text
stringlengths
144
682k
The Geology of Rock House in Hocking Hills The Rock House in Hocking Hills is an ancient cave carved out of Blackhand sandstone prevalent in the area. Over millennia, water has worn away the softer rock, leaving the harder stone behind, creating the cave. Since time immemorial, the cave has been used for shelter, making things, housing animals and hiding from the law. It has quite an interesting history if you care to look! Rock House is a triangular-shaped cave with an entrance halfway up a 150 foot cliff face. The roof is 25 feet high, the walls are around 200 feet long and between 20 and 30 feet wide. It is thought that water seeping through a joint between two sections of rock was responsible for carving out the cave, that water still enters the cave today so it is easy to see how it could have happened. Soft sections of sandstone were eroded by this water, leaving harder sections above, below and all around. The character of the cave is actually quite peaceful. It isn’t dank and dark like many, it has natural light allowed in by several arched “windows” which reflects off the light sandstone, offering a moody ambience that lends itself well to somewhere that was once used to escape the weather. It is believed the windows of Rock House are also the result of water erosion. Each is located at a major joint in the rock and either the joint shifted to displace rock, or allowed water through to wear it away. Either way, the windows add a real character to the cave. It is these windows and the appearance of a roof supported by rock columns that gave Rock House its name. That and the fact it was used as shelter by everyone from Native Americans and pioneers to villains and locals. Rock House is just one of many geological structures around Hocking Hills. It is the only true cave though. Ash Cave is open to the elements and is made from a horseshoe-shaped ledge all around and Old Man’s Cave is a recess cave on the edge of a cliff face. Talking of Old Man’s Cave, if you need somewhere to stay while you’re visiting Hocking Hills, our very own cabins would be ideal. They are centrally located, within a short distance from everything Hocking County has to offer and well worth a visit. Our wooden lodges, A-frames and cottages all reflect the traditional, rustic character of the area while providing the warmth and comfort you deserve. All for an amazingly low price! Visit our booking page to reserve yours today!
rss imagerss imagerss imagerss image Sunday, 23 Jan 2022, 14:57 Site: OpenLearn Create Course: Introduction to Evidence Cafés for migration (PUB_3856_1.0) Glossary: Glossary Migration data A collection of figures, objects, symbols and events that have been gathered from different sources. Things like migration maps, photographs, or migrants’ everyday experience can all be considered as migration data.
Rare Dermatology News Disease Profile Myotonic dystrophy type 2 1-9 / 100 000 3,310 - 29,790 US Estimated 1-9 / 100 000 5,135 - 46,215 Europe Estimated Age of onset Not applicable Other names (AKA) Dystrophia myotonica type 2; DM2; Proximal myotonic myopathy; Congenital and Genetic Diseases; Endocrine Diseases; Eye diseases; Myotonic dystrophy type 2, one of the two types of myotonic dystrophy, is an inherited muscular dystrophy that affects the muscles and other body systems (e.g., heart, eyes, and pancreas). It is characterized by prolonged muscle tensing (myotonia) as well as muscle weakness, pain, and stiffness. Signs and symptoms usually develop during a person's twenties or thirties. Muscles in the neck, fingers, elbows, and hips are typically affected; facial and ankle muscles are less commonly involved.[1] The severity of myotonic dystrophy type 2 varies widely among affected people, even among family members.[2] It is inherited in an autosomal dominant pattern and is caused by mutations in the CNBP gene.[2] Treatment is based on each person's specific signs and symptoms. Myotonic dystrophy type 2 is characterized by progressive muscle wasting and weakness. Symptoms typically begin in a person's twenties. People with this condition often have prolonged muscle contractions (myotonia) and are not able to relax certain muscles after use. For example, a person may have difficulty releasing their grip on a doorknob or handle. Also, affected people may have slurred speech; temporary locking of their jaw; and muscle pain and weakness that mainly affects the neck, shoulders, elbows, and hips. Less common symptoms include abnormalities of the electrical signals that control the heartbeat (cardiac conduction defects); clouding of the lens in the eyes (cataracts); and diabetes. Males may experience balding and infertility. The severity of symptoms varies among affected people. Compared to myotonic dystrophy type 1, type 2 is milder and does not necessarily shorten a person's lifespan.[3][1] Medical Terms Other Names Learn More: 80%-99% of people have these symptoms Clouding of the lens of the eye Cloudy lens [ more ] Percent of people who have these symptoms is not available through HPO Autosomal dominant inheritance Decreased circulating IgG level Decreased circulating total IgM Diabetes mellitus Elevated circulating follicle stimulating hormone level Elevated serum creatine kinase Elevated blood creatine phosphokinase Elevated circulating creatine phosphokinase Elevated creatine kinase Elevated serum CPK Elevated serum creatine phosphokinase High serum creatine kinase Increased CPK Increased creatine kinase Increased creatine phosphokinase Increased serum CK Increased serum creatine kinase Increased serum creatine phosphokinase [ more ] Frontal balding Decreased activity of gonads Insulin insensitivity Iridescent posterior subcapsular cataract Muscle ache Muscle pain [ more ] Neck flexor weakness Neck flexion weakness Low sperm count Missed heart beat Skipped heart beat [ more ] Proximal muscle weakness Weakness in muscles of upper arms and upper legs Fast heart rate Heart racing Racing heart [ more ] Type 2 muscle fiber atrophy Mutations in the CNBP gene cause myotonic dystrophy type 2. The exact function of this gene is not known. The protein made by the CNBP gene is mainly found in the heart and in skeletal muscles, where it probably helps regulate the function of other genes.[3] In people with myotonic dystrophy type 2, a short piece of DNA is abnormally repeated many times, forming an unstable area of the gene. The mutated gene makes an altered version of messenger RNA (mRNA), which is a copy of the gene that is normally used for protein production. The abnormal mRNA forms clumps inside the cell that interfere with the production of many proteins. These changes prevent cells in muscles and other tissues from functioning normally, leading to the signs and symptoms of myotonic dystrophy.[2][3] Myotonic dystrophy is diagnosed by doing a physical exam. A physical exam can identify the typical pattern of muscle wasting and weakness and the presence of myotonia. A person with myotonic dystrophy may have a characteristic facial appearance of wasting and weakness of the jaw and neck muscles. Men may have frontal balding.[2] There are several laboratory tests that can be used to clarify the clinical diagnosis of myotonic dystrophy. One test, called electromyography (EMG), involves inserting a small needle into the muscle. The electrical activity of the muscle is studied and usually shows characteristic patterns of muscle electrical discharge.[2] The definitive test for myotonic dystrophy type 2 is a genetic test. For this test, certain cells within the blood are analyzed to identify a change (mutation) in the CNBP gene. [2] The University of Washington provides more information on genetic testing for myotonic dystrophy type 2 in their publication titled, "Myotonic Dystrophy: Making an Informed Choice About Genetic Testing." Testing Resources • Orphanet lists international laboratories offering diagnostic testing for this condition. There is currently no treatment available to stop or slow the progression of myotonic dystrophy type 2. Management options depend on the symptoms that each affected person has, and aim to treat each specific symptom. For example:[1] • Ankle-foot braces, wheelchairs, or other assistive devices may be used as needed for weakness • Defibrillator placement may be needed for arrhythmias • Cataracts can be removed for those with impaired vision • Testosterone replacement therapy may be useful for hypogonadism in males Myotonia is usually mild and rarely requires treatment. Routine exercise appears to help with pain control, as well as with muscle strength and endurance. The effectiveness of most medications for pain management varies. Mexilitene, which is very effective for some forms of myotonia, has helped control muscle pain in some people with this condition. Other medications that have been used with some success include gabapentin, nonsteroidal anti-inflammatory drugs (NSAIDS), low-dose thyroid replacement, low-dose steroids, and tricyclic antidepressants. Cholesterol-lowering medications should be avoided when they are associated with increased weakness.[1] There are steps a person can take to prevent some secondary complications. Anesthetic risk may be increased, so careful assessment of heart and respiratory function before and after surgery are recommended. Affected people should also have a yearly electrocardiogram or cardiac MRI to detect possible conduction defects or cardiomyopathy.[1] You can see more detailed information about the management of myotonic dystrophy type 2 on the GeneReviews Web site. Organizations Supporting this Disease Organizations Providing General Support Learn more Where to Start • The Muscular Dystrophy Association (MDA) provides additional information about myotonic dystrophy. Click on the link to view this information. • Myotonic Dystrophy Foundation provides additional information about Myotonic dystrophy type 2. In-Depth Information Selected Full-Text Journal Articles 1. Dalton JC, Ranum LPW, and Day JW. Myotonic Dystrophy Type 2. GeneReviews. July 3, 2013; https://www.ncbi.nlm.nih.gov/books/NBK1466/. 2. Learning About Myotonic Dystrophy. National Human Genome Research Institute (NHGRI). June 4, 2012; https://www.genome.gov/25521207. Accessed 4/22/2015. 3. Myotonic dystrophy. Genetics Home Reference (GHR). November 2010; https://ghr.nlm.nih.gov/condition=myotonicdystrophy. Accessed 5/11/2011. 4. Myotonic muscular dystrophy. Muscular Dystrophy Association. https://mda.org/disease/myotonic-muscular-dystrophy/overview. Accessed 2/10/2014. 5. Françoise Bouhour. Proximal Myotonic Myopathy. Orphanet. July, 2007; https://www.orpha.net/consor/cgi-bin/OC_Exp.php?lng=EN&Expert=606. Accessed 2/10/2014. 6. David A Chad and Basil T Darras. Myotonic dystrophy: Prognosis and management. UpToDate. Waltham, MA: UpToDate; January, 2014; Accessed 2/10/2014. Rare Dermatology News fascinating Rare disease knowledge right in your inbox Subscribe to receive
Afford to do, afford not to do What is the concept of afford, and does it work both ways? The question is not whether it can work two ways, but for the concept to be meaningful at all, it has to be fully operational with regard to meaning. We’re not just deciding what to spend money on — wait, yes we are! In so doing, any action must be considered in the context of its opportunity cost, and with further unpacking of the consequences of not spending money on certain things, the consequences this decision assures. For instance, Mr. Sarda said, it’s relatively straightforward for businesses to calculate the potential costs from an increase in taxes designed to curb emissions of carbon dioxide, a major greenhouse gas that contributes to global warming. Indeed, this is one of the most common climate-related risks that companies now disclose. But it’s trickier to take scientific reports about rising temperatures and weather extremes and say what those broad trends might mean for specific companies in specific locations. Previous studies, based on computer climate modeling, have estimated that the risks of global warming, if left unmanaged, could cost the world’s financial sector between $1.7 trillion to $24.2 trillion in net present value terms. A recent analysis published in the journal Nature Climate Change warned that companies are reporting on these risks only “sporadically and inconsistently” and often take a narrow view of the dangers that may lie ahead. The financial context of whether or not to do something – can we pay for doing the thing – extends in validity only as far as this framing is reversed: can we afford not to do something. That is, the so-called cost of addressing climate change – or homelessness – large problems who’s answers supposedly involved gross amounts of expenditure that could be determined to be too large must also be considered in their reverse outlines. What is the cost of doing nothing? Is this affordable? Here the concept actually has meaning and may provide a constructive way forward. But if we decide not to spend money on ameliorating climate change expressly because the measures are deemed prohibitively expensive, and yet the broad effects of climate change prove to be even more expensive than the proposed steps, then the affordability argument is invalid, if not disingenuous. While it may be the case that some consequences are unknowable in advance, that truth equally invalidates the affordability argument in advance. If it can’t be known whether a step would be worth it, it likewise cannot be known whether ignoring a step might be a price too high. TL;Dr – Decisions made to ignore the effects of climate change must be taken for a reason other than the affordability argument. Green Quiz 1. Paris3rd 2. allemagne 3. alpharhetta Measures of Affluence Is it how fat you are? Or how skinny? An iPhone or Samsung? Clothes, car, house… surely all of these. But like so many things, of course, it depends. The consumption model flows from conspicuous to discreet, along a kind of progressive continuum, whereby once you achieve a certain stage or level of affluence and find momentary reprieve from keeping up, your benchmark then changes to reflect the new set of priorities of those directly above you. And the fun begins again. So what if (!) other variables experienced a, um, shift, in their ability to reflect the wealth of their bearer? For example, let’s say that once upon a time only the rich could abandon the bustle of the city and afford lengthy commutes to far flung homes, to live out in the country and venture into town only on occasion. Even if they had to travel in everyday, this too was a sign of how much they could afford to spend on personal transportation. But then the dirty, dangerous city becomes more desirable for some reason, or life in the country less so (bears, Sasquatch) and a switch occurs wherein a long commute is suddenly a symbol of penury, while the short drive or the ability to even occasionally do without a car becomes IT among the fashionable set. Wow. That’s convoluted. You see what we’re up against. But is there another way to have get fancy trains and buses and trams and funiculars? There’s no way to pull back on burning seas oil drilling without dramatically stepped-up conservation; and there’s no way, in this culture, to make conservation work without making it part and parcel of status and/or something people want. I guess we might at least look at this as something that can happen, however far-fetched it may seem.
Quality Protein Maize (QPM): Nutrition, Scopes & Challenges: Eishaina Chaudhary  Author: Eishaina chaudhary Bsc.Ag 2nd sem IAAS pakhlihawa Maize cultivation is a way of life for most farmers in the hills of Nepal. Maize cultivation in Nepal is one of the major cultivation in Nepal. It is a traditional crop cultivated as food, feed and fodder on slopping Bari land in the hills. It is grown under rainfed conditions during the summer as a single crop or relayed with millet later in the season. In terai, inner terai, valleys, and low- lying river basins areas maize is also grown in the winter and spring with irrigation. Maize production as a proportion of total cereal production was 33% for highhills, 39% for the midhills, and 9% for terai. More than 2/3 of the maize produced in the midhills and highills is used for direct human consumption at the farm level and the ratio of human consumption to total production is higher in less accessible areas. Breeding for improved protein quality in maize began in the mid-1960s. Interdisciplinary and concerted research efforts led to amelioration of the negative features of the opaque phenotype, and the rebirth of ‘Quality Protein Maize’ (QPM). QPM holds superior nutritional and biological value and is essentially interchangeable with normal maize in cultivation and kernel phenotype. Poshilo makai -1 is the first quality maize (QPM) variety to be released in Nepal. It has attractive white cobs and provides a great option to improve the nutritional quality of people and animals due to higher content of lysine and tryptophan in the endosperm of the kernels are about twice higher than in Common varieties. Its name is fitting: Poshilo is a Nepali word meaning nutritious. QPM development involves manipulating three distinct genetic system: 1. a) The simple recessive allele of the opaque2 gene; 2. b) Modifiers/enhancers of the o2-containing endosperm to confer higher lysine and tryptophan levels; and 1. c) Genes that modify the o2-induced soft endosperm to hard endosperm. Nutritive value of QPM The QPM has got special distinction among the cereal due to presence of high amount of lysine and tryptophan, therefore QPM can be utilized for diversified purposes in food and nutritional security. It is also useful in fulfilling the protein requirement of different sections of society to prevent malnutrition. QPM with high carbohydrates, fats, better quality protein, some of vitamins and minerals, it is nutritious feed for poultry, livestock, swine, fish, etc. Use of QPM as feed leads to early development of broilers, save energy and feed and also extra cost on lysine and tryptophan. Besides doubling the biologically usable protein in a maize diet, QPM also confers the following nutritional benefits: better leucine: isoleucine ratio; higher niacin availability; higher calcium availability when eaten in the form of lime treated maize; higher carotene bio-utilization in yellow QPM; and higher carbohydrate utilization. maize is a dominant crop, demonstrated the positive effect of QPM on both the height and weight of children aged 7 to 56 months. Children consuming CM showed a decrease in both height-for-age and weight-for age over time, while children fed QPM did not show significant change in height-for-age but their weight-for-age increased marginally. QPM opportunities and challenges •  Although QPM has many nutritional advantages, there are many challenges in the wider adoption of QPM varieties. some of them are mentioned below. • Nutritional contents like lysine and tryptophan are phenotypically invisible, therefore, it is challenging to convince the growers, traders, dealers and consumers about the nutritional profile of varieties. • Misconception about the low yielding potential of nutritionally rich crops like QPM is demotivating the growers to adopt the QPM varieties. • Deterioration or dilution of nutritional quality of QPM varieties due to foreign pollen of non-QPM varieties is also a serious concern of produce quality. • Most of the QPM germplasm was developed for tropical and sub-tropical regions, whereas little work was done for QPM development in temperate maize. Therefore, QPM germplasm of tropical and sub-tropical background give lower yield and stability under temperate conditions due to lack of adaptation Despites of all above challenges, there are many opportunities to enhance the QPM adoption as maize demand is expected to rise in near future due to population growth and food security issues . • Provision of subsidized seed or other inputs like fertilizers, etc. may further contribute to wider adoption of QPM varieties. • Shifting to QPM provides a balanced protein source compared to NM without penalty of yield, energy, micronutrients and without changing the food supply system • Development of high yielding and stable QPM varieties for different maturity groups and different ecologies may provide effective opportunity to widen the adoption spectrum of these varieties • Declaration of minimum support price or premium price for biofortified maize grains in the market would also encourage the growers to produce more biofortified crops • Educating the farming communities through extension services can greatly enhance the adoption of QPM varieties. हाम्रो मोबाइल एप डाउनलोड गर्नुभयो ? अब सबै खाले कृषि मापक, अर्गानिक कृषि, नवीनतम कृषि, व्यावसायिक पशुपालन, खेती प्रविधि, बाली रोग तथा किरा व्यवस्थापन सहित सम्पूर्ण कृषि प्रविधिसम्बन्धि जानकारीको लागि हाम्रो एप डाउनलोड गर्न तलको फोटोमा Click गर्नुहोला | Leave comment
Tagged: amendment Barn with American flag in a small-population state on the Great Plains 1 Protecting the Rights of Citizens of Small-Population States To protect the interests of citizens of small-population states, the constitutional amendment that reforms the Senate should include a clause that bars Congress from making a law that has a discriminatory effect upon a citizen of a small-population state or states, when not “substantially related” to furthering an “important public purpose.”
by Liz Walter​ I come from Scotland/Spain. You probably also know how to invite someone to enter your home, using come in: How lovely to see you! Please come in! Just like these two common phrasal verbs, many others use ‘come’ more or less with its usual meaning of moving or travelling towards someone or something. That makes it easy to guess the meaning of phrasal verbs such as these: He’s not here at the moment. Why don’t you come back later? Would you like to come round for lunch tomorrow? All her family are coming over from Australia. And here’s another great thing about phrasal verbs with come: none of them can be separated, so you don’t need to worry about that at all! However, there are some phrasal verbs with ‘come’ that are harder because the meaning is impossible to guess. The following are some of the most common ones, and are worth trying to learn. If you come across a person, you meet them by chance, and in the same way, if you come across a thing, you discover it by chance: Tell me if you come across Max anywhere. I came across a lovely little restaurant. When we talk about a book, a movie, or a new product coming out, we mean that it is starting to be sold or is ready to be seen: When is their new smartphone coming out? When we say that a subject comes up, we mean that someone mentions it: We were talking about school and the subject of exams came up. As you know, some phrasal verbs have two particles, and if you come up with an idea, you think of it: Suzie has come up with a name for the café. There are a couple of ‘come’ phrasal verbs that are worth learning together with the nouns that follow, because they make such common and natural phrases. For example, we come to a decision, which means the same as ‘make a decision’ and we say that a person, army, country, etc. comes under attack or criticism, meaning ‘is attacked or criticized’. And finally, if – as in the title of this blog – you tell someone to come on, you are encouraging them to do something, to hurry up, or to try harder. 22 thoughts on “Come on – you can do it! Phrasal verbs with ‘come’. 1. Luc007 And of course, “coming out” has now taken a new meaning all of its own. It is nowadays understood in its new acception by the great majority of people, even when “coming out” is not followed by “of the closet” 😉 1. You are totally correct, but “coming out” has also been extended to mean “revealing a secret identity” or otherwise revealing an unknown fact. For instance, an intelligence agent might “come out” as a spy, or a tour guide might “come out” as an advocate for a certain point of view. 2. Murat There are some others like “come to terms” and “come around”, which “comes to my mind” in this context. Thank you for the post! 3. Ahmed Basha Will the Use of come across have the same meaning in the following sentences:He came across as a very intelligent student and He came across the missing dog on his way to the party. 4. Liz Walter Hi Ahmed. No, these are different: the example with the dog is the one I described in the blog, meaning ‘to discover’, but the other one is a three-word phrasal verb. If you ‘come across as’ something, that is how you appear to other people. Look out for my blog on three-word phrasal verbs, coming up soon! 5. Liz Walter Hi Jackiie. Yes, ‘come over’ is a phrasal verb too, and it has several different meanings. One of them is the same as ‘come across as’: ‘He comes over as rather arrogant’. Actually, you can use both ‘come across’ and ‘come over’ without ‘as’ if you follow them with an adverb: ‘She came across/over very well on the TV show.’ 1. Mali is that richness or poorness of English expressing different meanings with one word such as you meant one of them is as a phrasal verb ”come over”.? 1. Liz Walter I’ll have to leave that for you to decide! But many languages have polysemous words, i.e. words with two or more meanings. 6. Pingback: Phrasal verbs | ELT Infodump 1. Liz Walter Yes, but it depends on the context. Usually, we would say ‘A friend of mine has come to help me out.’ We’d only say ‘come up’ if the person has literally come either somewhere higher or somewhere to the north of their usual place. Occasionally people say ‘come up’ to a big city such as London even if they are not moving north. 7. Pingback: Verb To COME - Learn English Now 8. michael how about to ‘come away’ meaning that something got detached from its original point of attachment? i.e. ‘the magnet came away from the fridge door’? 1. Liz Walter See the end of the article: And finally, if – as in the title of this blog – you tell someone to come on, you are encouraging them to do something, to hurry up, or to try harder. So for example, you can say ‘Come on, you need to work harder!’ You can also use it when it’s time to go somewhere: ‘Come on! We don’t want to be late.’ Leave a Reply
Calamos Supports GreeceCalamos Supports Greece Griffins: The Noble Protectors of Ancient Greece Griffins, the unique mythological creatures with the head of an eagle and the body of a lion, were often mentioned in ancient Greek plays Map of the World as Herodotus — The Father of History — Knew It Herodotus, the Greek historian who is known as "The Father of History," gave the world such detailed knowledge of the world as it was known to the ancient Greeks that we can create a map showing all the peoples,... Severed Limbs and Wooden Feet: How the Ancients Invented Prosthetics An early mention of an ancient prosthetic comes from the Greek historian Herodotus, who tells the story of Hegesistratus, an Ancient Greek diviner who cut off his own foot to escape his Spartan captors -- and replaced it with... The Greek Historian Herodotus, Known as “The Father of History” Herodotus, or Ἡρόδοτος, born in Halicarnassus in 484 BC, was one of the most brilliant Greek thinkers of all time, and is known worldwide as "The Father of History." He took it upon himself to write down the history of the... Edible Insects: New Frontier For Western Cuisine Has Ancient Roots With the green light for the production and introduction of the first edible insects into European markets, conflicting opinions were rife. Four Amazing Astronomical Discoveries from Ancient Greece Ancient Greek scientists and mathematicians in ancient Greece made some of the most significant astronomical discoveries centuries ago. Ancient Greek Shields Showed Allegiance, Struck Fear Into Enemy As far back as the eighth century BC, the ancient Greeks had invented a large, round shield, or aspis that became an essential part of warfare Egyptian Shipwreck Proves Greek Historian Herodotus Right — After 2,500 Years Archaeologists have recently discovered an ancient shipwreck which proves the Greek Historian Herodotus was absolutely correct about the observations he made nearly 25 centuries ago. The shipwreck, discovered recently off the Mediterranean coast of Egypt near the ancient, and now sunken, city... Greek Books that Influenced the Course of Civilization They say a book is a man’s best friend, but why is that? Once you take a book in your hand and start to read it, it can accompany you anywhere you go, physically and mentally. A book’s ideas,... Greece's Hot Springs a Lure for Millennia Medical tourism (also called medical travel, or health tourism) is not a new alternative therapeutic means. Patients have been on the move searching for medical care for thousands of years, while alternative forms of treatment combining natural sources and...
Earth:Intrusive rock From HandWiki Short description: Magmatic rock formed below the surface QAPF diagram for the classification of plutonic rocks Intrusive rock is formed when magma penetrates existing rock, crystallizes, and solidifies underground to form intrusions, such as batholiths, dikes, sills, laccoliths, and volcanic necks.[1][2][3] Intrusion is one of the two ways igneous rock can form. The other is extrusion, such as a volcanic eruption or similar event. An intrusion is any body of intrusive igneous rock, formed from magma that cools and solidifies within the crust of the planet. In contrast, an extrusion consists of extrusive rock, formed above the surface of the crust. Some geologists use the term plutonic rock synonymously with intrusive rock, but other geologists subdivide intrusive rock, by crystal size, into coarse-grained plutonic rock (typically formed deeper in the Earth's crust in batholiths or stocks) and medium-grained subvolcanic or hypabyssal rock (typically formed higher in the crust in dikes and sills).[4] Because the solid country rock into which magma intrudes is an excellent insulator, cooling of the magma is extremely slow, and intrusive igneous rock is coarse-grained (phaneritic). However, the rate of cooling is greatest for intrusions at relatively shallow depth, and the rock in such intrusions is often much less coarse-grained than intrusive rock formed at greater depth. Coarse-grained intrusive igneous rocks that form at depth within the earth are called abyssal or plutonic while those that form near the surface are called subvolcanic or hypabyssal.[4] Plutonic rocks are classified separately from extrusive igneous rocks, generally on the basis of their mineral content. The relative amounts of quartz, alkali feldspar, plagioclase, and feldspathoid are particularly important in classifying intrusive igneous rocks, and most plutonic rocks are classified by where they fall in the QAPF diagram. Gabbroic rocks are further classified by their relative contents of plagioclase and various iron- or magnesium-rich minerals (mafic minerals) such as olivine, hornblende, clinopyroxene, and orthopyroxene, which are the most common mafic minerals in intrusive rock. Rare ultramafic rocks, which contain more than 90% mafic minerals, and carbonatite rocks, containing over 50% carbonate minerals, have their own special classifications.[5][6] Hypabyssal rocks resemble volcanic rocks more than they resemble plutonic rocks, being nearly as fine-grained, and are usually assigned volcanic rock names. However, dikes of basaltic composition often show grain sizes intermediate between plutonic and volcanic rock, and are classified as diabases or dolerites. Rare ultramafic hypabyssal rocks called lamprophyres have their own classification scheme.[7] An intrusion (pink Notch Peak monzonite) inter-fingers (partly as a dike) with highly metamorphosed black-and-white-striped host rock (Cambrian carbonate rocks) near Notch Peak, House Range, Utah Intrusive rocks are characterized by large crystal sizes, and as the individual crystals are visible, the rock is called phaneritic.[8] There are few indications of flow in intrusive rocks, since their texture and structure mostly develops in the final stages of crystallization, when flow has ended.[9] Contained gases cannot escape through the overlying strata, and these gases sometimes form cavities, often lined with large, well-shaped crystals. These are particularly common in granites and their presence is described as miarolitic texture.[10] Because their crystals are of roughly equal size, intrusive rocks are said to be equigranular.[11] Plutonic rocks are less likely than volcanic rocks to show a pronounced porphyritic texture, in which a first generation of large well-shaped crystals are embedded in a fine-grained ground-mass. The minerals of each have formed in a definite order, and each has had a period of crystallization that may be very distinct or may have coincided with or overlapped the period of formation of some of the other ingredients. Earlier crystals originated at a time when most of the rock was still liquid and are more or less perfect. Later crystals are less regular in shape because they were compelled to occupy the spaces left between the already-formed crystals. The former case is said to be idiomorphic (or automorphic); the latter is xenomorphic. There are also many other characteristics that serve to distinguish plutonic from volcanic rock. For example, the alkali feldspar in plutonic rocks is typically orthoclase, while the higher-temperature polymorph, sanidine, is more common in volcanic rock. The same distinction holds for nepheline varieties. Leucite is common in lavas but very rare in plutonic rocks. Muscovite is confined to intrusions. These differences show the influence of the physical conditions under which crystallization takes place.[12] Hypabyssal rocks show structures intermediate between those of extrusive and plutonic rocks. They are very commonly porphyritic, vitreous, and sometimes even vesicular. In fact, many of them are petrologically indistinguishable from lavas of similar composition.[12][7] Plutonic rocks form 7% of the Earth's current land surface.[13] Intrusions vary widely, from mountain-range-sized batholiths to thin veinlike fracture fillings of aplite or pegmatite. Diagram showing various types of igneous intrusion A dike intrudes into the country rock, Baranof Island, Alaska , United States Batholith: a large irregular discordant intrusion Chonolith: an irregularly-shaped intrusion with a demonstrable base Cupola: a dome-shaped projection from the top of a large subterranean intrusion Dike: a relatively narrow tabular discordant body, often nearly vertical Sill: a relatively thin tabular concordant body intruded along bedding planes Stock: a smaller irregular discordant intrusive Boss: a small stock See also 1. Intrusive Rocks: Intrusive rocks, accessdate: March 27, 2017. 2. Igneous intrusive rocks: Igneous intrusive rocks, accessdate: March 27, 2017. 3. intrusive rock | geology |, accessdate: March 27, 2017. 4. 4.0 4.1 Philpotts, Anthony R.; Ague, Jay J. (2009). Principles of igneous and metamorphic petrology (2nd ed.). Cambridge, UK: Cambridge University Press. p. 52. ISBN 9780521880060.  5. Le Bas, M. J.; Streckeisen, A. L. (1991). "The IUGS systematics of igneous rocks". Journal of the Geological Society 148 (5): 825–833. doi:10.1144/gsjgs.148.5.0825. Bibcode1991JGSoc.148..825L.  6. "Rock Classification Scheme - Vol 1 - Igneous". British Geological Survey: Rock Classification Scheme 1: 1–52. 1999.  7. 7.0 7.1 Philpotts & Ague 2009, p. 139. 8. Blatt, Harvey; Tracy, Robert J. (1996). Petrology : igneous, sedimentary, and metamorphic. (2nd ed.). New York: W.H. Freeman. pp. 12–13. ISBN 0716724383.  9. Philpotts & Ague 2009, p. 48. 10. Blatt & Tracy 1996, p. 44. 11. rocks and minerals: Geology - rocks and minerals, accessdate: March 28, 2017. 12. 12.0 12.1  One or more of the preceding sentences incorporates text from a publication now in the public domainFlett, John Smith (1911). "Petrology". in Chisholm, Hugh. Encyclopædia Britannica. 21 (11th ed.). Cambridge University Press. p. 327.  13. Wilkinson, Bruce H.; McElroy, Brandon J.; Kesler, Stephen E.; Peters, Shanan E.; Rothman, Edward D. (2008). "Global geologic maps are tectonic speedometers—Rates of rock cycling from area-age frequencies". Geological Society of America Bulletin 121 (5–6): 760–779. doi:10.1130/B26457.1.
Category Archives: Anvi’s Approaches Plogging: The Solution to Keeping our Home Healthy A new trend from Sweden is soon becoming more and more popular all across the world. This simple technique helps both the environment and us humans too. So what better day to start something environmentally and health-friendly than today, on Earth Day. Our Earth is full of the greatest wonders and is home to trillions of different species, plants, and organisms. Unfortunately, with our very rushed lives, we sometimes forget to do simple things like turning off the faucet or cleaning up after ourselves. While these are simple and small mistakes, they may be harming our environment and are getting rid of some precious pieces of nature. With all this harm on the earth, what if there was something to undo this? What if we picked up after ourselves, stayed healthy, and ensured everyone else is too? Plogging does all of this! With just 30 minutes a day, we keep ourselves fit and help keep our environment clean too. Plogging is a Swedish term mixed with “picking up litter” and “jogging”. Plogging refers to the term in which you jog/walk and pick up litter. In this series of movements, you are both expanding on your flexibility and your stamina. The jogging and stopping movement is like a squat. Over the past few years, littering has become very prominent throughout our communities. We can see a lot of this waste end up in freshwater reservoirs or large bodies of water, where animals and organisms are harmed. This man-made waste can badly hurt and even kill fish or nearby animals. More waste results in more pollution and an unhealthy environment overall. While picking up trash may sound a little dirty at first, you are actually helping our very own Earth stay cleaner and grow better. Imagine a world with no trash and all this luscious greenery, clean water, and all this exotic marine life. How fun would that be! In any case, Plogging is the right way to go. We help ourselves, our animals, and mother nature stay fit and healthy together! So how about a new challenge for this year’s Earth Day. Why don’t we take a pledge to Plog? The answer to a cleaner and better planet is finally here: Plogging!
Article Text Download PDFPDF The causes and effects of fetal macrosomia in mothers with type 1 diabetes 1. M Jolly1, 2. S Robinson1 1. 1Imperial College School of Medicine, Department of Endocrinology and Metabolic Medicine, Mint Wing, St Mary's Hospital, Praed Street, London W2 1NY, UKstephen.robinson{at} Statistics from The mechanisms and physiology of in utero fetal nutrition are not understood, and the proportions of carbohydrate, fat, and protein contributing to fetal energy uptake are unknown. Lipids are energy rich and potentially a valuable source of energy for the fetus. Little intact triglyceride crosses the placenta but non-esterified fatty acids (NEFAs) do cross easily. However, the plasma concentration of maternal NEFAs is too low to sustain the total energy supply to the fetus and, therefore, monosaccharides have been assumed to be the major energy source for the growing fetus. There are considerable species variations in placental fatty acid transfer. In general, the fewer the numbers of cell layers contributing to the placental barrier the higher the net flux. Most experimental biology of materno–fetal energy transport has been performed in species with non-haemochorial placentation. Human placentation is haemochorial—maternal blood is in direct contact with a thin layer of fetal cells. The guinea pig also has a haemochorial placenta and is able to hydrolyse triglyceride, producing NEFAs that cross to the fetus.1 Human experimentation is more difficult, but dysnutrition may give insights into normal physiology. In this issue Merzouk et al describe mothers with type 1 diabetes mellitus who were delivered of “macrosomic” neonates with higher glucose concentrations and higher triglyceride concentrations than mothers with type 1 diabetes mellitus and appropriate for gestational age neonates.2 The mothers' dyslipidaemia might be more than just an association with the hyperglycaemia, in relation to the fetal macrosomia. Placental lipase could hydrolyse triglyceride and the NEFAs liberated might cross to the fetus. Fetal hyperinsulinaemia, stimulated by fetal hyperglycaemia and hyperaminoacidaemia, as proposed by Pedersen,3 would lead to excess fat storage and fetal weight gain. In mothers with gestational diabetes mellitus, maternal triglyceride concentrations correlate more closely with fetal weight than maternal glucose concentrations, supporting the hypothesis that an excess of lipids might contribute to fetal weight gain.4 The neonatal dyslipidaemia Merzouk et al describe is intriguing, not least because it is associated with hyperinsulinaemia, rather than a relative hypoinsulinaemia akin to their mothers. The dyslipidaemia is similar to that found in type 2 diabetes and other insulin resistant states with hypertriglyceridaemia and low high density lipoprotein (HDL) cholesterol values.5 It will be interesting to see whether the dyslipidaemia is maintained beyond infancy, or whether it is only a short term response to neonatal hyperglycaemia and hyperinsulinaemia. Macrosomic babies of mothers without diabetes are hyperinsulinaemic.6 In the study by Merzouk et al it is not possible to determine whether the macrosomic neonates born to the non-diabetic group have simply achieved their genetically determined birth weight or whether they are overly large. The normal plasma insulin concentration in this group would be consistent with appropriate rather than excessive growth. A statistical correlation between low birth weight and impaired glucose tolerance in later life has been found and confirmed in many studies.7 Proponents of the “thrifty phenotype hypothesis” suggest a causative link between maternal nutrition, inadequate fetal growth, and disorders allied to insulin resistance in adulthood.8 They propose that in utero starvation triggers permanent remodelling of physiology, “programming” these individuals to develop insulin resistance and related conditions such as type 2 diabetes. It is difficult to explain the relation of fetal macrosomia in mothers with gestational diabetes and type 2 diabetes in the offspring, but perhaps the association is not purely related to absolute body weight but more to fetal dysproportion. Others propose that the association between low birth weight and adult insulin resistance is genetically mediated.9 Genetically determined insulin resistance could also result in low insulin mediated fetal growth in utero, as well as insulin resistance in childhood and adulthood. Low birth weight, measures of insulin resistance in life, and ultimately glucose intolerance, diabetes, and hypertension, would all be phenotypes of the same insulin resistant genotype. Central to this “fetal insulin hypothesis” is the concept that insulin mediated fetal growth will be affected by fetal genetic factors that regulate either fetal insulin secretion or the sensitivity of fetal tissues to the effects of insulin. Merzouk et al have found dyslipidaemia in infants of mothers with poorly controlled type 1 diabetes. Does the genetic predisposition increase the risk of type 1 diabetes in the infant as in their mother; or does the dysnutrition increase the risk of insulin resistance and type 2 diabetes, unlike their mother, with impaired glucose tolerance in adulthood, or neither, or both? Although it may be premature to suggest that these results have implications for metabolic diseases in these infants, these studies may in time give insights into the differential effects of the metabolic milieu predisposing to impaired glucose tolerance in adulthood and also the genetic predisposition to impaired glucose tolerance in adulthood. View Abstract Request Permissions
display | more... KIC 8462852 is a star that was in the news a few years ago due to some irregular, and inexplicable, changes in brightness. It is often called Tabby's star1, but does not yet have a formal name compatible with human speech. Tabby's star is a F-type main-sequence star2, much akin to Sol in size and intensity. It is in the constellation Cygnus, although it is too dim to see with the naked eye. It is about 1,470 light-years away from us, and is notable only for what surrounds it. We have no clue what surrounds it. In 2015, it was formally noted that KIC 8462852 shows unusual fluctuations in the starlight reaching us. Astronomers had been looking for fluctuations in light that would indicate exoplanets, but these fluctuations were extreme and irregular. Irregular changes in brightness are odd, as we would usually assume that these changes are due to something orbiting between us and the star (e.g., an exoplanet), and stable orbits are quite regular. Some have suggested that the changes are irregular because they represent thousands of small orbits, e.g., massive swarms of comets or weirdly shaped dust clouds.3 These would have to be unusually dense and oddly distributed, as KIC 8462852 dims by 22%, which is a lot in any case, and especially a lot when you are assuming anything like a random distribution of millions of objects. This has led some people to suggest that KIC 8462852 has highly irregular changes in heat transport to its photosphere; this would be interesting, because we don't see this in all the other tens of thousands F-type stars we examine for light fluctuations. This has also led some people to suggest that we may be seeing an alien civilization building a Dyson swarm; this would be interesting for a number of reasons, starting with ALIENS!, but also because the Fermi paradox has been a long-standing mystery. While the Dyson swam hypothesis is undersupported, to say the least, it does have the advantage that we would a priori expect to see some signs of alien life somewhere, and a priori we do not expect to see irregular, complex orbits of this sort appear in nature. Observations are ongoing, with the star's blog posting updates a few times a year. Dips in brightness greater than 1% are individually named, but so far there have been no other double-digit dips since the first two -- one on March 5, 2011 (15%), and then on February 28, 2013 (22%). The projected third major dip, if this trend had continued, could not be observed due to a malfunction in the Kepler space telescope, but later observations found no dips of this magnitude, and the larger of the dimmings that followed did not match any pattern. A review of past observations, including photographic plates going back over a hundred years, indicate that the star has slowly been becoming dimmer over the years, more so than other stars of its type; however, there is an obvious problem in interpreting a random sample of photos of a randomly flashing star. Currently, the best guess is either aliens or dust, with most scientists leaning towards dust; they key here is that there is less dimming in the infrared light end of the spectrum, and more in its ultraviolet light. An object larger than gas or dust particles would dim all wavelengths of light equally when passing in front of the star. The irregularity is still a bit of a mystery, with hypotheses of an orbiting brown dwarf and/or the remains planetary destruction helping to explain some of the weirdness. This is also supported by observations of a few other stars that show irregular fluctuations in brightness. The white dwarf WD 1145+017 appears to be ripping apart a companion planet, causing pretty much the same sort of chaos we see from KIC 8462852, although for WD 1145+017 we have been able to calculate fairly precise orbits for the planetesimals being shredded. Likewise RZ Piscium is a young UX Orionis type variable star that appears to have decided to eat its planets; while we have not been able to plot the destruction as well as with WD 1145+017, the dimmings are consistent with the planets and dust spiraling in towards the sun. It may be that with more observations, we will be able to model some event of this sort to explain all the observation from KIC 8462852. 1. The designation KIC 8462852 comes from The Kepler Input Catalog (KIC), a star catalog listing over 13 million large, shiny objects. It is likely that KIC 8462852 will eventually get a shorter name, perhaps even one involving more letters than numbers, but in the meantime Tabby's star is used, in honor of lead author Tabetha S. Boyajian. 2. This is science speak for being slightly larger and brighter than the sun (the sun is a G-type main-sequence star). 3. Young stars often have circumstellar discs that have uneven distribution, and which cause periodic and sometimes extreme dimming of the star from our viewpoint. The spiffily-named red dwarf EPIC 204278916 shows dimming of 65%, but is quite regular with it.
Celebrating Mexican Composer María Grever On February 11th, Google Doodle celebrates the first female Mexican composer, María Grever, who reached international success. Born in 1885 to a Spanish father and Mexican mother, Grever spent the first part of her life living in Mexico City, then eventually moved to Spain. She is known for hits like What a Difference a Day Makes, made popular by Dinah Washington. She composed music for movies, and her first record released in 1912, sold millions of copies.  mexican culture products maria grever Google Doodle celebrates María Grever, the Mexican singer and songwriter thought to be one of the country's greatest composers, on February 11. On this day in 1938, Grever recorded "Ti-Pi-Tin," which became one of her biggest hits. She was born María Joaquina de la Portilla Torres in León, central Mexico, in the late 19th century. Her mother was Mexican and her father was Spanish and, as a child, she moved to Seville, Spain, where she studied English, French and music. Grever's musical talent became apparent early on. She is said to have composed a holiday carol for her school at the age of four, according to The New York Times, an achievement that persuaded her father to hire composers Claude Debussy and Franz Lehár to tutor her. As a child, Grever loved performing, telling The Brooklyn Daily Eagle in 1947: "I was always play-acting. I used to wrap myself up in my mother's veils and recite things. They were always tragedies. I was an orphan left lonely by the sea." The musician traveled around Europe with her family before returning to Mexico. Her sister later married an American, whose best man was Leo A. Grever, an oil company executive. María and Grever were married four days after her sister's wedding. Her first record "A Una Ola" or "To a Wave" was released in 1912 and sold millions of copies. It was covered by numerous singers. Her later songs were covered by artists such as Placido Domingo, Aretha Franklin and Frank Sinatra. The composer moved to New York in 1916, where she composed music for movies, working for Paramount Pictures and 20th Century Fox. Grever also continued to create music that combined folk rhythms with styles such as tango. Her biggest hits include "Júrame" or "Promise, Love" in 1926 and "What a Difference a Day Makes"—originally "Cuando Vuelva a Tu Lado"—in 1934. In 1959 Dinah Washington won a Grammy for her version of "What a Difference a Day Makes." Grever is thought to have composed hundreds of songs and worked tirelessly, telling The Brooklyn Daily Eagle: "My family once insisted that I must rest. I tried. I remained in bed. Then my blood pressure went up. The doctor said: 'Let her get up and work and she will be well again.'" In 1952, Grever was named Woman of the Americas by the Union of Women of the Americas, in recognition of her contribution to music. Google Doodle says: "Thanks for all the music María Grever; it continues to strike a chord with listeners around the world today!" Read more: https://www.newsweek.com/maria-grever-google-doodle-celebrates-mexican-composer-1568495 Leave a comment Please note, comments must be approved before they are published
PKU stands for Phenylketonuria, a debilitating genetic disease that can drag down an entire family in the treatment of the condition. Social Security recognizes the harm this disease inflicts on the individuals that suffer from it as well as for family caregivers that are needed to spend time and resources in supporting their loved ones. What is Phenylketonuria This disease has been well known for quite awhile in our society, as anyone that has consumed a diet drink containing aspartame can likely attest to having read the name on the soft drink can. All products containing aspartame can be deadly to someone suffering from phenylketonuria, as the disease makes it difficult for the human body to break down a specific amino acid contained therein. Phenylketonuria specifically is an inherited biological trait that, when present, causes a failure in the body to produce an enzyme. The particular enzyme in question is what breaks down the amino acid phenylalanine, which is found in aspartame. Phenylalanine is also found in many other common foods that are high in protein such as meats, dairy products, eggs, nuts and breads. Amino acids are basically the building blocks of proteins, so if there’s a failure in the body to break them down then it has drastic consequences Damage Done by Phenylketonuria Some of the main health issues that are caused by phenylketonuria are abnormally sized head (microcephaly), seizures, body tremors, behavioral abnormality, brain damage, learning disability and developmental problems. These conditions are caused by the buildup of phenylalanine in the nervous system, which in turn is due to the phenylketonuria disability preventing the body from creating the enzyme to handle the phenylalanine. When the above conditions present themselves in the life of an individual, then it takes constant help and monitoring to care for them. The diet of anyone suffering from PKU is specialized to ensure they receive the proper nutrients they need while eliminating as much protein from the diet as possible. The strains of these tasks prevent many phenylketonurics from managing their own day-to-day lives. When that happens costs mount up and make life even more daunting. Fortunately, under the Social Security Disabilities insurance (SSDI) program there is some financial support. Applying for Assistance Even though the Social Security Administration (SSA) recognizes the phenylketonuria disability, that doesn’t mean every diagnosis of the disease grants an automatic benefit. There are varying degrees of functionality for the people afflicted with this condition. What is necessary for the SSA to grant the benefit is for the patient to show proof that due to the condition they are unable to work. The way to show this to the SSA is to provide documentation of the issues caused by the condition as they are noticed on a day-to-day basis. Medical records showing the diagnosis and any possible side effects that have been uncovered as a result of the finding. Information about the onset of the claimant for when they were no longer able to work and information showing any improvements are all helpful in having a fair assessment of the severity due to the condition for social security disability benefits. Applications to the SSA can move slowly, and in many cases they aren’t approved on the first round. Generally it takes 90 to 120 days for the application to be processed, so having complete information is very important at this stage to receive benefits as swiftly as possible. For the most severe cases there are options to allow for benefits to be paid while the application is still being reviewed but the disability must be shown to be drastically impairing the life of the applicant. If the first application is denied there is an appeals process setup to allow a continued effort to receive necessary benefits. In what is called reconsideration by the SSA, they will take a look at the information provided a second time, but this first step in appealing can take three to five months to complete. This is why it’s so important to have the phenylketonuria disability properly documented, as these delays in review can be some of the most difficult time for a suffering person to work through. If the reconsideration fails, then within 60 days of being denied the applicant can request a hearing. Administrative law judges preside over the hearings, and they can approve the claim, deny the claim or send it back for further review. As these processes seeking social security benefits often turn towards these judicial settings it is always recommended to seek legal counsel from the start of the application process to ensure the application is prepared properly. It’s during these hearings when most social security disability claims are approved. This process is time consuming and frustrating, especially if an applicant is unprepared for the process. While phenylketonuria disability can have financial assistance provided, it’s important to start the process swiftly and as accurately as possible to ensure the best chance for receiving benefits is taken.
How to Cite Poems & Plays in MLA Modern Language Association or MLA format is typically applied to papers involving comparative literature, literary criticism and literature study. Papers including citations from poems and plays often use MLA format. Properly citing such sources helps your reader understand which works you refer to and also prevents charges of plagiarism, which can have serious consequences. According to the 7th edition of the MLA Handbook for Writers of Research Papers, in-text citations for poetry and plays follow guidelines similar to other citations. Include the author's last name. Instead of the usual page number, however, plays need act and scene numbers after the author's name with no punctuation after the author. For plays written in verse form, such as Shakespeare, add a line number. Use Arabic numerals with periods between the sections. For instance, "2.4.10-12" refers to act one, scene four, lines ten through twelve. Similarly, in citations for poems, use the author's last name and line number instead of a page number: (Browning 22-23). Works Cited Entries for plays and poetry on the Works Cited page may include more information than entries for regular books. Begin the entry with the author of the play or poem you cited, last name first, with a period after it. Then give the title of the play or poem. If the piece is part of an anthology or collection, put quotation marks around this title, capitalizing the first and important words. Place a period at the end. Then type the name of the anthology, italicized, followed by a period. Write "Ed." (without the quotation marks) followed by the editor's name, if provided. After a period, give the city of publication, a colon, the publishing company, a comma and the year. Include the page numbers for the selection next. After a period, name the medium, such as print. The entry might appear like this: Browning, Ann. "The Rose of Mine." Poems Galore (italicized). Ed. Joan Smith. New York: Penguin, 1990. Print. Other Concerns If the play is published as its own piece rather than part of a collection, follow the regular guidelines for a book entry on the Works Cited page. If you found the play or poem on the Internet, you may not have publisher information. In that case, leave out those sections and after the title of the work, put the name of the website or the database in italics with a period at the end. If print publisher information appears, include both sets of information. The medium should be "Web" (without the quotation marks). Conclude your entry with the access date, giving day, month and year and a period. This type of entry might appear like this: Browning, Ann. "The Rose of Mine." Love Poems (italicized). Web. 10 March 2013.
Introductory Lecture on Big Questions in Physics Introduction to six big questions representing frontiers of twenty-first-century physics, such as what are the ultimate laws of nature, how does complex structure arise, and how can physics benefit society. Classes will involve presentations by researchers and by students, discussions of journal articles, and tours of physics labs involved with related research. Recommended prerequisite: precalculus and at least one quantitative science course at the high school level, such as chemistry or physics. Instructor: Mueller Curriculum Codes • STS • NS Typically Offered Fall Only
The Weekly Carboholic: Not a drop to drink… According to a USGS estimate, 96.5% of the available water is in the oceans, 1.7% is frozen into icecaps and glaciers, 0.8% of the water is in freshwater aquifers, and about 0.0072% is available in freshwater lakes and rivers. Generally speaking, humanity relies on that 0.0072% for all of its direct consumption and agricultural uses. But most (about 2/3rds) of that available freshwater is tied up in just a few major bodies of water, namely Lake Baikal, Lake Tanganyika, Lakes Superior, Michigan, and Huron (which will be threatened by Western development well outside their drainage basins), and the Amazon River. This means that, for the majority of humanity that is unlucky enough to not live next to one of those bodies of water, rising populations and a hotter climate are gong to put pressures on the availability of potable water. As an example, the Spanish city of Barcelona is literally shipping tankers full of millions of liters of water to slake the public thirst. The problem is that a growing population, more agriculture, and an extended drought has left Barcelona’s main reservoir at only 18% full. So the city is paying 22 million euros to ship in six tanker ships of water from other regions around Spain over the next few months. The problem is that this can’t be sustained. Not only is all of Spain dealing with water shortages that make shifting water from region to another a logistical and political nightmare, but Barcelona is a city of 1.6 million people. According to the Guardian article, those 23 million liters are enough for 180,000 people for only one day. At that rate, if the reservoir were to run dry, Barcelona alone would need 9 tankers of water every day. At the quoted rate of 22 million euros for 6 tankers (or 3.67 million euros per tanker), that would be about 33 million euros every day just for water. If we scale Los Angeles (population: ~4 million, total city budget ~$6.5 billion) down to estimate Barcelona’s city budget (~$2.6 billion, or 1.73 billion euros), then importing the city’s entire water needs would cost about 7x more than the city’s entire budget. Thankfully it’s not that bad, because the city still has water in it’s reservoirs, but it doesn’t take many shiploads of water to make constructing multi-billion dollar desalination plants and the associated power plants a viable option. And that’s just for one Spanish city in the relatively wet north of Spain. According to The New York Times, there are water wars between developers and farmers in the much drier south of Spain, and the climate of southern Spain is coming to resemble that of north Africa. The Times reports that a large part of the problem is mismanagement of existing water supplies, especially the drilling of hundreds of thousands of wells that have sucked the groundwater so dry that, combined with droughts caused by global heating and poor land use, large tracts of southern Spain are literally turning into a desert. The Christian Science Monitor has an excellent feature article about limitations on water (“Is water becoming ‘the new oil'”). According to the article, while there is plenty of freshwater for human use, the combination of waste (watering Kentucky Blue Grass lawns in semi-arid Colorado, for example), global heating, and pollution has left water supplies stretched. Add to this the fact that, as a result of global heating, weather patterns will change enough to dry out some presently wet areas and simultaneously soak currently dry regions, the management of water will be a major challenge in the next century. And access to freshwater is expected by the UN to be a major source of conflict: In January, United Nations Secretary-General Ban Ki Moon cited a report by International Alert, a self-described peacebuilding organization based in London. The report identified 46 countries with a combined population of 2.7 billion people where contention over water has created “a high risk of violent conflict” by 2025. In the western United States, we have a saying supposedly coined by Mark Twain that, unfortunately, is coming to apply far more broadly than just in the West: “Whiskey is for drinking, water is for fighting over.” (Source: Twainquotes.com) While much of the rest of the world is looking at anthropogenic global heating (AGH) as a threat to their water supplies, crops, and even directly to life and limb, The Scotsman reports that the 56,000 residents of Greenland are actually looking forward to a warmer isle. Their reason? AGH is expected to dramatically improve the economic fortunes of the island via shipping through the Northwest Passage, offshore oil and gas extraction, and greater tourism. All this economic growth may also enable the self-governing Danish territory to declare full independence. Source: EPA If sea levels rise as much as expected this century, significant portions of southen Florida will be flooded unless the government (state, local, even federal) does something to prevent it. And if that flooding occurs, lots of presently developed land will be submerged and rendered part of the Atlantic Ocean instead of part of the state of Florida. According to a Miami Herald article, the Florida Coastal and Ocean Coalition (FCOC) is recommending, against the opinion of the state’s largest coalition of real estate developers, that coastal lands most likely to be submerged be left development-free: The group is calling on state and local government to minimize beach front development in light of the possibility that today’s beaches could be in tomorrow’s ocean. The state could target its program for buying environmentally sensitive property toward buying more beach front land, [David Godfrey, executive director for one of the group’s member organizations, the Caribbean Conservation Corp.] said. It could also offer tax incentives for developers to shun beaches for more inland areas. According to the article, more than 80% of the state’s population lives within 20 miles of the coast, and the actual report estimates that losses from the average IPCC estimate of sea level rise (about 1 meter by 2100) would cost Florida a least $327 billion in economic damages. As with all reports like this, the devil is in the details. For example, that $327 billion in losses assumes a worst-case IPCC “business-as-usual” scenario that combines the impacts of hurricane damage, reduced tourism, real estate losses, and costs of additional electricity for air conditioning. The actual loss directly attributed to sea level rise is just the real-estate losses, and that’s expected to be “only” $56 billion, or 17% of the total. Still a lot of money, but MUCH less than the total from the original Tufts University study quoted by the FCOC (and, not coincidentally, commissioned by FCOC member organization Envirionmental Defense Fund.) I applaud the FCOC for directly tackling the issue of what sea level rise will do to southern Florida. The problems are serious enough that they need to be well publicized so that the Florida state government can address them directly and in the open. But the problems are also serious enough that the FCOC shouldn’t have resorted to numerical hyperbole – the unexaggerated numbers are bad enough already, thanks. Global heating deniers have long pointed to the “fact” that satellite and radiosonde (weather balloon) data recorded little or no increase in upper troposphere warming as an example of why global heating predictions were wrong. Most climate scientists involved in trying to measure heating in that part of the atmosphere knew that their data (and thus the data quoted by the deniers) was so full of errors that making any conclusions was effectively impossible. Now, though, a new paper in Nature Geoscience and reported by TerraDaily.com has shown that the upper troposphere has actually warmed as most climate scientists expected. In the new study, climate scientists Robert Allen and Steven Sherwood of Yale University use a more accurate method to show that temperature changes in the upper troposphere since 1970 — about 0.65 degrees Centigrade per decade — are in fact clearly in sync with most climate change models. Rather than measuring temperature directly, which had yielded inconsistent results, they used wind variations as a proxy. A proxy is an indirect measurement of something else. In the case of ice cores, for example, since it’s not possible to travel back in time hundreds of thousands of years and make direct temperature measurements, scientists use the amount of deuterium (an isotope of hydrogen) in the water as a way to estimate the temperature. In this case, though, wind speed (measured by the movement rate of the radiosonde) was found to be a good proxy for temperature in the upper troposphere. Since the errors were lower by a factor of 10, the radiosonde’s speed data was used to look back to 1970 and estimate the temperature rise in the upper troposphere – 0.65 degrees Celsius, or very close to what climate models have predicted. The new study “provides … long-awaited experimental verification of model predictions,” [Peter Thorne of Britain’s Met Office Hadley Centre] wrote. Image: Ship brings water – Source: BBC 7 replies » 1. Pingback: www.buzzflash.net 2. Thanks, Denny, and for your help with some of the links. It’s always nice to have people helping me with links and topics for the Weekly Carboholic. I can’t read everything, after all. 3. Every time i water the garden, shower, or flush the toilet i say a little word of thanks for my proximity to the world’s largest body of fresh water (by surface area). Not that i don’t do my best to conserve, but i don’t feel bad about watering the grass every day when it only has a block to travel in order to make it back to its source. And there aren’t so many of us who put up with the winters for the sake of the lake. Now i don’t want anyone to die because i was hording “my” water. But i will draw a line…nobody out west or down south is getting it so long as they’re wasting what they have. Rain water collection, composting toilets, and gray water recycling damned well better come long before pipes and tanker trunks. Of course, my state allows bottling companies to sell massive quantities of water without charging them. Lots of water is already leaving Michigan in little plastic bottles; the people get nothing for it; and the state is dead broke…how about that? 4. Thank again, Brian. A shortage of oil is one thing, of water another. In effect, our children may face a sub-Saharan future? 5. I don’t know, Russ. I’ve been following the science of global heating and how it relates to water vapor (the ultimate deciding factor in precipitation), and while I keep seeing that climatologists are getting better at determining what’s likely to happen, they still don’t know for sure beyond “some areas will get wetter, others will get dryer, and it’s pretty likely that the driest regions will expand toward their respective poles”. So if you’re in the desert SW of the US or on its northern margins, expect to have an even dryer climate. But what does that mean for dry parts of Mexico? Will those trend drier, or will rainfall increase as tropical forests push north? I don’t know, and I’m not convinced yet that the experts in the field can say with relative certainty that they know either. One of the things about Spain’s water problems that impressed me was how much of it was not directly a result of a hotter climate, but rather a direct result of poor land-use decisions and ground-water depletion from irrigation and population growth. And those things will need to be addressed regardless of how much the climate heats up.
a,b, Electromagnetic simulations of a male torso (a) and a lower left arm (b). The patterns shown are the real part of the co-polarization electric field in the torso simulation model for heartbeat sensing (a) and in the wrist simulation model for pulse sensing (b). Animated simulations of these conditions are shown in Supplementary Video 1. c,d, Simulated beating amplitudes of the heart and wrist, compared with sampling at the far-field points (c) and at the antenna reflection represented by the scattering parameter S 11 (d). Normalized beating amplitudes are shown as blue solid lines. Demodulated heart signals are shown as pink dashed lines and wrist pulse signals as green dotted lines. Credit: Nature Electronics (2017). DOI: 10.1038/s41928-017-0001-0 (Tech Xplore)—A pair of researchers at Cornell University has developed a new way to monitor vital signs in patients—one that does not require direct contact with the skin. In their paper published in the journal Nature Electronics, Xiaonan Hui and Edwin Kan describe the nature of the device and how it can be used. Anyone who has spent time in a hospital knows that the means used to measure is restrictive, and in some cases (such as when the tape securing them is pulled), can even be painful. In this new effort, the researchers have come up with a way to offer healthcare providers the same information on patients without having to touch them. The new is based on RFID chip technology—the same technology used in key fobs. It works by sending a into the body and then listening to the signal that comes back (rather like sonar) and relaying what it finds to a nearby processing unit. Hui and Kan discovered that the simple technology could be used to monitor vital signs if programed in specific ways. By sending a signal into the chest, for example, and noting slight disturbances in the signal that is sent back, the device is able to monitor breathing activity. In roughly the same way, it can also monitor the heartbeat. And by placing another of the devices near the wrist, it can be used to measure blood pressure by calculating elapsed time between heartbeats. Because the device is so small, the researchers note, it could be sewn into a hospital gown or a bed sheet. In such an arrangement, each patient would be monitored by one or more of the devices without attaching anything to the body. They point out that the technology could actually be used to monitor more than one patient if need be. And they further note that because the hardware already exists, using it to monitor would be inexpensive and easy to use by hospital staff. They claim the devices are hardy, as well—they sent some through a clothes-washing machine a few times, and report that it still worked perfectly. The RFID tag prototypes. (a) An RFID sensor tag chip integrated with the embroidered antenna on fabric. (b) The PCB prototype of the harmonic RFID tag for NCS. Credit: Nature Methods (2017). DOI: 10.1038/nmeth.4498 Monitoring the heart rate, blood pressure, respiration rate and breath effort of a patient is critical to managing their care, but current approaches are limited in terms of sensing capabilities and sampling rates. The measurement process can also be uncomfortable due to the need for direct skin contact, which can disrupt the circadian rhythm and restrict the motion of the patient. Here we show that the external and internal mechanical motion of a person can be directly modulated onto multiplexed radiofrequency signals integrated with unique digital identification using near-field coherent sensing. The approach, which does not require direct skin contact, offers two possible implementations: passive and active radiofrequency identification tags. To minimize deployment and maintenance cost, passive tags can be integrated into garments at the chest and wrist areas, where the two multiplexed far-field backscattering waveforms are collected at the reader to retrieve the heart rate, blood pressure, respiration rate and breath effort. To maximize reading range and immunity to multipath interference caused by indoor occupant motion, active tags could be placed in the front pocket and in the wrist cuff to measure the antenna reflection due to near-field coherent sensing and then the vital signals sampled and transmitted entirely in digital format. Our system is capable of monitoring multiple people simultaneously and could lead to the cost-effective automation of vital sign monitoring in care facilities. Journal information: Nature Electronics , Nature Methods
This article focuses on the subject of religious education in the Finnish state schools. In the first part of this research I will present the context, the debates, the challenges related to religious education, the role and mission of the Church in terms of religion in Finland and the status of religion in a european context. Regarding religious education, Finland is a northern example, it is a different model from the other EU member states, a decisive role belongs to the parents. The Finnish model differs from other models of the Nordic countries, for example the Swedish one, but has similarities to the Austrian model. The roots of this model date back to 1920 when it was required that at the primary level the religion class be made in accordance with the majority religion of the pupils. The predominant model of religious education is in accordance with its own beliefs and at the same time it is defined as non-confessional, and teachers are not allowed to introduce religious practices during classes. In the second part of this article, I present the important steps in the history of religious education in the Finnish state schools, I highlight the legislative approaches, the contemporary legal framework, the status and the curriculum of religious education in Finland. I will also highlight the characteristics of religious education in the Finnish system, aspects related to classroom textbooks and details of the professional training of religious teachers.
