyone, while successfully moving towards the Sustainable Development Goal of “ No Hunger.”
by ASMITA SOOD — jinnie sood
A community with a sense of togetherness🌎, procuring all the facilities to triumph over COVID-19. |
Grounds Management, Safety
A Primer on Cleaning, Disinfecting, and Protecting Human Health
Many building owners and managers realized when the COVID-19 pandemic arrived that they were not well versed in the rudiments of cleaning and disinfecting. In fact, many believed the two were the same, even interchangeable. That is not the case.
In some instances, steps were taken to prevent the spread of COVID-19 that later proved to be ineffective. Either the wrong cleaning solution, sanitizer, or disinfectant was used, or it was not used properly.
Even though the pandemic appears to be moving behind us, building owners and managers must remain vigilant and should have a solid understanding of what cleaning and disinfecting are all about. After all, the professionals’ job, now more than ever before, is to take steps to ensure the health and safety of their tenants and other building users.
With that said, consider the following a “primer” on these products and their use. The more that building owners and managers understand what these products are and how they should be used, the more effective the professionals will be at protecting human health.
The first thing we need to clarify is cleaning. Cleaning can be defined as the removal of soils, contaminants, and even pathogens from surfaces.
During the pandemic, the Centers for Disease Control and Prevention (CDC) reported that in most situations, cleaning using just water and an effective cleaning agent likely was all that was needed to keep surfaces healthy and remove the pathogen that caused coronavirus.
However, in almost all cases, before a sanitizer or disinfectant can be used, the surface must be cleaned first. By removing soils from the surface, a sanitizer or disinfectant will be more effective.
With this understood, here are some additional facts building owners and managers should know about these products:
Before COVID-19, sanitizing was all that was considered necessary to protect the health of building users. A sanitizer reduces the number of pathogens on a surface to what is regarded as a safe level for public health. Sanitizers are also less costly than disinfectants (which we will discuss next) and easier to use.
Whereas a sanitizer reduces the number of pathogens on a surface, a disinfectant eliminates (or kills) pathogens on a surface. However, there are some caveats. For instance, not all disinfectants are engineered to eliminate every type of pathogen. The product label will indicate which pathogens it is designed to eliminate when used properly. These are referred to as “kill claims.”
Very often, building owners and managers will not know what types of pathogens are on the surface. They just know that the surface should be disinfected. In such cases, a “general,” or “broad range,” disinfectant should be used.
During the pandemic, the U.S. Environmental Protection Agency helped us make our disinfectant selection. The organization compiled a list of disinfectants proven to effectively eliminate the coronavirus, referred to as “List N.”
Our primer must include a few more critical points about disinfectants and their use.
This image has an empty alt attribute; its file name is Micheal-Wilson-Headshot-150x150.jpg
Michael Wilson
For instance, disinfectants must dwell on surfaces for a few minutes before being wiped away. This ensures a disinfectant is effective. The dwell time will be listed on the product label.
However, should the disinfectant dry while on a surface, the entire surface must be cleaned again, and the disinfectant reapplied.
And two more things—we already mentioned that there are general or broad-range disinfectants. There are two more types of disinfectants that building owners and managers should be aware of.
A limited disinfectant is designed to be effective only against a specific group of microorganisms or pathogens. For instance, some disinfectants are designed to be effective primarily against the microorganisms that cause the norovirus.
Another type of disinfectant is a hospital-grade disinfectant. These disinfectants have proven effective at eliminating many types of nosocomial (healthcare-acquired) bacterial pathogens. As the name implies, they are generally used in hospitals, clinics, dental offices, or other healthcare-related facilities.
More Points
To ensure our primer is complete, there are some more things to discuss about sanitizers and disinfectants. Among these are the following:
Costs. When selecting sanitizers or disinfectants, it is especially important not to make the selection based on the product’s price. The “sticker price” may have nothing to do with what the product actually costs to use. To determine value for money, check the dilution ratios. More water and less disinfectant is more cost-effective.
Corrosive. Some sanitizers and disinfectants may prove corrosive to metalworks. Be aware of this and test the product first before extensive use.
Immunity. Pathogens can become immune to certain disinfectants just as we can become immune to certain antibiotics. To address this, use different types of disinfectants from different manufacturers. They typically will have different ingredients or a different mixture of ingredients to help prevent pathogen immunities.
Mixing. Never mix two different sanitizers or disinfectants together.
Dilution. The product’s dilution ratios will be clearly posted on the label. These must be adhered to. Too much chemical or too little chemical can impede sanitizing and disinfecting effectiveness.
“Quats.” Quat binding occurs when the key ingredients in a disinfectant become absorbed into a cleaning cloth or mop, reducing the effectiveness of the disinfectant. One way to prevent this is to always spray the disinfectant on the surface to be cleaned, not on the cloth. Also, change both the cloth and the mop head frequently.
As you can see, there is a lot to know about cleaning, sanitizing, and disinfecting. Building owners and managers should also be aware of one more thing: Do not go it alone.
Astute janitorial distributors can be walking encyclopedias when it comes to cleaning, sanitizing, and disinfecting. Furthermore, they have really proven their value for many building owners and managers during the pandemic.
This is because they have helped guide owners and managers into selecting specific products and disinfecting technologies proven to help stop the spread of the virus, keep people healthy, and–what is most important now–keep facilities open and operating.
Michael Wilson is Vice President of Marketing and Packaging for AFFLINK, a global leader in supply chain optimization, packaging, and marketers of advanced cleaning products and technologies that minimize the spread of infection. |
State-Sponsored Religious Discrimination Rises with the Pandemic
The health crisis has provided both motivation and cover for increased persecution of minority faith groups.
Religious freedom in India during COVID-19
Volunteers in India distribute food during the month of Ramadan to people who are unable to make money in the emergence of COVID-19. Image credit: Sanjoy Karmakar /
At the height of the Black Death in the 14th century, rumors circulated throughout Europe that Jews were deliberately transmitting the plague by poisoning wells. Rather than quell these rumors, some governments effectively endorsed them and incorporated them into official policy. In 1349, the city fathers of Brandenburg passed a law that preemptively condemned the Jewish community for spreading the disease:
Should it become evident and proved by reliable men that the Jews have caused or will cause in the future the death of Christians, they shall suffer the penalties prescribed by law, as it is said that the Jews have elsewhere dispatched many person through poisoning.
Similarly during the latest global pandemic, some governments have blamed minority faith groups for the outbreak of the coronavirus and used the crisis to justify further repression of religious communities that had already been suffering from severe marginalization.
As governments around the world respond to COVID-19, local activists and democratic partners must help ensure that political leaders are not exacerbating tensions between religious groups, and that official actions aimed at fighting the virus do not single out and restrict the rights and religious practices of minority faith communities.
Hate encouraged from the top
In a number of countries that have faced outbreaks of the coronavirus, political leaders have verbally lashed out against certain religious minorities, using hateful language in their speeches, official statements, and social media posts that has widened social divisions and fueled bigotry among their supporters.
Over the past several weeks, India has emerged as the most prominent example of this phenomenon. As media outlets and human rights organizations—including Freedom House—have reported, prominent politicians in the right-wing government of Prime Minister Narendra Modi have demonized the country’s Muslim community, which they hold responsible for spreading the coronavirus.
Yet India is hardly the only country whose officials’ words have reinforced widespread prejudices against religious minorities. In Cambodia, for instance, a Facebook post in March by the Ministry of Health referenced groups of people who had contracted the virus, including adherents of “Khmer Islam.” The post was followed by a barrage of hateful online comments aimed at the country’s small Muslim community. Despite the government’s subsequent attempts at damage control, Cambodian Muslims have since reported facing increased discrimination from their Buddhist neighbors.
Discrimination as policy
In addition to engaging in divisive language, some leaders have implemented policies that disproportionately hinder the rights and freedoms of their nation’s minority religious groups, supposedly as a means of combating the spread of the coronavirus.
Officials in Pakistan’s Balochistan Province have blamed Shia Muslims from the ethnic Hazara minority for the spread of the coronavirus. In the provincial capital, Quetta, authorities completely sealed off two Hazara areas, forbade government employees from traveling to Hazara neighborhoods, and furloughed Hazara policemen due to a suspicion that they were infected.
Similarly in Saudi Arabia, where Shias are in the minority overall, the Shia-majority governorate of Qatif was placed under full lockdown on March 9, after a group of Shias tested positive for COVID-19 following religious pilgrimages to Iran. Because Qatif was the only governorate to be completely locked down, the actions drew charges of unfair treatment from Shia residents, who have long been marginalized by the Sunni-dominated government in Riyadh. The lockdown has been eased in recent weeks, but a curfew and other severe restrictions on movement are still in place. Some analysts worry that the regime will weaponize the crisis to extend some restrictions indefinitely, preventing Shias from strengthening ties with their coreligionists in neighboring countries.
In Buddhist-majority Sri Lanka, the government has needlessly suppressed the Muslim minority’s burial practices by making cremations compulsory for coronavirus victims. International experts say that burial and cremation are both acceptable ways of dealing with the bodies of COVID-19 victims, and Sri Lankan Muslim leaders and human rights groups argue that the cremation decree is a violation of religious freedom. Resentment against the policy has deepened since a Muslim family claimed that authorities coerced them to sign a consent form for a family member’s cremation, despite subsequent tests showing that she did not die of COVID-19.
Some governments have also discriminated against religious minorities by excluding them from programs aimed at assisting COVID-19 victims, or by providing them with less support than is offered to citizens from the majority group. In some areas of Pakistan, for example, authorities have reportedly refused to give food aid to Christians and Hindus, stating that assistance is reserved for Muslims. In India, both private and government-run hospitals have been accused of providing Muslim COVID-19 patients with lower-quality care. In the state of Gujarat, which is governed by Prime Minister Modi’s Hindu nationalist Bharatiya Janata Party, a government hospital is placing Muslim and Hindu coronavirus patients in separate wards, prompting accusations of apartheid.
The need for vigilance
In each of these cases, the scapegoating has not occurred in a vacuum. Rather it has come after years or even generations of social and political marginalization. This reality underscores the need for international partners and local human rights activists to combat all forms of discrimination and bigotry during ordinary times, because such patterns can erupt into something far deadlier during a period of crisis like a global pandemic.
Many countries whose governments are deeply antagonistic toward minority faith groups have not yet faced coronavirus outbreaks on the scale of those in India or Pakistan. As more nations experience massive increases in new COVID-19 cases, defenders of fundamental rights should pay close attention to elites’ rhetoric and policy choices vis-à-vis religious minorities and other vulnerable communities, who will likely bear the brunt of any effort to shift blame for flawed government responses and the suffering of the population as a whole. |
You may have seen videos circulating online of electric cars catching fire during accidents. Are these just rare occurrences, or are electric vehicles and their batteries really more dangerous than their gas car counterparts? The short answer is that electric cars are not more dangerous than traditional gas cars. If anything, they’re actually slightly safer.
In this article, we’ll go over the safety of electric vehicles (EVs) and compare them to traditional internal combustion engine (ICE) cars. We’ll also discuss the safety of electric batteries during collisions, and some risks involved with EVs that you may want to be aware of.
Let’s get started.
The Safety Features of Electric Vehicles
The majority of electric vehicles (EVs) you’ll find on the road today are very new. That alone makes them very safe when compared to the average internal combustion engine (ICE) car that’s been on the road longer and sports safety technology that was required before recent laws were in place.
Tesla Model 3 Vehicles
Tesla Model 3 Electric Vehicles / Photo courtesy of Seungho Yang / CC BY-SA 4.0
For example, thicker A and C pillars, the structural components of the car that create the “greenhouse” where driver and passengers reside, are the product of updated roof-crush standards that went into effect back in 2012.
Because EVs haven’t yet acquired enough market-share to make them commonplace, people still think of them as premium models. That gives manufacturers the incentive and the pricing flexibility to incorporate advanced safety features into nearly every new EV. Considering how important these new vehicles are for lowering automaker fleet emissions, it makes sense that the top brass wants these cars to be safe and to be seen as safe.
The Tesla Model 3, Chevrolet Bolt and Volkswagen E-Golf all received perfect 5-star crash test ratings from the NHTSA (National Highway Traffic Safety Administration).
Tesla Model 3 NHTSA Crash Test
Tesla, the brand most commonly associated with electric vehicles, includes a slew of additional safety features that have led some people to call Tesla cars the least likely cars to have a crash in.
These features, which include Tesla’s advanced lane-following cruise control called “autopilot,” collision avoidance, and lane departure warnings in addition to a powerful backup camera system are all available on luxury models from competing brands.
However, Tesla’s consistent use of thorough safety features in every model produced is setting the bar high for other automakers who would like to participate in the EV market. A full set of airbags is only the beginning.
Some of the most impressive examples of these safety features in-action involve Tesla’s “active” safety features, a component of the Autopilot package. For example, one feature ensures that when the system is engaged, the driver continues to pay attention to the road.
It monitors the placement of the driver’s hands on the car’s steering wheel. If the driver’s hands are removed, the car sends an alert using audio and visual cues. If the driver leaves their hands off for a prolonged period of time, the car will gradually slow to 15 mph below the speed limit and will turn its emergency flashers on.
Tesla Model S Interior Screen
Tesla Model S Interior / Photo courtesy of Marco Verch CC BY 2.0
Tesla is so confident in the safety of their cars that they’ve designed a new product around that safety. More specifically, they’ve determined an insurance policy. Because of their high cost to repair, Teslas can be expensive to insure.
That said, if a good driver avoids accidents and tickets consistently under Tesla’s new policy, they are eligible for a 20% discount. It’s a clever way to incentivize what is an admittedly expensive car through the recoup in insurance costs.
But what about the potential risks of EV batteries in collisions? Let’s talk more about that.
Are Electric Car Batteries Dangerous in Collisions?
One of the stories that has kept Tesla in the news involves the unpleasant tendency of Tesla vehicles to catch fire after a car’s battery gets too hot. In some instances, electric vehicles (EVs) have burned completely to the ground.
Location of an EV Battery Pack (In Orange) / Image courtesy of Norsk Elbilforening / CC BY 2.0
What would happen in a crash if such a volatile battery were exposed to the extreme trauma of impact? Would an EV explode and injure passengers?
The short answer is no: batteries do not make electric vehicles any more dangerous in collisions than traditional gas cars. But how is it that a battery containing so much heat and energy can be safe in a collision?
The prospect of fire in a car accident is nothing new. You might be familiar with the oft-repeated story of the Ford Pinto, a car that had a gas tank located just so that when the car was rear-ended, it was extremely likely to spark and catch fire. At worst, it could even explode.
Liquid fuel suffers from all of the same risks as batteries when it comes to the potential for heat and explosion. To make ICE cars safe, manufacturers have designed around the risky fuel tank and implemented systems that prevent such a catastrophic situation.
That fact is not lost on the people who design and engineer electric cars. It would be irresponsible and unreasonable to suggest that transitioning to this new power source came with the risk of imminent explosion in the case of an accident. If so, people just wouldn’t buy the cars.
A study commissioned by the NHTSA supports the idea that electric cars are probably slightly safer than ICE cars in a collision in their current state. However, there is more progress to be made. We know a great deal more about why gasoline-powered cars catch fire than we do about how their EV counterparts heat up.
EV Battery Safety Features
Even when EV batteries are operating normally, they still generate vast amounts of heat. Without significant cooling, the batteries would suffer from a high risk of catching fire.
To keep this from occurring, Tesla and competing brands use extensive cooling systems that use liquid coolant to pull heat away from the batteries, similar to the radiator in your ICE car. In a Tesla, these systems are designed to isolate cells of the battery that do catch fire, ensuring that even if one cell overheats, neighbouring cells do not.
Additionally, Tesla incorporates a dedicated firewall structure between the battery and passenger compartment on their cars. A recent software update has even modified the Model S suspension settings so that when the car is driving at highway speeds, the adjustable suspension raises the car further from the ground and any debris that could potentially lead to an impact and subsequent fire.
It’s not just Tesla pushing for better safety in EV’s though. Established electronics provider Bosch recently revealed a new technology that uses highly localized explosive charges to separate the car’s electrical system from the battery when an impact is detected.
This eliminates the risk of batteries continuing to heat up after a collision, one of the reasons Tesla fire incidents can occur long after an initial collision, a scary reality for EV owners.
Other Potential Risks Involved With EV Accidents
Just because a vehicle is electric doesn’t make it self-driving, and while safety technology is exceptional for many EVs there are certain realities to be aware of. Perhaps one of the most overlooked is the misleading name Tesla uses for its “Autopilot” system.
Multiple news stories have come about when owners who were not paying enough attention crashed their Teslas with the system engaged. The Tesla AI is good, but something like Cadillac’s “Supercruise” nomenclature could go a long way to eliminate feelings of false confidence.
Experience will continue to be a major factor in our ability to respond to EV crashes effectively and engineer safer EVs. There just have not been as many EVs crashed as there have been ICE cars, and that is likely to remain the case for decades.
First responders are trained for and experienced in responding to the symptoms of an ICE car crash, but a battery fire requires different tactics to put out. In the future, expect to see new methods in use, designed specifically to combat battery fires.
Ultimately, travel by car will retain some of the inherent danger it always has, even in this new era of the electric vehicle. However, cars today are the safest they’ve ever been.
EVs are beginning their golden age with a 150-year start on ICE cars. So if you have any concerns about safety relative to the dinosaur-powered alternative, you can put them to rest. Electric vehicles are safe, and they’re only going to get safer in the future.
About the Author: Dylan Bartlett
Dylan Bartlett, aka, “The Regular Guide,” writes about a range of topics on his blog. Check out his site, Just a Regular Guide, for more, or follow Dylan on Twitter @theregularguide for frequent updates.
Similar Posts
Leave a Reply
|
Skip to Main Content
ENGL 286: Writing for the Workplace - Hamrick: Explore topic keywords
Research a problem, issue, concern in your proposed job field
Encyclopedias to explore
Name your topic
First thing is to write down what keywords including synonyms you know that describe your topic.
ex 1. Ebooks, E-books, electronic books, digital libraries
ex. 2. E-rate, Telecommunications Act of 1996
Change your point of view to expand search
Look at your topic from BROADER, NARROWER, and RELATED point of view.
example 1: topic is e-rate
BROADER: digital divide, internet in schools (or libraries)
RELATED: filtering internet
example 2: topic is e-books in libraries
BROADER: digital information, internet, book industry
NARROWER: E-book pricing, e-book licensing
RELATED: online textbooks, publisher bundled collections, leasing versus ownership, first-sale doctrine |
January 23, 2022
Medical Trend
Medical News and Medical Resources
CAR-T cells and oncolytic viruses jointly treat solid tumors
CAR-T cells and oncolytic viruses jointly treat solid tumors
CAR-T cells and oncolytic viruses jointly treat solid tumors. The adoptive transfer of chimeric antigen receptor (CAR) modified T cells has led to long-term and unprecedented success in patients with leukemia and lymphoma.
However, CAR-T cells have limited therapeutic effects on solid cancer. The new method will need to simultaneously overcome the multiple challenges encountered by CAR-T cells in solid tumors. The main reasons include the immunosuppressive tumor microenvironment and the heterogeneity of antigen expression. Oncolytic viruses are anticancer drugs with solubility and immunogenicity.
They have the potential to act synergistically with CAR-T cells and can be used to treat solid tumors. In addition, the virus can be further modified to selectively deliver therapeutic transgenes to the tumor microenvironment, which can enhance the effector function of tumor-specific T cells. This review summarizes the main limitations of CAR-T cells in solid tumors and discusses the potential role of oncolytic viruses as partners of CAR-T cells in the fight against cancer.
CAR-T cells in solid tumors: challenges and limitations
Although most of the early CAR-T cell trials for solid tumors have led to poor treatment results, some case reports have shown that they have controllable treatment-related toxicity and good clinical responses provide clear reasons for optimistic prospects ( 13, 14).
The latest reports on second-generation CAR-T cells indicate that CAR-T cells can be transported, sustained and proliferated in tumors (9, 10). In addition, evidence of transient anti-tumor activity has been observed in patients with refractory tumors, such as glioblastoma (13), neuroblastoma (14), pancreatic cancer (12), and sarcoma.
Here, we summarize the lessons learned from these clinical trials and discuss the obstacles that must be overcome for effective CAR-T cell therapy, focusing on the challenges that OV may help to solve.
Delivery, diffusion and persistence
The ability of tumor-specific T cells to deliver, proliferate and last to tumors is considered essential to achieve an effective anti-tumor response (14, 29, 30). Although T cells can be actively transported to the disease site, tumors are usually inflamed to a low degree and lack the chemokines required for migration.
Similarly, physical disorders, such as abnormal vasculature, increased matrix stiffness and higher tissue pressure, may impair T cell infiltration. Once in the tumor, CAR-T cells must proliferate effectively and continue until the tumor is completely eliminated.
However, due to the internal (T cell adaptability) or external factors (tumor microenvironment) of T cells, the proliferation and persistence of T cells are often hindered. If local delivery and redo of CAR-T cells is a treatment option, the requirements for proliferation and persistence can be relaxed in some cases (31).
For example, in a recent clinical trial, for patients with glioblastoma, multiple intracranial injections of CAR-T targeting IL13Rα2 mediated a transient complete response (13). In this patient, two intracranial CAR-T cell delivery routes were tested: intracavity and intracerebroventricular.
Although intracavitary therapy can only control the growth of local tumors, intraventricular therapy has led to a significant reduction in the size of all intracranial and spinal tumors. These results highlight the importance of transportation and administration routes to achieve optimal tumor response.
Developing strategies to enhance delivery and durability to increase the input of therapeutic CAR-T cells in tumors will represent a direct development in this field.
Tumor immunosuppression
After reaching the tumor, CAR-T cells will encounter an immunosuppressive environment, which prevents T cells from exerting their full therapeutic potential. The main obstacles that CAR-T cells need to overcome once in a tumor include:
1. Inhibition of immune regulatory cells, including myeloid-derived suppressor cells (MDSC), tumor-related macrophages and neutrophils, and regulatory T cells;
2. There are a series of immunosuppressive molecules, such as IL-10, TGF-β, PD-L1, IDO and arginase-1;
3. Microenvironmental factors such as low oxygen, low pH and nutrient depletion. These conditions, coupled with long-term antigen exposure, can cause T cells to enter different stages of dysfunction (32-34). In addition, the stromal microenvironment can actively exclude T cells from the vicinity of cancer cells (35).
Finally, a recent clinical report indicated that after the activation of CAR-T cells in the tumor, the tumor microenvironment may become more immunosuppressive, which may be caused by the initial production of IFN-γ (10). Finding ways to prevent or reverse T cell dysfunction by reversing tumor immunosuppression will be the key to improving treatment.
Tumor escape due to lack of antigen expression or heterogeneity
One of the main limitations of using CAR-T cells to treat solid tumors is the lack of cancer-restricted antigens that are uniformly expressed in tumor cells and do not exist in basic organs. Tumor escape due to heterogeneity or lack of antigen expression is an emerging threat to CAR-T cells because it may lead to overgrowth of target-deficient tumor cells that are invisible to CAR-T cell therapy (36-38).
Preclinical studies have shown that CAR-T cells can preferentially eliminate tumor cells that express high levels of targeted antigens, while tumor cells that express the lowest levels can survive (39-41).
Reduced expression of targeted antigens after CAR-T cell therapy has been observed in some clinical trials, including those against Her2 (9), EGFRviii (10), IL13Rα2 (11) and mesothelin (12). These results demonstrate the potential of CAR-T cells to eliminate antigen-positive tumor cells, but they also highlight the importance of designing new strategies that target different antigens at the same time.
Several groups are designing new CAR constructs that can target more than one antigen at the same time (39, 42, 43). While reducing the risk of escape, these strategies may also lead to increased extra-tumor reactivity outside the target, because most targeted antigens can be expressed at low levels in healthy tissues (17-19).
Another method is to find a strategy to activate the endogenous immune response, which can be combined with CAR-T cells to completely eliminate tumors. Some reports indicate that CAR-T cell-mediated tumor destruction may lead to the release of other tumor antigens, which are cross-presented in a process called epitope spread (44, 45). This observation requires further research, but it can explain the complete elimination of tumor lesions even when tumors cannot uniformly express their targets (13).
Oncolytic viruses: lessons learned in clinical trials
To date, there are three viruses that can be used to treat cancer: T-VEC approved in the United States, H101 approved in China and Rigvir approved in Latvia, Georgia and Armenia. Several other viruses are also in clinical trials and may eventually be added to this short list of listed viruses (46).
Some of the lessons learned from clinical trials will drive the design of future treatments, including:
(A) OV can produce therapeutic benefits for cancer patients without serious adverse reactions, including complete remission (47-50). Interestingly, some of these complete responses can be achieved after virus elimination, which suggests that complete tumor elimination may depend on the activation of immune-mediated anti-tumor responses (48). Based on this observation, a recent clinical trial reported that patients treated with chimeric poliovirus can maintain an overall survival rate of 21% for a few months after 1 year of treatment (51). This plateau in long-term survival is similar to the plateau observed in Kaplan-Meier curves for cancer patients treated with other cancer immunotherapies, and highlights the role of the immune system in the emergence of long-term survivors (52).
