text
stringlengths
144
682k
• search hit 1 of 1 Back to Result List Entrepreneurial Personality Traits • How entrepreneurs become successful with their business ideas has been a topic of discussion within entrepreneurial research circles for many years. Business success has been related to psychological characteristics and many research findings have explained how people become entrepreneurs and furthermore, how they find success in regards to their business ventures. People always wanted to know what defines an entrepreneur and more importantly, what is needed to become a successful entrepreneur. Curious minds began to search for the recipe for success. Personality Traits have been researched for years, leading to the discovery of many diverse and distinct forms which are still recognized today. Researchers compared the Behavioral Approach or the analysis of demographical characteristics to success. This raises the question of what an entrepreneur needs to become successful which is made more difficult due to the fact that entrepreneurship and who an entrepreneur is can be difficult do define exactly. Entrepreneurs are diverse and distinct individuals that each possess their own characteristics, behavior and reasons for starting a business. Many people assume that it is just someone who starts their own business. While partially correct, this only scratches the surface of what it is to be an entrepreneur. This thesis answers the following three research questions: 1. Which personality traits were found in the almost sixty years of researching? 2. What triggers do entrepreneurs need for starting a new business? 3. Which factor makes the entrepreneur successful with their business idea? Also, reading the thesis, one may gain a better understanding of what entrepreneurship is, what defines an entrepreneur and what one needs to become a successful entrepreneur. In this thesis the reviewing literature method developed by Wolfswinkel et al. (2011) was used to identify suitable literature and references for the main chapters. For that the five stages of the grounded-theory method for reviewing the literature were used in an iterative fashion. In step one inclusion and exclusion criterias for literature were defined. Then literature was searched matching the criterias of step one. In step three the samples were refined. Then in step four the found literature was analyzed and coded before the results of this research was presented in the following text. Many entrepreneurial personality traits were discovered and confirmed during the studies conducted over the last sixty years, these include but are not limited to Need for Achievement, Locus of Control, or risk taking propensity. Motivation is clearly the main trigger to start your own business. During the studies reasons were discovered of how and why an entrepreneur may become successful outside of posessing the right combination of traits. For example: having human, financial and social capital, an entrepreneurial behavior and the right economic conditions to start a business that will survive for more than five years. Export metadata Additional Services Share in Twitter Search Google Scholar Author:Manuela Keller Referee:Harald F. O. von Korflesch, Sebastian Eberz Advisor:Sebastian Eberz Document Type:Bachelor Thesis Date of completion:2016/02/21 Date of publication:2016/03/14 Publishing institution:Universität Koblenz-Landau, Universitätsbibliothek Granting institution:Universität Koblenz-Landau, Campus Koblenz, Fachbereich 4 Date of final exam:2016/03/01 Release Date:2016/03/14 Number of pages:75 Institutes:Fachbereich 4 / Institut für Management BKL-Classification:85 Betriebswirtschaft
Picture – David Bebber David Bebber for The Times The Right to Die explored through the form of documentary  “The Right to Die” is a phrase used as a part of a global movement attempting to change the law regarding assisted euthanasia. In the UK a patient is unable to ask for medical assistance when wanting to end their life. According to Section 21 of The Suicide Act (1961), any person participating in the assisted suicide can face criminal charges of manslaughter or murder. Any person in the UK who is found guilty of the former or latter charge can face up to 14 years – life imprisonment. There are two types of assisted suicide; passive and active. Passive assisted suicide would be understood as the choice to turn a patient’s life support off, as they could no longer survive without depending upon it. This decision would be made with a medical doctor attending and guiding the decision. Active assisted suicide would involve the assisting person actively taking measures to harm and indeed kill the patient. Even if the assisted suicide was condoned and encouraged by the patient the participant in the suicide can still be charged with manslaughter or murder charges. Subsequently, The Right to Die and Dying with Dignity have become politically loaded phrases and are often used in campaigns and protests encouraging for euthanasia to be legalised. So one could find themselves questioning what are our “rights” as human beings? And, when should a patient be allowed the right to die? Should this decision have to be medical related or simply a choice (say due to mental health issues)? The Netherlands and Belgium legalised Euthanasia in 2002. Switzerland allows assisted suicide through medical care and a doctor’s assistance, however, the act of euthanasia in and of itself is still understood as being illegal. From December, 19th 2016, the states of Oregon, California, Colorado, Vermont, and Washington have all legalised the act of Assisted Suicide. So why has Britain still not legalised assisted suicide? In the U.S.A states that have legalised assisted suicide, a patient must adhere to the specific requirements to be able to carry out the act legally. • Be capable of taking the medication independently. • Be of a sound and competent mind. • Be over the age of 18 years old. • Be suffering and diagnosed with a terminal illness that can be determined by a medical Doctor to kill the patient within 6 months time. After digesting this information, I find myself questioning my own moral compass on this topic. I researched cases where the law on should be legal and illegal with regards to condoning euthanasia appeared to be blurred. Cases such as depression, anxiety, eating disorders or as one case recorded a woman’s fear of technology had all been deemed acceptable and justifiable for euthanasia to take place. A large part of my research involved watching documentaries around the topic. Below I will list each film with a brief description. 1. Terry Pratchett: Choosing to Die (2011) Source: Keo Films (Youtube) Sir Terry Pratchett was a renowned British author who was diagnosed with Alzheimer’s disease which ultimately led him on a journey to report for the BBC about assisted suicide. Throughout his journey, he meets different prospective patients, all of whom are suffering from a terminal illness and are planning to end their life at the renowned Dignitas clinic in Zurich. Pratchett and his cameraman … form attachments to the patients they are documenting. Rather than acting as observational bystanders, Pratchett and his cameraman often question the patients and their families in a bid to challenge their firm belief in assisted euthanasia. Pratchett’s personal diagnosis is often brought up and he attempts to understand the other patient’s choices to end their life before their disease begins to physically affect them. Pratchett’s often long moments of recognition that he too faces the same plight is what makes this documentary all the more devastating. This documentary, for me, conveyed the brave men who wished to die prematurely before their disease took over. As the UK does not provide this service some patients have no option but to die in a bed where so many others have before in an industrial park with foreign speaking doctors. This reality does not appear to be a “dignified death” as we watch one patient die before us on the screen. However, I can’t help but 2. How to die in Oregon (2011), Peter Richardson  (HBO) Source: https://www.youtube.com/channel/UCxI47yIql2wR2xGBXx-aDJw In 1997 Oregon state in America issued a new law to be passed that would enable Oregon citizens to participate in what has been phrased as “Physician Assisted Suicide”. This act subsequently enabled for terminally ill patients to be able to, without being prosecuted, take their own life by means of consuming a lethal amount of prescribed drugs assisted by a medical doctor. Oregon was the first state to pass a law that condoned “death with dignity” without it being deemed a suicide. How to die in Oregon documents the ways in which this act has been implemented into the American health system. We witness assisted suicide from both the physician and patients perspectives. This documentary inserts the viewer into the world of mother and wife, Cody Curtis. Her bravery throughout and eagerness and willingness to fight truly unveils the hardship she must have been facing when she chooses to die prematurely. Curtus’s friendship with her physician is genuine and unlike the previous documentary discussed, this expository film truly depicts what is described as “death with dignity“. It is clear from the outset that Curtis is struggling with intolerable pain and her life became, as she described, not worth living. Her choice is clearly selfless and thought through. This documentary is hard to watch, however, the courageous Curtis discusses her options and indeed she chooses physician-assisted suicide at her home surrounded by her family. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