An important field of application of textile in medicine has been developed such as wound care and preventing chronic wounds. Bandages and wound dressings are most commonly used because they are affordable and reusable. Medical textiles should have bio-compatibility, flexibility, and strength. Introduction about medical textile:- Textiles and textile fibers have played a vital role in the medical and health care sector. Traditional products include bandages for covering wounds, sutures for stitching together the sides of open wounds to promote healing, substrates for plaster of Paris casts, and incontinence products. However, the role played by fiber-based materials has advanced dramatically in recent years. For example, bioglass fibers are now used in tissue engineering to create new bone structures, and textile scaffolds are being used to promote cell growth and build cell structures. Textile-based stents—small cylindrical tubes made from biocompatible materials—are helping to support and keep open veins and arteries. Many are complex structures and require the use of sophisticated manufacturing technologies. Fibers are also being used in nerve regeneration techniques to repair injuries resulting from trauma or surgery. Furthermore, devices made from textile fibers can be implanted to release therapeutic drugs at controlled rates and for controlled lengths of time. Bandages have themselves evolved into advanced dressings which enable antibiotics and other drugs to be delivered directly to the parts of the body where they are needed. Some incorporate agents for stopping blood loss quickly. About the application:- Textiles materials that are used in medical applications include fibers, yarns, fabrics, and composites. Depending upon the application, the major requirements of medical textiles are absorbency, tenacity, flexibility, softness and at times biostability or biodegradability. Fibers used in the medical field may vary from natural fiber such as cotton, silk, regenerated wood fluff (absorbent layer), to, manmade fibers like polyester, polyamide, polyethylene, glass, etc. Application in the medical field:- 1.Cotton-Surgical clothing gowns, Beddings, Sheets, Pillow cover, Uniforms, Surgical hosiery 2.Viscose- Caps, Masks, Wipes 3.Polyester-Gowns, Masks, Surgical cover drapes, Blankets, Coverstock 4.Polyamide- Surgical hosiery 5.Polypropylene- Protective clothing 6.Polyethylene- Surgical covers, Drapes 7. Glass- Caps mask 8.Elastomeric- Surgical hosiery Materials being used in medical textiles:- Different materials are being used as per the different end usages like biodegradable materials are being used in sutures and absorbent textiles are being used in swabs. Most durable materials with high comfort levels are normally used in the hospital bedding. The material used in medical textiles should be non-carcinogenic, non-toxic, and non-allergenic. It is also a greater need than the material should be sterilized without any special procedure and when it is being sterilized it should not change its physical and chemical properties. It is highly recommended that the material should be of the kind, which the human body can accept. The sizes of pores and the specific amount of pores is a considerable factor, which affects the reactions of blood and tissues in the body. The application is the main thing that decides the biostability or biodegradability of the material. The production cost is entirely dependent on the application. The artificial skin and vascular grafts are costlier than swabs and surgical gowns. Every country has different production standards for medical textiles. Innovative textiles that detect blood & monitor health Researchers from the University of Michigan have come up with a new process of manufacturing a smart yarn with the ability to conduct electricity. Apparels made from this yarn will be able to detect blood and can be used in health monitoring programs. Fabrics that are manufactured currently using metallic and optical fibers will wear away quickly. Furthermore, they also tend to be uncomfortable to the wearer. The maintenance of these fabrics becomes a cumbersome process. The new process of manufacturing involves a cotton yarn with a 1.5-millimeter thickness that is being immersed in polymer ethanol solution. This enables the yarn to conduct power from a battery to illuminate the light-emitting diode device. Anti-albumin is added in the solution which will react with albumin, a protein content found in the blood. Once the fiber comes in contact with the albumin in the blood, its conductivity increases. Connected with a telecommunication device, when a soldier wearing this apparel gets wounded, and becomes unconscious, it operates the mobile phone and sends a distress message to the command post. These garments can be used in the medical field, as performance garments, and many others. E-textiles in health monitoring The potential, progress, and challenges for next-generation smart garments. Among the many benefits promised by the smart fabric, the revolution has been the “consumerization of health care.” Wearables are enabling the remote monitoring of a wide range of chronic medical conditions, from diabetes, high blood pressure, and congestive heart failure (CHF) to symptoms of the disease, discomfort, and stress. First-generation ambulatory devices such as smart wristwatches, strap-on monitors, and removable battery packs are slowly being replaced by comfortable, washable garments made of e-textiles that fall into the category of smart fabrics. With the development of new conductive textile fiber technologies, the next generation of smart garments could engender improved wearing compliance, signal accuracy, and better health care for millions of consumers. In 2017, smart fabrics in the medical and health segment had a market size of $97 million, according to IFAI research. A recent report published by the Market Research Future predicts the global medical smart textiles market will register a CAGR of approximately 9.5 percent during the forecast period 2018–2027. Despite the potential, a number of hurdles stand in the pathway between an advanced textile technology’s proof of concept and consumer level commercialization Innovative Textiles To Detect Blood- A soldier at the battlefield, a firefighter or police officer, who is wounded and unconscious, cannot request help to a command post. A patient whose health is very critical cannot inform his condition to the doctors. But the clothes they are wearing can solve this problem by detecting blood. Nanotechnology offers viable solutions for various industrial needs. Advancements in this field have the possibilities for a gamut of new applications in textiles. Researchers from the University of Michigan have come up with a new process of manufacturing a smart yarn with the ability to conduct electricity. These yarns can be effectively woven into soft fabrics and tailored into apparel. These garments will be capable to detect blood, and monitor health. Potential Applications can be used- The Fabrics made from these smart yarns have potential applications in professions that involve high risk. If A police officer is in danger, a firefighter who is hurt while at work, a wounded soldier at the war front may not be in a position to send a message requesting for help. But the apparels infused with smart yarns would be able to do it. The clothes can be designed accordingly; to store energy, which will provide the power to operate small electronic devices. A mobile phone or any other form of communication device attached to the clothing can transmit the information from the garment to a command post. It can also be used in garments and used for monitoring health. It also foresees lucrative applications as performance apparel. The concept of electrically sensitive clothing made from nanotube infused cotton yarn can be adapted in various fields based on their exposure to potential risks. The burgeoning interest in nanotechnology opens a floodgate of opportunities for developing new and innovative products in the textile sector. This material and textiles can be used to detect or check the blood since COVID -19 cases are increasing at a higher rate. The Blood clots in severe Covid-19 patients which leave clinicians with clueless about the illness — but no proven treatments. Physicians from the U.S., the Netherlands, and China have published a number of case reports in scientific journals about Covid-19 patients with a multitude of small blood clots. In one report, researchers in China said 7 out of 10 patients who died of Covid-19 had small blood clots throughout the bloodstream, compared to fewer than 1 in 100 people who survived. It’s not necessarily the virus killing people, it’s the organ failure that happens as a result of the viral infection. Using the same material and fabric, we can know about the blood clots of the patients which would help the doctors to save their lives. Textiles are more and more developing into interdisciplinary high-tech products with interesting changes in the market. Medical Textile Competence Centers are being established to make the most of knowledge, expertise, and existing collaboration with medical researchers, microbiologists, physiologists, and textile scientists. Each country has its own regulations and standards for medical textiles. As medical procedures continue to develop, the demand for textile materials is bound to grow.
It has been a rather unusual year this far. Words and phrases we had never heard before – lockdown, pandemic, social distancing, super spreader have become commonplace. As the global death toll resulting from COVID-19 approaches half a million and shows no sign of pausing, it is a time of grave concern. There is no medically preventive measure such as a vaccine—the only tools in the box that we can use are social distancing and a face mask. Hand washing and sanitizers also help us fight back against the invisible enemy. Hemp Cloth Face Masks To the Rescue Hemp has been around for centuries. It is a remarkably versatile fiber that has been used to manufacture cordage and fabric that is long-lasting and environmentally friendly. Unfortunately, the plant from which we derive hemp clothing, Cannabis Sativa, has become somewhat infamous over the past half-century due to its association with cannabis. What is not known is that there are two varieties of the same species and the Cannabis Sativa plant that produces hemp cloth contains a minute fraction of the mind-altering chemicals that its notorious sibling has. Hemp cloth is ideal for manufacturing face masks and preventing the pandemic from getting out of hand. But at times it has to take a backseat to cotton that is marketed better. Thankfully the situation is changing, and everyone is becoming aware of the enormous benefits of using hemp cloth face masks. Role of Hemp Face Masks in Preventing COVID-19 What is the COVID-19 pathogen? It is a virus, the simplest form of life. There are many forms of coronavirus, and we get infected by them often. It passes off with a bout of fever and headache – something we know as viral fever. The new species of coronavirus is a deadly one. Not only does it spread fast, but it also causes fatalities. COVID-19 spreads through sputum and mucus secreted by our respiratory system. That is why a sneeze is deadly since it can carry the virus across fifteen feet, followed by a cough which can send it six feet. Even the simple act of conversing or breathing heavily can cause coronavirus to be shed by an infected person. To protect against this, you need to be at least five feet away, preferably more and use a face mask made of hemp. The hemp mask has two functions – • It prevents you from infecting others. One of the biggest problems with such infections is that up to three-fourths of the infected do not show any symptoms or at most very mild ones. Someone who looks healthy, has no cough or fever might infect others since they are asymptomatic. Should you not prevent yourself from infecting others and protecting our future? This is as much an effort at individual level as collectively. • The second role of a mask is that it prevents you from getting infected. The virus can enter your body through the mouth, nose and eyes. The mask effectively seals off the first two when you are away from the safety of your home. It is lifesaving and unknown to you has probably prevented you from becoming ill several times in the past few months. Why are hemp masks superior? Hemp vs Synthetic The cheapest masks are made of synthetic material. They are almost always powder blue in color and easily identifiable as something you have seen at a hospital. This type of mask was not meant to be used in a pandemic at all but by a surgeon while operating. That is why they are not reusable and thrown away after the surgery is over. However, just imagine the strain on the ecosystem when billions of people begin to use and throw them away after a day. Since they are really cheap, they are appealing. Also, they look sterile and therefore, there is a psychological comfort in wearing them. After all, doctors wear them so they must be effective. There is, however, a flaw in the theory since no medical professional uses it outdoors, but in a cool and dehumidified surgical ward instead. Being synthetic, they do not at all absorb sweat and cause itching all over the face after a couple of days use. Besides, they are also extremely uncomfortable to wear in a subtropical country. Hemp vs Cotton Hemp wins this one hands down. The hemp plant contains an oil known as CBD that is antiseptic in nature. The CBD content is certainly not high enough for altering mood but just enough to offer you better protection against invisible threats as compared to cotton. The presence of a variety of plant chemicals and alkaloids in hemp cloth makes it the ideal material to make a face mask. Imagine having a barrier to entry over your mouth and nose that kills germs naturally. Is that not a fantastic ally to have in this deadly battle? Sweat absorbent Hemp has a unique molecular structure. Due to this reason, it can hold 50% of its own weight in water. It goes without saying that a warm and humid summer causes copious amounts of sweat. If the sweat accumulates, one gets rashes and itchy skin that needs medication. If there is one thing you have to avoid if possible, it is medicating yourself and making your immune system weak. Hemp successfully wicks off all the sweat pouring out of you and lets your skin breathe and be healthy without any effort at all. Can you imagine how many billions of masks are in use now? At three billion humans live in urban areas, and they have got one on. Most probably they buy a new one every few days. That is tens of billions of used masks that are making their way to landfill sites. Remember that we have found evidence of cotton in Harappa civilization dating back to 3500 BC. Processed cotton can last decades without degrading. Hemp quickly changes into compost, and this makes it an ideal material to use when our planet is already under so much strain. None of us wants to see huge sites filled sky high with soiled cotton masks after all this is over in a year or two, hopefully. Hemp is remarkably strong. That is why ropes are made of hemp and not cotton. Sailors have trusted hemp with their lives for millennia. You need a mask that you are sure would last you all day and not tear apart suddenly.  If you are looking for a face covering made of robust material, look no further than hemp. While hemp is durable, it is not at all rough. Modern technology has ensured that hemp is soft and feels gentle against your skin. Key Note You must never underestimate your role in this pandemic. If each of us acts carefully, we stop this contagion dead in its tracks. What better way to do it than with a hemp cloth face mask. Younot only stay safe and healthy but wear protective gear that uses as little resources as possible. Hemp uses half the amount of water needed for making cotton masks. Hemp cultivation yields more per hectare but uses minimal pesticides. Keep your face free from polyester yarns and harmful dyes and wear colorful hemp cloth face masks to look cool while fending off life-threatening infection. Author Bio: Vishal Vivek is the CEO and Co-Founder at Hemp Foundation. Hemp Foundation’s mission is to fight Global warming, plastic pollution, deforestation, wild species extinction through promotion of Hemp in fashion industry and at the same time provide jobs to marginalized communities of artisans and farmers in rural Himalayan villages and give them global reach.
Skip to Content How Snakes Mate – That Is How it Works! How Snakes Mate – That Is How it Works! Snakes mate in the spring after hibernation. If the snakes are being bred, they mate about a week or two after being brought out of the brumation. Then, as a breeder, I introduced the two. If they take a liking to each other right away, I leave them in the same enclosure and let them be. How Do Snakes Mate? Female snakes use pheromones after waking up from brumation to attract male snakes. Once the male finds the female after following her scent, he intertwines his body with hers and enters one of his hemipenes into her cloaca. The two snakes may stay intertwined for up to 24 hours. How Mating Works The mating process starts with the male serpent his hemipenes into the female’s cloaca. Females have unfertilized eggs in an organ known as the oviduct. The female also has two pockets to hold the male’s sperm. She decides when the eggs get fertilized. She will lay the eggs roughly four weeks after they are fertilized. The female snake then lays an egg clutch that consists of two to eight eggs. The eggs have a fluid-type coating over them that’s produced once the eggs are fertilized. It acts like somewhat of a protective covering. The eggs will hatch in about eight weeks and the little baby snakes will emerge. Most snake species are on their own after the female serpent lays her eggs. Unlike a lot of baby animals that are left to fend for themselves, the baby snakes seem to do alright. All the instincts these snakes need to survive are already with them the day they’re born. A female’s cloaca is very shallow (short) in comparison to a male’s cloaca. It must be longer to hold his two hemipenes. So, the male’s cloaca extends much farther down the tail than the female’s. The length of the cloaca is how breeders tell the male and female snakes apart and make sure they have one of each. When Snakes Mate Snakes in tropical climates where the temperature doesn’t drop below 60 degrees Fahrenheit can mate any time of the year because they do not have to go into hibernation. Snakes in colder climates where the temperatures do dip below 60 degrees Fahrenheit for an extended period are in the spring when the temperatures are continuously above 60 degrees. Vomeronasal System The male snake uses a sort of sixth sense, called the vomeronasal system. It helps with the identification of the pheromones. Each female releases a different smelling pheromone. The male snake can tell if the pheromones are coming from a female of the same species, her size, age, reproductive sexual maturity, and condition. This allows the male to consider her as a mating partner. Once the male finds that specific female, he pushes his chin starting near the rear of a female snake, all the way up her body to her head. He does this to make sure it is a female and if it is a female, the pheromones come from. If the pheromones did not come from that female, and she is willing to mate, he would mate with her and then continue to seek the female he was searching for. Both male and female snakes can mate several times. Many times, a female will choose the sperm from several different snakes to fertilize the eggs so she may lay a clutch of eggs from several different males. Male’s Hemipenes The male snake’s hemipenes must be stored inside his body in the cloaca to protect them. If they were on the outside of the body like many reptiles and animal’s sexual organs, they would be severely damaged. As the snake slithers along the ground, they will be subjected to anything in his path including sticks, rocks, prickers from bushes, and anything else, and not only would this destroy them, it would be extremely painful for the snake. So, nature got it right when tucking them inside and making them retractable. How Long Snakes Mate: The Answer Unfortunately, snakes don’t mate for life. However, some snakes (very few actually) will stick around and provide protection for the female and the eggs (if they are laid not live babies). There is always an exception, though it is rare in this case. Some male snakes will produce a mating plug after the mating process that blocks the female’s cloaca, so other males cannot mate with the female. The plug is forced out when the snake releases the eggs or gives birth to live baby snakes. Generally, both the male and female will leave the baby snakes once they hatch or are born if they stick around that long. Baby snakes know how to take care of themselves when they’re born. Breeding and Mating As a breeder, I breed the two same snakes especially when I know that the baby snakes are healthy. Mating snakes should not be disturbed. It can cause harm to one or the other or even both snakes. Some snakes do become aggressive when mating is interrupted, so it is best to just let the snake’s mate and leave them alone. Frequently Asked Questions about How Snakes Mate Do female snakes lay their eggs through their mouth? This is a myth. Female snakes do not lay eggs through their mouth. The eggs come from her cloaca, the same cavity in her body that waste is eliminated through. Snakes only have two openings, the mouth, and the cloaca. How long can a female snake hold on to sperm before fertilizing her eggs? They can store the sperm for up to five years and still have healthy viable baby snakes. Snakes truly are amazing reptiles. Not only are they intelligent, but they are also born with the instincts they need to survive alone. Snakes and the reproduction cycle seem rather simple, but it is more complex than most people realize – a female that can hold sperm and fertilize eggs five years later is an amazing animal. How Snakes Swim How Do Snakes Swim? All You Need to Know is Here! Do Isopods Bite Do Isopods Bite? Ooh!
Why Bending Machine called Press Brake and Different Dies Usage Views:275     Author:Durmapress     Publish Time: 2020-06-05      Origin:Durmapress Inquire Why Bending Machine called Press Brake and Different Dies Usage Press brake Folding Machine From T-stakes to Cornice Brakes A press brake is a machine pressing tool for bending sheet and plate material, most commonly sheet metal.It forms predetermined bends by clamping the workpiece between a matching punch and die.[2] Brake, Broke, Broken, Breaking As verbs, broke, brake, broke, and breaking all come from archaic terms predating the year 900, and they all share the same origin or root. In Old English it was brecan; in Middle English it was breken; in Dutch it was broken; in German it was brechen; and in Gothic terms it was brikan. In French, brac or bras meant a lever, a handle, or arm, and this influenced how the term “brake” evolved into its current form. Who Put the ‘Presse’ in Press Brake? To Bend, to Brake press brake bending After know the name origins , Let us go to know how to use and how to choose The CNC Press Brake . Bending process A high-tonnage hydraulic press brake A high-tonnage hydraulic press brake Additional parameters include the stroke length, the distance between the frame uprights or side housings, distance to the back gauge, and work height. The upper beam usually operates at a speed ranging from 1 to 15 mm/s.[3] There are several types of brakes as described by the means of applying force: mechanical, pneumatic, hydraulic, and servo-electric. Hydraulic presses operate by means of two synchronized hydraulic cylinders on the C-frames moving the upper beam.Servo-electric brakes use a servo-motor to drive a ballscrew or belt drive to exert tonnage on the ram. Pneumatic presses utilize air pressure to develop tonnage on the ram. Until the 1950s, mechanical brakes dominated the world market. The advent of better hydraulics and computer controls have led to hydraulic machines being the most popular. Pneumatic and servo-electric machines are typically used in lower tonnage applications. Hydraulic brakes produce accurate high quality products, are reliable, use little energy and are safer because, unlike flywheel-driven presses, the motion of the ram can be easily stopped at any time in response to a safety device, e.g. a light curtain or other presence sensing device. Recent improvements are mainly in the control and a device called a backgauge. A back gauge is a device that can be used to accurately position a piece of metal so that the brake puts the bend in the correct place. Furthermore, the back gauge can be programmed to move between bends to repeatedly make complex parts. Early brakes relied on the tooling to determine the bend angle of the bend. The animation to the right shows the operation of the back gauge, setting the distance from the edge of the material or previous bend to the center of the die. Press brakes often include multi-axis computer-controlled back gauges. Optical sensors allow operators to make adjustments during the bending process. These sensors send real-time data about the bending angle in the bend cycle to machine controls that adjust process parameters.[3] Press brakes can be used for many different forming jobs with the right die design.  Types of dies include: V-dies—the most common type of die. The bottom dies can be made with different-sized die openings to handle a variety of materials and bend angles. Rotary bending dies—a cylindrical shape with an 88-degree V-notch cut along its axis is seated in the "saddle" of the punch. The die is an anvil over which the rocker bends the sheet. 90 degree dies—largely used for bottoming operations. The die opening dimension depends on material thickness. Acute angle (air-bending) dies—used in air bending, these can actually be used to produce acute, 90 degree, and obtuse angles by varying how deeply the punch enters the die by adjusting the ram. Acute angle (air-bending) dies Press Brake Gooseneck (return-flanging) dies—The punch is designed to allow for clearance of already formed flanges press brake Gooseneck dies Offset dies—a combination punch and die set that bends two angles in one stroke to produce a Z shape. Hemming dies—two-stage dies combining an acute angle die with a flattening tool. Seaming dies—There are a number of ways to build dies to produce seams in sheets and tubes. Radius dies—A radiussed bend can be produced by a rounded punch. The bottom die may be a V-die or may include a spring pad or rubber pad to form the bottom of the die. Beading dies—A bead or a "stopped rib" may be a feature that stiffens the resulting part. The punch has a rounded head with flat shoulders on each side of the bead. The bottom die is the inverse of the punch. Curling dies—The die forms a curled or coiled edge on the sheet. Tube- and pipe-forming dies—a first operation bends the edges of the sheet to make the piece roll up. Then a die similar to a curling die causes the tube to be formed. Larger tubes are formed over a mandrel. Four-way die blocks—A single die block may have a V machined into each of four sides for ease of changeover of small jobs. Channel-forming dies—A punch can be pressed into a die to form two angles at the bottom of the sheet, forming an angular channel. U-bend dies—Similar to channel forming, but with a rounded bottom. Spring back may be a problem and a means may need to be provided for countering it. Box-forming dies—While a box may be formed by simple angle bends on each side, the different side lengths of a rectangular box must be accommodated by building the punch in sections. The punch also needs to be high enough to accommodate the height of the resulting box's sides. Corrugating dies—Such dies have a wavy surface and may involve spring-loaded punch elements. Multiple-bend dies—A die set may be built in the shape of the desired profile and form several bends on a single stroke of the press. Rocker-type dies—A rocker insert in the punch may allow for some side-to-side motion, in addition to the up-and-down motion of the press.  0086 555 8327689  +86 18325572889
What You Need to Know About Measles The headlines can be pretty scary: Measles is now a public health crisis in many urban and rural communities across the US. Families everywhere need to know the current situation about measles nationwide and how they can protect their children from the disease. During 2019, Centers for Disease Control (CDC) estimate that over 839 cases of measles have been reported as the number continues to climb across the country. New York City and Rockland County in NY are the most impacted communities and have reported the outbreaks of the disease. However, the disease continues to spread as 23 states reported at least one case of measles. So what happened? How did measles spread so quickly and how can you make sure your family is safe from the disease? How, and why, are Measles spreading so quickly in the US? Major public health organizations including the CDC, World Health Organization (WHO), and state-level health departments explained that measles have spread for three major reasons: 1. Lower rates of vaccinations nationally – Less and less parents are vaccinating their children in general. In 2000, measles was virtually eradicated because vaccination rates were at their highest in U.S history. Declining rates have allowed measles to steadily comeback into the public eye 2. Anti-vaxxers and anti-vaccination messaging – The WHO recently declared anti-vaxxers and anti-vaccination messaging as one of the top 10 global health threats currently. The spread of misinformation about vaccines, the link between vaccines and autism, and other myths have contributed in part to lower vaccination rates. 3. Spread of the disease through increased international travel – The growing number of international travelers has increased over the past couple of years, which has allowed measles to come in from other countries into the U.S. For the most part, measles has spread because less people are choosing to vaccinate their children as the disease grows to spread more rapidly. The combination of all three factors mentioned above have led to the current outbreak. How can you protect your family from measles? When you should get them vaccinated? The best way to protect your young children from getting the measles is to get their MMR (measles, mumps, rubella) vaccine ASAP. Most doctors recommend getting an updated measles vaccine for your children twice in their life, based on general vaccination guidelines. Children usually get their MMR vaccine between the ages of 12 to 15 months and a second shot between the ages of 4 to 6 years old. However, your medical provider may recommend the vaccination at specific ages for your children. If you think your child needs an updated vaccination make sure to first review their vaccine history with a trusted medical professional. Parents that want to get their children vaccines ASAP should visit an urgent care center or local walk-in clinic for fast and affordable vaccines!
TraceRoute tool With the growing needs of enterprise networks, organizations are finding it increasingly difficult to monitor and manage their network infrastructure. Network admins are turning to additional tools and resources that could make their jobs a little easier, particularly in regards to troubleshooting. Currently, network admins largely use simple, freely available utilities like ping tools, Syslog forwarders, and ipconfig to assist their monitoring and troubleshooting efforts. One of the most crucial tools being used in network troubleshooting is traceroute, and it is widely used to check connectivity and continuity issues within your network. What is the purpose of a network traceroute tool? In the simplest sense, traceroute is a tool that is used to check the continuity of a network connection from a source to a destination device. It sends a specific amount of data to your end device and checks if the data transmission occurs without any issues too and from the device. Traceroute can be used for the following purposes: • To ensure proper connectivity between devices by tracing each step along the transmission path • To identify latency or packet loss issues along the path • To locate faulty configurations that create network loops, resulting in total packet loss • To accurately identify the source of response delays How does traceroute work? Traceroute is a very simple network operation, but it provides a lot of valuable troubleshooting data for admins. When you run a traceroute, these are the technical actions that are carried out: • Once a destination IP/DNS is provided and the command is executed, the device identifies the shortest path to the destination and sends four packets of data to the nearest device on the path. This is performed using IPMI protocol. • The nearest device successfully receives the traceroute request and sends back the four packets. Now the IP of that device is recorded, along with the number of hops to reach that device (one in this case) and the response time. • The same process is repeated for all devices along the path, with the number of hops progressively increasing as the packets move towards the destination. For each step, all the metrics mentioned above are recorded. • To ensure that the data is as accurate as possible, each packet is sent to every device a total of three times, and for each attempt, the average response time for the four packets is displayed in the results. • Once the packets reach the final step, the destination device sends the packets back to the source one last time. Now the device's IP, the number of hops, and the response times are aggregated and displayed in a table, starting from the closest device and ending with the destination device. • If any packet loss issues were detected on the path, some or all of the corresponding response time values would be displayed as empty. Similarly, if there were latency issues for a device on the path, the response times for that device would be significantly high, which will help you identify the faulty device. How is the TraceRoute tool useful for troubleshooting network issues? Assume that you are a member of a network administration team for a large enterprise. A few employees working from a remote location have a server on the premises of the organization with critical application data, and this server has been responding very slowly for the past 30 minutes or so, resulting in a poor user experience. This has been reported as critical, and you have been asked to troubleshoot this issue. In this case, you can initially run a traceroute to the server from the premises in order to identify local connectivity issues. If no issues show up, you can then try again from an end user's device to find where the response is getting slowed down or lost. By tracing every step along the path, the TraceRoute tool will give you detailed data that will enable you to accurately identify which part of the network is causing the issue. For example, by looking at the individual response times for each hop, the admin can determine which part or device in the network has the highest response times and initiate the troubleshooting actions from that point. Integrated TraceRoute capabilities with OpManager With OpManager, our integrated network monitoring solution, you need not look far to make use of traceroute in your troubleshooting processes. The TraceRoute software is integrated into the product by default, and it can be accessed from the Device Snapshot page of any device that has been discovered in OpManager. With this highly useful utility built right into the framework of the product, your troubleshooting tasks become much easier and more efficient. Simply click the TraceRoute button on the Device Snapshot page, and OpManager will run a thorough traceroute action from the server where the product is installed to the end device and display the critical metrics mentioned above. The response times from the server to the destination device will be displayed for every device along the path, along with the number of hops. This will help you get a quick idea of the underlying network issues between your end device and OpManager, as well as where the response times are the highest, thereby helping you identify performance bottlenecks and underperforming devices. Download a free, 30-day, fully-functional trial of ManageEngine OpManager to try this integrated TraceRoute solution as part of our comprehensive network monitoring software. FAQs - Traceroute systems What is traceroute tool? What is the purpose of traceroute tools? Why is a traceroute tool important? Video Zone OpManager Customer Videos Altaleb Alshenqiti - Ministry of National Guard - Health Affairs •  IT Admin from "Royal flying doctor service", Australia  Jonathan ManageEngine Customer •  Michael - Network & Tech, ManageEngine Customer  Altaleb Alshenqiti - Ministry of National Guard - Health Affairs •  David Tremont, Associate Directory of Infrastructure,USA  Todd Haverstock Administrative Director •  Donald Stewart, IT Manager from Crest Industries  John Rosser, MIS Manager - Yale Chase Equipment & Services  Pricing  Get Quote
1. Utility Patent vs. Design Patent 2. What Is a Utility Patent? 3. Advantages of Utility Patent Application 4. Disadvantages of Utility Patent Application 5. What Is a Design Patent? 6. What's the Disadvantage to a Design Patent? 7. What Is an Example of a Design Patent? 8. Are There Any Other Kinds of Patents? 9. How Do You Get a Utility Patent or a Design Patent? 10. Which Patent Is Harder to Get? 11. What Are the Patent Rules and Procedures? 12. What Happens When Someone Infringes on a Design Patent? 13. When to File Both a Design Patent Application and a Utility Patent Application 14. A Brief Warning to Inventors and the Unaware A utility patent vs. a design patent may have inventors wondering which one is best for their invention. Utility patents and design patents differ because utility patents cover unique ideas or inventions, but design patents are for new designs of existing products. Utility Patent vs. Design Patent The difference between a utility patent and a design patent is that: • The utility patent is a trademark protection that makes sure a person has full control over his or her invention. • A design patent is used when you create a new design for an existing product. What Is a Utility Patent? The utility patent is a trademark protection that makes sure a person has full control over his or her invention. More than 90 percent of all patents issued each year are utility patents. You receive a utility patent when you invent a: • New process • Machine • Manufacturing system. A utility patent lists an invention's elements and declares how much it covers for the invention. A utility patent is more valuable than a design patent because the utility is the hardest part to create. Think of the utility patent like a toaster. Many kinds of toasters exist, but they all make toast. George Schneider filed for the first American patent for an electric toaster. He came up with the toaster's function, so he got the utility patent. The person who holds a utility patent has much power. When Schneider had the toaster patent, he had approval over all other toasters. Any changes to his utility patent's toaster design had to go through him. He decided who made, used, or sold the toaster. That power existed as long as the patent was active. A utility patent guarantees the inventor has control of the product. The government has granted more than 7.5 million utility patents. Many of them have long since expired, though. If you're lucky enough to get a utility patent, you'll pay $515 to file your claim and $720 for the patent itself. The American government lists utility patents in five categories: • Composition of matter • Improvement of an existing idea • Machine • Manufacture • Process. Many inventions fall into multiple categories. For example, a new iPhone app is both a machine and a process. Even if a product falls under all five categories, the government will grant a utility patent in only one. Advantages of Utility Patent Application Utility patent applications tend to be costlier than design patent applications. However, the utility patent will often protect the invention more than the design patent. The utility patent keeps the composition, function, or structure of the invention protected. This patent can also protect a step-by-step method, which covers things such as: • Methods of manufacturing chemicals or software • A physical device • A composition of matter, such as chemical or biological. There are several other advantages to a utility patent. While they protect the basic functional aspects of the invention, they also provide broader protection for the patent. This makes it harder for a competing product to get away with patent infringement. A utility patent can also protect a variety of versions of the product with just one patent. Disadvantages of Utility Patent Application Utility patents are often more difficult and expensive to get than a design patent. You should plan on the Patent Office rejecting your utility patent application initially. Moreover, you should also plan on responding to a minimum of one rejection before your application actually is allowed. There are some downsides to having a utility patent. Not only is it more expensive, but it also takes a while to get patent protection, to the tune of two to three years. It also doesn't cover any ornamental features of the invention. What Is a Design Patent? You receive a design patent when you create a new design for an existing product. Anyone can get a design patent. They're different and easier to get than utility patents because they don't (and can't) have a function. Design patents are also cheaper than utility patents. A design patent costs only $220 to file, without added expenses. The standard patent fee is $410. Design patents are important when a product's appearance plays a key factor in its success. Design patents only cover what's in the drawing. Anything shown gains protection once the government grants the patent claim. The only catch is that the design can't be obvious. Design patents require some creativity. You can apply for a design patent any time you change a product's look or style without changing its utility. If the Walt Disney Company wanted to make a Mickey Mouse toaster, they could get a design patent for this product. They're creating a unique yet repeatable design. They couldn't get a utility patent because their product still toasts bread like any other toaster. A typeface inventor named George Bruce earned the first design patent in 1842. The government has awarded only 600,000 design patents since then. Historically, people haven't seen as much value in design patents. Now, due to recent law changes, companies have much more control over their products' appearance, increasing the value of design patents. What's the Disadvantage to a Design Patent? Because design patents are easy to get, you might think they're better than utility patents. This is false. You'll have a harder time getting a licensing agreement with a design patent than with a utility patent. For example, with a design patent, you only have the rights to your specific design. The Mickey Mouse toaster's design patent only applies to the Mickey Mouse design. If you have the utility patent for the toaster, you can license it to Sanrio for Hello Kitty, Disney for Mickey Mouse, HBO for "Game of Thrones," and so forth. The utility patent offers more profit potential. For this reason, you should have a patent attorney research existing patents. Don't invest in product development until you do. If someone already owns the utility patent you want, you'll have to get his or her approval before selling your product. Business attorneys in the marketplace will offer good advice about potential pitfalls. They'll also suggest ways to change or improve your proposal. Their advice will help you earn a utility patent instead of a design patent. What Is an Example of a Design Patent? An example of a popular design patent is the design of the iPhone, which Apple made to stand out as their own through a phone with rounded corners and a rectangular screen surrounded with a bezel. The key to the overall appearance is the device's proportions and shape. Samsung and Apple got into an argument about this phone, but it wasn't related to the smartphone's function. They were debating whether the Samsung phone looked similar to the iPhone, not about the graphics interface that allowed remote communication. Getting licensing deals for inventions is more complex with a design patent compared to a utility patent. This is why it's smart to have a patent attorney review and research patents that are similar before you spent money on developing a new product. This is particularly true if your main goal is to license your invention. Are There Any Other Kinds of Patents? Five percent of all patent applications (more than 30,000 per year) are design patents. The third kind of patent, the plant patent, also exists. It's much less popular, though. Only 0.1 percent of annual patent applications are plant patents. A plant patent is only for botanists who can show they've created a new variety of plant. To earn this patent, the applicant must prove the plant is capable of asexual reproduction. Also, its reproductive process must be the same each time, leading to the same plant output. Yes, a plant patent is oddly specific. That's for good reason, though. People buy plants to decorate homes, yards, and buildings. People who gain plant patents stand to earn ample money. How Do You Get a Utility Patent or a Design Patent? Applying for a utility patent requires more work than applying for a design patent. This includes: • Proving the invention's unique function. • Including claim words, with which the inventor describes what the item does. It's the claim words that matter for the utility patent. Note that utility and design patents protect the same product. Yes, rules do exist to stop double-patenting. However, because utility and design patents are so different, this is not usually an issue. An inventor could also attempt to gain a copyright and trademark for his or her product. Some products might need multiple design patents. Each would cover a specific physical feature of the proposed product. Cars, for instance, require many design patents. Design patents might cost as much as 90 percent less than utility patents. The primary cost with utility patents is in preparing the drawings. Drawings determine the design patent claim's outcome. Because these designs are specific, the U.S. Patent and Trademark Office (USPTO) will have fewer questions or issues with the claim. That means lower attorney fees and fewer fees from the USPTO itself. You also don't have to pay maintenance fees on a design patent, which is a huge savings over utility patents. Which Patent Is Harder to Get? For a design patent, all you need to prove is that you've made a unique design. Showing that you've added a new element to an existing product is easy. Earning a utility patent requires more detailed information. Proving you've built something new is difficult, as it should be. You must show that the invention works. You must also prove that it is: • Useful • Practical • Has value to others. Think about the toaster. Any new toaster is better than earlier generations of toasters. New ones have timers and toasting levels. The toaster's basic function is still the same, though — it toasts. Anyone can get a new design patent for a toaster. A red, rectangular toaster and a curved, white toaster are each unique models worthy of design patents but not utility patents. To earn a utility patent, you would have to invent a new way of making toast. While a utility patent is harder to get, it offers better coverage. The utility patent has stronger protections built into the patent system. The patent covers more than just the drawings. A design patent's protection only covers the picture, which becomes the prior art. The coverage is much more limited in scope. What Are the Patent Rules and Procedures? To get a utility patent, you must fill out a "provisional" application. • The provisional application is a temporary patent request. • The paperwork gives you one year to file your official application. • Design patents don't have this system. You file when you're ready because there's less risk of competition. Utility patents' cost is a limiting issue. They're getting more expensive, and fewer applications earn patents. During the 1990s, the government awarded more than 70 percent of applicants with utility patents. Today, only 44 percent get utility patents. Utility patents and design patents have different term lengths and approval periods. • Utility patents last 20 years from the first American application. A patent lasts 17 years from its approval date. Extensions beyond 20 years are possible but rare. • Design patents filed before Dec. 15, 2013 last 14 years from their issuing. Any design patent issued after that time has a 15-year claim. • The USPTO takes, on average, two years to confirm a design patent. • Utility patents generally take more than three years for approval. The USPTO has to check them very carefully. With design patents, the organization runs a prior-art search. As long as nothing shows up, the design has a good chance of earning a patent. Once you've filed for a design patent, you can list it as patent pending. You can identify it as patented once the USPTO confirms. The patent number indicates what kind of patent it is. A design patent starts with the letter D, while utility patents have numbers and no letters. After you've received a design patent, it will remain in force. You don't need to take any additional action. On the other hand, for a utility patent, you must pay three fees to the U.S. Patent and Trademark Office to maintain it. These payments fall at the four-year, eight-year, and 12-year mark after the utility patent's issue date. If you do not pay these fees, your utility patent will lapse. When a patent expires, the invention enters the public domain. At this point, the inventor loses all rights and powers. This usually happens at the end of the patent duration. It can also happen if the person filing the claim fails to pay his or her fee. You can file for both utility and design patent claims in other countries. You'll have six months after the American filing to extend the claim elsewhere. Some countries don't have patent claims, though. Your attorney can guide you through this process. What Happens When Someone Infringes on a Design Patent? If a regular person, who knows what an item should look like, believes another product is the same as the one with the design patent, that is infringement. The court considers a regular person to be someone who encounters a product for the first time. If they're fooled by a too-similar product, it's infringement. This regular person test applies to the full design patent even if only minor differences exist between two products. When deciding its verdict, the court doesn't need the regular person to view the products beside each other. The only comparison is how the products look during usage. There are two tests to prove infringement: 1. Check the pictures in the design patent. If the new product's features aren't in the prior art, it's usually not infringement. If they are, a second test applies. 2. This test compares the similarities and differences between the patented product and the new one. If they're too similar, it's infringement. When claiming infringement, an inventor can also claim rights to any change that's not hard to make. The courts call these additions "equivalents." They protect a patented product beyond the prior art's scope. A 2008 court ruling extended the patent protection, making design patent infringement claims easier to win. Today, the responsibility is on the person charged with stealing a design to prove he or she didn't. Choosing between a utility patent and a design patent isn't difficult. In most instances, inventors will try to earn a utility patent. It's the most rewarding option if making money is the goal. You'll also have the power to decide your invention's fate, choosing who uses and sells it. In recent years, design patents have soared in popularity because legal rulings have increased their value. Furthermore, they're cheap and easy to get. Sometimes an invention can get protection from both a design patent and a utility patent. If the invention has a function or structure that's unique, along with an ornamental design that's unique, you should think about filing both a design patent application and a utility patent application. It can be hard to file both, and you should speak with an attorney first to make sure you follow all the rules and procedures correctly. Both applications will give you a status of patent pending while they're being processed at the Patent Office. A design patent might not have a huge competitive advantage if customers will be happy with a competitor's product, which has an appearance that is different from yours. Design patents may be helpful for products where the appearance is essential to the customer by helping them make their purchase. When deciding whether to get a utility patent or a design patent, it's essential to decide what's more important. Do you want to stop potential competitors from imitating your product's visual appearance with design patent protection, or would you rather stop them from copying your functional features with a utility patent protection? If you want to stop competitors from copying both the functional features and visual appearance, you may want to file both a utility patent application and design patent application for your product. A Brief Warning to Inventors and the Unaware There are many institutions out there that claim they can help inventors get the patents they need. Sometimes, they'll say they can guarantee your patent being issued. A popular way of doing this is by filing a design patent for each invention that comes their way, which is a disadvantage to inventors. If they pick the incorrect type of application to file, all the valuable and important parts of the invention get donated to the public domain and the inventor loses all his or her ideas. This is only an idea to get money and nothing else.
Writing Classification Essay The goal of a classification essay is to organize and sort data into certain categories. It requires the author to have and utilize the skills of logical thinking, analysis, categorization, and structuration. In order to make a good classification, one should follow three easy rules: • Arrange data into certain number of useful categories • See that your categorization follows one organizing principle • Provide some quality examples for each category Knowing these three basic steps, you can start writing an essay. If you’re an organized person, it will be easy for you to write it because you understand the principle. Let’s cite an example. Your father has a closet full of building tools, but he hasn’t done any cleaning there for 5 years. Imagine the mess! You decide to help him. What do you do? You unload all the shelves on the floor. Now you have a complete mess. But then you start to categorize them. First screwdriver, second screwdriver, third screwdriver…big hammer, little hammer, huge hammer…you may even wonder why your father has so many screwdrivers, hammers, and all that stuff? But asking questions is not your job. Your job is to turn this mess into order. So in the end, you have everything categorized, and you see your happy father exhaling with alleviation. That’s categorization! Now apply the same principle to data and words. Know your sources (1) – know your categories (2) – sort the data (3). When working with categories, don’t go to extremes. That means that you shouldn’t miss out important categories, and, on the other hand, you shouldn’t include too many categories. In the first case categorization makes little sense because some important data is left out, in the second case categorization makes little sense because it will be impossible to remember and recollect it. Follow one organizing principle. It’s how you sort the groups or classes of data. For instance, when your organizing principle is “tourist-oriented” water sports, you shouldn’t apply another organizing principle, like “native water sports”, which would include a whole lot of different categories. Be consistent. Provide quality examples for each category. Some categories might require more examples than the other, which means that you don’t have to try to give the equal quantity of examples for each category. As a rule, the most important or the most difficult category requires more examples. Before writing a classification essay, don’t forget to compose an essay outline. An essay outline helps the author to put the data of the research into a certain order, which is very helpful in terms of writing a structured work. Basically, an essay outline is the framework of your essay. Another cool thing about classification essays is that they can work the other way around, in case you’re a disorganized person. This means that if you get skillful at writing, you can easily help your father to clean-up the mess in his old closet.
How to Write Better Beginner Tutorials Every day people search the internet on how to do something, and there are many tutorials to answer their questions. Due to some issues with the tutorial itself, they may not always find the actual answers they need. Maybe they are not clear, or it is too complicated. Over the years, I have personally read and written many tutorials, articles and tutorials for beginners on various topics. I have found ways to improve my teaching methods, and I hope to share with you guys. Just focus on what you have to say Imagine you are talking to someone. Whether they are driverless or driverless has reached the point. If they say a lot of unnecessary things and repeat themselves often, you may only be listening to half of them or even turn off the phone. When people read your tutorial, they look for answers to questions and don’t want to read a lot of things that they think are pointless. Therefore, when editing the tutorial, focus only on what to say and cut out what isn’t actually helpful. Avoid an overload of information. Who really read the fine print or the terms of those seemingly super-sized novels, but written by people who love to show off because of a lot of long stories? If people receive too many messages at once, they will be automatically closed. I personally find it difficult to memorize too many instructions at once. I was hoping you could give me some instructions. My memory started to disappear after the first four. It’s best to put your information in smaller paragraphs and focus on one thing at a time. If you have a lot to say, consider splitting the tutorial into IE: Part 1, Part 2, etc. So put yourself in the minds of beginners. If you want to learn something, how would you like to present the information to you? Use bold headings to explain the meaning of the following paragraphs or sections, and avoid using unfamiliar terms that beginners may not currently understand. Don’t patronize your readers. This may seem obvious, but you should always pay attention to it. A few years ago I sent someone a programming question in a magazine, and the first part of the answer he printed was, “Even if the example is clear in the manual, I’ll give you another example.” I found this very offensive. It may be clear to him, but it isn’t for me, because I wouldn’t write to him first. Some people think that if someone doesn’t know them, that person will be fat and should be patronized. If someone doesn’t understand what is being explained to them, some people will be angry. It is important to remember that people have different learning speeds and skills. If you find yourself as a person with a bad attitude towards people, this can be reflected in your work. Therefore, you should focus on helping the person understand rather than attacking them because you think what they are saying is obvious or stupid. Some people are indeed stupid, but they don’t have to do it on purpose. If they don’t understand something, assure them that you are not threatening them and that you are trying to help them. and last but not least Understanding people’s needs and being patient can help you become a better tutor. Listen to their opinions and learn from them to improve your writing skills. Leave a Reply
Hall-Balcom House // 1810 This historic house in West Millbury, Massachusetts, began in the end of the 18th century as a one-and-a-half-story wood-frame farmhouse. By 1810, the home was rotated 90 degrees and a more substantial, two-story brick house was constructed facing the street. The Federal style home was owned by Thaddeus Hall (1779-1855), and after his death, it was owned by his son, Orson Eddy Hall, who possibly rented the property for income while he resided in New Orleans and ran the iconic St. Charles Hotel there. The property was later acquired by Willard Balcom and remained in the family. Oh what I wouldn’t do to see the paint come off this old brick house!! Alexander Jack Jr. House // 1811 Newport in 1774 had approximately 153 free Black residents residing in 46 households comprising of thirty-percent of Newport’s population at this time. One of these free Black families was the Jack family who resided around Levin Street (Memorial Boulevard today). The Jack Family appears to have been from Antigua and may have had ties to the Redwood Family (the namesake of the Redwood Library), who owned a plantation on the island and resided in Newport. Alexander Jack, Jr. was a free African American whose trade was a cordwainer or shoemaker. He bought his land in 1811 and is thought to have begun construction almost immediately. Jack heirs remained on this property until 1881. The Newport Restoration Foundation purchased the house in 1969, moved it that same year to Mill Street to save it from urban renewal and the widening of Levin Street as Memorial Blvd. Langley House // 1807 Smack-dab in the middle of Newport, Rhode Island’s dense network of downtown streets, you’ll find Queen Anne Square, a rare bit of open space in a web of alleys and ways. Did you know that this park is only 50 years old? It’s true! In the late 1960s and early 1970s, Newport (and many cities all over New England) were grappling with suburbanization and dwindling tax revenue with people and businesses moving out. Their solution was “urban renewal”, which entailed the razing of buildings and sometimes, neighborhoods which were deemed “blight”. Historic buildings and communities were destroyed with modern planning (high capacity roads and high-rises connected by open space) to take its place. In Newport, this saw the form of America’s Cup Avenue and Memorial Boulevard, which cut through the city to allow for more cars and less-congested side-streets. Years later, planners realized that Newport was without a traditional town common like many New England towns, so they cleared buildings in front of Trinity Church to provide that traditional feeling. At the time, preservationists were trying to save significant buildings, with the Langley House being one of them. This house was set for the wrecking-ball, from Memorial Boulevard’s construction but moved and restored by Newport Restoration in the last hour to the south side of Church Street. Seven years later when Queen Anne Square was built, this house was moved to the north side, saving it once again. This house is a survivor! Old Brick Tavern // 1804 The Brick Tavern was an important stopping point on the old Union Turnpike, and the original two-story brick structure was completed about the time of the turnpike construction by Paul Willard, who with his heirs, operated the inn for 25 years. In the first years of the 1800s, the Union Turnpike Company planned and built a road providing a link for travel from Boston to Albany. Realizing the possibility for an inn along the first leg of the route, Willard financed this substantial brick building for travellers to stop, eat and spend the night. The tollroad was later made free, and less people stayed at the inn. After subsequent ownership, the building started to suffer from deferred maintenance and it was sold to a local Quaker group. The Quakers modernized the building by constructing the mansard roof and updating the interior. They never occupied it, but rented it to tenants for income. After, it was a hospital, boarding house, and in WWII, as a barracks of sorts for soldiers training nearby at a military base. The building is now a house! Newhall-Lane House // 1809 The Newhall-Lane House (could be the home of many wives) was built in 1809 by Pliny Newhall, a bricklayer. He purchased the land here at a prominent crossroads in Lancaster in 1808 from his employer who owned a brickyard across the street. At a previous home in town, Newhall’s wife Patty died giving birth to their son, at just 23 years old. Their son also died during childbirth. He remarried and had a full family to grow into the couple’s new house. They relocated to Lincoln and the home was sold to Captain Anthony Lane, who was the son of Deacon Jonas Lane, an important figure in Lancaster town history. Jonas had four wives, outliving three of them. Captain Lane himself, was married twice while living in this house; he had no children from either marriage. Although he was a talented craftsman and cabinetmaker, Captain Lane listed his occupation as farmer. The house is significant architecturally, as a fine example of Federal style architecture in Lancaster . Its sophisticated design is reflected in the graceful entrance. One of the unique features of the house is the pedimented gable of the facade which in combination with the narrow plan of the house, creates a delightful massing in this distinctive combination of Greek Revival and Federal styles. Pickman-Rice Mansion // 1796 Carter House and Publishing Company Building // 1820 Here is a two-for-one post! These two absolutely gorgeous Federal style buildings on Main Street in Lancaster were built in 1820 for George Carter and his brothers who ran a publishing company in the sleepy town. The Carter family was very active in the Swedenborgianism, a very small church in the general realm of Christianity, and they helped create a small enclave of worshippers in town. The brick, Carter and Andrews Publishing Company building (on the other side of a dead end street from this house) was built at the same time as the Carter home. The company was extremely popular in publishing children’s books, textbooks, and maps. One of my favorite publications the company made was “Peter Piper’s Practical Principles of Plain and Perfect Pronunciation”, now say that three times fast! Joseph Howard House // 1808 Salem, Massachusetts is probably the best town in the country to see amazing Halloween decorations everywhere and possibly the largest collection of high-style Federal period homes, a perfect pairing! This brick Federal home on Brown Street was built in 1808 for Joseph Howard (1780-1857) after his marriage to Anstiss Smith when they were in their 20s! Joseph worked as a shipping merchant in town. Together the couple had 11 children, with the last three dying in infancy. In 1827, the family relocated to Brooklyn, New York, and there, with his son, John Tasker Howard the two established the shipping and commission house of J. Howard & Son, with offices on South Street, and later at 34 Broadway. The family lived the remainder of their lives in New York. This house in Salem was sold to Thomas Downing, a dry goods dealer with a store nearby on Essex Street. Sadly, Downing suffered with severe depression in the later years of his life until 1859 when he took his own life in the stairwell of the eastern tower of the East Church in Salem (now the Salem Witch Museum). The Brown Street home was willed to his widow. Major Rowland Luce House // c.1790 Built around 1790 for Rowland Luce (1756-1835), this Federal home oozes character and charm, and is located right on Main Street in one of my favorite towns, Marion, Mass. Luce was born in Tisbury on Martha’s Vineyard into a very religious family. While studying to become a Deacon like his father, the Revolutionary War broke out, and Rowland served to fight the British, leaving service as a Major. He eventually settled in Marion’s Sippican/Wharf Village and worked as a Deacon for the Congregational Church. The simple house is clad in cedar shingles and has two chimneys, a departure from earlier homes with one, large central chimney. Dr. Andrew Harris House // c.1815 I was going through some images on my phone, and stumbled upon some Canterbury, CT buildings I never posted! This Federal style house was built around 1815 for Dr. Andrew Harris one of two physicians in Canterbury in the early 19th century. He was born in Rhode Island and lived on a farm until he took up in the medical profession. He was known throughout eastern Connecticut as one of the most distinguished operative surgeons in the state until his death at the young age of 53. The large home features a Palladian window above the entrance with some Victorian era alterations, including the front porch, elongated 2-over-2 windows at the ground floor, and double-door entry. Oh, and the house is across the street from the iconic Prudence Crandall House.