(B) Antiviral immunity is an obstacle to OV because it isolates or neutralizes virus particles before they reach the target. A major problem is how to effectively deliver the virus to the tumor.
(C) A few days after treatment, virus replication was detected in the tumor biopsy. However, antiviral T cells limit the ability of OV to survive and spread in tumors (47, 48, 53).
(D) OV-treated tumors usually show increased immune cell infiltration, including activated macrophages and cytotoxic T cells, as well as pro-inflammatory cytokines (47, 48, 53). Tumor-specific T cells have been detected after treatment with OV (53, 54). Although the ability of OV to expand neoantigen-specific T cells deserves further study, the potential of OV in combination with immunotherapies such as immune checkpoint inhibitors has been widely recognized (28, 55-58). Several clinical trials are currently testing the combination of OV and immune checkpoint therapy, and preliminary reports have shown encouraging results (23, 24).
Oncolytic virus: an ideal ally for CAR-T cells?
It is possible that OV can work synergistically with CAR-T cells by helping CAR-T cells to overcome multiple obstacles found in solid tumors at the same time.
First, the virus provides a danger signal that can reverse the immunosuppressive effect of tumors, thereby promoting the transport, proliferation and persistence of CAR-T cells in the tumor microenvironment.
Second, the direct lysis of cancer cells by OV leads to tumor lysis and the release of tumor-associated antigens (TAA), which can induce anti-tumor adaptive responses, which may alleviate tumor escape caused by antigen loss.
Third, OV can be equipped with therapeutic transgenes, which can further enhance the effector function of T cells. Here, we provide an overview of the biological characteristics of OV that can be considered when selecting a viral platform to combine with CAR-T cells, and we summarize the recent preclinical strategies that have been explored to combine CAR-T cells and OV.
Oncolytic viruses as immunotherapeutics
The immune system is well-equipped to carry out innate inflammatory response to the virus, which will eventually induce the infiltration of effector T cells. In particular, OV has pathogen-associated molecular patterns (PAMPS) detected by pattern recognition receptors (PRR) on tumors and epithelial cells, as well as macrophages and dendritic cells (59).
These PRRs can induce a dangerously related molecular pattern (DAMP) that is characteristic of immunogenic cell death (60, 61). PRRs also use NF-kB signaling to induce the expression of cytokines such as TNF-α and IL6, and induce type I interferon through IFN regulatory factors (IRF) and activate mature IL-1β caspase 1 (62) .
This pre-immune cytokine environment can promote the maturation and function of DCs, macrophages and epithelial cells, leading to the recruitment of neutrophils and natural killer (NK) cells, monocytes and memory T cells to the site of infection (63 -65).
Tumor cells that die due to the lytic activity of OV can release TAA. The activated DC of MHC with virus and/or tumor epitope can flow to the draining lymph node, combine with specific T cells and stimulate their proliferation and circulation into the blood.
The chemokines of the infected tumor can induce the expression of integrins on these T cells and the expression of selectins on endothelial cells, thereby allowing them to penetrate. Under these conditions, T cells can be effectively recruited to infected tumors, and as mentioned above, increased T cell infiltration is usually detected in the tumors of patients treated with OV therapy.
Interestingly, viral infections have been shown to induce neo-antigen-directed T cell responses (53, 54), which can act synergistically with CAR-T cells and virus-specific T cells to eliminate tumors. The limitation of studying the influence of OV on the immunomodulatory effect of CAR-T cell therapy is the lack of good animal models.
However, it can be assumed that after a more immunogenic tumor environment is established, the target cells may be killed more effectively due to the cooperation between effector T cells. The ability of OV to induce an anti-tumor immune response is now considered to be a key mechanism of action for obtaining a long-term anti-tumor response. Therefore, most of the current efforts aimed at improving the therapeutic potential of OV have focused on improving its ability to induce systemic anti-tumor responses.
Oncolytic virus arsenal
Many types of viruses are used in the treatment of cancer viruses, each of which has its own unique characteristics (Table 1) (66). Here, we discussed some of the different factors that should be considered when choosing an OV that binds to CAR-T cells. Generally speaking, viruses that replicate in the cytoplasm (RNA viruses) kill tumor cells faster than nuclear cells (DNA viruses) because they do not need to reach the nucleus of the infected cell. But for the same reason, they provide fewer opportunities for selective tumor control.
Most oncolytic RNA viruses (such as reovirus, picornavirus (Coxsackie virus, Riga virus), rhabdovirus (vascular stomatitis virus [VSV], Malaba virus) and paramixed virus ( Measles virus, Newcastle disease virus [NDV]) tumor-selective replication depends on the defect of the interferon pathway in tumor cells. Since IFN induction is the central pathway of virus innate response and can enhance adaptive T cell response, it is expected that these viruses The inflammatory response will be lower.
DNA viruses (such as adenovirus) have a slower replication cycle, but tumor-selective promoters can be used to control the nucleus of infected cells. The presence of the envelope also determines the oncolytic properties of the virus. Enveloped viruses (for example, measles virus, NDV, VSV, herpes simplex virus, and vaccinia virus) germinate from cells and are less capable of “decomposing” than naked viruses. Envelope also contributes to the main clearance mechanism in the blood, and complement plays a major role in enveloped and non-enveloped viruses. Size is also an important parameter of OV properties. The smaller the virus, the easier it is for the virus to penetrate and spread throughout the tumor. But larger viruses with larger genomes can insert non-viral transgenes. Arming OV with therapeutic transgenes can provide opportunities to supplement OV in a variety of ways.
Among RNA viruses, in contrast to parvovirus and reovirus, VSV, measles virus, and NDV can accept transgenes, while for DNA viruses, adenovirus, herpes simplex virus, and vaccinia virus can be equipped with transgenes, compared with parvovirus.
The list of potential genes contained in OV that may be used in combination with CAR-T cells is long and has recently been reviewed (67). It includes: (a) inducers of immunogenic cell death (68), (b) transgenes that directly regulate the immune system, such as cytokines (22, 69–71), chemokines (72, 73), co-stimulation Proteins (74–77), bispecific T cell adaptors (BiTE) (78, 79) and immune checkpoint blockers (80–83), and (c) matrix-degrading proteins that may promote the spread of OV and T cells Inside the tumor (84, 85).
Considering the limitations of preclinical immunological mouse models, comparing viruses and transgenes is a very challenging task. In this model, many human viruses have replication defects, and tumors cannot be as slow as humans. And gradually edit the immune system.
CAR-T cells and oncolytic viruses jointly treat solid tumors
Combining CAR-T cells and oncolytic virus to treat solid tumors
At the pre-clinical level, several groups have begun to combine CAR-T cells to test different transgenic arms OV (Figure 1). Most of these studies have evaluated the anti-tumor effects of these therapies on NOD scidγ (NSG) mice, which are completely lacking in adaptive immunity and severely lacking innate immunity (86). NSG mice allow the implantation and persistence of adoptively transferred CAR-T cells, while human tumor xenotransplantation allows virus replication and transgene delivery.
Therefore, these studies provide important information in the anti-tumor effects of combining CAR-T cells with oncolysis and transgene delivery. An important limitation is that these tumor xenografts cannot be used to assess the ability of OV to induce anti-tumor immunity.
CAR-T cells and oncolytic viruses jointly treat solid tumors
It has been shown that modified oncolytic adenoviruses that can express IL-15 and RANTES (87) or IL-2 and TNF-α (88) can increase the accumulation and survival of CAR-T cells in the tumor microenvironment. Similarly, for the purpose of enhancing the internal transport of tumors, vaccinia virus expressing CXCL11 (a CXCR3 ligand) is used to attract effector cells after metastasis (89).
Another report showed that the expression of BiTE targeting the second tumor antigen by oncolytic adenovirus can resolve the heterogeneity of antigen expression (40). In the absence of CAR-targeting antigen or CAR expression (ie, untransduced T cell population), the CAR-T cell preparation is combined with OV-BiTE-induced T cell activation. In a slightly different way, the oncolytic adenovirus is combined with a helper-dependent adenovirus expressing PD-L1 blocking mini-antibody to reverse T cell dysfunction by preventing the PD1:PDL1 interaction (90). The co-expression of IL12p70 and PD-L1 further enhanced the therapeutic efficacy of the combination (91).
As expected, all these combinations of CAR-T cells and equipped OV can enhance tumor control and prolong survival compared to each drug as a monotherapy. The interesting discovery of Watanabe et al. is that CAR-T cells as a monotherapy cannot control the growth of primary tumors, while OV can inhibit the progression of primary tumors, but the mice die of metastatic disease. The combination of CAR-T cells and OV loaded with IL-2 and TNF-α can control primary tumors and tumor metastasis (88).
Finally, in a completely different and very preliminary approach, CAR-T cells have been used to deliver OV to tumors (92). Loading OV onto tumor-specific T cells (by adhering to the surface of T cells) can protect the virus from neutralizing antibodies while still maintaining anti-tumor efficacy after being released in the tumor microenvironment (96). OV tumor delivery of CAR-T cells can enhance virus delivery to tumors, and subsequent oncolysis can attract more CAR-T cells and establish a positive feedback loop.
Existing problems and future directions
For so many kinds of oncolytic viruses, it is difficult to know which one is most suitable for binding to CAR-T cells. In fact, it is difficult to imagine a virus that is commercially developed only for binding to CAR-T cells. Therefore, it is expected that the virus on the market or the virus undergoing clinical research will be the first virus to be combined with CAR-T cells for clinical use.
Although the general value of the virus in attracting T cells into tumors has been widely accepted (53, 97), practical issues regarding the optimal delivery route and dosing regimen are more difficult to predict. Intratumoral administration of OV can provide a large amount of virus in the injected tumor, but it is technically challenging for visceral tumors or metastatic tumors, and it is unlikely that any virus will change the immunosuppressive microenvironment if the tumor is not injected. Systemic intravenous administration is easier and may effectively reach all metastases, but it effectively neutralizes the virus in the blood, especially when high titers of neutralizing antibodies are produced after the first virus administration, which will be repeated Delivery set obstacles. If the virus is injected intratumorally or systemically, the immune response to the virus may also be very different. Usually immunization is performed subcutaneously or intramuscularly, because the immune system does not respond positively to systemic pathogens, partly because the inflammatory response of the cells is lower than that of the dendritic cells in the tissue, and the liver is tolerogenic (98).
Therefore, when the system detects the virus, it may tame or regulate the immune response caused by OV replication in the tumor. The timing of the virus and CAR-T cells will also affect the results. In principle, the virus should first change the immunosuppressive tumor microenvironment, induce direct lysis of tumor cells, and create a more suitable environment to attract CAR-T cells. Pretreatment of the patient should also be considered before treatment. Although the immune-stimulating environment generated by the virus may bypass the need for lymph node dissection to promote the expansion of CAR-T cells, lymph node dissection can still be a good method to promote virus replication and persistence in tumors, and at the same time is a common use. CAR provides advantages-T cells (4, 99, 100).
Oncolytic viruses provide a powerful inflammatory self-amplifying oncolytic mechanism of action, and can also lead to the release of TAA. However, the ability of OV to induce anti-tumor immune responses is not well understood. Given that there are a large number of viral non-self peptides after treatment with OV, the immune response to viral epitopes is likely to dominate the mixture with tumor neoantigens (101-103). New strategies are needed to increase the immunogenicity of tumor epitopes and reduce the immunodominance of viral antigens to promote the spread of epitopes (104).
Finally, T cells can also be manipulated to make them better partners for oncolytic viruses. Virus-specific T cells have been used as a platform for CAR expression (105). Virus-specific CAR-T cells retain the ability to recognize viral infection targets and tumor targets through their natural receptors and chimeric receptors, respectively. Therefore, these T cells may be ideal for combination therapy with OV, because the presence of the virus can promote the expansion of CAR-T cells in tumors. The disadvantage of this method is that it will produce a faster OV gap.
(source:internet, reference only)
Disclaimer of medicaltrend.org |
Baby Tips
Why Do Toddlers Need Outside Time?
Toddlers need outside time to grow and explore their world. The best way to do this is in a safe environment, such as the backyard.
Toddlers are naturally curious about everything around them. They also love being free of parental supervision, so they can run wild without fear of getting hurt.
As long as you have the right set up for your toddler’s safety, they’ll be happy running and playing until it’s time for lunch!
Most parents would agree they want their kids to be physically healthy and be well-rounded, independent and compassionate individuals.
What if we told you the best way to instil these qualities in your kids was to encourage them to spend more time outside?
That’s right. Online baby product directory at My Baby Nursery.
By encouraging younger kids to spend more time outside and away from digital devices, you’re not only aiding your child’s physical wellbeing, but you’re helping them improve their emotional and intellectual wellbeing, too.
Whether it’s a trip to the nature-inspired park or taking a hike through the woods with their family, there’s no denying the benefits of stepping away from the screen and into the sunshine.
Why Outdoor Play Is Important
When your child is outside, he probably has more space and freedom for significant movements, like running, jumping, kicking and throwing. Physical activities like these are suitable for your child’s health, fitness and physical development.
Spending time outdoors might lower your child’s chances of developing short-sightedness. And a bit of safe play in the sun can be good, too – small amounts of sunlight exposure can help boost vitamin D levels.
Physical Development Benefits of Outdoor Play
Children who play outdoors improve their motor skills, body mass index, overall health and muscle strength.
Spending active time outdoors as a kid is also essential for life-long health. Children that are active in their early years generally continue to be more active as they age.
Encouraging outdoor play in young children helps develop a healthy attitude about maintaining an active adult lifestyle.
Improved Motor Skills
Outdoor play has also been shown to leave kids with more advanced motor skills than their “indoor” peers, including coordination, balance and agility.
Kids who play outside are more likely to enjoy activities like walking, running and biking. When children are out, they have the space to run, walk, jump, swing and throw. They can play catch. They can crawl under bushes and climb trees, and ride bikes.
For kids who are athletes, extended time outdoors can also offer the opportunity and space to practice skills like batting, kicking and catching — whichever they need for the sports they’re learning.
Lower Body Mass Index
In 1980, just 7 per cent of kids were considered “obese.” Thirty years later, studies found upwards of one in three kids could be considered “obese.”
The culprit of this dramatic rise in childhood obesity is twofold—kids are eating more and spending less time being active.
Kids who spend more time playing outside are less likely to be obese because they are more active. They’re away from the television or computer screen. They’re running, jumping, climbing and generally burning more calories than their sedentary counterparts.
One study of preschool-age children showed a direct correlation between a child’s body mass index and the amount of time they are permitted to be active outside. The longer the child was allowed to play out, the lower their body mass index.
Studies have also shown kids who have close friends who also enjoy playing outdoors are more likely to spend more time outside.
Therefore, encouraging kids to choose active friends can also benefit them.
Improved Overall Health
Limiting a child’s risk of becoming obese has many long-term health implications.
Kids considered obese are at higher risk for problems like cardiovascular disease, asthma, diabetes and sleep apnea.
Not only that, but exposure to sunlight improves moods and strengthens immune systems.
Outdoor play has also been shown to benefit children with ADHD by giving them an outlet for the activity and energy that often creates issues indoors.
Improved Muscle Strength
Did you know when you’re pushing your child in a swing, all their muscles become engaged as they figure out how to hold on, sit up and follow the movement of the swing?
That’s right.
Most parents think of it as a repetitive, sometimes monotonous, playground activity that can help young children develop muscle strength.
Outdoor toys like scooters, bikes and even skateboards require your child to engage and strengthen a variety of muscle systems as well.
Social Development Benefits
While there are many physical benefits to outdoor play, it provides a massive opportunity for social development in children. Some of the most notable benefits include:
Increased Openness With Parents and Caregivers
When kids are indoors, they are often in smaller spaces and competing with other children, such as schoolmates or siblings, for attention.
It can get loud and overwhelming, which often causes kids — especially younger ones — to be intimidated and increasingly quiet.
That can prevent them from opening up and sharing with their caregivers.
When kids spend time outside, they generally feel less overwhelmed because they are not in a confined space and competing with others for attention.
This feeling of having the physical space to move and breathe often results in a child being more willing to open up and talk about things with their parent or caregiver.
Greater Self-Awareness
Kids who play outdoors are more likely to develop more robust reasoning and observation skills.
As we mentioned earlier, a playground activity like swinging has many physical benefits for kids, but it also allows them to explore the world from a different perspective.
It shows them how to be aware of the space they’re in and understand the concept of “cause and effect” as they see what happens when a grownup pushes them.
Appreciation for the Environment
In one study, 87 per cent of individuals who spent time outside as a child carried a love of nature into their adult years.
Of those same people, 84 per cent said they still considered the environment an important priority.
The reason for this is simple: By spending a lot of time outside, children learn to appreciate the environment because they have firsthand knowledge of plants and animals.
They’ve watched squirrels chasing each other up a tree. They’ve witnessed a sunset. They’ve caught ladybugs. They’ve planted flowers, climbed trees and explored parks.
As they grow, their fond memories of their childhood experiences lead them to more awareness and compassion to preserve the spaces they loved as children because they know their value.
Improved Peer-To-Peer Relationships
Not only are kids who play outside more self-aware, but their awareness of others and their feelings increase as well.
Studies have even shown that kids who play outdoors are less likely to bully other children. Outdoor play often requires imagination and teamwork, which helps children have positive interactions with each other.
That doesn’t mean there won’t be arguments over whose turn it is to go down the slide or shoot a basket, but, in general, kids who consistently play outdoors are more likely to get along with their peers and find common ground.
Of course, it doesn’t hurt that soaking up all that sunshine improves their moods as well. It’s harder to be angry at someone when you’re in a good mood!
Emotional Development Benefits
Baby Tips
In addition to outdoor play’s physical and social benefits, children who play outside regularly also tend to be stronger emotionally and more able to process things as they grow.
Use of All Five Senses
Preschoolers who watch a lot of TVs are only using two of their senses — sight and hearing. That can limit their ability to process and respond to sensory stimuli they encounter as they grow. On the other hand, children who play outside use all their senses by exploring the outdoors — perhaps even taste, as they catch snowflakes or raindrops on their tongues.
For younger children, this familiarises them with a variety of sensory experiences, so they can process them as they continue to grow and develop.
Develop a Sense of Independence
Being outside has been shown to help children develop their sense of independence. Even though a parent is usually close by, generally, children feel a sense of freedom when they’re at the park that they don’t experience elsewhere.
They get the chance to explore and take limited risks without feeling like an adult is breathing down their neck. They can invent games with their friends, explore their boundaries and figure out what they’re capable of doing.
The confidence that results from this will help them as they continue to learn and grow.
They can try tasks and activities they wouldn’t be able to do inside and apply problem-solving strategies to questions like, “Can I climb across those monkey bars?” or “Can I reach that net if I jump high enough?”
We have a wide range of baby nursery furniture to help you create the perfect room for your baby.
Intellectual Development Benefits
Many parents think the best way to develop their child’s intellectual abilities is to spend more time learning in an organised classroom environment.
But did you know encouraging your child to spend time outside is also a great way to develop their intellectual abilities? Outdoor play has the following key benefits.
Aid With Brain Development
When kids are running around outside, they are inventing games, exploring the world around them and experiencing feelings of independence.
Besides developing these feelings of autonomy, they also cultivate their organisational abilities and decision-making skills as they work individually and with their peers to create games, solve problems and implement their ideas and solutions.
As kids play, they also learn more about the importance of creating and following rules.
Improve Communication Skills
When they’re on the playground or at a park, kids have so many opportunities to meet other children and cultivate friendships with them.
They meet people who are different from what they are and develop the skills they need to play successfully with many other children.
While parents facilitate this to a degree, especially if they arrange playdates with friends to meet up in an outdoor space, playgrounds and other common outdoor spaces allow children the space they need to practice meeting and developing friendships without assistance from their parents.
Expanded Learning Space
Putting educational toys and materials outdoors gives kids a chance to learn new information and skills by playing.
It also shows kids they can learn anywhere, not just in classrooms and indoor learning spaces.
For example, as they keep score during games, they strengthen their ability to count and learn about relationships between numbers as the score increases.
Signs Your Toddler Need More Outside Playtime
Baby Tips
There’s no doubt that exploring nature and playing outside in the sunshine with their friends, siblings, and cousins is beneficial to our little ones.
But how do you know if your child is spending enough time outdoors?
It turns out there are some signs your toddler needs to play outside more than you can look for.
They Aren’t Meeting Gross Motor Milestones.
Being cooped up in the house doesn’t exactly give kids the space they need to climb, run, jump, and explore safely.
Occupational Therapists are trained to observe and evaluate children about their developmental motor and sensory milestones. Often, we see that some children do not have the same abilities to run, jump, climb, and complete motor activities the same way their peers or siblings do.
If this sounds like your child, not to worry. You can do things to help them become more active and bring your child’s motor skills up to speed — no pun intended.
Outside play and active, physical play, in general, is often a recommendation to parents so they can help their kids improve their motor skills.
They Get Tired or Frustrated Easily
Kids love to play outside, so it’s no wonder that they can run around for hours. But if your little one may need some help with endurance, playing outdoors can help.
Some children are weak and do not have good endurance to keep up with friends, so they might be tired, get frustrated easily, and avoid certain activities.
When it comes to outdoor play, let them spend as much time as they want outside.
It’s challenging to get too much time outside — as long as they’re wearing the right clothes and are safe, keep them out as long as possible.
They Need to Improve Their Coordination
If your child has trouble with coordination, they may need some extra hours outdoors.
Some kids also struggle with coordination and the ability to complete games with accuracy or precision.
They Have a Short Attention Span
This one is tricky because kids, in general, have a short attention span. Heck, even adults struggle with their attention span.
But children who spend too much time indoors may not be challenged enough and may need other types of play
So for some kids who may move quickly from one activity to another, or might be having meltdowns and tantrums, sometimes a break to play outside or play more actively can help them re-engage for a more extended period.
They Have Difficulty Regulating Their Emotions
We think every mom can relate to this one. Epic tantrums may be a sign your toddler needs to run off some steam and get out into the fresh air.
Outdoor play and physical play, even if it’s only for a short period of 15 to 20 minutes, not only helps kids stretch their muscles and improve their strength, but it can have an impact on their ability to self-regulate and manage their emotions.
Toddlers don’t yet have the language and cognitive development to explain their feelings and why rationally. It comes out in their actions.
Children who have been inside and need a change of scenery or more space to move may act out their frustration by throwing tantrums.
They also may try to stretch and move in spaces that are not conducive to gross motor play that can lead to injury or undesired incidents.
We have all been victim of an epic toddler tantrum, but the good news is, getting them outside may help even if it’s embarrassing when your kid decides to have one out of the house.
They Aren’t Sleeping Well or Eating Well.
Remember those days of playing outside in the sun all day and coming back into the house starving and exhausted?
When kids aren’t hungry at mealtimes or aren’t sleeping well, it could be a sign that they need to get out more.
Young children who don’t get sufficient exercise may display several behaviours, including not eating correctly at mealtimes or playing with food, being restless and not being able to concentrate, not settling at bedtime or sleeping through the night — this can lead to them being tired, which leads to them being overly prone to tantrums to tears.
Lethargic or Uninterested in Anything
Depending on the child and their mood that day, not having enough playtime outside could have the opposite effect and make them more tired.
Kids who stay indoors may become very lethargic and uninterested in anything. The fresh air of outdoor play may help get them moving and having fun.
Outdoor play has so many benefits for your kid’s health, happiness, and wellbeing, so get them and yourself outside as much as possible.
Outdoor Play for Toddlers
• throwing and catching balls
• wheeling, pushing or pulling different toys and objects
• blowing bubbles and chasing them as they float away
• playing in the sand, mud or small amounts of water – but always supervise water play to prevent drowning accidents.
Encouraging Kids to Play Outdoors
Whether your child is 2 or 12, it’s essential to encourage them to spend time away from the screen and enjoy the outdoors. We have a wide range of playpens for your baby right here at My Baby Nursery.
Exploring parks and playgrounds can be just the way to help your kids enjoy being outside, whether they’re playing alone or with their friends.
Scroll to Top |
Steve Jobs the Great Inventor
Category: Literature
Date added
Pages: 4
Words: 1146
Order Original Essay
How it works
Steve Jobs was born in San Francisco, California on 24th of February 1955. Steve was given up for adoption by his biological parents as an unnamed infant. Steve was adopted quickly by Clara Jobs and Paul Jobs; Mrs. Clara Jobs was an accountant and Mr. Paul Jobs worked as a machinist and was also a Cost Gard veteran. Mr. And Mrs. Jobs named the infant they adopted Steven Paul Jobs. Together Steve and his new parents lived in Mountain View, California though in later years the within this area would be called Silicon Valley with his new parents. Mr. Jobs being a machinist would take Steve into the garage where they worked on electronics. Jobs showed Steve how to take apart and put back together the electronics. This became a hobby that helped built courage and mechanical dexterity and perseverance in Steve Jobs as a kid. However, though Steve was a very bright kid being creative and smart Steve was a huge prankster in his elementary years because he was bored. Teachers had to bribe him to study, Steve did so well on tests that people at his school wanted him to skip to high school, this offer was declined by his parents.