The United Nations’ 17 Sustainable Development Goals (SDGs) aim to achieve decent lives for all on a healthy planet by 2030. As things stand in 2019, many of the targets are likely to be missed. Global population growth means overexploitation of natural resources, environmental destruction and unsustainable demand for land, food, water and energy. Growing numbers trap the poorest in poverty. To meet the SDGs, the international community must tackle population, ethically and effectively. Sign the petition to UN Secretary General António Guterres Dear Mr Guterres We, the undersigned, call on you to recognise the urgency of achieving a sustainable human population if the world is to have a reasonable chance of meeting the Sustainable Development Goals. Positive, empowering measures to allow and encourage people to choose smaller families must be at the heart of the UN's programme. Specifically, we call on you to: 1. Issue a statement expressing support for smaller families, and recognising the value of ending and reversing population growth. 2. Embed positive measures to address population in the implementation and work of existing UN frameworks and bodies, such as the SDGs, IPCC and Convention on Biodiversity. 3. Explore options for the development of an international multilateral framework to address population and demographic challenges, equitably, compassionately and effectively. Thank you for your support. Sign the petition
Five and half years after the Tohoku earthquake and subsequent meltdown of the Fukushima Daiichi Power Plant in Japan, a question still lingers for some tea enthusiasts: Is Japanese tea safe to drink? The short answer? The longer answer? Resoundingly, yes! And the reason why is multi-faceted. Firstly, by “safe to drink”, the layman might think this means, “the tea is absent from radioactive particles”. While this may be true for many producers, this interpretation isn’t entirely accurate, for reasons that will soon become apparent. Why shouldn’t you be worried? Thankfully, radiation doesn’t travel far unless carried by a radioactive material, and the tea growing regions of Japan are a significant distance from Fukushima. The distance from Fukushima to Shizuoka Prefecture, where 40% of all Japanese tea is grown, is 360 km (224 miles), or just a bit further than the distance from New York City to Washington D.C. Another 30% is grown on a completely different island, Kyushu, where you have the infamous tea growing Prefectures Fukuoka and Kagoshima, the latter of which is as far away from Fukushima as New York City is from Atlanta. It’s worth noting that the exclusion zone around the power plant is only 30 km (18 miles), and over the last five and a half years, the Japanese government has been systematically removing a layer of topsoil, significantly reducing the ambient background radiation. [Before continuing, let’s clarify two different and useful scientific terms that measure radiation: the becquerel (Bq) and the sievert (Sv). Becquerel measures how much radiation a substance emits. Sievert, usually measured as a millisievert (mSv), measures how radiation effects the body.] Before Fukushima, Japan allowed food exports to register under 500 Bq / Kg, the same limit as the European Union. After the disaster, Japan reformed their rules to only allow 100 Bq / Kg, the lowest range of any country on Earth. You might be wondering, as a means of comparison, how much does the USA allow in our imports? Even though Canada and the International Codex allow a maximum of 1000 Bq / Kg, the United States tops the list with a maximum of 1200 Bq / Kg, or 12 times Japan’s standard! Though this seems high (by comparison), we are far from negligent in our duties. The FDA has worked on this issue extensively, coordinating with Japan’s Ministry of Health, Labour, and Welfare (MHLW), and issues reminders to the public that it has found no cause for concern among any imported foods from Japan and that the import standards are considered safe. They also consult the EPA’s environmental radiation monitoring program (RadNet), and the International Atomic Energy Agency (IAEA), who keep a fairly regular (weekly to bi-weekly) journal of what’s happening in Japan. Provided these organizations are doing their jobs, many tea companies have taken up the mantle of preventative concern themselves. For instance, Aiya, a huge Japanese brand primarily selling matcha, releases monthly reports of radiation testing conducted on their tea, a process that certainly doesn’t come cheap. Numerous other brands do this, and are very open about the testing. Resources are available online to research what levels of radiation are being reported in Japanese foodstuffs and tea, either from governmental bodies or from the tea distributors themselves. If you’re concerned, simply ask! Finally, there’s the idea of “safe” when it comes to radiation. All of these numbers and concepts can be abstract, so I’d like to provide context. Let’s perform a thought experiment based on a worst-case scenario: • Let’s say that you’ve purchased a Japanese tea that has registered the maximum legal export limit in Japan = 100 Bq / Kilo. (Remember that this is still 1/12 the United State’s limit on imports.) • Then, let’s say you drink three cups of tea a day for a whole year, using an average of 4 grams of tea per cup. This translates to 12 grams of tea, or 1.2 Bq, per day. • Let’s really shake it up! When you steep dry tea leaves, very little radioactive material enters your cup; only between 2% and 10%, depending on the study and conditions you reference. Instead, let’s pretend that you’re actually just eating the tea, thereby consuming 100% of the radioactive material present, as you would when you make matcha. (Although 12g of matcha a day is about 420 mg of caffeine, or nearly 7 shots of espresso, enough to drive even die-hard caffeine lovers up a wall.) Taking all these factors into consideration, what would be the total amount of radiation you would ingest over the course of a year? About 29 bananas. * Yes, bananas are radioactive, because about 0.0117% of natural potassium is radioactive, thus any foodstuff with potassium, including avocados, potatoes, beans, and yes, coffee (don’t get too excited tea people), are radioactive. The simple  and unavoidable fact of life is this: we’re all exposed to radiation constantly. It’s a natural part of this planet. It’s everywhere, bombarding us from space, radiating from the building materials of our homes, from minerals in the soil, and in the air we breathe. This is called background radiation. Ever been in a hot spring? Been near a brick or cement building? Flown in an airplane? Been to the dentist? Then you’ve been exposed to multiple forms of radioactive materials. The average human on this planet racks up about 2 to 4 mSv of background radiation a year (and in some places this can be as high as 10 mSv). The experiment detailed above, an exaggerated worst-case scenario, would be effectively the same as walking around the Colorado Plateau for a day or two. The longer answer summarized into a tasty, bite-sized take away: Japan and their tea producers took the necessary, often extreme precautions, in coordination with multiple organizations at home and abroad, to make sure their tea was safe for you and me. Radiation is everywhere and the amount you could possibly get from drinking tea is minuscule. So stop worrying about it and go enjoy a cup! Photo Credit:
It is an experiment on the concept of what we call a ‘sofa’ and what we call a ‘chair’. The acting of putting on the clothes of “sofa” on the current chair in itself makes the previous object become a little more cushiony furniture. Also, the see-through material can reveal an old chair inside through light. In other words, it means that ‘Sofa-dress’ projects the past objects through the rays of space, which makes a new present without removing the past entirely. Material : Urethane foam Making Process like making clothes(dress) process Sofa-Dress is made in the same process as clothes making process.