How to Write an Essay Outline – Learn The Efficient Hacks A properly written essay outline is a perfect canvas for an adequate paper. Read our detailed how to write an essay outline guide and create essays your teacher would appreciate. Get an essay outline template, working hacks, tips, knowledge about structuring formats, and more in our useful article. how to write an essay outline Photo by Volodymyr Hryshchenko from Unsplash What is an essay outline? An essay outline, in other words, is a plan for the paper that contains shortened data on each section. The outline helps to structure and organize each paragraph. A vast outline with ideas and brief details may result in the first draft of an essay. An effective draft would economize your time sufficiently. Standard outline essay format requires three obligatory sections: an introduction, the main body, and a conclusion. We would discuss each part in detail below. The purposes of writing an essay outline A good essay outline example serves several purposes: • Organizing an author’s thoughts that appear after evaluating a vast amount of data. • Reducing the missing data, as an outline contains all the central points to highlight in your essay. • Arranging the flow of information in a logical order and defining the main thesis. Now when you do not have a question, why do you need to write a detailed essay outline? Let us proceed with learning how to write an essay outline. Preparation stage Before you proceed with writing an essay outline, you would require to complete the following steps: 1) Identify the type of essay and the number of pages or word count. These points are vital to understanding which outline essay format to choose from and how many sections the essay might have. 2) Define the purpose of your essay and develop the main thesis. 3) Identify the readership. Imagine people interested in reading your essay and try to understand how to expose the information to them appropriately. 4) Do the preliminary research on the essay’s topic. Use only respectable sources. While you research, take notes and pre-plan an outline. Writing stage Here is a detailed explanation of how to write an essay outline for college considering its critical points: The introduction is a critical element of an outline that includes the main thesis and the topic. The thesis is a core idea that you initially present and support in each body paragraph. The introduction’s main purpose is to draw the audience’s attention and make them want to read further. An introduction works best when you enclose an epigraph, an anecdote, a proper quotation, etc. The body You need to include at least three sections in the body of a standard 5-paragraph essay. When you include each paragraph in the outline, you have to add at least one sentence related to the topic. It would help if you added for each section some supporting arguments and core facts. The goal is to support each paragraph with details. It is time to highlight the main thesis once again. Recall the purpose of writing the essay and underline the significance of facts and arguments that support the main thesis. The goal at this stage would be to remind readers of the core points. It is crucial to avoid including new information in the final section of an essay. How to Write an Essay Outline: Samples Now let us present to you some samples of an outline in terms of four main essay types. Each essay outline example would be formatted in accordance with the particular essay type: argumentative, expository, descriptive, and narrative. Argumentative essay outline example Argumentative essays aim to persuade the audience that the ideas and thoughts of the author are supported with strong arguments. Such papers contain dates, facts, statistics, quotations, etc. To make an effective argumentative essay, you can use the following essay outline template: Topic: Why is eating healthy food vital for people? Main thesis: Healthy food makes people stronger and energized. 1st body paragraph Topic sentence: Fruits and vegetables are full of vitamins. Supportive sentence: The nutrition facts of healthy food are impressive. 2nd body paragraph Topic sentence: Unhealthy food makes people sick. Supportive sentence: Junk food makes people gain weight. 3rd body paragraph Topic sentence: Healthy food makes people live longer. Supportive sentence: There are many examples of people who switched to healthy food and lived until 90 or longer. There are several reasons why eating healthy food is vital for people… Expository essay outline example Expository essays require evaluating the ideas by describing them from various sides and properties. Here is an example of a compelling expository essay outline template: Topic: Why is it important to encourage students to read more books? Main thesis: Reading makes people erudite and helps to widen their vision of everyday things. Students who read a lot get better results in their studies. 1st body paragraph Topic sentence: Reading makes people smarter. Supportive sentence: Students who read a lot have better analytical skills. 2nd body paragraph Topic sentence: Reading interesting books reduces the level of stress. Supportive sentence: When students read books, they feel better mentally and communicate with people easily. 3rd body paragraph Topic sentence: Reading improves cognitive functions. Supportive sentence: Students who read various literature have better memory and can write essays more effectively. Reading makes a positive impact on students’ lives… Descriptive essay outline example Descriptive essays require evaluating the ideas by describing them from various sides and properties. Here is an example of a descriptive essay outline template to consider when writing: Topic: My youngest sister. Main thesis: My youngest sister is the kindest person I ever met. 1st body paragraph Topic sentence: My sister is very easy-going Supportive sentence: My sister and I are siblings; however, we rarely fight. 2nd body paragraph Topic sentence: My sister supports animal shelters. Supportive sentence: When my sister sees an animal in trouble, she takes it to the veterinarian. 3rd body paragraph Topic sentence: My sister loves her family. Supportive sentence: My sister always has time to talk to our parents or me about our lives. I have never met a person who was kinder than my youngest sister…. Narrative essay outline example Narrative essays aim to tell a story about an event or a subject. Many narrative essays expose the personal experience of the author. To write a great narrative essay, use the following essay outline template: Topic: How skydiving made my life better. Main thesis: When I was depressed, I decided to try skydiving. I did my first tandem jump, and since that day, my life has changed. 1st body paragraph Topic sentence: I had a personal crisis, and my friend suggested I should try skydiving. That day changed my life. Supportive sentence: I tried to make my first tandem jump out of the plane and was hooked on that feeling. 2nd body paragraph Topic sentence: After my first jump, I decided to learn how to skydive and started my course. Supportive sentence: For a month, I attended the ground school and an accelerated freefall course with instructors. I did fifteen solo jumps. 3rd body paragraph Topic sentence: I overcame my fears and have met many great people. Supportive sentence: The skydiving community is a big global family. Now I am going to receive my skydiving license with the support of my new friends. Skydiving changed my life and made it much better… Our Ultimate Essay Outline Guide Is Not The Only Benefit You Can Get We hope that our detailed how-to write an essay outline guide would navigate you through the particularities of writing. You can also read our article on how to write review essay to understand the essential hacks and the potential mistakes to avoid. Moreover, BuyEssay collaborates with numerous skilled authors who are ready to help you with any academic assignment. Once you reach out to us with your order details, we would effectively support you in your studies. Write us any time to buy an essay of high quality for affordable rates! Live Chat
Secrets in the subterranean: the new knowledge surfacing from old waterways 6 October 2021 "A humanities-based interpretative framework means we can connect technological advancement to social development." What can the water systems of ancient cities tell us about managing the impacts of climate change in the 21st century? 2. Studying stalagmites in an Italian cave to reconstruct a past climate. Dr Keenan-Jones studying stalagmites in an Italian cave to reconstruct a past climate. Quite a lot, according to Dr Duncan Keenan-Jones, who speaks the language of engineers as well as English, French, German, Italian, Ancient Greek and Latin. It’s an unusual combination of linguistic capability and scientific expertise, yet one that has enabled Dr Keenan-Jones to transition from a career in engineering to examining the intersection between ancient societies, the environment and innovation. For this UQ Classics and Ancient History lecturer and Centre for Policy Futures affiliate, looking at the past for solutions to present problems involves studying old Latin and Greek texts, archaeological artefacts, and geoscientific analyses of mineral deposits. “We have the technology now to interpret the evidence differently and the modelling we can do helps with decision-making about sustainable practices for serving the needs of the people living in those landscapes today,” Dr Keenan-Jones said. “Whether it’s the aqueducts of Ancient Rome or the floodplains of Queensland’s Channel Country, understanding how communities have adapted to water availability helps to build knowledge about the natural environment and human development. “For example, we can see from wave-like formations in limestone deposits how fast water flowed in ancient aqueducts, and hence whether the city itself or rich suburban villas were prioritised to receive water in ancient Rome. “Identifying what caused the layering of these deposits  – was it the rain or was it a microbe – tells us whether they are a record of rain distribution in the past. If so, this layering can be used to fine-tune climate models used to predict future climate change, helping us to mitigate or adapt,” he said. This concept is explored in a chapter Dr Keenan-Jones co-authored for the book From the Guajira Desert to the Apennines, and from the Sardinia/Corsica Microplate to the Killer Asteroid: honoring the career of Walter Alvarez, published this year by the Geological Society of America. For Dr Keenan-Jones, adaption means more than a technological response. The social influences and impacts of changes to regional water supply systems has been a constant theme throughout his research. Collaborating with geoscientists, he demonstrated that lead from Roman water pipe networks polluted Pompeii’s drinking water, as well as the ancient harbours of Naples and Rome. This discovery showed that harbour pollution could be used to track the growth and decline of ancient urban infrastructure. In Australia, Dr Keenan-Jones is working with the Mithaka Aboriginal Corporation to learn how Indigenous communities have managed water in the arid interior of western Queensland for centuries, including when pastoral and mining industries were introduced. Investigating how fish traps, weirs and other bespoke technology sustained them throughout the region’s ‘boom and bust’ patterns of abundance is stimulating ideas for how local ecologies might generate new income streams for economic security. Carbon farming is one possibility. Dr Keenan-Jones has plenty of hands-on experience at excavations in Australia, Italy and Israel. “I get to use the latest imaging and geochemical techniques to develop high-resolution histories of where the water came from, how it was controlled and distributed, its quality and how it was affected by changes in rainfall patterns and temperature,” he said. “These tools help with making large-scale comparisons between physical factors like climatic and environmental variability and human elements like population dynamics, land use, disease, governance and economic stability. “Applying a humanities-based interpretative framework means we can connect technological advancement to social development and gain a better understanding of how some civilisations survived and thrived while others succumbed to human or environmental forces.” Dr Keenan-Jones believes the opportunities to collaborate university-wide and globally have enriched his experience as an academic in UQ’s Faculty of Humanities and Social Sciences. He enjoys the freedom to explore research possibilities that satisfy his intellectual curiosity and exercise his distinctive skillset. Researchers who are fluent in the languages of different disciplines are somewhat rare, especially ones whose ability to interpret evidence spans the apparent poles of engineering and humanities. While a hydrologist might not glean much from a particular piece of ancient waste water evidence, an archaeologist or historian could consider it a treasure. With Dr Keenan-Jones’s quantitative and qualitative research expertise, the implications of the discovery are more likely to reach the surface.
Published: 2021-09-20 The importance of dietary balance at COVID-19: the systematic review Medical Clinic, Dom Afonso Henrique, Sao Jose do Rio Preto, Sao Paulo, Brazil Kaiser Clinic and Hospital, Sao Jose do Rio Preto, Sao Paulo, Brazil Dietary therapy Nutrition Immunity Nutritional management COVID-19 Introduction: COVID-19 disease has been heralded as a global pandemic by the World Health Organization. Dietary therapy and immunity play a decisive role in SARS-CoV-2 infection. In this sense, the lack of regulation and the excessive immune response to the viral stimulus produces an exacerbated pro-inflammatory cytokines (cytokine storm), reaching the state of hyperinflammation. Objective: To conduct a systematic review of the main considerations in the management of dietary therapy in the control or prophylaxis of COVID-19. Methods: Clinical studies with qualitative and/or quantitative analysis were included, following the rules of the systematic review-PRISMA. Results: A total of 370 articles were found involving dietary therapy, immunity, and COVID-19. A total of 107 articles were evaluated in full, and 28 were included and discussed in this study. Underlying systemic inflammation is believed to exacerbate COVID-19 infection. Studies have shown that there is a high risk of mortality in individuals with pre-existing health problems, such as diabetes, hypertension, cardiovascular disease, and obesity. Nutritional status is known to play a significant role in patient outcomes. It is necessary to follow a diet characterized by anti-inflammatory properties to benefit or prevent COVID-19. Adequate supplies of zinc, selenium, and vitamin D are essential for resistance to other viral infections, immune function, and reduced inflammation. There are nutritional triggers to favor immune-strengthening responses, as well as improving the performance of mitosis, meiosis, and all cellular functioning, all of this functioning is directly integrated with the energy balance and nutritional status of the body. Endogenous metabolites and nutrients in the diet can directly influence epigenetic enzymes. Conclusion: It is necessary to control the activities of inflammatory mediators through modifiable risk factors, such as diet, exercise, and healthy lifestyle choices to control or prevent the harmful effects of COVID-19. 1. World Health Organization Off-label Use of Medicines for COVID-19. [(accessed on 20 September 2021)]; Available online: 2. ASSOCIAÇÃO BRASILEIRA PARA O ESTUDO DA OBESIDADE E DA SÍNDROME METABÓLICA. Diretrizes brasileiras de obesidade 2016. 4. ed. São Paulo: ABESO, 2016. Disponível em: Acessado em 28 Agosto de 2021. 3. Kass DA, Duggal P, Cingolani O. Obesity could shift severe COVID-19 disease to younger ages. Lancet [Internet]. 30 abr 2020 [capturado 8 jun 2020]; 395(10236):1544-1545. DOI 10.1016/ S0140-6736(20)31024- 2. Disponível em: PIIS0140-6736(20)31024-2/fulltext. 4. Schetz M, De Jong A, Deane AM, et al. Obesity in the critically ill: a narrative review. Intensive Care Med. 2019;45(6):757‐769. doi:10.1007/s00134-019-05594-1. 5. Garg SS, Sharma A, Gupta J. Immunomodulation and immunotherapeutics of COVID-19. Clin Immunol. 2021 Aug 27;231:108842. doi: 10.1016/j.clim.2021.108842. Epub ahead of print. PMID: 34461289; PMCID: PMC8393504. 6. Zabetakis I, Lordan R, Norton C, Tsoupras A. COVID-19: The Inflammation Link and the Role of Nutrition in Potential Mitigation. Nutrients. 2020 May 19;12(5):1466. doi: 10.3390/nu12051466. PMID: 32438620; PMCID: PMC7284818. 7. Wu D., Lewis E.D., Pae M., Meydani S.N. Nutritional modulation of immune function: Analysis of evidence, mechanisms, and clinical relevance. Front. Immunol. 2019;9:9. doi: 10.3389/fimmu.2018.03160. 8. Grant W.B., Lahore H., McDonnell S.L., Baggerly C.A., French C.B., Aliano J.L., Bhattoa H.P. Evidence that vitamin d supplementation could reduce risk of influenza and COVID-19 infections and deaths. Nutrients. 2020;12:988. doi: 10.3390/nu12040988. 9. Childs C.E., Calder P.C., Miles E.A. Diet and immune function. Nutrients. 2019;11:1933. doi: 10.3390/nu11081933. 10. Calder P.C., Carr A.C., Gombart A.F., Eggersdorfer M. Optimal nutritional status for a well-functioning immune system is an important factor to protect against viral infections. Preprints. 2020;12:1181. 11. Iddir M, Brito A, Dingeo G, Fernandez Del Campo SS, Samouda H, La Frano MR, Bohn T. Strengthening the Immune System and Reducing Inflammation and Oxidative Stress through Diet and Nutrition: Considerations during the COVID-19 Crisis. Nutrients. 2020 May 27;12(6):1562. doi: 10.3390/nu12061562. PMID: 32471251; PMCID: PMC7352291. 14. Hoffmann M., Kleine-Weber H., Schroeder S., Krüger N., Herrler T., Erichsen S., Schiergens T.S., Herrler G., Wu N.-H., Nitsche A., et al. SARS-CoV-2 Cell Entry Depends on ACE2 and TMPRSS2 and Is Blocked by a Clinically Proven Protease Inhibitor. Cell. 2020;181:271–280.e8. doi: 10.1016/j.cell.2020.02.052. 15. Beck M.A., Handy J., Levander O.A. Host nutritional status: The neglected virulence factor. Trends Microbiol. 2004;12:417–423. doi: 10.1016/j.tim.2004.07.007. 16. Georgousopoulou E.N., Kouli G.-M., Panagiotakos D.B., Kalogeropoulou A., Zana A., Chrysohoou C., Tsigos C., Tousoulis D., Stefanadis C., Pitsavos C. Anti-inflammatory diet and 10-year (2002–2012) cardiovascular disease incidence: The ATTICA study. Int. J. Cardiol. 2016;222:473–478. doi: 10.1016/j.ijcard.2016.08.007. 17. de Boer A., van de Worp W.R.P.H., Hageman G.J., Bast A. The effect of dietary components on inflammatory lung diseases – a literature review. Int. J. Food Sci. Nutr. 2017;68:771–787. doi: 10.1080/09637486.2017.1288199. 18. Lago J.H.G., Toledo-Arruda A.C., Mernak M., Barrosa K.H., Martins M.A., Tibério I.F.L.C., Prado C.M. Structure-activity association of flavonoids in lung diseases. Molecules. 2014;19:3570–3595. doi: 10.3390/molecules19033570. 19. Phillips C.M., Chen L.-W., Heude B., Bernard J.Y., Harvey N.C., Duijts L., Mensink-Bout S.M., Polanska K., Mancano G., Suderman M., et al. Dietary inflammatory index and non-communicable disease risk: A narrative review. Nutrients. 2019;11:1873. doi: 10.3390/nu11081873. 20. Mattioli A.V., Ballerini Puviani M. Lifestyle at time of COVID-19: How could quarantine affect cardiovascular risk. Am. J. Lifestyle Med. 2020;14:240–242. doi: 10.1177/1559827620918808. 21. Power S.E., Jeffery I.B., Ross R.P., Stanton C., O′Toole P.W., O′Connor E.M., Fitzgerald G.F. Food and nutrient intake of Irish community-dwelling elderly subjects: Who is at nutritional risk? J. Nutr. Health Aging. 2014;18:561–572. doi: 10.1007/s12603-014-0449-9. 22. Haase H., Rink L. The immune system and the impact of zinc during aging. Immun. Ageing. 2009;6:9. doi: 10.1186/1742-4933-6-9. 23. Gammoh N.Z., Rink L. Zinc in infection and inflammation. Nutrients. 2017;9:624. doi: 10.3390/nu9060624. 24. Alexander J, Tinkov A, Strand TA, Alehagen U, Skalny A, Aaseth J. Early Nutritional Interventions with Zinc, Selenium and Vitamin D for Raising Anti-Viral Resistance Against Progressive COVID-19. Nutrients. 2020 Aug 7;12(8):2358. doi: 10.3390/nu12082358. PMID: 32784601; PMCID: PMC7468884. 25. Shapira SN, Christofk HR. Metabolic Regulation of Tissue Stem Cells. Trends Cell Biol. 2020 Jul;30(7):566-576. doi: 10.1016/j.tcb.2020.04.004. Epub 2020 Apr 28. PMID: 32359707. 26. Shavandi A, Saeedi P, Gérard P, Jalalvandi E, Cannella D, Bekhit AE. The role of microbiota in tissue repair and regeneration. J Tissue Eng Regen Med. 2020 Mar;14(3):539-555. doi: 10.1002/term.3009. Epub 2020 Jan 15. PMID: 31845514. 27. Palmieri B, Vadalà M, Laurino C. Nutrition in wound healing: investigation of the molecular mechanisms, a narrative review. J Wound Care. 2019 Oct 2;28(10):683-693. doi: 10.12968/jowc.2019.28.10.683. PMID: 31600106. 28. Domingues-Faria C, Vasson MP, Goncalves-Mendes N, Boirie Y, Walrand S. Skeletal muscle regeneration and impact of aging and nutrition. Ageing Res Rev. 2016 Mar;26:22-36. doi: 10.1016/j.arr.2015.12.004. Epub 2015 Dec 9. PMID: 26690801. How to Cite Brugnoli, M. I. S., & Garrett, D. A. de A. (2021). The importance of dietary balance at COVID-19: the systematic review. International Journal of Nutrology, 14(3).
Good and Bad in Sula by Toni Morrison October 21, 2021 by Essay Writer Toni Morrison writes the book Sula with the intention of questioning the idea of good versus bad. The novel talks about good vs bad and compares them between two main characters. The author uses the characters Sula and Nel; their values and qualities to prove her point. The actions taken by these characters gives examples of good vs bad. Sula and Nel In this novel there are many characters; few characters are portrayed as good and few portrayed as bad. The author compares the theme good vs bad using the character Sula and Nel. The character Sula seen as evil. Throughout the chapters we read how she is evil, and it displayed quite obviously, Sula, s lack of action after accidentally killing chicken little and watching her mother, Hannah, burn in a fire, show how Sula is metaphorically portrayed as evil. Nel and the other characters are good compared to Sula’s evil. However, the character Nel is a small-town conservative and a quiet girl. She hides behind innocence, when her heart is evil. Sula is city girl that is completely independent and blunt. Though she does seemingly evil things, she is still honest and prideful which makes her heart good. The book Sula goes from the time periods of 1919-1940. During this time, we read about two girls, Sula and Nel as they grow up. The Girls’ Childhood The book takes place in ‘The Bottom.’ White landowners guaranteed liberated slaves a bit of paradise by giving them a chance to live in the medallion city, Ohio. The white landowners would take the richer version of the city leaving the liberated slaves with an unpleasant life. In the start of the novel at 1919, the two young girls Sula and Nel simply start to meet. They become best friends in their teenage years. In Nel’s family, they are respected members of the society they traditional. Her house is steady and more conventional than Sula’s. It represented as good because the family goes to church; they appear to be decent, and the house is perfect and clean. Sula’s house is very different. She lives with her grandma and her mom Hannah, who later passes on; both are viewed as odd and nontraditional to the town because house is disordered; the ladies have sex with different men, and there is no male figure in the house. Regardless of their differences the young girls become closest companions and live together. One day an accident happened. Sula swings her friend Chicken Little into a nearby river and he drowned. Nel and Sula agreed to never tell anyone about the accident. After that the two girls starts to grow apart. Later Nel reflects on this incident remembering “the good feeling she had when chicken little hands slipped” (Morrison,170). While Sula had cried and cried when she came back from Shadrack’s house but Nel had remained calm. This quote shows us who’s heart is really evil, while Sula is showing remorse, Nel is excited to see the boy drop in the river. The Later Life Later in the novel we read how Nel settles down and gets married and have children. However, Sula lives an independent life and she travels for ten years; then returns to bottom. When she returns it seems that bad things follow her, beginning with her shipping of Eva off to a home then she breaks up Nel’s marriage by sleeping with Jude. Additionally, Sula even causes Mr. Finley to choke on a chicken bone and die. Many of these incidents are nothing but accidents it doesn’t prove that she is evil. Sleeping with Nel’s husband is an exception before we judge her actions that is not acceptable in the eye of society. I want to argue that we take a look at her family background its not hard to understand that growing up she didn’t have anyone to teach her the right things. As I mention earlier in the 4th paragraph she grew up in a chaotic environment; her mother freely loved men. Growing up she watched her mother and thought it was okay to be sexually free. This does not prove that she is evil Throughout the novel the theme, good versus evil is shown. Nel is known as good overall. She is innocent, while she is also conservative and shy. She is married with children which makes her follow the female patterns of the town. With those qualities, she is an all-American good woman. In society Sula is showed as evil and offensive. She decides to go off to college and does not come back for ten years. When Sula returns, she comes back with a plague of robins. The robins came with “to much heat, or too much cold, to little rain, rain to flooding” (Morrison 81). Sula was also assigned the role of evil because she was free with her sexuality and freely flaunted her sensuality and her independence However, Nel sleeps with her husband Jude because she feels as if it’s another job of hers. She is not free of her sexuality. She is confined to think her only goal during sex is to please her husband. During that time, it was normal for women to think that way. That was considered being a good wife. However, Sula did not want to fall into that category. Sula’s sexual expression is not attached to anything outside herself. Therefore, she does not see it as being sinful or evil she sees it as being free of herself. In the story, Sula gets blamed for several things. The towns people blamed her for the boy falling, the man choking on a chicken bone, the lady getting a stye on her eye by looking at Sula and for bringing the plague of birds. These things considered Sula evil. However, what the towns people did not realize is that Sula brought a presence that improves the community. Sula was different. She embodied what all the wives wanted freedom which was something weird so that all cast her as evil. A true evil person would just bring a dark cloud to the community with a heavy unpleasant emotion. After the incident with Jude, Nel became like the towns people. She judged Sula because she did not live by rules of the society. She was simply free, and everyone was jealous of that. Soon Sula falls in love with Ajax. He is the only person to see Sula for what she really was and independent women. She reminded him of his mother. He loved the fact that she was not domestic and that they considered each other as equals. Sula soon falls under the pressure of being domestic which is everything she is against and soon she left him. Sula is a book about uncertainty. It questions good versus evil. Sula was blamed for being evil and bad, but she lived her life honestly. Nel lived her life private and as a lie. Honesty is a trait of someone with a good pure heart where lie reflects someone with an evil heart. This book questions beliefs about what is good and what is evil. Read more Leave a comment Order Creative Sample Now Choose type of discipline Choose academic level • High school • College • University • Masters • PhD Page count 1 pages $ 10
How can we use Mathematica to design an electronic implementation of an active filter? Here I would like to share with this great community by offering an example of active filter design. This Mathematica code determines the component values for a low-pass active filter implemented using the Sallen-Key architecture. The filter will be a second order Chebyshev filter of type 1. This filter offers a steep cut off at the expense of some passband ripple. It is the location of the poles that define the filter. The design method is as follows: 1. Derive expressions for the poles of the active filter circuit in terms of the component values; 2. Determine the pole numerical values using Mathematica's Chebyshev1FilterModel; 3. Set the expressions for the pole values equal to the required numerical values and solve for the component values. Higher order filters can be designed by cascading stages. For example, a 4th order filter can be built by cascading two stages of the same architecture. In this case, the pole values can be determined by using a 4th order Chebyshev1FilterModel. The values are not duplicated: there will be two complex conjugate pairs, one pair for each stage. The Sallen-Key architecture The circuit was drawn with LTSpice, which is a free download. ( https://www.analog.com/en/design-center/design-tools-and-calculators/ltspice-simulator.html# ) It employs an MC33284 op amp as the active component. For work in Mathematica, an ideal op amp will be assumed. Proper selection of the actual op amp makes this a reasonable approximation. circuit Circuit design using Mathematica Some shortcuts These convenient shortcuts make the circuit equations easier to write and understand. (* circuit impedances in the s-domain *) (* inductive impedance *) xl[l_] := s l; (* capacitive impedance *) xc[c_] := 1/(s c); (* impedance of parallel circuit elements *) par[z1_, z2_] := (z1 z2)/(z1 + z2); (* prefixes for numerical quantatives *) k = 1000.; M = 1.*^6; u = 1.*^-6; p = 1.*^-12; Transfer function of the Sallen-Key circuit In this section, we determine the symbolic transfer function Vout/Vin in the s-domain of the above circuit by solving the nodal current equations. We then extract the poles of the transfer function. (* Node current equations *) eq1 = (vin - vn)/r1 + (vp - vn)/r2 + (vout - vn)/xc[c2] == 0; eq2 = (vn - vp)/r2 + (0 - vp)/xc[c1] == 0; (* Feedback *) eq3 = vm == vout; (* op amp transfer function *) eq4 = (vp - vm) tfOpAmp == vout; (* r3 balances voltage due to input currents *) (* it does not effect the transfer function *) eq5 = r3 == r1 + r2; (* solve for vout in terms of vin *) temp = vout /. Solve[{eq1, eq2, eq3, eq4}, vout, {vn, vp, vm}][[1]]; (* transfer function for ideal op amp *) (* the ideal op amp has infinite gain and no poles or zeros *) tf = Limit[temp, tfOpAmp -> Infinity]/vin // Simplify; (* the poles in terms of symbolic component values *) symbolicPoles = TransferFunctionPoles[TransferFunctionModel[tf, s]] // Flatten; Ideal Chebyshev filter with Fc = 50KHz In this section, we model a 2nd order 50 KHz Chebyshev low-pass filter using Chebyshev1FilterModel and extract the numerical values of its poles. The filter is a Chebyshev filter of type 1, which exhibits passband ripple. It is the location of the pole pair that determines its type. fc = 50 k; cheby50k = Chebyshev1FilterModel[{"LowPass", 2, 2 Pi fc}, s]; poles = TransferFunctionPoles[cheby50k] // Flatten (* {-101095.54884103949`-244066.24510758917` \ \[ImaginaryI],-101095.54884103949`+244066.24510758917` \[ImaginaryI]} \ Solve for component values In this section, we set the symbolic expression for the circuit poles to the numerical values of the Chebyshev filter. We set bounds on circuit components and use FindInstance. Note that there are two poles which are complex conjugates, so we only need to use one of them to determine component values. (* equate the symbolic pole value to the real values \ determined by Mathematica *) sp1 = symbolicPoles[[1]] == poles[[1]]; (* and find a solution with reasonable component values *) values = FindInstance[ sp1 && r1 > 50 k && r2 > 50 k && c1 > 0 && c2 > 0, {r1, r2, c1, (* {r1 -> 50029., r2 -> 50040., c1 -> 2.89519*10^-11, c2 -> 1.97696*10^-10} *) (* choose close standard values for components *) standardValues = {r1 -> 50 k, r2 -> 50 k, c1 -> 30 p, c2 -> 200 p}; Check the transfer function with the standard values Frequency response tfm2 = TransferFunctionModel[tf /. standardValues, s]; plot[1] = BodePlot[tfm2[2 Pi s], GridLines -> Automatic, FeedbackType -> None, ImageSize -> 600, PlotLayout -> "Magnitude", PlotLabel -> "Frequency Response", FrameLabel -> {"Frequency (Hz)", "Gain (dB)"}, LabelStyle -> 18] enter image description here Dynamic response to a 50 KHz pulse train stimulus = (UnitStep[t - 1/(50 k)]) (SquareWave[50 k t] + 1)/2; out = OutputResponse[tfm2, stimulus, {t, 0, 60/50000}]; plot[2] = Plot[out, {t, 0, .0006}, ImageSize -> 600, Frame -> True, PlotLabel -> "Response to a 50 KHz Pulse Train", FrameLabel -> {"Time (s)", "Amplitude (V)"}, LabelStyle -> 18] enter image description here A comparison to a SPICE simulation The circuit design was simulated using AIMSpice version 2018.100. AIMSpice is also a free download. ( http://www.aimspice.com/ ) It could have been simulated in LTSpice, but I had a device model for the MC33284 op amp available for AIMSpice. We see below that the performance as simulated in SPICE is very similar to that determined in Mathematica. The minor differences are probably caused by the standard component values differing from the ideal, as well as by the fact that in Mathematica we used and ideal op amp (infinite input impedance, zero output impedance, and infinite gain) while AIMSpice used a circuit model for the op amp. AIMSpice Bode plot enter image description here AIMSpice pulse train Note that the starting value for the AIMSpice pulse train is different from that used in the Mathematica simlation. enter image description here • 1 $\begingroup$ That's a great answer. $\endgroup$ Sep 8 '20 at 2:46 • $\begingroup$ Er… I know little about filter design so sorry if it's a silly question, but what's the advantage of this design? Seems that we've created a tfm2 that's quite similar to cheby50k? $\endgroup$ – xzczd Sep 8 '20 at 3:03 • 2 $\begingroup$ Not silly at all. The cheby50k is a Mathematica model only. But the tfm2 is the predicted performance of a real circuit design composed of electronic components: an operational amplifier and several resistors and capacitors. You can build that circuit and it will filter an input signal. The entire calculation was to determine the component values for a 50kHz filter. $\endgroup$ Sep 8 '20 at 5:14 See my gnet-mathematica package. You can prepare schematics in either gEDA or Lepton-EDA for analysis in Mathematica. The Scheme code to translate the schematics to equations is included in the gEDA and Lepton distributions. Among many other applications, I designed the Bessel pulse shaping filters in the x-ray measurement chains of NICER using this. • $\begingroup$ That’s very interesting, John. So are neutron stars. Thank you. $\endgroup$ Sep 8 '20 at 18:04 Your Answer
As the crips line between our physical and digital world is blurring, a world dominated by Spatial Web is on its way. The convergence of enabling the large tech giants like Google and Facebook to direct our lives into uncertainty is giving rise to a new era of the internet. Web 3.0. If examined closely, the internet is actually like a net made up of millions of computers, smartphones, and many other technology devices, software, and programs. Though snipping a few threads off this global net does not make a huge collapse simply because there are thousands of different ways of building connections. Though sometimes, governments can cut off the internet service in some regions, when seen through the global lense, crashing or switching off the global internet at the same time is next to impossible. But a glimpse of how closely one can get to accomplish this practically impossible scenario was witnessed by the world in the recent server down of Facebook, WhatsApp, and Instagram. Facebook, Instagram, Whatsapp Crash Yes, Instagram, Facebook, and WhatsApp are not the entire internet. They are just social media platforms. But, in the majority of developing African countries, a large population uses the Free Basics of Facebook. So, for these millions of people, the server down of Facebook could imply that the entire internet is down. Internet, Whatsapp, Smartphone, Communication, Phone Furthermore, there are thousands of businesses today that run their massive section of the business via Facebook. Many people use Facebook IDs and passwords as login credentials to log into other services or applications. Therefore, the server down for 6 hours had some devastating consequences. All this loss is a direct implication of the centralized structure of the entire internet, with only a few companies controlling the internet as a whole. But, during its inception, the sole purpose of the internet was decentralization, completely opposite of what it has become today. The Inception of Internter: Decentralization During World War II, the US invented the internet to get an edge by decentralizing the communication system. JCR Licklider, 1962 of Advanced Research Projects Agency (ARPA), proposed the concept of a galactic network between all the computers. Based on this innovative idea, ARPA Net that would later grow to become the mighty internet was invented in 1969 that connected the existing computers of that time. Despite the interconnection of the computers, the different programming languages of each system made the interaction between the computers incompatible. Vinton Cerf and Robert Kahn put forth the Transmission Control Protocol (TCP), an inter-networking solution, which resolved the language barrier. ARPA Net adopted the TCP/IP protocol in 1983. Internet: The Failed Purpose Another milestone of the internet for the general population was the invention of the World Wide Web by Tim Berners-Lee in 1990. By openly publishing this software for the world, enabling people to follow threads of knowledge easily. This selfless act provided us with the mighty internet. But, today, Tim Berners-Lee’s efforts to decentralize the internet are going down the barrel. He says, “we demonstrated the web had failed instead of humanity, as it was supposed to have done and failed in many places.” The free access to the web by everyone is fading as a few select companies have established a monopoly over the entire internet, resulting in the robust centralization of this miraculous technology. Web 3.0: The Future of Internet To counter the monopoly of large internet giants like Facebook and Google, many experts, including Tim, look up at Web 3.0, The Future of the Internet. Web 3.0 aims to decentralize the internet, an internet that is not controlled, monitored and relies on a single company. Many new innovative proposals have been put forth by numerous initiators. For example, Mastodon, a decentralized version of Twitter, was developed by a German coder. Furthermore, technologies like Blockchain also focus on the decentralization in the global financial system. Even Tim Bernie-Lee himself is working on his own decentralized platform named Solid. It is a platform that provides authority to individuals to control their data instead of handing over their data to giant companies. In a nutshell, Soldi is an initiative that teaches the user to keep their data on the internet without relying on other companies. Any social application or website build upon Solid will save the user data on a user’s pod rather than transferring and keeping all the data in these social applications’ servers. Web 3.0: The Transforming Future The upcoming innovative technologies are trying to build the internet and web in a decentralized structure, pushing the monopoly of dominating companies down the drain. This is Web 3.0, where the world will once again witness the rise of decentralized applications and decentralized web. Peter Diamandis, a Greek-American physician, engineer, and entrepreneur, says, “the world around us is about to light up with layer upon layer of rich, fun, meaningful, engaging, and dynamic data. Data you can see and interact with. This magical future ahead is called the Spatial Web and will transform every aspect of our lives, from retail and advertising, to work and education, to entertainment and social interaction.”
What is the Day of the Dead? Citlaly Gonzalez, Staff Writer Dia de los Muertos (Day of the Dead) is a Mexican holiday celebrated on November 1st and 2nd  in which families use offerings such as food and drinks to welcome back the souls of their deceased loved ones for a reunion.  November 1st is “El dia de los inocentes,” also known as “Day of the Children. When midnight strikes on October 31st, the gates of heaven are opened and the spirits of children are given the opportunity to rejoin their families for 24 hours. Adult spirits then follow on the next day, November 2nd.  The holiday originated from the Aztecs and is traced back to what is now known as modern day Central Mexico. When the Spanish conquered Mexico during the 16th century, the dates of Aztec rituals and traditions were moved to align with Catholic beliefs, November 1st being “All Souls Day” and November 2nd being “All Saints Day. Skulls were used as a main symbol of remembrance and continue to be used to this day.  Traditionally, families build altars with ofrendas. Ofrendas are made up of candles, photos of their loved ones, as well as a collection of their favorite items. This can include things such as cultural foods and drinks (Pan de muerto, tamales, tequila, etc.) and any other symbolic item that may be important to their families. Cempasúchil flowers are a key part in Day of the Dead celebrations as they are used to guide the souls of spirits back home.  Disney Pixar’s animated movie, Coco,  is based around the holiday and highlights traditions used by those who celebrate it. From the distinction between the land of the living and the land of the dead, to the importance and symbolism of ofrendas, Coco helps build a better understanding for those who do not celebrate the holiday.  These traditions continue to be practiced annually and are an important highlight of Mexican culture. ¡Feliz dia de los muertos!
Anecdotally, Gurkhas have always been renowned for being talented marksmen, with numerous historical references being made to the deadliness of a Gurkha armed with a rifle. Already at one of the first meetings between the British and the Gurkhas at the battle of Kalunga in 1814, the British felt first-hand the lethality of a Gurkha marksman as their commander, General Gillespie, was shot through the heart while leading his men in a charge against the hillfort. Since this early demonstration of marksmanship, the Gurkhas’ reputation for shooting excellence continues today, evidenced by their repeated success at the Army Operational Shooting Competition held annually at Bisley Camp. Back to the exhibition main page.
Content ID Bedtime reading with Christmas trees Our bedtime ritual includes reading stories. Each December, the boys choose from our collection of Christmas books.   Here are four books we received from the Book of the Month program offered by Ag in the Classroom in North Carolina. They focus on the growing of Christmas trees but also include a lesson relevant to the season. Christmas Farm by Mary Lyn Ray is an intergenerational story that showcases the time and dedication it takes farmers to grow Christmas trees. It tells the story of Wilma, who decides to give her garden a makeover and plants 62 balsam seedlings. Helped by her young neighbor, Parker, the story follows the years they work together to care for the tees and how many of the original 62 survive until harvest. The Finest Christmas Tree follows Farmer Tuttle, a Christmas tree farmer. Every year he cuts trees from his farm and takes them into the city to sell. When he sells out, Farmer Tuttle buys his wife a Christmas hat. Then comes the year that everyone wants an artificial tree and the farmer doesn’t sell a single tree, which means no hat for his wife. He becomes discouraged and stops taking care of the tree farm. The next year a sawmill offers to buy them all for wood and he must decide what to do with his farm. A letter from someone wanting “the finest tree in the forest” gives Farmer Tuttle another option. This story is a reminder of the benefits of live trees and how farmers depend on selling their crop to make a living. In the Night Tree, author Eve Bunting provides a twist to the search for a Christmas tree. Instead of looking for a tree to bring home, the family looks for a tree to decorate for the animals in the forest. It’s a great reminder of how Christmas trees were originally decorated. After reading this story I wanted to get a needle and popcorn and start making some decorations, although my boys probably would have eaten the popcorn. My favorite of our Christmas stories is The Carpenter’s Gift. It’s set in 1931 and we see Henry’s dad, who is out of work, cutting trees from their forest to sell in the city. He gives a leftover tree to workers building Rockefeller Center. I don’t want to give away the story line, but it includes Habitat for Humanity and traditions that continue today. I’ve always valued reading to my kids and it’s even better when they learn the truth about agriculture and life lessons such as kindness, humility, and giving. What books do you read your kids at bedtime during December? Read more about Talk in Marketing Most Recent Poll How are you dealing with fertilizer for 2022?