As a young adult having just graduated from high school Steve enrolled in Reed College in Portland, Oregon however not knowing what to do dropped out only 6 months in then for the remaining 18 months dropped in on creative classes in the school. From doing these classes Steve found his love for Typography. A while later in 1974 Steve got a stop as a video game designer for Atari. A few months later Steve left Atari to travel to India and further places exploring psychedelic medicine. Though Steve didn’t know back then but during his time spent at Homestead High School he met Steve Wozniak his future partner and the co-founder of Apple Computers. When Steve was 21, he and Wozniak started Apple computer where it all started for Steve the Jobs garage. Steve and Wozniak sold Steve’s Volkswagen bus and Wozniak scientific calculator to fund the entrepreneurial ship of Apple computer. After the Apple company had some successes. Steve left the company in 1985 to the hands of John Sculley who joined Apple in 1980 he was a marketing expert hired to take over as CEO and thought that Steve was hurting Apple more than helping and he also didn’t have an official title there anymore. Steve went on to Pixar in 1986 which he bought from George Lucas Steve invested 50million dollars of his own money to get the company started. The company went on to make movies such as The Incredibles, The Toy Story series and Finding Nemo these movies collected 4 billion netted together. In 2006 Steve merged the studio with Walt Disney putting himself in the spot of largest shareholder for Disney. After Steve left Apple in 1985 he went on to begin the enterprise NeXT a new software and hardware company. NeXT however didn’t do so well and ended up being bought by Apple for 429 million dollars. By 1997 Steve had returned to his original post in Apple as CEO and returned Apples successes during the 1990s.
Need a custom essay on the same topic?
Order now
Steve’s big break was when he came back to Apple and restored it to its former glory, he got a new management team changed the stock options and enforced an annual salary many say that Steve put Apple back on track. Steve made amazing products like the iMac with eye catching designs along with good branding campaigns. During the next few years Steve created many more of these perfect devices and set the bar for the advancement in technology. Apple was the leader in the electronic industry and when they came out with a new device all their competitors raced to make comparable things. The data that Apple keeps quarterly improved greatly in 2007 stocks were up to 199.99 a share breaking the record as they have many. Apple also now had a huge profit a whopping 1.58 billion to be exact with no debt at all. Also, by 2008 Apple was the second-biggest music seller in the U.S. they came in second only to Walmart. All the work put into Apple payed off though as they have been ranked number one on 500 companies for returns to shareholders and Fortune magazine’s “America’s Most Admired Companies”. However, in 2003 Steve got a neuroendocrine tumor a rarely seen but operable shape of pancreatic cancer, Steve though chose not to go straight to surgery but to change his diet while thinking about Eastern treatments. The surgery got put off 9 months making Steves co-workers on the board of directors nervous as they believed that is word got out Steve was ill people would pull their stocks. By 2004 Steve had gone through a successful surgery. In 2009 however, Steves health problems had returned this included a liver transplant and hormone imbalance, a few days later Steve took a 6-month absence leave and through email explaining that health issues were more complicated than they thought, and that Tim Cook was in charge of day-today on goings. While all of this was going on though Steve kept on going as evident in the start of the paragraph.
Steve grew his successes with Apple from and garage experiment to one of the most popular computer and smart phone companies out there in the U.S. this all happened because he never gave up no matter what happened or how many times he failed Steve would make another until it was right. I mean for god sake people the guy got cancer put the surgery off for 9 months while continuing with the companies and then after the operation went right back at it. Then even when health problems returned to Steve in 2009, he kept going until he had to take a break and again went back to Apple until he finally in 2011 handed the company over to Cook in August and then in October died. While Steve was alive, he created iMac’s, iPhones, iPods (touch/ Nano), iPads.
Steve through all his year was a very gracious member of society always motivated to raise the bar and was extremely intelligent. From a young age Steve was always the inventor and this led to much success in his life. Through all his successes Steve gave back to society by making things that were and still are considered some of the best technology that the average person and afforded and own. Also, I think that many people saw Steve as a role model and a very good one at that Steve had a very good drive to succeed and look where it got him, I mean we all know what Apple is and for people to know a company that well it either has to be really good or a complete disaster which in this case it is the former.
Did you like this example?
The deadline is too short to read someone else's essay
Cite this page
Steve Jobs the Great Inventor. (2021, Apr 16). Retrieved from |
Top 5 things your vet wants you to know about your pets teeth
1. White teeth do not mean cleaning teeth
2. Train your pet for dental care early
3. Your pet is not too long for a cleaning
4. Non-anesthetized cleanings do not work
5. Just because you give dental chews doesn’t mean they should skip a cleaning
1. White teeth do not mean cleaning teeth
One of the biggest misconceptions when it comes to teeth is that lack of visible tartar means the teeth are healthy and disease free. Most of the bad breath and disease comes from the buildup of bacteria under the gumline. This can lead to infections that can damage the roots of the teeth and cause severe disease and pain to your pet.
2. Train your pet for dental care early
This is an item I discuss with all new pup parents. The more your pet is use to their mouth being positively manipulated, the better they and we will be overall. This training and practice helps pets and pet parents reduce stress when trying to have their teeth brush and mouth examined.
I recommend starting as young as possible and training as often as possible. Always practice positive reinforcement, having them lick something tasty from your hand or rub their gums with delicious peanut butter. Slowly work with them and their comfort level.
3. Your pet is not too old for a cleaning
One of the most common complaints veterinarians will hear is about in middle age to senior pets is about bad breath and ways to help. Unfortunately, most of these cases have already passed the point of a dental chew here or brushing there to help and will need a proper dental cleaning.
While age is not a disease, it does bring about changes. Because of this, their dental health should be taken seriously and addressed promptly, avoiding waiting until it is too late. This includes routine checkups, brushings, and proper cleanings. Each pet should have a thorough physical exam and comprehensive blood sampling to ensure they are good candidates for anesthesia.
4. Non-anesthetized cleanings do not work
We understand anesthesia can be scary and stressful for loving pet parents. However, reaching for other forms of dental care, like non-anesthetized cleanings, could actually cause far more harm than good to your beloved pup.
Non-anesthetized cleanings are merely cosmetic in nature. They remove tartar from the visible surface of the teeth, but ignore the far more important gumline. They can even trap tartar and bacteria in a pet’s gums, leading to serious dental disease. Additionally, there is major concern regarding how your pet is handled during these cleanings and their safety. Because of this, these types of practices are not recommended and should be avoided at all costs.
While some dental chews and treats are great, they are not meant to be replacements for routine dental care and cleanings. These items are meant to work in combination with routine cleanings and used as alternatives to traditional brushing if not allowed by pets. Kept your pets overall health in check and have their teeth reviewed yearly!
Talk to your vet today to learn how you can keep up with your pup's dental health!
Dr. Nicky
Leave a comment
Please note, comments must be approved before they are published |
Why Geckos Love To Lick Their Eyeballs
Image Source
Geckos are weird animals but at the same time, make loving and cute pets. Several unique gecko behaviors differentiate this lizard from its larger cousins, and one of these behaviors is eyeball licking. Find out why it licks its eyes and other crazy gecko behaviors from this guide.
Geckos lick their eyeballs
Image Source
Considered the oddest behavior that anyone has seen in geckos is that they often lick their eyeballs. You might notice geckos standing very still with their tongues quickly darting out of their mouths and wiping their eyes. A gecko can lick its eyes with its mouth open or closed. The tongue is long, but a gecko does not use this to capture prey from a distance like a chameleon. It can use its tongue to lick and pick up food and of course, to wipe its eyes.
Because geckos have large eyes
Well, just like we wipe our eyes or scratch them when something is inside our eyes, the gecko uses its large, sticky tongue to remove dust or dirt in its eye. Geckos usually have large eyes, with some species having larger eyes in proportion with their heads. So what happens when you have large eyes? Dust and dirt can easily stick on the surface of the eye, and this is very irritating.
The gecko’s eyes can easily dry up too because of its size, and this is also irritating for a gecko. Thus, it uses its tongue to moisten the surface of its eyes and relieve dryness, which is similar to why we use eye drops or why we splash our eyes with water when its dry and itchy.
Because geckos don’t have eyelids
Some geckos don’t have any eyelids, and therefore, they don’t blink. They use their tongue to lick their eyeballs to keep them crystal clear, clean, and moist. And actually, the lizard is licking the transparent lining that covers the eyeball.
A gecko will win staring contest hands down because it does not have eyelids! But eyelids are very important to the eye. Human eyes have eyelids to protect the eye from too much light, dust, water, and irritants. The eyelids become heavy when we are sleepy and when we feel tired because tells the eyes that we need to rest and sleep. Geckos sleep with their eyes open and the only way to tell if it’s asleep is that they retreat to their favorite spot to rest.
Some geckos have highly-developed vertical pupils that close the eyes to tiny slits to block the damaging rays of the sun. But some don’t have this adaptation and thus rely only on their tongues to protect their eyes.
Some gecko species cannot blink
Gecko species that don’t blink come with fixed, non-moving eyelids. Examples of these species are the Tokay geckos, crested geckos, and house geckos. These geckos have a spectacle or a part known as the clear scale that covers the eye than an eyelid. These geckos are experts in using their tongues to clean their eyes.
As mentioned before, the eyelids cover the eyes to protect it from very bright lighting. Gecko’s eyes are more highly-specialized than a human’s eyes as it can trap more light and see more vividly. It may use its tongue to reduce the strain on its eyes and to help remove any particles on the eye that can obstruct its vision.
Because geckos can’t use their limbs
The gecko’s tongue is similar to a windshield wiper, and the spectacle is similar to the windshield. Licking the eyes will help keep the spectacles from being too dry. You use your hands to cover your eyes to protect it or to scratch the eyes when irritated. Geckos can’t do this because of their short limbs.
Their hands or feet may reach their eyes, but doing this leaves them vulnerable to prey even for just a few seconds, and thus, they simply use their tongue to wipe their eyes.
Because it’s hard to see with dirty eyes
Wild geckos are naturally found on the forest floor and on trees, while geckos that can be found in human habitats prefer to stay on ceilings and walls. All these areas are dusty and dirty, and this makes a gecko’s eyes dirty as well. The gecko’s tongue keeps its eyes clear and dirt-free so that the gecko can see better and avoid predators better too.
Because it has to see well to capture prey
As much as geckos are a prey, these can also be predators as it feeds on small insects. It needs a clear vision so it can capture prey quicker. Small gecko species rely not on just with their quick movement but their eyes to see better to move about in their natural habitat. Not being able to see better with dirty eyes can cause accidents and may even cost a lizard its life if it is not careful.
Because their tongues are different
A gecko’s tongue is indeed very different from ours and from other animals. It is extra sticky, thicker, and longer (but not as long as chameleon’s tongue), and therefore, it may function as a fifth limb or an extra arm. Lizards can also control their tongues better, and thus they use it to wipe their eyes as well as clean their heads, arms, and other areas of their bodies without moving or changing their positions.
Because they can
Geckos can stick to any surface because they can as much as they lick their eyeballs too. So if you spot a gecko licking its eyes, just let it be. It may just be cleaning its eyes so it can see you better.
Why Collared Lizards Don’t Do Well in Captivity
Why Having Microhabitats for Frogs is A Good Method |
chapter 17 physical and cognitive development in late adulthood pdf
Chapter 17 Physical And Cognitive Development In Late Adulthood Pdf
On Monday, November 16, 2020 2:25:15 PM
File Name: chapter 17 physical and cognitive development in late adulthood .zip
Size: 1776Kb
Published: 16.11.2020
Free copies are not available at this time. Please contact your representative if you would like to reserve your free copy. Still Have Questions? Contact your Rep s.
Chapter 17 Physical and Cognitive Development in Late Adulthood.
We have seen that, over the course of their lives, most individuals are able to develop secure attachments; reason cognitively, socially and morally; and create families and find appropriate careers. Eventually, however, as people enter into their 60s and beyond, the aging process leads to faster changes in our physical, cognitive, and social capabilities and needs, and life begins to come to its natural conclusion, resulting in the final life stage, beginning in the 60s , known as late adulthood.
The changes associated with aging do not affect everyone in the same way, and they do not necessarily interfere with a healthy life. The golfer Tom Watson almost won the British Open golf tournament at the age of 59, playing against competitors in their 20s and 30s.
And people such as the financier Warren Buffet, U. Senator Frank Lautenberg, and actress Betty White, each in their 80s, all enjoy highly productive and energetic lives. Aging does not affect everyone equally. All of these people—in their 60s, 70s, or 80s—still maintain active and productive lives. Researchers are beginning to better understand the factors that allow some people to age better than others. Perceptions also matter. People who believe that the elderly are sick, vulnerable, and grumpy often act according to such beliefs Nemmers, , and Levy, Slade, Kunkel, and Kasl found that the elderly who had more positive perceptions about aging also lived longer.
In one important study concerning the role of expectations on memory, Becca Levy and Ellen Langer found that, although young American and Chinese students performed equally well on cognitive tasks, older Americans performed significantly more poorly on those tasks than did their Chinese counterparts. Furthermore, this difference was explained by beliefs about aging—in both cultures, the older adults who believed that memory declined with age also showed more actual memory declines than did the older adults who believed that memory did not decline with age.
In addition, more older Americans than older Chinese believed that memory declined with age, and as you can see in Figure 6.
Is Memory Influenced by Cultural Stereotypes? Levy and Langer found that although younger samples did not differ, older Americans performed significantly more poorly on memory tasks than did older Chinese, and that these differences were due to different expectations about memory in the two cultures. Adapted from Levy, B. Aging free from negative stereotypes: Successful memory in China among the American deaf. Journal of Personality and Social Psychology, 66 6 , — Whereas it was once believed that almost all older adults suffered from a generalized memory loss, research now indicates that healthy older adults actually experience only some particular types of memory deficits, while other types of memory remain relatively intact or may even improve with age.
But slower processing and less accurate executive control does not always mean worse memory, or even worse intelligence. Perhaps the elderly are slower in part because they simply have more knowledge. Indeed, older adults have more crystallized intelligence —that is, general knowledge about the world, as reflected in semantic knowledge, vocabulary, and language. As a result, adults generally outperform younger people on measures of history, geography, and even on crossword puzzles, where this information is useful Salthouse, The differential changes in crystallized versus fluid intelligence help explain why the elderly do not necessarily show poorer performance on tasks that also require experience i.
A young chess player may think more quickly, for instance, but a more experienced chess player has more knowledge to draw on. Some older adults suffer from biologically based cognitive impairments in which the brain is so adversely affected by aging that it becomes very difficult for the person to continue to function effectively.
Without this neurotransmitter, the neurons are unable to communicate, leaving the brain less and less functional. Figure 6. Older adults who continue to keep their minds active by engaging in cognitive activities, such as reading, playing musical instruments, attending lectures, or doing crossword puzzles, who maintain social interactions with others, and who keep themselves physically fit have a greater chance of maintaining their mental acuity than those who do not Cherkas et al.
Because of increased life expectancy in the 21st century, elderly people can expect to spend approximately a quarter of their lives in retirement. On the other hand, retirement may also serve as an opportunity for a positive transition from work and career roles to stronger family and community member roles, and the latter may have a variety of positive outcomes for the individual.
Retirement may be a relief for people who have worked in boring or physically demanding jobs, particularly if they have other outlets for stimulation and expressing self-identity. Psychologist Mo Wang observed the well-being of 2, people between the ages of 51 and 61 over an 8-year period, and made the following recommendations to make the retirement phase a positive one:.
Whereas these seven tips are helpful for a smooth transition to retirement, Wang also notes that people tend to be adaptable, and that no matter how they do it, retirees will eventually adjust to their new lifestyles. By contrast, Jews observe a 7-day, publicly announced mourning period.
In some cultures the elderly are more likely to be living and coping alone, or perhaps only with their spouse, whereas in other cultures, such as the Hispanic culture, the elderly are more likely to be living with their sons and daughters and other relatives, and this social support may create a better quality of life for them Diaz-Cabello, Margaret Stroebe and her colleagues found that although most people adjusted to the loss of a loved one without seeking professional treatment, many had an increased risk of mortality, particularly within the early weeks and months after the loss.
These researchers also found that people going through the grieving process suffered more physical and psychological symptoms and illnesses and used more medical services. People serving as caretakers to partners or other family members who are ill frequently experience a great deal of stress themselves, making the dying process even more stressful. Despite the trauma of the loss of a loved one, people do recover and are able to continue with effective lives.
Angner, E. Health and happiness among older adults: A community-based study. Journal of Health Psychology, 14 , — Baltes, P. Life-span psychology: Theory and application to intellectual functioning. Annual Review of Psychology, 50 , — Blanchard-Fields, F. Age differences in everyday problem-solving effectiveness: Older adults select more effective strategies for interpersonal problems.
Bonanno, G. The other side of sadness: What the new science of bereavement tells us about life after a loss. Burke, D. Language and aging. In The handbook of aging and cognition 3rd ed.
Cherkas, L. The association between physical activity in leisure time and leukocyte telomere length. Archives of Internal Medicine, , — Corr, C. Death and dying: Life and living 6th ed. Belmont, CA: Wadsworth. Diaz-Cabello, N. The Hispanic way of dying: Three families, three perspectives, three cultures. Ertel, K. Effects of social integration on preserving memory function in a nationally representative U. American Journal of Public Health, 98 , — Hebert, L. Journal of the American Medical Association, 17 , — Kennedy, Q.
The role of motivation in the age-related positivity effect in autobiographical memory. Psychological Science, 15 , — Levy, B. Longevity increased by positive self-perceptions of aging.
Journal of Personality and Social Psychology, 83 , — Myers, D. The pursuit of happiness. Scientific American, 5 , 70— Neimeyer, R. Meaning reconstruction in later life: Toward a cognitive-constructivist approach to grief therapy. Gallagher-Thompson, A. Thompson Eds. Nemmers, T. The influence of ageism and ageist stereotypes on the elderly. Persad, C. Inhibitory changes after age 60 and the relationship to measures of attention and memory. Pushkar, D. Social behavior and off-target verbosity in elderly people.
Psychology and Aging, 15 2 , — Responding to the challenges of late life: Strategies for maintaining and enhancing competence. Rubin, L. The development of the person: The Minnesota study of risk and adaptation from birth to adulthood. Salthouse, T.
What and when of cognitive aging. Current Directions in Psychological Science, 13 4 , — Scheibe, S. New territories of positive life-span development: Wisdom and life longings. Snyder Eds. Stroebe, M. Bereavement research: Contemporary perspectives. Stroebe, R.
Chapter 28: Physical Development in Late Adulthood
The aging process often results in a loss of memory, deteriorated intellectual function, decreased mobility, and higher rates of disease. Late adulthood is the stage of life from the 60s onward; it constitutes the last stage of physical change. Average life expectancy in the United States is around 80 years; however, this varies greatly based on factors such as socioeconomic status, region, and access to medical care. In general, women tend to live longer than men by an average of five years. During late adulthood the skin continues to lose elasticity, reaction time slows further, and muscle strength diminishes.
Why do we age? There are many theories that attempt to explain how we age, however, researchers still do not fully understand what factors contribute to the human lifespan Jin, Research on aging is constantly evolving and includes a variety of studies involving genetics, biochemistry, animal models, and human longitudinal studies NIA, a. According to Jin , modern biological theories of human aging involve two categories. The first is Programmed Theories that follow a biological timetable, possibly a continuation of childhood development.
6.5 Late Adulthood: Aging, Retiring, and Bereavement
Depression is less prevalent among older adults than among younger adults but can have serious consequences. Over half of cases represent a first onset in later life. Although suicide rates in the elderly are declining, they are still higher than in younger adults and more closely associated with depression. Depressed older adults are less likely to endorse affective symptoms and more likely to display cognitive changes, somatic symptoms, and loss of interest than are younger adults.
There are numerous stereotypes regarding older adults as being forgetful and confused, but what does the research on memory and cognition in late adulthood reveal? Memory comes in many types, such as working, episodic, semantic, implicit, and prospective. There are also many processes involved in memory, thus it should not be a surprise that there are declines in some types of memory and memory processes, while other areas of memory are maintained or even show some improvement with age. In this section, we will focus on changes in memory, attention, problem-solving, intelligence, and wisdom, including the exaggeration of losses stereotyped in the elderly. Working memory is composed of three major systems: The phonological loop that maintains information about auditory stimuli , the visuospatial sketchpad , that maintains information about visual stimuli , and the central executive, that oversees working memory, allocating resources where needed and monitoring whether cognitive strategies are being effective Schwartz,
Depression in Older Adults
Он потерял равновесие, шатаясь, выскочил на слепящее солнце и прямо перед собой увидел лестницу. Перепрыгнув через веревку, он побежал по ступенькам, слишком поздно сообразив, куда ведет эта лестница. Теперь Дэвид Беккер стоял в каменной клетке, с трудом переводя дыхание и ощущая жгучую боль в боку. Косые лучи утреннего солнца падали в башню сквозь прорези в стенах. Беккер посмотрел. Человек в очках в тонкой металлической оправе стоял внизу, спиной к Беккеру, и смотрел в направлении площади. Беккер прижал лицо к прорези, чтобы лучше видеть.
Хватка на горле Сьюзан слегка ослабла. Стратмор выключил телефон и сунул его за пояс. - Твоя очередь, Грег, - сказал. ГЛАВА 81 С мутными слезящимися глазами Беккер стоял возле телефонной будки в зале аэровокзала.
pdf guide pdf
1. Yvette R.
Why do we age?
18.11.2020 at 09:13 Reply
2. Theniceman50
CHAPTER Late Adulthood: Physical and Cognitive Development. Physical Development. Physical Development: Longevity and Life Expectancy.
19.11.2020 at 14:28 Reply
3. Parnella P.
Through the bible zac poonen pdf elisabeth kubler ross libros gratis pdf
19.11.2020 at 21:57 Reply
4. Thiaklagbyocom
20.11.2020 at 11:54 Reply
5. AdonГas R.
PSY Chapter Physical And Cognitive. Development In Late Adulthood. Outline/Overview. • Theories of aging. • Physical issues in late adulthood.
21.11.2020 at 02:22 Reply
Leave your comment
Subscribe Now To Get Daily Updates |
Discuss the following issues in 4-5 paragraphs
The mosque built by Muslim residents in the town of Unitas was recently vandalized. Derogatory remarks were spray painted on the front of the mosque, such as "Go home, al-Qaeda." The police have made it a priority to find the vandals and will most likely prosecute the issue as a hate crime. The Muslim community is understandably outraged, and the mayor would like to make a public statement to address their concerns and show support for their community.
Discuss the following issues:
• What types of issues have Muslims in the United States faced, especially since September 11? Be sure to give specific examples.
• Research how communities and leaders have addressed anti-Muslim sentiment or actions to present some specific suggestions regarding actions that the town can take to reassure the Muslim community in Unitas and promote religious tolerance.
• What are hate crime statutes, and what are the goals of hate crime statutes?
• What would be gained by prosecuting this crime as a hate crime? Use research and examples to support your opinion.
Show more
Ask a Question |
What Is Water Scarcity?
What is water scarcity?
Two billion people live in areas that have water shortages or water scarcity, and a whopping two-thirds of the world could be joining them in just four years.
FOUR years.
Source: Cracked earth Photo by Bogomil Mihaylov on Unsplash
Recently, my husband mentioned he had read that water futures were being traded, I thought oh you have got to be kidding me. Surely this is part of a plot of a dystopian YA movie where clever resourceful young people save the day. Then he showed me the article. Because water scarcity and as a result, worry, is real, in December of 2020 water joined the ranks of other commodities like oil and gold being traded on Wall Street. And the reality is, this is a problem that will affect all of us and it will take resourceful people of all ages to tackle it.
How did we get here?
Groups like the UN have long cautioned that we are going to go over a climate cliff driven by the actions and inactions of humans. The undisputable change in climate has led to water unpredictability and destabilization-increased flooding and more droughts. As an example, in California, the most drastic dry spell stretched from around December of 2011 until about march of 2019. In July of 2014, “exceptional drought” spread across 58% of the states' land, leading up to a myriad of water emergencies. Another example is the wildfires that have been raging and wreaking havoc in California and neighboring states.
What does water scarcity mean?
To be water scarce, it means you don’t have enough fresh water to meet the demands of people and the environment in an area. Having access to enough safe drinking water is a worldwide priority and is inevitably tied to human rights. With given challenges of things like changing weather brought on by climate change, pollution, population growth, many countries and cities globally are facing increased water scarcity.
Source: Photo by manu schwendener on Unsplash
According to the UN, it’s estimated that by 2040 about 600 million children under 18 will be living in water-scarce areas. That is 1 in 4. Approximately one-sixth of humans on earth live in an area severely lacking in water. By 2030, if we do not make an impact on the given climate change scenario, between 24 and 700 million people will be under such water stress that they will be displaced and become water scarcity refugees. As of now, nearly half of us on Earth are living in a fragile balance and experience water scarcity at least 1 month out of the year, which could increase to between the number of people affected could increase to 4.8-5 billion by 2050. A third of the Earths' large groundwater systems are already strained and affected. Over the last 100 years, water use grew at double the rate of population. Water scarcity affects every continent.