May 7, 2018 - 8:37am -- Anonymous One aspect of producing a high quality and high yielding crop is to protect that crop against pests such as weeds, insects and diseases.  While there are a variety of options to accomplish that goal, one widely used tool for pest management is the sprayer.  With any spray application, the applicator needs to balance coverage with minimizing drift and preventing off-target movement of the pesticide.  In today’s column, I will cover spray droplet size as one best management practice that spray applicators need to consider.           Droplet size relates to both drift potential and coverage.  Smaller droplets can result in better coverage, provided those droplets actually make it to the plant leaf target.  As droplet size decreases, the potential for drift and off-target movement increases.  Jason Deveau, a sprayer technology specialist with the Ontario Ministry of Agriculture, Food and Rural Affairs recently posted an interview on sprayer best management practices on the sprayers 101 web site and here is what he had to say regarding droplet size: “Larger droplets have more mass, which means they are more likely to fall rather than be carried away. But, for a given rate, the number of droplets a nozzle produces decreases as average droplet size increases. It’s the same amount of pie no matter how many slices. Fewer droplets might compromise spray coverage, particularly when targeting small weeds or when using a contact pesticide in a dense canopy. The answer is to use more volume to bring the droplet count back up, but that means more refills for the sprayer operator, which is time consuming. Traditionally, a grower would choose a nozzle based on the desired rate for a given pressure. As the sprayer changed speed, this would lead to over — or under — application. So, for convenience and consistency, most growers use rate controllers that monitor speed and auto-adjust the rate using pressure.  However, pressure also changes droplet size and spray pattern. Patterns can collapse at lower pressures (say <30 psi) and average droplet size decreases as pressures increase.  Pulse-width systems have changed this, but they are still few and far between.” Next week I will cover boom height and weather conditions as best management practices.
Hospital (Sakanan) — 07 បន្ទាប់មកទៀតរូបភាពទីនៅក្នុងរូបភាពទីយើងឃើញក្រុមសង្គ្រោះបឋមរបស់គ្រូពេទ្យ អញ្ចឹងក្រុមគ្រូពេទ្យគាត់បានមកដល់កន្លែងកើតហេតុ ហើយមកមើលបុរសម្នាក់នោះ អញ្ចឹងយើងឃើញមានពេទ្យចំនួនពីរនាក់ ពេទ្យចំនួនពីរនាក់ ដែលគាត់ស្លៀកពាក់ឯកសណ្ឋានជាពេទ្យ គឺពាក់អាវ ខោ និងមានចងបូរសញ្ញារូបពេទ្យ គឺសញ្ញាបូកលេខពណ៌ក្រហម សញ្ញាបូកពណ៌ក្រហមនៅនឹងដៃស្ដាំរបស់គាត់ ហើយគាត់បានទៅត្រួតពិនិត្យទៅលើបុរសដែលគ្រោះថ្នាក់ចរាចរណ៍នោះផងដែរ អញ្ចឹងគាត់បានស្ទាបនឹងបានលើកបុរសដែលមានគ្រោះថ្នាក់នោះមកដាក់នៅលើហ្វ្រង់កាមួយ អញ្ចឹងគាត់នាំគ្នាសែងបុរសម្នាក់នោះ ប៉ុន្តែដោយសារបុរសម្នាក់នោះ គាត់មានគ្រោះថ្នាក់ចរាចរណ៍ដែលប៉ះពាល់ទៅនឹងជើង និងដៃ និងគាត់ឈឺខ្លួន ដោយសារតែគាត់បោកទៅនឹងថ្នល់ខ្លាំងពេក អញ្ចឹងនៅពេលដែលគាត់ដួល គាត់បោកទៅនឹងថ្នល់ខ្លាំង ដូច្នេះបានធ្វើឲ្យគាត់ឈឺយ៉ាងខ្លាំង អញ្ចឹងនៅពេលដែលពេទ្យគាត់លើកបុរសម្នាក់នោះដាក់ហ្វ្រង់កា គឺធ្វើឲ្យគាត់ឈឺ និងស្រែកយ៉ាងខ្លាំង ដោយសារតែគាត់មានរបួស ដូច្នេះពេទ្យនឹងព្យាយាមលើកថ្នមដើម្បីកុំឲ្យរបួសកាន់តែធ្ងន់ធ្ងរ ដោយសារតែបុរសម្នាក់នោះគាត់ងើបអត់រួច ដោយសារតែបុរសម្នាក់នោះគាត់ងើបដើរអត់រួចដោយខ្លួនឯង ដូច្នេះពេទ្យត្រូវសែងគាត់ដោយប្រើប្រាស់ហ្វ្រង់កា អញ្ចឹងពេទ្យជាដំបូងគាត់លើកបុរសម្នាក់នោះពីថ្នល់ ហើយដាក់នៅលើហ្វ្រង់កា ដើម្បីសែងដាក់ចូលឡានពេទ្យ Link to overview page Link to dictionary 2. to be different, other 2. appearance, form, shape ទី tii 1. particle used to form ordinal numbers 2. spot, place, location 3. rank, function, service នៅ nɨv 1. in, at ក្នុង knoŋ 1. in, inside 2. during + (time word) យើង yəəŋ 1. we 2. I (familiar) ឃើញ kʰəəɲ 1. to see, to perceive 2. to understand, to recognize 4. to come to a conclusion, realize, understand ក្រុម krom group, team សង្គ្រោះ sɑŋkrʊəh 1. to help, save, rescue 2. to resuscitate 3. to support 4. help, saving, support, assistance 5. to be included បឋម paʔtʰɑm 1. to be first, primary, initial 2. elementary 2. of, belonging to គ្រូពេទ្យ kruu pɛɛt medial doctor, medical practitioner Notes: irregular pronunciation: ពែត 2. like this/that 3. this/that much គាត់ koat 1. he/him/his 2. she/her 4. you/your (intimate) បាន baan 1. to have completed/done something 2. to intend to complete something 3. marker of completed action 6. to be able to 7. not ... until, then and only then 8. to pass to someone through inheritance 9. to be OK, fine, all right មកដល់ mɔɔk dɑl to arrive at, come to កន្លែង kɑnlaeŋ 1. place, location, region 2. clf. for locations កើត kaət 1. to be born, created 2. to be, become 3. to come into existence, arise, appear 4. to rise (of the sun) 5. to happen, occur 6. to give birth to 7. to have/suffer (from a disease), contract (an illness) 8. to be affected (by an emotion) 9. to succeed 10. to be possible 11. to be able 12. (the) east 13. eastern 14. period (or day) of the waxing moon (the days in the 15-day period between the new moon and the full moon) ហេតុ haet 1. cause, reason, motive 2. source, origin 3. because of, for the reason that ហើយ haǝy 1. to be finished, ended, completed 2. enough! 3. final particle indicating completed action, already, by now 5. and, afterwards, next, then, after that 4. to, toward 3. to examine, survey, inspect 4. to observe 5. to treat (medically) 6. to care for, take care of 7. to consider, regard 8. particle: come on, give it a try 9. let me see! បុរស boʔrɑh man, male person 2. alone 2. then មាន mien 1. to have, possess, own 2. to exist, there is, there are 3. to be rich, own property ពេទ្យ pɛɛt 1. medical doctor, physician 2. medical 3. hospital Notes: irregular pronunciation: ពែត ចំនួន cɑmnuən amount, number, quantity ពីរ pii, pɨl two នាក់ neak clf. for people 2. of/to/in/at which/whom 3. the fact/reason that ឯកសណ្ឋាន ʔaek sɑntʰaan uniform 2. to be well, in good health, recovered 3. to be effective (of medicines) គឺ kɨɨ 1. to be (equal to) 2. as follows, namely 2. to put on 3. to hang up, suspend, hang on អាវ ʔaav shirt, blouse, coat, upper garment sɑɑ color: white ខោ kʰao pants, trousers និង nɨŋ and ចងបូរ cɑɑŋ bou to tie with a ribbon, to tie a ribbon សញ្ញា saɲɲaa 1. sign, symbol 2. mark (e.g., punctuation) 3. signal, notice 4. to agree, give consent 5. to promise, give one's word Notes: see also សន្យា រូប ruup 1. image, picture, body, figure, shape, portrait, statue 2. clf. for respected people, monks, pictures, statues rɨɨ 1. or សញ្ញាបូក saɲɲaa bouk plus sign (+) លេខ leek 1. number, figure, numeral 2. writing, drawing, letter, mark 3. to write, to draw ពណ៌ poa color, complexion ក្រហម krɑhɑɑm color: red ដៃ day 1. arm, hand 2. handle, lever, crank 4. tendril 5. trunk (of an elephant) 6. sleeve 7. steering wheel 8. clf. for handfuls of young rice plants/grass 9. clf. for slaps 11. clf. for a bunch of 10 areca nuts ស្ដាំ sdam right, to the right, on the right Notes: ជើង ដ 2. towards ត្រួត truət 1. to