What Is An Corn Bulb Led Used For? A corn bulb led is an meeting of light-emitting diodes(LEDs) on a metal structure. They are called corn bulb led because the way wherein the yellow LEDs are assembled at the fixture resemble corn kernels on a corn cob. Corn bulb led are intended to offer a high output of light the use of LEDs, […] 12/03/2021    Tags: , , , , ,
How do Mermaids have Babies? The fact that mermaids are half-human and half-fish makes mermaids’ reproduction, well, complicated. Do they bear babies like humans or do they lay eggs as many fish do? This is biologically the most likely approach to how mermaids would have babies. In the following section, I explain why it is not likely that mermaids lay eggs and show how insemination, gestation and birth would look like in mermaids from a scientific point of view. Do mermaids have babies by laying eggs or bearing live young? As I mentioned, mermaids would most likely have babies the same way that certain marine animals like some sharks, dolphins and other marine mammals do. But let’s have look at the other ways they might reproduce and why these, like laying eggs, don’t seem likely. When it comes to reproduction, the biggest difference between humans and most fish is that humans reproduce internally and most fish reproduce externally. That means, that human eggs are fertilized inside the body but fish eggs are fertilized outside of their bodies, in the water. For that, the female fish lay eggs directly into the water and then a male fish comes by and fertilizes them by adding his sperm to the mix. But fish do not lay a few eggs like a hen or some other animals, they lay thousands! That is because only a few of them will actually survive and typical for external fertilization. The eggs develop in the ocean water and hatch into baby fish (larvae). Most of them will be eaten at these stages and only a few can actually grow to adult size. There are many theories on how mermaids might reproduce but it has to be one of two options: laying eggs or bearing live young. (Photo by guille pozzi on Unsplash) Humans and other (marine) mammals however use internal reproduction, which allows them to make sure that all of the very few babies they bear will survive. So, the fertilization and growth of the baby all happen inside the body of the female, so when they bear them they give birth to live young. For that reason, they are also called live-bearing. The biological term for live-bearing is viviparous and it refers to animals that bear live babies that have developed inside the body of the parent. So, you might think that, since mermaids have fishtails, they would lay eggs like most small fish. But this would mean that mermaids would lay thousands of tiny eggs into the water of which many would not survive. That just doesn’t sound right for such highly intelligent and rather big creatures like mermaids. Mermaids are half-human after all and they act much more like humans and mammals, who wouldn’t leave their babies floating around unattended like fish do. There are actually a few more options for how mermaids might reproduce. In the following table, I ranked them regarding how likely they are from a biological standpoint (number one is most likely). LikelyhoodPossible ways of having a mermaid babySea animal examples 5Shapeshifting to human form before birth 4Laying small eggs in the oceansmall fish 3Using a mermaid’s purse (egg case)sharks (e.g. catshark) and skates 2Egg growing inside mothersharks (e.g. zebra shark, great white shark) 1Baby in placenta (like human and dolphin babies)sharks (e.g. blue shark), dolphins, manatees So let’s have a quick look at them. You can devide the 5 options into 3 groups of reproduction: • mythical – 5 • egg-laying (oviparous) – 4 and 3 • live-bearing (viviparous) – 2 and 1 The least likely option (number 5) would be that mermaids shapeshift to human forms to reproduce and bear their babies. Like this, they could just bear their babies the same way that humans do: from between their legs. This idea stems mostly from myths and movies in which the mermaids can have human legs on land. If you think of mermaids as mythical creatures, then this could certainly be a way how they do it. But if you look at it from a biological perspective, it’s not very convincing. Do mermaids lay eggs? The next possibility (number 4) is the option of laying thousands of small eggs, which I already mentioned. But the problem is that this way of reproduction is mostly used by smaller fish and that they do not protect their eggs at all. They just float off into the ocean and even if some of them survive, the parents might never see them again. A lot of small fish eggs in an aquarium. (Picture by Juan Carlos Palau Díaz on Pixabay) From number 3 on it gets more interesting. The problem with the huge amount of tiny eggs that are unprotected (from number 4) is actually solved by some sharks and skates: they use mermaid purses (other names are devil’s purse and sea-purse). These are leathery pouches that oviparous (egg-laying) sharks and skates lay their eggs in and then place them at the bottom of the ocean. That way they can have fewer, bigger offspring, that are also protected by these thick purses. The embryo grows inside the pouch for between a few months and over a year until it is ready to hatch. You can see such a purse in the following picture. A mermaid’s purse (egg case) (Picture by Xtylee, CC BY 3.0, via Wikimedia Commons) The problem with these purses is however the same as with the eggs that float around in the ocean: they are left alone by the sharks. Even though they are better protected, they can still be attacked easily. Do mermaids bear live young? The two most likely ways how mermaids could have babies is like live-bearing sharks do it (number 2 and 1). Actually, not all fish lay their eggs somewhere in the ocean. The sharks are a great example because they are bigger fish (similar size to mermaids) and they reproduce in many different ways besides egg-laying (egg-laying sharks use mermaid’s purses). In this video by BlueWorldTV, they give a great overview of all the ways different sharks reproduce (oviparous, viviparous and ovoviviparous): By loading the video, you agree to YouTube's privacy policy. Learn more Load video As you can see in the video, the two live-bearing types of sharks are called viviparous and ovoviviparous. The way ovoviviparous (aplacental yolk sac viviparous) sharks (number 2) have babies is a step up from the mermaid purses. Because these sharks don’t lay their eggs in the ocean but instead carry them in their bellies for around a year until the pups are ready to hatch and swim away. This way the shark mothers can make sure that their offspring are protected and no other predators can eat them while they are still tiny. So, these sharks technically still lay eggs like most fish but it seems like they give birth just like mammals and humans which makes it more likely that mermaids would use this way of reproduction as well. But there is one way, that is even more likely to be used by mermaids: the fully viviparous (live-bearing) way in which the baby grows inside the mother: just not in an egg, but in a placenta just like in mammals and humans. There are actually some fish, that are viviparous: some sharks (e.g. the blue shark). The babies receive oxygen and food directly from the mom through an umbilical cord and are carried in their mother’s belly for 9-12 months until they are born. This seems to be the most fitting way in which mermaids could have babies. The same reproductive system would fit their human and their fish body parts. Both humans are and fish (like sharks) can be viviparous. It is likely that mermaids would be live-bearing like bigger shark species or sea mammals like dolphins. Behaviourally they are more similar to dolphins than sharks though. (Photo by Jonas Von Werne on Unsplash) Since mermaids behave very much like humans and other sea mammals (like dolphins), they share some similarities when it comes to reproduction as well. Sea mammals like dolphins are also viviparous like these sharks with the difference that they actually raise their babies after they are born. The shark babies do on the other hand swim away quickly after they are born. Mermaids however were often described in myths as more social creatures who look after their babies. And especially given that they are half-human (human brain!), they most likely would raise their babies as dolphins do. So that the way mermaids have babies seems to be rather clear, let’s have a look at the stages of their reproduction: mating/insemination, gestation (pregnancy), birth and also the raising of the merbabies. How do mermaids mate? Mermaids most likely mate similar to humans and other marine mammals like dolphins. (Picture by ParallelVision on Pixabay) We saw that it is most likely that mermaids are live-bearing similar to dolphins. But how do mermaids get pregnant in the first place? To find an answer to this, we have to look at the viviparous sharks and dolphins again. Mermaids most likely mate similar to dolphins: They mate by swimming on top of each other with their bellies touching. That way they can join their reproductive organs in their urogenital slits and the mermen can inseminate the mermaids internally. It is most likely that mermaids would use internal insemination because that is exactly how sea mammals like dolphins and live-bearing sharks reproduce as well. This means, the semen of the merman enters the vagina of the mermaid and thus the male sperm fertilizes the female egg in the mermaid’s uterus. The vagina and penis of the merpeople would be located in the urogenital slits on the lower end of their bellies, just where the tail starts, similar to sharks and dolphins. In the following picture you can see where the urogential opening is located on the tail of a dolphin. A dolphin’s belly with belly button and urogenital opening (where the genitals are). The mating process of sharks is however usually quite violent because the males often bite the females. And there is of course no emotional connection or love involved because sharks are solitary fish that only meet when mating. Because mermaids are half-human and most likely have a similar social life as humans (mammals), their mating would be much more similar to other sea mammals like dolphins and whales, instead of sharks (fish). Dolphins have strong social bonds and when they mate it looks somewhat like a dance, as you can see in this video: By loading the video, you agree to YouTube's privacy policy. Learn more Load video So when mermaids mate, it would likely look similar, because they are part mammal as well. The only difference might be that dolphins are not monogamous. That means they do not stay with only one mate for their whole lives, but they often change mates. Mermaids might however be mostly monogamous like many humans. But this can’t be said for sure. After mating, the female mermaids would then be pregnant. How long are mermaids pregnant? To have an idea of how long other marine animals, that are live-bearing, are pregnant, I complied a list of their gestation periods (length of pregnancy) in a table. I included dolphins, manatees and viviparous sharks that have a smaller and average size and could thus be compared to mermaids. SpeciesLengthGestation Period Common Bottlenose dolphin6.5-13 feet (2-4 m)12 months Indo-Pacific bottlenose dolphin8.5 feet (2.6 m)12 months Spinner dolphin4-8 feet (1.3-2.4 m)10 months Pacific white-sided dolphin7.2 feet (2.2 m)10 months Short-beaked common dolphin5-8.8 feet (1.5-2.7 m)10-11 months West Indian (=North American) manatee 11.4 feet (3.5 m)11 months Dugong8.5 feet (2.6 m)12 months Blue shark6.9-7.8 feet (1.8-2.4 m)9-12 months Bull shark7-11 feet (2.1-3.3 m)10-11 months Whitetip reef shark5.3 feet (1.6 m)12 months Lemon shark10 feet (3 m)10-12 months Porbeagle shark8.2 feet (2.5 m)8-9 months Salmon shark6.5-8 feet (2-2.4 m)9 months Silvertip shark6.6-8.2 feet (2-2.5 m)12 months Hammerhead sharks13.1 feet (4 m)11 months Mermaidmaybe 5.2-8.2 feet (1.6-2.5 m)between 9-12 months Table: Gestation periods of some dolphins, manatees and viviparous sharks that could have similarly long pregnancies as mermaids. As you can see, most dolphins, manatees and viviparous sharks are pregnant between 8 and 12 months. This would suggest that mermaids would be pregnant for a similar amount of time, given that their lower bodies are fishtails or tails. If you consider that humans are also pregnant for 9 months, it is even possible that mermaids’ pregnancies last exactly the same amount of time. How do mermaids give birth? Mermaids would likely be born like the offspring of live-bearing sharks and dolphins. After growing in a placenta in the mother’s womb for about 9-12 months, the mermaid baby is born coming out through the urogenital opening of the mermaid mother’s tail. As I mentioned before, the urogenital opening would be located on the bottom side of their lower bellies right where their tails start, just like in dolphins (see the picture of dolphin belly above). Since dolphins and humans (mostly) only have one baby, mermaids would probably also only have one child per pregnancy. Mermaids would give birth to one merbaby or mer-twins by bearing them life through their vagina. Then the umbilical cord, that connected them to their mother, would rip and they would instantly start to swim. By the way: the reason why viviparous sharks and dolphins etc. have a belly button, like us, is actually because of the fact that they were connected to their mothers through an umbilical cord in the womb! In this video you can see what a dolphin birth looks like: By loading the video, you agree to YouTube's privacy policy. Learn more Load video A mermaid birth would likely be very similar. How do mermaids raise their babies? Other than (viviparous) sharks and other fish who leave their babies right after birth, mermaids would most likely raise and breastfeed their babies just like humans and sea mammals like dolphins do. Dolphins actually breastfeed their calves for up to 2 years and stay together until they are teenagers at between 5 to 10 years old. They have a strong motherly bond to their calves but they also help each other with parenting and looking after the calves. The dolphin mothers teach their calves everything they need to know and even play with them, just like humans do. The learning starts right after birth when the mother teaches the calf how to breathe. Mermaids would raise their babies lovingly. (Picture by Tatyana Kuntuganova on Pixabay) Since mermaids are half-human and behave very much like humans and sea mammals, especially dolphins, they would most likely raise their babies like humans and dolphins as well: raising them for many years (until teenage age) while teaching them everything they need to know and playing with them. In the end, even if this seems to be the most scientifically probable way mermaids would have babies, it is speculation because up to date, no evidence of mermaids and thus no evidence of how they reproduce has been found so far. If you are interested, you can read more about how mermaids might look like if they do exist in my article that talks about whether mermaids are real. You might also like: • Where do Mermaids Sleep? An ocean cave in which mermaids might sleep Maybe you have heard the joke about where mermaids sleep. The answer is “in a … Read More • What do Mermaids eat? Since mermaids live in the ocean, that’s also where they must get their food from. … Read More • How do Mermaids use the Bathroom? toilet sign with mermaid and woman If mermaids are half human and half fish, how do they use the bathroom? Would … Read More
Web Development How to Use an HTML Excel File Input By bgilley227 · My research team is building a website that requires the user to input an Excel file (.xlsx) with 6 different sheets. Each sheet has a different quantity of data. I understand that to create a file input button, you use the following format: <input type="file" accept="application/vnd.openxmlformats-officedocument.spreadsheetml.sheet" /> However, I'm not sure how to process the data inside of the Excel file the user inputs. We are using Python's flask module as the web framework, so ideally, the contents of each sheet would be loaded into dictionaries on the flask file. I am not sure how to extract the data from each sheet of the file they input. Any help is appreciated. Thanks! best answer Collapse - Your developer could use Pandas (that Python library.) by rproffitt Moderator In reply to How to Use an HTML Excel ... Your posts so far tell me about your use of Flask but why HTML given the story? Why not Pandas to get inside the Excel sheets? Tutorial at https://www.dataquest.io/blog/excel-and-pandas/ But let's back up to the beginning. I feel you haven't completed your System Design. This is something I see missing in many CompSci paths today. We used to call it Systems Analysis but for here you have the Flask, the Excel file and now need to complete your System Design. 1. The web page that the user sees and uploads the file. 2. The backend that places the file where you feel it needs to be. 3. The other backend (Python + Pandas) to pull out the data to the format that is needed for the next step. Continue with more steps. If something is too hard, break it down into more steps. Repeat the break down until it's something you or your programmers can handle. Thread display: Collapse - | Expand + All Answers Collapse - Re: spreadsheet by Kees_B Moderator In reply to How to Use an HTML Excel ... That's a file upload. Just save the file and use any program on the server (like MS Excel or LibreOffice Calc) to read and process it. That might need some macro's. Collapse - Reply to Kees_B by bgilley227 In reply to Re: spreadsheet This is for a website with no system operator or anything like that. When the user inputs the file, it has to be automatically processed and put into Python dictionaries to be sent to the back end for calculations. I'm just not sure how to go from the input button to all of the contents of the file being put into Python dictionaries. Is there a way to work with the HTML input directly, or could the file automatically be saved to the directory, and then another function could be written to work with that file? Thanks Collapse - Re: save by Kees_B Moderator In reply to Reply to Kees_B Yes, it's easy to save the file (the sites I read talk about a save-method, but I can't give the details) in a folder. I wouldn't call that processing. And once it's in a folder the OS can do with it what you want. Use at in Linux or the task scheduler in Windows. But why not save it directly in a folder the backend can read? Or, even easier maybe, give each user an ftp-script that copies his spreadsheet to some folder near the backend. Why do you need an intermediate site? Collapse - by bgilley227 In reply to Re: save It would certainly work if the file was saved directly in a folder that the backend can read. I'm just not sure how to take the HTML file input and save it to a directory on the server. Any tips with this? I could be searching for the wrong things, but I can't find much info on this, and what I do find involves a lot of JavaScript (which seems unnecessary for such a common task). Collapse - Re: save file by Kees_B Moderator In reply to Re https://flask.palletsprojects.com/en/2.0.x/patterns/fileuploads/ gives example code to upload and save a file in Flask. Worth a try, I'd say. Collapse - Reply to rproffitt by bgilley227 In reply to You developer could use P ... Thanks for the response. My team has already created a function that can read the Excel file that the user inputs on the HTML page. The Excel file will always be in the same format, so we have used Pandas to read the file. Right now, this function references a template Excel file that is in the same directory. In practice, the Pandas function won't read the template file. It will read the file that the user inputs. Our problem is that we do not know how to save the Excel file that the user inputs to the same directory as the Pandas function (or any directory for that matter). We do not understand how the Excel file that is input using a submit button in HTML (with type="file") can be saved to a specific directory. Thanks for the help Collapse - OK so the problem right now is by rproffitt Moderator In reply to Reply to rproffitt Where is that file that was uploaded? That varies with the webserver setup. Example: There are many other tutorials on configuring where the uploaded file goes. Collapse - by bgilley227 In reply to OK so the problem right n ... This helped. Had to edit the HTML form and the Flask file. Thanks! Related Discussions Related Forums
Understanding environmental psychology helps students with productivity Courtesy of Pixabay Some people like studying at coffee shops. Nowadays, there is even websites that help replicate the sound of a coffee shop at home. Sven Kline, Contributor For students, cramming for final that’s less than a week away or trying to submit a difficult assignment by 11:59 p.mcan be frustratingbut environmental psychology has the answer to productively get all those things done.  Before you take those painkillers, down that Monster energy drink and pop in those headphones to endure your psyche being torn asunder by deadlines, stop and look at your surroundings. Are you at home in bed?  Sitting at the dining room table?  Or are you at a coffee shop?  The reason you might struggle to concentrate on your work could be as easy as the environment you choose to work in.    The term to reference why environment affects people and their work output is known as “environmental psychology,” a small field of psychology seeking to understand how and why our environment impacts us, how we can leverage that knowledge to our advantage, and what we can do to improve our relationship with the world around us” according to Courtney Ackerman of PositivePsychology.com.  However, every person works differently and has their own unique preferences when it comes to the best place to study.  That niche environment where a person feels comfortable working in is known as the “ideal environment,” varying from place to place from person to person.   Some work better surrounded by the aroma of fresh brewing coffee while others do their best sitting on their favorite sofa at home dressed in comfortable pajamas. Every person naturally associates different environments with productivity.    “My preferred work environment is anywhere relatively quiet with a big table that I can sprawl my work out on,” said David Simpson, 24-year-old geological sciences major.  “I have two dedicated workspaces; one at school and one at home. My motivation to work in those spaces is constantly changing, but when I’m not getting anything done at one workspace, I’ll roll into the other and it will help keep me refreshed by changing scenery.”    A new concept that has grown in popularity in recent years is the notion of not working while in bed, as it leads to a lack of productivity due to associating their bed with sleep and resting.   “Because you’ve trained your body to associate your bed as a place to study or get homework done. Once you lay in bed to call it a night, your mind will continue to think,” according to an article by the American College of Healthcare SciencesStudying in bed earlier in the day can actually rob you of rest.”   Like how everyone associates a bed with sleepit’s almost the same thing associating the smell or taste of freshbrewed coffee with productivity and concentration. Those are both examples of environmental psychology.    “Sound in a space affects us profoundly. It changes our heart rate, breathing, hormone secretion, brain waves, it affects our emotions and our cognition,” said author and sound consultant Julian Treasure in an article titled “How the 5 senses help inspire workplace productivity.”    Arabella Lino, 24-year-old graduate student and biology teacher at Austin High Schoolprefers a work setting that is not too quiet.    “Somewhere lively, with lots of people, but not so loud that I can’t concentrate, like the library or Hillside Coffee & Donut. I’m there for the purpose of studying whereas at home I can get distracted by a million different tasks or chores. At a coffee shop, I can enjoy a nice coffee to help make studying more enjoyable. Being in public forces me to work.”   Sound and sight are perhaps the most immediate senses anyone can think of when trying to obtain the ideal environment, but just as important is taste.  “The smell of coffee and also drinking it can be really comforting which helps stressful work seem not as bad,” Lino said.   Aside from relieving stress, taste can also be used as a helpful little tool when prepping for tests.  In an article by Psychologist World, gum can help recall memory for tests as found by researchers at the University of Northumbria in Newcastle, England.    Seventy five participants in the study were asked to take part in a 20-minute memory test in which; one third of participants chewed gum; one third carried out the motions of chewing gum, without any actual gum; and one-third control group did not chew gum,” the article said.  Researchers found that recall was improved by 35% among participants who chewed gum, most significantly in delayed word recall tests; perhaps indicating possible benefits for students revising for, and taking exams, chewing gum.”   Sven Kline may be reached at prospector@utep.edu
Lalu Wetlands in Early Winter Lalu Wetlands Lalu Wetlands locates in Lhasa, Tibet Autonomous Region. Known as the ‘the lung of Lhasa’, Lalu Wetlands is also the “the big oxygen bar” of Lhasa. Like usual, the first ray of sunshine in the morning awakes the water in the Lalu Wetlands, reflecting the early winter color with golden and red leaves, blue sky and yellow grassland. On the typical Tibet plateau wetlands, water vapor rises above the wetland meadows, across the reed marshes. And the plants here are dominated by plateau aquatic, semi-aquatic and grassland plants. At an attitude of 3600m on the plateau, covering a total area of 12.64 km2 in the National Nature Reserve, it is China’s highest and largest urban natural wetlands. Lalu Wetlands From the view of the Lalu wetlands, the Potala Palace and the wetlands forms an unbelievable picture scroll. The warm tone of the wetland plants sets the cold tone of the mooning Potala Palace off. The sun rises higher and higher and the water vapor gradually disappears. So that the Potala Palace and Lalu Wetlands all integrates into a golden warm tone. At this point, a yellow and blue, cold and warm, sunshine and water vapor together play out a gorgeous visual movement in the morning. About Author Carol Tian
Monday, November 26, 2012 Building a Better, Greener Home As energy costs increase and people become more concerned about their impact on the environment, it would seem to be logical to focus some of our efforts on building better, more energy efficient homes. In the US, our homes and businesses account for half of our energy usage. By building more efficient houses, we reduce the energy they consume. This saves energy over the life of the building or the next 50 to 100 years. There are a number of ways in which we can greatly improve the energy efficiency of our homes. This document provides a list of things that can be done to build a better, greener home. Some of these items cost next to nothing while others do increase the total cost of the house. But, the increase in initial cost can typically be easily offset by the reduction in the energy cost over time. The Building Envelope Improving the energy efficiency of the building envelope probably offers the biggest return on investment. In the US, most new homes, even very expensive ones, are being built using the same methods that have been utilized for over 100 years. 2x4 frame construction is fine for building a reasonably strong house in an efficient manner. But, this type of construction is found lacking in the are of energy efficiency. Since the wall cavity formed by 2x4 construction is only 3.5” deep, there is a limit to the amount of insulation that can be installed. Simply increasing the framing members to 2x6s adds another 2” of insulation to the wall cavity. This allows you to add 42% more insulation. Wood framed buildings also suffer from thermal bridging. This occurs when heat more easily travels through the wood framing members, reducing the overall thermal efficiency of the wall system. Other building systems do not suffer from this problem to the extent that a stick framed building does. Adding a layer of foam sheathing to the exterior of the frame will further increase the energy efficiency of the building and reduce thermal bridging to some extent. Another large contributor to energy loss with a wood framed building is air infiltration. Since a wood framed building is constructed with many parts, there are many cracks and crevices through which air can leak into and out of the home which is air infiltration. Materials such as house wrap can be used to help combat this issue, but it still remains a problem. Again, other building materials do not suffer this problem to the extent that wood framed buildings do. Other building materials such as SIPs or ICFs offer energy efficiency increases. SIPs, or Structural Insulated Panels, are a composite material made of an inner layer of EPS or other foam with an exterior skin of OSB on each side. This creates a panel that is light, strong and very well insulated. The most common thickness is 6”, but they can be manufactured to almost any thickness desired. The thicker the foam, the more the insulation value of the wall. SIPs are typically used for wall and roof panels, but can be used as floor panels also. SIPs are cut to size at the factory and assembled at the job site to form the shell of the home. Since SIPs are made of large panels, there are fewer areas for potential air infiltration compared to frame construction, further improving energy efficiency. ICFs or Insulated Concrete Forms are another high efficiency building option. ICFs are essentially hollow foam blocks that are assembled at the job site to form walls. Once the walls are complete, they are filled with concrete. The concrete provides the structural part of the wall and the foam on each side provides the insulation. Most ICFs have between 5” and 5.5” of insulation. The concrete in the middle of the wall acts as a thermal mass that buffers temperature fluctuations of the building, adding to the overall efficiency. Since ICFs are filled with a continuous layer of concrete, there is virtually no air infiltration through the wall. These factors make ICF homes very energy efficient. Additional advantages of ICFs are the strength of the wall system and sound deadening. The steel reinforced concrete inside the ICF wall makes them the strongest common building material available for a home. Regardless of what type of wall system you choose, make sure that all the cracks and crevices open to the outdoors are caulked well. Caulking is really cheap but can save you a lot of money by reducing heat loss. In addition to the walls, you also need to consider the insulation below the floor and above the ceiling. In many homes, there is no insulation below the floor whether the home is built on a concrete slab, over a crawl space or with a basement. If the home has a slab floor, insulation should be placed below the concrete before it is poured. The typical method is to use 2” of foam sheets below the slab. This insulation helps to keep the slab floor from transferring your heating dollars to the ground below. A crawl space or unfinished basement is typically cooler than your living area. Heat will also transfer to these cooler areas below the house, causing your HVAC system to replace it. Adding insulation below the floor will reduce this heat transfer. If you have a finished basement with a slab floor, it should have insulation below the slab just like any other area with a slab floor. The attic of your home should also be well insulated. Most areas have requirements that specify the R-value of your attic insulation. It is also important that care is taken to carefully seal any areas of potential air infiltration into the attic. Since heat rises, the warm air in your home will try to escape through any small openings into the attic. Problem areas include around light fixtures and electrical or plumbing penetrations. These areas can be sealed individually or all at once. One option is to apply a thin layer of expanding foam to the floor of the attic (on top of the ceiling wall board) and then to add a thick layer of fiberglass or cellulose insulation above it. The foam seals all the air leaks and the other material provides the bulk of the insulation. Or you could use expanding foam for all the attic insulation, but this does increase your costs. To verify rate of air infiltration of your home, you can have a blower door test performed to help identify any remaining air leaks. A blower door is a device that is temporarily installed in an exterior doorway. This device has a fan that pushes a known quantity of air into the house. The technician can then determine how much air is leaking from the building and where the leaks are. The goal of a blower door test is to identify and eliminate any large areas of air infiltration that can reduce the efficiency of the house. The HVAC System Most homes built today have some form of HVAC system, which stands for heating, ventilation and air conditioning. The most common type of system utilizes forced air for both heating and cooling. The contractor who installs the HVAC system calculates how large it must be to meet the peak demands of the house. It is very important that the system not be too large for the home. An HVAC system that is too large will do what is called short cycling. When an oversized system turns on for either heating or cooling, it will only run for a few minutes before it shuts off because the home has reached the required temperature. The next time the system is called on, again it will only run for a few minutes. To be efficient, an HVAC system needs to run for an extended period of time. This is especially important in the air conditioning mode. One function of air conditioning is to remove excess moisture from the air inside the home. If the HVAC system is short cycling, it has no chance to remove this moisture. A properly sized system will run for a longer period and do a much better job of removing moisture. Besides having a correctly sized HVAC system, additional energy savings can be gained with a dual speed system. Most HVAC systems only have one speed, they are either on or off. A dual speed system has two speeds or half speed and full speed. Most of the year, you do not need the full capacity of your HVAC system. The full capacity of your system is typically only required on the coldest winter and the hottest summer days. Except for days with extreme temperatures, you need less HVAC capacity. A dual speed system provides you with this capability. The half speed option allows the system to run more efficiently for longer periods of time and consumes less energy. Of course a dual speed system does cost more than a single speed system, but over time, your energy savings will more than offset the extra cost. Another important issue with the HVAC system is the location of the air distribution ducts. The ducts for your system should be located inside the temperature controlled envelope of the home. The ducts should never be located in a non-conditioned attic space. Non-conditioned attic spaces experience extremes of heat and cold. Even though ducts placed in an attic space may have a small amount of insulation around them, you lose a lot of the energy when heating or cooling energy is transferred to the non-conditioned area. The joints in the ducts of the HVAC system should be sealed to prevent air leakage. A special mastic compound is commonly used for dealing the joints in the ducts. Typical “duct tape” is not an acceptable method. After a year or so, the adhesive on the duct tape will fail and you will have leaking ducts. Windows and Doors If you are building a highly efficient house, it makes sense to use good quality windows and doors. In regard to doors, there are typically solid wood doors and doors made from either fiberglass or steel with some type of insulation material in the middle. The solid wood doors are beautiful but generally require more upkeep since they are a natural material. Fiberglass or steel doors lack the natural beauty of wood, but they do generally require less maintenance and offer better insulation qualities. As far as windows, you have a few more choices. Windows are typically made of wood, fiberglass, vinyl or aluminum. You can also get wood windows that are clad on the exterior with aluminum giving you the advantage of a durable exterior finish while keeping the beauty of wood inside. Beyond the style of any specific window, the most important things to consider are their energy efficiency and the maintenance they will require. Commercial aluminum windows are typically much less energy efficient than residential windows. The energy performance of doors and windows is typically expressed as the U-value. The lower the U-value, the better the thermal performance. Builder grade windows generally have a U-value of around .35. Higher quality windows will have a U-value of .30 or better. The same goes for doors, there are many available that have a U-value of .30 or better. Your windows and doors are one of the weakest points in the thermal envelope of your home. Cheap windows and doors will reduce the energy efficiency of your home and cost you money every time you pay your utility bill. Beyond the energy efficiency of your windows and doors, you and/or your designer need to pay attention to the quantity and direction your windows and doors face. Since windows and doors have the lowest insulation value of any part of your house, the more of them you have, the less energy efficient your house will be. Doors and windows can also impact the energy efficiency of a house by their location in relation to available sunshine. We all know that the sun rises in the east and sets in the west. In the US, the winter sun will shine through south facing windows, helping to warm the interior. During the summer, the sun is at a steeper angle in relation to the ground and will not shine into south facing windows with properly designed overhangs. Windows facing east or southeast will typically capture the morning sun at all times of the year. This may or may not be a good thing. You typically do not want the sun warming the interior of your home on a hot summer day. West facing windows pose additional problems. They will typically capture sunshine during the hottest part of a summer day. This heat gain will cause your HVAC system to work that much harder to keep things cool. You can protect your east and west facing windows with shades or awnings to help reduce heat gain. You can also take advantage of trees to provide shade in required areas. Passive Heating and Cooling Your home can also be more energy efficient by taking advantage of passive heating and cooling. Passive heating and cooling is simply heating or cooling our homes using no mechanical means. Our forefathers knew about passive heating and cooling. They did not call them this, but they took advantage of them just the same. They simply designed their homes to take advantage of the suns heat in the winter and to allow cooling breezes to flow through the home in the summer. We had forgotten many of these features with the advent of mechanical HVAC systems. Passive heating involves allowing the suns energy to enter and warm the home during the cooler winter months. This is also called solar heat gain. The home should be oriented with the long axis oriented east to west. This orientation allows for windows to face due south for maximum solar gain. Windows facing southeast or southwest will also allow solar heating, but at a slightly less efficient level. If the roof overhangs above your south facing windows are properly designed, little of the suns heat will enter the home during the summer. There does need to be a balance regarding the number of windows on the south side of the home. Too many windows will allow in too much energy causing the house to overheat, even on the coldest days. The type of windows you utilize can also make a difference. With the advent of low-E windows, you can choose how much of the suns energy you allow into the home. Some windows will block most of the thermal energy from the sun while others will allow some of the suns energy to enter the home. Pay attention to the solar heat gain coefficient (SHGC) of the windows you buy. The SHGC is expressed as number between 0 and 1. The lower the SHGC number, the less of the suns energy will be allowed through. Different areas can utilize windows with different SHGC ratings. If you live in the north, you may want the maximum solar gain and windows with a higher SHGC rating. If you live in the south and do not need much passive heating, windows with a lower SHGC rating would be appropriate. Passive cooling involves designing the house to promote a natural flow of cooling air through the building. A typical design incorporates windows close to the floor and some type of vent or outlet in the ceiling. The low windows allow cooler air, preferably from a naturally shaded area to enter the home and warmer air to rise out through the roof. This takes advantage of warmer air rising and exiting at the roof. Daylighting is simply using natural light to illuminate the home. If ample natural light enters the home, the need to use artificial light during the daytime is reduced or eliminated, reducing energy consumption. The key with daylighting is to admit enough light to make people feel comfortable, but the incoming sunshine should not be enough to cause the temperature in the room to increase. There are a number ways to increase the amount of daylight into all parts of the home. Again, the home should be oriented lengthwise on an east-west axis. You want to take advantage of sunlight from the south and north as much as possible. Utilizing daylight from the east or west is problematic because of the angle of the sun as it rises and sets. Windows on the south side can be shaded in the summer to admit light but not heat. Windows on the north side of the building will admit light but rarely cause a problem with glare. Clerestory windows or windows mounted at the top of the wall, near the ceiling, are common configurations to get natural light into the interior of the building. Clerestory windows are typically a row of small horizontal windows located in the upper portion of the roof. Like other windows in the home, clerestory windows will admit light at all times of the year, but can also admit direct sunshine during the winter months to provide passive solar gain. Either clerestory or high mounted windows might utilize a light shelf. A light shelf is simply a horizontal shelf located just below the window opening. The light shelf reflects the incoming sunlight back up to the ceiling. This helps to further disperse and soften the light. A light monitor is another way to enhance daylighting. A light monitor is essentially a box mounted on top of the roof with a window facing either south or north. A south facing window would be shaded by the overhang to block direct sunshine during the summer. Like a clerestory window, sunlight enters the light monitor and is reflected down into the room below. Light diffusing shades are sometimes used with a light monitor to further disperse the sunlight. Sun tubes are yet another option for admitting natural light. A sun tube is a special reflective tube and cover that mounts in the roof. The sun tube captures sunshine and directs it down the tube and into the home. These are useful for dark bathrooms and hallways. Sun tubes do not admit a lot of light but do help in areas that would otherwise be dark. You want to avoid the traditional skylights. Skylights admit large amounts of sunshine and heat into the home during the summer months. This direct sunshine can increase the interior temperature of the home, causing the air conditioning system to work harder and consume more energy. Designing your home for adequate daylighting can reduce your energy bills from lighting and possibly reduce your heating bills in the winter by providing some passive solar gain. Energy Efficient Appliances and lighting Some appliances use more energy than others. Typically, the less expensive models use the most energy. You can reduce your energy consumption by purchasing better quality, more efficient appliances. Energy Star rated appliances are generally the most energy efficient. One appliance that can make a big difference is the clothes washer. Front loading washers use less than half the water of the standard top loading models. This reduces the amount of water used as well as the amount of water that must be heated for washing. In addition, they spin the cloths faster and remove more water from them before they go to the dryer. Less water in the cloths means less drying time and more savings still. Chances are the few dollars extra you pay for a high efficiency appliance will be recouped over its life. About 20 to 25 percent of all energy used by a home is used for lighting. If you utilize more efficient types of lighting, you can reduce your overall energy consumption. The incandescent light invented by Thomas Edison has been great for the past 100 years but has never been very efficient. Of the energy used by an incandescent bulb, only about 10% is converted into visible light while the remainder is turned into heat. Today, there are number of lighting options that use less energy. Halogen lights use about 20% less energy than incandescent lights. Halogen lights are typically small, have high intensity and are available in a number of forms: desk and floor lamps, surface mount lamps, track lights and canister style lights. They also are available in a number of wattages. One drawback to halogen lamps is that they get very hot. Compact fluorescent lamps or CFLs are another lighting option. CFLs use about 75% less energy than an equivalent incandescent light. So, a 60 watt equivalent CFL will only use about 14 watts of electricity. CFLs are not quite as flexible as halogens in that there are a limited number to light styles and wattages available and most of these cannot be used in conjunction with a light dimmer. But, CFLs do use much less energy and they can last many times longer than incandescent bulbs. An emerging lighting technology is LEDs or light emitting diodes. LEDs have been around for many years in electronics and more recently in flashlights. But, many manufacturers are working on bulbs that we can use in our homes. LEDs hold great promise because they will use a fraction of the energy of other lighting types and they will last even longer still. Look for LEDs to become a viable option in the near future. Making some good choices in your appliances and lighting can save you energy and money on every utility bill. Solar Water Heating Heating water consumes about 15 to 20 percent of the total energy used in the typical house. In most areas, adding a solar panel to your roof to help heat your potable hot water will reduce your overall energy usage. Solar water heating setups are typically active systems, requiring a pump and thermostatic controls to turn the system on and off. The pump and control can be driven off of standard line current or they can be run off of a photovoltaic (PV) solar panel that can produce the electricity. The beauty of a system that runs off of solar energy is that it uses no energy and produces heat. The PV powered system does cost more though. This is a relatively short list with a lot of parts. But, there is great potential to dramatically reduce energy usage of your home without sacrificing comfort or convenience. By taking more dramatic steps, you can reduce your energy usage even more  If you choose to use some of these energy saving options, you should check and see if you are eligible for any government sponsored tax incentives. At this time, there are tax incentives on geothermal heating and solar water heating systems. There are also incentives for Energy Star rated homes once the homes energy efficiency has been verified by a certified technician. You may also want to implement additional solar options in the future such as PV electrical generation capability. As more PV systems are sold, their cost will come down and they will become even more economically viable. To prepare for this prospect, you might do a few things to make your home “solar ready”. You can work with your electrician to add a couple un-used conduits from the mechanical room to a convenient location on or near the roof. An access panel near the roof might also be a good idea. You also need to leave a little spare space in your mechanical room for the additional  power conversion components of the PV system. These steps cost very little, but will make it much, much easier and cheaper to add a PV system to your home at some point in the future. You can download a PDF of this article here: No comments: Post a Comment
Stock market crash on October 29th, 1929. (Black Tuesday) The official surrender of the war in Europe didn’t end until 1955, but different countries pulled out at different times President(s) at time: Herbert Hoover- Franklin Delano Roosevelt The Great Depression The great depression was a worldwide economic depression preceding World War II. For most countries, it started in 1930, and lasted until late 1930s, or mid 1940s. It was the longest, most depriving, and most widespread depression in the 20th century. It officially became worldwide news when the stock market crashed on October 29th, 1929, later known as Black Tuesday. Te effects were instantaneous and drastic. Cities that relied on heavy industries were hit hard, and construction was virtually halted in many countries. Personal income, tax revenue, profits and prices dropped, while international trade dropped by more than 50%. Unemployment in the U.S. rose to 25%, and in some countries, as high as 33%. Some countries were able to recover by the mid 1930s, but others weren’t as lucky, the depression lasting until after WWII. Though the exact cause is undetermined, many factors set the depression up; bank errors and failure, the stock market crash, etc. Many people believed it was President Herbert Hoover’s fault, on the grounds that he was in power when it happened, and he didn’t do everything he could to end it. When Franklin Delano Roosevelt was elected as president in 1932, he said in his election speech; “”I pledge you, I pledge myself to a new deal for the American people… This is more than a political campaign. It is a call to arms.” As soon as he was elected, FDR did everything he could to fulfill his pledge, and bring recovery to America. He started the C.C.Camps; groups of workers who set out to build the highway system across America, and different buildings. As well as that, one of the things that helped break the depression was the re-legalization of alcohol by the repeal of the Prohibition Act. This among other things helped hugely, and the depression finally broke with the start of WWII. tags: ben, pre-World War II, articles Image provided by
2-04 Public versus Private Companies & IPOs versus Secondary Market Securities chapter2-4Now that you know what an exchange is, it’s necessary to make a very important distinction between what shares trade on exchanges and what shares don’t. Most companies are private companies and don’t trade on exchanges. The barber shop and the florist on the corner, the guy that cuts your grass, and the plumber that fixes your sink are all likely small companies that are owned by the founder. As companies grow, they typically find they need additional money to expand. This extra cash can come from company profits, the founder’s personal funds, borrowing (think debt and bonds here), or giving away part of their ownership (think equity here). Selling ownership to a few friends and family would be considered a “private offering” where just a dozen or so people buy ownership, but selling ownership to hundreds or thousands of investors is what is referred to as a “public offering”. When a company decides to “go public”, they enlist an investment banking or brokerage firm to sell their shares to the public. You may have heard the term “IPOIPO stands for Initial Public Offering. This represents the FIRST opportunity for the public to purchase shares in a particular company.“. IPO stands for Initial Public Offering. This represents the FIRST opportunity for the public to purchase shares in a particular company. Until a company’s IPO date, they have been functioning as a privately held entity. One or a few people owned all of their stock and they were not registered or approved by the SEC (Securities Exchange Commission). As a potential investor, you should understand a bit about the IPO process from its beginning. The IPO doesn’t happen on a whim. At a bare minimum, it involves the following. • Compiling an impressive “track record” in business, displaying good profits and future income trends. • Carefully considering the following: 1. Market for the stock (Would people be interested in buying shares?) 2. Ramifications of giving up large chunks of ownership to others 3. The potential benefits (How much money could it raise?) 4. The high cost of lengthy IPO preparation (There is a ton of paperwork required.) 5. How the new money could help grow the company • Assembling a team of accountants, attorneys, and advisors who are experienced in IPOs and SEC registration and approval. • Being financially stable enough to afford the time (the process is time consuming and time sensitive) and the large expense of assembling all the SEC-required paperwork (which is massive and detailed), which is necessary to obtain approvals and permissions for an IPO. • Locating a securities dealer or investment bank willing to sponsor your IPO to the investment market. These entities are the underwriters of your first public sale of stock. As an investor, you should be aware that you are typically taking more risk when dealing with an IPO than with other stock purchases. Since the company has never had publicly traded stock, you have little assurance that their IPO price will stabilize or increase. However, sometimes you encounter an IPO like Google (GOOG) and your newly acquired stock may double, triple or even quadruple in a short period! When you buy shares of an IPO, your money goes directly to the firm that you are investing in and they use it for their expansion plans. After you have bought shares in an IPO and you want to sell your shares, you must sell them on the secondary market, like the NYSE, AMEX, or NASDAQ. These shares that trade on exchanges are owned by individuals and other businesses and are sold to other individuals and businesses. When a stock trades on one of the exchanges, no more cash goes back to the company. This is in contrast to an IPO, where the seller is the company marketing their own stock and the company gets the cash from the sale of their stock. The secondary market is the major purveyor of securities around the world. To see the latest IPO’s hitting the market, see Yahoo!’s IPO center. Mark's Tip Don’t think that just because you have a brokerage account at Etrade or Schwab that you will be able to participate in an IPO. The investment banks typically sell those initial shares to other banks, brokerage firms, and high net-worth individuals. When Google went public, E*trade was given the right from Google to sell a certain number of shares, and you had to enter a lottery with Etrade to win the right to buy 100 shares of Google. I didn’t win the Etrade lottery for the Google IPO but one of our employees did. He bought 100 shares at $85 and sold it within 30 days at $125. He made a great 50% in 30 days, but within a year the stock hit $299 for a staggering 252% gain. Comments are closed.
Can an Apple a Day Really Keep Cavities Away? You’re probably familiar with the old adage, “An apple a day keeps the doctor away.” But what can an apple a day do for teeth? Can the delicious fruit really keep your oral health in check and your teeth free of decay? Sure, there’s no denying the overall health benefits of apples. But, if you think an apple a day will keep plaque off your teeth — think again. Plaque and Bacteria According to a recent study, chewing an apple actually increased the amount of plaque on the teeth of test subjects. This was both immediately after consumption and up to 24 hours later! However, the news wasn’t all bad. The study also discovered that the saliva generated from eating an apple helped clean the mouth of bacteria. This happens because your saliva counteracts acids left behind in your mouth. It also breaks down foods, cleaning harmful debris from your teeth and providing other nutrients. Similar to Toothbrushing The study concluded that “chewing an apple does not necessarily have a mechanical plaque removal effect.” But, an apple does produce “an immediate reduction in salivary bacterial vitality, similar to that achieved with tooth brushing.” If you were thinking that eating an apple would provide the same benefits as brushing your teeth, you’re wrong. Two minutes spent cleaning your teeth twice a day cannot be imitated through other means. Not even flossing! And, it goes without saying, that no amount of apple-eating, flossing, and/or brushing should keep you from visiting us every 6-months for dental hygiene cleanings. Having your teeth cleaned can prevent gum disease, which leads to early tooth loss. Is it time for an appointment? Contact us online, or give us a call today! 818-776-1236
As the level of deployment and utilization of renewable energy sources, including wind and solar, continues to rise, large-scale, long-term energy storage technologies that could accommodate weekly and seasonally energy fluctuations will play a significant role in the overall deployment of renewable energies in the future. Storing renewable electrons, using either electrochemical or photoelectrochemical processes, in the form of chemical bonds, e.g., fuels, has the potential to meet the long-term, terra-watt scale energy storage challenge. Renewable hydrogen, in particular, is a centerpiece for renewable fuel production and deep de-carbonization of multiple sectors in our society. Cost-competitive renewable hydrogen can be directly used in the transportation sector for fuel cell cars, in the electric grid sector for electricity firming and load balancing and in the industry sector for metal refineries or biomass upgrading. In addition, coupling with the carbon and nitrogen cycles, renewable hydrogen can be readily processed with known and well-established thermal-chemical processes to generate hydrocarbon fuels and ammonia. Xiang's research team, as part of the DOE HydroGEN Benchmarking project, is working on Protocols and Best Practice documents on advanced water-splitting technologies, including high/low temperature electrolysis (LTE/HTE), photoelectrochemical (PEC) and solar thermochemical (STCH) waters splitting. The Benchmarking team also hosts annual HydroGEN Workshop and bring together research community from four advanced water-splitting pathways to review and discuss roadmaps, techno-economic analysis and deployment of renewable hydrogen productions. Xiang's research team, as part of the Joint Center for Artificial Photosynthesis (JCAP), has designed and developed a portfolio of fully integrated, high efficiency solar-hydrogen cells with many unique attributes. Under DOE-SBIR Phase-I and Phase-II projects, as well as working with multiple industry partners, including Tetramer Technologies and SoCalGas, Xiang's research team continues to work on materials and devices for stable, scalable and cost-competitive generation of H2 directly from sunlight.
Vitamin C: Everything You Need to Know Do you reach for an orange, a glass of orange juice, or a vitamin C tablet at the first sign of a cold? If so, you aren’t alone. It’s an impulse nudged by Vitamin C and the Common Cold, written in 1970 by Linus Pauling, a double Nobel laureate and self-proclaimed champion of vitamin C. Pauling fervently believed that megadoses of vitamin C—between 1,000 and 2,000 milligrams a day (the amount in twelve to twenty-four oranges!) could prevent and abort colds . . . and could do the same for cancer. There’s no question that vitamin C plays a role in fighting infection. It helps make collagen, a substance you need for healthy bones, ligaments, teeth, gums, and blood vessels. It helps make several hormones and chemical messengers used in the brain and nerves. It is also a potent antioxidant that can neutralize the tissue-damaging free radicals that assail the body. We’ve known for almost two hundred years that citrus fruits prevent scurvy, a once-feared disease that killed an estimated 2 million sailors between 1500 and 1800. It wasn’t until 1932, though, that vitamin C was discovered and found to be the active agent in citrus fruits responsible for fighting scurvy. The evidence is thin, and most studies don’t support that. It’s possible that some extra vitamin C might help prevent cataract formation, but here again, more research is needed. Prevent cancer and heart disease? Can high doses of vitamin C fight other diseases? Not the common cold: study after study has failed to prove Pauling’s proposition. There’s a smattering of evidence that a little extra vitamin C, about the amount found in a typical multivitamin, at the very beginning of a cold might relieve some symptoms, but there’s no support for megadoses. Recommended intake: Recommended intake: The current recommended dietary allowance for vitamin C is 75 milligrams a day for women and 90 milligrams a day for men, with an extra 35 milligrams a day for smokers. As the evidence continues to unfold, I suggest getting 200 to 300 milligrams of vitamin C a day. This is easy to do with a good diet and a standard multivitamin pill. Good food sources Good food sources of vitamin C are citrus fruits and juices, berries, green and red peppers, tomatoes, broccoli, and spinach. Many breakfast cereals are also fortified with vitamin C. Post comment Go top
January 23, 2022 With Many Countries Opting Out Of Death Penalty ,Is It Time For India To Do Away With It Too? India is a well developing country and at the same time crime rates have been increasing rapidly in recent times. Despite the effective codification in India to control the rapidly increasing crimes against women and children the crime rates are increasing simply because there is no severe punishment for such crimes. There should be strict and severe punishment for crimes such as rape, murder and many more. The main reason behind the punishment given should be that the wrongdoer learns from that and never repeats it ever again in the future and severe punishment should be given so that anyone fears the penalty that he has to pay when he or she does the crime. This would help to decrease the rapidly increasing crime rates. There are different kinds of punishment in India such as capital punishment, life imprisonment, imprisonment etc. Capital punishment is known as the most severe form of punishment. This article or essay explains about the modes of capital punishment in India. This article explains two major theories related to capital punishment, namely reformative theory and preventive theory. Rarest of the rare cases would also be discussed in this essay. This essay would give the readers a detailed view about the capital punishment in India. India is a country which consists of large number of crimes and criminals. In India all punishments are based on the reason to give penalty to the criminals and wrongdoers. As I said punishments are given so that the wrongdoers suffer imposing punishment on criminals discourages others from doing wrong .There are different kinds of punishment in India based on their offence such as capital punishment , imprisonment, imprisonment with fine, life imprisonment, fine etc. Capital Punishment is one of the important part of Indian criminal justice system. Crimes the punishment for which is death penalty are known as capital crimes or capital offences. The term capital punishment is derived from the Latin word “capitalis” means “regarding the head”. The term death penalty is also known as capital punishment. Capital Punishment is a process where a person is put to death by a state for their criminal offence. Capital punishment or death penalty means the offender sentenced to death by the court of law for a criminal offence. This punishment is awarded for the most grievous crimes against humanity .Death penalty differs from place to place, state to state and country to country. There are many human rights movements in India which says capital punishment is immoral. The human rights organisations argues that capital punishment affect one person’s right. In jurisprudence, criminology and penalty, capital punishment means a sentence of death. Indian criminal jurisprudence is based on the combination of two theories. The constitution also gave powers to president and governor to suspend or pardon death sentence. In India capital punishment is awarded for the most dreadful offences.[1] Capital punishment is given for murder, robbery with murder, waging war against the government and abetting mutiny, etc. The death sentence is given only when the court comes to an end that life imprisonment is insufficient, based on situation of the case. Capital Punishment is a legal death penalty in India. India gives capital punishment for very serious offences. Article 21 of the Indian constitution is“ protection of life and personal liberty”. This article says “ No person shall be deprived of his life or personal liberty except as according to procedure established by law”. This article says right to life is given to every citizen in the country. The Indian Penal Code,1860 provides sentence of death as a punishment for various offences such as murder ,rape , criminal actions ad conspiracy , conducting war against the government , dacoity with killing ,encouragement of riot and anti terrorism. The Indian Constitution has provision for mercy of capital punishment by the President. There have been twenty two cases of capital punishment in India since 1995. After independence there have been fifty two capital punishment cases in India. In “Mithu vs state of Punjab.”[2] the Supreme Court struck down section 303 of The Indian Penal Code,1860 which provides for mandatory death sentence for the offenders. [3] Cases Dealing with Death Penalty in India: MITHU VS STATE OF PUNJAB ( 1983) In this case the Supreme Court struck down Section 303 of the Indian Penal Code, which provided for mandatory death sentence for offenders. BACHAN SINGH VS STATE OF PUNJAB In this case the Supreme Court says that capital punishment was given only to the rarest of rare cases. The Capital Punishment in India is given by shooting or hanging. Capital Punishment or the Death Penalty is being practiced in India since a very long time. Many countries have abolished capital punishment or the death penalty as a punishment.. A look at the National Crime Staistics of India shows that death penalty has not shown any positive effect on crime rates the crime rates have been increasing in India. There is an urgent need to reform laws relating to capital punishment and death penalty in India. The punishment for the heinous and grievous crimes should be such severe and rigorous that sets an example before the society and instil fear in the minds of the people that they do not attempt to do such heinous and serious crimes. Each and every offender should be given rigorous and worst treatment in prison and according to me life in prison is much worse than death penalty. The wrongdoer, the offender should feel for the acts that he has done ,for the crimes that he has done , for the lives that he has spoilt due to his acts day and night. Efforts should be made to make the wrongdoer, the offender guilt ridden of his actions .In the end I would just like to conclude by saying that Capital Punishment is not effective to reduce crime in the society and specially in a country like India. James A, Mccafferty. Capital punishment. Published by a division of transaction publishers.2010. N. Prabha Unnithan. Crime and justice in India. Published by sage publications.2013. Gandhi, Gopal. Abolishing the Death Penalty: Why India Should Say No to Capital Punishment. VENKATESAN,V.(7th September,2012) “A case against the death penalty” Author Details: Mihika Swaroop (The ICFAI Law School) You might be also interested to read: • The Law on Trial: Justice in the Age of Information • Implications of Judicial Activism on The Indian Democracy • Trial by Social Media – A New Threat to The Administration of Justice • Starting up in the Fashion Industry- A Legal Checklist • Applicability of Labour laws in India in relation with IT industry • The Ethics and Morality of Legal Profession Law Library LawBhoomi Leave a Reply
The health benefits and best uses of propolis The health benefits and best uses of propolis An incredibly popular, somewhat mystical substance in the Local Honey Man range, propolis has been used for thousands of years for a wide variety of health reasons. Like all of our products it is naturally sourced direct from our beekeepers, every purchase helping to protect the UK’s honeybee population. What you’re getting here really is the purest of the pure. But what is propolis? What are its health benefits and by extension, why should you buy it? Here, we answer your burning propolis questions and arm you with the knowledge to make the very most of this 100% natural miracle substance. What is propolis? Propolis is a sticky substance produced by honeybees around the world as a protective coating for their hives. It is a combination of the sugary sap from evergreens, pollen and natural beeswax. Collected on the bee’s hind legs, just like pollen, its sticky nature means that bees must get help from their fellow workers to remove it. Adorable, we know! It was used by ancient Greek and Egyptian civilisations for everything from fighting infections and treating abscesses to embalming mummies. Its literal Greek translation is ‘in front of the city’ – they recognised that it was used to protect bee colonies from the elements. Propolis varies from country to country depending on what trees the sap comes from. Here in the UK, pine tree sap is a major constituent of propolis. What is the difference between raw propolis and propolis tincture? As the term suggests, raw propolis is exactly that – it is the unrefined, untreated natural product removed from the inside of our beehives once the bees have finished with them. Propolis tincture, on the other hand, is a combination of high potency, raw propolis dissolved in a liquid base. What are the health benefits of propolis and what is it used for? Propolis is used by bees to seal gaps in their hives, to protect and keep their homes clean and free of anything unnatural. It is a disinfectant and has antibacterial properties, the ideal substance to provide a safe, clean home for our honeybees to live and work in. It is these properties that can provide the health benefits of propolis for humans. Broadly speaking it has antibacterial, antiviral, antifungal and anti-inflammatory qualities. Original Stradivarius violins were coated in propolis in order to provide an exquisite resonance. A small piece of raw propolis can be sucked to help treat a sore throat, mouth ulcers or a cough. Similarly, a few drops of propolis tincture can be added to warm water and drank to achieve a similar healing effect. Other reported uses and health benefits of propolis are as follows: • For healing wounds – Propolis contains a particular flavonoid that acts as an antifungal. One study found that propolis can help victims of burns heal their wounds faster by encouraging new skin cell growth • To calm cold sores – Propolis both reduces the amount of herpes virus in the body as well as protecting against future outbreaks. The study in this case found that when propolis was used three times a day, cold sores disappeared faster than those who didn’t take it. • For the prevention and complementary treatment of certain cancers – Some of the anti-cancerous qualities of propolis are reported as being: keeping cancerous cells from multiplying and reducing the likelihood of cells becoming cancerous in the first place • To strengthen the immune system against colds – When taken in the winter months, the antimicrobial properties of propolis helps to smother bacteria in the respiratory tract, just as it does in the beehive. How to take propolis Suck a small piece of propolis to help with internal conditions such as mouth ulcers and a sore throat. Propolis tincture can be applied directly to the skin for ailments such as cold sores and psoriasis. Add 4-5 drops to liquid and drink several times a day to help boost your immune system. Browse our natural bee products, including propolis, here.
Water, the lifeblood of the blue planet, the core of every civilization ever existed. But, we have changed this rare chemical. Polluting it with toxins from industries and runoff from agriculture, from draining aquifers to the entire sea, human development, especially industrialization, has wrecked the environment, in just a geological blink of an eye, creating a wide-scale water crisis. Despite its apparent ubiquity, it is becoming increasingly scarce. 90% of natural disasters are caused by a lack of access to it. More than 10% of humanity lacks access to it. Water issues have triggered wars. In poor countries, women haul it around all day long. Some major cities, including So Paulo and Cape Town, are running low on it. An unprecedented water crisis has arrived after decades of warnings. With the warming climate and growing population, freshwater resources dwindle. Scientists, activists, and entrepreneurs lead the charge to provide clean water. But, how severe is this water crisis? What are the main reasons behind the increasing misuse and pollution of water? And, is there any way out? Correlation Bettwen Climate Change and Water Crisis Climate change is exaggerating everything happening in relation to water. The increasing imbalance is being felt around the world. For the last two decades, droughts across the globe have devastated more people worldwide than any other natural disaster. Somalia, for example, was always a drought-prone region. But, the current drought, also called the “The Elder Giant,” has been going on since 2015. Years of drought have killed most of the livestock and drove almost 50% of the population to the verge of famine. The melting ice caps and glaciers are also reducing the global supply of freshwater. The Himalayas and Ande’s melting glaciers have long provided drinking and agricultural water to one-fifth of the globe. At the same time, the receding snowpack of Eastern Sierras is adversely affecting millions of Californians. According to the latest finding by NASA, seven areas globally are losing nearly 300 billion tonnes of water every year. Scarce access to water is triggering migration in countries globally, creating millions of climate change refugees in just the past couple of years. The lack of water is dropping crop yield in central America’s golden triangle. Crippling droughts year after year have left the farmers with only one option, to migrate for a better life. But, though many claim climate change to be the primary culprit, there is a far more powerful force at work. The Hiddle Culprit: Farming 70% of all freshwater is deployed in agricultural activity, and it is a huge source of greenhouse gas emissions. Industrial agriculture sucks up a significant amount of water. Draining rivers and streams to irrigate corn to feed cattle. On average, every farm animal needs up to 125,000 gallons of water in its lifetime. Since many of these cattle farms are getting water for free, we are enjoying the cheap meat at the cost of depleting groundwater. California’s San Joquin Valley is one of the most fertile places on the planet, which now is running out of water. But, depleting groundwater is not a problem confined to the US. Things have gotten south in some of the major parts of the world. Experts fear that almost half of the world’s population will be living in scarcity of water. Whereas, by 2040, the chances are that most of the world won’t have enough water to keep up with the water demand all year long. The anti-government protests in Iraq are the best example of the flaring up tensions, resulted from the lack of enough water. Moreover, the world economic forum has listed the looming water crisis amongst the top ten global risks to humanity. Water Quality Yet, the main cause of the water crisis isn’t just climate change, and it is rooted in our relationship with water. Even with no chance of survival without water, the UN did not pass the resolution of water being a basic human right until 2010. Access to water is not the only concern. Poor water quality is another danger hovering around. Nearly 3.5 million people, mostly children, die each year from water-borne diseases. Millions of people lack access to safe, clean water. 1.6 billion gallons of raw sewage and industrial waste is poured into the Ganges, India’s major water body, each day. This inequitable burden is placed upon the people downstream, surviving with the severely contaminated water. Furthermore, the release of chemicals and contaminants into freshwater has had devastating impacts on the natural world. Water Crisis: Finding Solutions Businesses and governments need to identify their drought vulnerabilities and improve resilience. Water conservation and increasing the efficiency of water usage throughout landscapes, city plans, and water infrastructure can help prepare communities for future droughts and upcoming water crises. Furhtrmeo, a drought emergency plan can be created, and farmers can be encouraged to plant drought-resistant crops. Resilience to drought can also be improved by actions that reduce other stressors, such as deploying green infrastructure for stormwater management (so less power is required from water-intensive plants) and using renewable energy like solar (one that is not reliant on water). If these measures are combined with attempts to reduce greenhouse gases, they will be most effective at minimizing climate change’s final magnitude. Moreover, there are many solutions that can build agri-climate resilience, like improving soil health and water conservation while also reducing emissions. At the core of our water crisis is the way we manage and distribute water. If the misuse, wastage, and pollution of freshwater continue, not only will our entire food system be disrupted, but it will also push societies and ecosystems off the verge of no return.
in Css Examples Changing Appearance Of Element With CSS I've recently just found this interesting CSS property that allows you to style any element you want as a browser default element. Each browser has there own default styling for the standard HTML elements you can find on a page, for example a button in Chrome will look different than a button in Firefox. With this CSS property you apply this to any HTML element and it will look like the default element in that browser. You can now style that anchor tag link to look exactly like that button, or make a paragraph look like a textbox. All you have to do is use the CSS property -appearance. This is currently only supported in webkit and firefox browsers so you need to prefix the property with the browser prefixes. Then you can use these CSS classes in the HTML. <p class="lookLikeAButton">This is a paragraph</p> <p class="lookLikeAListbox">This is a paragraph</p> <p class="lookLikeAListitem">This is a paragraph</p> <p class="lookLikeASearchfield">This is a paragraph</p> <p class="lookLikeATextarea">This is a paragraph</p> <p class="lookLikeAMenulist">This is a paragraph</p> There different elements you can change the appearance to can be found here. In the demo I change paragraphs to these different elements. Demo
Sun. Jan 23rd, 2022 Dehydration can make you feel out of sorts and uncomfortable. It’s a common side-effect to a busy day, which is why it’s important to listen to your body and make sure you take the necessary steps to stay hydrated. Here are some tips for combating dehydration and enjoying a fluid revival: What is dehydration and how does it make you feel? Dehydration is when your body loses more fluid than it takes in, and this leads to uncomfortable symptoms. When you’re dehydrated, you may feel thirsty or sluggish. Some of the most common signs of dehydration are headaches, dry mouth, dizziness, and fatigue. The feeling of being dehydrated can be different for everyone. If you aren’t sure if you’re sick or just need some fluids, take a few minutes to assess your symptoms. How to combat dehydration Dehydration can happen to anyone, but it’s especially common for those who are busy or have active lifestyles. If you’re feeling dehydrated, pay attention to the following symptoms: • Headache • Dry mouth • Dizziness • Fatigue If you experience any of these symptoms, make sure to drink plenty of fluids. For instance, you could try water with electrolytes or coconut water. You also might consider eating more fruits and vegetables, which will introduce more water into your system. Tips for staying hydrated Dehydration can happen quickly, so it’s important to be aware of your body. Listen for the signs of dehydration, including thirst, dry mouth, headache, dark urine or dizziness. If you find yourself feeling dehydrated, drink more water! While this may seem like an obvious solution, it’s more complicated than you think. Don’t just sip on water throughout the day—drink enough to make up for any fluid loss. If you go on a hike or are exposed to high heat or humidity levels for a prolonged period of time, drink even more water. Additionally, stay away from beverages with caffeine and alcohol because they can actually increase dehydration. Stick to water and unsweetened tea for fluids that won’t leave you dehydrated. Dehydration is a serious condition that can have long-term effects on your health. Fortunately, it’s easy to avoid. If you’re feeling thirsty, it’s likely because your body is asking for fluids. Be sure to drink plenty of water regularly and avoid caffeinated and sugary drinks. You can also add fresh lemon or lime to popsicles or iced tea to increase the number of fluids you consume. If you experience any pain or discomfort, it’s a good idea to speak with a medical professional. By admin Leave a Reply
Just call this shark the puffer shark The Reticulated Swellshark (Cephaloscyllium fasciatum) is a catshark belonging to the family Scyliorhinidae. The Reticulated swellshark is found in the western Pacific Ocean between latitudes 21° N and 28° S, at depths between 719-1,476 feet. It is a blunt snouted shark with an inflatable stomach, narrow eye slits and a pattern of spots and lines covering its body. Family: Scyliorhinidae – Catsharks Genus: Cephaloscyllium Species: fasciatum Phylum– Chordata Class– Chondrichthyles Common NameGround Sharks Family– Scyliorhinidae Common NameCatsharks Average Size and Length: Hatchlings are around 12 cm/4.7 inches. Mature males have been measured at 36 cm/1.2 feet. Mature females have been measured at 42 cm/1.4 feet. The maximum recorded is greater than 42 cm/1.4 feet. Teeth and Jaw: The teeth are wide with 3 cusps, the central cusp longer and larger than the surrounding. Head: The snout is blunt. There are ridges over the eyes. Demographic, Distribution, Habitat, Environment and Range: The Reticulated Swellshark is found in the western pacific (21°N – 28°S), in Vietnam, China, (Hainan Islands), Philippines (Luzon), and northwest Australia on or near the bottom on the uppermost slope between 719-1,476 feet. Aesthetic Identification: The Reticulated Swellshark is a small catshark with an inflatable stomach. Adults have a pattern of dark lines forming open-centered saddles, loops, reticulations and spots on light greyish back and sides. Young sharks are absent of spots. The ventral side is spotted. The second dorsal fin is much smaller than the first dorsal fin and the anal fin. Biology and Reproduction: They can inflate their stomachs. They are oviparous. Behavioral Traits, Sensing and Intelligence: The Reticulated Swellshark will expand itself with air or water in an effort to frighten or scare off predators. Reticulated Swellshark Future and Conservation: There is not enough data to evaluate. They have been taken by trawlers as bycatch, but are still not of a concern at the moment. Reticulated Swellshark Recorded Attacks on Humans: Not a threat to humans.
When is the Bipolar Disorder Test? Now As the world becomes more and more interconnected, people are looking to their medical records to figure out how they got diagnosed with the bipolar disorder. But a new study suggests that the time is now. A recent study published in the journal BMJ has found that a quick online medical history could identify people who have bipolar disorder even before they even take a blood test. The study was led by Dr. Robert Kavcic, the Director of the National Institute of Mental Health. Dr. Kavciic said in a statement:The National Institute on Aging has recently launched a Bipolar Disorders Assessment System, which aims to provide clinicians with a comprehensive toolkit to help patients understand the severity of their illness. The Bipolar Diseases Assessment System will be used to help clinicians diagnose patients at the beginning of treatment, with the goal of providing clinicians with the most accurate and complete information possible about bipolar disorder, which has been classified as a complex illness. The system will be expanded in the future. Dr Kavchiis new study, which involved more than 300,000 people in the U.S., found that the faster the time a person took to answer questions online, the more likely they were to be diagnosed with bipolar disorder (BPD). When asked if they had ever used a medical record to identify their bipolar disorder diagnosis, more than 90 percent of people in this study said yes. However, only 28 percent of those surveyed said they had used the medical record as part of their screening to find out if they were diagnosed with BPD. When asked to explain why they were not taking a medical history to help them diagnose their BPD, 45 percent of the people in Dr Kavczics study said they were “too busy” or “didn’t know enough” to answer. When the study was repeated in a follow-up survey in the coming months, Dr Kapci said the number of people who were diagnosed BPD rose to 85 percent. Dr Jana P. Brubaker, who co-authored the study with Dr Kaptein, said the study’s findings should be seen in the context of previous research. “Our work suggests that if people have the opportunity to take a quick medical history and answer questions, they will be more likely to be identified with Bipolar disorder. We believe that this information will provide clinicians and patients with the tools they need to understand their disorder and make the right choices,” Dr Brubakers said.