We need to stop taking clean water for granted and treat it like the valuable resource it is. We need to manage the demand for it and how that demand is filled.
We need to address this globally in an interdisciplinary manner. We need to address this in a way that equitably acknowledges and addresses social, economic, and environmental welfare and functionality. Widespread public education is key. There have been solutions implemented or proposed and be built on science and resource management.
Environmental policies are and will continue to be key in preserving and rebuilding ecosystems that naturally collect, filter, store, and release water. Water taxes may be set up to discourage excessive, wasteful water use.
Industrial farming is a major user and polluter of water from pesticides and chemical fertilizer use. Policies have been set up to encourage sustainable and organic farming to help make a dent in this area.
A large part of clean water usage, about 70% is used for agriculture. That is a significant percentage.
But, there are other options that mitigate that impact.
Rainfed agriculture
Rainfed agriculture produces much of the worlds’ food. It accounts for more than 95% of farmed land in sub-Saharan Africa; 90% in Latin America; 75% in the Near East and North Africa; 65% in East Asia; and 60% in South Asia. Water productivity, ‘the amount of crop produced per drop’, tends to be low in rainfed farming systems, and losses from evaporation are high. Crop output can be increased by improving rainfed systems by investing in ways to increase rainfall infiltration and soil water retention capacity to minimize soil degradation and increase the water available for crops.
Overall, enough rain falls to double or more than double rainfed crops but the timing is off from when it is needed. The resulting in loss of water opportunity needs to be addressed. To improve production in rainfed areas, investments need to be made in water management systems unlocking this potential.
Source: Photo courtesy of Gallant International
Dryland farming
Dryland farming or dry farming is farming in areas of less than 20 inches of water annually. It focuses on maximizing the moisture in the soil by using growing methods and choosing crops that can make the most of the givens. Moisture control can be achieved by keeping the fields weed-free and making sure there is enough matter to act as a mulch to seal in the existing moisture and prevent any runoff. On flat farms, the soil can be mounded into long furrows that trap moisture around the plants. Terracing can do the same for crops grown on hills. Land management matters-leaving the land empty of a season in arid areas can allow it to rest and absorb enough moisture to be productive the following year.
Drip irrigation
Drip irrigation is another method designed for efficient water usage. It consists of a slow and even application of water to the plants' root area using plastic tubes directly at the plants' base. The risk of water evaporation and runoff is reduced. A well-designed and managed drip system saves energy, water, and time and maximizes yields. There are 2 main types of drip irrigation, surface and subsurface, the names pretty much tell you what they are. Sub surface systems are mainly used in row crops like potatoes and soybeans and are starting to cross over into high-value crops” like tomatoes and berries.
Source: https://driptips.toro.com/wp-content/uploads/Drip-Info-for-Web-3-01-801x1024.jpg
All these methods mentioned can help make an impact on the amount of water crops consume and ultimately make a dent in the overall global water consumption.
We all can contribute to the effort to respect and preserve our water supply. Fix that dripping faucet. Water at sunrise or sunset and don’t overwater; only water every 3 to 5 days. Install low-flow showerheads can cut your shower water usage in half. Let dishes, pots, and pans soak in water rather than running water over them. Many more easy tips and ideas can be found here:
Source: Photo courtesy of Gallant International
At Terra Thread Home, we create all our products messengers for goodness. Starting from cotton, grown on rain-fed farms in India, every product is 100% organic cotton is GOTS Certified, the highest, most stringent certification criteria. We are proud to offer high-quality luxurious 100% organic cotton bed sheets, bath towels, robes, blankets, and swaddle blankets, all made ethically and sustainably using Fair Trade practices. We are proud to be GOTS, Fair Trade, and B Company certified. We are proud to be good for the planet, good for the farmers and factory workers, and good for you.
When you choose our products for adding a little goodness to your homes, you are helping to put a little good back into the world.
Source: Terra Thread Home
You may also like
View all
Example blog post
Example blog post
Example blog post |
Why Proper Ventilation is So Important
Ever since Americans went on guard against Covid-19, there has been a lot more awareness of the danger posed by microbes in our environment. For some people, concerns about their own immune systems give rise to parallel questions about home ventilation. Those are good questions to be asking, and for reasons other than the current global pandemic.
First of all, most reports on the spread of the novel coronavirus suggest that it is carried in comparatively large, non-aerosol droplets, which don’t last in the atmosphere for very long. This isn’t the sort of thing that poses a danger to you in your home unless you’re living with someone who has the virus and they’re coughing or sneezing in your presence.
So coronavirus shouldn’t be a major cause for concern when it comes to home ventilation. That said, different home environments offer environments that could be either hospitable or inhospitable to coronavirus and any number of other microbes.
The virus that’s on everyone’s mind these days can reportedly live for up to three days on certain plastics. But various bacteria can live in carpet for a period of weeks. Proper home ventilation can help to reduce both of those time frames while also making it easier to clear the air of all sorts of microbes whenever you clean your home.
Humidity is the main concern when it comes to shortening the life span of in-house germs. A drier environment is less accommodating to viruses and bacteria. Certain types of whole-home ventilation systems can keep humidity very low. And depending on where they are set up, the benefits can extend beyond the health of your body to improve the lifespan of your entire home.
By keeping low levels of moisture in enclosed areas like crawlspaces, you can prevent wood and fabric from deteriorating, and you can prevent water from seeping into insulation, which would make it less effective. Meanwhile, energy-recovery ventilation systems can add to the function of insulation by transferring heat between the inside and outside, thus reducing energy costs.
This goes to show that proper home ventilation can also be very important to the comfort of the occupants. If it was just about holding down humidity and keeping microbes at bay, ventilation would actually have the opposite effect, since people often aren’t much more comfortable in very dry environments than germs are. But ventilation can also remove allergens, pollutants, and particulate matter in order to make your home’s atmosphere as healthy and comfortable to breathe as it can possibly be.
One thing to keep in mind is that there are multiple different types of home ventilation, with different advantages and draw-backs. Your choice of “proper ventilation” depends in large part on the specific concerns you have for your in-home atmosphere. If you’re interested in finding out which system will best address those concerns, feel free to contact us with your questions. |
Scada Cyber Security- Safeguarding Critical Industrial Systems
What is SCADA cyber security?
SCADA cyber security refers to protecting Supervisory Control and Data Acquisition systems from cyber attacks that can not only damage the system itself, but also lead to consequential damages to plant and equipment, as well as cause hardship to people due to contaminated water supplies, or failure of the electrical supply to homes, industries and businesses, or shortages of critical items such as gasoline (that brought the attention of the government to the incident in the wake of the Colonial Pipeline cyber attack).
What is a SCADA ?
SCADA is a an acronym for Supervisory Control and Data Acquisition System.
In earlier days SCADA systems were used to have a single overview of a large distributed network of data acquisition and controller units that were spread out over a large geographical area.
For example, a cross country pipeline typically has a large number of places where data is sought to be collected about parameters such as pressure of the fluid at that point in the pipeline, temperature of the fluid at that point and so on. Additionally if the location is a pumping station or a place where multiple pipelines meet then there could be some controls for the pumps, valves and other equipment that routes the fluid through the various pipelines.
These sensors and actuators are connected to Programmable Logic Controllers (PLCs) and Remote Terminal Units (RTUs) in different architectures, which are then themselves networked to send this data to several local control rooms (which may be unmanned) and a central control room (which will be manned).
This entire network is referred to as a SCADA. The Supervisory word indicates that the actual control is being carried out by logic that resides inside these remote PLCs and RTUs and the SCADA system gives an overview of what is happening.
Are there any other types of SCADA?
These days even a single PLC connected to a PC or similar type of HMI (Human Machine Interface) is being called as SCADA by some vendors. So these SCADA systems, typically consist of a nice graphical interface software, that shows the plant/equipment or pipeline in the form of a graphic display with the values of all the different parameters such as temperature, pressure, flow, etc.
Are there different SCADA architectures?
Absolutely. There are several different permutations and combinations of devices, hardware and software that makes a modern SCADA. Bu irrespective of the exact architecture, any SCADA consists of the following three classes of devices and software
1) Graphical User Interface: This GUI software is used with standard computer hardware to display nice graphics of the plant/equipment/pipeline, trends, logs, alarms and other data that is used by the operators.
2) Programmable Logic Controller: A PLC is used to take in inputs from field devices such as sensors and transmitters and relay commands via outputs, to actuated valves, motors, etc to control the process. Either the same PLC sends this data to the remote PC unit described above or, multiple PLCs may be connected to a single RTU (Remote Terminal Unit) that sends the data to the remote PC
3) Field Devices: The actual sensors, instruments, transmitters, actuators, motors, etc., used to gather data about and control the equipment are known as field devices.
The Threat of SCADA Cyber Attacks
Cyber security is one of the main concerns for many organizations and individuals. Numerous attacks on systems that control critical infrastructure have caused a great deal of concern in recent years. For example, the recent attacks on critical pipeline systems such as one that made the Colonial Pipeline network shut down and the water treatment plant SCADA attack that occurred in Oldsmar, FL have renewed the focus SCADA cyber security again.
Note that the SCADA system of Colonial Pipeline was not directly attacked, the SCADA had to be shut down to troubleshoot and isolate the problems in Colonial Pipelines business IT systems. However it could have just as easily been attacked directly.
In the Oldsmar incident, the attackers could modify the dosing pump deliveries to add much higher amounts of chemicals than normal, which could have poisoned the city water supply.
Water supply cyber security
In other recent incidents, attackers could shut down an electrical grid in Ukraine in winter, leading to chaos.
Why are SCADA systems vulnerable to cyber attacks?
This is because most SCADA systems are old ones and developed many years back when computers and mobile phones connected to the internet were not common. Knowledge about computers in general in the public (and potential hackers, cyber criminals and others) was not so much. It was certainly not because the systems were robust, basically it was more about “security by obscurity”-if no one knows that you exist, how can you get attacked?
Today however the number of people having knowledge and skills in computers, hacking and other areas has increased exponentially. Couple this with the obsequiousness of computers and mobile phones and tablets that can be used to access anything on the internet. Now combine this with the lack of knowledge of industrial cybersecurity and SCADA cyber security amongst the people that maintain these systems. Also combine this with the emergence of several gangs of criminals that make good money via ransomware attacks, some nation states that encourage attacks on their perceived rivals and the reluctance of SCADA owners and operators to harden their systems-it is perfect recipe for several more attacks.
What can you do to protect your SCADA from cyber attacks?
Firstly you should arm yourself with knowledge about SCADA Cyber Security by taking at least one course on the subject. An excellent course that will help you learn everything about SCADA cyber security is the Abhisam Industrial Cybersecurity course. This includes a lot of modules that explain the various types of steps that you can take, the relevant parts of ISA /IEC 62443 standard that may be useful to you, some advanced ICS Cyber security training modules ( using tools like SHODAN and MITRE, case studies of actual cyber attacks) and much more.
The course is not just focused on SCADA cyber security only, it covers all types of ICS cyber security such as that for DCS (Distributed Control Systems) , PLCs and SIS (Safety Instrumented Systems).
Developed by experts in the industrial automation and cyber security domains, this is the best course out there.
Armed with this knowledge you can start protecting your SCADA from possible attacks. When you take the associated exam and obtain your certification from Abhisam as a certified Industrial Cybersecurity professional, you can talk with authority to your bosses and colleagues regarding the subject. This helps you not only get the needed resources from your company (such as an enhanced budget to implement these upgrades), but also position you as a competent person in your professional community. Since you also earn an electronic badge of Industrial Cybersecurity professional from Abhisam that you can share on LinkedIn, your visibility goes up manifold. |
10 Fierce But Often Forgotten Enemies of Rome
10 Fierce But Often Forgotten Enemies of Rome
Rome, this very name conjures up images of an ancient empire so vast that experts from different ages have been spellbound by the unprecedented magnanimity of its reaches. Ancient Rome defined the very genesis of our Western civilization, but it also attracted hordes of enemies. The most courageous of the enemies of Rome saw its immense power, but still decided to face their formidable opponents – at best they achieved great victories, spurring on rebellions against the Roman army, at worst, they fell to their skilled adversaries.
Legendary Beginnings
Rome has some very interesting myths regarding its foundation story too. When the Trojan War broke out in the epic Iliad, the city of Troy was breached and destroyed by a cunning ploy. But a young man called Aeneas survived, and his tale has been narrated extensively in the epic Aeneid, created by the Latin poet Virgil. Aeneas supposedly travelled far and wide, came to ancient Carthage where he courted their Queen Dido, and left her heart-broken to go to a new place – and thus he created the city of Rome.
Another story tells us about its legendary founder Romulus, who along with his twin Remus (whom he murdered later on), were reared and brought up by a she-wolf. Romulus then went on to create the city of Rome and became its first king. Starting from him, Rome had seven legendary kings:
• Romulus
• Numa Pompilius
• Tullus Hostilius
• Ancus Marcius
• Tarquinius Priscus
• Servius Tullius
• Tarquinius Superbus
‘The Pride of Romulus.’ ( Public Domain )
Enemies of Rome Arise!
The last legendary king, Lucius Tarquinius Superbus, was said to be cruel and haughty and hence his misrule saw him being deposed by an uprising which led to the birth of the Roman Republic in c. 509 BC. We have to note here, that one of the men who were responsible for overthrowing this king was called Brutus – Lucius Junius Brutus, a predecessor of Marcus Junius Brutus who was responsible for the assassination of Julius Caesar and later immortalized by Shakespeare.
Ever since then, Rome had defined the very epithet of a growing, burgeoning civilization which would inspire and influence world civilization in a way as to change our very notion of grandeur. However, Rome’s prosperity also attracted enemies and detractors in droves; some plundering the very city, while others created havoc in its country sides. We will discuss them now:
Brennus of Senones
Historically there may have been many Brennuses. In fact, this very name might have been a title and not a personal name, per se. But the Brennus we are talking about here was the one who famously sacked Rome in the 4th century BC. He belonged to the Gallic tribe called Senones from present-day France.
Most of the accounts of Brennus and his famous sack of Rome were known from the works of historians like Plutarch, Livy, and others who lived much later than the time of Brennus. They had probably gathered the facts from some earlier works. There is no consensus among historians as to the reason for Brennus crossing the Alps and settling on the eastern coast of Italy. It was probably due to the over-population of Gaul and scarcity of resources there.
Brennus depicted on the figurehead of the French battleship Brennus. (Med/ CC BY SA 3.0 )
Brennus and his men were originally busy in the siege of Clusium, a city to the North of Rome, when some Romans meddled in their affairs. The sparks flew fast and Brennus soon moved against Rome. He and his men travelled towards the imperial city and met the Roman army near the River Allia.
The ensuing battle saw the Roman army routed by the Gauls (c. 390 BC). Brennus soon sieged the Capitoline Hill, after sacking the city, where he demanded a thousand pounds in gold when called in for negotiations to end the siege. During the measurement of the same, legend has it that he famously said ‘Vae Victis’ which means ‘Woe to the vanquished,’ the expression having survived the sands of time ever since. Though it might not have been said by Brennus at all.
The Commander of the Gaul’s was finally defeated and probably killed by an army commanded by Marcus Furius Camillus, now hailed as the second founder of ancient Rome after the legendary Romulus. Brennus’s name would survive generations and be uttered in awe and fear henceforth.
Viriathus of the Lusitanians
The famous historian Theodor Mommsen has compared Viriathus in his works with the Homeric heroes of mythology. This Celtic-Iberian warrior belonged to the Lusitani tribe of Hispania in Roman times. Their tribe controlled areas that corresponded to present-day Portugal.
Viriathus belonged to a very humble background. When he was young, he was a shepherd and passed through his life in simple terms. It is not known now when he acquired the qualities that made him a remarkable warrior later on. But his almost nomadic life in the hills and the wild terrains must have made him physically strong.
The Lusitani tribe clashed with the Romans on and off starting from the 3rd century BC, when Rome started capturing these areas as an extension of their subjugation of Carthage, which controlled some parts of Southern Hispania/Iberia at that time. Due to the misrule of Rome in the subsequent years, the Lusitani rose in revolt in c. 194 BC. In his youth, Viriathus was part of a large group of people who surrendered to Rome in c. 150 BC in exchange for peace.
But they were betrayed and the whole group of Lusitanians, including women and children, were massacred. Viriathus escaped it somehow and to avenge this cruelty, he gathered many tribes against Rome later on. He successfully commanded his troops to many victories against Rome between c. 147 BC to 139 BC. Unfortunately, he was murdered by three of his friends from his army who were bribed by Rome. Viriathus is now widely celebrated in Portugal as one of their enduring symbols of pride and valor.
‘The death of Viriatus, Chief of the Lusitanians’ by José de Madrazo. (Public Domain)
Jugurtha of Numidia
Jugurtha had served in the Roman army in his youth and knew everything about their weaknesses and strengths. The ancient kingdom of Numidia was located in North Africa in a region which would currently be equivalent to some parts of Western Algeria and some minor parts of Eastern Tunisia. Jugurtha rose to power and became the king by killing his two step-brothers, the murder of one of them called ‘Adherbal’ being deeply resented in Rome. Jugurtha had massacred the city of Cirta, the capital of Adherbal in c. 112 BC, which brought him into direct conflict with Rome.
Rome had sent the commander Lucius Calpurnius Bestia to Numidia in c. 111 BC. Though Bestia made numerous gains in the subsequent battles, he couldn’t conclusively end the war and brought Jugurtha to surrender. But soon Jugurtha resorted to his cunning ways and bribed Bestia to return to Rome, leaving a token force in Numidia.
He then bribed the remaining forces too, and when summoned to Rome, successfully bribed people there and came back without any harm to himself. So, in c. 110 BC, Rome sent Postumius Albinus to finish off Jugurtha. But even Albinus, or his brother Aulus, couldn’t make much headway and they were driven out of Africa. In c. 109 BC, Quintus Caecilius Metellus Numedicus started his campaigns in Numidia and made several signs of progress.
Framed miniature of King Jugurtha paraded through Rome as a prisoner (left), while King Boctus makes peace with the Romans (right). ( Public Domain )
But in c. 107 BC he was replaced by the famous Gaius Marius, who came back from Rome after being selected as a consul there. Jugurtha was finally betrayed by his son-in-law and brought to Rome in chains, where he died in c. 104 BC in a Roman prison. Thus ended the life of one of the most cunning enemies of ancient Rome.
Ambiorix of the Eburones
In Belgium, Ambiorix is now considered a national hero who valiantly fought Caesar’s forces of ancient Rome in the famous Gallic Wars of c. 54/53 BC. Ambiorix would have remained an obscure figure had Julius Caesar not mentioned him glowingly in his accounts of his Gallic Wars. The name of Ambiorix probably means ‘Protector King’ - and true to his name, he was in all probability a joint king of his tribe with another person by the name of Cativolcus.
During Caesar’s campaigns in Gaul and Belgica, a minor tribe by the name of Eburones surprisingly rose in revolt. Ambiorix in the course of this war had deceived the Romans into believing that he meant them no harm, while ambushing them to massacres after assuring them of safe passages. He did it numerous times before Caesar came to the rescue of one of his units.
The Gauls were significant enemies of Rome. ( Massimo Todaro /Adobe Stock)
He in turn deceived Ambiorix by his superior tactics and forced him to flee. Ambiorix survived, and together with some of his bodyguards, escaped into the ancient German lands. After that, nothing more was heard about this strong and valiant enemy of Rome who fought a much superior force with his limited means.
Arminius of the Cherusci
In the course of ancient Roman history, this magnificent empire had been much troubled by the incursions of several Germanic tribes from time to time, but none so humiliating as the devastation that the Roman army suffered at the Battle of the Teutoburg Forest in 9 AD. The man who was responsible for this Roman defeat was Arminius of the German Cherusci tribe, who is now hailed as a German national hero and called Hermann.
Arminius or Hermann was probably brought up in the city of Rome, where he was interred as a hostage from some war booty. He grew up to be an able soldier in the Roman army and was given charge of some units comprising soldiers derived from his original native lands. But when he was sent to Germania to join forces with the Governor there - Publius Quinctilius Varus, he somehow felt the call of his native lands and rose in revolt against the Romans by gathering the other tribes.
He ambushed Varus and completely destroyed the three legions of the Roman army in the Battle of the Teutoburg Forest. This had far-reaching consequences. This defeat was considered Rome’s greatest humiliation and subsequently weakened the Western Roman Empire. Unfortunately, Arminius was assassinated by his own people in c. 21 AD, who probably became jealous of his growing influence over a liberated Germania.
Germanic warriors storm the field, ‘Varusschlacht,’ 1909. ( Public Domain )
Vercingetorix of the Arverni
Another charismatic leader from Gaul who gave the ancient Roman army much trouble was Vercingetorix of the Arverni tribe. Vercingetorix was born to Celtillus, the leader of the powerful Arverni tribe of Gaul. When he grew up and was made the leader of his tribe in c. 52 BC, he united the other Gallic tribes and rose in revolt against Julius Caesar, who was campaigning in Gaul at that time to further his prestige with the Roman senate.
Initially, the Gauls were themselves recruited by the Romans to check the incursion of the Germanic tribes into Gaul. But soon Caesar began to impose Roman laws into that land, which insulted the Gallic tribes. When Vercingetorix united the Gauls, not many had joined him and hence he adopted a policy of scorched earth and hiding behind natural fortifications.
But when Caesar massacred the town of Avaricum, Vercingetorix’s forces doubled in search of revenge. At the battle of Gergovia, their capital, the Gallic forces defeated the Romans due to their superior cavalry. Hence, Caesar, being the astute general that he was, soon recruited German cavalries in his army as mercenary soldiers. Finally, at the Battle of Alesia, Vercingetorix was defeated and he surrendered personally by riding down to Caesar’s camp.
Boudicca of the Iceni
This British Queen of the Celtic Iceni tribe rose in revolt against Rome when she was grossly mistreated by the Roman Army in c. 60/61 AD. Boudicca, sometimes spelt as Boadicea, was probably born into royalty and grew up at a place called Camulodunum - which is now Colchester.
Boudicca was married to Prasutagus, the king of the Iceni tribe. With him, she had two daughters. The Iceni tribe inhabited an area that would be equivalent to the present-day county of Norfolk, together with some other areas of the adjoining counties.
When the Roman Empire conquered south of the British Isles in c. 43 AD, Prasutagus was allowed to rule as an independent ally of Rome. He left his kingdom to his two daughters and to the Roman Emperor in his will. However, when Prasutagus died, Rome totally annexed his kingdom - and while doing so, they publicly flogged Boudicca and raped her two daughters.
But the Queen was not to give in so easily. She rose in revolt with her armies and massacred some 70 to 80 thousand Roman soldiers while desecrating several Roman strongholds. However, the Roman Governor Gaius Suetonius Paulinus soon regrouped his army and defeated the forces of Boudicca. The brave queen then probably ended her life by taking poison. Today, she is a national hero in her country and a symbol of courage and fortitude.
Boadicea monument in London. ( Claudio Divizia /Adobe Stock)
Genseric of the Vandals
It is not without reason that the word vandalism entered our popular lexicon from the tribe of the Vandals - whose senseless destruction and plunder of Rome had far-reaching effects in world history. This vandalism of Rome was done in 455 AD under a leader called Genseric or Gaiseric. He remained one of the fiercest enemies of Rome.
Gaiseric was born to the Vandal King Godigisel. The Vandals were a Germanic tribe who primarily inhabited present-day Southern Poland, but would go on to establish their strongholds in the Iberian Peninsula and Northern Africa. Gaiseric ruled for a long time and his reign saw the Vandals becoming one of the major powers of the Mediterranean world.
In 455 AD, he took his huge force from Carthage over to Italy, then systematically seized and plundered Rome, and stripped it off all its riches. It is now quite obvious that Rome was not able to endure that sacking, and the Western Roman Empire went into steady decline after this incident.
Alaric of the Visigoths
Alaric I was a leader of a Germanic tribe called the Visigoths. The Visigoths , along with the other Germanic tribe called the Ostrogoths, played a huge rule in ancient European history. Alaric was initially a soldier in the Roman army who helped Rome in defeating the Franks and some other enemies. However, Alaric and the other soldiers of his tribe received little recognition or honor from Rome, despite losing a large number of their comrades in battles.
Alaric rose to power as the leader of his tribe probably in c. 395 AD, following the Roman Emperor Theodosius’s death. The Roman Emperor’s two incompetent sons divided the empire then into the Eastern and Western halves. However, general Flavius Stilicho originally controlled the Western half.
Alaric took advantage of this East-West divide and started raiding the Roman territories of the Balkans and Greece. Soon, as tensions rose between the Western Roman Empire and the Goths, Alaric sacked Rome in 410 AD, an incident of epic proportion. However, Alaric soon died after this and one of the most significant enemies of Rome probably met his end due to a fever - not in battle.
Shapur I of Persia
No other enemy of Rome had humiliated this imperial behemoth the way ‘Shapur I’ of Persia did - by not only capturing a Roman Emperor and keeping him in captivity, but also using him as the very pedestal to climb up onto his horse every day. Shapur the Great was one of the most powerful rulers of Persia and was born to King Ardeshir I, the founder of the Sassanian Empire.