check, to control, inspect, examine 2. to govern, be in charge of, supervise 3. to dominate 4. to place one on top of the other, stack (up) 5. to superimpose ពិនិត្យ piʔnɨt 1. to inspect, check, examine 2. to observe, investigate 3. to diagnose 4. to censor លើ ləə 1. up, on, over, above គ្រោះថ្នាក់ចរាចរណ៍ krʊək tnak cɑraacɑɑ 1. road accident 2. to have a road accident ផងដែរ pʰɑɑŋ dae also, too, as well ស្ទាប stiep 1. to feel, examine by touch, finger, caress, touch lightly 2. to reach 3. to test, try, probe នឹង nɨŋ future tense marker: will, about to 2. to erect, build, establish, create 3. to form 4. to levy/raise (e.g., troops) 5. to perform/celebrate (a ritual or ceremony) 6. to exalt 7. to rouse 8. to transport 9. to exhume, dig up 10. to postpone, adjourn, cancel 12. except, unless គ្រោះថ្នាក់ krʊək tnak 1. accident 2. danger, risk 3. to be dangerous ដាក់ dak 1. to put, place 2. to deposit 3. to add (ingredients) 4. to set (e.g., a trap) 5. to establish 6. to assign 7. to locate, settle, station 8. to lock up 9. to fasten 10. to use 11. to strike, hit hard 12. to affect 13. to subject someone to 14. to be hard hit, suffer a setback 15. to have bad luck, cause bad luck 17. to contract for 18. to subscribe to 19. to renounce (a throne) 20. to put aside (religious vows) 21. in, into, on 22. to eat, drink 23. to kneel ហ្វ្រង់កា frɑŋkaa stretcher, litter Notes: possibly also written ប្រង់កា នាំគ្នា noam knie 1. together 2. to go together, to invite someone to do something together 3. to agree together to do something សែង saeŋ 1. to carry (of two or more people, especially on a pole which rests on the shoulders, e.g., as a litter) 2. light, radiance, luster, brilliance, gleam, rays (of light) 3. [royal] weapon, arms ប៉ុន្តែ pontae but, however Notes: ជើង ត; root: តែ 2. depending on ប៉ះពាល់ pah poal 1. to touch 2. to affect, have an effect on 3. to violate, infringe on 4. to collide with ជើង cəəŋ 1. foot, leg 2. base, bottom 3. edge 4. subscript form of a Cambodian consonant 5. immediate vicinity 6. north {ខាងជើង = north} 7. way, path, trip 8. clf. for trips or occurrences 2. reflexive pronoun: myself, yourself, himself etc. ដោយសារតែ daoy saa tae because បោក baok 1. to beat (against a fixed object), smash, to slam, throw violently 2. to do the laundry, to wash clothes {បោកខោអាវ = to do the laundry, to wash clothes} 3. to launder, wash by beating 4. to overthrow 5. to throw oneself to the ground 6. to thresh 7. to cheat, dupe, swindle, trick ថ្នល់ tnɑl, knɑl raised road or path ខ្លាំង klaŋ 1. to be strong, vigorous 2. loud 3. firm, sturdy 4. serious 5. strongly, vigorously, exceedingly ពេក peek too, too much, too many ពេល peel 1. time 2. moment, instant, period of time ដួល duəl to fall, to fall over, to collapse ដូច្នេះ doucneh 1. so, thus, therefore 2. like this យ៉ាង yaaŋ 1. kind, type, way, manner 2. clf. for kinds, types ស្រែក sraek to shout, scream, cry (out), bawl, yell របួស rɔbuəh 1. to be injured, wounded 2. wound, injury 2. perseverance, effort, endeavour, diligence, zeal ថ្នម tnɑɑm 1. to treat with caution, touch lightly on (e.g., a sensitive topic) 2. to conserve, use sparingly, husband (resources) 3. carefully, gingerly, softly 4. to take care of, protect, cherish, treat with affection 5. to care for oneself, be careful 6. to pamper/spoil (a child) 2. don't let ... កាន់តែ kan tae more and more, further, becoming more and more, increasingly, continually ធ្ងន់ធ្ងរ tŋʊən tŋɔɔ 1. to be serious, grave, heavy 2. to be patient, perseverant 3. to endure, bear up well under hardship ងើប ŋəəp 1. to rise/get up 2. to lift/draw oneself up 3. to raise one's head 4. to come to the surface អត់ ʔɑt 1. no, not 2. to be without, lacking 3. to restrain oneself, abstain from 4. particle to form yes/no questions 3. already, then, after that 2. (of machines) to run ដោយ daoy 1. by, with, along 3. because ខ្លួនឯង kluən ʔaeŋ 1. oneself 2. personally, on one's own, by oneself ត្រូវ trəv 1. must, have to ប្រើប្រាស់ praə prah to use 2. at first, in the beginning ពី pii from, since, of, about, at ចូល coul 1. to enter, go in, penetrate 2. to approach 3. to reach 4. to begin, set in 6. to enter into, subscribe to, contribute to 7. to take in (as revenue) 8. to mate (of animals) 9. to go into a trance (of a medium) 10. to possess (as a spirit possesses a medium) 11. to agree with ឡានពេទ្យ laan pɛɛt ambulance Notes: irregular pronunciation: ពែត
Collection of various ailments often associated with high blood glucose level is known as Diabetes mellitus. Mainly because the glands fail to secrete and produce insulin or sometimes the insulin is not effective on cells. Polydipsia, polyphagia, polyuria are the most common indications of Diabetes mellitus. It's commonly divided in to two categories Insulin dependent diabetes mellitus/juvenile diabetes/type 1 diabetes in this type body fails to produce insulin and body needs foreign insulin affects mostly youngsters and children body fails to recognize its own cells from the pancreas known as islets cells. Non insulin independent diabetes mellitus/ adult onset/ type 2 diabetes in this type the body develops resistance against insulin so even if insulin produced it wouldn't help the body to maintain glucose level affects the elderly, weak, obese and mature people. After the discovery of insulin in 1921 diabetes is treatable but not curable, however diabetes mellitus type 1 had been tried to be cured by pancreas transplant. Outcomes of diabetes are high blood pressure; degeneracy of organs, cardiac failures, renal failures, paralysis, obesity etc. 2.8% of the world population suffers from diabetes according to a survey made in 2000. Every year the number of people that die by diabetes is greater than the sum of number of people dying from both breast cancer and AIDS. Diabetes Treatment • Curative treatment for diabetes include pancreas transplant. Anti-diabetic medicines such as metformin, sulfonylurea, Byetta (replica of human incretin hormone), Pargluva etc are given to control diabetes; insulin treatment is done for lowering blood glucose level, insulin intake at regular intervals is must for the insulin therapy as the body can't produce its own insulin so foreign insulin is given to the body. • Recently doctors attempted to cure diabetes by incorporating diabetics with cells from islets, pancreatic cells that produce insulin are known as islets. To make this treatment successful immunosuppressant therapy is done to inhibit the cells from rejecting the islets cells, the immunosuppressant steroids require high level of insulin the islet cells will eventually fatigue producing no more insulin for the body and the body comes back to the original diseased situation. Islets transplants carried out up till now have however proved to be successful. • Pancreatic transplant is done to the patients suffering from diabetes type 1, this whole organ transplant requires strong drug