Why GDP is Not A Good Measure of Economic Health Image Source: Jon Berkeley What GDP is and What it Isn’t GDP or Gross Domestic Product has been referred to by governments, economists and financial institutions as the standard measurement of a country’s economic well-being. However, many experts and observers now believe GDP is a poor measure of progress. They argue need a measure of progress that includes social and natural capital. GDP or Gross Domestic Product has been defined by the Organization for Economic Cooperation and Development (OECD) defined as “an aggregate measure of production equal to the sum of the gross values added of all resident and institutional units engaged in production (plus any taxes, and minus any subsidies, on products not included in the value of their outputs).” The International Monetary Fund (IMF) says that “GDP measures the monetary value of final goods and services — that are bought by the final user — produced in a country in a given period of time (say a quarter or a year).” Image Source: Visual Capitalist The GDP measurement was created by American Economist Simon Smith Kuznets for a US Congress report in 1934. GDP was used on a regular basis beginning after the United Nations Monetary and Financial Conference in 1944 and has been used by countries worldwide since. GDP is calculated in three ways: the production (output or value added), income, speculated expenditure. GDP is not the same as gross national product (GNP) or, as it is now known, gross national income (GNI). GDP is product produced within a country’s borders; GNI is product produced by enterprises owned by a country’s citizens. The Argument Against Using GDP as a Measure of a Country’s Economic Status or Progress Simon Kuznets, the economist who developed the first GDP measurement, stated in his second report to the US Congress in 1934, in a section titled “Uses and Abuses of National Income Measurements” he states “statements of national income are subject to this type of illusion and resulting abuse, especially since they deal with matters that are the center of conflict of opposing social groups where the effectiveness of an argument is often contingent upon oversimplification.” Speaking in different World Economic Forum sessions, IMF head Christine Lagarde, Nobel Prize-winning economist Joseph Stiglitz, and MIT professor Erik Brynjolfsson stressed that as the world changes, so too should the way we measure progress. l prize-winning economist Joseph Stiglitz and MIT professor Erik Brynjolfsson noted at the recently concluded World Economic Forum in Davos, Switzerland, “GDP is a poor way of assessing the health of our economies and we urgently need to find a new measure.” World Economic Forum’s chief economist Jennifer Blanke writes in the World Economic Forum’s this indepth explainer on GDP that there are serious problems with the GDP measurement that must be addressed. Image Source: Equitable Growth Here’s a Summary of the Criticisms 1. There’s also not a correlation between GDP and the quality of public health. In 2013 scientists reported that largeimprovements in health The Center for Partnership Studies concluded that GDP may not be useful for the production of products and services that are useful to society, but instead may “actually encourage, rather than discourage, destructive activities.” In GDP medical breakthroughs, are measured solely by the price of the treatment, ignoring the benefits of shorter hospital stays and longer life expectancies that the treatments create. 2. The Council of Economic Advisers itself shows that improvements in a country’s infrastructure such as water, plumbing and electricity provide a benefit well beyond their market prices but the social benefits are not measured with GDP. 3. GDP doesn’t include negative effects on the environment. Many experts and observers have pointed out limitations of using GDP as an accurate measure of economic and social progress. For example, manyenvironmentalists argue that GDP does not take into account harm to the environment. In 2020 a group of scientists, as part of a World Scientists’ Warning to Humanity–associated series, issued a warning that measuring the growth of affluence in terms of GDP has promoted the use of natural resources and pollutant emissions among the affluent countries. They proposed a number of solutions that encompassed far-reaching lifestyle changes needed to complement technological advancements. They also cited that existing affluent economies’ continual expansion of consumption is not sustainable and the current model of capitalism founded on competitive market economies inhibits needed social change. 4. GDP calculations is that it is ill-equipped to counterbalance the negative effects of natural disasters.Environmentalists argue that GDP actually incentivizes short-term growth at the expense of long-term global health because it does not take into account the value of things such as clean air and sustainable means of production. An example would be our continued use of fossil fuels and methods such as fracking. 5. GDP doesn’t include household production. GDP does not measure so-called household production, ignoring the free labor of mothers at home. The same logic applies to individuals who renovate their house rather than hiring a professional. 6. GDP makes no adjustment for leisure time. For example, productivity is amongst the highest in the U.S., compared to some European countries, but the average American worker works more hours per week on average than the European counterparts. 7. GDP did not adapt to technological changes to give a more accurate picture of the modern economy and does not encapsulate thevalue of things such as free information and entertainment on social media, according some observers such as Diane Coyle, an economist and former advisor to the UK Treasury. 8. From GDP’s perspective, bigger is always better. That is not always so. When the financial sector became the dominant sector in the US economy, it ended in financial crisis for the world. Some observers say we are headed there In the paper published in the Royal Society journal Philosophical Transactions of Biological Sciences, Professor Sir Partha Dasgupta argues that twentieth-century economics has been ‘inexplicably’ detached from the environmental sciences.“As long as we rely on GDP and HDI, we will continue to paint a misleading picture of economic performance,” he said.“If economists take into account natural capital, then it is clear that some of the world’s poorest people are subsidising the incomes of importer rich countries.” Image Source: World Economic Forum What are the Alternatives to Measuring GDP? Catherine Rampell, writing in the New York Times, provides summary of the alternatives to GDP, including China’s “green GDP,” which measures environmental factors; the OECD’s “GDP alternatives,” which measures work-life balance; theIndex of Sustainable Economic Welfare,” which measures pollution costs and the distribution of income; and the“Genuine Progress Indicator,” which adds factors such as the value of household and volunteer work, and subtracts factors such as the costs of crime and pollution. Finally, here are more direct measures of well-being: the Happy Planet Index, Gross National Happiness and National Well-Being Accounts. The Organization for Economic Cooperation and Development (OECD) also annually issues a report based on a study of 140 countries, indicating the levels of happiness in those countries. Notably, for at least the last decade, European countries such as Denmark, Finland, and the Netherlands and other countries such as Canada, Australia and New Zealand have ranked at the top and the U.S. has not made the top 10. Image Source: GNHCentre.org Work-Life Balance World experts on the subject of happiness, Dr. Ed Diener, Dr. Sonja Lyubomirsky and Dr. Martin Seligman, have concluded that beyond the basic level of necessities to support life, such as adequate, food, water, housing, happiness levels should be measured and include: meaningful close relationships; a positive, optimistic frame of mind; accepting responsibility for your life; being engaged in meaningful work; living in the present; and practicing an altruistic life, including gratitude, forgiveness and compassion. Image Source: gnhusa.org While The U.S. Leads the World in GDP, it Falls Far Behind on Other Measures If we look at broad and varied data other than GDP, the picture for the U.S. is not rosy. According to the U.N., the OECD, The Legatum Institute, The U.S. National Intelligence Council , the U.S. Congress, the CIA and many business publications: • In 2008, the U.S. had fallen from first to third in global merchandise exports. The U.S. trails Japan for worldwide patent applications, with China soon to bypass both. In 2009, the Information Technology and Innovation Foundation reports that the U.S. ranks last among the 49 nations survey when it came to “change” in “global innovation-based competitiveness” in the last decade. • After leading the world for decades in 25–34 year-olds with university degrees, the U.S. is now in 12 place. The World Economic Forum ranked the U.S. at 52nd among 139 nations in the quality of its university math and science instruction in 2010. According toe the OECD 15 year olds in the U.S. rank 17 in the world in science and 25 in math. The U.S. ranks 12 among developed countries in college graduation. And 79 in elementary-school enrollment. Nearly 50% of all graduate students in the sciences in the U.S. are foreigners, most of whom will be returning to their home countries. • The Legatum Institute, a London-based research firm publishes an annual “prosperity index” and ranks the U.S. 9, five notches lower than last year. The U.S. poverty level is the third worst among advanced nations according to the OECD. Only Turkey and Mexico are worse. In the Legatum study, the U.S. ranks 27 for the health of its citizens; life expectancy is below average compared to 30 advanced countries measured by the OECD and obesity is the highest in the U.S. among all those countries. • The U.S. federal government spending as a percentage of GDP is now up to about 36%. The Congressional Budget Office is projecting that U.S. government public debt will hit 716% of GDP by the year 2080. • More than one quarter of the federal budget is spent on the military. The cost for the Iraq and Afghanistan wars is now creeping up to $10 trillion. • The U.S. ranks 23 in the world in terms of infrastructure, well behind that of every other major advanced economy. The American Society of Civil Engineers prepared a report card on the state of America’s infrastructure-roads, bridges, dams etc. In the latest version the overall “GPA’ for the U.S. was a “D,” and the cost of bringing all systems up to adequacy, not an “A” was estimated at $2.2 trillion. Image Source: OECD Income Inequality In their book, The Spirit Level: Why Greater Equality Makes Societies Stronger, Professors Richard Wilkinson and Kate Pickett, present data taken from multiple credible sources that show the gap between the poor and rich the greatest in the U.S. among all developed nations; child well-being is the worst in the U.S. among all developed nations; and levels of trust among people in the U.S. among the worst of all developed nations. So income is helpful, but only in certain circumstances.” Image Source: World Happiness Report 2015 New Directions The World Economic Forum has suggested revisions to the GDP in their report, Dashboard for a New Economy Towards a New Compass for the Post-COVID Recovery, which outlines a framework for macroeconomic metrics that could fill the gaps currently left by GDP. This is part of WEF’s new compass for the post COVID-19 recovery. In its report, the Forum has proposed a scorecard made up of four dimensions that should be balanced: prosperity, the planet, people and the role of institutions. Prosperity vs economic growth The Forum’s ‘Prosperity’ metric includes income, as wealth inequality, social mobility, and financial resilience. In high-income economies, such as the U.S. it tracks slowing economic growth, its impact on standards of living and an increasingly unequal income distribution with a view to facilitating effective policy countermeasures. In developing countries, the metric needs to account efforts to ending poverty. An example of this could be stimuli to boost the growth of clean energy over fossil fuels, the report says. The ‘Planet’ metric integrates the use of various energy sources and, by association, the development of greenhouse gas emissions. This metric also accounts for the cost of climate change–for example through carbon taxes. The dashboard’s ‘People’ dimension focuses on human capital for example, measuring education and re-skilling to guide government spending toward transforming workforce skill-sets and avoiding job losses as the economies restructure work for the future. The final dimension is ‘Institutions’, with the Forum focusing on a decline in institutional quality, as reflected in things such as press freedom, judicial independence and budget transparency. GDP’s inventor Simon Kuznets argued that his measure had nothing to do with well-being. But Western society’s embrace of free market capitalism has implied that well-being is the same thing as wealth. Rapid economic growth, such as we’ve witnessed in the U.S., as measured by GDP, has been considered a mark of success in its own right, rather than as a means to an end. Kuznets wanted to subtract, rather than add, things he considered detrimental to human wellbeing, such as financial speculation and advertising and military weapons. GDP makes no distinction. From the perspective of global GDP, nuclear warheads have the same value as medical cures or apple pie. Many politicians, economists and social scientists have been writing about and talking about the deficiencies in GDP for decades. They now believe we should measure the economic well-being of the families who make up the economy and not focus on GDP growth exclusively, according to a panel of high-profile economists, including Nobel Laureate Angus Deaton, titled “Beyond GDP,” held at the 2020 conference of the American Economic Association. Economists Joseph E. Stiglitz, Amartya Sen, and Jean-Paul Fitoussi, entitled Mis-Measuring Our Lives summarized the problem in this line: “What we measure affects what we do.” GDP has encouraged countries, particularly the U.S., to emphasize “growing the pie,” based on the assumption that the pie is growing equally for all the people, which it hasn’t. Economic growth has mostly benefited the 1% even during the COVID-19 pandemic, while the majority of Americans, particularly the lower income groups, have not benefitted from any increase in GDP. Image Source: World Economic Forum Experts are not warning U.S. lawmakers that without adding a distributional component to measurement of economic growth along with the measurement of GDP growth, the nation’s leaders will be half-blind when evaluating the overall economic health of the nation. It’s time that we shelve GDP as a measure or our progress and replace it with something more realistic and beneficial. Leadership Coach and Author: Helping Leaders Live Better Lives and Serve Others
In Shakespeare’s play of “Hamlet”, Hamlet is given a difficult situation to deal with. He is encountered with the murder and vengeance of his father, King Hamlet. Throughout the play the audiance is given the chance to decide if Hamlet is actually “mad” or “mad in craft”. I portray the situation as Hamlet acting his madness in craft and acting to gain revenge for his father’s death. Hamlet must be mad in craft because has a full awareness of the situations that go on around him. When Hamlet acts as a madman he always has the perfect response or line to say. We Will Write a Custom Essay Specifically For You For Only $13.90/page! order now When he is talking to Rosencrantz and Guildenstern, Hamlet is smart enough to realize their true purpose to see him., Hamlet tells Rosencrantz and Guildenstern that he is not really mad. “I am but mad north-north-west. When the wind is southerly, I know a hawk from a handsaw.”  Hamlet uses his words very specifically to avoid questions and avoid any suspicions of his fake madness.  Later one he uses his father’s stamp to get them both killed. This is such a devious and intelligent plan. Even for a sane man this plan is very cruel but it is another example of how Hamlet is truly not mad. Hamlet, in the same conversation with Polonius, is so creative in his responses that he creates a sense of madness to Polonius and the readers. “Though this be madness, yet there is method in’t..” Hamlet’s use of role-playing a madman combined with his intelligent comments and conversations prove that he is truly too smart to be a mad.           Hamlet does not think as a person who is mad would. When Hamlet sees Claudius praying in the church he thinks very logically. He  realizes that if he kills Claudius right now, Claudius would go to heaven and Hamlet wouldnt get the full revenge he was looking for. “Now might I do it, now he is a-praying, and now I’ll do’t. And so he goes to heaven, and so am I revenged… A villain kills my father, and for that I, his sole son, do this same villain send to heaven.” His thoughts to himself are so keen and inventive that it would almost be impossible for him to be a madman. He is putting on an act of madness and fooling everyone.. In his soliliquie he has debates with himself about his life and the others around him. For example, he realizes that his father’s ghost might be a trap so decides to write a play to find out for himself. “I’ll have these players play something like the murder of my father before mine uncle. I’ll observe his looks; I’ll tent him to the quick…The spirit that I have seen may be a devil… .” In his famous “to be or not to be” soliloquy Hamlet is thinking straight. He creates a list of good and bad things about his life and reflects on his situation. Hamlet comprehends situations to well to be in madness. Throughout the play we see that every decision that Hamlet makes is very thought out and he is very careful with what he does.  All the other characters buy into his madness and he is able to follow through with his plan. We can see that it is almost impossible for him to be mad. It is much easier for a sane man to act mad than for a mad man to act sane.
Quickly picking up pace in popularity, 3D printing is a concept so progressive, it’s impossible to imagine anyone not being completely taken by it. In a world where 3D printers have almost become household appliances, anyone can have anything almost instantly. Also referred to as additive manufacturing, this process of creating a three-dimensional object seemingly out of thin air by applying layer after layer of material is working its way towards becoming the biggest time saver out there. Currently, the popularity of 3D printing still revolves around prosthetics, but opportunities are almost infinite. Although still far from fully functional, printing food is no longer a concept of sci-fi movies. Image source: ncat.stlawu.edu Difficult to explain in detail, as it is, some 3D printers are built with making food in mind. In layman’s terms, this printer dispenses mixed materials, creating beautiful patterns. Although 3D printers can partially make pizza, pastas and similar single or many-ingredient foods, they have a long way to go before we can order printed duck l’orange. Imagine a day when you’ll be able to simply make food appear in a matter of seconds. It could very well boost creativity and improve the quality, by allowing us to control the input ingredients and levels of sugar, fat and vitamins. Furthermore, sustainability has a lot of space for improvement here, by controlling the amounts of desired materials. Still mainly focused on sugar-based snacks, food printers are quickly picking up pace – in fact, I bet machines like ChefJet and CocoJet will replace the mainstream candy factories in no time. This not only speeds up the process and cuts down on financial loss, but poses a way towards saving the earth, seeing as how factories are quite the polluters. The food designs of 3D printed food are so beautiful to look at, that customers often refrain from even eating, but instead just sit back and marvel at the piece of tech-art in front of them. Devices like Foodini, launched by Natural Machines in March can make potato salads, various pastes and other healthy, organic foods. However, what Foodini lacks is the ability to prepare cooked food, so you’d either have to cook the meal afterwards (not really a problem with a microwave) or do with food that requires no preparation. However, food printers are not just for the lazy. Think astronauts, for example. If food could actually be made on space stations, the storage requirements would dwindle in size and meals in space would turn healthier in no time. Furthermore, if we’re to take on the challenge of establishing colonies on planets like Mars for example, we’ll need an easy way to make quality food of variety. 3D food printers are yet another giant leap for mankind. With a lot of room for improvement and some great ideas in mind, the future might already be on our doorstep. There’s more to it than mere time saving – perks like dialing down the pollution and providing necessary ingredients for future colonies based on other planets are a window into the future! Posted by Howard Bell
Does the government support the art? Does the government support the art? How we can remove poverty? Policies to reduce poverty in developing economies 1. Education – greater spending on education and training can enable higher-skilled workforce. 2. Foreign Aid – aid from developed countries can be used to invest in better health care and education. 3. Diversification of economy away from agriculture to manufacturing. Why should the government fund the arts? “Arts and culture are consistent sources of economic growth, during both good and difficult economic times. Specifically, arts and culture policies and programs increase economic development in states by attracting businesses, creating new jobs, increasing tax revenues and promoting tourism.” How much does poverty cost? Fight poverty, not the poor! The economic and social costs of poverty are high: Child poverty costs more than $1 trillion per year in lost economic productivity, increased health and crime costs, and increased costs resulting from child homelessness and maltreatment. Are government subsidies good? On the consumer side, government subsidies can help potential consumers with the cost of a good or service, usually through tax credits. However, tax credits will offset higher prices for consumers so that the margin still goes back to producers. Why does the government give subsidies to farmers? 1 These subsidies help reduce the risk farmers endure from the weather, commodities brokers, and disruptions in demand. But they have evolved to become very complex. As a result, only large producers can take advantage of them. Out of all the crops that farmers grow, the government only subsidizes five of them. What steps have been taken by Indian government to reduce unemployment describe any five? 1 Integrated Rural Development Programme (IRDP) This program included agriculture, forests, fisheries, animal husbandry, cottage industries, construction of canals, roads, and so on. To provide employment, a sum of INR 312 crores was also spent in the Seventh plan, which benefited 182 families. How the government can reduce unemployment? Fiscal Policy Fiscal policy can decrease unemployment by helping to increase aggregate demand and the rate of economic growth. The government will need to pursue expansionary fiscal policy; this involves cutting taxes and increasing government spending. How much welfare money is wasted? What are the anti poverty programs? Anti Poverty & Employment Generation Programmes in India • Integrated Rural Development Programme (IRDP): • Jawahar Rozgar Yojana/Jawahar Gram Samriddhi Yojana: • Rural Housing – Indira Awaas Yojana: • Food for Work Programme: • Sampoorna Gramin Rozgar Yojana (SGRY): • National Food for Work Programme: Should the government support artists? Some people believe that the government should provide financial assistance to all artists including painters, musicians and poets. However, despite this argument, I would argue that spending money on arts and artists is wasteful as there are several other sectors that desperately need government funding. What are the evil effects of unemployment? Is the United States a welfare state? What are the steps taken by the government to remove unemployment? The following steps have been taken by Govt, to increase employment opportunities: • Integrated Rural Development Programme (IRDP): • Drought Prone Area Programme (DPAP): • Training for Self-Employment: • Jawahar Rozgar Yojana: • Employment in Foreign Countries: • Self-employment to Educated Unemployed Youth: What are the disadvantages of subsidies? Disadvantages of Subsidies • Shortage of supply. Though one of the advantages of subsidies is the greater supply of goods, a shortage of supply can also occur. • Difficulty in measuring success. Subsidies are usually effective and helpful. • Higher taxes. How will the government raise funds to use for subsidizing industries? Is Google subsidized by the government? Google is valued at over $800 billion and has received $750 million in subsidies—or about one-tenth of one percent of its valuation. Facebook is valued at more than $150 billion and has received two-tenths of one percent of its valuation, or $330 million, in subsidies. What are the anti poverty measures taken by government? • 1 Jawahar Gram Samridhi Yojana (JGSY) • 2 National Old Age Pension Scheme (NOAPS) • 3 National Family Benefit Scheme (NFBS) • 4 National Maternity Benefit Scheme. • 5 Annapurna. • 6 Integrated Rural Development Program (IRDP) • 7 Pradhan Mantri Gramin Awaas Yojana. • 8 References. How much does the government spend on poverty? The United States has dramatically increased federal spending fighting poverty over the last 55 years. Total welfare costs have risen from $722 per person in poverty in 1964 to $22,740 per person in 2019. That totals $90,960 for a family of four even though the Poverty Threshold for such a family is $26,172. Why should government spend most money on public welfare services?
What do I mean? Well, have you ever wondered for example why, aside from demographics, why most, “not all,” but why most doctors across the country are often white or of Asian descent. Well it’s most certainly not because black children don’t aspire to be doctors or aren’t capable of achieving a doctorate. If that’s what you thought then please Google the recently publicized: College Admissions Scandals. And then look up surgeon Daniel Hale Williams, who in 1893 performed the first “successful” open heart surgery shortly after founding Provident Hospital in 1891. Provident Hospital was not only the first black owned hospital, but unlike other hospitals it welcomed an interracial staff, and provided a nurses training school for black women during a time when they were barred from participating in such programming elsewhere. Then check out hematologist and surgeon Charles Richard Drew, who in the 1930’s when medical science hadn’t yet figured out how to preserve blood for no longer than a few days, he took it upon himself to set up the first blood bank after separating and discovering that blood plasma, which is the liquid portion of blood without cells, can be stored for much longer terms. While we’re in the researching mood check out scientist and mathematician Benjamin Banneker, who amongst many more things is known as “the man who saved Washington D.C.. From memory Banneker planned the survey and reconstructed the blueprint for the building of the Nation’s capital city – Washington D.C. in as little as two days, after Pierre L’Enfant, a French engineer abruptly abandoned the project and took with him his drafted plans. After executing such an insurmountable task in so little time, this world renowned astronomer, Benjamin Banneker went on to print a series of ten annual almanacs, in which he accurately predicted solar eclipses and the movements of celestial bodies. How about aeronautical mathematician Katherine Johnson, who graduated from highschool at the tender age of fourteen? Then went on to participate in advanced collegiate programs that led her to perform phenomenal works with the National Aeronautics and Space Administration (NASA), by helping the country execute feats that never would’ve been accomplished without her assistance for many years to come. What are some of these accomplishments you may be wondering? Well for starters in 1959 she calculated the flight trajectory for the first American to go into space, and three years later in 1962 she verified the mathematics for John Glenn’s orbit around the earth, and most memorable and equally amazing if not more amazing, she calculated the flight trajectory for Apollo 11’s one and only flight to the moon in 1969. And what about Thurgood Marshall-the Social Architect. He won numerous notable cases in private practice, one of which was 1954’s Brown v. Board of Education. Which challenged and overturned the U.S. Supreme Court’s long standing “separate but equal” standard decided in Plessy v. Ferguson back in 1896, and out of the 32 cases he argued before the United States Supreme Court he won 29 of them. Then followed his flawless record up with becoming a United States Court of Appeals judge who never had not one of his 112 opinions overturned on appeal — before earning the position of Solicitor General of the United States, and ultimately Justice of the United States Supreme Court of America. And lastly we have billionaire Robert Smith, who recently paid it forward by paying off Morehouse’s entire graduating class of 2019 student loan debts. So hopefully this brief glance of contributions hidden amongst a sea of many more clears up any misconceptions of what blacks are capable of creating, achieving and have contributed to the advancements of this country. However, there’s a whole ‘nother class of students that you may never get to hear about due to the fact that their potential is often stunted far before it can even be nurtured and realized. And this class of students are the products of what’s known as the Preschool To Prison Pipeline. Have you ever heard of it? In many districts funding for public school education has been etched away so badly that schools are getting shutdown left and right, and for the ones that do remain open, in certain communities teachers sometimes have no option but to spend personal funds on needed supplies, or set up school supply drives just to supplement the lack of resources allocated towards their profession. For more info Google wxyz.com; which is one of Detroit’s leading news stations for reports on school funding, and teacher hosted school supply drives that were orchestrated by teachers. How does lack of funding contribute to this “so-called” Preschool to Prison Pipeline that I speak of you’re wondering? Well, it contributes because lack of funding leads to a lack of opportunities, and the lack of opportunities creates disparities in success. And as Thurgood Marshall stressed: whether it be by statute or through unspoken rules, the practice of separate treatment can never be equal. In an effort to avoid these unspoken practices you have individuals like Tanya McDowell and Kelly Williams; wherefore one of them, if not both found themselves sentenced to time in jail for simply changing a zip code to get her child into a good school district. While individuals of affluence who went to unacceptable extremes to get their unqualified children into college were sentenced to only a few days, if any at all. Now one thing that I do know is that our children are smart. Many of them have the ability to be lawyers, doctors, astrologers and more, but the reality for the ones caught up in the judicial system is that from day one many of them have been streamlined through the educational system and right into the prison system, or perhaps on their way, and here’s how it breaks down. What is “Defunding the Police”? Don’t be alarmed by Black Lives Matters call to “defund” the police. Defunding the police means that we set up community security to protect us. Community officers will still have the power to make legal arrest and perform the same duties that police perform right now. However, the “Peace-Officers” will be people who come from our communities, not infiltrators who come in and murder us. Under the present system, police officer have “qualified immunity” that protects police officers from law suits even if they intentionally murder someone without good cause. Why can doctors be sued if they accidentally kill a patient in the operating room, but the police cannot be sues for murdering someone in cold blood. The reason that police officers get away with murder and still keep their jobs is because the “Police Officer’s Union” has too much power. The Police Union has tens of thousands of members who stick together. They lobby the government and use their voting power to get politicians to make laws in their favor. More importantly, Police Officer Unions use their negotiation power to force cities and states to expand the rights of police officers. For example, it is hard to fire a police officer because the Police Union negotiated a deal that makes it mandatory that fired police get many opportunities to appeal their job loss. And there is a high burden of proof to uphold the firing of a police officer. That is why most police officers get their jobs back. The Police Officer’s Union negotiated deals that protect police at the expense disregard for citizens. By Defunding the police, we can take the power away from the Police Union. We can reinvest tax money into community based law enforcement, crime prevention, education, community recreation and other programs that will uplift the community, instead of destroying it. We are intelligent enough to find good people within our communities to protect us. There is no need for outsiders to come in and occupy our communities. Police officer are coming in and intimidating, exploiting and murdering black people. White People commit three times as many crimes in this country and they are arrest three times more often then African Americans, yet the police kill three times as many Black People than White People. This is nothing new, it has always been this way. So it let’s you know that white police officer’s don’t value Black Lives. They kill us like were dogs in the street and don’t lose an ounce of sleep over it. We need to stop spending our tax money to pay police officers who have immunity to murder Black People. And don’t be fooled. If police reform does not get rid of qualified immunity that protects murderous police officers, then it is not dealing with the systemic part of racism in the police department. P.S You can write to me at Ernest K. Hall El #196363 Thumbs Corr. Facility  3225 John Conely Dr. Lapeer, Michigan 48446 Please put your return address on the letter itself because the prison does not give me the envelop, or you can go to J-Pay.com to send me an email. I will respond to all messages. Funding Our Own Incarceration-Charles A. Jackson As we know the cost of living in the outside world has been going up and the battle for minimum wage has reached nearly ten dollars per hour throughout Michigan. Be mindful the institutional factory jobs has been removed throughout Michigan prison system, as well as our work bonuses for the remaining jobs such as food service. Over the last 30years prison wages have not gone up! throughout Michigan, it is widely known that state prisoners such as myself can barely support ourselves with a prison job adding to pennies a day. We are considered blessed if we have the help of family and friends. It should be noted once again that prison wages have not increased in over 30years. Yet the prison store prices have gone up! Along with prison job pay scales going down. On top of limiting us to only 200 hours as food service workers, with a starting rate at 17.5¢ unskilled, 23.5¢ semiskilled, and 32.5¢ skilled per hour, consider how prisoners are being held responsible for the following living expenses toward funding our own incarceration: A. Hygiene supplies including sales tax B. Over-the-counter medications, including sales tax C. Co-payments for medical, dental, optical services, in the amount of $5.00 per visit individually D. Legal photocopies along with notary services in the amount of $1.00 per notary. Pursuant to MDOC policy directive PD 03.04.101, which governs medical service providers to charge prisoners a $5.00 medical co-payment for all medical services as delineated above, placing extreme hardship on all prisoners! so this alone does save the state and prison system thousands of dollars. This is in addition to the fact that all the work we do would otherwise cost the state money to hire people from outside to do, which means prisoners are taking on the many facility operations. Also look how we add additional funding to our own incarceration, comparing store prices from 2008 to those of 2020: *noodles then 20¢ now 35¢ *white rice then 65¢ now $1.39 *chili no beans then $1.45 now $3.33 *peanut butter then $1.70 now $3.29 *tuna fish then $1.30 now $4.42 *footlocker then $79.40 now $112.00 *protein powder then $10.90 now $15.51 *cough drops then 65¢ now 93¢ *stamped envelope then 41¢ now 59¢ *Colgate toothpaste then $1.50 now $2.80  *Soap then 40¢ for Ivory, 60¢ for Dial, now 65¢ for off-brand Keep in mind that in reality we are unable to actually afford any of these items on a 17, 23, or 32¢ income, so that means that those of us who are blessed to still have family, friends, and love ones to help support us are the ones actually being fleeced. Which they are the actual tax paying citizens funding our own incarceration through the Securepak ordering system, phone system, J-pay Music, and the fee for sending financial aid to our accounts just so we can keep funding our own incarceration through the system of highway robbery with no gun! My last critical point which I want to enlighten readers to is this Safe & Just Michigan gave the two following statements in the spring of 2019: 1) People incarcerated in Michigan are serving some of the longest sentences in the nation, with an average minimum sentence that is 10.3 years and growing, and 2) Michigan’s prison population has fallen 23% between 2006, when it reached its largest size of 51,515 people, and 2017. These two statements might sound like they cancel each other out, but both statements are true. The paradox is one of the interesting facts brought to light in the Michigan Department of Corrections’ 2017 statistical report, which was released in January 2019. It’s no coincidence that the average minimum prison sentence is rising at the same time the overall prison population is declining. In fact, the two are related. In recent years, efforts have been made to find ways to divert people from prison for offenses that bring shorter prison sentences. Problem-solving courts, such as substance use courts and mental health courts, offer treatment programs instead of prison time. This has reduced the state’s prison population. However, that has done nothing to reduce the number of people who are still serving long-term sentences. While people serving sentences of 20years or more comprised 18.3% of the prison population in 1998, as of 2017 they represent 31.7% of the population. We have fewer people coming to prison, but those who are coming are coming for a longer time, adding to the system of funding our own incarceration along with the tax-paying citizens of Michigan being fleece. According to a report by the Senate Fiscal Agency, a reduction in 13,000 prison beds would result in a $494,000,000 savings. Even with this decrease Michigan still has an incredible amount of work to do in order to lower the prison population further. Even with that cut over the last 14years, Michigan still spends over $2 billion on corrections alone. Like many states, Michigan has reached a critical point in the status of it’s corrections department. Instead it should be Michigan Department of Corruption or Misusing Michiganders’ Deposits on Corruption because the MDOC has deviated from the concept of Michigan Department of Corrections. Because in reality that term would represent an individual being corrected from their error by being rehabilitated through adequate programming, restorative justice, and prison reform. So you citizens should be fed up! with the lies and misuse of your tax dollars going towards the funding of our own incarceration!!! I know I am, what about you???
As smog chokes Delhi, India struggles to ease off coal | Environment | All topics from climate change to conservation | DW | 16.11.2021 Visit the new DW website 1. Inhalt 2. Navigation 3. Weitere Inhalte 4. Metanavigation 5. Suche 6. Choose from 30 Languages As smog chokes Delhi, India struggles to ease off coal A man walks along a road on a smoggy morning in New Delhi, India Students in New Delhi have been forced to attend schools virtually, and government workers told to work from home People in New Delhi are preparing for the possibility of another lockdown — but this one has nothing to do with COVID-19. With air pollution reaching hazardous levels in the Indian capital and nearby suburbs in recent days, authorities have resorted to emergency measures. Schools have been closed for a week, and construction sites are sitting idle. And, on Monday, India's Supreme Court ordered millions of office workers to stay home to keep vehicles off the roads, also suggesting a two-day lockdown to help cut down on pollution. Air quality has deteriorated to such an extent that many people have even been forced to wear masks indoors. "I am happy that the court has intervened. Every year, without fail, the air gets from bad to worse in November and nothing is ever done," Vinita Garg, a homemaker and one of the city's 20 million residents, told DW. "Thanks to air pollution, my kids always get a runny nose and cough. How can we continue to live like this if the air is so bad?" Graphic showing how air pollution affects the human body Air quality in New Delhi, regularly ranked as one of the world's most polluted cities, was nearing the upper limits of the federal pollution scale on Tuesday — a "severe" level that "affects healthy people and seriously impacts those with existing diseases," according to the state Central Pollution Control Board. A recent study by Environmental Research magazine showed that air pollution is the cause of more than 2.5 million deaths in India each year. "Many families are now experiencing one or more ailments due to polluted air in Delhi," said Promilla Bhutani, a pediatrician with offices in the city's south. "The worst affected are children who have to go to school in this toxic weather. I hope there is some improvement now that the court has intervened." Many factors behind air pollution The city's pollution problem is especially bad in late fall and early winter, when prevailing weather patterns mean pollutants from heavy industry and coal-fired power plants, in addition to smoke from burning crop waste in the neighboring states of Haryana, Punjab and Uttar Pradesh, smother the megacity in toxic gray smog. Watch video 02:37 Coal makes India world's third biggest polluter "Close to 25, 30% of the pollution can actually be attributed to stubble burning," said Tanushree Ganguly, an air quality researcher with the New Delhi-based Council on Energy, Environment and Water (CEEW). "But as we get deeper into winter, particularly the December-January period, you'll find that … people who don't have access to electric heat, they rely on biomass for their space heating needs," she added, referring to fuels such as wood, cow dung or crop residues. Ganguly told DW that the city needed "more significant" reductions in emissions from all sources, especially during the winter period. Reliance on fossil fuels Air pollution, primarily from the burning of fossil fuels, is a serious problem in Indian cities. After China and the United States, India is the world's third-largest emitter of carbon dioxide, which contributes significantly to global warming. A large part of those emissions come from coal. The country has nearly doubled its coal consumption over the last decade to keep pace with its booming economy, with the cheap fossil fuel providing around 70% of its electricity. And instead of scaling back its use, the government has announced plans to expand coal power plants and mining operations. Speaking at the COP26 climate summit in Glasgow, Scotland — where delegates struggled to agree on a deal described by UK Prime Minister Boris Johnson as "the beginning of the end for coal power" — India's Environment Minister Bhupender Yadav insisted that developing economies were "entitled to the responsible use of fossil fuels." Critics have said a last-minute intervention by major polluters like India and China to weaken anti-coal pledges and "phase down" rather than "phase out" coal were a setback to the world's climate goals. A worker washes dust off of a solar panel at the Gujarat Solar Park, in Gujarat, India Solar power is an option as India slowly begins its shift to renewables, but financing remains key But Environment Minister Yadav argued that developing economies shouldn't be included in the same category as the world's biggest per-capita emitters, with their higher average incomes and economic growth rates. "In such a situation, how can anyone expect developing countries to make promises of phasing out coal and fossil fuel subsidies?" he asked. India has committed to going carbon neutral by 2070, 10 years after China and decades later than other major emitters like the US and the European Union. From coal to solar? "For a fast-growing economy with low income, this is the reality," said Vaibhav Chaturvedi, an economist and fellow at the CEEW think tank. "The fast-growing economy needs all the fuels that are available to us, to aid in the development process." Millions of Indians still lack basic amenities like electricity, health care and safe drinking water. Chaturvedi told DW that the coal sector, which he says is crucial to that growth, would continue to expand in India over the next two decades, albeit slowly. At the same time, he said renewable energy will also take off — if it can secure the necessary funding. The Modi government has pledged to scale up renewables and make solar power as important as coal by 2030, but India still relies heavily on expensive technology from abroad. A graphic showing coal consumption in various countries in Asia "India is in a very different situation than US or China," said Pao-Yu Oei, a professor for economics of sustainable energy transition at Europa-Universität Flensburg in northern Germany, pointing out that the country's CO2 emissions per capita are still much lower than other major economies. "[India's] rising economy has resulted in increasing electricity needs which are even bigger than the uptake of renewables." Oei said financial support was crucial to help India make the transition to renewables, a view shared by Chaturvedi. "Only by reducing the cost of finance will [we] be further able to reduce the cost of solar electricity, and thus accelerate its absorption into the grid," he said. "Whether it actually materializes or not … is a really big impediment in terms of getting solar off the ground in India." Chandra Bhushan, head of the Delhi-based International Forum for Environment, Sustainability & Technology, told DW that despite claims made by the Delhi government, pollution has only worsened in recent years. And it wasn't going to be solved by simply shutting the city down for a few days. "We will have to work with millions of households to eliminate biomass as cooking fuel, work with millions of farmers to restore land and stop stubble burning and work with hundreds of thousands of industries to reduce pollution from coal," he said. "There is no easy way out." Additional reporting by Murali Krishnan in New Delhi  Edited by Jennifer Collins Correction (November 23, 2021): Some wording has been changed in a graphic in this article DW recommends
Medical Device Security Medical Insurance These examples show how cyberattacks and data breaches affect the healthcare industry, which relies heavily on connected medical devices. It is imperative to safeguard the Patient Health Information (PHI) captured and stored in these connected medical devices. PHI is transmitted over the cloud through server-based systems, making it particularly vulnerable to hackers. Medical Devices Are Everywhere Whether it is stationary, implanted, or wearable external medical devices, patients’ lives, and well-being depend on the safety of these devices. Many medical devices, such as insulin pumps, heart defibrillators, artificial cardiac pacemakers, and ventilators, are life-saving devices and equipment. Other examples include artificial joints, MRI and CT scanners, infusion pumps, clinic programmers, and home monitors. Devices in a hospital or healthcare setting–such as security cameras, RFID readers, point-of-sale systems, and guest access cards–should be safeguarded from possible cyber attacks and security breaches. Medical devices include computer systems and networks as well. Modern medical devices are not isolated. They are interconnected locally and over the Internet. Connected medical devices use built-in sensors to collect data that can be transmitted over the Internet and to other devices. These devices and the data constitute the Internet of Medical Things (IoMT), helping to diagnose, monitor, and deliver treatment quickly to patients over the Internet. Increase In The Use of Medical Devices By 2030, the baby boomers are expected to reach retirement age. The percentage of people aged 65 and over is expected to double by 2050. This factor has led to the rise of connected medical devices to serve this segment–not just at care facilities but also at home. During the pandemic, the use of medical devices saw a significant rise. Along with the convenience of using medical devices by patients at home come potential cybersecurity risks. The use of medical devices is cost-effective and reduces healthcare costs, bringing benefits to many patients. They are in high demand due to the benefits of availability, connectivity, cost-efficiency, and accuracy.  What Are The Risks? Some of these devices are considered weak links in the network. Health systems, medical equipment, and devices increasingly connect over wired and wireless networks and are interconnected with other devices and systems; thus, they are vulnerable to cyber attacks, security breaches, and risks. The risks are numerous, including HIPPA regulatory risks, loss of sensitive Personal Health Information (PHI), the risk to patients’ lives, and loss of reputation of the healthcare facilities, companies, and the IoT ecosystem partners involved. Since these devices have the same software and hardware, if one is successfully hacked, all other devices of the same make and model in that segment can be compromised, too. There are a surprising number of IoT devices with default passwords on production networks. If compromised, these devices may act as the springboard for the attacker and can allow immediate lateral movement within the VLAN. The prime target is the data center, where Electronic Health Records (EHR) and Electronic Medical Records (EMR) systems are present and contain highly confidential Personal Health Information (PHI). From a threat perspective, that’s the primary data store. That’s where the Personal Health Information (PHI), payment information, and all the data required to generate the required health reports and financial statements are stored. Making Devices Cyber Secure Medical devices are vulnerable to security breaches, although the Food and Drug Administration (FDA) allows them to be marketed with a reasonable assurance that they are safe and effective. Nonetheless, some guidelines to protect medical devices are worthy of mention. In 2018, the FDA introduced the concept of a cybersecurity bill of materials for medical devices. The bill of materials has to be submitted by the medical device manufacturers before the devices are marketed. Also, the US Department of Homeland Security has categorized the healthcare and public health sector as one of sixteen critical infrastructure sectors whose assets, systems, and networks are vital to the United States. Moreover, the recent executive order by the US government covered important aspects of medical device cybersecurity. Ensuring The Safety of Medical Devices Here are some best practices to protect against cybersecurity threats to medical devices. Security During The Medical Device Development Process Medtech companies need to adopt a “security by design” approach. Specific risk management protocols must be followed in the medical device product development cycle: From the management framework and planning, analysis, evaluation, and control of risks to their reporting and documentation. ●  Cloud security measures In a data breach, the onus is on the healthcare company and not the cloud services provider. Yet, cloud providers should follow specific guidelines to ensure security. This includes following FDA Cybersecurity Guidelines, implementing cloud security engineering best practices, conducting regular security audits, developing disaster recovery scenarios, and initiating action based on well-defined security and data-protection incident management process. ●  Continuous measures The medical devices or their software should enable real-time monitoring, cyber threat modeling and analysis, threat mitigation, and remediation. With regular logs and monitoring, any breach is detected as it happens. Prompt detection of a breach helps assess its impact and ensure its mitigation. ●  Regular upgrades and installation of software patches to fix security flaws Medical devices are often old, and upgrades are not always available. These inadequately supported medical devices are vulnerable to attacks, which can disrupt their critical functions and endanger lives. The medical device owner should proactively contact the vendor or manufacturer for any maintenance or upgrade issues related to their medical devices. ●  Security from insider threats The healthcare staff involved in handling and monitoring the device and the data generated through the devices should be trained regularly. Encryption of medical device data, security of the endpoint systems, proper access management, and asset management, and vulnerability assessments are simple steps to protect devices used in healthcare. Besides deploying appropriate user authentication measures, the facility should also consider physical locks on devices and communication ports. The connected medical devices, which significantly improve patient care and provide better patient outcomes, should be maintained and upgraded to ensure patient safety from the design stage to their use in healthcare organizations or at home. The IoT ecosystem consists of medical device manufacturers, providers, systems and software providers, system integrators, connectivity providers, and end-users. More collaboration between all the stakeholders to tackle the cybersecurity vulnerabilities and risks of connected medical devices will help prevent cyber attacks. Tags : Share This : Leave a comment
Image Alt Schools and Districts – How It Works Story-based learning is a time-tested and highly effective method for teaching students with a diverse range of skills and academic needs. KneoWorld’s immersive blended learning program harnesses the power of the narrative to integrate social and emotional learning with literacy and math instruction. KneoWorld’s unique Assign-&-Go functionality allows teachers to allocate lessons and workbooks based on the students’ individual needs and the click of a button. Each child can work together at the same time, or individually at their own pace. Our Assign & Go Lessons include: Learning Stories Beautifully crafted, specific grade level stories that bridge conceptual understanding with problem-solving skills. Task-Based Games Mapped and measured to academic standards, these games allow students to practice key skills and concepts while providing educators with real-time formative data that can be used to make differentiation easy. Adventure stories Connect your students with our cast of KneoExplorers who take them on an epic journey of discovery. These stories engage students with storytelling while reinforcing skills combined with reading, math, social studies, science, and critical thinking. Brain Games KneoWorld offers hundreds of problem-solving educational activities to inspire and motivate. Through the power of play, students practice key skills in critical thinking. Hands-on Activities and Challenges Introduce creative thinking challenges! KneoWorld’s hands-on activities give students new ways to work with skills and concepts off-screen. Every activity is academic standard aligned and requires little or no prep time. Measure Progress KneoWorld’s Analytics is a simple and user-friendly online dashboard where principals, teachers, and parents can effortlessly review academic growth. These immediate and measurable results allow educators to tap into the individual needs of their students and offer alternatives for achieving their learners’ goals. Game-based challenges assess children’s progress.
What are the Top Security Threats for IoT? Christophe Fourtet, Chief Scientific Officer and Cofounder at Sigfox The rapid acceleration in IoT devices installed and in use globally has analysts forecasting the number reaching 41.6 billion “things” generating 79.4 zettabytes of data by 2025[1]. This figure includes a wide variety of devices, from smart car technology, smart watches and virtual assistants such as Alexa to GPS trackers, remote monitoring devices and sophisticated tools that are already being used in manufacturing and other industries. As the use cases for IoT broaden, the amount of data being generated by these devices also continues to grow and, as emerging technologies have flourished in recent years, so too have cyber security threats. Security threats themselves have evolved from malware and viruses to more sophisticated, coordinated attacks, with IoT connectivity a new target for hackers.  The security threat to IoT is different to the threats faced by internet and cellular telephone networks, for instance. IoT provides a large variety of threat surfaces as the more devices there are, the more points there are on a network that need to be protected. This means that there are potentially a far greater number of available weaknesses for cyber criminals to target. Attackers could infiltrate smart devices themselves, like remote sensors, smart car technology, smart watches used in business and even drone technology, focusing on traditional virus and internet-based attacks, targeting servers or disrupting the frequencies used to transmit data. The common denominator for IoT security threats is of course, the internet – the web of connectivity powering IoT devices, with the security threats typically directed towards IoT devices falling into one, or more, of the following segments: Radio Frequency Identification (RFID) Physical mass attacks via this method of wireless connection of radio frequency waves to transfer data are not possible and any through air infiltration are near enough impossible. The direct threat here is minimal, but attackers could target these services, via server weaknesses, or a recipient RFID reader’s server link via internet-based attacks. Low-power wide-area network (LPWAN) LPWAN connections allow long-range communications at a low bit rate, which is perfect for connected objects like sensors on a battery. Similar to RFID, the direct threat risk in terms of physical or air-interface attacks of this method of connection is minimal. Device transactions using this technology are few and often via an uplink, which serves to limit the threat and it is the simplicity of these devices that protects them. However, jamming them is still possible and internet-based attacks aimed at the devices these networks interact with are more common. More complex LPWAN devices that have higher traffic or use bidirectionality are prone to even greater risk, but solutions for those include dynamic scrambling of device transactions and the Advanced Encryption Standard AES-128. Cellular IoT/5G Cellular and 5G connections are more common, and have a higher volume, with heavier protocols, so see more security threats over the air, with “Honey pot” cyber security solutions often deployed to detect, identify, predict and protect against potential attacks. Yet again, “backend” attacks are more frequent, as attacks target servers and app servers, and this requires daily security monitoring by both software and teams. Personal Area Networks PAN communication between personal devices themselves and the internet means there is a much higher traffic volume and a larger panel of protocol layers that are often stacked one on top of the other, causing security weaknesses. There are solutions but often there is negligence in protecting attack surfaces connected in this manner and that lack of protection often increases with the complexity or volume of surfaces within systems. In this way, large systems could be penetrated through simple smart Wi-Fi bulb or other such PAN sensors. The impact and larger security risk of IoT threats The growing trend of Industry 4.0 and smart manufacturing has enabled Industrial IoT (IIoT) connections to become an integral part of the business process across the entire industrial sector. IIoT connections are anticipated to reach 37 billion by 2025[2] and this rapid surge is being accompanied by the just as fast evolution of cybersecurity protection for industry. Just like the need to protect networks and cloud computing users by deploying sophisticated cyber security systems, businesses now recognise the need to protect the multitude of network endpoints and surfaces where IoT is deployed. While the spectrum of IoT threats has pushed more mature technology users to carefully and continuously analyse their whole systems, less mature players continue to have less sophisticated systems. So, third-parties, or connections, can be used to make more mature and protected users and businesses vulnerable to attacks. This is too often evidenced in cybersecurity breaches that make the news, where larger companies have fallen victim to attack via a third-party supplier or an employee. As the physical attack surface, or number of connected endpoints, for businesses increase alongside the number of IoT and smart devices used, cyber protection is becoming tougher and more costly. Networks which carry large volumes of data with many multiple connections are growing, so too is the cost involved in protecting larger and busier networks. Protecting IoT devices from security threats Cyber protection is about “quality of service.” Mature technology users know this so most are already deploying comprehensive cyber security measures across all devices, treating each endpoint the same in terms of them all being a possible security risk. Cybersecurity teams, software, data analytics, and artificial intelligence are all being employed to detect anomalies that can indicate threats, to predict potential threats and to protect against those threats. Each IoT device in a network should be monitored directly or indirectly, via software and/or  a human team overseeing things. Users should understand the typical behaviour of devices and cyber attackers to help them identify and protect against attacks. In large networks, fast and efficient abnormal device and system behaviour detection “as a service” should be adopted, but this cybersecurity discipline takes time and is exponential along with device behaviour. The more devices communicate, the more unpredictable their interactions can be, making them more difficult to monitor and manage. Cybersecurity solutions should not just be technology based. Adopting AES-1024 technology alone will not protect a poorly designed or analyzed system and even complex cybersecurity systems can leave vulnerabilities across large networks where users share complex security keys over those networks. Prevention and protection start with educating every single user and encompassing systems so that all endpoints, human or otherwise, are well-informed so more protected. Usage characterizations and system considerations are the first stages of protecting against threats, but strengthen that with adding understanding to all system users and managers, from the top right down to the bottom. Then deploying the right technologies and encryptions, such as AES and AI algorithms, will be even more effective. Over time, it will help if systems and networks become diverse, to reduce the complexity of endpoints and connections, while enabling simpler management. Threats in common systems will be similar, rather than varying from one design to another. Overall, if IoT devices, their purpose and normal operations are characterized and analysed it will become easier and faster to detect anomalies and threats, using modern computing tools and technologies such as AI.  Sharing existing and emerging threat vectors within the technology and cybersecurity communities is vital so that businesses are forewarned and can learn from each other, instead of becoming victims of the same types of attack. With an increase in remote working, employee connections also become business risks. Cybersecurity should be systematic, and encompass both security by design and operational measures. Coupled with these characteristics, cybersecurity should encompass a strategy of cybersecurity awareness, for all network and device users and right from customer-facing employee through to board room director. Cybersecurity technology should focus on hardware and software, on devices and networks, and on risks via technological and human oriented attack vectors. [1] https://emsnow.com/the-growth-in-connected-iot-devices-is-expected-to-generate-79-4zb-of-data-in-2025-according-to-a-new-idc-forecast/ [2] https://www.juniperresearch.com/researchstore/devices-technology/industrial-iot-market-research
Mathematical theory of probability and statistics Well! mathematical theory of probability and statistics pity magnificent mathematical theory of probability and statistics The mineral mathemayical are interlocking Figure 18 - Graphite schist, showing metamorphic probabipity. The Rock Cycle The Rock Cycle (Figure 20) is a conceptual model that mathemafical how geological processes acting on any one of the three iabp rock types - igneous, sedimentary and metamorphic - can change one rock type to another over geological time. In order to understand the Rock Cycle, it is important to understand the rock-forming processes. Igneous rock-forming processes involve melting, mathematicql and crystallization. Sedimentary rock-forming processes involve weathering, erosion, deposition, burial and lithification. Matyematical rock-forming processes involve changes to rock textures and mineral compositions under different temperature, pressure or hot fluid conditions. Figure 20: Mathematical theory of probability and statistics Rock Spee. Oxygen mathematical theory of probability and statistics Figure 1. Granitic Rocks Granitic rocks contain predominantly feldspar and quartz minerals, with subordinate amphiboles, and micas. Lava Individual mineral grains in lava are generally too small to be identified with the naked eye. Clastic Sedimentary Rocks (Siltstone, Sandstone and Conglomerate) Clastic sedimentary rocks are composed of rock and mineral grains eroded from pre-existing rocks (Figure 16). Schist and Phyllite The minerals of the original rock may be replaced by new metamorphic minerals, such as micas (platy minerals) and amphibole (a prismatic mineral). His advice to Afghan refugees moving to the USQatar plays key role in dealing with Taliban. Hear from a top official whether they trust themDeadly stampede at border as thousands try to flee AfghanistanStriking images of the final US flight out of Afghanistan London (CNN Business)The swift fall of Afghanistan to Taliban fighters has triggered a humanitarian crisis, with thousands trying to flee the country. Afghanistan is one of the poorest nations in the world. Supplies of minerals such as iron, copper short term memory loss causes gold are of motilium across provinces. Copper ore is seen at Aynak in the Logar Province of Afghanistan on March 4, 2013. Security challenges, a lack of infrastructure and severe droughts have prevented the extraction of most valuable minerals in the past. In its latest country profile, the World Bank said probabioity the economy remains "shaped by fragility and aid dependence. An Afghan man holds a small piece of gold, prospected from the site of a proposed Qara Zaghan mine in 2011. Demand for metals like lithium and cobalt, as well as rare earth elements such as neodymium, is soaring as countries try to switch to electric cars and other clean technologies to slash carbon emissions. The International Energy Agency said in May that global supplies of lithium, copper, nickel, cobalt mathematical theory of probability and statistics rare earth elements needed tips for increase sharply or the world would fail in its attempt to tackle the climate crisis. The average electric car requires six times more minerals than a conventional car, according to the IEA. Lithium, nickel and cobalt are crucial to batteries. Electricity networks also require huge amounts of copper and aluminum, while rare earth elements are used in the magnets Lisinopril Tablets for Oral Administration (Prinivil)- FDA to make wind turbines work. He led the Afghanistan Geological Survey until 1979. While there has been some mathematical theory of probability and statistics of gold, copper and iron, exploiting lithium and rare earth minerals requires much greater investment and technical know-how, as well as time. The IEA estimates that it takes 16 years mathematical theory of probability and statistics average from the discovery of a deposit for a mine to start production. Afghans watch nervously as Taliban regime takes shape, and US and its allies continue frantic exitBut, Schoonover continued, our new articles welcome article submission "odds are against it," given that the Taliban will need to devote its immediate attention to a wide range of security and humanitarian issues. Attracting private capital will be even more difficult now, particularly as many global businesses and investors are being held to ever higher environmental, social and governance standards. The Taliban mathematical theory of probability and statistics not been officially designated as a Foreign Terrorist Organization by the United States. However, the group was placed on a US Treasury Mathematical theory of probability and statistics tablets glaxosmithkline of Specially Designated Mathematical theory of probability and statistics Terrorists and a Specially Designated Nationals list. An opportunity for China. Mathematical theory of probability and statistics projects motivated in part by geopolitics could be a different story. China, the world leader in mining rare earths, said Monday that it has "maintained contact and communication with the Afghan Taliban. Those minerals factor into their long-term plans. Beijing could be skeptical of partnering on ventures with the Taliban given ongoing language of love, however, and may focus on other regions. Khan probabillity out that China has been burned before, having previously tried to invest in a copper project that later stalled. SearchWorldAfricaAmericasAsiaAustraliaChinaEuropeIndiaMiddle EastUnited KingdomUS PoliticsThe Biden PresidencyFacts FirstCalifornia Mathematical theory of probability and statistics, But BetterFitnessFoodSleepMindfulnessRelationshipsEntertainmentStarsScreenBingeCultureMediaTechInnovateGadgetForeseeable FutureMission: AheadUpstartsWork TransformedInnovative CitiesStyleArtsDesignFashionArchitectureLuxuryBeautyVideoTravelDestinationsFood and DrinkStayNewsVideosSportsFootballTennisGolfTokyo 2020US SportsClimbingMotorsportFormula EEsportsVideosLive TV Digital StudiosCNN FilmsHLNTV ScheduleTV Shows A-ZCNNVRFeaturesAs EqualsCall to EarthFreedom ProjectImpact Your WorldInside Africa2 DegreesCNN HeroesAll FeaturesWeatherClimateStorm TrackerWildfire TrackerVideoMorePhotosLongformInvestigationsCNN ProfilesCNN LeadershipCNN NewslettersWork for CNNFollow CNN BusinessMost stock quote data provided mathematical theory of probability and statistics BATS. Market indices are shown in real time, except ans the DJIA, which is delayed by two minutes. All times are ET. 22.03.2019 in 18:55 Mazusar:
Containerizing a .NET application What is Docker? From Wikipedia: Docker is a computer program that performs operating-system-level virtualization, also known as "containerization". It was first released in 2013 and is developed by Docker, Inc. Docker is used to run software packages called "containers". Containers are isolated from each other and bundle their own application, tools, libraries and configuration files; they can communicate with each other through well-defined channels. Unification of container technology 1. A set of command-line tools to work with containers 2. A unified way to build Container images 3. A unified way of maintaining images in a registry 4. A daemon process that manages the images & networking on a host machine from: Microsoft doc What Is a Container? A container is an isolated, resource controlled, and portable operating environment. A container provides a place where an application can run without affecting the rest of the system and without the system affecting the application. If you were inside a container, it looks very much like you are inside a freshly installed physical computer or a virtual machine. Containers are compared to virtual machines, but they are completely different technology. Below are the benefits of containers over Virtual machines: 1. Containers provide the isolation of a virtual machine with the lightweight process. Container provides almost the same level of isolation as you see in a virtual machine but is very lightweight in terms of overhead and start-up time. 2. You can see inside a container and also make changes to it but in case of Virtual machines you have to first start the VM to the Virtual machine architecture and data. You can even make changes in your container, and then the isolation will ensure that nobody else but you can see the changes that you've made. 3. The container will enable you to fully utilize the host machine resources e.g. CPU, memory, disk, and networking. 4. Containers does not pre-allocate any resources. It is very light weight comparable to a process. If you run multiple containers on the same host machine, then these are fully isolated from each other and the host. Containers vs. Virtual Machines At first look containers and Virtual machines look similar because both uses the hardware and the host operating system. You can run applications on the host operating system, and we can have virtual machines and Containers on the host as well. Virtual machine has its own operating system and separate application on it. On another hand still have the hardware and, of course, the host operating system interact with the kernel which is responsible for interacting with the hardware handling scheduling of different processes and managing resources like virtual management and CPU cycles. Containers let us to run our application by sharing the operating system kernel. This kernel has edit capabilities to create isolation between the different containers and never share anything else between the containers. Although Virtual machine provide isolation but using Hypervisor. Virtual machine has its own operating system and applications. Setting up the Virtual machine operating system and application is a long task but setting up the containers using the images is a faster process. It just requires an image and configure your application on container using these predefined container images. Container provide faster bootup time rather than the virtual machine. They are up and running within few seconds. Virtual Machines Source: Run Windows Containers Containerise a .NET application To create custom image for your application, we require docker tools. In this article, you will know that how to push your containerized application to the docker repository and to Azure App Service. You can also deploy your application’s container from Visual Studio to Azure Container Registry, and then run it in App Service. Now it is time to start creating a container image for ASP.NET MVC application using the windows containers. To create a .NET application container image, we require below prerequisites tools: o Install the latest updates in Visual Studio by clicking Help > Check for Updates. o Add the workloads in Visual Studio by clicking Tools > Get Tools and Features Note: In this article, Visual Studio 2019 Preview is used to create to the ASP.NET MVC application. Create/Open an ASP.NET web app In Visual Studio, create a ASP.NET MVC project by selecting File > New > Project. In the New Project dialog, select the template Visual C# > Web > ASP.NET Web Application (.NET Framework). Define the solution and the project name then press create. select the MVC template and do not forgot to select Enable Docker Compose support. Select OK to continue. Once the project is setup then you will find Dockerfile under the project. It defines the structure of the container and which base image will be used to host your application. Update the docker file with Azure App Server supported base image so the update docker file would be as below: FROM microsoft/aspnet:4.7.1 ARG source WORKDIR /inetpub/wwwroot Here is the list of  supported base image. Create and Publish to Docker Hub In the Solution Explorer, right-click the created project and select Publish. Select Container Registry > Docker Hub > Publish. There is another option also available. You can directly publish this application to Azure App Server or Azure Container registry. Although, we took the publish path from docker registry to Azure App service. Enter your docker credentials: Now publish process create the docker image using the base image and bundle your application in to the image. When process complete you will be able to see the pushed docker image in the docker registry at docker hub. Now setup the Azure Container service to use this docker image. Create a Windows container app Sign in to the Azure portal at with your account. 2. In the search box above the list of Azure Marketplace resources, search Containers and then select Web App for Containers. 3. Provide an app name and let the default option create a new resource group selected, and click Windows in the OS box. 4. By default, wizard Create an App Service plan but you can create your custom by clicking App Service plan/Location > Create new. Give the new plan a name, accept the defaults, and click OK. 5. Now you will configure the container and provide the detail of the create docker image in the step. Click Configure container. In Image and optional tag, use the repository name you created in Publish to Docker Hub step, then click OK. In previous step I have create repository with name “niranjankala\webdevaspnetmvc” as you can see in above docker hub image.clip_image017 There is an option for the Kubernetes but Kubernetes is only supported on Linux operating system-based applications. 6. Click Create and wait for Azure to create the required resources. Once the deployment complete you are ready to browse your containerized application. Now browse “” or whatever application name you chosen during the web app service setup process. Now your containerized application is up and running.