The Humiliation of the Emperor Valerian by the Persian King Shapur. ( Public Domain )
Shapur I expanded his empire far and wide, and looking at the political turmoil of Rome at that time, he raided their territories several times in the 3rd century AD. In one of his campaigns against Rome, he became the first foreign ruler to capture a Roman Emperor in a battle. The unfortunate one in this regard was the Roman Emperor Valerian. Shapur using him as a footstool to climb onto his horse remained an ultimate humiliation that an emperor of such a huge realm had to endure. Hence, Shapur I was quite unique among all the enemies of Rome.
Those are the stories of some of the fiercest warriors to trouble the Roman Empire time and again. The Romans clearly were not invincible, but their resources were such that they were often able to just keep coming back at their more substantial opponents.
Top Image: Rome made a lot of enemies in its bid to rule the known world, and some put up quite a resistance. Source: Luis Louro / Adobe Stock
By Saurav Ranjan Datta
Saurav Ranjan Datta’s debut book 'Maidens of Fate' is now available on Amazon all across the globe, available here for Kindle.
Philip Matyszak - The Enemies of Rome: From Hannibal to Attila the Hun .
Edward Gibbon - The History of the Decline and Fall of the Roman Empire .
It took rome more than 2 centuries to subdue the Iberian peninsula. More than any other area in the world. Agustus had to come to oversee the end of The Cantabrian wars. But some celtic- Iberian tribes like the Cantabre never surrendered. It would be good to see a story about this.
Next article |
Loading Events
• This event has passed.
Webinar: How Chickadees Use Their Brains to Hide Seeds and Survive Harsh Winters
January 11 at 1:00 pm2:00 pm
Every fall, chickadees hide tens of thousands of food items, counting on these “cached” seeds to see them through harsh winters, deep snow, and subzero temperatures. But how does a tiny bird weighing only half an ounce remember where they’ve stashed all their food? Join our conversation with researchers Dr. Carrie Branch and Benjamin Sonnenberg as they reveal how Mountain Chickadees make it through to springtime with the help of cached food, enviable memory skills, and some surprises when it comes to choosing mates and building nests. We’ll also spend time answering your questions about these energetic birds during a live Q&A.
Register to attend
Mountain Chickadee on snowy branch
January 11
1:00 pm–2:00 pm
Event Category:
Don't miss a thing! Join our email list |
Google has tested a scheme that reschedules processing so that tasks which are not urgent can be run when the electricity supply is drawn from renewable sources.
The "carbon-intelligent computing" project takes work such as updating Google Translate's dictionaries, and delays them to times when the local electricity grid is being fed by renewable sources. Not much is revealed in a teasing Google blog post timed for Earth Day this week, but the test uses global data which tells where electricity has come from, provided by Denmark-based Tomorrow.
google baseline versus carbon aware load.jpg
– Google
Shift work
The world needs to shift to renewable sources of energy, to reduce greenhouse gas emissions - but wind and solar energy is very intermittent. Computing could reduce its impact on the planet if it were carried out when these sources are readily available, but most data center services are designed to run continuously.
Google has using a platform designed for its hyperscale data centers, to "shift the timing of many compute tasks to when low-carbon power sources, like wind and solar, are most plentiful," according to Ana Radovanovic, Google's technical lead for carbon-intelligent computing.
While Google responds instantly to user requests on services like Search, Maps, and YouTube, some other jobs can be carried out in the background, such as creating new filter features on Google Photos, YouTube video processing, or adding new words to Google Translate, said Radovanovic. "Shifting the timing of non-urgent compute tasks... helps reduce the electrical grid’s carbon footprint, getting us closer to 24x7 carbon-free energy."
The carbon-intelligent platform compares the expected needs of the Google data center, with a live dataset from Tomorrow called electricityMap, which predicts the average hourly carbon intensity of the local electrical grid over time. "We use the two forecasts to optimize hour-by-hour guidelines to align compute tasks with times of low-carbon electricity supply," said Radovanovic.
The blog post says the platform is running at "every Google data center," but it's clearly in a test phase: "Early results demonstrate carbon-aware load shifting works. Results from our pilot suggest that by shifting compute jobs we can increase the amount of lower-carbon energy we consume," said Radovanovic.
Electricity is less carbon-intensive in the early morning and late evening when wind energy is plentiful, and human use is lower. The diagram shows that shifting some loads to these times reduces overall demands.
Future versions of the project will move tasks between data centers, so work can be done where the energy is greenest. "Our plan for the future is to shift load in both time and location to maximize the reduction in grid-level CO2 emissions."
Radovanovic promises Google will produce research papers that explain in more detail just how well this works, and how it will be rolled out.
Open source
The electricityMap service shows in real time the carbon intensity of electricity anywhere in the world. It's also "the largest database of past, current, and future data about how green the electricity is, according to Tomorrow. It was developed to allow people to carry out tasks like charging electric vehicles more intelligently, and can reduce the carbon footprint of a given task by up to 25 percent, the company says.
electricityMap is an open source project on GitHub, where contributors can add new sources of information or languages.
“Our partnership with Google couldn’t have been possible without the contributions of our open-source community," said Martin Collignon, COO of Tomorrow. "We send a heartfelt thank you to everyone who has put countless hours into adding more and more countries on the map and make electricityMap a vital tool helping governments, organizations, and individuals become more climate-friendly.”
Tomorrow also has a tool called North, which aims to be a FitBit like service to helping individuals reduce their carbon footprint by tracking it.
Rampable loads
The idea of timing loads has also been proposed by Lancium, a Texas start-up which wants to build "rampable" data centers at wind and solar farms, where they can switch on when there is a surplus or green energy. The company is also working on software to be used by conventional data center operators to carry out the kind of job that Google is doing with its carbon-intelligent platform. |
Sustaining Vulnerable Island Communities in the 21st Century
Given their biogeographical isolation and high resource dependence, social and ecological island communities are more vulnerable to natural and human impacts than continental communities. This was the main message of ETC-UMA Director, Dania Abdul Malak, during her presentation at the workshop on Maritime Spatial Planning (MSP) in Islands organized by the EU MSP Platform on 11 September 2018 in Las Palmas de Gran Canaria.
Managing human activities on and around islands are a must if we aim to maintain healthy and productive ecosystems and the people dependant on them. However, conservation planning and resource management need to be based on reliable and comprehensive information to be effective. This means considering the role of all components in an ecosystem including species, habitats, and humans and the interconnections between each other, now and in the future. With a unique biodiversity and high species endemism, Mediterranean islands and their communities are among the most vulnerable to the impacts of human activities. Island communities in the Mediterranean are more resource dependent than mainland’s due to their limitations in size; their natural resources inland are spatially constrained and the use of coastal and marine resources is usually more significant due to fishing and touristic activities. Knowing the high risks encountered by islands, mapping priority ecosystems and species to conserve need to be aligned to accounting for the impact of challenges imposed by climate changes, human flows associated to seasonal tourism and migration and the development of additional economic activities related to blue growth. Matching natural resources and their pressures offers vital information as the key baseline to build spatial planning for these areas at various scales and in a way that ecosystem protection is taken into account and sustainability is promoted in the long term.
The implementation of an ecosystem-based approach in islands requires an understanding of the role stakeholders can play in building a socio-ecologically resilient community. The comprehension of an ecosystem-based approach to management by public authorities at different scales will allow for decisions to be made in accordance to conservation priorities for the benefit of the people and the economy.
Furthermore, by building the capacity to understand ecosystems and by involving natural resource users in their management, potential conflicts for the same natural resources can be reduced, allowing for a balance between immediate and long term needs and a society that can benefit and actively play a part in maintaining a healthy environment.
Notes to editors
|
Skip to Main Content
CFI Trainer in front of class
Cove Joint
Cove joints connect the foundation walls to basement floors and allow water through should a structure experience a flood.
Get a Free Estimate
Whenever there is a heavy downpour or prolonged rains in Virginia, Maryland, or D.C., the levels of groundwater along the foundation walls and below the basement rise. The subsequent changes in soil water push water through the cove joint and this exerts pressure on your basement floor and walls. The water that seeps through can stain your walls and damage floor coverings and other valuable belongings.
What Is a Cove Joint?
A cove joint is the juncture between your foundation walls and the basement floor. This joint occurs when builders excavate the ground and pour concrete on the foundation’s footings.
After constructing the foundation footing, builders typically pour and erect the foundation walls to slot into a keyway and allow proper alignment. The basement floor is poured after the walls cure. This foundation pouring method leaves a small gap between the walls and the floor, known as a cove joint or a cold joint.
The first batch of poured concrete begins to set even before the builders can add the next batch. The two will not mix uniformly, resulting in a cold joint. The cove joint is a weak point in the concrete and often the result of delayed or interrupted concrete operations.
This joint must be sealed to control water seepage. Interior drain tiles and an exterior waterproofing membrane can help beat back moisture.
What Does a Cove Joint Do?
The cove joint doesn’t look like a crack, but is relatively linear, joined closely, and bonded. The joint will not cause structural problems as long as it’s compressed. However, its location in the structure can impact the foundation’s health.
While the cove joint is often regarded as a weak point, this is not always the case. It’s not a weak point if the builder pours the concrete and leaves a vertical bar sticking out of the attachment. However, if there’s no bar from old concrete, the joint will be known as a cold joint.
A cove joint is one of the common water entry points into the building. It can instigate water seepage, especially when the water table rises and falls.
Sometimes the change in soil conditions may put pressure on the basement walls and floors, which then pushes water through the cove joint. Any leaks can easily creep through the cove joint. In most cases, the areas that leak are the cove joints of a three-part foundation.
Heavy rains, which cause water levels around your home to rise, can also cause cove joints to leak. If the rains continue, the soils get saturated. Hydrostatic pressure will increase and water will start seeping into the joints.
How to Fix Cove Joint Seepage
Moisture infiltration and water seepage can hurt your home. You must repair the leak before things get out of hand.
While many waterproofing companies recommend sealing cove joints, expert builders discourage this for many reasons. Covering the cove joint seepage does more damage than good. It works for some homeowners, but it’s only a temporary solution.
One problem with covering the cove joint is that it increases hydrostatic pressure when the water table changes. After some time, the walls may not be able to contain the pressure. The walls will give in and water will start infiltrating your home or building.
Another thing that might happen when you seal the cove joint is that water might find its way into the basement through a different opening. Sometimes water will slowly penetrate the sealant through its opening, rendering it useless.
What’s the Best Solution?
While there are many ways to stop water seepage, the main one involves installing a proper drainage system to prevent the buildup of hydrostatic pressure. What this does is keep water, including rainwater spill-offs from the gutters, far away from your house’s foundation.
An interior drainage system will come in handy in keeping water away from the basement. This system placed just under the basement floor stops water infiltration and direct the water away from the cove joint. The water won’t accumulate and cause hydrostatic pressure.
Installing a sump pump is another effective deterrent as it pushes the water collected from the interior drainage system out through the discharge line instead of letting it seep through the cove joint. Regrading your yard to create a slope can help improve drainage. You can ask your local landscaper to help you out.
Exterior drains also work well in channeling water into the home from the outside. This method creates a negative pressure that stops water from reaching the floors or the drains. This exterior waterproofing for cove joint seepage provides a permanent solution but can be expensive.
If you’d like to waterproof your basement or foundation to stop water infiltration, contact JES Foundation Repair. We’ll provide you with a free waterproofing inspection and quote, along with recommendations on how to fix your water issues.
JES Service Area Map
Service Areas
1250 Reames Rd
Middle River, MD 21220
2410 Southland Dr
Chester, VA 23831
2569 Quality Ct
Virginia Beach, VA 23454
8122 Bethlehem Rd
Manassas, VA 20109
2033 Cook Dr.
Salem, VA 24153
456 Old Courthouse Rd
Appomattox, VA 24522 |
Question Gravity
by KingSupernova3 min read13th Jan 20228 comments
PhysicsWorld Modeling
Earlier today, I was in the shower. I had just finished a bottle of shampoo, and I tried balancing it on the thin railing of the shower door. I expected it to fall down, but instead it stayed there. From the side, it certainly looked like it was sticking out more than halfway over the edge. (Picture) Yet it stubbornly stayed put.
On a whim, I filled it with water and put it back. It fell over.
Wait, what? Filling it up shouldn't change the location of its center of gravity, so why would that make it fall over? I started performing more experiments. I rotated the bottle and balanced it again several times to see if there was some asymmetry causing it to have an off-center center of gravity. I thought maybe the water sloshing around could cause its center of gravity to move over the edge, so I I tried holding it there for several seconds before letting go, in order to let the water settle. I noticed the door had some wiggle room, and the weight of the bottle could be causing the door to shift to a different angle, so I tried holding it at different angles. Nothing caused any different behavior. I put it on the ledge empty and slowly filled it with water. When it got to around 1/20 full, it fell over. I found a second bottle and performed all the same tests on it; same results.
At this point I was thoroughly confused. I figured some assumption of mine must have been wrong, so I tried inspecting them. Does the center of gravity of an object really have to be over the edge in order for it to fall? I couldn't think of any situation where that wasn't true. (Generalizing from a non-exhaustive list of arbitrary examples is obviously not a great approach, but I couldn't do much better while in the shower.) Does filling it with water really not change its center of gravity? Oh wait; it does! The center of gravity doesn't move it laterally, but it does move it vertically. That assumption was wrong. (I probably wouldn't have made this mistake if I had been thinking of it as the center of mass rather than the center of gravity. Framing is important.) Unfortunately, that epiphany didn't lead to anything useful; I couldn't see how moving the center of mass vertically could affect whether it was balanced or not.
If you haven't figured it out yet, take a moment to think about it. You have all the information you need. Also, let me know in a comment if and how easily you figured it out before reading the answer below. I'm curious how well I stack up.
Answer: Cohesion between the water on the bottle and the water on the glass of the shower door.
This came to me after I noticed that when the bottle was almost, but not entirely, empty, it would seem to hesitate for a moment before falling. I didn't come to this immediately though. While I did notice the delay at the time and mentally flag it as "weird", I failed to consider how it might fit into the picture, and unconsciously dismissed it as irrelevant without giving it proper consideration. Only later did I have an independent realization that the bottle might be sticking to the door. That realization came from my unconscious mind; I didn't arrive at it though a deliberative process. Once I'd had it, it was trivial to grab a towel and confirm that when dry, the bottle would fall over even when empty.
There were several failures here, but the most important one was not going back far enough in the chain of assumptions I was making. I realized I needed to go through the process "Question Assumptions", but ended up only inspecting the irrelevant ones. I was unable to notice the assumption that actually needed questioning; that gravity was the only relevant force at play.
Properly questioning assumptions; not just going through the motions, but actually locating and inspecting all the foundational pillars of your thought process, is really hard.
New Comment
Other effects I was considering.
Is the bottle rotationally symmetric? Is there say a weight of congealed shampoo in it?
If there was a slight tilt in this whole setup, the bottle could be marginally off vertical. Empty, the centre of gravity is quite high above the bar, and the slight tilt puts it slightly inward. With some water in the centre of gravity is lower. Full to the brim, the centre of gravity isn't much lower.
Before reading your solution, my guess would be that the center of gravity was always over the edge. It's just that when the bottle was empty, the adhesive forces of the water linking the bottle to the shower door were sufficient to hold it back from tipping.
Edit: It looks like we reached the same conclusion.
Yes, it's definitely a skill that we all need to develop to be able to identify all the assumptions we make in our reasoning. Thanks for the exemplifying post.
if the top flat of the door were a bit inclined, then raising the center of gravity could eventually tip the bottle over. And those doors rarely are really leveled. But sticky surfaces was my first guess.
While I agree that cohesion could explain the phenomena where is the center of gravity for the full and empty container? Most of the shampoo bottles I have seem to have thicker bottoms than sides or tops. This seems to be a case where very careful measurement is needed. Or perhaps more sampling. Do the experiment with 50 shampoo bottles of the same manufacture (and perhaps even bought at the same time to get a common production run).
I got the answer half-way through your third paragraph.
I thought about it for more than 5 minutes and had no idea :)
I didn't open the photo on first read so my mental image of the situation was a bit off (I missed that it was on a shower door, and pictured it perched on something like the rim of a bath)
But my guess before reading the answer was "there's some source of resistance that the added weight helps it to push past" (competing with "there's some small amount of off-centre shampoo in the bottom of the bottle" - although that should have been excluded by rotating it, but maybe it somehow keeps moving?). So I guess I was under-specific but not wrong.
[+][comment deleted]10d 1 |
Skip to main content
9 Ways Going to College Affects Your Health
A woman studies on the lawn of a college campus.
(Image credit: Back to school photo via Shutterstock)
The waning days of summer herald the time when many young people wave farewell to their parents' home and head to college, where they'll face a barrage of challenges and changes, from overwhelming intro classes to inscrutable roommates.
College students may also face challenges to their health, both physical and mental, that may have long-term effects reaching well past their undergraduate years.
"I advise students to maintain a balance," says James Davidson, assistant vice president for student wellness at the University of Nevada. "Your health is more than the physical condition of your body. There are multiple aspects of wellness to consider… When one area gets out of balance, it usually affects the other aspects of your life, whether you realize it or not."
Here are some well known, as well as some less familiar health issues that college students face as they embark on higher learning.
A young man looks stressed about his studies
(Image credit: Stressed college student photo via Shutterstock)
While many different parts of college life can cause stress, the outcome is the same: Stress is the top factor negatively influencing academic performance, according to a 2012 survey of 90,000 college students. The survey looked at whether students earned a lower grade on an exam, project or in a class; or dropped a class due to stress.
"Stress is the greatest impediment to academic success for most students," Davidson said. "My advice to students is to monitor their stress levels, and get assistance from your campus counseling and health centers." [11 Tips to Lower Stress]
Binge drinking
A group of people toasts with beer bottles.
(Image credit: College drinking photo via Shutterstock)
Up to 40 percent of all college students report engaging in binge drinking (typically defined as consuming four drinks on one occasion for women, and five drinks on one occasion for men). The behavior does a number on students' brains, with research showing that young adults who drink heavily have abnormalities in the gray and white matter of their brains.
Binge drinking has other serious effects. A 2009 study found that 1,800 college students die from alcohol related causes yearly; approximately 600,000 are injured under the influence of alcohol, and nearly 700,000 are assaulted by other students who have been drinking.
While binge drinking has an array of short-term negative effects, it can have more residual effects as well. A survey of 1,972 U.S. college students, interviewed during their college years and again 10 years later, found that some binge drinkers were more likely to experience alcohol dependence and alcohol abuse later in life. They also had poorer job opportunities and a higher risk of dropping out of college.
A young woman looks upset in a college classroom.
(Image credit: College student photo via Shutterstock)
Research shows that college students face heightened levels of depression and anxiety, with freshman often suffering the most from these issues as they adjust to a new environment. The conditions can also lead to increased substance abuse, poor academic achievement and suicide.
Depression often goes unreported by college students, but some studies suggest that students are becoming more comfortable in speaking out about this problem – the rate of reporting depression is increasing, rising by 56 percent between 2005 and 2011.
This increase is "likely a reflection of improvements in psychotropic medications, and greater utilization of mental health care due to declining stigmas around mental health," said Kevin Readdean, associate director of the Student Health Center at Rensselaer Polytechnic Institute in New York state.
In other words, better medication and less stigma means that more students with depression are able to start and stay in college, which has contributed to increased reporting, he said.
Social anxiety
A college woman holds her phone.
(Image credit: Tyler Olson | Shutterstock)
One recent study that followed the social lives of 53 college women for five years found that social hierarchy was a dominant force in their lives, and that pressure to achieve high social status was prevalent.
The study also found that social stresses were correlated with excessive drinking, and could lead to poorer academic and life outcomes due to a 'partying' lifestyle.
Weight gain
A group of friends share a pizza
(Image credit: Pizza dinner via Shutterstock)
While many new college students fear the fabled "freshman 15," the addition of 15 extra pounds is not as common as it's made out to be.
"Less than 5 percent of students are likely to gain 15 pounds during the freshman year," said Sareen Gropper, a professor of nutrition at Auburn University in Alabama. "Instead, the typical college freshman gains anywhere from 3 to 5 pounds."
And what makes the pounds pile on? College students tend to eat morehigh-calorie foods, and fail to get enough physical activity, Gropper said. "Those foods are often consumed late at night while studying, as well as during evening social activities."
Still, freshman-year weight gain is not inevitable, Readdean told LiveScience. "College students today have more dining hall food choices and information than ever before. With effort and planning, healthy eating can easily be achieved on any meal plan."
Casual sex
A college-age couple studies together
(Image credit: College couple photo via Shutterstock)
Although many college students engage in casual sex, a recent study of more than 1,800 18-to-25-year-olds who had completed at least one year of college found that the students were not any more promiscuous during their first year of college, than they were in the years prior to college.
Nonetheless, studies show that college students believe their peers are much more sexually active than is actually the case.
Commonplace or not, casual sex comes with health risks, including sexually transmitted diseases, emotional and mental distress, sexual violence and unintended pregnancy.
"Sexually transmitted infections, most of which are treatable, are a key physical health issue for today's college students," Readdean said. "Despite access to testing, treatment and prevention options, some college students are not being proactive enough in this area."
Sleep deprivation
A woman sleeps on her desk
(Image credit: Tired woman photo via Shutterstock)
Too many college students know the pain of sleep deprivation. One study of 120 university students found that 60 percent had pulled at least one all-nighter during their college careers. Unfortunately, such sleepless nights were correlated with a lower GPA.
A larger study, of 1,125 students, found that 60 percent had poor sleep habits, including delaying both bed and rise times on weekends, as well as taking prescription, over the counter and recreational drugs to alter sleep or wakefulness. These students reported more problems with their physical and psychological health than those with better sleep habits.
"Adjusting to irregular class schedules, a proclivity to pulling all-nighters, and residence hall noise are some of the barriers that may prevent college students from getting good, regular sleep," Readdean said.
Psychological effects of debt
A college-age man studies in a library
(Image credit: College student photo via Shutterstock)
Tuition rates are higher than ever, causing many students to take on unprecedented amounts of debt. This looming burden in turn causes stress about money and can affect students' college experience.
A recent study from researchers at Indiana University found that debt-free students engaged in a partying lifestyle, with their social lives taking on more importance than their academic obligations. These students often made social connections that lasted after college. Students with debt, however, were much less likely to party and more likely to spend time studying.
Other research has found that those students with debt are more likely to worry about their financial burden, which leads to anxiety, stress and sleeping problems.
Long-term health effects of a college degree
College students celebrate graduation
(Image credit: College graduation photo via Shutterstock)
While the health risks that can come with college may seem intimidating, overall, college tends to be good for a person's body and mind.
Higher levels of education generally correlate to better health, as well economic success and family stability, which can indirectly lead to better health outcomes. People with higher levels of education tend to have improved brain development, less biological aging and better understanding and compliance with healthy behaviors, studies show.
Furthermore, research shows that education is associated with a longer life. According to the National Longitudinal Mortality Study, men who finished college lived 2.5 years longer than college dropouts, while women with a college degree lived 1.1 years longer than their dropout counterparts. The difference was even greater when comparing college graduates to high school dropouts -- college graduates live at least five years longer on average than people who did not finish high school.
The study also showed the positive health outcomes extend into the next generation: the mortality rate of children born to college graduates was 4.2 percent, while the mortality rate of those born to women who did not finish college was 6 percent.
Thus, while college life can present some challenges, the research still supports sticking it out at school.
|
Ectopic Pregnancy
What is an Ectopic Pregnancy?
During the first two weeks of a normal pregnancy when conception takes place, the egg would be fertilized inside your fallopian tubes and then travel into the uterus where it would then implant itself in the uterine wall.
In an Ectopic Pregnancy, also known as tubal pregnancy, the egg would implant itself outside the uterine cavity, usually in the fallopian tube itself, instead of in the uterus. There are other possible sites of implantation but over 95% of all ectopic pregnancies are in the fallopian tubes. Other possible implantation sites include: Ovary, cervix and other sites in the abdomen.
Over the past 10 years ectopic pregnancies have been on the rise, with an increase of almost triple the number of ectopic pregnancies than there were 10 years previously, with figures rising from 55,000 to well over 150,000.
Researchers believe that the primary cause for the increase of ectopic and tubal pregnancies is because of the high rate of STD’s in the world today, especially chlamydia and gonorrhea.
Symptoms of an Ectopic Pregnancy
Tender lower abdomen
Brown spotting or bleeding
Shoulder pain
Weakness or dizziness
You will see from the above symptoms that it may be difficult for your doctor to diagnose an ectopic pregnancy, as most of the above symptoms are normal signs and symptoms of pregnancy except for the shoulder pain. Shoulder pain is caused by blood from the ruptured tube irritating the peritoneum, a thin membrane that lines the abdominal and pelvic cavities in the area between the chest and stomach.
Treating an Ectopic Pregnancy
Unfortunately with an ectopic pregnancy your doctor will have no choice other than to remove the embryo from where it has embedded itself, usually done via surgery while under general anesthetic, and in some cases it may be necessary to remove the fallopian tube, which will have an effect on future fertility.