treatment to prevent the immune system from rejecting organ transplant but those drugs have very false effects on the body on higher alarming level than diabetes. So carry organ transplant is only done in those patients who suffer from renal failure because these strong drugs have to be given in renal transplant so side effects can't be avoided. Moreover the number of diabetics in the world is increasing day by day so the transplant donors are limited. Hence this therapy can't be carried out on large scale. • Scientists are thinking of using stem cell therapy to cure diabetes, as stem cells can be used to produce any kinds of cells as they reproduce themselves, automated reproduction. But the question arise which cells to be produced? Whether to produce beta cells only or islets cell too. Studies show that beta cells are less responsive to the glucose changes in the body so alone none of the cells show positive feedback. Scientists think that if all of these cells can be cultured it will be a breakthrough in the treatment of diabetes. • Foetal cells may be used in future to produce islets cells as they have purified pancreas high level of insulin and best mechanism so it'll be easier to graft them and produce islets cells as they reproduce at fast pace. However scientists found it as practically unaccomplished task to culture the progenitor cells of islets in culture. • Insulin inhalers are most recent breakthrough in the treatment of diabetes, it'll deliver insulin in powder form but there's a risk for patients to develop asthma. AAA is also another treatment for diabetes. • Vaccines for diabetes type 1 are also under study hopefully in future we'll vaccine for diabetes with the advancement in therapeutic biology. Stem cell therapy, organ transplant, vaccines, use of foetal cells for the production of islets cells, inhalers, anti-diabetics and many more therapeutics will be available for the prevention, cure and treatment of diabetes to lower the blood glucose level. Biology is a marvellous and vast subject and researchers are researching day and night to find a way out of diabetes as it's the world's 7th death causing disease. About Author / Additional Info: An enthusiastic writer
Permanent Impact Of The Counter-Culture On Today's American Society 1910 Words 8 Pages The development of the counter-culture in the 1960's actually did have a lasting effect on American society in certain ways such as, alteration in family or society values, a considerable increase in using drugs, alcohol in earlier ages, more free casual sex, politics and opposition to the war even though today that has decreased throughout the nation. The whole conservative American society and family ideas of the 1950's were changed by the hippies with the growth of the counter-culture. Although the adults of 1960's were mostly conventional, moderate, concerned about money, the hippies did not worry about any of those values. Many of them did not care about working, religion or saving their virginities until they were married. They were all laid-back, carefree about all these things their families wanted. They thought that there was more out there than getting a job and a family. The majority of the hippies left their families and homes and yet they all had different reasons. Most of them did not agree with their families' ideas, some just wanted to get away and some were outsiders anyway so they just fit in with the hippie generation (Hollis). They escaped from the society and its values and wanted to create a new one. As a hipster wrote in 1969, "We are in America, but we are no longer a part of it" Related Documents
Monday, July 29, 2019 Definitions and Abreviations After popular demand, here are common abbreviations and definitions I will add more : 504- A plan of accommodations for a child that does not qualify for an IEP . ABA- Applied Behavior Analysis. This is the toxic dog training that parents are seeking so their child appears not autistic for the convenience of the parent. It is very toxic for the autistic. Causes PTSD Ableism- the act of being discriminatory against anyone with a disability ADHD- Attention Deficit Disorder ASD- Autism Spectrum disorder. This is the medical definition. Autistics never use this acronym. This is just so you are aware ASC- Autism Spectrum condition. How most autistics refer to their condition Allistic- anyone who is not autistic AT- art therapy BCBA- ABA therapist ie child abuser CBT- Cognative behavior therapy. A type of psychotherapy in which negative patterns of thought about the self and the world are challenged in order to alter unwanted behavior patterns or treat mood disorders such as depression. Complex post-traumatic stress disorder (CPTSD) is a trauma-related mental health condition that results from sustained abuse and powerlessness over time. CPTSD is related to but different from post-traumatic stress disorder (PTSD). Dyscalculia- a math learning disability. Kids may have trouble identifying smaller and larger. Dyspraxia- developemental coordination disorder which is a condition affecting physical co-ordination that causes a child to perform less well than expected in daily activities for his or her age, and appear to move clumsily. Ehlers-Danlos syndrome (EDS) is a disease that weakens the connective tissues of your body. These are things like tendons and ligaments that hold parts of your body together. EDS can make your joints loose and your skin thin and easily bruised. It also can weaken blood vessels and organs Hippotherapy -horseback therapy (I highly recommend) IEP- Individual Education Plan.  LD- learning disability. Learning disability in the UK is Intellectual disability in the US. In the US learning disability is something like dyslexia, ADHD, etc. Meltdown- when sensory stimuli become too much to bear and you lose control. It is a very scary thing. It cannot be helped, it is not a tantrum, it cannot be helped MT- music therapy Neurotypical- anyone without a neurological difference. Autistic, ADHD, dyslexic, etc. OCD- Obsessive compulsive disorder. It is when there are certian situations that the person is fixated on and it must be perfect. My son and husband have this. My husband must have the house perfect and my son must have his school work perfect. It can be truely debilitating OT- occupational therapy Pathological Demand Avoidance (PDA) is a condition which is part of the autism spectrum, and is characterised by an overwhelming need to avoid or resist demands. This information sheet provides some behavioural strategies to support a person with PDA. PT- Physical therapy SLP- Speech Language Pathologist also known as Speech Therapists Shutdown- when an autistic is overwhelmed, they completely shut down. Your brain cannot process any sensory stimuli. You do not see, hear or feel anything and they can be very scary. Stimming- Self stimulating behavior. This is hand flapping, singing, looking at bright photos, touching textured objects, etc. It is used to counter act sensory processing. No comments: Post a Comment