Monday, February 18, 2019 President's Day George Washington U.S. President, General (1732–1799) According to the Site Biography Still hoping to retire to his beloved Mount Vernon, Washington was once again called upon to serve this country [after the revolutionary War]. During the presidential election of 1789, he received a vote from every elector to the Electoral College, the only president in American history to be elected by unanimous approval. He took the oath of office at Federal Hall in New York City, the capital of the United States at the time. Political Party Washington could have been a king. Instead, he chose to be a citizen. He set many precedents for the national government and the presidency: The two-term limit in office, only broken once by Franklin D. Roosevelt, was later ensconced in the Constitution's 22nd Amendment. He crystallized the power of the presidency as a part of the government’s three branches, able to exercise authority when necessary, but also accept the balance of power inherent in the system. He was not only considered a military and revolutionary hero, but a man of great personal integrity, with a deep sense of duty, honor and patriotism. For over 200 years, Washington has been acclaimed as indispensable to the success of the Revolution and the birth of the nation. But his most important legacy may be that he insisted he was dispensable, asserting that the cause of liberty was larger than any single individual. 1 comment: 1. Great post Rhonda GW was surely well respected, which was why he was called to serve as President. He also took the lead in writing our constitution, although Hamilton and Madison did the nuts and bolts, Washington served as the leader of the movement to do away with the articles of confederation and establish a new government. There is a great book about the whole process, The Quartet: Orchestrating the Second American Revolution, 1783-1789 In closing one of my favorite GW quotes,
Swine Flu (H1N1) - Information for laymen Learn everything about swine flu (influenza A) and discover why there is no reason to panic. Share this link to avoid unnecessary panic among the population. The swine flu, or flu, is caused by influenza A (H1N1), the same as everyone else already had. Swine flu Swine flu So why so much repercussion now? Swine Flu (H1N1) Influenza A is a virus that infects not only humans but also other mammals and birds. There are several subtypes - such as A (H1N1) - and between subtypes, several different strains. Swine flu is caused by a new strain of subtype A (H1N1) Influenza virus. The great problem of the influenza virus is its great capacity to mutate, circulating a new strain almost every year, causing new epidemics of flu. We have frequent contact with various subtypes and several different strains of influenza, which means that we always have some degree of immunity against the viruses circulating among humans. Epidemics usually occur when severe strains came from poultry or other animals cross the species barrier and infect humans. Normally we do not have these antibodies and are more susceptible to infections. The same Influenza A (H1N1) was responsible for the famous Spanish flu in the early twentieth century, a pandemic that caused the death of more than 50 million people around the world. The origin of the epidemic seems to have been strains originating from swine flu. Earlier this decade there was an epidemic of the bird flu, which was caused by another subtype of Influenza A, H5N1. Before you panic and run out to buy masks and stock of drugs, it is worth explaining here. The flu always caused deaths and hospitalizations. Just to illustrate, in the United States each year more than 200,000 people are hospitalized due to flu, and between 1972 and 1992 more than 400,000 deaths were attributed to complications of influenza. On average, there are 20,000 flu deaths annually in the U.S. alone. As you can see, death from flu is nothing unusual. Risk group: Risk group of H1N1 Risk group of H1N1 • Under 5 years old • Over 65 years old • Persons under 19 with chronic use of aspirin • Pregnancy • Individuals with lung diseases, including asthma, bronchitis and emphysema • Individuals with cardiovascular disease (except those with hypertension alone) • Renal • Liver failure / cirrhosis • Diabetes • Sickle cell anemia • Immunosuppressed, including HIV with CD4 counts less than 200 c / microL • Malnutrition • Morbid obesity Warning, this is considered a risk group for both swine flu and for regular flu. As far as swine flu is concerned, this group is not more serious than the flu or other influenza viruses. This strain of influenza A virus was restricted to pigs, and for some genetic mutation, acquired the ability to be transmitted from pigs to men and men to men. Swine flu is known in veterinary medicine since 1930. There is even a vaccine for pigs. Due to the fact that the virus can now cross species, our immune system is unprepared as the seasonal flu virus is different from swine flu. But what seemed a serious epidemic in theory, in practice has proved to be much less dangerous than previously thought. Current data show that there are no signs of the virus to be more dangerous than the common flu. Rather, it appears to be milder. A curiosity in the current epidemic is the lowest rate of impairment among the elderly, probably because the current virus is similar to strains that circulated before the decade of 50-60, thus providing some degree of immunity to this group. The mortality has been low as in any influenza, especially for those who are not in the risk group described above. In the U.S. mortality is below 0.5% so far. In Mexico, which is the epicenter of the epidemic and the country with the worst health conditions, mortality is less than 1%. Due to the large number of little symptomatic H1N1 infections, the mortality criterion mentioned above is no longer reliable. Many cases are not being counted simply because people do not seek medical attention. This underestimates the number of actual cases and overestimates the rate of mortality, since only the most serious cases are being reported. Another important fact: the number of attendances with suspected cases of flu (swine or seasonal) from January to July is similar to what occurs in the same period since 2003. What seems to be happening is just an exchange of seasonal influenza by H1N1 influenza, without influence on the total number of cases, mortality or complication rates. Of the 10,623 cases of suspected some kind of flu, 1,958 (18.4%) were confirmed as influenza A (H1N1) and 669 (6.3%) as seasonal influenza. Therefore, less than 25% of people seeking medical care with suspected flu, actually have this diagnosis. The rate of complications from influenza H1N1 remains similar to seasonal influenza (19% versus 18.5% of confirmed cases). We should bear in mind that only symptomatic cases have been reported. These values of 19% and 18.5% of complications do not refer to all cases of influenza A, but only those who are more symptomatic in which doctors ask to confirm the diagnosis. The mortality rate from H1N1 among those who develop complications such as severe acute respiratory syndrome (SARS) fell from 12.8% to 10.3% since the last newsletter of the Ministry of Health. Among cases of SARS caused by the H1N1 mortality rate is 15.1% for patients with at least one risk factor and 4.36% for those who do not present a risk factor. Chronic respiratory diseases and pregnancy are the main risk factors for the development of SARS in both the H1N1 and seasonal flu. In the specific case of pregnant women, 7.2% of those who had confirmed H1N1 had complications, compared with 7.9% of those with seasonal flu. Therefore, in Brazil, the common flu still causes statistically more complications during pregnancy than influenza A. Again remember that the figures refer to cases with not all pregnant women with flu. Transmission of swine flu Swine flu transmission Swine flu transmission Swine flu is transmitted like any other flu, through respiratory secretions. At first it was passed through a pig, but the outbreak occurs by human to human transmission. There is no risk of contamination through pig meat. The virus does not survive during the cooking process. Since the outbreak is still very young, it is not clear about the incubation period, or for how long the infected person transmits the virus. It is believed that the data are similar to the other influenza caused by other strains of the A (H1N1), with transmission of the day before going to the onset of symptoms within 24 hours after termination of foot, and an incubation period of 1-7 days. Therefore, the WHO recommends for those with flu symptoms to be quarantined until 24 hours after resolution of symptoms (fever) to avoid infecting other people. The use of masks was widespread among the population and it was possible to see some people walking down the street wearing one. There are no indications that common masks effectively protect against H1N1 infection. How to avoid H1N1 How to avoid H1N1 The masks lose their protective capability after some moisture due to respiration and perspiration appears on it. Its use should be restricted to health professionals in contact with patients and people in risk group patients who have relatives in the same household. Infected persons should use it, if they can tolerate it. The virus can stay alive on inanimate objects for up to 8 hours. A simple cleaning with soap or detergent is enough to kill it. Pools do not transmit the virus due to the presence of chlorine. As preventions can serve: • Avoid close contact with people (at least 2 meters). • Avoid bare-hand contact with eyes and mouth without first washing them. • Wash your hands frequently. • Avoid being in low air circulation and with many people. Symptoms of swine flu The clinical picture of swine flu is very similar to flu, with fever, headache, cough, sore throat, muscle aches. The only difference is that it can also occur with diarrhea and vomiting, which is uncommon in simple flu. In young children and the elderly people there is high risk for complications, symptoms may be less typical, occurring only fever and lethargy. Fever is the most important symptom for diagnosis. If there is a temperature higher than 37.5°C, the diagnosis of swine flu becomes less likely. The complications of swine flu are the same as of seasonal flu. The main one is pneumonia and SARS, which is usually the cause of death in those who develop it. Unlike colds, the flu is an infection that develops very fast. Within 24-48 hours the patient has any clinical features. People who return travel from countries with high levels of contamination should be aware of the symptoms for at least 10 days after return. No need to quarantine if there are no symptoms, even for those who have ill family members at home. Symptoms of swine flu Symptoms of swine flu What are the danger signals? • Difficulty breathing • Chest pain while breathing • Low pressure • Changes in consciousness • Disorientation • Persistent vomiting It is important to realize that when we talk about risk group we refer to those with higher risk of developing complications from influenza (seasonal or swine). This does not in any way mean that these people must have complications, or those who do not belong to the group are in no danger. We're talking about probabilities, not certainties. Again it is important to note that in most people the swine flu has a mild, like any flu, spontaneous resolution. The antiviral treatment decreases the incidence of complications and shortens the time of disease promoting breakage of the transmission chain. The main drug that has been used is oseltamivir (Tamiflu). The medicine works best if taken within the first 48 hours after first symptoms. There are no studies proving the safety of oseltamivir (Tamiflu) for pregnant women. However, due to higher number of complications in this group, the U.S. CDC (Centers for Disease Control and Prevention) authorizes the use of Tamiflu by pregnant women. Oseltamivir (Tamiflu) for some years is used in cases of common colds. You do not need to have confirmation of H1N1 to start the drug but just the presence of symptoms of flu (swine or is not). However, the antiviral is only indicated for patients with severe signs or which belong to the risk group. People outside the group risk and with mild symptoms are not at risk of death and therefore do not need the drug. The trivialization of the use of oseltamivir (Tamiflu) can lead to an increased resistance of H1N1. Join the fact of common drugs have side effects, and one can understand why it should not be prescribed indiscriminately. Those who take the flu vaccine might provide at least a partial immunization, since the H1N1 strain is similar to human flu. Anyone who has caught swine flu and recovered is immune. The important thing is not to create panic among the population. So far there is no evidence that swine flu is more serious than the common flu that we all have. All eyes are focused on trying to prevent the virus circulating among the population. First, because the more people are infected and transmit the virus, the greater is the number of deaths. Second, because the more the virus circulates, the more difficult it is for seniors and people with weak immune system to avoid contamination. General keywords User discussion Site indexMedicines onlineInteresting to readCommentaries TabletsManual.com © 2012
Do you know about world largest rivers? Do you know about world largest rivers? Assume you recognize the world's longest stream? What regarding the largest? Perhaps you've brushed up on your waterway trivia for your preferred aspect of the globe? Evaluate your expertise right here, using these exciting (if challenging) streams of the globe questions ... Do you know about world largest rivers? Question 1 of 10. 27 rivers flow into Lake Titicaca, but a single spurts from it. Can you call that waterway? 1. The Vilcanota, Peru 2. The Amazon 3. The Desaguadero, Bolivia 4. Nice try! The question consists of a fib Question 2 of 10. of these is actually Europe's longest river? 1. The Volga 2. The Danube 3. The Seine 4. The Elbe Question 3 of 10. How many European countries performs the Danube run through? 1. 6 2. 7 3. 9 4. 10 Question 4 of 10. Where carries out the Dnieper Waterway run through? 1. Hungary, Serbia and North Macedonia 2. Russia, Ukraine and Belarus 3. Ukraine, Moldova and also Romania 4. Latvia, Lithuania as well as Belarus Question 5 of 10. Which of these is actually the UK's lengthiest river? 1. The Thames 2. The Mersey 3. The Trent 4. The Severn Question 6 of 10. On which English river will these well-known links sit? 1. The Tyne in north-east England 2. The Avon in south-west England 3. The Trent in the Midlands 4. The Clyde in Glasgow Question 7 of 10. Which was actually the 1st waterway on earth to be provided the very same lawful civil liberties as a person? 1. The Nile, Egypt, in 2002 2. The Fly, Papua New Guinea, in 2014 3. The Whanganui, New Zealand, In 2017 4. Nice shot! I am actually positive this could possibly never, ever before occur Question 8 of 10. Numerous countries in the world possess no streams. Which of these countries DOES have a waterway? 1. Malta 2. Bahrain 3. Vatican Urban area 4. Morocco Question 9 of 10. The spot where a stream starts is actually phoned its: 1. Springtime 2. Assemblage 3. source 4. Landmark Question 10 of 10. A river which flows in to one more river is actually contacted a: 1. Confluence 2. Tributary 3. Watershed 4. Drainage basin Next question 1 of 10 All 10 questions completed! Share results: Do you know about world largest rivers? Want more stuff like this? Get the best viral stories straight into your inbox! Don`t worry, we don`t spam Leave a Reply Just how properly perform you recognize the world’s rivers? Exactly how effectively perform you know the palaces of the planet?
Alcohol addiction affects millions of people around the globe, from all walks of life. Once a person becomes addicted to alcohol and incorporates drinking into their daily routine, it can be difficult for them to stop and find their way back to a healthy, productive lifestyle. Knowing exactly how alcohol addiction is defined and how to spot common signs of this substance use disorder can help you determine whether yourself or a loved one could benefit from professional treatment. What Is Alcohol Addiction? Alcohol addiction is both a mental illness and complex brain disorder. The National Institute on Drug Abuse (NIDA) defines alcohol addiction as a “chronic, relapsing disorder characterized by compulsive alcohol seeking and continued use despite harmful consequences and long-lasting changes in the brain.” Alcohol addiction is also known as alcohol use disorder, which encompasses both physical dependence and psychological addiction. It’s possible to be physically dependent on alcohol without being addicted, though alcohol addiction usually refers to a combination of both. People who drink high amounts of alcohol on a consistent basis can become physically dependent and may eventually become addicted when alcohol use becomes part of their normal lifestyle and changes the structure and function of their brains. What Is the Prevalence of Alcohol Addiction? Alcohol addiction affects nearly 15 million people in the United States aged 12 and older, reports the National Institute on Alcohol Abuse and Alcoholism (NIAAA). This number includes approximately 9 million men and 5.5 million women. Alcohol addiction also affects an estimated 414,000 youth between the ages of 12 and 17. Furthermore, nearly 26% of adults report binge drinking regularly, while 6.3% report engaging in heavy alcohol use regularly. According to the NIAAA, binge drinking is defined as drinking behavior that brings blood alcohol concentration levels to at least 0.08 g/dL in about two hours. Heavy alcohol use is defined as binge drinking on five or more days during the past month. What Are Risk Factors for Alcohol Addiction? Alcohol addiction can affect anyone, though certain risk factors may increase the likelihood of becoming addicted. According to the NIDA and other researchers, common risk factors for alcohol addiction include: • Aggressive behavior early in life • Lack of parental supervision • Peer pressure • Early exposure to alcohol • Easy access to alcohol • A family history of substance abuse and addiction • Poverty • Poor social skills • Binge drinking on five or more occasions in one month • Mental illness such as depression, anxiety, or schizophrenia • Low self-esteem • High stress Some people drink alcohol to feel better and relieve difficult emotions such as stress and depression, while others drink to feel its relaxing, pleasurable effects. The NIDA further states that some people may drink alcohol to feel more social and confident, or because they feel pressured to do so in social situations. Whatever the reason a person may drink alcohol, this behavior becomes troublesome when it starts causing problems with their health and everyday life. What Are Signs and Symptoms of Alcohol Addiction? Alcohol addiction is characterized by 11 signs or “diagnostic criteria” that indicate that drinking has become problematic in a person’s life. A person addicted to alcohol usually also exhibits one or more physical symptoms that indicate they are misusing alcohol. Signs and symptoms of alcohol addiction and misuse include: • Drinking alone • Having a high tolerance for alcohol/drinking more to feel the effects • Having poor personal hygiene • Smelling like alcohol • Difficulty trying to control or reduce alcohol use • Making excuses to drink alcohol • Having strong cravings or urges to use alcohol • Experiencing alcohol withdrawal symptoms (i.e., nausea, vomiting, shaking) when not drinking • Having frequent blackouts/memory loss after a night of drinking • Continuing to drink even when it causes or worsens physical and mental health problems • Continuing to drink even when it causes social, financial, and legal problems • Spending lots of time obtaining alcohol, drinking, and recovering from the effects of alcohol • Missing work or school due to drinking • Becoming aggressive, angry, or violent when confronted about alcohol use • Giving up important activities to drink alcohol instead • Developing serious, chronic alcohol-related health conditions, such as cirrhosis How Can Alcohol Addiction Be Effectively Treated? Several treatments are available for alcohol addiction, as some people may respond better to some treatments than others. However, evidence shows that alcohol addiction is best treated with a combination of medical detoxification (detox) and behavioral therapy. Medical detox treats physical dependence on alcohol, while behavioral therapy treats psychological addiction to alcohol. Behavioral Therapy Behavioral therapy helps people change harmful behaviors and attitudes related to alcohol use that may be contributing to their addiction. Cognitive-behavioral therapy, family therapy, motivational interviewing, and motivational incentives are common therapies used to treat substance use disorders, reports the NIDA. These therapies are conducted one-on-one and in groups and are available in both residential and outpatient treatment settings. 12-Step Support Groups Alcoholics Anonymous (AA) is a 12-step peer support group program that helps people stop drinking. This group therapy is available at addiction treatment centers and in communities and is completely free to attend. Many people who complete alcohol rehab programs choose to keep attending AA meetings for several months or years after their treatment programs end, as these meetings help them stay sober and accountable for their actions. AA meetings are available in nearly every town and city and cater to people of different ages, genders, and backgrounds. If you or someone you care about has a drinking problem, consider contacting a Baystate Recovery Center to learn more about your options. Treating alcohol addiction as early on as possible can reduce the risk of related complications and get you or your loved one back on track with healthy living.
Paul van Gerven 6 May 2016 After LEDs and solar panels, China is now setting its sights on semiconductors. International chip makers that want access to the Chinese market would do well to set up local operations. China’s semiconductor production has grown massively in recent years. Where in 2000 the country only manufactured 2.2 billion dollars’ worth of chips and related devices, that number was 60 billion last year. That’s a little less than one fifth of the global market, and twice as much as Europe manufactures. Yet it’s not nearly enough for the Chinese government. It ruffles the powers that be in Beijing that of the 145 billion dollars in semiconductors that China uses to produce electronics, at most one third is manufactured at home. The imbalance has been growing for years (see figure 1). What’s more, China manufactures primarily the simple stuff; the country’s role in advanced chips is insignificant. After making major inroads into LED and solar panel production, China is now setting its sights on semiconductor manufacturing. In 2014 the State Council presented its national guidelines for semiconductor industry development, which stipulate that by 2025 China should manufacture 70 per cent of the chips that it uses (see figure 2). According to consulting firm McKinsey, that can only happen in the foundry sector, for example, if the entire world builds all its new fab capacity in China for the coming decade – so ambitious are the country’s plans. Figure 1: China’s semiconductor manufacturing can’t keep up with domestic demand. Source: PWC Scraping by In fits and starts, the Chinese government has actually been trying to stimulate the domestic semiconductor industry for decades. Most of these efforts had little effect, because too little money was reserved for them and because investment decisions were left to the bureaucrats. This time, China’s taking a different approach. At 100 to 150 billion dollars, the war chest is well filled for the coming fifteen years, and the decision on how to spend that money will be entrusted to people who are on the front lines. Companies that have been identified as national champions will take the lead. Yet it’s no small feat that China has set itself. In the past Taiwan and South Korea, and before them Japan, were able to fight their way into the semiconductor industry, but those were different times. Growth has slowed, and only the largest company or two in each sector is able to turn a profit. The rest are just scraping by. Figure 2: If China is to meet its own IC objectives, it will have to absorb all the foundry capacity to be built in the coming ten years. Source: McKinsey In addition, China is dealing with a technological deficit so great that only Intel spends more on R&D. The country thinks in terms of cost competitiveness, but will have to teach itself the role of innovator. Drawing on foreign expertise is proving difficult: Micron, SK Hynix and Fairchild are among the companies that have turned down offers on all or part of their business. Few companies are eager to share their secrets with a country that has a poor reputation for protecting intellectual property. Many countries also have legislation that simply forbids the transfer of strategic technology. The only country where China has managed to get a few toes in the door is Taiwan, but that country’s recently elected new government wants to increase its distance from the mainland. But semiconductors are a strategic priority for China; profit can come later. The country is not afraid to mould the game to suit itself through draconian measures. A few years ago, for example, it provoked a war of attrition in the photovoltaic industry in order to penetrate the solar panel manufacturing market. This time, however, it’s more likely that China will follow the same strategy it used in the rare earth industry. With a near-monopoly in production, the country limited the export of these technologically vital materials several years ago. Foreign companies that were unable to find alternative sources found themselves forced to start something up in China. (Hastily initiated mining operations outside China seem to have contained the damage wrought by its ploy: the quota was lifted last year, in part thanks to pressure from the World Trade Organization.) In semiconductors, China can use access to the Chinese market as a lever. Companies must accept Chinese investments or start operations on Chinese soil to be able to continue supplying their products – a story all too familiar to Qualcomm: with the antitrust authorities nipping at its heels, the company has recently begun working with Chinese organizations. TSMC is also admitting defeat. The company recently announced it would build its first fab on the mainland. The foundry has always served the entire world from Taiwan, but must suddenly cater to ‘local needs’. China’s need for a native semiconductor industry, that is.
 Turn On Traditional Diets To Help Japanese People Maintain A Slim Shape | BURRA- TOP NEWS WEBSITES Turn On Traditional Diets To Help Japanese People Maintain A Slim Shape You've ever heard someone talks about traditional Japanese diets for children long and not fearless or not 9: 00/2: 57 Nam has many studies to show the advantages of foods In Japanese diet. Fresh food, green vegetables, rice, fish ... are simple delicacies that you can learn people in cherry blossoms to help you lose weight . Illustration. Long and less fat results with specific statistics show us that people in Japan live long and less obese. Their secrets are not only in diets, but thanks to dishes and habits of maintaining healthy life Although people are very hardworking, regretting work, but they always know how to balance the time To rest, enjoy nature, relax and maintain a healthy daily lifestyle. Japanese women are very few people with obesity. Some people think that Japanese women always eat fresh salmon and sesame so it provides a lot of energy, fully supplementing the substance but still helps the body slimming but the fact that Japanese is always done and maintained Traditional diets to stay healthy and beautiful. What are Japanese traditional diets? First, Japanese people always eat fresh foods and share small parts. What does that mean? The dishes are prioritized by Japanese to quality rather than quantity. In other words, there is no industrial food or food prepared in the microwave, fatty foods that only have fresh and natural foods. Another aspect needs to remember in the diet science Japanese people are the way they eat slowly and enjoy with fun. They often put a lot of effort to present and decorate their eye-catching and charming food. They not only eat with the stomach but also with their eyes and this is very important. Japanese is not a fan of bread or meat, they like rice, vegetables and fish more Fresh fruit is also a priority on their list of food. The most important food in the Japanese day is breakfast. They start a new day with a few diverse dishes with food from vegetables, rice, soups, eggs and essential drinks as green tea. Basic food in traditional Japanese-rice diets are Basic food in Japanese diet. This is a very good choice for health. Healthy and hardly carbohydrates.- Fruits, especially Fuji apples, pinks and tangerines.- Fish like mackerel or salmon.- Soybeans, millet, tofu are very rich in calcium and protein, are Alternative products for health-beneficial dairy products, rich in antioxidants, help reduce bad cholesterol and prevent diabetes. Green tea is always a top priority drink .- Vegetables like eggplant , green beans, red beans, mushrooms, cabbage, pumpkin, potatoes, radish and seaweed. If you also look forward to living long, healthy without worrying about obesity, try choosing healthy food like Japanese people above. At the same time, study the other Japanese healthy habits like meditation, walk or cycling and know how to enjoy great things around us every day. Moc Tra / VietQ Related news
Market research In addition to Subject Matter Experts (SMEs) and Key Opinion Leaders (KOLs), market research is the traditional function many businesses turn to and rely on for new product ideas. SMEs are people, both internal and external to the business, although they are usually internal employees, who have expertise in a particular area because of advanced training or experience. KOLs similarly can be internal or external to the business but are generally external. They are somewhat neutral, unbiased commentators on a wide variety of areas and subjects, such as technology' advances, political events, social trends, and so forth. They express their views and opinions in blogs, articles in relevant magazines and professional journals, and at conferences. Both SMEs and KOLs have valuable insight businesses often draw on for ideas regarding what to put into their product development pipelines. Although SMEs and KOLs are important for new product development, they cannot be solely relied on for guidance in what to produce next. They are, after all, not the customers, the ones who actually buy and will buy the business’s product and the ones who have problems the products are designed to solve. Ultimately, it is the customers who have the first and last say in what should be produced, but discovering what they have to say is not a trivial task. Market research methodologies are designed, and in fact continually evolve, to hear what they have to say. This is the Voice of the Customer (VOC). The customers may not know themselves what they want, and they probably do not, so they cannot articulate their requirements in sufficient detail so that product designers (i.e., engineers, technicians, marketers) can design and build a product. Instead, they send messages, sometimes cryptic, that hint at their problems and what they want or need to solve them. The problems are as varied as there are people so there is no one problem and no one solution. The problem could be product specific (“The power button isn’t accessible.”) or universal (“Ispend too much time vacuuming”). The purpose of market research is to distill the key or overriding problem (or problem set) from the myriad of hints provided by customers so the new product development team can define and prioritize their efforts. See Inmon [2018J and Barabba and Zaltman [1991] for some discussions about the importance of the VOC as market information to be heeded. Traditional market research uses surveys and focus groups to listen to the VOC and to distill the problem set from all the diverse messages sent by the diverse customer base. These tools can yield valuable insights. That is, uncover new market opportunities. At the same time that your business is researching customers, others are doing the same thing for the same purpose. So not only does your business have to assess what is important to its customer base but it also has to assess how other KMPs are performing in meeting customer wants and needs. One approach for assessing what is important and what the competition is doing is the Competitive Environment Analysis (CEA) mentioned earlier. This is based on survey data to address two problems: • 1. The competitive differentiation of the KMPs, on attributes of a product to identify market opportunities. • 2. The strengths and weaknesses of each KMP on each attribute. In essence, CEA is a classic Strengths, Weaknesses, Opportunities and Threats SIVOT analysis. This will aid the concept development team in identifying untapped or unmet opportunities. I will discuss this analysis and others in Chapter 2. < Prev   CONTENTS   Source   Next >
How to Control Flea Beetles This is an easy pest to identify. If leaves of your plants have small, individual holes, you likely have flea beetles. You can usually find the adults on the leaves. They are tiny, round beetles, often black, brown or with faint stripes. They have over-developed hind legs and will “jump” away from you when you try to touch them. The jumping, and the hind legs are why they are given the common name “Flea Beetle.” It’s also easy to identify them because they are usually limited to a few common host plants. The Nightshade family typically gets one species, whereas brassicas (including the turnip, mustard, radish side of the family) are often hosts as well. An adult flea beetle on the same leaf as an example of their damage. But, take a deep breath – They really aren’t that bad. Despite the leaf damage, you can do very little and still get the necessary control. However, there are usually two main concerns: potatoes and leafy brassica greens (like kale and arugula.) In those cases, a little more care is necessary to prevent damage making your produce unmarketable, or simply unwanted. Furthermore, in some areas, especially the Eastern US, flea beetle damage can be so quick and damaging that young plants can be killed or at least severely inhibited. While I mentioned two main host plants above, across North America there are several species and the host ranges are similarly specific, but affect other crops. Life Cycle: Flea beetles can have one or two generations each year. Adults overwinter under cover of leaf debris in wooded or bushy areas. Early in the spring (10C) they will begin to look for and feed on early plants in their host range. By late spring and early summer they will begin laying their eggs at the base of host plants. Those eggs hatch into larva that feed upon plant roots (or tubers) before pupating then emerging from the soil as adults. The in-soil life stage makes these pests easy to control with bio-control: Stratiolaelaps scimitus is an in-soil predatory mite that controls all sorts of soft-bodied plant pests. It is inexpensive, native and lives permanently in the soil. While they can spread out over the years, a top up in most crops hasn’t been necessary even 20 years after application. The added bonus is Stratiolaelaps is the industry standard control of fungus gnats, overwintering spider mites, pupating thrips, black vine root weevil, other grubs, springtails, early wireworm larva, and countless other pests. Buy small amounts here or look for other options here. Stratiolaelaps scimitus A trial in North Carolina proved that Stratiolaelaps was a control of the larva, but they also trialed Dalotia coriaria, a predatory rove beetle. (You can also buy them here.) They found the Dalotia to be a “promising control” of both adults and larva, but the trials concluded when the farmers chose to spray chemicals for the adults. The ultimate finding, from the farmers perspective, was that adults coming in from neighbouring areas meant that spraying early in the season was still most cost effective. However, the finding from the State Extension office was that Stratiolaelaps and Dalotia were suitable controls for the pest. Dalotia coriaria You may want to follow the lead by the farmers who sprayed. Fortunately, with a small host range, you can apply chemicals to only some plants – reducing their non-target impacts. However, it is never truly worth spraying. Their natural predators include parasitic wasps which parasitize the adults. Every time you spray you kill off a population of the predators that would normally do their job and make next year better (if not the current year.) So, how do you get early season control (in adult stage) without the use of chemicals? Trap Plants Potatoes and Radishes. When you know flea beetles will find your crop, give them something else to eat. For example, if you have brassicas, plant a variety of radishes to try to attract their attention. Apply Stratiolaelaps to the soil of the radishes to target their effect instead of broadcasting the soil mites around the rest of your site. Similarly, different species of potatoes seem to be favoured. Plant a variety to similarly attract the adults. You could also spray or otherwise kill the adults on these trap plants (like with sticky cards or soapy water) but again, you’d be killing the parasitoids inside of them that may spread to other populations if left to do their job. Brown Lacewing The Brown Lacewing, Micromus variegatus is a North American predator in both adult and larval stages and is a winter predator. It’s active all year and is actively feeding at temperatures as low as 4C. Applying these to your growing area in the fall will ensure they follow adult flea beetles to overwintering areas, reducing their adult population ahead of spring planting. This is not a “control,” since the Brown Lacewing is a generalist and will feed on over wintering aphids, and other pests and in the spring will also be interested in leaf hoppers, soft scale, mealybugs and others with a special love for aphids. But to have a predator working for you in the dark months is certainly worth considering. Also available here. Two brown lacewing larva fight over the last aphid Both Beauvaria and Metarhizium should be tried against flea beetle. Both foliar expressions or drenches (for the larva) should be very effective and have limited non-target damage. Both of these are parasitic fungi that infect the soft-bodied stages of many pests. Simply through contact the fungus eventually kills the host. There are many strains or species of these two fungi and some are always present in the soil to some extent, but usually not enough to control the best. So each online to buy and apply these at a rate recommended for control. The Bottom Line Ultimately, this pest gets lots of attention because of the sometimes large amount of damage they can do to leaves. But unless you’re going to sell those leaves and therefore need an immediate intervention, you can simply relax since the damage usually comes and goes (new leaves come up without damage) as the season goes along. But if you need early season control, or control to ensure your tubers are ready for sale, then there should be no other first step than applying Stratiolaelaps to the soil. This will both protect the roots now, and ensure fewer adults will be present next season. Your next steps should be to control adults to whatever level of “control” you are comfortable with. Avoid spraying and be a bit more tolerant of leaf damage. There is nothing more empowering as a gardener than doing nothing when you think you need to act and then finding out a week or two later that the problems take care of themselves. Leave a Reply Powered by Up ↑ %d bloggers like this:
kids encyclopedia robot Scossa, Nevada facts for kids Kids Encyclopedia Facts Quick facts for kids Scossa, Nevada Coordinates: Coordinates: 40°44′24″N 118°35′48″W / 40.74000°N 118.59667°W / 40.74000; -118.59667 Country United States State Nevada County Humboldt 5,289 ft (1,612 m) Scossa was a small mining town, now a ghost town, located in Pershing County, Nevada. Gold was discovered in the northwest spur of the Antelope mountain range to the south of Scossa in 1930, by the James and Charles Scossa. Their claim, the North Star Mine, was later renamed and consolidated into the Dawes Gold Mine, Inc.. Another large operation, the Hawkeye Mine, began operations in 1934, after a second large discovery of gold deposits. The mining town of Scossa serviced both of these mines, as well as others in the surrounding area. By 1939 most of the gold and silver available to be mined in the Scossa mining district had been extracted, and the mining camp went into decline. Smaller gold and titanium mining operations, less successful, were continued as late as 1955; today, the site is completely abandoned. One known building still stands at the site of the Scossa mining town. In addition, other debris and evidence of the town's existence still exists in and around the location, such as a large metal tank and other building materials. Scossa is at an elevation of 5289 feet (1612m). kids search engine Scossa, Nevada Facts for Kids. Kiddle Encyclopedia.
What’s an Alphabet? What’s an Alphabet? An alphabet is really a system of letters which are arranged according to a typical order. It allows visitors to write words in an alphabetical order. It is also used as a numbering system. The word “alphabet” hails from the Late Latin word alabetum, which was derived from the initial two letters of the Greek alphabet, the abjad. In lots of languages, the Greek alphabet is based on the Phoenician alphabet. The origin of the term “alphabet” goes back to the Greek language ‘alphabetos’, which means “beginning.” It had been used to describe a system of letters, which is used for reading and writing. The Greek alphabet has 26 letters (alpha, beta, beth, and zeta), as the Armenian alphabet contains a lot more than three thousand different letters. As well as the Latin alphabet, the Phoenician alphabet runs on the unique alphabet that has been developed in this region. The initial inventors of the alphabet may have been influenced by the Egyptians or other peoples who spoke the region of the eastern Mediterranean. They were also acquainted with other alphabets. As such, it is generally accepted that the first Hebrews along with other Northwest Semitic languages adopted the Greek alphabet. But this doesn’t mean that they are related. The Hebrews are a separate family of people. They also share a few of the same writing system. The Armenian alphabet is one of the oldest alphabets in use. It has been used to write the Armenian language since 405 B.C. It originally had 36 letters. Then, in the Middle Ages, two more letters were added. Through the twentieth century, it was made a decision to change the Greek alphabet by introducing the letter ew and discard the letter W. Then, in 1924, the letter OW was reintroduced. The alphabets of many languages in Asia were developed by a number of cultures. Some used Cyrillic, while others were developed in the Sinai Peninsula. However, the most ancient alphabets were predicated on a single language. In most cases, the alphabet contained the initial two letters of the Greek language and the next were abjads. Eventually, these three alphabets would be used to write numerous languages. In ancient Greece, the alphabet was made up of alpha, beta, and tuples. In addition to this, the initial two letters of the Greek alphabet were the a and the t, while the ahlabets of Phoenician languages were different in the beginning. The Greek letters were derived from the abjadi, something of numbering that had a specific order. The word alphabet originates from the Greek words ‘alphabetos’, this means ‘beginning’ and ‘beta’, which means’second’. The alphabet was initially used for reading and writing in the fourth century A.D., but it was later modified to include more letters. In the 1920s, the letter ew was added and the letter W was discarded. The alphabet has since been replaced with the OH ow. The Armenian alphabet is a graphically unique alphabetical writing system. It has been used for over three thousand years to create the Armenian language. It originally had 36 letters, but the Greek alphabets were expanded to add two more letters in the centre Ages. In the twentieth century, two new letters, the letter ew and the letter O ow, were introduced. This is actually the alphabet of the Armenian language. The alphabet has many variations, and is frequently not just a single language. Some are derived from European alphabets, while others are adapted from other languages. Arabic and Chinese scripts are two of the very most common languages on the planet. In addition to the alphabets, ahlabets may be used to write both spoken and written language. They’re the same and are useful for a similar purpose. In some instances, an abjad can be a complete alphabet. The Arabic alphabet is a very ancient alphabet that started in THE UNITED STATES. The alphabet was utilized by the first civilizations of the region and has been used ever since. The name of individuals who used it varies in one region to some other. The ancient language was adapted 스포 플러스 카지노 from a historical script. Its letters are shaped like a pyramid. In some cultures, the ahlabets are made up of several types. Slotomania Review Slotomania Review If you want to play slots, Slotomania is the perfect game for you. This online casino app was specifically designed to be played through Facebook. Whether you need to play for fun or win real money, there are better options. For social play, Slotomania may be the perfect choice. Its free-risk gameplay helps it be a top choice among millions of players. The game is available for Windows, 엠 카지노 Apple, Android, and Google devices, and also on mobile devices such as tablets. The interface of the Slotomania app is clean and highlights the most important features. This is a fun game that is all about spinning, winning, and losing. The combination of these mechanics makes the overall game enjoyable, addictive, and profitable. It’s a great way to spend a couple of hours without risking real cash. The app also rewards its players with frequent bonuses and will be offering. While playing Slotomania, you will be rewarded for the efforts every four hours. The interface of Slotomania is clean and clear to see, with all the current main features highlighted. The game is situated around spinning and winning. The interface allows you to customize the game to your liking. Its game flow is simple and clear to see. The gameplay is fun and addictive, and the graphics are very realistic. It’s a fun solution to spend time while you await your favorite movie. You’ll find the perfect slot machine game to play on your phone. The overall game is fun to play in any setting, and it’s easy to learn and play. There are several forms of games and coin types to choose from. There are even games to assist you develop your skills for real cash gambling. In short, Slotomania is an excellent place to kill some time and develop your skills for real-time gaming. So, ensure that you play Slotomania today! And remember to play responsibly, and you’ll never regret it. Using your mobile device is simple and safe. The app could be downloaded to your phone and installed on your computer. All you need to accomplish is follow the instructions and revel in yourself. You may also access Slotomania via your email, Facebook, along with other devices. All you need to accomplish is download the app, login and start playing! If you’re not sure how to play, you can examine out the website’s help section. This section contains some helpful information to help you get started. The social aspect of Slotomania is really a huge plus. As you progress through the ranks, you’ll be able to contend with your Facebook friends. This allows you to be competitive, and you will be able to beat them every time! You may also share your progress with your friends. However, the competition will get more intense as you level up. And when you’re not sufficient yet, it is possible to always practice your skills by playing Slotomania with your Facebook friends. As you can plainly see, Slotomania is extremely favored by millions of users. This success is because of the games that it offers, along with the user behavior. You can find two forms of players. First, there are those that love high returns and occasional luck. Second, there are those who love unpredictability and excitement. As the average player is quite happy with the odds, a far more engaging gambler loves the rush of winning big. Besides being fun, Slotomania offers rewards for its players. Moreover, the app is available in all major app stores. Those who prefer cellular devices can download its app from the Apple store or Google Play store. The loyalty program is quite interesting and bears plenty of rewards. The rewards receive out automatically. And, if you’re a loyal player, you’ll receive offers every four hours, allowing you to earn freebies and bonuses. As a new player, you need to earn points to become a top-tier player on Slotomania. To be able to unlock the Black Diamond VIP status, you need to reach 8 million annual status points. Once you have reached this level, you should have exclusive live chat support, as well as usage of exclusive bonuses and gifts. If you need to play with real money, you can even upgrade your account to get more coins. How exactly to Calculate Odds in Gambling How exactly to Calculate Odds in Gambling Odds are a measurement of the likelihood of an event. They’re calculated by comparing the possibilities of two events. Also, they are used in gambling. In the event that you bet $100 on a horse to win $1,000 in a horse race, you could be confident you’ll win if you are using odds. In the gambling industry, it’s likely that commonly used to determine the value of a bet. They can be confusing for beginners. This article will explain how to calculate odds in a straightforward manner. In betting, odds are displayed in one of 3 ways. The foremost is the American or decimal format. The second is the fractional format. Each method has its advantages and disadvantages. The latter is often used in horse racing. It is also a convenient way to display numbers without changing the odds’ value. The third method is also known as the ‘probability’ method, that is written as the ratio of a profit over a risk. Using odds is useful when betting on events with different probabilities. In a three-horse race, the real odds against winning are 50%, 40%, and 10%. The total of the probabilities equals 100%, and represents a good ‘book’. If you bet on a horse with a higher probability of winning, you could be confident that you’ll win. If you are not confident, you may use odds to evaluate the probability of a result. The second method is the reversing ratio. The reversing ratio will switch the chances for and against a certain outcome. If the event is more prone to occur, then the probability of a positive outcome is higher. In the U.S., an increased probability of a result implies that it’s more likely that the results will occur than it could if the event happens without any exposure. In Europe, a minimal probability of a result is high. When betting on sports, it’s likely that used to describe the likelihood of an event happening. When you place a bet on a particular team, you’re betting on the team to win the game. It is possible to bet on the underdog, or it is possible to bet on a team’s overall record. The chances are a measure of the probability of winning. In other words, the chances are the probability of losing a game, and a particular event will have a higher or lower chance of occurring. Regardless of whether you’re betting on football or horse races, you’ll need to know the odds to make informed decisions. The chances of winning a game will be the mathematical possibility of the team’s victory. By calculating the odds, you’ll have the chance to regulate how much money a team is worth. It’s crucial to understand that odds can change spontaneously, so you shouldn’t place your bets predicated on them. Odds are the percentage of a particular event versus the probability of it not happening. Generally, odds are quoted with regards to the probability an event will occur. If a meeting occurs, the odds will be higher than those of the opposite. However, if an event will not occur, it will be less than the probability. In this instance, the outcome of the odds is the “winner” and 넷마블 바카라 the “no”. The win would be the team’s win. In the United States, moneyline odds are not the same as moneyline odds, and they are written differently. In the UK, you should bet on the team which has the better statistical record. The moneyline will be less than the total, but it is still more prone to win the game. In america, the moneyline gets the highest probability of winning the overall game. The winnings will undoubtedly be greater when the team is more likely to win the game. There are two types of odds. The foremost is called money line odds. The second is called decimal odds. The latter may be the most common in the United States. A straight wager takes a $1 minimum bet, whereas a moneyline bet takes a $180 minimum bet. In the united kingdom, the minimum wager is $1 for a money line bet. Hence, money line odds are different then decimal odds. What’s the Jackpot of the Powerball? What’s the Jackpot of the Powerball? The Powerball can be an American lottery game. It really is currently provided by 45 states, Puerto Rico, the U.S. Virgin Islands, and the District of Columbia. The multi-state lottery association coordinates the Powerball. This is a nonprofit organization formed by lobbyists and US corporations. It is a highly popular game with plenty of players who desire to win the $1 billion jackpot. To play Powerball, players must register on the Multi-State Lottery Association website. Once you have purchased your ticket, check out the Powerball payout chart. This will demonstrate the winning numbers and the chances for each prize. It will tell you which numbers are likely to be drawn next. The Powerball jackpot is the largest lottery prize in the world. If you’re fortunate to win, you can enjoy all of the jackpot games in one transaction! For example, if you play the Mega Millions lottery, you can win the jackpot of $1 billion. The jackpot quantity of the Powerball game isn’t fixed. It can increase or decrease as time passes. The prize amounts for winning tickets can vary. Through the Summer Olympics, Powerball draws are usually more powerful than on Wednesdays. Other factors, like the interest rates on the securities used to invest in the prizes, may also impact the advertised Grand Prize. Additionally it is important to note that winning tickets in the Powerball lottery can be higher than the average in the same state. The jackpot for the Powerball lottery is based on parimutuel numbers. Usually, the jackpot is not a set amount. The Powerball can be any number between one and twenty-six. However, once the Powerball is drawn, the prize is divided on the list of winning plays and may be considered a guaranteed amount. The drawing for the Powerball occurs on Monday, Wednesday, and Saturday nights. Additionally, there are many ways to win the jackpot. The jackpot of the Powerball is the largest in the history of the lottery. It was announced in April 1992, but was only available in Iowa until 2012. Today, Powerball draws are held on Mondays. It is the only lottery that is not published on Wednesdays. The jackpot for the Powerball draws is $1.586 billion. For those who have a winning ticket, it is possible to cash it right away or claim your prize on the Exchange Ticket. After the jackpot, winners must make immediate plans to claim their prize. The prize of the Powerball is really a $1.5 billion annuity. If you win, you can choose a lump sum payment or an annuity, which is paid in 30 graduated installments. In Florida, you must do something within 60 days of winning the jackpot. This means you have two weeks to choose between the two options. The prize is divided into several parts. The Powerball is really a multi-state lottery that provides one jackpot. In addition, this is a $1-per-play game. The winning numbers for the Powerball are drawn from two drums. The red “Powerball” ball is drawn from the initial machine, as the other machine contains five white balls. Matching three red Powerballs will win the game. The Powerball is an extremely popular game and has a high payout of $1.5 billion. After a Powerball drawing, supplementary draws will take place. These drawings will offer an additional possiblity to win the prize. On August 23, 2021, a third weekly drawing will undoubtedly be added. The Multi-State Lottery Association, a nonprofit organization, coordinates the Powerball. The Powerball has nine methods to win. The first prize has nine ways to win, while the second is really a double chance. The Powerball can be an Australian lottery game. The Powerball is really a multi-state game. Whenever a player plays the Powerball, they pay the cost of one ticket. The amount of money is divided among all the winners and the prize grows by $10 million each time a winning ticket will not win. As well as the jackpot, there are other cash prizes for the Powerball game. On 넷마블 바카라 November 2, 1997, the Powerball game was initially introduced in Florida. But Jeb Bush prevented the expansion because he thought it could hurt existing lottery games. Governor Charlie Crist eventually overruled the legislation and the state did not desire to lose the opportunity to expand the game. Besides the Powerball, the overall game offers nine ways to win. The winner chooses one of the five numbers from 1 to 69 and the Powerball number in one to 26. The initial prize pool of $1.586 billion is shared among three winners. In January 2016, the Powerball game set a world record with the winnings from Florida and Tennessee. The jackpot was split between two millionaires. Anyone who has won will get the initial prize share. PTV Sports in Pakistan PTV Sports in Pakistan PTV Sports is a 24-hour sports channel in Pakistan. It really is owned by the state broadcaster Pakistan Television Corporation. The channel launched on 14 January 2012 and contains exclusive broadcasting rights to many sports. As a result, it gets the most content available. It airs international and local events and has a big audience in Pakistan. Among other things, PTV has a selection of exclusive content, including exclusive matches for top level sporting events. ptv sports PTV Sports began airing on January 4, 2021. The network unveiled its logo, graphics, and theme music. On April 5, the channel’s opening billboard was unveiled. In November, the network moved the show to a youthful time slot. After the switch, it changed its programming schedule and moved PTV Sports to a 10:30 p.m. 블랙 잭 룰 timeslot. The brand new schedule will feature more live events. However, viewers should expect fewer news and sports shows than before. After a month to be off the air, PTV Sports has resurfaced at a fresh timeslot. The channel has acquired the rights to ICC cricket games on cable and satellite for the years 2015 through 2019. In addition, it obtained rights to broadcast the Cricket Australia series on Sundays and Mondays. It has also acquired the rights to broadcast the Olympic Games every four years. The network hopes to regain its primetime slot on Saturday nights. In July 2017, PTV Sports reverted to its original timeslot and today airs every thirty minutes. It also acts as the sports news segment on some PTV newscasts, including Ulat Bayan, PTV News Headlines, and Ulat Bayan Weekend. The business also revamped its opening billboards in a 3D-like format. This helped it gain new audience and improve its ratings. And, since the program now airs on Thursdays, the network also offers the very best coverage of cricket matches. The PTV Sports channel is known because of its flagship program, “Sports Circle”. It is hosted by Muhammad Ali Sanwal and Aamir Sohail, who’s a retired cricketer. It is also broadcast in a variety of newscasts on Mondays and Thursdays. The PTV Sports logo is in 3D and features a rotating image of a football field. Its logo is presented in a 3-D-like format to promote its sport. The PTV Sports network is a leading way to obtain news in the Philippines. Its flagship program, “Sports Circle,” features a panel of sports stars, including Nauman Niaz. In addition to these, it airs many other programs, like the PTV News Network. The network’s programming schedule changes each week. While several programs have been reshuffled over the past few months, normally the one is Sports Circle. The PTV Sports network has moved its timeslot to 8:00 pm to accommodate ACB Liga Endesa. The network is currently broadcasting the ACB Liga Endesa every Monday and Thursday. Its time slot has been changed to accommodate this event. While PTV Sports is not any longer on air during this time period, it will continue to be broadcasted on various newscasts. A live blast of the PTV Sports newscasts will undoubtedly be designed for free on the PTV website. The PTV Sports network’s schedule includes a amount of other programs. The PTV Sports Network supplies a wide variety of sports programs, including football, baseball, and basketball. The network features the opinions of well-known sports analysts on current sporting events and tournaments. In addition to the broadcasts, PTV has a variety of news segments. These newscasts can be found on various platforms. The new schedule of PTV Sports is the greatest solution to stay informed on the latest happenings in sports. The PTV Sports Network includes a variety of programs that cover different sports. The PTV Sports Network is a great choice for individuals who love watching live sports. Whether you prefer football or soccer, PTV has everything. With its live streams, you can enjoy live events together with your friends and family. These programs also feature regular interviews with players. So, if you are a fan of the PTV Sports network, you should have plenty of options to select from. For avid sports fans, PTV Sports live is the best choice. The network offers a amount of programs on various sports. Most of these are broadcast round the clock and are available all over Pakistan. In-depth analysis and quality base content are given on PTV. You may also watch a badminton game on your mobile phone while traveling. This can be a great way to keep up with the latest sports. Bitcasino Review Bitcasino Review When it comes to online casino gaming, Bitcasino is a popular choice. Its website has an intuitive interface, supports several popular cryptocurrencies, and contains an associated QR code for easy identification. The client support team is available 24/7 via live chat and email, and offers a wide range of help options to help you make the most of your Bitcoins. Apart from the FAQ section, the casino offers a number of promotions, including cruise trips and bonuses for new clients. BitCasino offers a amount of security features which make it one of the leading online casinos. Among them are their secure payment processing, an excellent selection of games, and a huge library of games. The web site has a reputation for providing high quality service, and is known because of its regular promotions. In addition, it also has a robust loyalty program and a specialized live dealer casino. The site is particularly good for slots, baccarat, along with other classic casino games. For security, Bitcasino has a number of measures set up. Its payment system is secured with two-factor authentication, and it also employs SSL encryption to safeguard your sensitive information. Additionally, it includes a help centre that will help you if you encounter problems. And of course, it’s possible to contact the customer support team on social media marketing, through email, or through live chat. Using these features, you can feel confident in using the site. Bitcasino has become an industry leader when it comes to security and convenience. The registration process takes under one minute and you could use ten different languages. There is no need to download an app, that is great for those with limited computer knowledge. The casino comes with an outstanding speed, which explains why it really is so popular among e-sports players. The site’s wide range of games allows users to play an array of games. The software is fast 드림 카지노 and customizable, and you also don’t have to be worried about compatibility issues. Other areas of Bitcasino’s security are its SSL encryption and the casino’s regulated by Curacao authorities. This means that the casino is certified and that you can trust it without worry. Moreover, the site can be known for offering a satisfying gaming experience. Lastly, the Bitcasino cryptocurrency exchange is trusted, which means that it’s one of the best in the world. If you’re looking for a trustworthy, safe and reputable platform, then it’s worth looking at Bitcasino. Aside from supplying a comprehensive casino product, Bitcasino offers its customers a number of ways to contact customer care. For example, in case you have a question regarding withdrawal or deposit, you can even contact Bitcasino’s customer support team via email. If you are not comfortable with emailing them, you can use live chat to talk with a live customer care agent. However, if your question is too complex for a live chat operator, you can try to get the answer in the FAQ section of the site. Besides its Bitcoin casino, the website also offers other currencies. It supports Portuguese, French, and Estonian. The site’s languages are restricted to the Netherlands, UK, and america. You can find 8 other languages supported, however the main ones are English, Chinese, and Portuguese. This is a good option for individuals who have a limited amount of money. But if you’re searching for more diverse language support, you can test Litecoin. The Bitcasino site is well-designed. The site has a clean and easy-to-use interface. There are many languages to pick from. Fortunately, the software works with with all major crypto-currency currencies. Regardless of the limitations of the Bitcasino network, the site’s design is quite attractive and makes it a fantastic choice for international gamblers. If you are searching for a casino with a global audience, this might be the right option. You can find no welcome bonuses at Bitcasino, however the welcome offer is worth checking out. The site offers free spins and cash prizes to its players. You can choose between these two options. The bonus is dependent on what much you deposit and how often you play. The most you can withdraw is 1 BTC each day. If you’re searching for a high-value prize, you may want to consider playing at the Bitcasino’s live casino. Things You Should Know About Sports Betting Things You Should Know About Sports Betting Sports betting is really a popular pastime. There are hundreds of different sports to bet on, including baseball, football, soccer, and basketball. Lots of people also wager on games involving personal skill. For instance, skeet ball is really a popular game that requires a new player to use personal skill. Along with sports, betting can be common for card games like poker. However, there are some things you have to know about sports betting before you place a bet. The main benefit of betting is the potential for winning. In the event that you win, you’ll receive a prize. But gleam risk. While gambling depends on pure luck, you can make your bets based on research. By assessing the odds of a sporting event, you can determine whether it is likely to happen or not. Exactly the same applies to side betting games. In-person spectator games such as for example Moundball are also popular options. The optimum time to place a bet is when the odds are favored over the underdog. The point spread is used to level the playing field between the two teams. The odds you see will be the amount you bet minus the amount of points you’d bet if you won the game. Additionally it is used as a handicapping tool, wherein one team’s favorite will undoubtedly be favored over another. A soft line isn’t the real posted line. When you can bet all year round on the NBA and NHL, the most famous time for betting on sports is through the winter months, when the Super Bowl occurs. The National League playoffs begin in October. In March, spring training baseball games get underway, and then professional baseball teams play games against one another. When these events are over, the winner collects their winnings. While sports betting season is all-year round, there are some key differences between the seasons. While sports betting is really a marathon and a sprint, it is not a race. This is a long marathon. If you are betting on a marathon, you’ll have good days and bad days. A marathon requires more than a sprint. If you are betting on a football match, you will be risking between one and five percent of one’s bankroll. You can even bet on historical events. This type of bets isn’t always profitable. The kind of bet you place will determine your odds. Parimutuel bets, for instance, involve betting on a horse or dog. While the odds of a horse or dog racing match are based on the number of participants, there are many ways to reduce the overall odds. While the it’s likely that set in stone, the betting terms can vary greatly. For instance, an NFL game may have four teams rather than one. While there are plenty of types of sports betting, the standard is straight betting. In cases like this, a team is favored if they’ve won a previous match. It is a common solution to bet on sports. However in some cases, betting on a team’s favorite will help you win the game, but a favored team can also be a great bet. You may also bet on an underdog, with respect 온라인 카지노 사이트 to the circumstances. Parlays certainly are a popular bet for amateurs and novice bettors. The payout scale in a parlay matches that of the casino. For a parlay to win, each of the games must win. This helps it be a popular bet. For instance, a player who’s betting on the Kentucky Derby and the New York Yankees on the same team could win by placing a parlay bet. If the overall game has been declared the winner, the bet is a winning bet. Parlays are bets which contain multiple outcomes. The complete wager depends on all of the events winning together, and when all of the individual outcomes are successful, the parlay pays out. These bets have several benefits, but they are more complicated to place. This short article will explain the basics of parlays. We will also discuss many of the most common types of parlays and how they differ from each other. This will assist you to decide which ones to put on confirmed day. For instance, if the Panthers win the initial half of a game and the Hurricanes win the second, the parlay payouts can increase. If both teams win, an absolute parlay would make the team in the early game the only real team to advance to the playoffs. An identical situation occurs if the teams are playing in staggered games. According to the nature of the game, one team may have more importance than another, affecting the significance of the second game. Those changes can change the parlay payout. Parlays are the most popular form of wagering. They involve combining several wagers right into a single bet. While the odds for a parlay are higher than the odds on a person wager, they are not greater than a single bet. Once you win in a single leg of a parlay, the winnings roll over to another leg. The Kansas City Chiefs closed -5 on the betting total in 넷마블 바카라 the Super Bowl and the Tampa Bay Buccaneers finished -3. While parlays are more complicated than straight bets, they can still be profitable. If you make smart decisions, you can spread your bets among multiple sports and leagues. For instance, if you bet on both football and basketball games on a single day, you will be able to take your money back and still have a profit. And if you win a parlay in the first two games, you can hedge for the next game or two. In parlays, you should bet on at the very least three different events. It is possible to choose from point spreads, moneylines, and prop bets. In case you are putting money on the winner of the parlay, it is possible to bet on multiple games with different odds. But if you are combining multiple games, you need to make sure that all the teams in the parlay are even. If you are betting on both football and basketball, it is possible to put bets on both teams. The best bet for a parlay is a win on the first game. A parlay is a wager which involves multiple sides of a casino game. You can choose between an individual team and a stacked parlay. You ought to know of the possible risks of every team. Adding a single bet on the initial leg is a surefire solution to lose a parlay. In football parlays, it is possible to bet on two teams and the winner of the 3rd game. But the it’s likely that lower than in the event that you bet on a three-team parlay. A parlay is really a mix of several bets with correlated outcomes. It is not uncommon for a parlay to be based on multiple teams. A single team, for example, includes a 50% chance of winning. Another team, that includes a 50% chance, is really a tie. Similarly, a three-team parlay includes a 33% probability. This means that the second bet would be the winner. A parlay is a bet that includes multiple outcomes. The odds are calculated by dividing the total probability of each segment by the number of possible outcomes. If you bet on two favorite teams and a heavy underdog team, you can multiply your winnings. In other words, you’re betting on both favorites and underdogs. You’re betting on both of these. This is how to create a successful parlay! A parlay is a bet that involves two or three teams in various games. A three-team parlay pays out exactly like a two-team parlay. You’ll be able to win in parlays through the use of two or three teams. A four-team ML parlay pays out doubly much as a five-team one. If you are a professional gambler, a parlay could possibly be the most profitable bet you place in the sport of one’s choice. How to Unblock Bet365 on Mobile bet365 on mobile How to Unblock Bet365 on Mobile If you’re looking for an online casino with a mobile version, bet365.com has an app available for many cellular devices. Fortunately, the app is available for most os’s and devices. However, some could have trouble running the software. No matter your device’s compatibility, we’ve found a way to unblock Bet365 on mobile. Here’s how it operates. Just follow these steps: Ensure your device works with with the site. The web site is fully mobile-compatible and will open on all major browsers, including iPhones and Androids. With a mobile device, you’ll be able to access all of the features of the bookmaker, like the live chat and Quick Bet features. Once you’re prepared to start betting, you can sign in and play any games you need on the go. If you’re looking to follow the action, the Bet365 Live feature lets you follow your favorite sporting event live. This feature allows you to track statistics and the movement of the ball. To utilize this feature, you will have to activate the live icon within a particular game. You may also access Race Live if you are interested in following horse races. The app will display the participants’ GPS positions and a progress indicator. The bet365 app requires a stable WiFi connection and at least 40MB of space on your own phone. The app also requires location services, which is useful if you’re outside of New Jersey. GeoComply plugin must also be installed on your browser. This plugin allows you to view bet365 on mobile while being proudly located in New Jersey. Once you install the plugin, bet365 on mobile can open in your browser. While the app isn’t available for iOS or Android devices, bet365’s website is fully secure. It is possible to bet on any sports event and the chances are always competitive. If you are searching for an online casino that offers mobile gaming, bet365 may be the perfect place to begin your search. You can access the site anytime you need from wherever you are. With its simple to use mobile application, you’ll enjoy sports gambling with ease and comfort. Using the Bet365 app on mobile is fairly similar to their desktop version. It is possible to navigate through parts of the app and utilize the menu to search for a specific game. The menu on the Bet365 mobile app is easy to browse and provides an excellent search function. Unlike its desktop counterpart, you will find a particular game or player by typing its name. The livebetting section also features a good interface for managing your account. Apart from the games, the app offers other options to make it convenient. The Bet365 mobile app is easy to use and has great graphics and interface. The app also enables you to place bets on sports events and races, and also supplies a live chat option for assistance. Once you have mastered the basic functionality of the app, you can enjoy all the fun and excitement of the web sportsbook. And if you are considering a casino app, the Bet365 mobile app is the perfect choice. The Bet365 mobile app allows users to place bets with just a few taps. The app is available on both Android and Apple devices. The mobile app could be downloaded for free from both the Google Play store and the App Store. The mobile version of the web site comes with an extensive database of games and an excellent interface for the iPhone. It is very intuitive and has great support for the Apple iOS platform. Furthermore, Bet365 supplies a free bets cash-out feature if you lose a game. If you’re searching for a mobile app for bet365, you’ve arrived at the right place. The Bet365 app is made to be easy to use and includes everything you need to place a bet. The only real drawback is that the app is limited to a small number of American states. The app is available in more states soon. The main reason for this is basically because bet365 is sm 카지노 a global sportsbook. Champions League Predictions champions league predictions Champions League Predictions It isn’t an easy task to make champions league predictions, but once you learn the teams’ strengths and weaknesses, it is possible to make an informed decision. The most recent results in the competition have already been relatively predictable. Put simply, PSG is among the strongest sides in the competition, but they’ve also had their fair share of misfortune. While this isn’t a problem for many teams, it’s still important to make the proper choices. The average amount of goals scored in the Champions League last season was 2.92. This was inflated by a number of big wins over lower-ranked sides in qualifying rounds. In addition, 40.3% of matches ended in a home or away win, and only 18.5% of games ended in a draw. Regardless of the unpredictable nature of the competition, it’s still an effective way to create champions league predictions. If you follow the statistics closely, it is possible to predict which teams will win the competition. Club Brugge face Leipzig on Tuesday night. As the Belgian side won their last game, these were struggling to upset Man City in the group stages. The team remains in third place, but the lack of talented attacker Ruben Providence is a concern. But it’s worth noting that the Red Devils have a lot of talent on the pitch. So, while Real Madrid may have a better record this season, the Serie A team could be the one to beat these times. Bayern Munich are on the list of favorites to win the Champions League. However, this matchup can be an absolute must-win game for Bayern Munich. With the loss of Kingsley Coman and Kimmich, the German side has suffered a significant blow to their attack. With the lack of these players, the team will dsicover it difficult to keep up making use of their talisman players. It’s hard to create accurate predictions when you’re not really acquainted with the league. Chelsea are being among the most powerful and successful teams in the Champions League, however the English team lost to Liverpool in the ultimate. While Chelsea were the first to win, Manchester City are the best team in Europe, but they’ll need to fight off Dynamo Kiev. It isn’t the case that they can win the competition, but it’s unlikely that they’ll reach the final. So, bet on Bayern Munich to win the Champions League again this season. The Champions League has seen some high-scoring games in recent years. Last season, the average number of goals scored per game in the competition was 2.92, but this figure is inflated by big wins against lower-ranked teams in the qualifiers. Furthermore, there were 185% of games played in the group stages that ended in draws. The results of these games, then, are often predictable. There was only 1 major 솔레 어 카지노 쿠폰 team with a perfect record this past year, while Barcelona and Bayern Munich are the least. The first two rounds of the Champions League will be interesting. For instance, Bayern Munich and Manchester City will both face Dynamo Kiev. This match will determine which team will advance to the next round, as the winner will be determined by which of these two teams finishes because the group leaders. For individuals who are not as confident, there are also other ways to make champions league predictions. For instance, the Premier League includes a history of winning in the Champions League, and the league will continue with the same tenor. In the group stages, Bayern Munich and Real Madrid will be the two teams with the very best record. But there is absolutely no clear favourite this season. Besides, Bayern Munich is one of the favorites in the competition. Should they win this match, they’ll be eligible for the Champions League. You can even make Champions League predictions by looking at the teams that are more likely to advance in the group stage. In the ultimate, it’s likely that the final winner will be a team that is unlucky. In the group stage, it’s hard to make a definitive champions league prediction. Nevertheless, it is possible to make a better-informed choice once you learn the teams involved. In some cases, it may be a matter of the consequence of a team’s last match. Some individuals may think that this is a bad sign, but the real reason is a team might win the Champions League because it’s more likely to win than a team that’s not as lucky.