Ectopic Pregnancy |
Caffeine And Pregnancy
Most physicians will generally recommend that you avoid caffeine as much as possible during your pregnancy. One reason is that caffeine is a known diuretic, which cause you to pass fluids from your body, and can leave you dehydrated. Drinking too much caffeine can also leach calcium from your body, and it is important that you are getting adequate amounts of calcium during pregnancy. Large amounts of caffeine have also been associated with an increased risk for miscarriage, premature birth and low birth weight. If you do want some caffeine during your pregnancy, most practitioners will recommend you limit your intake to less than 300 mg per day. |
• Of Course the Federal Government Can Regulate Elections
by Heather Cox Richardson
The Constitution not only enables, but requires the federal government to act when state authority violates the principles of democracy, something President Harry Truman realized in 1946.
• Manchin and Sinema are Fulfilling John Roberts's Vision
by Ronald Brownstein
"Roberts, who served as a young clerk to conservative Supreme Court Justice William Rehnquist and as a Justice Department assistant in the Reagan administration, has long expressed hostility to federal oversight of voting and election rules."
• Ornstein: Five Filibuster Myths
"Supporters of the status quo have their reasons, many of them caught up in myths about the history of the Constitution and the Senate’s role."
• "A Minority of Misguided Senators": MLK on the Filibuster
“I think the tragedy is that we have a Congress with a Senate that has a minority of misguided senators who will use the filibuster to keep the majority of people from even voting. They won’t let the majority senators vote."
• The Dangers of Compromise on Voting Rights
by Rachel Shelden
Are moderate Democrats seeking bipartisan support for voting rights legislation repeating the errors of the antebellum legislators who misunderstood the South's commitment to securing slavery at any cost including secession?
• How Did the Senate Get Supermajority Gridlock?
by Lindsay M. Chervinsky
The framers clearly intended for majority rule in the passage of legislation in the Senate. So how did we get to the point where a majority can't do anything?
• No, John Calhoun Didn't Invent the Filibuster
by Robert Elder
A new book castigating the filibuster traces it back to the parliamentary maneuvers of pro-slavery ideologue John C. Calhoun. One needn't embrace either Calhoun or the filibuster to recognize this is historically incorrect.
• The Filibuster is an Anti-Worker Rule, Too
by Emily DiVito and Suzanne Kahn
Since 1948, the filibuster has blocked three major labor reform bills affecting "right to work" laws, streamlining the union recognition process, and protecting workers from retaliation during labor disputes. Eliminating it is critical for economic justice.
• Bouie: Manchin and Sinema Have Their History Wrong
Bipartisan support for 1960s civil rights legislation was an artifact of a fleeting moment of ideological diversity within the two parties. When it comes to voting and civil rights laws, partisan polarization has been the historical norm, and it's nothing to fear now when ballot access is at risk across the nation.
• Save Democracy: Abolish the Senate
by Michael Tomasky
Great Britain made the wise choice of diminishing the political power of the House of Lords. The New Republic's editor says that the history of Parliament and Congress shows it's time to do the same to the Senate.
• The Senate’s Unchanging Rules
by Donald A. Ritchie
Continued obstructionism is likely to push the Democrats to more radical alteration of Senate rules, including the filibuster, says the long-tenured Senate Historian.
• Academics Address the Filibuster
Seth Cotlar notes that history doesn't directly inform present action, but since advocates for retaining the filibuster had used many bad historical claims in their arguments it is only fair for historians to weigh in on the debate. |
Responsible Techno-Users Practice Electronic Recycling
It appears as if we cannot live without them and industries have to continually make new and better electronics and machinery. But what happens to the old and obsolete high-tech electronics? They just sit on shelves and eventually are thrown away as waste.
Advocates of Electronic Recycling, emphasizes the need to Re-use electronic gadgets and machinery by donating or reselling working units to other people. This is done to maximize their use. Non-serviceable units may then be recycled. Advocates therefore consider such electronic waste not as “waste” but as an important resource. Admittedly, the by product of recycling electronics aside from obtaining the original resource is toxic waste: lead, cadmium, mercury and asbestos. So, even if the bulk of the electronic gadget is recyclable there still remains the toxic substance that cannot be re-used nor recycled. Professional electronic recycling companies are able to dispose of such toxic substances properly.
Because of the very nature of this e-waste, what is important is proper disposal. Improper disposal would eventually lead this e-waste into the landfill where it could spill its toxic substances. The leakage will be absorbed by the soil. Some will run off with the rain and contaminate the surrounding lands while others will move downwards into the water beneath the soil, contaminating potable water resources. One of the primary toxins that cause health problems in children is lead. The extent of the poisoning ranges from simple health illnesses to seizures and even death. Behavioral and certain learning disabilities in children have been traced to lead poisoning as well. Proper containment of toxic substances and chemicals can reduce these adverse health effects.
Electronic Recycling is the best way to prevent the improper disposal of e-waste. It reduces the risk of poisonous substances entering the soil or contaminating water resources. The soil wherein our plants and vegetables are grown and from which our livestock eats must be free from all toxins. Even, the water which all living things need must be safe from all poisonous substances. We can prevent this from happening. It is our duty as users of electronic technology to take care of the resulting waste. |
Unpenji temple – a temple hidden in the clouds which one can only find by luck
Walking the Shikoku Pilgrimage, you will encounter Sekisho temples (checkpoint temple) in each prefecture of Tokushima, Kochi, Ehime, and Kagawa. Sekisho temples are places where Kobo Daishi makes a judgment on people. If you are judged as a wrongdoer, you are not allowed to pass through the checkpoint to the next temple. Unpenji temple is the first Sekisho temple in Sanuki (old name of Kagawa) and also the most difficult one.
“Judgment” sounds really scary to people. However, think it in a different way, if you pass the Unpenji temple that means your journey in Sanuki will get smooth sailing.
002When Saekimao (name of Kobo Daishi before he became monk) was sixteen years old, he wanted to build a temple (nowadays known as the Zentsuji temple) at his birthplace. He came to the mountain for picking some woods and fortuitously met this silent place which touched him so much that he built a Buddhist temple here which became the Unpenji temple nowadays.
003At 911 meter above the sea level, Unpenji temple is at the border between Tokushima and Kagawa Prefectures. Standing here on the mountain, you can enjoy the panoramic view of the Sanuki plain, the Setouchi Inland Sea and multiple mountains of Tokushima. If you look further, you can even see Ehime and Kochi prefecture. In the past, lots of monks came here for studying, so Unpenji temple got the nickname “Shikoku Kouya” which means the knowledge place, like Kouyasan in Wakayama.
004Shikoku 88 temples usually put the “Sango” (honorific mountain prefix – 山号 the first kanji means mountain) before formal temple name. This customcan be traced back to the Sui and Tang period of China. As lots of temples are built in the mountain far from the city, it is more convenient to use the mountain’s name as the temple.
“Sango” was introduced into Japan from China with Buddhism, but the Japanese were already usingthe name of the place as “Sango” at that time. For example, the Shitennoji temple built by Prince Shotoku in the Asuka period (7th century) is located at Arahaka (mountain name), so Shitennoji temple uses Arahaka as its “Sango”.
However with the Heian period starting the situation changed. Originally in the Asuka and Nara period, Buddhisttemples belonged to the powerful man of the land. yettheHeian period, birth time of Kukai (Kobo Daishi), places the monk in charge of temple.
Additionally, Buddhism in Japan also incorporatedthe traditional faith of mountains and became “Mountain Buddism”. Lots of monks left society and went to the mountains to build temples. From this time“Sango” started to beused as its real meaning. The Koyasan Kongobuji temple built by Kukai is the most famous example.
The “Sango” of Unpenji temple is Kyogozan. Kyogo (巨鼇) means “large sea turtle” originated from a Chinese old book telling the legend of a turtle supporting the Earth. Furthermore, Unpenji temple is locatedon ahigh place from whereyou can see the sea, so it also has connection withthe sea and gets the Sango name “Kyogozan”.
005The Buddhism folklorist Mr. Gorai Shigerusays that the Senju Kannon worshiped in Unpenji temple is also related to the sea. It is believed so because of Senju Kannon bodywhich is like the mast on the boat and the handson the backgroundwhich are like sailcloth while sailing. That is the reason why, in the ancient period, people would set a Senju Kannon sculpture at the bow of their boat to pray for safety while they sailed wishing to reach the far away Pure Land of Kannon named Fudaraku.
006What is the most impressive discover in Unpenji temple is the expressive and lifelike 500 Arhats. According to the legend, these 500 Arhats are saints who gathered for the Buddhist Councils when the Buddha reached Nirvana. The expression of each 500 Arhatin Unpenji temple is different from one to another.Some looks thinking, some smiles and some even looks angry.
007It is like the 500 Arhatswill get life and move at anytime giving you a stressing feeling while you walk along them. Thenthe sculpture of Buddha who reached Nirvana finally appears erasing all your uneasiness. Time seems to stop and as you cannottake youreyes off the sculpture you enterinto meditation.
008Nearby Noukyousho (the office where you can obtain a temple stamp “noukyou-shuin”), there is the Mizuko Jizo (Jizo who comforts the souls of dead fetuses or stillborn babies). It is one of the still unknown power spot of Unpenji temple. The children surrounding the Mizuko Jizo are so moving as they hope to be saved clinging to the cloth. Bearing this sad mood you will finally arrive to the Daishido (hall for the Great Teacher), the heavy feeling disappearing while you visit the Jibokannon.
009There is a stone torii nearby the Jibokannon leading to a shrine worshiping Gosha Daigongen (the Great Avatar of five shrines) protecting the Unpenji temple. Gongen is the god mixed betweenShinto and Buddhism before Meiji restoration. In other words, Gongen is the BuddhistBodhisattva who giveshape tothe Japanese god. Later becausethe emperor Meji wanted to make Shinto as the state religion, he ordered to separate Buddhism and Shinto. However, syncretism of Shinto and Buddhism haddeeply penetrated into the folk culture so it was really difficult to separate them. That is the reason why we can still see Gosha Daigogen here nowadays.
010Otanominasu is anotherwell-known spot in Unpenji temple. Eggplantsbloom then bear fruits, so it is considered as a good omen in Japan. Additionally, the Japanese pronunciation of eggplant is “Nasu” (なす)which sounds like “complete” (成す) in Japanese. People believe that goingthrough the holeof the stone eggplant then sitting on the Otanominasu behind it and writing the wish on eggplant-shaped Ema (lucky wooden card) can make the wish come true.
Besides, you can pray for safety, get rid off bad luck and be exorcisedin Unpenji temple. You will easily understand it in front of the main temple onceyou see the exorcism box.
011Here there are ema carved with thecharacter 厄”(aku) representingthe misfortune . Writedown your name and age on the card then push the character, “厄” will fallinto the exorcism box with all your misfortune. At last, hang up the Ema and prayfor getting rid of the bad luckthis year. Your exorcismis completed.
012Besides visiting Kobo-Daishi to pray for safety, you can enjoy different scenes of Unpenji temple in different seasons. For example, the 500 Arhatswill get more conspicuous with hydrangea in summer; However, they will get a solemn atmosphere with the white snow covering them in winter. Additionally, in autumn the red leaves in front of the temple gate and the ginkgo biloba behind the Kosodate Jizo (child-raising Jizo) become the most attractive spots.
014Unpenji also launch hydrangea Omamori (Japanese amulet) and red leaves Shuin (seal stamp given to worshipers) during special periods. When the rainy season started you can enjoy view of hydrangea taken from the mountain and floating on the water surface of Temizuya, the water ablution pavilion used for purification before entering the temple, creating a serious while gentle atmosphere. If you have time to visit here, just walk slowly and enjoy all these beautiful aspects of Unpenji temple.
By car: Get off at Onohara interchange of Takamatsu expressway then 15-minute drive.
By train: Take JR train to JR Kanonji (観音寺) station, then take a taxi to Unpenji ropeway (about 24 minutes), or take bus Gogo-Takamuro line (五鄉高室) and get off at Tanigami (谷上) stop
then follow the signs (about JPY100).
Bus time table (only Japanese) https://tozanguchi.net/unpenjisan_ropewey/(Japanese) |
Trade Schools
Why is it always, “Make sure you go to college,” and never “Make sure you go to trade school?”
Most high school students are funneled into two- or four-year universities. Little thought is given to other paths toward adulthood, and schools and parents often fail to present alternative options.
The allure of a college degree has tarnished the reputation of trade schools.
COVID-19 hammered most professional sectors but many trade jobs saw double or triple growth. During the economic downturn, trade labor continued expanding despite a volatile world. The pandemic revealed just how much rests upon the shoulders of skilled trade workers.
For students who may not know what they want to do, or if they merely want to try something other than college, trade school offers promise. Many trade workers collect far higher salaries than college-educated young adults and, in some other countries, trade school is popular and encouraged.
One reason high school conversations rarely gravitate to trade school is, in part, because of the stigma that comes with not attending college. But forgoing college does not equate to failure; in some cases it means better pay and better work-life balance down the line.
We should advocate for pursuing trade school just as vocally as we praise the college-bound.
The assumption today is that, without college, you won’t secure a job that pays well enough to live comfortably or raise a family. But pursuing a traditional college degree should not be presented as an ultimatum or sole option because it stigmatizes other paths which may be just as viable.
Forcing students — or telling them they have only one viable path to follow — to subject themselves and their families to the cost of education is troublesome. College does not make the most sense for everyone. The upfront investment is high (college tuition has increased 213% in the last 30 years) and returns are not guaranteed.
Underemployment is a measure that determines if an individual is working in a job they are overqualified for. For college grads, the underemployment rate is nearly 50%.
While college does not shield you from potentially working low-wage, physically demanding and labor-intensive jobs, the glowing adulation of a degree makes it seem like it could. What’s more, trade and skilled labor jobs fail to capture the attention or respect of those who attend college.
Jobs that do not require a four-year degree — such as industrial, construction or service trades — still demand highly skilled, competent and effective individuals. More dangerous trade jobs, such as those in the fishing industry or coal miners, pay far better than some white-collar jobs and ask applicants for skills rather than experience.
Mike Rowe made a name for himself by hosting the TV show, “Dirty Jobs.” He traveled the country working trade jobs. Plumbers, electricians, brick layers, fishers and innumerable other skilled workers had Rowe join in on their work, leaving him impressed and humbled.
Many of these workers were happy and entrepreneurial, with families and a healthy work-life balance — and many did not attend college.
Rowe’s program illustrates how unfairly trade jobs are stigmatized and then avoided in favor of a college degree.
“Our crumbling infrastructure, our widening skills gap, the disappearance of vocational education, and the stratospheric rise in college tuition—these are not problems,” Rowe writes on his website. “These are symptoms of what we value. And right now, we have to reconnect the average American with the value of a skilled workforce. Only then, will the next generation aspire to do the work at hand.”
Student loan debt continues to pile up every year (though the Biden administration may address this) and young adults continue to pursue higher-ed. At the same time, millions of trade jobs across the country wait to be filled, but there are too few skilled trade workers who can fill them.
College is a wonderful experience, but it should not be promoted at the expense of trade schools and skilled labor jobs. A Washington State auditor report found that hiring managers in the skilled labor market cannot find enough employees — even despite generous starting-salaries.
Among other things, the report suggested career guidance for high schoolers and middle schoolers that focused on alternatives to the university path.
Finding a trade or undertaking an apprenticeship can pay dividends when compared to the cost of a four-year degree (and 59% of students take five years to graduate anyway). Most certifications from a trade school cost a fraction of what a single semester may cost at a brand-name university, and they take far less time to acquire.
Further, those with a technical education enjoy a higher chance of employment compared to those with academic training, according to the U.S. Department of Education.
At the very least, these options should be given more consideration than they currently are.
The next time you see a high school student, think twice about asking them what college they plan to attend.
Try asking them if they’ve thought about trade school.
Follow link to article –
Follow link to careers page –
Posted in
trade schools |
As we age, the changes that happen in our body are inevitable. Physical changes are what we notice first, but non-physical changes occur as well. Our immune system is not as strong as it used to be, and we are prone to diseases and different conditions more than ever. Also, our organs do not function as they used to. Many things can go wrong, but the most common are listed in the following paragraphs.
The Most Common Diseases and Conditions Seniors Face As They Age
Problems with muscles and bones are almost inevitable, such as muscle loss, bone loss, fractures, problems with joints – or in other words, osteoarthritis and osteoporosis. Our metabolism is getting slower and problems with diabetes and our thyroid are more common.
Any type of dementia, as well as Parkinson’s disease, is not rare. Some people develop balance issues, so taking up exercises for regaining the balance is recommended.
Cardiovascular problems include various conditions: problems with blood pressure, heart failure, heart attacks, atrial fibrillation and many others. Consider performing certain exercises for preventing heart diseases.
The Most Common Diseases and Conditions Seniors Face
Problems with organs are among the most common, including the kidneys, lungs, liver, and skin. Most of our organs do not function as they used to, and skin can become dry and itchy. If combined with other diseases, such as diabetes, problems become tenfold.
The list is quite long and includes other problems as well: urinary and other infections, dental issues, weight loss, gastrointestinal problems, etc. Some of them you cannot avoid, but you can do a lot to postpone them with exercising and a proper diet. Think on time and do your best to stay healthy for as long as possible. Don’t take your health for granted. Once you get sick, it is very difficult to get better, especially if you are over 55 years old. |
How to develop a powerful and meaningful land acknowledgement
How to develop a powerful and meaningful land acknowledgement
Tuesday, June 8, 2021
Congress 2021 blog edition
By Claire Kroening, University of Alberta human geography alumna and communications professional
Keith King, University of Alberta, opened the Congress 2021 land acknowledgement workshop saying “as inhabitants of the land, it's essential we explore relationships with the original peoples of this land, and to learn with the local Indigenous people.” He noted how rare it is to be in a place that doesn't have a history of colonization and occupation. When we look, we will see we are always on Indigenous land.
Land acknowledgements are an old Indigenous tradition and protocol done to pay respect to the people and history of the lands you are situated on. Today, land acknowledgements affirm the enduring relationship between Indigenous peoples and express commitments of reconciliation.
Teachings and quotes from Grandmother Doreen Spence
Elder Doreen Spence of the University of Calgary spoke during the first part of the workshop. A well-travelled woman, she always makes sure to honour the land she is visiting through ceremony. “I always give gratitude and share a piece of Earth from over here, to our land over there.”
Elder Doreen Spence spoke on the resiliency of Indigenous peoples that she has seen during her travels to New Zealand, Greenland and Mexico, and in her own home.
“Be humble, we are the most resilient people on the planet. We have been gifted so much. Yes, we feel our trauma, yes, we feel our pain. But that is the power of our Elders and the power we have in healing.”
“We must balance dark times and light times. I believe that now, with a lot of the history being uncovered, you will hear a lot more of the celebratory aspect of songs to celebrate the survival of the people.”
How to develop and deliver a meaningful land acknowledgement
Begin every presentation with a personalized and spoken land acknowledgement. The meeting host should begin with one, as well as any speakers that follow. The acknowledgement should be genuine, earnest, and delivered in the spirit of a treaty partner. Statements should not be guilt-focused; rather, they should focus on the positive spirit of reconciliation.
It’s critical to consider the intent of the acknowledgement for it to be genuine. We make land acknowledgements to raise awareness of Indigenous land rights, acknowledge our status and engage in a conversation or dialogue. Ensure your statement reflects these intentions, either implicitly or explicitly.
A common issue of poor land acknowledgements is they often come across as a static statement, written far ahead of time. They are words about reconciliation, disconnected from concrete, reconciliatory actions. The big question each person, organization, and institution must ask of themselves is: what commitments are we making, and how do we make these commitments live beyond our words?
The basic process for creating a meaningful land acknowledgement is as follows:
• Identify and research who the Indigenous peoples of the area are, and learn to pronounce their names correctly.
• Identify your positionality - Are you a descendent of a colonizer? A settler? A visitor?
• Personalize your delivery - determine what commitments you are responsible for, and describe the actions you are taking to carry forth those commitments.
Written versus verbal acknowledgements
The big difference between verbal and written land acknowledgements is fluidity. A written acknowledgment is static and likely will appear in multiple places like on websites, formal documents, or email signatures.
A verbal acknowledgement should always be personalized to the person delivering it and the context in which it is being said. |
Meissner Tetrahedra
Initializing live version
Download to Desktop
Requires a Wolfram Notebook System
The two Meissner bodies are solids of constant width. Others are spheres and certain solids of revolution.
The Reuleaux tetrahedron is the intersection of four balls of radius 1, each centered at a vertex of a regular tetrahedron with side length 1. Each of the six curved edges of is the intersection of two spheres; three edges meet at each vertex and three surround each face.
For a curved edge , let be the corresponding straight edge of and let and be the faces of that meet at . The planes containing and cut a wedge out of with edges that are circular arcs and . The wedge is formed by rotating into around . Rounding means to replace with .
The first kind of Meissner body is obtained by rounding the three edges at a vertex of and the second by rounding the three edges around a face of .
Contributed by: Izidor Hafner (January 2014)
Open content licensed under CC BY-NC-SA
[1] B. Kawohl and C. Weber. "Meissner's Mysterious Bodies." (Jun 19, 2011)
[2] E. Meissner, "Über Punktmengen konstanter Breite," Vierteljahrsschrift der Naturforschenden Gesellschaft in Zürich, 56(42–50), 1911. page/n53/mode/2up.
[3] E. Meissner and F. Schilling, "Drei Gipsmodelle von Flächen konstanter Breite," Zeitschrift für angewandte Mathematik und Physik, 60(92–94), 1912.
Feedback (field required)
Email (field required) Name
Occupation Organization |
Forces in Liquids | Engineering Library
Chapter 2: Forces in Liquids
This page provides the chapter on forces in liquids from the U.S. Navy's fluid power training course, NAVEDTRA 14105A, "Fluid Power," Naval Education and Training Professional Development and Technology Center, July 2015.
Other related chapters from the Navy's fluid power training course can be seen to the right.
Forces in Liquids
The study of liquids is divided into two main parts: liquids at rest (hydrostatics) and liquids in motion (hydraulics).
The effects of liquids at rest can often be expressed by simple formulas. The effects of liquids in motion are more difficult to express due to frictional and other factors whose actions cannot be expressed by simple mathematics.
In chapter 1 we learned that liquids have a definite volume but take the shape of their containing vessel. There are two additional characteristics we must explore prior to proceeding.
Liquids are almost incompressible. For example, if a pressure of 100 pounds per square inch (psi) is applied to a given volume of water that is at atmospheric pressure, the volume will decrease by only 0.03 percent. It would take a force of approximately 32 tons to reduce its volume by 10 percent; however, when this force is removed, the water immediately returns to its original volume. Other liquids behave in about the same manner as water.
Another characteristic of a liquid is the tendency to keep its free surface level. If the surface is not level, liquids will flow in the direction that will tend to make the surface level.
Learning Objectives
When you have completed this chapter, you will be able to do the following:
1. Recognize the pressure characteristics of liquids.
2. Describe how pressure is caused by the weight of the atmosphere.
3. Explain how pressures are measured.
4. Identify terms and facts applicable to the physics of fluids.
5. Solve problems pertaining to density and specific gravity.
6. Recognize the principles and equations involved with the transmission of forces.
7. Solve problems and equations involved with the transmission of forces.
8. Recognize the characteristics and behavior of fluids in motion.
9. Explain the methods for measuring volume and velocity.
10. Relate the dynamic and static factors involved with fluid flow.
11. Describe the operating characteristics and component functions of basic fluid power systems.
Liquids at Rest
In studying fluids at rest, we are concerned with the transmission of force and the factors that affect the forces in liquids. Additionally, pressure in and on liquids and factors affecting pressure are of great importance.
Pressure and Force
The terms force and pressure are used extensively in the study of fluid power. It is essential that we distinguish between the terms. Force means a total push or pull. It is the push or pull exerted against the total area of a particular surface and is expressed in pounds or grams. Pressure means the amount of push or pull (force) applied to each unit area of the surface and is expressed in pounds per square inch (lb/in2) or grams per square centimeter (g/cm2). Pressure may be exerted in one direction, in several directions, or in all directions.
Computing Force, Pressure, and Area
A formula is used in computing force, pressure, and area in fluid power systems. In these formulas, P refers to pressure, F indicates force, and A represents area.
Force(lbs) = Pressure(psi) · Area(in2)
Force equals pressure times area. Thus, the formula is written:
F = P · A
Pressure equals force divided by area. By rearranging the formula, this statement may be condensed into:
P = F / A
Since area equals force divided by pressure, the formula is written:
A = F / P
A memory device for recalling the different variations of this formula is shown in Figure 2-1. Any letter in the triangle may be expressed as the product or quotient of the other two, depending on its position within the triangle.
Device for determining the arrangement of the force, pressure, and area formula
Figure 2-1: Device for determining the arrangement of the force, pressure, and area formula.
To determine the area, use the formula for finding the area of a circle. This is written A = π r2 where A is the area, 3.1416 (3.14 or 3 1/7 for most calculations), and r2 indicates the radius squared.