Power Connectors Information 10A Argentina In-line ConnectorPower connectors are female power connectors into which plugs or male connectors are inserted to make circuit connections. They transfer alternating current (AC) or direct current (DC) through a variety of electronic devices. Several types of power connectors are available. Plug/inlet- Plugs are male connectors which consist of the socket contacts. They connect to electrical receptacles, wall outlets, or sockets and draw current from these female connectors. Receptacles/ outlets are also called jacks. They are the female or receiving connectors which mate to the male (plug) connectors. Power entry modules serve as switches, fuses, or filters. Others serve as circuit breakers or indicator lights. They mount on the case or panel of a machine and attach to the power cord. Important specifications for power connectors include: Power connectors provide maximum voltage and maximum current ratings. Typically, devices are designed for either single-phase or three-phase power. Maximum voltage ratings include 125, 250, 277, 347, 480, and 600 V. There are two maximum voltage ratings for 4-pole, 4-wire and 4-pole, 5-wire devices: 120/208 V and 277/480V. Voltage ratings for 3-pole, 4-wire electrical devices include 125/250 V. Voltage ratings for 4-pole, 5-wire devices include 347/600 V. Power connectors provide a variety of maximum current ratings, including 15, 20, 30, 50, 60, and 100 A. International current ratings include 16, 32, and 125 A. Number of poles- Poles control one path of the circuit. A pole is an outlet terminal for a switching device, a combination of mating contacts, or both. Typically, power connectors have between one and five poles. Grounding is the term used to describe a safe path for electricity to move from a defective outlet, fixture, appliance or tool back into the earth, which is a very good electrical conductor. There are different grounding options available based on the needs of the system. These include, Non-grounding connectors do not have a ground option. Standard grounding devices have a standard embedded ground terminal Isolated grounding devices use a ground path that is isolated from the facility's grounding systems. This increases the resistance of sensitive electronics to surges. They also provide a clear grounding path to the service panel and help reduce electromagnetic noise that can interfere with equipment operation. Self-grounding connectors establish a connection to en existing grounding path such as a metal wiring device or metal conduit, gas or water pipe, or ducting or structural steel. Ground fault circuit interrupter (GFCI) connectors include a built-in circuit that detects leakage current to ground on the load side of the device. When leakage current is detected, GFCI interrupts power and prevents hazardous ground fault conditions. National Electric Code NFPA-70 requires GFCI use in many indoor and outdoor locations. There are several mounting styles for power connectors. Standard DIN rail or fit the ends of electrical cables. Panel mounted devices fit a depression within a panel so that they are flush or nearly flush with the surface. Flange mounted devices attach by bolting the flange or riveting it in place through holes in the flange surface. Wall or box mounted electrical receptacles include an accessory such as a back shell for permanent mountings. Through hole technology (THT) mounts electrical receptacles on a printed circuit board (PCB) by inserting component leads through holes in the board and then soldering the leads in place on the opposite side of the board.  Terminals are devices that terminate a conductor. They attach to posts, studs, or other conductors in order to establish an electrical connection. There are several options including, • Cage clamp- Electrical connections are made using a cage clamp. • Crimp- Crimp is the physical compression (deformation) of a contact wire barrel around a conductor to make an electrical and mechanical connection to the conductor. • Insulation displacement connectors (ICD)- slice through cable insulation to make a connection. Forcing an insulated conductor into a restrictive slot in the connection part of the contact displaces the insulation so that the bare wire engages the sides of the slot. IDCs are mass termination connectors for flat cables and eliminate the need to strip insulation. • PCB solder- Electrical connection is made by soldering wires onto a printed circuit board (PCB). • Screw- Electrical connections are made using screws. • Lugs- Electrical connections are made using lugs. • Solder cup or solder- Solder cups are terminal ends or contacts into which conductors are inserted before soldering. A metal or metallic alloy is used to join metal surfaces together. Normally, a 60-40 rosin core (60% tin and 40% lead) is used for soldering electronic assemblies. Soldering is a wet process. • Tabs- Electrical connections are made through quick connect tabs. • Wire wrap- Electrical connections are made by wrapping a stripped or unstripped solid wire around a terminal post that contains a series of sharp edges. This solderless process requires a special wrapping tool. Power plugs have several features available that may be beneficial for user application. Corrosion resistant- Corrosion resistant devices are made of special materials and/or plated metal parts that are designed to withstand corrosive environments. Corrosion resistant devices must pass the ASTM B117-13 five-hundred hours Salt Spray (Fog) Test with no visible corrosion. Dust proof- Devices are designed so that dust will not interfere with their operation. The IP suitability rating describes the degree of protection that a device offers against the ingress of foreign objects (e.g., IP 20). Power light- Devices include a power light to indicate if they are live. The receptacle may also be illuminated to make connection easier in dim or dark work spaces. Tamper resistant- Devices are constructed so that access to their energized contacts is limited. Tamper resistant receptacles are required by the National Electric Code NFPA-70 in specific pediatric care areas in health care facilities. Watertight- Devices are constructed so that water cannot enter under specified test conditions. The IP Suitability Rating designates the degree of protection a device offers against the ingress of moisture and water (e.g., IP-55, IP-44). Some devices may also be approved for moisture resistant, and under water applications. Quick connect / disconnect- Connectors incorporate a quick-connect mating geometry, typically by twisting and seating for positive contact. They can be disconnected quickly and then easily connected to another machine