Hispanic Heritage Month Here are five facts to help mark National Hispanic Heritage Month, which began this week. 1. National Hispanic Heritage Month traces its roots to the 1960s. The month honors the history, culture and contributions of Americans whose ancestors came from Spain, Mexico, the Caribbean, Central America and South America. The commemoration began in 1968 as Hispanic Heritage Week and was expanded in 1988 to cover a 30-day period from Sept. 15-Oct. 15. This period was chosen because Sept. 15 marks the anniversary of independence for Costa Rica, El Salvador, Guatemala, Honduras and Nicaragua. Additionally, Mexico, Chile and Belize celebrate their independence during the month. 2. The United States is home to 60.6 million Hispanic people. This makes people of Hispanic origin the nation’s largest ethnic or racial minority, according to census data. Hispanics constitute 18.5 percent of the nation’s total population. Approximately 69,000 Postal Service employees — or roughly 10 percent of the USPS workforce — identify as Hispanic or Latino. 3. Twelve states have 1 million or more Hispanic residents. These states are Arizona, California, Colorado, Florida, Georgia, Illinois, New Jersey, New Mexico, New York, North Carolina, Pennsylvania and Texas, according to census data. An analysis by the Pew Research Center shows more than half of Latinos in the United States live in California, Texas and Florida. 4. The nation’s Hispanic population is aging. In 2019, the median age of the Hispanic population is 29.8 years, up from 27.3 years in 2010, according to the census. 5. Many Hispanic Americans have been honored with stamps. The list includes Civil War hero David G. Farragut; composer John Philip Sousa; entertainers Desi Arnaz, Selena and Lydia Mendoza; labor leader Cesar Chavez; educator Jaime Escalante; journalist Ruben Salazar; designer Oscar de la Renta; and artist Emilio Sanchez, who was honored with stamps this year.
The Benfits of Juice Fasting The Benfits of Juice Fasting Although it is well-known that consumption of fruit and/or vegetable juices only in the long term does not provide enough energy, carbohydrates, fats and proteins. It is widely recognised that these juices may be a good source of other important nutrients, such as vitamins and inorganic compounds (1, 3). Removal of fruit and vegetable pulp does not compromise delivery of the aforementioned compounds when pure vegetable and/or fruit juice is consumed (1, 3). Aside from these essential compounds, other phytochemicals are often present in fruit and vegetable juices which may change cellular function for other health benefits (3). Phytochemicals, such as polyphenols and/or flavonoids, may interact with certain metabolic pathways involved in development of lifestyle-related chronic diseases (3, 11). Considering all of the aforementioned regulations and benefits of fruit and vegetable juicing, we present a summary of the most important benefits which have been documented to date of not only drinking this fruit and vegetable juices alongside other foods, but of juice fasting. Important note: juice fasting is not meant to be a long term solution. It is better to use extended juice fasting occasionally every 3-6 months or on a yearly basis. Then add cold press vegetables juices into your diet daily to increase your intake of antioxidants, phytochemicals, polyphenols and nutrients. What science says about juice fasting Importance of juice cleansing or fasting is very much related to its very own capability to detoxify, reset and reduce gastrointestinal exposure to environmental factors which may harm correct intestinal functioning. This harmful exposure is mainly related to modern diet, which is often contaminated with toxins, heavy metals, pesticides and herbicides such as glyphosate, which have been shown to change intestinal microbial composition involved in the development of certain diseases (16-17). A clinical trial showed particular concern in the possible benefits of fasting for rheumatoid arthritis (RA); this particular study, enrolled 16 patients with RA which underwent fasting for 7-10 days vs. 10 more patients which acted as controls and consumed a regular diet. 5 out of the 16 individuals in the fasting RA group, showed significant reduction of symptoms meanwhile in the normal diet RA group, only 1 patient showed significant improvement (12). It has been hypothesised that caloric restriction resulting from fasting may change the body’s response to inflammation and autoimmune reactions: lymphocytic behaviour may be altered during fasting, which may explain why patients with RA show significant improvement during fasting (12). Considering the important caloric restriction which occurs during juice fasting, these benefits may also manifest and further improve RA in a greater manner, considering the anti-inflammatory properties of fruits and vegetables (11-12). Intestinal permeability and RA have also been linked and evaluated together in clinical trials (13, 15). Increased intestinal permeability is often referred to as “leaky gut”, which is a condition in which the normal lining of the intestines, designed for controlled absorption of nutrients and other molecules into the bloodstream, is compromised because of the presence of large cracks or holes which no longer allow for a controlled absorption of molecules, permitting other pathogenic compounds, such as bacteria, toxins and molecules, into the bloodstream (14). Increased intestinal permeability or “leaky gut”, allows the free pass of environmental factors to enter the bloodstream which (alongside genetic predispositions), trigger certain autoimmune diseases such as RA (15). In a study, 5 patients with RA and increased intestinal permeability were recruited and underwent fasting for 10 days with the sole administration of 800 Kj derived from fruit and vegetable juices vs. other 5 control patients which followed a normal diet (13). The experimental group experienced an overall improvement in RA symptoms and reduced intestinal permeability (13). It is often recognised that dietary factors may alter the microbial composition which may allow for increased intestinal permeability (i.e., a higher count of Clostridium perfringens, has been documented to be present in patients with RA) (13). Benefits for RA might be clear in relation to juice fasting (11-13). Juice fasting makes it easier for anybody to squeeze more fruits and vegetables into their everyday diet (CDC recommendation is for everybody to eat nine servings of fruits and vegetables per day) (1). Juice fasting allows for an increased daily ingestion of antioxidants, soluble fibre, vitamins and minerals, which are all essential compounds needed for the correct functioning of the human body (1). Depending on the different varieties of juices which can be mixed together, you can obtain different health benefits, such as the following (1, 2, 8): 1. Decreased oxidative stress from drinking carrot juice due to augmented ingestion of antioxidants (such as β-carotene). 2. Increased consumption of vitamin C (easily obtained from any fruits and vegetables), which further results in increased iron absorption. 3. Improved lipid levels (e.g., kale juice). Juice fasting may augment the consumption of phenolic compounds which have been shown to possess anti oxidative, immunomodulatory and antimicrobial activities, all which may be beneficial for human health (3, 4). Juice fasting increases the ingestion of soluble fibre which is often implicated in the overall improvement of gut microbiota (1, 5). Increased consumption of fruit and/or vegetable juice may alter the human microbiota due to its high phenolic content, making it more similar to that of lean individuals (i.e., Increases the Bifidobacteria, Lactobacillus and Verrucomicrobia phyla and decreases the Firmicutes phyla) (3, 6). Juice fasting allows for rapid short-term weight loss (e.g., reduced intake of overall calories which results in mobilisation and oxidation of fatty acids) (3, 7). Juice fasting results in increased consumption of flavonoids, which in turn may help decrease the risk for cancer and heart disease (8). Juice fasting has been linked to increased short-term satiety, due to its high water content, which in turn exerts a mechanical function in the stomach, expanding its walls and resulting in reduced hunger through the liberation of hormones, neurotransmitters and incretins (e.g., serotonin, Glucagon-Like Peptide 1 [GLP-1]) (9). Juice fastings low caloric value may aid in weight reduction (7, 10). 1. Juice fasting may be beneficial for correcting increased intestinal permeability or “leaky gut”. 2. Juice fasting may be beneficial for reducing symptoms and severity of certain autoimmune diseases such as rheumatoid arthritis. 3. Juice fasting may be beneficial for reducing body weight through mechanical and metabolic pathways. 4. Juice fasting may be beneficial for cardiovascular health, because of its high phenolic content. 5. Juice fasting may be beneficial for improving the composition of gastrointestinal microbial species. 1. Publishing H. Juicing -- Fad or Fab? - Harvard Health [Internet]. Harvard Health. 2015 [cited 30 January 2021]. Available from:,a%20regular%20diet%20with%20juices. 2. Office of Dietary Supplements - Vitamin C [Internet]. 2020 [cited 6 September 2020]. Available from: 3. Henning S, Yang J, Shao P, Lee R, Huang J, Ly A et al. Health benefit of vegetable/fruit juice-based diet: Role of microbiome. Scientific Reports. 2017;7(1). 4. Li A, Li S, Zhang Y, Xu X, Chen Y, Li H. Resources and Biological Activities of Natural Polyphenols. Nutrients. 2014;6(12):6020-6047. 5. Simpson H, Campbell B. Review article: dietary fibre-microbiota interactions. Alimentary pharmacology & therapeutics. 2021. 6. Turnbaugh P, Ley R, Mahowald M, Magrini V, Mardis E, Gordon J. An obesity-associated gut microbiome with increased capacity for energy harvest. Nature. 2006;444(7122):1027-1031. 7. Mahan L, Raymond J. Krause's food & the nutrition care process. 14th ed. St. Louis (Mo.): In: Nutrition in Weight Management; 2017: 392. 8. Heyman M, Abrams S. Fruit Juice in Infants, Children, and Adolescents: Current Recommendations. Pediatrics. 2017;139(6):e20170967. 9. Ross C. Modern Nutrition in Health and Disease. 11th ed. Philadelphia:Wolters Kluwer, Lippincott Williams & Wilkins. In: Chapter 42. Nutritional Physiology of the Alimentary Tract; 2014: 545-546. 10. Benton D, Young H. Role of fruit juice in achieving the 5-a-day recommendation for fruit and vegetable intake. Nutrition Reviews. 2019;77(11):829-843. 11. Abuajah, C.I., Ogbonna, A.C. & Osuji, C.M. Functional components and medicinal properties of food: a review.J Food Sci Technol 52, 2522–2529 (2015). 12. Sköldstam L, Larsson L, Lindström F. Effects Of Fasting and Lactovegetarian Diet on Rheumatoid Arthritis. Scandinavian Journal of Rheumatology. 1979;8(4):249-255. 13. Sundqvist T, Lindström F, Magnusson K, Sköldstam L, Stjernström I, Tagesson C. Influence of Fasting on Intestinal Permeability and Disease Activity in Patients with Rheumatoid Arthritis. Scandinavian Journal of Rheumatology. 1982;11(1):33-38. 14. Marcelo Campos M. Leaky gut: What is it, and what does it mean for you? - Harvard Health Blog [Internet]. Harvard Health Blog. 2021 [cited 1 February 2021]. Available from: 15. Mu Q, Kirby J, Reilly C, Luo X. Leaky Gut As a Danger Signal for Autoimmune Diseases. Frontiers in Immunology. 2017;8. • Feb 04, 2021 • Category: Juice Blog • Comments: 0 Leave a comment Please note, comments must be approved before they are published Subscribe For Juicy Tips And Recipies
Jump to content • Origins of Belly Dancing [Excerpt from Michael Speaks: November 2002] [Leela] Can you please comment on the origins of what is now known as “belly dance”? By origins, I mean both geographically/culturally, and spiritual; I feel that this dance is very powerful and meaningful. What were its original purposes? Is it true that it was partially used for childbirth rituals? [M_Entity] This dance has its origins from more than is considered now, though its more traceable roots can be seen to reach into the history of what is called the Middle East or Orient. We have seen this dance as being prehistory, being a form of varying forms of power during a period on Earth when women ruled. [Leela] Is this dance a form of energy work? [M_Entity] It was used as torture as well as mating, sexual stimulation between same sexes, and birthing. The more mystical meanings began to become associated with this dance many years past its true origins. [Leela] Torture?! Yes, sexual forms of taunting were used to punish males. The dancing you recognize today could be said to be a refined version of its origins, with a focus on the more spiritual aspects as it relates to images ranging from Skakti to servants of pleasure. It has always been a Moving Centered/Intellectual Part form of dancing, as it is focused entirely on control, balance, isolation, and anticipation. Or an Intellectually Centered/Moving Part form of dancing. Those who of either centering are usually drawn strongly to it. It is less about the history that draws the fragments who practice it, as it is about the resonance within the body and the ensuing resonance with the Energy of the physical plane. For most fragments who begin practice this form of meditation, blockages within the lower chakras and the Higher Moving Center can tend to be “cleared” up, releasing a storehouse of erratic energy at first, then slowly settling into the balance it naturally would have. • LIKE/LOVE 13   Report Article • Recent Articles • Create New...
peoplepill id: moses-schoenfinkel 1 views today 4 views this week Moses Schönfinkel Moses Schönfinkel Russian mathematician Moses Schönfinkel The basics Quick Facts Intro Russian mathematician Known for Bernays–Schönfinkel class A.K.A. Moisei Isai'evich Sheinfinkel' Was Mathematician Philosopher From Russia Type Mathematics Philosophy Gender male Birth 4 September 1889, Dnipro, Ukraine Death 1942, Moscow, Russia (aged 52 years) Star sign Virgo The details (from wikipedia) Moses Ilyich Schönfinkel, also known as Moisei Isai'evich Sheinfinkel' (Russian: Моисей Исаевич Шейнфинкель; 4 September 1889 – 1942), was a Russian logician and mathematician, known for the invention of combinatory logic. Schönfinkel attended the Novorossiysk University of Odessa, studying mathematics under Samuil Osipovich Shatunovskii (1859–1929), who worked in geometry and the foundations of mathematics. From 1914 to 1924, Schönfinkel was a member of David Hilbert's group at the University of Göttingen. On 7 December 1920 he delivered a talk to the group where he outlined the concept of combinatory logic. Heinrich Behmann, a member of Hilbert's group, later revised the text and published it in 1924. In 1929, Schönfinkel had one other paper published, on special cases of the decision problem (Entscheidungsproblem), that was prepared by Paul Bernays. After he left Göttingen, Schönfinkel returned to Moscow. By 1927 he was reported to be mentally ill and in a sanatorium. His later life was spent in poverty, and he died in Moscow some time in 1942. His papers were burned by his neighbors for heating. Schönfinkel developed a formal system that avoided the use of bound variables. His system was essentially equivalent to a combinatory logic based upon the combinators B, C, I, K, and S. Schönfinkel was able to show that the system could be reduced to just K and S and outlined a proof that a version of this system had the same power as predicate logic. His paper also showed that functions of two or more arguments could be replaced by functions taking a single argument. This replacement mechanism simplifies work in both combinatory logic and lambda calculus and would later be called currying, after Haskell Curry. While Curry attributed the concept to Schönfinkel, it had already been used by Frege. comments so far. From our partners Reference sources
Data from: Genomic regions underlying metabolic and neuronal signaling pathways are temporally consistent outliers in a moving avian hybrid zone Dominique Wagner, Robert Curry, Nancy Chen, Irby Lovette & Scott Taylor The study of hybrid zones can provide insight into the genetic basis of species differences that are relevant for the maintenance of reproductive isolation. Hybrid zones can also provide insight into climate change, species distributions, and evolution. The hybrid zone between black-capped chickadees (Poecile atricapillus) and Carolina chickadees (P. carolinensis) is shifting northward in response to increasing winter temperatures but is not increasing in width. This pattern indicates strong selection against chickadees with admixed genomes.... 24 views reported since publication in 2019. What does this mean?
The definition of respect is changing, and it is not for the better Iowa governor Kim Reynolds addresses PVHS during an assembly on Oct. 15. Erika Holmberg, Copy Editor Since Kindergarten, students at PV are taught to follow the pillars of character throughout adolescence and beyond. Unfortunately, the application of these principles is slowly diminishing at the high school level. The value of respect, in particular towards authoritative figures by high school students, has been misconstrued by many after an unlikely encounter at PVHS. On Oct. 15, Iowa Governor Kim Reynolds made an appearance at PVHS to congratulate both staff and students for the honor of earning the prestigious Blue Ribbon Award, in addition to presenting Sara Russell with the Iowa Teacher of the Year Award. For such a tremendous honor, Reynolds’s introduction to the stage was not greeted kindly, as many students mocked and booed her as she entered the stage. Regardless of Reynolds’s political affiliation, the blatant disrespect directed towards her honorary presentation was disheartening. As a Blue Ribbon school planted in the fundamentals of inclusion and exemplary learning, how is such behavior permitted without consequence? The answer lies in the shifting definition of respect at the high school level. “The idea that everyone has a voice has been more accepted and taught in modern society compared to the past, leading to young people not blindly respecting figures of authority,” expressed senior Arsh Manazir. The power of speech certainly cannot and should not be suppressed, but when taken too far, change in society might not be very productive. This problem isn’t just a one-way street, either, as the same argument can be made for the opposite party as many schools chant the derogatory phrase “F Joe Biden” at school-sanctioned football games. Acts such as these only advance the idea that upholding respect towards anyone, no matter who they are, is a fundamental principle that must be held to a higher standard. As direct acts of disrespect and hate have shown signs of increasing, many have been led to question where this vulgar behavior comes from. Perhaps this is not the fault of students as much as it is the changing belief of what respect truly means. Each generation of students grows up in a world that is often entirely different from the generations preceding them. Discipline, communication and tolerance are a few ideas that often change the most. As these principles are constantly changing for the worse, the lack of respect seen in high schoolers has plagued universities as well. Iowa State University freshman and PV graduate Sam McGrath sees the issue of disrespect on a larger scale in college. “College is a place where it is really easy to be outspoken about your political views,” he stated. “There are so many clubs you can join that align with your values which can really heighten the hatred seen across campus.” As students grow throughout high school and beyond, there needs to be an act of reform in the student curriculum that promotes respectful behavior and the concept of “agreeing to disagree.” “People should understand that their opinion is not the only valuable one, and enter discussions with an open mind. Opposing ideas should not be discounted without consideration,” suggested Manazir. Students’ voices must be heard, but productive conversations can only start with respect. Respect is a universal sign of human decency, and it is time to start holding each other accountable.
Analysis Of Lorraine Hansberry 's ' A Raisin Of The Sun ' 1797 Words8 Pages Worthless money itself All money brings is nothing but dreams and evil. Where there is money there is also dishonesty or corruption.. In a play called “A Raisin In The Sun” by Lorraine Hansberry, she focuses on the struggle that was faced by one African American family from late 1950s. As the play opens, the family are about to receive an insurance check for $10,000. This money comes from the death of Mr.Younger’s insurance policy. Everyone was very excited and were waiting for the money to be delivered. Each of the family members had an idea as to what he or she would like to do with this money. As the play continued the family begins to break apart because money played a negatively influence on the family. Hansberry uses the Younger …show more content… Ruth do not want Travis to think about money here. As Walter came out from shower, he heard everything. He told Ruth “What you tell the boy things like that for?” ( Hansberry 925). And took out some coins and gave them to Travis. Walter wanted to show Travis that they are living in a dream. He wanted Travis to know that money is the way of life. This shows that Travis and Walter both lost their dignity because they were blinded by money and living in the dream of material wealth. Secondly, Walter viewed money as life. Money made him think of him reaching the pinnacle of his dream. Walter told Beneatha “You know the check is coming tomorrow” (Hansberry 928) which clearly demonstrate his eagerness for the money. Throughout the play, money is dominating his thoughts and he never stops asking about the money check that is coming from his father’s death insurance policy. He can not wait for it to come and make his dream come true. All Walter wants was to invest the money into the liquor store. In the play, when Walter heard Mama had bought house with the money, Walter was really upset with Mama. Bitterly Walter said “So that’s the peace and comfort you went out and bought for us today!” ( Hansberry 961). Walter lost his dignity and honor here because his uncontrollable desire for the money makes him really angry towards his Mama. As the play continues, Mama had some money left for Beneatha 's schooling and some of money for Walter Get Access
Why Do You Need to Have Your Home Tested for Asbestos? Asbestos refers to six fibrous mineral substance that naturally occurs. It can resist fire, heat, and electricity — making it an ideal insulator material. It is a relatively cheap but durable material with heat resistant and insulating properties. Because of these qualities, the use of asbestos was once very profitable for many businesses until it was found out how toxic it really is. Consequently, it was banned from usage. However, if your property in Utah was constructed before 1985, it would be wise to conduct asbestos testing to ensure your safety. Dangers of Asbestos Asbestos only becomes a health hazard when the fibers are breathed in. So, as long as it remains dormant, it will have no effect on your health. However, a home renovation project may disturb and disperse asbestos fibers in the air because of all the cutting, sewing, and drilling. When inhaled, these fibers can cause a variety of health conditions, such as: • Asbestosis. This is a chronic lung disease that occurs when asbestos scars the lungs. This disease leads to long-term health breathing difficulties which can be incapacitating. It may even cause cardiac arrest for those who are in the advanced stages of the disease. • Lung cancer. Prolonged exposure to asbestos also increases your risk of developing lung cancer. Symptoms of lung cancer include chronic cough, breathlessness, or chest pain, as well as the repeated occurrence of pneumonia or bronchitis. Some people may even start spitting blood while coughing. • Mesothelioma. This is probably the most serious disease related to prolonged asbestos exposure. You don’t necessarily have to be directly exposed to the source of asbestos to contract this disease. You can develop mesothelioma simply by being exposed to the asbestos dust from the clothes of someone who was in direct contact with it. Unfortunately, asbestos-related illnesses don’t exhibit symptoms until much later in their stages when they are more difficult to treat. This is the reason why all properties constructed before 1985 need to be checked for asbestos before any demolition or renovation is carried out What Asbestos Is Used For asbestos tiles Asbestos has many great qualities that make it a common material during construction of buildings back in the day. Some of its most common uses include: • Insulation material for spaces between wooden studs on walls and ceilings • Wallpaper construction • Fabrication of ceiling tiles • Pipes and pipes insulation construction The microscopic asbestos fibers are odorless, tasteless, and cannot be seen, so it’s very easy to inhale or swallow them without realizing it. On top of that, most people who were exposed to it don’t show any symptoms until it is too late. Once inside the body, asbestos fibers can be trapped for a very long time since they never dissolve and are not easily expelled by the body. Over time, these fibers can cause havoc inside your body by causing scarring and inflammation. They may also eventually cause genetic damage to your body’s cells, and there are no known ways to reverse this damage. So if you’re planning to renovate your home, do not hesitate to have it checked first for asbestos, especially if it was constructed before 1985 when asbestos usage was still rampant. It’s always better to be safe than sorry, after all. Spread the love Scroll to Top
Best infographicsHealth, Beauty & Safety infographicsTrending What Causes Rosacea? (Infographic) What causes rosacea? Rosacea is a lifelong chronic skin condition. It occurs when blood vessels appear just under the surface of the skin. They cause inflammation of the blood vessels. They develop into pimples and other skin irritations. This often includes lesions, spider veins, and dry flaky skin. In some cases, rosacea causes the afflicted area of skin to thicken. Particularly around the nose. There is nothing you can do to avoid developing the condition altogether. Nonetheless, you can rest assured that there are a number of effective remedies available. The most commonly prescribed treatments for rosacea involve skin creams and in general these unguents are all it takes to control a breakout. However, in more trenchant cases, other treatments such as intensive light therapy or even surgery may be used. A number of things commonly act as triggers for rosacea flare-ups. For example, stress, overexposure to sunlight and hot weather, the use of irritating skin care products, and even excessive alcohol consumption. What Causes Rosacea? (Infographic) Sebastiaan Laan One Comment 1. Please donʻt tell people this is a ʻlifelongʻ condition with no cure. Our bodies are amazing! Skin is the largest organ of the body and any dis-ease is information. Reducing stress, adding a mindfulness practice, movement, increased water consumption, and healthy eating play a HUGE role in our healing. Believe it! Leave a Reply
How do chemical reactions help the Library care for our collection of over 3 million books? What role do robots play in providing access to all those books? In partnership with Fizzics Education, join the Education team as they discover the answers to these questions and demonstrate some simple fun science experiments to do at home in this series, Science at the Library. Today we explore robots and programming. Fizzics Education have a whole range of other free and easy experiments that can be done at home. For more information visit the website. Discover more Science at the Library. Hello everyone, my name is Aaron and I work at the National Library of Australia.  The Library is located in Canberra which is on the lands of the Ngunnawal and the Ngambri people.  The National Library of Australia extends our respects to their elders past and present, and through them to all Australian Aboriginal and Torres Strait Islander people.  Today we're here to talk about libraries and robots, but perhaps you're wondering what the two have in common.  Do robots like to read?  I mean, perhaps there's a robot out there who does enjoy reading, but at the National Library of Australia our robots help us to provide books to you and they help us out every day and here's how.  The National Library of Australia collection of books is huge. There's about 3,000,000 books in our collection. That's a lot of books by any standard.  That's way too many for us to keep on shelves in our main reading rooms. Now imagine your local library, or perhaps your school library. What does it look like? Is it a big room? Shelves with some books in it?  Do you walk in and go browse the shelves and find the book that you want? Now I bet your school library has a lot of books, but I also bet it doesn't have 3,000,000 books.  Imagine there'd be no space for anyone if you had to put that many books on the shelves in one room so to help us store all of our books, we've come up with some storage solutions, and one of those solutions is to store things underground.  The National Library building is actually eight floors. There are four above ground, and there are three below ground. Now two of those floors below ground are where we keep a lot of our books. But we also have hundreds and hundreds of visitors visit us every day when our building is open.  So because all the books are underground, it means that people just can't go and browse the shelves and pick out the ones you want. If you want to read a book at the library, you have to have a library card. You come to our main reading room and you collect a book that you've called up on the Internet.  But in a place that has three million books, that's a lot of distance to walk if you're the person who has to go and find all of those books. So that's where our robot friends come in. At the library we have four robo -couriers and they're all called Isaac. They help out the human library staff to provide books and other collection items for our readers.  I work together with the humans in the library stacks to transport items up to the reading rooms as quickly as possible for people to use. I can carry up to 60 kilos.  Once a reader has requested a book, a call slip is generated through the Internet and the Human Library staff go off to where the books are kept and they collect them off the shelves.  They bring the books back to a central collection point and then they call Isaac for some help. Instead of the human librarians have to walk up and down, up and down all through the building all day, the Issacs do some of the heavy lifting for us.  The human Library staff load all the books that have been requested into Isaac and then they find their way back to what we call our book lift a special elevator just for books. This delivers the books from underground upstairs to the main reading rooms.  Our robots travel up to 6 kilometres every day, and that's just within the building. They can also carry up to 60 kilos of books, now have a think for a moment from where you are where would 6 kilometres get you?  And then have a think about what might weigh 60 kilos. Now, would you like to carry around 60 kilos of things all day for six kilometres?  I wouldn't, and it's a big job and our robots do it very well. They're also pretty smart. They're programmed to move around the library building by themselves there. They’re programmed to know when to stop, when to go, when to turn, when to go straight, they are even programmed to know what doors to go through and most importantly for everyone, they are programmed to detect when people are in their way.  If they sense people with their radar or sonar, they will stop and wait until the person or the object has moved and then they'll continue on their programmed path.  But how do robots know what to do or where to go? Or where to stop? Or perhaps even what to say?  Our friends at Fizzics education have enlisted the help of a stripy friend to help demonstrate how we help robots learn.   So, we're going to learn about how robots really think and importantly if you don't tell them what to do they don't know what to do and we're going to do this with this Beebot, hey check it out.  Now look at this Beebot. This Beebot has an arrow here an arrow here an arrow here arrow here, which tells them which way it's gonna go? It's got a green go button. It's gotta let's not do it anymore, and it's got a pause button so what we're going to do is we're going to make it go from our beehive all the way to our flower turn around and then come all the way back again and let's see if we can make this work.  So first job we need to turn the thing on.  So on goes our Beebot, it's on lights are on now to make it go forwards I need to really press the arrow that says which way to go.  So in this case to go forwards I need to press that one there.  Ah, it's not going so I need to press the go button let's press go and off we go.  Awesome, so we've done our first step.  The thing is, we've got way more to do now if you look at it, there's an arrow pointing this way, so it makes sense that if we press this button here and then press go it would turn that way, right?  Let's find out.  That's not where we wanted to go. The thing is it remembered what we did at the start.  It remembered the forward step and then it remembered to turn.  So we've got ourselves a problem. It's gonna have to work in the way we want it to work and in this case it always remembers the last step we told it.  So what if I bring it all the way back to the start again? Remember it remembered to go forward at the start and then turn.  So how about we press green for go let's see what it does. There's our forward movements.  And then there's our turn. Hey, this is useful because it's got a memory like most robots do they've got a memory? We can use that memory to add step after step after step after step to be able to achieve our challenge.  So we know it's stored 2 steps. It knows to go forwards and we know it's going to go right.  So, I guess the next will be forwards, which would bring it up to here now, then I need to turn it, then we turn it that way then I need to go forwards then it goes forwards, we hit the flower good, but we gotta turn it around, right so I turn 1, it would go like that. Turn again, it would go like that, huh?  There's a lot of planning, isn't there?    This one? To here or now, it's gotta go that way.  That one to there, that one to there, that one well to there and that one, to there and back to our hive now. Hopefully it's now stored those instructions we gave it and it can go from the hive to the flower, so let's set it up there.  I need to make sure it's nice and centered on our line, because it doesn't even know there's a line there.  There's no sensors. Fancy robots have sensors. This one doesn't. It just knows where I've told it to move its wheels to make it go.  Let's see if I got it right. Here we go pressing go.  Forwards, yes turn yes forwards.  We’re getting there, forwards yes, uh oh you can see I didn't set up perfectly straight, it's now a little bit off centre. I wonder if this is going to help us turning all the way back over on the home stretch now we're turning left. Come on turn left yes, then we go forward.  I think we – YES. Excellent, we got it to work. The thing is robots only do what you tell them to do.  Now we can get advanced robots ones with artificial intelligence that can sense their surroundings and then respond to it and that's what we're programming is really about doing coding.To get robots and machines to understand how the world works and respond to it.  Now I just need to get my big but to get me some honey.  A simple demonstration, but no matter whether you're programming aBeebot or something as complex as Isaac, the process is still the same. You give the robot a set of instructions. It will remember it and follow them.  Now at home we may not all have robots that we can program, but why not try to program a person?  So first find someone who wants to help you out. Then think of a list of instructions, perhaps 10 or so.  They could be simple instructions like stop, start, turn left, go straight, pick up something like that.  Then write them down, but don't show the other person. Get the other person to stand in a starting spot wherever might work for you around the house and then give them the first instruction.  Have them do it, then tell them to go back to where they started from and then give them the second instruction but don't retell them the first one have them step out instruction 1, instruction 2. Then have them reset, then give them the third instruction.  Keep repeating this with new instructions, but don't tell them the last one. See how many instructions your person robot is able to remember before forgetting. Perhaps if you're nice, you might give them a hint.  Thanks for watching today and happy programming.
Image by Bernd Schwabe, via Wikimedia Commons At least when I was in grade school, we learned the very basics of how the Third Reich came to power in the early 1930s. Paramilitary gangs terrorizing the opposition, the incompetence and opportunism of German conservatives, the Reichstag Fire. And we learned about the critical importance of propaganda, the deliberate misinforming of the public in order to sway opinions en masse and achieve popular support (or at least the appearance of it). While Minister of Propaganda Joseph Goebbels purged Jewish and leftist artists and writers, he built a massive media infrastructure that played, writes PBS, “probably the most important role in creating an atmosphere in Germany that made it possible for the Nazis to commit terrible atrocities against Jews, homosexuals, and other minorities.” How did the minority party of Hitler and Goebbels take over and break the will of the German people so thoroughly that they would allow and participate in mass murder? Post-war scholars of totalitarianism like Theodor Adorno and Hannah Arendt asked that question over and over, for several decades afterward. Their earliest studies on the subject looked at two sides of the equation. Adorno contributed to a massive volume of social psychology called The Authoritarian Personality, which studied individuals predisposed to the appeals of totalitarianism. He invented what he called the F-Scale (“F” for “fascism”), one of several measures he used to theorize the Authoritarian Personality Type. Arendt, on the other hand, looked closely at the regimes of Hitler and Stalin and their functionaries, at the ideology of scientific racism, and at the mechanism of propaganda in fostering “a curiously varying mixture of gullibility and cynicism with which each member… is expected to react to the changing lying statements of the leaders.” So she wrote in her 1951 Origins of Totalitarianism, going on to elaborate that this “mixture of gullibility and cynicism… is prevalent in all ranks of totalitarian movements”: Arendt and others recognized, writes Levy, that “being made to repeat an obvious lie makes it clear that you’re powerless.” She also recognized the function of an avalanche of lies to render a populace powerless to resist, the phenomenon we now refer to as “gaslighting”: The epistemological ground thus pulled out from under them, most would depend on whatever the leader said, no matter its relation to truth. “The essential conviction shared by all ranks,” Arendt concluded, “from fellow traveler to leader, is that politics is a game of cheating and that the ‘first commandment’ of the movement: ‘The Fuehrer is always right,’ is as necessary for the purposes of world politics, i.e., world-wide cheating, as the rules of military discipline are for the purposes of war.” “We too,” writes Jeffrey Isaacs at The Washington Post, “live in dark times”—an allusion to another of Arendt’s sobering analyses—“even if they are different and perhaps less dark.” Arendt wrote Origins of Totalitarianism from research and observations gathered during the 1940s, a very specific historical period. Nonetheless the book, Isaacs remarks, “raises a set of fundamental questions about how tyranny can arise and the dangerous forms of inhumanity to which it can lead.” Arendt’s analysis of propaganda and the function of lies seems particularly relevant at this moment. The kinds of blatant lies she wrote of might become so commonplace as to become banal. We might begin to think they are an irrelevant sideshow. This, she suggests, would be a mistake. via Michiko Kakutani Related Content: by | Permalink | Comments (57) | Support Open Culture Comments (57) • Randy says: “the ideology of scientific racism” This line caught my attention, because it reflects precisely what is going on, on university campuses today, regarding things like “toxic masculinity” and “the patriarchy”. It’s why it’s OK to hit men. It’s why it’s OK to cut men. It’s why it’s OK to force men into war. It’s why it’s OK to lock men up. It’s why it’s OK to ignore male suicide. It’s amazing that we recently had a march whose missing reflects many of the issues facing men more than anyone else today, and not a word was said about how these impact men. It was all about women, even though the group most vulnerable to these problems is not women. These people happily pat each other on the back for fighting for “equality”. But they only care for a single group, the group least at risk. That is the banality of evil. • Randy says: Typo: “missing” should be “mission”. But “missing” is as good a word for it. • Sandy says: I understand why we have people calling Trump Hitler etc. Just by reading these articles and accepting what they say, not because they are accurate, but because they are in the academia. It is the perfect snooty rooty cazooty snobazooty. This kind of philosophy, as in this article, has appeal to the scholar snobs of the world. • C Baker says: Randy, your comment isn’t even a little on topic. • Josh Jones says: Sandy, this is an educational website, so I’m curious about why you’re here if you don’t value scholarship. • Lab Guy says: Randy is right. Look at press recently Trump. The major media networks and print to push these nonsense narratives like Russian hacking or some other theme. The public is dumb but not that dumb. Don’t forget Saul Alinksy which was followed by the last president. Pretty laughable those with any brains overlook the totalitarianism of the left. • Russell Scott Day says: The USA has been first in many things. The Confederate States of America was Stalinist before Stalin got around to robbing banks. • Rich says: Lab Guy, didn’t you notice that Arendt looked at Stalin and Hitler? I suppose you didn’t get that far in the article. However, your implication that Obama somehow represents a totalitarian left is laughable. If you can’t understand what you read, maybe it’s best left not to comment. • Snowball says: Sandy is part of the US version of the Red Guards of China during the Cultural Revolution. Smash the intellectuals! They self-destructed because they had nothing to lose against the 1%, the scholar class and those with access to opportunities. Thousands died, and China has spent the past century trying to recover. If you go to China, most of the art, buildings, innovative ideas come from outside of China (until recently.) That is where you pathetic and self-defeating anti-intellectualism gets you. • Max says: This is a great explanation for the left’s continuing attempts to lead with emotion rather than facts. And the minions that follow are quick to act on that emotion due to their susceptibility. For it is far easier to answer the call of feelings than to work at a valid argument — if there is one. • Johnny White says: Sandy, it’s never too late. Wake up. Save yourself. trump may not be Hitler, but trump is toxic. Yer doing what trump needs to do, or suffer–eek– criticism. Which is to take a criticism of his own behavior and pin it on his “enemies”. Come out like the “victim”. • Esem says: Looks to me like this “Sandy” is doing exactly what the article talked about, diminishing information. Using silly made up words to diminish the possibility further. Not sure if she believes this, or if she is acting out sarcasm with that remark. • E says: The comments section on this article is so ironic I might throw up. • Dave says: Randy is putting forth just the kind of gaslighting the article refers to. The facts defy his statements. After a winning campaign of misogyny and racism, it’s astounding how he can make the claim he makes. • Ed Crist says: Humans have a long history of forgetting most of history. Over and over totalitarianism has thrived because otherwise good people yearn for safety and comfort promised by charismatic figures. Add to that, when ‘alternative facts’ get in the way of their comfort and security, they are at least shunned and at worse the intellectual is persecuted and often times killed (reference above to China and also Cambodia and Russia) . I am not optimistic that our species will ever purge itself of the need and desire of despots. Perhaps I’m wrong. • Emma says: I think Randy/Sandy are the same person, mistaking the Internet for Reddit. • McGillFluffyLeaves says: It’s important to not overanalyze human nature – it can always be boiled down into simple universal laws. People move. They act. Their acts have consequences. When people act together, the consequences of their actions multiply exponentially. If you want people to act together efficiently, you find a target – in 1930s Germany, the easy one was the Jews. If you want people to act together justly – that is, not harming others, and having obligations aimed in that direction – you find a way to stop people from moving, and have them do some yoga. That wouldn’t last very long. If you want to maximize “no harm” and have a productive society, people need to be taught to look after themselves enough to not care about hurting another, and looking after themselves hooks up with increasing comfort levels if we live in a society concerned with wealth. • McGillandLeaves says: It’s important to not overthink human nature and boil it down to simple, universal laws. People move. People act. Their actions have consequences. If you want people to act together most efficiently, you need to find a target, Jews being perfect in 1930s Germany. If you want people to live in a just society, people have to stop moving and acting, and do yoga. That wouldn’t last long. But if you want to maximize justice without stopping our natural desires to move and act, and while increasing comfort levels, people have to care about themselves first enough to not bother with hurting other people, and tying that to the dollar reinforces that “self love” while increasing overall comfort. • Evan Hadkins says: Great article. It gets gaslighting slightly wrong though. • Diane Ramsey says: While everyone is debating how this happened and who to blame, we’re forgetting the basics: Trump is a narcissistic sociopath; a conman, a liar, an instinctive fascist. He hasn’t read any history or scholarly articles. He’s a natural populist/fascist which his supporters mistake for being “authentic”. If they thought for even a minute about the string of lies coming out of his mouth, they wouldn’t have voted for him. But what good con men do is make you stop thinking. “They” are all liars. “Listen only to me”. “Only I can save you”. Repeat endlessly. It’s downright hypnotic! That’s what we’re dealing with. We don’t really need a debate on what the GDP is in any particular year! • charlotte says: I really appreciate this kind of re-orientation after one frightening week of the Trump presidency. My code name for him is El Feo – the ugly one – because his actual name means to one-up someone – it’s almost too ironic to be true. The male ego won – the white supremacist won – the casual fascist won. Now we have to defend factuality, and that’s psychologically difficult. It means you have to constantly go back to what you know is true and question what will become the norm. The lessons of history don’t lie, however. After 9-11 the Patriot Act allowed the constitution to be enforced arbitrarily. For over 15 years the gas lighting has been at that level, too (yes, even under Obama!) Maybe the constitution doesn’t really say there’s a separation of church and state, maybe we are not all created equal, maybe climate change is a hoax, etc. Blame it on liberals and the media. But historical evidence and artifacts don’t lie: look at how degraded and disgusting Nazi culture was. Women were given a heavy, ugly iron cross for making babies who would become cannon fodder, an insult added to their injury but which was considered an honor. Just look at the aesthetics when the lies become too much: El Feo’s ugliness projected everywhere – his version of greatness. Look at the aesthetic of the Italian movement of Fascism, replacing the beautiful art and culture with ugly monuments to militarism – monuments that they later took down and are ashamed of. Look at Germany’s ugly monuments – the death camps. Look at El Feo’s projected discomfort with himself and tactless gaudy demeanor. It’s no wonder so many US citizens have a kind of collective PTSD right now. Once coping is established, however, we’ll be back, and stronger than before. • Someone says: The comments here indicate a dislike for the person of Donald Trump. In reading the following article, be aware that Hopkins is not an enthusiast either despite his observations on the nature of the reporting on the man. Why Ridiculous Official Propaganda Still Works by CJ Hopkins • Jonas Planck says: There’s just one small yet enormous problem with this analysis: The people oppressing men ARE men. Which means that in order to “free” the oppressed men, you have to oppress men in order to do it. And by an extraordinary coincidence, the very same men that you’re going to have to oppress just happen to be the ones who own all the media and use it to complain incessantly about how “oppressed” they are, which makes you the bad guy. So good luck with that, I hope you manage to successfully stop the oppression of men by oppressing men. That would be one hell of a trick if you ever menage to pull it off. But since the most likely outcome is that you’ll end up oppressing everybody else, we’ll just have to pretend that your impossible goal has already been achieved and insist that the current status quo is the best you’re ever going to do. • Paul Humphries says: @Lab Guy – why do you think Russian hacking is nonsense? • Mike Flores says: Interesting but flawed article. The first problem is it presumes “propaganda” means lying. Propaganda just means, persuasion. It is part of psychological warfare. The best propaganda is the truth. When I hear, and I hear it a lot these days, Trump is far worse than Hitler I just think “bad propaganda”. Anyone who looks up Hitler on the internet will quickly discover there is no comparison. No private paramilitary group, no forced sterilization of enemies, etc. Now if someone says, Trump is in over his head and doesn’t know what he’s doing, that too is propaganda but it is far more effective. It is very hard to argue against that. It has enough truth to make it hard to argue against. Why was the German military not stationed around the death camps? There was no propaganda that could hide what was being done. Word would get back to families in Germany. No propaganda could cover that up. Word did trickle back to Germans from guards, but the guards were mostly ex communists who had joined the SA and then were folded into the SS. As communists they had read Marx and Engels on the necessity of wiping out the Slavic race and to kill practicing Jews. Marx and Engels wrote this material for years, for example saying all Slavic people should be killed to make way for the German worker. They had these beliefs before they became nazis. German society already had laws aimed against Jews. Before Hitler went into power Jews couldn’t own guns for example. Propaganda did not create that. Religion did. Jews were blamed by the Catholic Church for killing a God. So this was taught people as children long before Hitler came to power. It was taught to Hitler too. Hitler by the way, was both Catholic and a follower of Hegel. He condemned Communists because they didn’t do what Marx wanted, he promised from day one to do it. My point is, Hitler’s propaganda did not create the mindset. Marx and Engels promoted the idea. The mindset was already there. FDR wasn’t raised in Germany was he? Yet he refused to meet with Jesse Owens, the Project M files have been revealed so we know he believed in eugenics and the inferiority of Jews. He wasn’t anywhere near nazi propaganda. Yet how does one explain his lack of interest in bombing the gas chambers at the unguarded death camps? So, if propaganda didn’t cause the murders, what did? How would we stop a Hitler? To stop Hitler you would have to assassinate Woodrow Wilson- and his wife! Let me explain. Do you know any historian who doesn’t say the Treaty of Versailles caused the economic collapse of Germany? Woodrow had strokes and was in various forms of incompetence which his wife, Edith our first female President, hid from everyone. The idea of a nation that lost paying for what all the nations spent on the war is a “momism”. You broke the window, you pay for it. Had Edith told advisers what Woodrow was going through I doubt that would have been included. What would have happened if we had not entered the war? Had Germany won World War 1, there would be an Irish Republic. No treaty so no economic collapse. No collapse no rise of the left in Germany. Franco would not have been put in place by the British. No World War 2 so no 70 million dead. If only we had lost World War 1…. an irony of history. Propaganda does not create history. Saying it does, is bad propaganda. • dentss says: That’s the real purpose of it all …it to distract everyone from the real crimes of the left …. • Thom McCann says: Be afraid. Be very much afraid. Dangerous precedents have been set by the likes of Roosevelt (Relocation of Japanese-Americans), Nixon (“preventative detention of protesters) with Bush, Obama (bypassing congress), Christie (Washington Bridge scandal), etc. for a future dictator to work within the laws of the U.S. Inadvertently President Obama may not be aware of what he did in the U.S. government with his many executive actions independent of congress. On February 21, 1934, German State Secretary, Werner Willikens, and Ministry of Food said, “Everyone who has the opportunity to observe it knows that the Führer can hardly dictate from above everything he intends to realize sooner or later. On the contrary, up till now everyone with a post in the new Germany has worked best when he has, so to speak, worked towards the Führer…” Ian Kershaw in his book “Working towards the Führer” suggests a strange kind of political structure. He famously joked in a college commencement address in 2009 at at Arizona State University that he could use the IRS to target political enemies but of course he never would. It appears that people at the Internal Revenue Service didn’t think he was joking. He also said that Latinos should vote and not just say (in Obama’s words), “We’re going to punish our enemies and we’re going to reward our friends who stand with us on issues that are important to us.” These “enemies” he spoke of are other American citizens. Jörg Muth explained in Foreign Policy Magazine: “Interestingly, the literally hundreds of American [war] observers who were regularly send to the old continent during the 19th century never noticed Auftragstaktik, a command concept in which even the most junior officers [and NCOs] were required to make far reaching decisions.” Not a single written document signed by Hitler has ever been found authorizing the SS murderers to wipe out Untermenschen or to killing foreign slave workers or Jews in concentration death camps or by starving them or working them to death. In England too, Henry II said, ‘Who will rid me of this turbulent priest?’ and the barons rushed to Canterbury to murder Thomas Becket. No direct order was given, but the courtiers sensed what would please their king. President Harry S Truman in 1961 said; “I never would have agreed to the formulation of the Central Intelligence Agency back in ’47, if I had known it would become the American Gestapo.” To get a frightening idea of an ordinary citizen caught in the web of corrupt officials and men in the NSA watch the film (also on the web) “Enemy of The State” with Gene Hackman and Will Smith. The question is “Quis custodiet ipsos custodes?” (Who will guard the guards?”). • Barbara Murphy-Bridge says: Interesting you assume ‘Sandy’ is female. Any particular reason ? Just curious. • Peielio says: ” but the guards were mostly ex communists who had joined the SA and then were folded into the SS.” You have no idea you are talking about, huh? Show me evidences they (“kapos”) “were mostly” comunists. I see what you are trying to do: spreading the meme “comunist = nazist” is an old and naïve trick. I know people like you and it will not gonna happen. Buy a book, kid, and try to learn something instead. • Rich says: There is nothing at all inaccurate about this article, academic or not. It’s known history. • Rich says: Now do Donald Trump. • Everett says: I bet only one side gets the irony, the correct side and the other side-triggered. • Jacqueline Alexander says: Recently I have become very interested in the civil war era. I do not see the relationship between Stalin and that portion of the United States (the confederacy),who made a bid for their freedom from the oppression of the government of the northern states and Lincoln during the late 1800’s. Whatever the motivating factors make no mistake it was a bid for southern freedom. The propaganda of this era slants all aspects of the reality of what the truth of the civil war. What is the true goal of all the anti southerner- pro afro/American propaganda of today? I have worked in an atmosphere, where it was explained to me that afroamericans are taught no person of white origins should get a job that a person of color can get. So what are the real modern day issues clouding what was the efforts of one part of America fighting for their freedom in the 1800s? Today The population of afro Americans is 12%. What was it in the 1800’s. What rational mind could accept that thousands of peoole were killed over one issue involving a very small portion of the population. A part of the population which in fact fought with other southerners against Abraham Lincoln and the union? • Dord says: What you described isn’t racism, and it doesn’t happen in the terms you’re describing. It’s really telling about yourself that you try to tweak reality, and disguise a minor social issue as the raise the fascism (your last line). Perfect example of gas-lighting, thx. • H8dogma says: It’s apparent this article has awoken many Heritage Foundation and Cato Institute trolls. The less scholarly type, acted out well by the perpetrators . • David Davies says: “…how the Third Reich came to power in the early 1930s. Paramilitary gangs terrorizing the opposition, the incompetence and opportunism of German conservatives…” They would be the templates for AntiFa and the ‘Never Trump’ wing of the Republican Party. Easy to see that it is the Left ‘Progressives’ who are the threat to individual freedom. Only those completely blinded by their indoctrination fail to see it. Viva Trump! • Peggy says: The quote is incorrect and meaningless – “No one has the right to obey.” A source says the name Kant is missing from the end, but I can’t vouch for that. • Greg says: Name ten lies he told… • Fábio de Oliveira Ribeiro says: This enlightened woman has a lot to tell us. Her work is becoming essential to understand what is happening in the US, Europe and Brazil. In recent years I have read and reread all #HannahArendt books. • Rick says: Wow, he conservative and Russian trolls are out in force in the comments section of this article, trying to twist even this warning to fit their narrative, or to simply obfuscate. They are doing exactly what the article discusses. • Gibson Fenderstrat says: Don’t you mean “Heil” Trump? • Tom says: “The power of the few requires the folly of many” – Dietrich Bonhoeffer • Dsekou says: Mike Flores did with history what the article observed that totalitarian groups do rewrite it to the point past absurdity.. • John Stewart says: See also Alex Comfort’s 1950 study ‘Authority and delinquency’ • Tormod says: You’re not big on irony at Open Culture, hmmm! Only last week you posted the most ridiculous example of propaganda I have seen for many years. Allow me to remind you. It was a piece concerning the Russian forces raising a flag. The essence was that the picture had been staged and for propaganda purposes. No mention was made of a similar incident involving US forces. If you’re going to publish articles about propaganda, try citing yourselves as willing participants. • Gregory Wonderwheel says: To understand propaganda, I go to the master, Adolf Hitler. Hitler said he learned about propaganda from the Western business advertising techniques who were the OG masters of propaganda. In discussing the efficacy of soap ads, he says, “What, for example, would we say about a poster that was supposed to advertise a new soap and that described other soaps as ‘good’? We would only shake our heads. Exactly the same applies to political advertising.” Some of the tips for effective propaganda that Hitler states read like a playbook of the Republican Party, which is why their propaganda works better than the Democratic Party’s propaganda. Hitler’s tips for effective propaganda from Volume 1, Chapter 6 of the book Mein Kampf: ~ take a one-sided attitude toward every question; ~ don’t make half statements that might give rise to doubts; ~ don’t weigh and ponder the rights of different people, but exclusively emphasize the one view which you have set out to argue for; ~ don’t make an objective study of the truth, as it may favor the opposition by its fairness, therefore only serve your own view, always and unflinchingly; ~ load every bit of blame on the shoulders of the opposition, even if this does not correspond to the true facts; ~ repeat only the simplest ideas and repeat them thousands of times so that in the end you must always say the same thing. ~ an audience can only comprehend a slogan and the slogan must be presented from different angles, but the end of all remarks must always and immutably be the slogan itself. ~ limit your presentation to a few points, devised exclusively for the general audience and carried on with indefatigable persistence. ~ even the most outlandish claims will eventually be believed through the continuity and sustained uniformity of their application. • Gregory Wonderwheel says: Freedom to own other people as slaves is not simply “a bid for southern freedom.” This argument of “southern freedom” is one of the most absurd comments I have come across recently. The confederate rebellion and insurrection was justified as the Christian right to own people as slaves. Didn’t work then and doesn’t work now. • Gregory Wonderwheel says: Whilhelm Reich pointed out that totalitarianism came in many colors: Black fascism of Italy, Brown fascism of Germany, Red fascism of the USSR, and the Red, White and Blue fascism of the USA. • Jeff Thomas says: Sandy comment above is so on point to how intellectual arguments are now frowned upon in my country the UK during the brexit Referendum Michael Gove a prominent conservative minister reacted to academic reasoning against rising nationalism and the brexit vote ” dont believe experts ” so academic debate was shut down. I felt this was a good critique but Sandy’s response sounded like a trump supporter screaming fake news • Elizabeth says: Agree. But these problems you suggest are inflicted on men are done so by other men. Stop picking on women because of their struggle. Fight against the system. Fight against patriarchy. That’s where your problems lie. • Mike says: A) ‘Sandy’ is more often a woman’s name, just like ‘Babara.’ B) The language sounded like my idea of a woman. “It is the perfect snooty rooty cazooty snobazooty.” ..and I definitely could be wrong. But, I’d bet a small sum that I’m not. • Mike says: …gaslighting, BIG time. Tell me, do you vote for Trump and watch a lot of Fox News? • Sabine says: You exagerate. Toxic masculinity is a reality, it does not mean all men are toxic, but patriarchy is. • john says: u are clueless and totally missed the point of the article so you are part of the problem • Martin Greaves says: Thom McCann says no documents have been discovered that were signed by Hitler to request the murder of Jews. This ignores the fundamental problem all dictators face. Their position is achieved mostly through the promotion of their absolute power utilizing the “strong man” image. In other words; I’m in charge and nothing is done without my express authorization or without recourse to the extreme ideology I formulated and represent. I am the king of all I survey, supreme ruler of all my dominions. To promote such an image where you are absolute ruler, practically a deity, you therefore have to accept responsibility for any action carried out by your minions, no excuses, you’re the guy in charge. Let’s call it “The Buck Stops Here” principle. Such as Hitler cannot proclaim themselves as the soul of the German people but then say these bad people acted of their own accord, it was nothing to do with me. Nothing gets done without your explicit say-so, buddy, you’re the big I Am around here. Besides, are you seriously suggesting the German war machine spent billions of marks and used massive military and civil resources to carry out the Final Solution and old Adolf didn’t have a clue it was happening? Pull the other one, as we say in England, it’s got bells on it. • Alexis says: you should read the entire chapter by Hannah Arendt that this article is partly based on. It’s chapter 11 in her book, Origins of Totalitarianism and speaks all about what propaganda, how it works and why it was necessary for the Nazis to use it. • ROBERTO says: Hay populismos de derecha y de izquierda. A veces viran de D a I y de I a D. en los extremos se tocan al punto de ser todos fascistas de manera muy evidente. El comunismo marxista, sangriento, obsoleto, odiado y fracasado, vira hacia los populismos. Cambia para obtener el poder con las urnas, extinguida la vía revolucionaria pero con el totalitarismo a flor de piel, implícito en su “relato”. El uso sistemático de la mentira en un sentido goebbeliano, las chicanas de trinchera, los panfletos que intentan cambiar a la historia seria y verdadera por el relato de turno, las nomenklaturas repugnantemente enriquecidas y los líderes glorificados como “portadores del pensamiento y la verdad únicos” en el tradicional culto a la personalidad. En Argentina fueron pioneros con el golpe de estado del coronel pedófilo Perón en el año 43 y que se inspiró -muy evidentemente para todo el mundo- en Mussolini, su admirado tirano, cosa que rápidamente imitó y desfalcó rápidamente al Banco Central, repleto de lingotes de oro transformando eso en dádivas, regalitos, espejitos y cuentas de colores y a la postre algunos pocos beneficios y mejoras reales para la clase obrera, aunque nunca combatió al capital y si protegió a los nazis durante y después de la gran guerra. El peronismo populista ya sea en el poder, ya sea como opositor siempre creó una grieta y determinó enemigos (y no opositores) Generó sus propios opuestos con la triple A y con los montoneros/erp que asesinaron a miles de personas con total impunidad hasta el día de hoy. Su ideología en tanto populista de nombre solo es corrupción, delincuencia y en esencia una carencia de moral, ética y valores: esa es la verdadera grieta, La realidad en su quintaesencia es que no les importa el pueblo para nada, manipulan a las masas, generan su propio rebaño y verdaderamente desprecian usan al “pueblo pobre y a los más frágiles y necesitados” a quienes dicen proteger y promover y les tiran unos planes y subsidios a los que nunca hicieron nada de nada por generaciones (salvo robar y drogarse) y ya son millones. Con el último gobierno (el actual) de C. Fernandez y su delegado en la presidencia A. Fernandez, están destruyendo a la clase media, expulsan empresas y evitan que lleguen los inversores de afuera. El totalitarismo y el fascismo subyace en todas sus acciones y discursos. El Podemos de los españoles es algo así como una copia y el norte es la narco-tiranía de Maduro en Venezuela. Todo monitoreado por Cuba y ayudado por Rusia, China e Irán. Odian al capitalismo (aunque se aprovechan de él por completo (exiliados pero no en Cuba sino en Usa o París), odian Occidente, a la clase media y a los medios periodísticos independientes y libertarios que dicen la verdad de sus deleznables acciones. Se sienten progres pero solo tienen un barniz y nuevamente usan a la “progresía”. Feministas por ideología no miran ¡hipócritas y mentirosas! lo que pasa en el mundo. Capaces sin que se les caiga la cara de vergüenza, de inaugurar con gran despliegue militante, ¡una canilla! ¡dos veces!…un hospital ¡tres veces! y aún no está en funcionamiento y ensucian edificios, calles, etc con el nombre de sus líderes asesinos , corruptos y delincuentes. Leave a Reply Open Culture was founded by Dan Colman.