Sometimes the area may not be expressed in square units. If the surface is rectangular, you can determine its area by multiplying its length (say, in inches) by its width (also in inches). The majority of areas you will consider in these calculations are circular in shape. Either the radius or the diameter may be given, but you must know the radius in inches to find the area. The radius is one-half the diameter.
Atmospheric Pressure
The atmosphere is the entire mass of air that surrounds the earth. While it extends upward for about 500 miles, the section of primary interest is the portion that rests on the earth's surface and extends upward for about 7 1/2 miles. This layer is called the troposphere.
If a column of air 1-inch square extending all the way to the "top" of the atmosphere could be weighed, this column of air would weigh approximately 14.7 pounds at sea level. Thus, atmospheric pressure at sea level is approximately 14.7 psi.
As one ascends, the atmospheric pressure decreases by approximately 1.0 psi for every 2,343 feet. However, below sea level, in excavations and depressions, atmospheric pressure increases. Pressures under water differ from those under air only because the weight of the water must be added to the pressure of the air.
Atmospheric pressure can be measured by any of several methods. The common laboratory method uses the mercury column barometer. The height of the mercury column serves as an indicator of atmospheric pressure. At sea level and at a temperature of 0 degrees Celsius (°C), the height of the mercury column is approximately 30 inches, or 76 centimeters. This represents a pressure of approximately 14.7 psi. The 30-inch column is used as a reference standard.
Another device used to measure atmospheric pressure is the aneroid barometer. The aneroid barometer uses the change in shape of an evacuated metal cell to measure variations in atmospheric pressure (Figure 2-2). The thin metal of the aneroid cell moves in or out with the variation of pressure on its external surface. This movement is transmitted through a system of levers to a pointer, which indicates the pressure.
Simple diagram of the aneroid barometer
Figure 2-2: Simple diagram of the aneroid barometer.
The atmospheric pressure does not vary uniformly with altitude. It changes more rapidly at lower altitudes because of the compressibility of the air, which causes the air layers close to the earth's surface to be compressed by the air masses above them. This effect, however, is partially counteracted by the contraction of the upper layers due to cooling. The cooling tends to increase the density of the air.
Atmospheric pressures are quite large, but in most instances practically the same pressure is present on all sides of objects so that no single surface is subjected to a great load.
Atmospheric pressure acting on the surface of a liquid (Figure 2-3, view A) is transmitted equally throughout the liquid to the walls of the container, but is balanced by the same atmospheric pressure acting on the outer walls of the container. Atmospheric pressure acting on the surface of one piston is balanced (Figure 2-3, view B) by the same pressure acting on the surface of the other piston. The different areas of the two surfaces make no difference, since for a unit of area, pressures are balanced.
Effects of atmospheric pressure
Figure 2-3: Effects of atmospheric pressure.
Transmission of Forces Through Liquids
When the end of a solid bar is struck, the main force of the blow is carried straight through the bar to the other end (Figure 2-4, view A). This happens because the bar is rigid. The direction of the blow almost entirely determines the direction of the transmitted force. The more rigid the bar, the less force is lost inside the bar or transmitted outward at right angles to the direction of the blow.
When a force is applied to the end of a column of confined liquid (Figure 2-4, view B), it is transmitted straight through to the other end and also equally and undiminished in every direction throughout the column — forward, backward, and sideways — so that the containing vessel is literally filled with pressure.
Transmission of force: (A) solid; (B) fluid
Figure 2-4: Transmission of force: (A) solid; (B) fluid.
An example of this distribution of force is illustrated in Figure 2-5. The flat hose takes on a circular cross section when it is filled with water under pressure. The outward push of the water is equal in every direction.
Distribution of force
Figure 2-5: Distribution of force.
So far we have explained the effects of atmospheric pressure on liquids and how external forces are distributed through liquids. Let us now focus our attention on forces generated by the weight of liquids themselves. To do this, we must first discuss density, specific gravity, and Pascal's law.
Density and Specific Gravity
The density of a substance is its weight per unit volume. The unit volume in the English system of measurement is 1 cubic foot. In the metric system it is the cubic centimeter; therefore, density is expressed in pounds per cubic foot or in grams per cubic centimeter.
To find the density (D) of a substance, you must know its weight (W) and volume (V). You then divide its weight by its volume to find the weight per unit volume. In equation form, this is written as:
D = W / V
EXAMPLE: The liquid that fills a certain container weighs 1,497.6 pounds. The container is 4 feet long, 3 feet wide, and 2 feet deep. Its volume is 24 cubic feet (4 ft x 3 ft x 2 ft). If 24 cubic feet of this liquid weighs 1,497.6 pounds, then 1 cubic foot weighs 62.4.
1,497.6 / 24 = 62.4
Therefore, the density of the liquid is 62.4 pounds per cubic foot.
This is the density of water at 4 °C and is usually used as the standard for comparing densities of other substances. The temperature of 4 °C was selected because water has its maximum density at this temperature. In the metric system, the density of water is 1 gram per cubic centimeter. The standard temperature of 4 °C is used whenever the density of liquids and solids is measured. Changes in temperature will not change the weight of a substance but will change the volume of the substance by expansion or contraction, thus changing the weight per unit volume.
In physics, the word specific implies a ratio. Weight is the measure of the earth's attraction for a body. The earth's attraction for a body is called gravity. Thus, the ratio of the weight of a unit volume of some substance to the weight of an equal volume of a standard substance, measured under standard pressure and temperature conditions, is called specific gravity. The terms specific weight and specific density are sometimes used to express this ratio.
The following formulas are used to find the specific gravity (sp gr) of solids and liquids, with water used as the standard substance.
$$ \text{sp gr} = { \text{Weight of the substance} \over \text{Weight of an equal volume of water} } $$
$$ \text{sp gr} = { \text{Density of the substance} \over \text{Density of water} } $$
The same formulas are used to find the specific gravity of gases by substituting air, oxygen, or hydrogen for water.
The specific gravity of water is 1 (62.4 / 62.4).
If a cubic foot of a certain liquid weighs 68.64 pounds, then its specific gravity is 1.1, (68.64 / 62.4).
Thus, the specific gravity of the liquid is the ratio of its density to the density of water. If the specific gravity of a liquid or solid is known, the density of the liquid or solid may be obtained by multiplying its specific gravity by the density of water. For example, if a certain hydraulic liquid has a specific gravity of 0.8, 1 cubic foot of the liquid weighs 0.8 times as much as a cubic foot of water — 0.8 times 62.4, or 49.92 pounds. In the metric system, 1 cubic centimeter of a substance with a specific gravity of 0.8 weighs 1 times 0.8, or 0.8 grams. (Note that in the metric system the specific gravity of a liquid or solid has the same numerical value as its density, because water weighs 1 gram per cubic centimeter.)
Specific gravity and density are independent of the size of the sample under consideration and depend only on the substance of which it is made.
A device called a hydrometer is used for measuring the specific gravity of liquids.
Pascal's Law
Recall from chapter 1 that the foundation of modern hydraulics was established when Pascal discovered that pressure in a fluid acts equally in all directions. This pressure acts at right angles to the containing surfaces. If some type of pressure gauge, with an exposed face, is placed beneath the surface of a liquid (Figure 2-6) at a specific depth and pointed in different directions, the pressure will read the same. Thus, we can say that pressure in a liquid is independent of direction.
Pressure of a liquid is independent of direction
Figure 2-6: Pressure of a liquid is independent of direction.
Pressure due to the weight of a liquid, at any level, depends on the depth of the fluid from the surface. If the exposed face of the pressure gauges (Figure 2-6) is moved closer to the surface of the liquid, the indicated pressure will be less. When the depth is doubled, the indicated pressure is doubled. Thus the pressure in a liquid is directly proportional to the depth.
Consider a container with vertical sides (Figure 2-7) that is 1 foot long and 1 foot wide. Let it be filled with water 1 foot deep, providing 1 cubic foot of water. We learned earlier in this chapter that 1 cubic foot of water weighs 62.4 pounds. Using this information and equation 2-2, P = F/A, we can calculate the pressure on the bottom of the container.
Water pressure in a 1-cubic-foot container
Figure 2-7: Water pressure in a 1-cubic-foot container.
P = F / A
= 62.4 lbs / 1 ft2
= 62.4 lb/ft2
Since there are 144 square inches in 1 square foot,
P(psi) = 62.4 lbs / 144 in2 = 0.433 psi
This equation can be stated as follows: the weight of a column of water 1 foot high, having a cross-sectional area of 1 square inch, is 0.433 pound.
If the depth of the column is tripled, the weight of the column will be 3 x 0.433, or 1.299 pounds, and the pressure at the bottom will be 1.299 (psi), since pressure equals the force divided by the area. Thus, the pressure at any depth in a liquid is equal to the weight of the column of liquid at that depth divided by the cross-sectional area of the column at that depth. The volume of a liquid that produces the pressure is referred to as the fluid head of the liquid. The pressure of a liquid due to its fluid head is also dependent on the density of the liquid.
If we let A equal any cross-sectional area of a liquid column and h equal the depth of the column, the volume becomes Ah. Using equation 2-4, D = W/V, the weight of the liquid above area A is equal to AhD.
D = W/V, D = W/(Ah), W = AhD
Since pressure is equal to the force per unit area, set A equal to 1. Then the formula pressure becomes
P = hD
It is essential that h and D be expressed in similar units. That is, if D is expressed in pounds per cubic foot, the value of h must be expressed in feet. If the desired pressure is to be expressed in pounds per square inch, the pressure formula, equation 2-5, becomes
P = hD / 144
Pascal was also the first to prove by experiment that the shape and volume of a container in no way alters pressure. Thus in Figure 2-8, if the pressure due to the weight of the liquid at a point on horizontal line H is 8 psi, the pressure is 8 psi everywhere at level H in the system. Equation 2-5 also shows that the pressure is independent of the shape and volume of a container.
Pressure relationship with shape
Figure 2-8: Pressure relationship with shape.
Pressure and Force in Fluid Power Systems
Recall that, according to Pascal's law, any force applied to a confined fluid is transmitted in all directions throughout the fluid regardless of the shape of the container. Consider the effect of this in the system shown in Figure 2-9. If there is a resistance on the output piston and the input piston is pushed downward, a pressure is created through the fluid, which acts equally at right angles to surfaces in all parts of the container.
Force transmitted through fluid
Figure 2-9: Force transmitted through fluid.
If force 1 is 100 pounds and the area of the input piston is 10 square inches, then the pressure in the fluid is 10 psi:
100 lb / 10 in2
Fluid pressure cannot be created without resistance to flow. In this case, resistance is provided by the equipment to which the output piston is attached. The force of resistance acts against the top of the output piston. The pressure created in the system by the input piston pushes on the underside of the output piston with a force of 10 pounds on each square inch.
In this case, the fluid column has a uniform cross section, so the area of the output piston is the same as the area of the input piston, or 10 square inches. Therefore, the upward force on the output piston is 100 pounds (10 psi x 10 in2), the same as the force applied to the input piston. All that was accomplished in this system was to transmit the 100-pound force around the bend. However, this principle underlies practically all mechanical applications of fluid power.
At this point you should note that since Pascal's law is independent of the shape of the container, it is not necessary that the tube connecting the two pistons have the same cross-sectional area of the pistons. A connection of any size, shape, or length will do, as long as an unobstructed passage is provided. Therefore, the system shown in Figure 2-10, with a relatively small, bent pipe connecting two cylinders, will act exactly the same as the system shown in Figure 2-9.
Transmitting force through a small pipe
Figure 2-10: Transmitting force through a small pipe.
Multiplication of Forces
Consider the situation in Figure 2-11, where the input piston is much smaller than the output piston. Assume that the area of the input piston is 2 square inches. With a resistant force on the output piston, a downward force of 20 pounds acting on the input piston creates a pressure of 10 psi in the fluid. Although this force is much smaller than the force applied in Figures 2-9 and 2-10, the pressure is the same. This is because the force is applied to a smaller area.
Multiplication of forces
Figure 2-11: Multiplication of forces.
This pressure of 10 psi acts on all parts of the fluid container, including the bottom of the output piston. The upward force on the output piston is 200 pounds (10 pounds of pressure on each square inch). In this case, the original force has been multiplied tenfold while using the same pressure in the fluid as before. In any system with these dimensions, the ratio of output force to input force is always 10 to 1, regardless of the applied force. For example, if the applied force of the input piston is 50 pounds, the pressure in the system will be 25 psi. This will support a resistant force of 500 pounds on the output piston.
The system works the same in reverse. If we change the applied force and place a 200-pound force on the output piston (Figure 2-11), making it the input piston, the output force on the input piston will be one-tenth the input force, or 20 pounds. (Sometimes such results are desired.) Therefore, if two pistons are used in a fluid power system, the force acting on each piston is directly proportional to its area, and the magnitude of each force is the product of the pressure and the area of each piston.
Differential Areas
Consider the special situation shown in Figure 2-12. Here, a single piston (1) in a cylinder (2) has a piston rod (3) attached to one of its sides. The piston rod extends out of one end of the cylinder. Fluid under pressure is admitted equally to both ends of the cylinder. The opposed faces of the piston (1) behave like two pistons acting against each other. The area of one face is the full cross-sectional area of the cylinder, say 6 square inches, while the area of the other face is the area of the cylinder minus the area of the piston rod, which is 2 square inches. This leaves an effective area of 4 square inches on the right face of the piston. The pressure on both faces is the same, in this case, 20 psi. Recall that, according to Pascal's Law, a pressure exerted on a piston produces an equal increase in pressure on another piston in the system. If the second piston has an area 10 times that of the first, the force on the second piston is 10 times greater, though the pressure is the same as that on the first piston. This rule is shown in Figure 2-12, as the force pushing the piston to the right is its area times the pressure, or 120 pounds (20 x 6). Likewise, the force pushing the piston to the left is its area times the pressure, or 80 pounds (20 x 4). Therefore, there is a net unbalanced force of 40 pounds acting to the right, and the piston will move in that direction. The net effect is the same as if the piston and the cylinder had the same cross-sectional area as the piston rod.
Differential areas on a piston
Figure 2-12: Differential areas on a piston.
Volume and Distance Factors
You have learned that if a force is applied to a system and the cross-sectional areas of the input and output pistons are equal, as in Figures 2-9 and 2-10, the force on the input piston will support an equal resistant force on the output piston. The pressure of the liquid at this point is equal to the force applied to the input piston divided by the piston's area. Let us now look at what happens when a force greater than the resistance is applied to the input piston.
In the system illustrated in Figure 2-9, assume that the resistance force on the output piston is 100 psi. If a force slightly greater than 100 pounds is applied to the input piston, the pressure in the system will be slightly greater than 10 psi. This increase in pressure will overcome the resistance force on the output piston. Assume that the input piston is forced downward 1 inch. The movement displaces 10 cubic inches of fluid. The fluid must go somewhere. Since the system is closed and the fluid is practically incompressible, the fluid will move to the right side of the system. Because the output piston also has a cross-sectional area of 10 square inches, it will move 1 inch upward to accommodate the 10 cubic inches of fluid. You may generalize this by saying that if two pistons in a closed system have equal cross-sectional areas and one piston is pushed and moved, the other piston will move the same distance, though in the opposite direction. This is because a decrease in volume in one part of the system is balanced by one equal increase in volume in another part of the system.
Apply this reasoning to the system in Figure 2-11. If the input piston is pushed down a distance of 1 inch, the volume of fluid in the left cylinder will decrease by 2 cubic inches. At the same time, the volume in the right cylinder will increase by 2 cubic inches. Since the diameter of the right cylinder cannot change, the piston must move upward to allow the volume to increase. The piston will move a distance equal to the volume increase divided by the surface area of the piston (equal to the surface area of the cylinder). In this example, the piston will move one-tenth of an inch (2 cu in ÷ 20 in2). This leads to the second basic rule for a fluid power system that contains two pistons: The distances the pistons move are inversely proportional to the areas of the pistons. Or more simply, if one piston is smaller than the other, the smaller piston must move a greater distance than the larger piston any time the pistons move.
Liquids in Motion
In the operation of fluid power systems, there must be a flow of fluid. The amount of flow will vary from system to system. To understand fluid power systems in action, it is necessary to understand some of the characteristics of liquids in motion.
Liquids in motion have characteristics different from liquids at rest. Frictional resistances within a fluid (viscosity) and inertia contribute to these differences. (Viscosity is discussed in chapter 3.) Inertia, which means the resistance a mass offers to being set in motion, will be discussed later in this section. There are other relationships of liquids in motion with which you must become familiar. Among these is volume of flow (flow rate), velocity of flow (velocity of fluid), streamline (laminar) and, turbulent flow that occur in flow.
Volume and Velocity of Flow
The volume of a liquid passing a point in a given time is known as its volume of flow or flow rate. The volume of flow is usually expressed in gallons per minute (gpm) and is associated with relative pressures of the liquid, such as 5 gpm at 40 psi.
The velocity of flow or velocity of the fluid is defined as the average speed at which the fluid moves past a given point. It is usually expressed in feet per second (fps) or feet per minute (fpm). Velocity of flow is an important consideration in sizing the hydraulic lines.
Volume and velocity of flow are often considered together. With other conditions unaltered — that is, with volume of input unchanged — the velocity of flow increases as the cross section or size of the pipe decreases, and the velocity of flow decreases as the cross section increases. For example, the velocity of flow is slow at wide parts of a stream and rapid at narrow parts, yet the volume of water passing each part of the stream is the same.
In Figure 2-13, if the cross-sectional area of the pipe is 16 square inches at point A and 4 square inches at point B, we can calculate the relative velocity of flow using the flow equation
Q = vA
where Q is the volume of flow, v is the velocity of flow, and A is the cross-sectional area of the liquid. Since the volume of flow at point A, Q1, is equal to the volume of flow at point B, Q2, we can use equation 2-7 to determine the ratio of the velocity of flow at point A, v1, to the velocity of flow at point B, v2.
Since Q1 = Q2, A1v1 = A2v2
From Figure 2-13; A1 = 16 in2, A2 = 4 in2
Substituting: 16v1 = 4v2 or v2 = 4v1
Therefore, the velocity of flow at point B is four times the velocity of flow at point A.
Volume and velocity of flow
Figure 2-13: Volume and velocity of flow.
Volume of Flow and Speed
If you consider the cylinder volume you must fill and the distance the piston must travel, you can relate the volume of flow to the speed of the piston. The volume of the cylinder is found by multiplying the piston area by the length the piston must travel (stroke).
Suppose you have determined that two cylinders have the same volume and that one cylinder is twice as long as the other. In this case, the cross-sectional area of the longer tube will be half of the cross-sectional area of the other tube. If fluid is pumped into each cylinder at the same rate, both pistons will reach their full travel at the same time. However, the piston in the longer cylinder must travel twice as fast because it has twice as far to go.
There are two ways of controlling the speed of the piston: (1) by varying the size of the cylinder and (2) by varying the volume of flow (gpm) to the cylinders. (Hydraulic cylinders are discussed in detail in chapter 10.)
Streamline and Turbulent Flow
At low velocities or in tubes of small diameter, flow is streamlined. This means that a given particle of fluid moves straight forward without bumping into other particles and without crossing their paths. Streamline flow is often referred to as laminar flow, which is defined as a flow situation in which fluid moves in parallel laminae or layers. As an example of streamline flow, consider Figure 2-14, which illustrates an open stream flowing at a slow, uniform rate.
Streamline flow
Figure 2-14: Streamline flow.
If the stream narrows, however, and the volume of flow remains the same, the velocity of flow increases. If the velocity increases sufficiently, the water becomes turbulent (Figure 2-15). Swirls, eddies, and cross-motions are set up in the water.
Turbulent flow
Figure 2-15: Turbulent flow.
Particles of fluid flowing in pipes act in the same manner. The flow is streamlined if the fluid flows slowly enough, and remains streamlined at greater velocities if the diameter of the pipe is small. The flow of a fluid is turbulent as velocity is increased and the center of flow shifts from the center to the walls of the pipe. Turbulent flow will occur when its velocity is greater than critical velocity. Critical velocity of a fluid is that velocity up to which the fluid flow is streamlined and above which its flow becomes turbulent. When the velocity of a fluid exceeds the critical velocity, the paths and velocities of the fluid particles begin to change continuously and randomly. The flow loses all its orderliness and is called turbulent flow.
While a high velocity of flow will produce turbulence in any pipe, other factors contribute to turbulence. Among these are the roughness of the inside of the pipe, obstructions, the degree of curvature of bends, and the number of bends in the pipe. In setting up or maintaining fluid power systems, care should be taken to eliminate or minimize as many causes of turbulence as possible, since the energy consumed by turbulence is wasted.
While designers of fluid power equipment do what they can to minimize turbulence, it cannot be avoided. For example, at 68 degrees Fahrenheit (°F), flow becomes turbulent at velocities over approximately 6 inches per second in a 4-inch pipe or about 3 inches per second in a 6-inch pipe. These velocities are far below those commonly encountered in fluid power systems, where velocities of 5 feet per second and above are common. In streamlined flow, losses due to friction increase directly with velocity. With turbulent flow these losses increase much more rapidly.
Factors Involved in Flow
An understanding of the behavior of fluids in motion, or solids for that matter, requires an understanding of the term inertia. Inertia is the term used by scientists to describe the property possessed by all forms of matter that makes the matter resist being moved if it is at rest, and likewise, resist any change in its rate of motion if it is moving.
The basic statement covering inertia is Newton's first law of motion — inertia. Sir Isaac Newton was a British philosopher and mathematician. His first law states: A body at rest tends to remain at rest, and a body in motion tends to remain in motion at the same speed and direction, unless acted on by some unbalanced force. This simply says what you have learned by experience — that you must push an object to start it moving and push it in the opposite direction to stop it again.
A familiar illustration is the effort a pitcher must exert to make a fast pitch and the opposition the catcher must put forth to stop the ball. Similarly, considerable work must be performed by the engine to make an automobile begin to roll; although, after it has attained a certain velocity, it will roll along the road at uniform speed if just enough effort is expended to overcome friction, while brakes are necessary to stop its motion. Inertia also explains the kick or recoil of guns and the tremendous striking force of projectiles.
Inertia and Force
To overcome the tendency of an object to resist any change in its state of rest or motion, some force that is not otherwise canceled or unbalanced must act on the object. Some unbalanced force must be applied whenever fluids are set in motion or increased in velocity; while conversely, forces are made to do work elsewhere whenever fluids in motion are retarded or stopped.
There is a direct relationship between the magnitude of the force exerted and the inertia against which it acts. This force is dependent on two factors: (1) the mass of the object (which is proportional to its weight), and (2) the rate at which the velocity of the object is changed. The rule is that the force in pounds required to overcome inertia is equal to the weight of the object multiplied by the change in velocity, measured in feet per second, and divided by 32 times the time in seconds required to accomplish the change. Thus, the rate of change in velocity of an object is proportional to the force applied. The number 32 appears because it is the conversion factor between weight and mass.
There are five physical factors that can act on a fluid to affect its behavior. All of the physical actions of fluids in all systems are determined by the relationships of these five factors to each other. Summarizing, these five factors are as follows:
1. Gravity, which acts at all times on all bodies, regardless of other forces.
2. Atmospheric pressure, which acts on any part of a system exposed to the open air.
3. Specific applied forces, which may or may not be present, but which, in any event, are entirely independent of the presence or absence of motion.
4. Inertia, which comes into play whenever there is a change from rest to motion or the opposite, or whenever there is a change in direction or in rate of motion.
5. Friction, which is always present whenever there is motion.
A possible relationship of these factors with respect to a particle of fluid (P) in a system is shown in Figure 2-16. The different forces are shown in terms of head, or in other words, in terms of vertical columns of fluid required to provide the forces. At the particular moment under consideration, a particle of water (P) is being acted on by applied force (A), by atmospheric pressure (B), and by gravity (C) produced by the weight of the fluid standing over it. The particle possesses sufficient inertia or velocity head to rise to level P1, since head equivalent to F was lost in friction as P passed through the system. Since atmospheric pressure (B) acts downward on both sides of the system, what is gained on one side is lost on the other.
Physical factors governing fluid flow
Figure 2-16: Physical factors governing fluid flow.
If all the pressure acting on P to force it through the nozzle could be recovered in the form of elevation head, it would rise to level Y. If account is taken of the balance in atmospheric pressure, in a frictionless system, P would rise to level X, or precisely as high as the sum of the gravity head and the head equivalent to the applied force.
Kinetic Energy
It was previously pointed out that a force must be applied to an object in order to give it a velocity or to increase the velocity it already has. Whether the force begins or changes velocity, it acts over a certain distance. A force acting over a certain distance is work. Work and all forms into which it can be changed are classified as energy. Obviously then, energy is required to give an object velocity. The greater the energy used, the greater the velocity will be.
Disregarding friction, for an object to be brought to rest or for its motion to be slowed down, a force opposed to its motion must be applied to it. This force also acts over some distance. In this way energy is given up by the object and delivered in some form to whatever opposes its continuous motion. The moving object is therefore a means of receiving energy at one place (where its motion is increased) and delivering it to another point (where it is stopped or retarded). While it is in motion, it is said to contain this energy as energy of motion or kinetic energy.