or device. Integral features are built into the design of the power plug. • Fuse protection- Devices include integral fuse protection against mild to moderate spikes or peaks in electrical supply. The fuse will blow before connector is damaged. • Integral surge protection- Devices include integral surge protection against mild to moderate spikes or peaks in electrical supply. • Integral circuit breaker- Devices include an integrated circuit breaker that will "trip", severing the connection to the electrical supply, in the event of an excessive power transfer. • Integral switch- Devices are equipped with an integral switch. Toggling the switch to the "off" position stops the electrical power transfer through the connector. • Integrated filter- Devices provide protection against unwanted signals or magnetics and may provide signal conditioning or isolation. Typically, filters are designed to reduce electromagnetic interference (EMI) and radio frequency (RFI). Specialized power plugs are used for specific types of instruments, equipment, machinery, and computers. Some electrical connectors are designed for use in hazardous environments or marine environments. Power plugs are used in almost every industry including residential, commercial, industrial, and medical facilities. Power connectors are designed to meet requirements from the following organizations: • National Electrical Manufacturers Association (NEMA) - NEMA sets standards for electrical cabling and connectors. • Institute of Electrical and Electronic Engineers (IEEE) - IEEE is a worldwide organization who develops standards in many areas related to electrical and electronics. • The International Electrotechnical Commission (IEC) - IEC is a worldwide body responsible for developing consensus global standards in the electrotechnical field. • Consortium for Energy Efficiency (CEE) - CEE is a European organization for electrical standards. • Japanese Industrial Standards (JIS) - JIS is a Japanese organization for electrical standards. There are many organizations across the world that determine and maintain electrical standards to ensure safe and efficient use of power plugs. Engineering360 allows users to search by country to ensure they select a power connector that can be safely incorporated into their system. Power Connector Tutorial Electrical Current Abroad Read user Insights about Power Connectors
Eyewitness at Eureka Anthony Fyson reads a letter from his great-grandfather, who as a young man was caught up in the Eureka Stockade, where gold-miners in Ballarat, Victoria, famously clashed with state troops, 150 years ago this month. Eureka Stockade Riot. J. B. Henderson (1854) watercolourIn December 1854, growing tension between the government of Victoria and the thousands who had flocked to the gold-fields near Melbourne over the previous three years flared into armed insurrection. Provoked by corrupt and insensitive policing, and harbouring long-standing grievances about extortionate mining licence fees and a restrictive system of land ownership, hundreds of miners burnt their permits and built a makeshift defensive stockade on the Eureka gold lead at Ballarat. The British colonial administration responded with overwhelming force. A brief but bloody assault led to some hundred casualties, including a likely total of thirty-five dead miners, in an act of repression commemorated in Australia to this day. Here is a contemporary account of what happened written by one miner, Alfred Madocks from Ipswich. Buy Online Access  Buy Print & Archive Subscription Please email digital@historytoday.com if you have any problems.
What does it do? Gets the number of working days between two dates Formula breakdown: =NETWORKDAYS(start_date, end_date, [holidays]) What it means: =NETWORKDAYS(starting date, ending date, [holidays to exclude]) If you want to calculate the number of working days, it is very difficult to do by hand! Imagine going through your calendar and counting the weekdays week per week. Thankfully there is Excel’s NETWORKDAYS Formula! The NETWORKDAYS Formula will exclude the weekends in the count, and you can also provide it a list of holidays for it to exclude as well in the count! Let us try out in our example below from January 1, 2018 to January 28, 2018, for these 4 weeks it should be a total of 20 working days. Let us add in 3 holidays during this period, so that total working days will be reduced to 17 working days. I explain how you can do this below: STEP 1: We need to enter the NETWORKDAYS function in a blank cell: NETWORKDAYS Formula in Excel STEP 2: The NETWORKDAYS arguments: What is the start date? Select the cell containing the starting date: NETWORKDAYS Formula in Excel What is the end date? Select the cell containing the ending date: NETWORKDAYS Formula in Excel Any holidays that you want to be excluded from the total count? Select the range of cells containing your holidays. Ensure to press F4 to make your cell reference absolute: =NETWORKDAYS(C9, D9, $A$9:$A$11) NETWORKDAYS Formula in Excel NETWORKDAYS Formula in Excel You now have the number of working days and the holidays are excluded! NETWORKDAYS Formula in Excel How to Use the NETWORKDAYS Formula in Excel Pin on Pinterest Share on Facebook Tweet about this on Twitter Share on LinkedIn
Chapter 12. 40 Gigabit Ethernet The development of a new Ethernet system that operates faster than 10 Gb/s began with a Higher Speed Study Group “Call For Interest” meeting in July 2006. In response, an IEEE task force was formed to develop a 100 Gb/s Ethernet system in the 802.3ba supplement. This effort was then expanded to include 40 Gb/s Ethernet, and the combined 40 and 100 Gb/s 802.3ba supplement was completed and published in 2010. The 40 and 100 Gb/s specifications were adopted into the standard as Clauses 80 through 89. It’s unusual for a new Ethernet media system to operate at a speed other than 10x faster than the previous standard. However, the 40 Gb/s speed was added to the 100 Gb/s standards effort to address a concern about the adoption rates for Ethernet technology. Early in the standardization process, a presentation was made to the 802.3ba task force to lobby for the addition of 40 Gb/s. The core of the argument was that while a 10x evolution in speed had worked well for the older 10 Mb/s, 100 Mb/s, and 1 Gb/s Ethernet systems, the data showed that the adoption rate for the 10 Gb/s system had been much slower than for previous systems. The major reason given for the slower adoption rate was that servers had not been able to support the 10 Gb/s speed for several years after the standard was first developed, leaving only a relatively low-volume market of switch-to-switch interconnections for vendors to sell into. When it came to developing a new 100 Gb/s Ethernet standard, ... Get Ethernet: The Definitive Guide, 2nd Edition now with O’Reilly online learning.