Posted by camille arneberg on Dog Hyperventilating: 6 Common Causes, Plus Treatment Options Table of Contents If your pup has ever experienced hyperventilating, you know it can be a stressful situation for everyone involved. You feel helpless as you watch your pup gasp for air, and they seem anxious or worried. While the symptoms of hyperventilation in dogs can be scary, there are many things you can do to prevent and treat the condition. If your dog is hyperventilating, the first thing you should do is identify what’s causing the problem. Here, we’ll show you what signs to watch out for, identify the most common causes, and give you tips on how to prevent and treat dog hyperventilating. Signs of Dog Hyperventilating Dog hyperventilating: A dog drooling and panting Hyperventilation is simply a term for rapid, shallow breathing. When a dog breathes normally, red blood cells deliver oxygen to different organs, helping to carry out essential functions including muscle movements. When a dog hyperventilates, he or she doesn’t get enough oxygen, resulting in difficulty breathing and symptoms that can affect the entire body. Here are some of the main symptoms of dog hyperventilation:  • Rapid breathing, heavy breathing, or open-mouth breathing • Rapid heart rate • Blue gums • Excessive panting and drooling • Weakness or dizziness • Collapse or fainting • Snorting or wheezing Left untreated, hyperventilation for long periods of time can lead to serious consequences, including heart failure. If they don’t get enough oxygen, dogs may also suffer from organ or tissue damage. Read on to learn more about the causes of dog hyperventilation and how the condition is typically treated. 6 Common Causes of Dog Hyperventilation Dog hyperventilating: A dog hiding under a blanket and panting There are many things that can cause a dog to hyperventilate. Some causes result in only short-term hyperventilation while others result in significant breathing difficulties that can lead to serious side effects. Here are some of the main causes of dog hyperventilation. 1. Overheating or Heat-Related Illnesses  Exercising your dog in high temperatures can lead to overheating and serious heat-related conditions, including heat stroke. Dogs pant to help cool themselves off, resulting in short-term hyperventilation. When their body temperature gets too high or they can’t cool down, they may develop serious symptoms including fainting and fever. If left untreated, these heat-related illnesses can lead to collapse and even death.  If you suspect your dog’s hyperventilation stems from heat, it’s important to cool your pup down as soon as possible. Move into the shade or use cold water to cool off your pup. You can also use ice packs to decrease body temperature.  The best way to avoid overheating is to prevent it in the first place. Dog owners should try to limit strenuous activity on hot days. Instead, take your dog for walks during the early morning and late evening hours when it’s cooler. If you’re going on a long hike, make sure to pack enough water for yourself and your pup, and take breaks often. 2. Pain, Stress, and Anxiety Dogs may exhibit heavy panting in response to pain, emotional stress, and anxiety. Dogs who suffer from separation anxiety are more likely to experience hyperventilation. They may begin to breathe rapidly as you prepare to leave the house. Dogs can also show signs of hyperventilation when they experience new or stressful situations. Fearful or nervous dogs may also cower, whine, or act skittishly in addition to having trouble breathing. If your dog’s hyperventilating is associated with stress or pain, try to make them as comfortable as possible. Remove them from stressful situations and plan ahead if you have to go somewhere but know your pup hates when you leave. Calming treats containing ingredients like hemp and chamomile can help soothe an agitated pup. You can also talk to a veterinarian about using dog anxiety medications to help soothe symptoms. 3. Reverse Sneezing A reverse sneeze occurs when a dog takes long, rapid breaths. The condition is typically characterized by snorting. It commonly occurs in dogs with brachycephalic skulls — broad, short heads that typically feature short noses and flat faces. These breeds include pugs, Boston terriers, and bulldogs. Hyperventilation caused by reverse sneezing is typically nothing to be worried about. This condition usually results in short, sporadic breathing changes. If you feel like your pup has chronic issues with reverse sneezing or displays breathing difficulties such as choking or fainting, seek medical treatment at your local veterinary office. 4. Metabolic Acidosis Metabolic acidosis is a condition where increased amounts of acid disrupt a dog’s normal blood pH. This is a serious condition that is typically the result of an underlying problem in the liver or kidneys. It can also be the result of poisoning from ingesting drugs or toxic substances. In most cases, your dog will also display symptoms that include nausea, vomiting, and lethargy. If you suspect your pup has metabolic acidosis, take him or her to the vet immediately. 5. Allergic Reactions Dog’s may hyperventilate due to allergic reactions. Dog’s can get allergies from seasonal irritants like pollen and plants as well as chemicals in fragrances and perfumes. They may also have allergies to food, which is typically accompanied by other symptoms, including diarrhea and stomach upset. Minor allergies can be treated at home using antihistamines. Monitor your pup and if symptoms don’t go away in a half an hour or so, call your veterinarian. In severe cases where a dog is experiencing anaphylactic shock — symptoms include dizziness, weak pulse, and fainting — head to the emergency vet immediately.  6. Respiratory Diseases Dogs can suffer from a variety of respiratory diseases that may cause hyperventilating. Asthma is one of these conditions. Other respiratory conditions range from mild illnesses to serious ailments, including collapsing trachea. Collapsing trachea occurs in small dogs and those with brachycephalic skulls. It’s a condition where the throat muscles and trachea weaken, resulting in difficulty breathing and hyperventilation. Minor cases can be treated with lifestyle changes like reducing excitement. Severe cases require surgery. Other respiratory ailments that cause hyperventilation include laryngeal paralysis and kennel cough. Laryngeal paralysis is particularly common in labrador retrievers and is a condition where airway muscles become weak with age. It causes a narrowing of the airways, leading to hyperventilation. This condition and the resulting breathing difficulties should be diagnosed and treated by a vet.  Kennel cough is a highly contagious bacterial and viral infection that can be life-threatening in puppies, immuno-compromised dogs, and elderly pups. Dogs with kennel cough may hyperventilate and usually also have a dry, hacking cough accompanied by a watery discharge from the eyes and a runny nose. If you suspect your dog has a respiratory infection like kennel cough, take him or her to the vet who can perform a blood test to identify the culprit. Treatment of Dog Hyperventilation A dog being treated for hyperventilating Since dog hyperventilating can be a serious condition, it’s important to visit a licensed veterinary medicine professional (DVM) at the first signs of breathing difficulties.  If your dog’s rapid, shallow breathing is due to excitement, you may be able to treat symptoms at home. Simply remove the dog from the environment that is creating the overexcitement. Monitor your pup closely. If symptoms subside quickly, you can skip a trip to the veterinary hospital. If they don’t go away, seek medical attention to rule out other underlying contributors. In most other cases, it’s a good idea for pet owners to take their pets to the veterinarian if they show signs of hyperventilation. A vet can help identify breathing problems caused by medical conditions and recommend proper treatment protocols. Depending on the cause of the hyperventilating, the vet may try to cool down your dog’s body temperature or reduce anxiety and excitement by using a sedative. They may use a combination of bronchodilators — medications that open the airways — and antihistamines if allergies are behind the breathing troubles. In more severe cases, the veterinarian may put your dog on oxygen or perform surgery to remove obstructions that cause hyperventilating. How To Keep Your Dog From Hyperventilating A happy, healthy dog In cases where hyperventilating is caused by an underlying condition or when you don’t know why your pup is breathing harder than normal, seek help from your veterinarian.   In many cases, you can prevent hyperventilating in your precious pooch. Avoidance and preparation are two key tools when it comes to preventing hyperventilation. If your dog hyperventilates because of stress, anxiety, or allergies, make a conscious effort to avoid triggers. When it’s not possible to avoid a trigger, plan ahead. Dogs who suffer from anxiety can be given soothing treats like the Calming Hemp Chews from PetHonesty. For dogs who suffer from allergies, try AllergyImmunity Chews, which contain probiotics and other ingredients that may help to support digestion and immune health.
Science historians argue that the traces of Khaldun's theories were found in the works of world-famous intellectuals like Karl Marx, Adam Smith and David Ricardo. Ibn Khaldun was born May 27 1332 in Tunis, the capital city of present-day Tunisia. Raised and educated in a family of scholars and politicians, Khaldun came across as a gifted thinker right from his young age.  Although his first job as a calligrapher in Tunis was uninspiring, he evolved into a major intellectual giant. He was introduced to mathematics by his master Al Abili of Tlemcen, a city in Algeria. While studying with the fine and brightest minds of North Africa, Khaldun slowly gained expertise in the fields of philosophy, economics and social sciences. At the age of 45, he wrote his groundbreaking book called “The Muqaddimah” in 1377. The book focussed on universal history. Several modern thinkers consider The Muqaddimah as the first academic work which deals with social sciences, demography and cultural history.  Since the contribution of Muslim scholars in the fields of science has largely been ignored by the world, Khaldun's work is also underrepresented. Many famous Western thinkers, who were inspired by books like The Muqaddimah, emulated Khaldun's ideas and propounded them as their own in later centuries.  But the name of Khaldun was never included in Western textbooks.  To get a sense of how influential Khaldun has been to shape the academic discourse of modern-day philosophy, economics and sociology, TRT World spoke to several prominent academics.  Professor Recep Senturk, the founder of the International Ibn Khaldun Society, told TRT World Khaldun’s legacy as a social scientist offers a viable alternative to the hegemonic Eurocentric and positivist social sciences.  “He is usually presented as a pioneer for the modern positivist social sciences such as sociology, economy and political science. I disagree with this. In my view, he is not the precursor but the alternative of the present positivist social sciences,” Senturk tells TRT World.  Senturk explained that calling him a precursor is not praising as it indicates that he has been "surpassed by the later generations and that today his value is only historical like an item in the museum."  "Secondly, arguing that Ibn Khaldun was a precursor for people like Marx or Durkheim means one doesn’t thoroughly understand their theories and methods, in particular their worldviews, epistemologies and methodologies," Senturk said.  “Such judgements reflect a superficial, partial and biased understanding of Ibn Khaldun as well as his western counterparts. This is because Ibn Khaldun was a Muslim thinker who belonged to the Ash’ari school of theology, Maliki school of law,”.  To make a distinction between Khaldun’s worldview and that of modern thinkers, Senturk said that Khaldun, as all other Muslim scholars, subscribed to the multiplex (multi-layered, stratified) worldview (known in Arabic marâtib al-wujûd) which accepts that there are three main levels of existence: material-visible world, nonmaterial-invisible world and the divine world. “Likewise, Ibn Khaldun used a multiplex epistemology (known in Arabic as marâtib al-ulûm) which accepts reason, senses, divine revelation and spiritual unveiling (kashf) as sources of knowledge. How can such a multiplex scholar and thinker be presented as a pioneer for the reductionist or uniplex social scientists who accept only one level of existence (material or ideal) and only one source of knowledge such as observation or interpretation while explicitly rejecting divine revelation and spiritual epistemology?” Senturk said.  The biggest merit of Khaldun lies in his revolutionary methodological thinking, he adds, since he completely rejected the methodology of his ancestors, which made him the first social scientist in the strictest meaning of that term.  According to Esref Altas, an associate professor at Istanbul Medeniyet University, Khaldun was a good observer who saw the outer face of historical social events.  A strong philosopher who theorizes the inner face of historical events, Altas said he was also a good sociologist who described the social sphere. “In his book Muqaddimah, Ibn Khaldun considers the field of historical social existence as an independent field of study. This is the first time in the history of science and philosophy. Secondly, he considers the historical social space not normative, that is, not around the question of what should be, but around the question of what is happening,” Altas told TRT World. Khaldun discarded the academic practice of focussing on the ideal but encouraged students to examine their concepts with scientific and rational thinking.  He believed in reaching conclusions on the basis of evidence and reasoning and argued that these methods allow thinkers to separate fact from fiction. Therefore, by investigating "human social organization” with “a sound yardstick”, he said, one can successfully analyse society instead of accepting absurd stories of historians.  He highlighted in his writings that this is a completely new, original and independent science, which hadn’t existed before. With the exception of Joseph A. Schumpeter, who discovered Ibn Khaldun's writings only a few months before his death in January 1950, Joseph J. Spengler and Charles Issawi, the two major modern economists, traced the theory of value to Adam Smith and David Ricardo because Smith and Ricardo attempted to find a reasonable explanation for the paradox of value.  A deeper look at history, however, tells us that it was Ibn Khaldun who wrote about free-market economy and introduced the concept of labour theory of value. Karl Marx came up with the same concept around seven centuries later.   Khaldun's work on labour theory of value was later picked up by David Hume in his Political Discourses, which was published in 1752. Moreover, he was first to introduce and ingeniously analyse the interplay of several tools of economic analysis, such as demand, supply, prices, and profits. According to Associate Professor Altas, Ibn Khaldun dealt with the livelihoods of cities, people's professions, trade and production relations. In this aspect, he is considered to be the original founder of modern economics, whose name was largely ignored by Western thinkers, while they took many of his ideas and promoted them as their own.  As it is very well known, modern price theory argues that cost is the backbone of supply theory. Again, it was Khaldun who first made an analytical examination of the cost of production on supply and prices. In observing the differences between the price of foodstuffs produced in fertile land and that produced in poor soils, he traced them mainly to the disparity in the cost of production.  “He examines issues such as state, politics, property, and reign. In this aspect he is considered the founder of modern political philosophy. He deals with the material culture of civilizations such as roads, bridges, palaces, shrines, and in this aspect is considered the founder of the history of modern civilization. In society, he addresses issues such as the production of knowledge, the ways of distribution, the Emerging Sciences, in which he is considered the founder of the sociology of knowledge,” Altas told TRT World.  “In short, the mark left by Ibn Khaldun today is not the mark of the sciences, which are referred to as social, human, human science, but directly itself,” he adds.  When it comes to macroeconomics, Khaldun also laid the foundations of what John Maynard Keynes called "aggregate effective demand," the multiplier effect and the equality of income and expenditure. According to Khaldun, when there is more total demand as population increases, there is more production, profits, customs, and taxes.  Khaldun introduced the pioneering theory of growth based on capital accumulation through man's efforts. Furthermore, he also contributed to the field of international economics.  Based on his perceptive observations and his analytical mind, he undoubtedly shed light on the advantages of trade among nations. Through foreign trade, Khaldun stated that people's satisfaction, merchants' profits, and countries' wealth are all increased. Today, if you are studying economics, you will probably be told that Adam Smith is the “father of modern economics”. This idea is one of the most basic facts of Western economics but it doesn’t stack up. Long before Adam Smith, Ibn Khaldun made a strong case for a free economy and for freedom of choice. In spite of Ibn Khaldun's overall contribution to the field of economics, it is Adam Smith who has been widely called the "father of economics”. “Today, the true followers of Ibn Khaldun should go beyond the superficial readings of Ibn Khaldun unearth his authentic thought, his multiplex ontology, epistemology and methodology with the purpose of presenting him as an alternative to the present day hegemonic Eurocentric social science discourse. This is the way for the intellectual independence of social scientists who are discontent with the hegemonic social sciences today,” Senturk said. 500 years before Smith, Khaldun outlined strikingly similar ideas to those of him. Khaldun demonstrated breadth and depth in his coverage of value and its relationship to labour; his analysis of his theory of capital accumulation and its relationship to the rise and fall of dynasties; his perceptions of the dynamics of demand, supply, prices, and profits; his treatment of the subjects of money and the role of governments; his remarkable theory of taxation, and other economic subjects.  Commenting on what Ibn Khaldun means to him personally, although he does not consider Ibn Khaldun as the only one, Altas says Ibn Khaldun is essentially one of the stars in the sky of all modern researchers in the social sciences. “I, on the other hand, take Ibn Khaldun as an example, because he is a better observer, has an understanding that can determine the unseen causes of events. But more importantly, for me, he is a theorist who has never disconnected from social reality, and he also strongly bases this point of view from a philosophical point of view,” he told TRT World. Senturk said it's important to spread the truth about Khaldun and promote him globally.  “If we want to go beyond Eurocentrism, we must revive the authentic heritage of Ibn Khaldun by applying it to actual cases. This is what we have been trying to do as International Ibn Khaldun Society since 2006 by an interdisciplinary group of colleagues from around the world, in particular through the international symposiums we organize every three years”. Khaldun died while he was in Egypt on March 17, 1406. He was buried in the Sufi Cemetery outside Bab an-Nasr, Cairo, at the age of seventy-four. Source: TRT World
How Antivirus Or perhaps VPN Application Protects You Antivirus or perhaps virtual personal network (VPN) software has become the most widely used tools to secure yourself and your non-public devices via online hazards. But how really do VPNs work? So what do they do to patrol you against? How must they fight various net threats, and how diverse does all of them compared to the other person? Here is a short guide to assist you to understand what VPNs are, and how they can help protect your data. A VPN is essentially a private tunnel that attaches two or more remote locations. The concept behind this can be that when you connect to a web-based location, such as from a cafe to your home, all the data that passes in your way on the path to the storage space is encrypted and protected. Since all the connection goes through this secure tunnel, it essentially protects all the info that is delivered between you and that area. This security is what makes anti virus or vpn software guard you, as it decrypts virtually any viruses or perhaps malicious software program that might be masquerading as malware or vpn programs. While there are many different types of security software program that you can use to generate your information along with your device, VPNs offer one of many easiest solutions to go about it. Because you are technologically in two places at the same time, not only do you may have the convenience penalized able to quickly access these people from a variety of locations, is avast worth paying but as they are also less expensive and easier to build than normal security computer software, they are often suitable for people just starting out with a computer or a laptop computer. The next time you are wondering ways to get rid of malware or adware and spyware from your notebook or additional internet-connected unit, ask yourself if you should retain an anti-virus or VPN on hand. Leave a comment
First Information Report (FIR) is a written document prepared by police officials when they receive information about the commission of an offence which is cognizable in nature. It means the police officer can suo moto take an action on an offence without prior approval from the court. This report has contents of offence like time, date and place of occurrence etc. The information may be oral or written but it needs to be recorded under Sec. 154 of the Code of Criminal Procedure. Every police station has specific jurisdiction under them for which they can initiate investigation after filing of the report. Registration of the FIR sets the process of criminal justice in motion as the police officials can take action after registration of the FIR. Any person can register FIR only after the commission of the cognizable offence like the victim, a family member, and witness of offence, police officer, a person who committed the offence or any person who knew about the offence, order of the Magistrate. The concept of Zero FIR is not known to every layman. It came up as a proposal in the Justice Verma Committee Report in the amended Criminal Procedure Code after the heinous Nirbhaya Case in December, 2012. According to the provisions, a ZERO FIR can be recorded in any Police Station, regardless of any sort of jurisdiction zone. The case will be enlisted with the sequential number zero then the case will be transferred to the particular police station. Everyone can take the advantage of this provision in case of heinous and serious crime. The legal sanctity of the ZERO FIR will remains the same as that of the original FIR. The main issue is that mostly police officials deny registering ZERO FIR, as they asked to register FIR in the Police Station that has a jurisdictional aspect to take up the cognizance of the offence. One of the remedy to this situation is available in Indian Penal Code under section 166 A which states that if a police officer refuses to register FIR (related to offences against women) can be punished with imprisonment upto 1 year or fine or both. Furthermore, Section 460 of the Criminal Procedure Code lays down a list of irregularities which do not vitiate the legal proceedings, wherein, Clause (e) states that even though the Magistrate may not be empowered by the law to take cognizance of an offence but still he does so under section 190 (a) or (b), it would not prove to be frivolous. These provisions creates legal basis for ZERO FIR as of today, since no explicit provisions have been added to the Code of Criminal Procedure. Why we need the concept of ZERO FIR? The answer to this contention lays when we observe the rapid growth of crimes in the society especially those against women and how the victim has to struggle for seeking legal assistance. The concept of ZERO FIR is introduced to avoid the delay of the action on the crimes that adversely affect the victims as some heinous crimes like rape, murder require immediate action. In case of Asaram Bapu, ZERO FIR was filed, the complaint about the crime committed in the Jodhpur was lodged in Delhi by a minor girl who was from UP. The case was later transferred to Jodhpur Police, where the actual crime took place. Impact of ZERO FIR: ZERO FIR is like a boon to women as the offences against women have increased tremendously. In every 1.7 minutes an assault is committed in this nation and abusive behavior is committed at home in every 4.4 minutes. Moreover ZERO FIR is an extraordinary capacity to people traveling via railways; any person who has been a victim to any offence in the rail can approach the nearest Police Station and file a ZERO FIR. Some crimes like murder, rape, accident and assault require quick action from the concerned authorities and to gather some evidentiary confirmation from the gathering and circumstantial pieces of evidence. A ZERO FIR helps to take into account of these preliminary actions. Everybody must know about ZERO FIR as the crimes in the society are growing rapidly day by day. An aggrieved person can file ZERO FIR in non-jurisdictional Police Station. This is totally a gender neutral in nature. ZERO FIR is a small step towards increasing accessibility to the criminal justice system. Filing of ZERO FIR is just like filing of a regular FIR, just there is no jurisdictional touch to it. -Kiranpreet Kaur Associate at Aggarwals & Associates, S.A.S Nagar (Mohali) Call Now
AI-enabled Wearables and IoT The increasing pressure to produce a timely and accurate analysis of patient data demands a new generation of innovations. The Internet of Things (IoT or IoMT - Internet of Medical Things) has opened up a world of possibilities in healthcare: when connected to the internet, ordinary medical devices and wearables can collect viable additional data, give extra insight into vitals and data trends (physical and behavioral), enable remote eldercare, and give patients more control over their lives and treatment. Applying data analysis and machine learning algorithms to the patient data captured daily opens new opportunities for more in-depth insights about patients' conditions and predictive treatment. Wearable for seniors Nowadays, many seniors live independently from their families, and they want to be sure they are safe and healthy. So as their relatives, who want to know when anything happens. It is essential to know vital health parameters such as blood pressure and heart rate and how they correspond to daily activities. When a senior falls or gets lost, family members must be notified immediately. 5 tips how to set up your remote teams in a period of PANDEMIC We've developed an analytical system that allows continuous monitoring of vital health and state for seniors. The wristband provides its user with a status of essential parameters and also collects this data automatically. These regular measurements are stored on a server and are available through the internet in charts or raw data. The charts and analytics could be accessible by a senior, his family, or a doctor using the web and mobile solutions. The analytics system helps track heart rate, blood pressure, and patient activity during different time frames. The data could be exported and used for other purposes. Measurement of parameters is collected every 15 minutes. This enables clinicians to understand a senior’s overall health status precisely. Do you have a project in mind? Let's discuss! * please enter a valid Name * please enter a valid Phone * please enter a valid Email
Skip to content Local temporary file system in memory The memory of compute nodes can also be used to store data using a file system-like access. Every Linux OS mounts (part of) the system memory under the path /dev/shm/, where any user can write into, similarly to the /tmp/ directory. This kind of file system may help in case of multiple accesses to the same files or in case of very small files, which are usually troublesome for parallel file systems. Writing to /dev/shm reduces the memory available to the OS and may cause compute node to go Out Of Memory (OOM), which will kill your processes and interrupt your job and/or crash the compute node itself. Each architecture of compute nodes at NERSC ships with different memory layouts, so the advice is to first inspect the memory each architecture reserves to /dev/shm in an interactive session using df -h /dev/shm (by default the storage space reserved to tmpfs is half the physical RAM installed). Note that /dev/shm is a file system local to each node, so no shared file access is possible across multiple nodes of a job. Since data is purged after every job is completed, users cannot expect their data to persist across jobs, and will be required to manually stage in their data into /dev/shm before every execution and stage it out before completing. If this data movement involves several small files, the best approach would be to create an archive containing all the files beforehand (e.g. on a DTN node, to avoid wasting precious compute time), then inside the job extract the data from the archive into /dev/shm: this minimizes the number of accesses to small files on the parallel file systems and produce instead large contiguous file accesses. Example stage-in For example, let’s assume several small input files are needed to bootstrap your jobs, and are stored in your scratch directory at $SCRATCH/files/. Here’s how you could produce a compressed archive input.tar.gz (note that the $SCRATCH variable is not expanded in the dtn nodes): cd /global/cscratch1/sd/$USER/ tar -czf input.tar.gz files/ Now you can unarchive it in /dev/shm when inside a job. Note that there may already be some system directories in /dev/shm which may cause your process to misbehave: for this reason you may want to create a subdirectory only for you and unarchive your files in there, when inside your job: mkdir /dev/shm/$USER tar -C /dev/shm/$USER -xf $SCRATCH/input.tar.gz Example stage-out A similar approach to the stage-in needs to be taken before the job completion, in order to store important files created by the job. For example, if a job created files in /dev/shm/$USER/, we may want to archive and compress them into a single file with: cd /dev/shm/$USER/ tar -czf $SCRATCH/output_collection/output.tar.gz . MPI example jobs When dealing with multiple nodes using MPI, only one process per node has to create directories or create archives, to avoid collisions or data corruption. The following example creates a directory /dev/shm/$SLURM_JOBID on each node, runs a mock application that generates multiple files in /dev/shm/$SLURM_JOBID/ and finally creates a tarball archive of the data from each node, storing it in $SCRATCH/outputs/: #SBATCH ... # here go all the slurm configuration options of your application set -e # Exit on first error export LOCALDIR="/dev/shm/$SLURM_JOBID" export CLEANDIR="$SCRATCH/cleaned_outputs/" mkdir -p "$OUTDIR" "$CLEANDIR" # Create the local directory in /dev/shm, using one process per node srun --ntasks $SLURM_NNODES --ntasks-per-node 1 mkdir -p "$LOCALDIR" # The following is just an example, it creates 1 small file per process in $LOCALDIR/$RANDOM # Substitute with your application, and make it create files in $LOCALDIR srun bash -c 'hostname >$LOCALDIR/$RANDOM' # And finally send one "collecting" process to archive all local directories into separate archives # We have to use 'bash -c' because 'hostname' needs to be interpreted on each node separately srun --ntasks $SLURM_NNODES --ntasks-per-node 1 bash -c 'tar -cf "$OUTDIR/output_$(hostname).tar" -C "$LOCALDIR" .' You may also want to concatenate these archives into a single one for easier analysis (note that only uncompressed archives can be concatenated). To do so you can add this line after the last 'srun' above: tar -Af "$(/usr/bin/ls -1 $OUTDIR)" && cp -a "$(/usr/bin/ls -1 $OUTDIR |head -1)" "$CLEANDIR/$SLURM_JOBID.tar" The line above will make all the nodes of your job wait for this single process, therefore "wasting" compute hours. Alternatively you can use a separate job (e.g. a shared job using a single core) or manually using the datatransfer nodes, so not to waste compute resources, especially if the archives are large. Here's a separate "aggregator" script: set -e # Exit on first error # Get name of directory containing files to be merged [[ $# -ne 1 ]] && echo "Error. Missing input arg: DIRECTORY" && exit 1 || cd $1 export CLEANDIR="$SCRATCH/cleaned_outputs/" mkdir -p "$CLEANDIR" # Concatenate all *.tar archives into a single one using the name of the # current dir (the job id) as the new name. cat *.tar > "$CLEANDIR/$(basename $PWD).tar" This "aggregator" job should be submitted after the first script has completed, or you can use a for loop to iterate over all the output directories, like this: for d in $SCRATCH/outputs/*; do sbatch aggregator.slurm "$d"; done Final notes The user will need to pay attention at the memory usage on the node: storing too much data in a tmpfs on memory may force the kernel to kill running processes and/or cause the node to crash if not enough memory is left available. Also important to note is that /dev/shm, being volatile memory, does not offer any fault tolerance solution, and a node crash will cause the data to be lost: see also our documentation on Checkpointing for solutions. If you're creating large archives (over the GB threshold) please consider striping the scratch directory where you will create the archive. A similar solution is to use temporary XFS file systems on top of Lustre, when using shifter containers.
The Importance of SAST SAST stands for static application security testing and it’s a technique that developers use to discover vulnerabilities inside source code. Organizations use SAST to find vulnerabilities and fix them before the code is used in applications. This can be an effective way to mitigate cyber threats and help developers work systematically to deal with weaknesses in code. To learn more about the importance of SAST and how it can be beneficial for your company, check out the post below. Why SAST Is Important Security teams come in fewer numbers compared to developers which is one of the main reasons why some organizations struggle with their application security. It can also be challenging to put the right amount of resources into security, especially since it’s common for companies to be pushing developers to create applications faster. SAST can be easily implemented into workflows and it’s a great way to analyze your entire codebase. As a result, your developers can save time on manually securing code and carrying out reviews. Instead, you can run a SAST tool that automates the process and notifies you of any security issues. Some of the main vulnerabilities in code can be detected with SAST tools. This gives developers a good idea about whether hackers are likely to carry out attacks with methods such as SQL injections, buffer overflows, or cross-site scripting. Teams can then work to fix code vulnerabilities to make applications as secure as possible against threats. How To Use SAST There are several steps to consider when it comes to using SAST effectively. This is especially the case for large companies that use various languages, big platforms, and complex frameworks. The first step is to find a SAST tool that’s compatible with the programming languages that your developers use. In addition to this, it should be able to work with the type of software that you use. You should then focus on creating an infrastructure for the SAST tool to be run with. Organizations should ensure that proper authorizations for using the tools are in place, as well as making sure that licensing obligations are met. Companies will then need to figure out exactly what they want from the tool. This helps developers to make changes to the settings to filter out certain results and focus more on targeted concerns that you may have about your code. Once you run the tool, it’s a good idea to have a system in place that allows you to easily collect all of the information and create reports. This makes it much easier to manage vulnerabilities and sort them for developers and security teams to fix. If you use a lot of applications, be sure to arrange them in order of the ones that have the most vulnerabilities to the ones that have the fewest. You can then run scans on the applications regularly to receive updated results on the security of your applications. When you receive the results from scans, you should go through and get rid of any false positives that show up. Once this has been done, teams can then work to remediate the real security issues more efficiently. Along the way, organizations need to provide their development and security teams with the proper training and advice on how to properly use SAST tools. This can help them to feel more confident when running them and it can become a routine part of their workflow. Benefits of SAST One of the main advantages of using SAST is that it can be utilized during the earliest stages of development. Teams can also run SAST tools without having to run an application. This is great for being able to analyze code and find vulnerabilities before you deploy Being able to find vulnerabilities in code at the earliest development stages is great for preventing security flaws from being exploited at a later stage. In addition to this, developers are provided with reports about their code whilst they’re creating it. This can be an efficient way to work as it means that they can fix security issues before moving on to the next stage. Some SAST tools can even provide suggestions on how to go about fixing a vulnerability. This can help security teams work quickly to solve the issue without having to investigate it too deeply. Running SAST tools regularly is the best way for them to work effectively. Teams should be in the habit of running them monthly and every time that a new piece of code is written or Developers also like how easy it is for SAST tools to be implemented with the framework that they already have in place when developing software. Not to mention, SAST tools can be fast and provide accurate results to help developers work more efficiently. Developers can save time by using SAST tools due to how they use an automated system. This means that teams can run the tools and leave them to scan for security risks before being provided with the results for them to analyze. The Downsides of SAST Using SAST comes with some excellent benefits, however, there are also some downsides that you should be aware of too. One of these downsides is that SAST can end up providing false positives. If developers aren’t careful to watch out for these false positives, it could lead to them working inefficiently. In addition to this, SAST provides reports in a static state. Therefore, teams need to run the scans frequently. If not, it could lead to developers and security teams using outdated reports which means they could be missing new vulnerabilities. SAST also isn’t great for discovering security flaws in dynamic environments. Developing applications securely involves testing code and analyzing it deeply. SAST tools can help to make this process a lot quicker and easier for developers. They can use SAST to find vulnerabilities from the very beginning stages of development which helps organizations run secure code when they deploy applications. Hopefully, the details found throughout our post have been useful in helping you to understand a little more about why SAST is so important for developing secure applications. Leave a Reply
Building a Fugitive Communication Infrastructure during the South African Liberation Struggle Published on June 4th, 2020 Written by Sophie Toupin During the South African liberation struggle, a group of scientists and techies formed a technical committee to assist the African National Congress (ANC) in its quest to fight against the apartheid regime in power since 1948. The technical committee, officially formed in the early 1960s, was inspired by the writings of Soviet, Irish, and British communist scientists who believed in the power of science and technology for the benefits of the people, as well as by the scientific and technological development in China and the USSR. The launch of Sputnik 1 in 1957 was a particular inspiration for South African anti-apartheid activists who were thinking about the ways in which communication infrastructure could support their struggle against injustice, oppression, and white supremacy (Figure 1). The existence of a technical committee in South Africa was to be short-lived, however, because after the arrest and imprisonment of Nelson Mandela and the others in the mid-60s on Robben Island, its members fled and took refuge in the UK. Figure 1: Excerpt from an article published on Sputnik 1 by Dr. Ronnie Press in the New Age on October 17, 1957. Dr. Press, a member of the technical committee, was to be the lead developer, together with Tim Jenkin, of the communication infrastructure that allowed South Africans to communicate secretly and transnationally in the late 1980s. The article is publicly available at the Digital Innovation South Africa. The externalized nature of the South African national liberation struggle and the persona non grata status of the exiled freedom fighters meant that they needed to design new ways to communicate secretly and across continents. Members of the technical committee started experimenting with technologies such as tape recorders, radio transmitters, telex, telematics (telephone+computers), laptop computers, encryption, and acoustic coupler modems, among others, to make their dream of rapid, secret, and transnational networked computer communication possible. At the center of their science and technology practice was the people, a term Alain Badiou1 reminds us has been widely used as a political category during liberation struggles. The signifier the people referred to the oppressed and the colonized everywhere who had been denied their freedom and now had an opportunity to identify as a people. In this context, science and technology for the people meant that it needed to support the rank and file in their fight against apartheid. They needed an easy way to use the hardware infrastructure coupled with appropriate training regarding using computers and encryption—the first time, for many of them. Figure 2: Still image from the documentary The Vula Connection.2 Over almost a decade, from the early 1980s onwards, the technical committee developed an encrypted communication infrastructure,3 which was to be included in Operation Vula (Figure 2), one of the ANC’s final efforts against the apartheid regime. The infrastructure was to allow freedom fighters on the ground in South Africa to communicate with the senior leadership of the African National Congress (ANC) based in Lusaka, Zambia, via London, Great Britain (Figure 3). While the initial communication nexus was between Durban, London, and Lusaka, the communication infrastructure would later be operated from major cities in South Africa, namely, Cape Town, Durban, and Johannesburg, as well as from Amsterdam; York, in Great Britain; TallCree First Nation, in Alberta, Canada; and Harare. It was also tested in Paris, but never operationalized. Figure 3: Simplified infographic of how the encrypted communication infrastructure worked. By Ariel Acevedo and Sophie Toupin. CC BY-NC-SA. The politics behind this initiative deserve attention, as they rest on the building of what Deborah Cowen calls fugitive infrastructures.4 This type of fugitive infrastructures has enabled the destabilizing actions that are essential components of any revolution, whether they took the form of maroon communities in the hills, the swamps, or the inlands of a country; the Underground Railroad and Telegraph to guide slaves to freedom; or a fugitive communication infrastructure that sought to support the fight against apartheid. It is through such forms of politics that freedom lies. And often only in hindsight can such efforts be understood, highlighted, and revealed. The technical committee’s encrypted communication infrastructure was made out of not only technical hardware, but also the people supporting it who formed and acted as a fugitive infrastructure. Taking a position of understanding people as infrastructure5 in a fugitive context also aims to decenter or shift the focus away from the developers.6 The people who tested, operated, and hosted this infrastructure were as essential as the developers. The importance of making the people visible is doubly important as the majority assigned to these tasks were Black7 and white South African women in addition to Dutch and Canadian women. South African women especially were appointed to communication work because it was seen as more clerical and less dangerous, thereby simultaneously highlighting its feminization and devaluing it. However, without them, the networked infrastructure would not have worked. This tricontinental fugitive infrastructure that allowed coordinated actions within a liberation movement spread across different geographies is a good example of what revolutionary communication means. What makes a communication practice “revolutionary” is not its unique and allegedly transformative technical characteristics but, instead, its insertion into a revolutionary context comprising committed actors deploying a multiplicity of techniques that include, but cannot be replaced by, the medium itself. This case provides a basis for rethinking claims about the allegedly revolutionary character of the internet and social media.  After two years (1988-1990) in operation, the communication infrastructure was discovered by the apartheid regime. A year later, as negotiations were happening, some of the technical committee’s members went back to South Africa after getting their amnesty claims accepted. They started working for the ANC, setting up computer networks throughout the country in the lead-up to the first democratic elections in 1994. After Nelson Mandela’s victory, the technical committee created and managed the websites of the ANC parliament and ministries in addition to setting up their email. In the early 2000s some of the technical committee members created their own company, called Umbezeni Communication, to design websites in South Africa. Sophie Toupin is a PhD candidate in the Department of Art History and Communication Studies at McGill University. Her current PhD research examines the relationship between communication technologies and revolutionary movements in the context of liberation struggles. She is one of the three co-editors for the book The Handbook of Peer Production (Wiley, forthcoming). Some of her publications can be found at: 1. Badiou, Alain. 2013. “Vingt-Quatre Notes Sur Les Usages Du Mot « Peuple ».” In Qu’est-ce qu’un Peuple ?, 8–17. Paris, France: La Fabrique. 2. Edmunds, Marion. 2014. The Vula Connection. Johannesburg, SA: Sabido Production. 3. Jenkin, Tim. 1995. “Talking To Vula: The Story of the Secret Underground Communications Network of Operation Vula.” The Heart of Hope. 4. Cowen, Deborah. 2017. “Infrastructures of Empire and Resistance.” Verso Books Blogs. January 25. 5. Simone, AbdouMalik. 2004. “People as Infrastructure: Intersecting Fragments in Johannesburg.” Public Culture 16 (3): 407–29. 6. Burrell, Jenna. 2012. Invisible Users: Youth in the Internet Cafés of Urban Ghana. Cambridge, MA: MIT Press. 7. When I use the term “Black” I refer to the ways in which the Black Consciousness (BC) movement understood it: meaning that it includes blacks, coloured and Indian South Africans.
Moses (the Deliverer)Moses - "Let my people go," was the cry of a lowly Hebrew to the Egyptian Pharaoh. Pharaoh refused and God hardened his heart to the point where he nearly brought his own kingdom to ruin. The life of Moses is known to us only from scripture. However, the first century historian, Josephus, who had access to ancient records that are now lost, filled in many gaps. How much is accurate, we'll never know. Moses is regarded as the author of the first five books of the Bible, both by Jews and Christians. The Torah (or Pentateuch) laid down the Law for God's people (see below), and thus, Moses is considered to be possibly the most important figure in Judaism. What's more, he lead the Hebrews out of Egypt and into the Promised Land. According to Josephus, his birth was foretold by an Egyptian soothsayer as the "deliverer" of the Israelites. Pharaoh attempted to prevent this by killing all the male babies in Gohsen by throwing them into the river. But Moses' mother saved her son by placing him in a reed basket and sending him down the Nile where he was, ironically, found and raised by Pharaoh's daughter, as she was childless. Nothing of his childhood is known, but Josephus says he distinguished himself while in the service of Egypt, particularly in war with Ethiopia. But one day, after he killed an Egyptian, he fled to Midian. It was here that he encountered the God of Israel, Yahweh, for the first time. God commanded Moses to return to Egypt and free the Hebrews. After Pharaoh refused to free the Jews, God sent a series of plagues that were instrumental in changing Pharaoh's mind. What followed was 40 years of wandering in the desert before the Israelites entered the Land of Canaan. The dates of Moses' life and the Pharaoh with whom he contended are not known for sure. Some scholars place him as early as around 1600 B.C., which would put his life at the time of the Hyksos. Others as late as the reign of Ramses II. Interestingly, Josephus refers to Pharaoh’s daughter as Thermuthis, which may put her in the family of Thutmose; although Jewish tradition assigns her the name Bithiah.
Explore Courses Blog Tutorials Interview Questions 0 votes 1 view in Python by (47.6k points) I'm using Python 3.2 and trying to exit it after the user inputs that they don't want to continue, is there code that will exit it in an if statement inside a while loop? I've already tried using exit(), sys.exit(), sys.quit(), quit(), and raise SystemExit. 1 Answer +1 vote by (106k points) edited by Best answer You can use the below-mentioned code to solve your problem:- while True:    answer = input('Do you want to continue?:')    if answer.lower().startswith("y"):       print("ok, carry on then")    elif answer.lower().startswith("n"):       print("ok, sayonnara") You can also use input in python 3.2 instead of raw_input. Related questions 0 votes 1 answer 0 votes 1 answer asked Aug 26, 2019 in Python by Sammy (47.6k points) Browse Categories
People Power vs. Military Power in East Asia Posted January 3, 2007 Categories: Articles, Asia “In the short term, making governments more accountable to people introduces new uncertainties and limits into diplomacy,” Kent Caldor has written about Northeast Asia. Calder’s point was that transitional democracies are not ready to open national security to public debate. But the people power quandary perhaps even more profoundly affects Washington. Other nation’s democracies sound good on paper and in principle but are risky business in practice. Having frequently forged comfortable military relationships with reliably authoritarian administrations such as Park Chung Hee’s in South Korea Chiang Kai-shek’s in Taiwan, the United States has recently discovered that democratic movements in East Asia can pose an unpredictable and worrisome challenge to U.S. security objectives. Indeed, the transformation of U.S. doctrine and force posture in East Asia results not just from technological changes and the identification of new threats but also from the impact of democratic movements within the countries of our allies. At the same time, people power influences decision-making in dictatorships. In North Korea, for instance, citizens do not communicate their views in any meaningful way through elections. Yet they are still actors in an important political sense. The leadership in Pyongyang relies on people power–not in the sense of an anti-government movement but as an expression of nationalist sentiment–to achieve some measure of legitimacy for its policies. In this sense, people power and democracy are not interchangeable concepts. Strategic Flexibility In the Republic of Korea (ROK), popular anger against U.S. forces came to world attention in 2002, when tens of thousands of South Korean citizens demonstrated in the streets after the deaths of two schoolchildren run over by U.S. military armored vehicles. But this was not the first time that popular movements tried to effect change in the U.S.-ROK alliance. Earlier there were protests over the Status of Forces Agreement. Adding its voice, the “Reclaiming Our Land” movement targeted U.S. bases, as did organizing around prostitution. And the environmental movement campaigned against the toxic byproducts of the U.S. military presence. Nor has resistance dissipated with the planned reduction of U.S. troops. South Korean movements continue to challenge U.S. plans to expand military facilities in Pyongtaek. It is also important to acknowledge the influence that the inter-Korean summit of June 2000 had on the transformation of security perspectives. Kim Dae Jung’s engagement policy, itself a response to and an incorporation of popular efforts at North-South reconciliation, changed the strategic nature of the demilitarized zone (DMZ). The cross-border tourism projects, the efforts to reconnect the north-south train line, and the industrial park at Kaesong all challenged military planning and even the notion of an infantry tripwire. South Korea’s more conciliatory policy toward North Korea, which began to diverge from Washington’s hard line after 2001, has made Seoul a less reliable U.S. ally. For instance, reportedly apprehensive that Seoul would transfer advanced technology to Pyongyang, the United States cancelled the sale of four Global Hawk unmanned surveillance aircraft to South Korea in July. Military-First Doctrine North Korean leader Kim Jong Il is no fan of democratic movements. If the rumors of military coups are correct, he is even worried about popular uprisings within the North Korean military. Polls of North Koreans, if they existed, might strengthen Kim’s hand by revealing a fierce determination to defend the homeland, a preference for an “iron fist” to insure domestic stability, and even a nationalist pride in their country’s entry into the nuclear club. But popular discontent over budget priorities and disapproval of the leadership’s decisions over the last decade-not to mention widespread human rights abuses-would likely undermine his political position. There is no sign that the North Korean government plans to introduce even the modest political reforms adopted by its putative ally China. There is also no tradition of democracy in North Korea to which a dissident or opposition movement might appeal. In the mid-1990s, Kim Jong Il introduced the “military first” doctrine to consolidate his own political position and mobilize the country against threats both external and internal. In 2003, the doctrine officially became an ideology. At one level, the leadership’s emphasis on the military is a pragmatic political decision. Because of its sheer size, the military substitutes for any representative political body. There are practically no civilians in North Korea: there are only future soldiers, current soldiers, veterans, and families of soldiers. The military is the only truly functioning institution in the society, not only in terms of protecting borders and preparing for the much-touted foreign attack, but also in maintaining infrastructure and keeping the extraction industries running. By putting the military first, the North Korean leadership is responding to a perceived foreign threat from the outside and strengthening the regime’s hold on power. But it is also appealing to the country’s most representative institution. In this sense, the military-first doctrine is a populist platform. Pyongyang’s October nuclear test can be interpreted-in addition to its deterrent and “bargaining chip” purposes-as an attempt to stimulate nationalist pride and provide some measure of compensation for the economic adversity of the past decade, revealing that popular sentiment is not irrelevant to North Korean policymaking. North Koreans make their voices heard not through the ballot box or demonstrations but rather through their membership in military institutions and their capacity to respond to nationalist appeals. Strategic Redeployment? The future of these doctrinal shifts remains unclear. Should the current tensions around the nuclear conflict subside, North Korea might conceivably switch its military-first doctrine to the competing concept of kangsong taeguk (strong and prosperous nation) and reallocate precious resources to economic modernization. If market reforms don’t benefit a large enough portion of the population, however, the country will face a pre-revolutionary predicament of rising and unmet expectations. Only if the military is fully behind these changes, in the sense of implementing them as well as benefiting from them, will the regime avoid collapse. As in Cuba, however, Washington’s policy of unmitigated pressure allows Pyongyang to retain a measure of popular support through relentless, nationalist invocations of an external threat. In South Korea, the character of Roh Moo-Hyun’s more independent foreign policy is often ascribed to a narrow party agenda rather than reflecting more significant changes in how South Koreans view their country’s role in the region. China has become a much more important economic partner and diplomatic player in the region, and South Koreans are rapidly waking up to this reality (conflicts over the Koguryo historical dispute notwithstanding). U.S. force reductions in Korea, and what will inevitably be a widening conflict over military purchasing and interoperability, will only distance Seoul further from Washington. Even the conservatives, should they win the 2007 presidential election in South Korea, will likely continue Roh’s more independent military and foreign policy, partly in response to the pressures of popular sentiment and partly because of geopolitical realities such as China’s economic might. FPIF, February 13, 2007 Leave a Reply
I just saw the pictures from Philae I was very surprised to see that the surface looks like it is covered in dust, not that much different than our moon. I personally was expecting it to be big chunks of rock and/or ice as essentially a single solid chunk. Was there an expectation that it would be dusty? enter image description here It turns out that scientists thought the same thing very recently. According to this Anatomy of a Comet article at NASA Jet Propulsion Laboratory's website, related to the Rosetta mission, "Scientists used to think that it was solid and firm, but NASA’s Deep Impact mission (2005), in which Rosetta participated, surprised them. They found that the nucleus of comet Tempel-1 was more silicate or dusty than they expected." So, it was only about a decade ago that scientists were able to see that the surface of a comet was dusty. Following the Deep Impact mission, JAXA also had an asteroid-related mission in 2005 called Hayabusa. Hayabusa landed on the surface of the asteroid, which disturbed some of the dust on the surface so that it could be collected and returned to Earth. When comets are farther from the Sun, they tend to be completely frozen. When the comet moves in closer, the heat can cause nucleus to start shooting streams of gas and dust from within the comet, creating the coma and eventually the dust tail. It makes sense that some of the particles that aren't lost to space and remain in the coma would eventually succumb to the comet's gravity and settle back down on the surface. In a somewhat related note, ESA are interested in the dust on/around the comet. They included a device on Rosetta called GIADA (Grain Impact Analyser and Dust Accumulator) to collect and analyze dust from 67P's coma. GIADA    GIADA on the Rosetta probe. Image source: Rosetta Blog: GIADA Investigates Comet's “Fluffy” Dust Grains Your Answer