Since energy can never be destroyed, it follows that if friction is disregarded the energy delivered to stop the object will exactly equal the energy that was required to increase its speed. At all times the amount of kinetic energy possessed by an object depends on its weight and the velocity at which it is moving.
The mathematical relationship for kinetic energy is stated in the following rule: "Kinetic energy in foot-pounds is equal to the force in pounds which created it, multiplied by the distance through which it was applied, or to the weight of the moving object in pounds, multiplied by the square of its velocity in feet per second, and divided by 64."
The relationship between inertia forces, velocity, and kinetic energy can be illustrated by analyzing what happens when a gun fires a projectile against the armor of an enemy ship (Figure 2-17). The explosive force of the powder in the breach pushes the projectile out of the gun, giving it a high velocity. Because of its inertia, the projectile offers opposition to this sudden velocity and a reaction is set up that pushes the gun backward (kick or recoil). The force of the explosion acts on the projectile throughout its movement in the gun. This is force acting through a distance producing work. This work appears as kinetic energy in the speeding projectile. The resistance of the air produces friction, which uses some of the energy and slows down the projectile. Eventually, however, the projectile hits its target and, because of the inertia, tries to continue moving. The target, being relatively stationary, tends to remain stationary because of its inertia. The result is that a tremendous force is set up that either leads to the penetration of the armor or the shattering of the projectile. The projectile is simply a means of transferring energy, in this instance for destructive purpose, from the gun to the enemy ship. This energy is transmitted in the form of energy of motion or kinetic energy.
Relationship of inertia, velocity, and kinetic energy
Figure 2-17: Relationship of inertia, velocity, and kinetic energy.
A similar action takes place in a fluid power system in which the fluid takes the place of the projectile. For example, the pump in a hydraulic system imparts energy to the fluid, which overcomes the inertia of the fluid at rest and causes it to flow through the lines. The fluid flows against some type of actuator that is at rest. The fluid tends to continue flowing, overcomes the inertia of the actuator, and moves the actuator to do work. Friction uses up a portion of the energy as the fluid flows through the lines and components.
Relationship of Force, Pressure, and Head
In dealing with fluids, forces are usually considered in relation to the areas over which they are applied. As previously discussed, a force acting over a unit area is a pressure, and pressure can alternately be stated in pounds per square inch or in terms of head, which is the vertical height of the column of fluid whose weight would produce that pressure.
In most of the applications of fluid power in the Navy, applied forces greatly outweigh all other forces, and the fluid is entirely confined. Under these circumstances it is customary to think of the forces involved in terms of pressures. Since the term head is encountered frequently in the study of fluid power, it is necessary to understand what it means and how it is related to pressure and force.
All five of the factors that control the actions of fluids can, of course, be expressed either as force, or in terms of equivalent pressures or head. In each situation, the different factors are referred to in the same terms, since they can be added and subtracted to study their relationship to each other.
At this point you need to review some terms in general use. Gravity head, when it is important enough to be considered, is sometimes referred to as head. The effect of atmospheric pressure is referred to as atmospheric pressure. (Atmospheric pressure is frequently and improperly referred to as suction.) Inertia effect, because it is always directly related to velocity, is usually called velocity head; and friction, because it represents a loss of pressure or head, is usually referred to as friction head.
Static and Dynamic Factors
Gravity, applied forces, and atmospheric pressure are static factors that apply equally to fluids at rest or in motion, while inertia and friction are dynamic factors that apply only to fluids in motion. The mathematical sum of gravity, applied force, and atmospheric pressure is the static pressure obtained at any one point in a fluid at any given time. Static pressure exists in addition to any dynamic factors that may also be present at the same time.
Remember, Pascal's law states that a pressure set up in a fluid acts equally in all directions and at right angles to the containing surfaces. This covers the situation only for fluids at rest or practically at rest. It is true only for the factors making up static head. Obviously, when velocity becomes a factor it must have a direction, and as previously explained, the force related to the velocity must also have a direction, so that Pascal's law alone does not apply to the dynamic factors of fluid power.
The dynamic factors of inertia and friction are related to the static factors. Velocity head and friction head are obtained at the expense of static head. However, a portion of the velocity head can always be reconverted to static head. Force, which can be produced by pressure or head when dealing with fluids, is necessary to start a body moving if it is at rest, and is present in some form when the motion of the body is arrested; therefore, whenever a fluid is given velocity, some part of its original static head is used to impart this velocity, which then exists as velocity head.
Bernoulli's Principle
Consider the system illustrated in Figure 2-18. Chamber A is under pressure and is connected by a tube to chamber B, which is also under pressure. The pressure in chamber A is static pressure of 100 psi. The pressure at some point (X) along the connecting tube consists of a velocity pressure of 10 psi exerted in a direction parallel to the line of flow, plus the unused static pressure of 90 psi, which still obeys Pascal's law and operates equally in all directions. As the fluid enters chamber B, it is slowed down, and its velocity is changed back to pressure. The force required to absorb its inertia equals the force required to start the fluid moving originally, so that the static pressure in chamber B is equal to that in chamber A.
Relationship of static and dynamic factors (Bernoulli's principle)
Figure 2-18: Relationship of static and dynamic factors (Bernoulli's principle).
This situation (Figure 2-18) disregards friction; therefore, it would not be encountered in actual practice. Force or head is also required to overcome friction but, unlike inertia effect, this force cannot be recovered again, although the energy represented still exists somewhere as heat. Therefore, in an actual system the pressure in chamber B would be less than in chamber A by the amount of pressure used in overcoming friction along the way.
At all points in a system the static pressure is always the original static pressure, less any velocity head at the point in question and less the friction head consumed in reaching that point. Since both the velocity head and the friction head represent energy that came from the original static head, and since energy cannot be destroyed, the sum of the static head, the velocity head, and the friction head at any point in the system must add up to the original static head. This is known as Bernoulli's principle, which states: For the horizontal flow of fluid through a tube, the sum of the pressure and the kinetic energy per unit volume of the fluid is constant. This principle governs the relations of the static and dynamic factors concerning fluids, while Pascal's law states the manner in which the static factors behave when taken by themselves.
Minimizing Friction
Fluid power equipment is designed to reduce friction to the lowest possible level. Volume and velocity of flow are made the subject of careful study. The proper fluid for the system is chosen. Clean, smooth pipe of the best dimensions for the particular conditions is used, and it is installed along as direct a route as possible. Sharp bends and sudden changes in cross-sectional areas are avoided. Valves, gauges, and other components are designed to interrupt flow as little as possible. Careful thought is given to the size and shape of the openings. The systems are designed so they can be kept clean inside and variations from normal operation can easily be detected and remedied.
Operation of Hydraulic Components
To transmit and control power through pressurized fluids, an arrangement of interconnected components is required. Such an arrangement is commonly referred to as a system. The number and arrangement of the components vary from system to system, depending on the particular application. In many applications, one main system supplies power to several subsystems, which are sometimes referred to as circuits. The complete system may be a small compact unit; more often, however, the components are located at widely separated points for convenient control and operation of the system.
The basic components of a fluid power system are essentially the same, regardless of whether the system uses a hydraulic or a pneumatic medium. There are five basic components used in a system. These basic components are as follows:
1. Reservoir or receiver (depending on system type).
2. Pump or compressor.
3. Lines (pipe, tubing, or flexible hose).
4. Directional control valve.
5. Actuating device.
Several applications of fluid power require only a simple system; that is, a system that uses only a few components in addition to the five basic components. A few of these applications are presented in the following paragraphs. We will explain the operation of these systems briefly at this time so you will know the purpose of each component and can better understand how hydraulics is used in the operation of these systems.
Hydraulic Jack
The hydraulic jack is perhaps one of the simplest forms of a fluid power system. By moving the handle of a small device, an individual can lift a load weighing several tons. A small initial force exerted on the handle is transmitted by a fluid to a much larger area. To understand this better, study Figure 2-19. The small input piston has an area of 5 square inches and is directly connected to a large cylinder with an output piston having an area of 250 square inches. The top of this piston forms a lift platform.
Hydraulic jack
Figure 2-19: Hydraulic jack.
If a force of 25 pounds is applied to the input piston, it produces a pressure of 5 psi in the fluid, that is, of course, if a sufficient amount of resistant force is acting against the top of the output piston. Disregarding friction loss, this pressure acting on the 250-square-inch area of the output piston will support a resistance force of 1,250 pounds. In other words, this pressure could overcome a force of slightly under 1,250 pounds. An input force of 25 pounds has been transformed into a working force of more than half a ton; however, for this to be true, the distance traveled by the input piston must be 50 times greater than the distance traveled by the output piston. Thus, for every inch that the input piston moves, the output piston will move only one-fiftieth of an inch.
This would be ideal if the output piston needed to move only a short distance. However, in most instances, the output piston would have to be capable of moving a greater distance to serve a practical application. The device shown in Figure 2-19 is not capable of moving the output piston farther than that shown; therefore, some other means must be used to raise the output piston to a greater height.
The output piston can be raised higher and maintained at this height if additional components are installed as shown in Figure 2-20. In this illustration the jack is designed so that it can be raised, lowered, or held at a constant height. These results are attained by introducing a number of valves and also a reserve supply of fluid to be used in the system.
Hydraulic jack; (A) up stroke; (B) downstroke
Figure 2-20: Hydraulic jack; (A) up stroke; (B) downstroke.
Notice that this system contains the five basic components — the reservoir; cylinder 1, which serves as a pump; valve 3, which serves as a directional control valve; cylinder 2, which serves as the actuating device; and lines to transmit the fluid to and from the different components. In addition, this system contains two valves, 1 and 2, whose functions are explained in the following discussion.
As the input piston is raised (Figure 2-20, view A), valve 1 is closed by the back pressure from the weight of the output piston. At the same time, valve 2 is opened by the head of the fluid in the reservoir. This forces fluid into cylinder 1. When the input piston is lowered (Figure 2-20, view B), a pressure is developed in cylinder 1. When this pressure exceeds the head in the reservoir, it closes valve 2. When it exceeds the back pressure from the output piston, it opens valve 1, forcing fluid into the pipeline. The pressure from cylinder 1 is thus transmitted into cylinder 2, where it acts to raise the output piston with its attached lift platform. When the input piston is again raised, the pressure in cylinder 1 drops below that in cylinder 2, causing valve 1 to close. This prevents the return of fluid and holds the output piston with its attached lift platform at its new level. During this stroke, valve 2 opens again, allowing a new supply of fluid into cylinder 1 for the next power (downward) stroke of the input piston. Thus, by repeated strokes of the input piston, the lift platform can be progressively raised. To lower the lift platform, valve 3 is opened, and the fluid from cylinder 2 is returned to the reservoir.
Hydraulic Brakes
The hydraulic brake system used in the automobile is a multiple piston system. A multiple piston system allows forces to be transmitted to two or more pistons in the manner indicated in Figure 2-21. Note that the pressure set up by the force applied to the input piston (1) is transmitted undiminished to both output pistons (2 and 3), and that the resultant force on each piston is proportional to its area. The multiplication of forces from the input piston to each output piston is the same as that explained earlier.
Multiple piston system
Figure 2-21: Multiple piston system.
The hydraulic brake system from the master cylinders to the wheel cylinders on most automobiles operates in a way similar to the system illustrated in Figure 2-22.
An automobile brake system
Figure 2-22: An automobile brake system.
When the brake pedal is depressed, the pressure on the brake pedal moves the piston within the master cylinder, forcing the brake fluid from the master cylinder through the tubing and flexible hose to the wheel cylinders. The wheel cylinders contain two opposed output pistons, each of which is attached to a brake shoe fitted inside the brake drum. Each output piston pushes the attached brake shoe against the wall of the brake drum, thus retarding the rotation of the wheel. When pressure on the pedal is released, the springs on the brake shoes return the wheel cylinder pistons to their released positions. This action forces the displaced brake fluid back through the flexible hose and tubing to the master cylinder.
The force applied to the brake pedal produces a proportional force on each of the output pistons, which in turn apply the brake shoes frictionally to the turning wheels to retard rotation.
As previously mentioned, the hydraulic brake system on most automobiles operates in a similar way, as shown in Figure 2-22. It is beyond the scope of this manual to discuss the various brake systems.
PDH Classroom offers a continuing education course based on this forces in liquids reference page. This course can be used to fulfill PDH credit requirements for maintaining your PE license.
View the course now: |
Fun Koi Facts You Should Know About
Vibrant red, gleaming yellow and pearly white — koi fish have long been prized for their beauty and elegance. These stunning fish, which are often used for ornamental purposes in ponds, can be worth up to hundreds of thousands of dollars and even have beauty contests organized for them. However, there is more to them than meets the eye. Here are some interesting koi facts.
Koi Fish Originated From China, Not Japan
Although koi fish have been popular for decades in Japan and are commonly thought to have originated from there, they were actually from China. The Chinese originally brought this fish to Japan when they invaded the country around 200 BC. The earliest mention of the Koi in Japan dates back to 71 AD, presumably referring to koi fish belonging to the legendary Emperor Keikō.
Koi Fish Were Originally Black In Color
Koi are prized for their exquisite colors today, but they were originally black in color when the Chinese brought them to Japan. In the 1800s, Japanese breeders then introduced color into the species by breeding fish with naturally occurring mutations.
Koi Fish Are Prone To Getting Sunburnt
Humans are not the only one who can get sunburns — Koi can suffer from them too! Koi fish usually dwell in shallow water, making them prone to sunburns. Sunburns cause the coat of slime on their body to erode, making the fish slow and ill. Hence, it is imperative to keep koi fish in a place that is protected from sunlight. This is especially so if the fish are being kept in a pond, as opposed to an indoor aquarium.
Koi Fish Can Recognize Their Feeders
Koi tend to be smart and can eventually come to recognize their owners while being fed. With time, the act of feeding becomes positive reinforcement for the fish and helps them learn who their owner is. Although koi fish can have aggressive tendencies, they can behave more gently and cooperatively with people whom they recognize to be their owners.
Koi Fish Are Said To Bring Prosperity And Good Luck
Koi fish are prized not just for their beauty, but also because they symbolize good luck and prosperity in some East Asian cultures. In fact, each individual color has a symbolic meaning. For instance, gold koi represent wealth and prosperity, while colors like blue, red and grey symbolize positivity.
The Oldest Koi Fish Lived More Than 200 Years
Hanako was a koi fish reared in Japan, who lived to be 226 years old. Born in 1751, the red koi fish lived through numerous historical events such as the Industrial Revolution, American Revolution, French Revolution, the invention of electricity and World War One and Two. Since most koi live for 40 to 40 years, it is a wonder that Hanako managed to live for more than two centuries, finally passing away in 1977. Interestingly though, five other koi fish living in the same tank as Hanako also lived over a hundred years!
Share Blog Post:
© copyright 2022 everything koi. all rights reserved. privacy policy. conditions of use. web design by SmartSites
Payment Options |
Jurassic Park Wiki
Phorusrhacos grew up to 2.5 meters (8.2 feet) tall and weighed approximately 130 kilograms (290 lbs). They had enormous skulls up to sixty centimeters long, armed with powerful, hook-tipped beaks. The structure of the beak and the large claws on the toes show that they were carnivorous.
Wikipedia has a more detailed and comprehensive article on Phorusrhacos
Jurassic Park Inspired Games
Jurassic Park: Builder
see Phorusrhacos/Builder
Phorusrhacos can be created in the Glacial Park of Jurassic Park: Builder as a limited edition creature.
Jurassic World: The Game
see Phorusrhacos/JW: TG
Phorusrhacos is a Cenozoic super rare Savannah in Jurassic World: The Game.
Jurassic World: Alive
see Phorusrhacos/JW: A
Phorusrhacos is a common Cenozoic creature in Jurassic World: Alive.
• A base form Phorusrhacos in Jurassic World: The Game looks similar to the Walking with Beasts Phorusrhacos. It also has the same sounds as the Pteranodon from the game ARK: Survival Evolved.
• The model for the Jurassic World: Alive Phorusrhacos also looks like the Walking with Beasts variant.
• Before actually being implemented as a collectible creature in Jurassic World: Alive, Phorusrhacos was mentioned in the description of Erlikosaurus GEN 2 as being the intended result of reverse engineering from Erlikosaurus DNA. |
from Come Fly With Me! – Exploring science through aviation and aerospace concepts
SUBJECT: Science &»
GRADE: 7,8,9
TIME: 60 minutes
TYPE OF ACTIVITY: Student Investigation TEACHING STRATEGY Open Discovery Guided Discovery CONCEPTS; Psychological needs Living in Space
SKILLS: Hypothesizing Working in Groups Inference
Objective: To give students the opportunity to understand some of the psychological needs of living in an enclosed environment in space.
psychological needs illustration
Materials: Paper and pencils.
1. Have students break up into groups of six or seven. Try to see to it that the groups are as heterogeneous as possible.
2. Ask each group to spend ten minutes brainstorming the psychological needs of people living together in a closed environment. Ask them to imagine that the vehicle is occupied by the six or seven people in their group, that the space they occupy is approximately the size of an average classroom and they are to be in this space for twelve days. Each group should have someone jot down what the group comes up with.
3. After they have spent 10 minutes brainstorming, inform them that the reentry ability of the capsule has malfunctioned and that ground control has determined that they cannot return for a year when they estimate the engineers will have a rescue vehicle built capable of picking them up and returning them to earth.
All other areas of concern are taken care of: food is plentiful, all systems for pressurizing and decontamination, for example, are fine. Now, what other psychological considerations are there to be concerned with since the trip will take a whole year? Have them brainstorm and keep notes.
4. Bring the groups together and share what each of them came up with. How did the two periods of time affect their lists of psychological concerns? Can they prioritize some of the concerns? How important are the psychological ramifications to a successful living arrangement in a closed environment in space?
5. Finally, have the students work together in their groups to design a craft that is expected to be in space for two years. Assume all physical considerations have been met, but the groups are to imagine they are psychologists who are responsible for determining the most appropriate and emotionally healthy way to provide for the psychological ramifications of living in space for two years. How would they provide for these in the design of the craft? Ask each group to share their craft and the ideas they come up with with the larger group. Drawings or models with explanations would be fun.
6. After the sharing, discuss whether there were differences in how each of the groups approached their task. Were there any differences in what was deemed as psychologically important to the members of the various groups? Were there differences in what members within groups felt was important? Is it helpful to have a meaningful cross-section of people with a variety of perceptions when groups engage in discussions of this sort? Have them check out how NASA approaches problem solving questions such as this.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Saltar al contenido principal
Uganda Resettlement and Complementary Pathways Factsheet - 31 October 2021
+ 12
Fecha de publicación
Ver original
As of 31 October 2021, Uganda is the fourth largest refugeehosting country in the world with a total of 1,549, 181 refugees and asylum seekers from South Sudan (SSD), Democratic Republic of Congo (DRC), Burundi, Somalia, Rwanda, Eritrea, Ethiopia, Sudan, Kenya, Pakistan, Yemen and other countries. Six per cent live in Kampala, while the rest live in the settlements. Sixty-five percent are from South Sudan, while thirty-one percent are from DRC.
UNHCR estimates that 125,403 refugees in Uganda are in need of resettlement in 2021, including:
South Sudanese: The protracted nature of the civil war in South Sudan has heavily impacted on the most vulnerable groups. A total of 9,353 additional SSD refugees have been registered in Uganda since 1 January 2021. Many refugees are survivors or witnesses of serious human rights violations, including Gender-Based Violence (GBV). Many have been displaced multiple times over the course of the conflict and have experienced the breakdown of traditional social structures and sources of livelihoods as a result. UNHCR has identified high numbers of separated and unaccompanied children, single parents, women at risk and persons with medical conditions amongst the South Sudanese refugee community in Uganda.
Congolese: Continuous instability in Eastern DRC, fueled by armed conflict and ethnic tensions, prevents refugees from returning. Since 1 January 2021, a total of 9,868 additional Congolese refugees have been registered. The Congolese refugee population consists of comparatively large numbers of survivors of torture and violence, including GBV, unaccompanied or separated children, single parents, and persons with medical needs. |
cybersecurity cell phone
As the cybersecurity industry changes, best practices change with it.
Microsoft is now warning that creating a strong password might not be enough to deter a hacker from gaining access to your account. There are many ways in which a bad actor can gain access to your information. Passwords can be found and stored from online databases, freely given though a suspicious website via social engineering, and even guessed correctly from the software a hacker may use.
Even though your password contains the recommended amount of numbers and is more than 8 characters long, it’s not enough to deter a determined individual. Employees at Microsoft defend against millions of password-based cyber attacks on a daily basis.
cellphone password
If you think that adding hashtags and special characters to your password will make it impenetrable, think again. The only real way to ensure safety in the digital world is to use biometric data, such as a fingerprint or facial identification, and even these have their limitations.
If you’re unable to use biometrics, making sure your password is changed often, using multiple passwords, and utilizing a password generator may beef up your security. Password management systems, like Passportal, are great for this kind of task.
Another note worth mentioning is that two-factor authentication (2FA) and multi-factor authentication (MFA) aren’t necessarily as secure as they claim to be, either. Using texting as a verification source isn’t secure, as SMS communication was designed without encryption. If your phone is switching on publicly access networks, it’s easier for your messages to be intercepted.
If you’re using a mobile device for authentication, we recommend using an app-based authenticator. Authy and Google Authenticator are good choices, although Authy has a bit more options, such as browser support, encrypted recovery backups and multiple device support.
No matter which protections you choose to utilize, cyber threats are a very real and constantly changing issue to tackle. Make sure not to become complacent when it comes to your online security.
Who’s Got Your Data?
Written by Emily M.
Leave a Reply
|
Horseshoe Crabs Are Drained For Their Blue Blood Worth Thousands Of Dollars, This Practice Will End Soon
horseshoe crabs are drained for their blue blood
By Mayukh Saha / Truth Theory
Humanity has done a lot of macabre and strange things when it comes to animals, in the time they have existed. These activities have driven numerous animals towards extinction. One such activity is harvesting the blue blood of horseshoe crabs. Fortunately, though, this activity is soon going to end.
But until it does end, several hundred thousand horseshoe crabs continue being fished from the waters of the eastern coast of the US. Their blood, which is immensely valuable, is then drained and extracted.
The Reasons Behind The Practice
The practice is almost surreal. The scientific name for the horseshoe crab native to the Atlantic Ocean is Limulus Polyphemus. We know its blood is worth quite a bit, but why is it so?
Well, for vertebrates, their blood contains hemoglobin which carries oxygen to the different parts of their body. Horseshoe crabs do not have hemoglobin in their blood. Instead, a chemical known as hemocyanin is present in their blood that does the work of the hemoglobin. This chemical is the reason why their blood gets its distinct blue hue. But that is not the real reason behind the steep price tag of horseshoe crab blood. The actual price point is the type of immune cells that are present in the creatures.
Read: Why Dolphins Are Slaughtered In The Faroe Islands And What You Can Do To Change That
Vertebrates’ blood has WBCs (or, white blood cells) which is the primary line of defense against foreign invasions. Horseshoe crabs and other invertebrates have amebocytes in place of WBCs in their blood. The moment an amebocyte and a pathogen touch each other, a chemical is released by the amebocyte. This chemical makes the blood in the area clot. Researchers think that dangerous pathogens are isolated in this manner.
The Importance Of Amebocytes
Particularly, the horseshoe crab’s blood’s amebocytes turn solid when it comes into contact with an endotoxin. An endotoxin is a bacterial product that is sometimes deadly and very pervasive. This chemical is also the trigger for the immune system to begin functioning. At times, it can cause septic shock, fever, or organ failure.
One of the most serious problems that human medicines face is the presence of this bacterial toxin in needles, drugs, or whatever that may touch human blood. This is the primary fear behind “infection”. In the past, researchers would administer samples of the substance being tested, to rabbits and then watch over them for hours and see the reaction of their immune system. But everything changed after horseshoe blood’s amebocytes were discovered. Now, simply adding amebocytes to a sample is enough to test for the presence of endotoxins.
Read: Artificial Spinal Cord Gel Allows Paralyzed Mice To Walk Again
Horseshoe blood is used to create Limulus Amebocyte Lysate (LAL), and it took little time to be as valuable as gold. Because of endotoxins’ ubiquity and the essential need to check if they are present, 1 quart of horseshoe blood can be as costly as $15,000. About 600,000 horseshoe crabs are caught each year. About 30% of the blood gets drained and they are sent back to their habitats. However, it is estimated that about 30% of the creatures die in the process.
The Substitute That Is Saving The Horseshoe Crabs
Researchers have managed to isolate the LAL factor that causes the clotting, known as C. Then insects belonging to the Arthropoda phylum were genetically modified to produce this factor. Now, the recombinant factor C can be freely produced and sold, as one of horseshoe blood’s viable substitutes.
Surprisingly, recombinant factor C (or rFC) has been available for purchase since 2003. By 2013, 2 companies were approved to produce it: Hyglos GmbH and Lonza Group. It has already received the approval of some regulatory bodies in Europe. Experts believe that it is only a matter of time before the FDA also gives the approval required to increase rFC’s production. As such, horseshoe crabs may soon be saved from this ordeal.
Image credit: Business Insider
Leave Comment: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.