Coccyx Pain Summary Coccygodynia is a painful disorder characterised by coccygeal pain typically exaggerated by pressure. It remains an enigma because of the perceived unpredictability of the origin of the pain, psychological traits that may be associated with the disorder, the presence of diverse treatment options, and varied outcomes. Most cases can be managed conservatively, though injection treatments may help some patients with refractory pain. Procedures offered for Coccyx Pain The coccyx is a triangular bone consisting of three to five segments: the first and largest of these vertebral segments articulates with the sacrum. The last three segments diminish in size and usually form a single piece of bone. The disc spaces in this region are extremely variable. Intact discs, discs with extensive clefts, discs with cystic or fibrocystic changes and discs replaced by synovial joints have all been reported. Coccygeal pain may arise either from the coccyx itself or may be referred to the coccyx from surrounding structures, or it may be neurogenic in origin, arising from the nerve roots, plexus or peripheral nerves that travel to or through the coccyx. The most common cause of coccydynia is single direct axial trauma such as a fall directly onto the coccyx or, as during the post-partum period, due to a subtle form of cumulative trauma that occurs due to sitting awkwardly. Raised body mass index is a risk factor for the development of both idiopathic and posttraumatic coccydynia. Owing to the presence of discs or disc-like structures in gross anatomical specimens, a degenerative cause of pain has been considered. Women are five times more commonly affected than men. The main symptom is tenderness and pain, or an ache localised in the region of the lower sacrum, the coccyx, or in the adjacent muscles and soft tissues. The patient usually points to the coccyx as the site of pain. The severity of the pain is dependent on various predisposing factors, such as the duration of time spent sitting. Dyspareunia and piriformis syndrome have been infrequently associated with coccydynia. The character of the pain appears to be more related to spasm of the levator muscle, as patients complain of pain during defecation or sexual intercourse. Coccydynia is a dynamic disorder and hence static scans are unlikely to be helpful. Conservative treatment remains the mainstay of treatment. The spectrum of treatment ranges from simple measures such as the use of laxatives, non-steroidal anti-inflammatory drugs, hot baths, ring-shaped cushions, ergonomic adaptations to physical therapy, manipulation, sacrococcygeal injections, ganglion impar blocks, psychotherapy and coccygectomy (partial or complete). Conservative management is successful in approximately 90% of patients. Pericoccygeal linjections with local anaesthetic and steroids can be helpful although there is no clear consensus in the literature regarding the site of injection. Coccyx injection Injection of local anaesthetic and steroid can be helpful in patients who do not respond to conservative management. The injection is performed under fluoroscopy or ultrasound guidance to target the sacrococcygeal junction as well as the tip of the coccyx. Caudal epidural injections Caudal epidural injections can be considered in patients who do not respond to injections around the coccyx or if they get only short term pain relief from coccyx injections. Ganglion impar block Ganglion impar block can be performed in patients who fail to respond to coccyx injections and caudal epidural injections • Confirmation of diagnosis based on history and clinical examination • Rehabilitation (Physiotherapy) Have a question about Coccyx Pain? Or would like to book in with us?
underpinning contractor What is Underpinning? Methods and Benefits of Underpinning Foundations Underpinning is a way of repairing and enhancing the toughness of structural foundations. There come the occasions where a little flak in the entire foundation or footing occurs all of the sudden post completion of the entire structure. Here it includes both substructures, as well as the superstructure. When unexpected occasions appear, a curative approach is felt essential to be applied to gain back the stability of the entire unit. Underpinning holds a lot of significance because it is useful in terms of boosting the strength of the foundation of an already established structure or anything else that has been already established. Various strategies are involved in it, including the installation of constant or provisional support to an already available foundation. This is meant to provide the extra depth and to enhance the bearing ability of the same. Selecting the Underpinning Methods:- Underpinning methods can be chosen by the tenure of structure and the nature of the works associated. Types of structures by its age 1. Antique Structures, the age of which is more than 150 years. 2. Latest Structures, those are between 50 - 150 years of age. 3. Contemporary Structure, where the age is less than 50 years. Various kinds of tasks for going with underpinning methods 👷  Alteration Works Here the entire structure has to be turned for altogether different functionality that demands tougher foundation in comparison to the present. 👷  Safety - related Works The issues as given below of a structure should go for protection works: 1. In the case of the present foundation is not strong. 2. Digs around affecting the soil that accompanies the available footing. 3. Establishing the foundation of the soil to resist natural calamities. 4. Where basement is needed under the presently available structure. 👷  Residual Works 1. Flaws with the available foundation design occurring due to subsidence of the establishment. 2. Need for working with the available structure rather than developing a fresh. 👷 State of structures which Requires Underpinning Various factors make it essential to go for underpinning method for the establishment of the substructure, such as - 1. The deprivation of timber piles made use of for a foundation for usual buildings would result in the establishment. This dilapidation of the structure occurs mostly fluctuations in the water table. 2. Growth and minimizing the water table can lead towards lowering the withstanding ability of soil ensuring the stability of the structure. 3. Models that are developed over the soil with a bearing capacity not convenient for those would ensure settlement. 👷   Demand for Underpinning While going for underpinning, one needs to observe the entire unit thoroughly. In case of available structures beginning to exhibit specific variations through settlement or any of the issues, it is essential to establish vertical level readings along with those at the offset level, in a consistent fashion. The required time is reliant upon the state of settlement. Now, before the dig for a fresh unit, engineers have to thoroughly observe and make sure that the ability of the soil to resist the structure. By the report thus generated, the decision regarding underpinning is taken. On some occasions, such a test refrain the need for underpinning once the whole structure is developed. 👷  Advantages of the Underpinning System The process of underpinning the foundation ensures that the structure is available to be inspected. It provides the accession for needful enhancements as well, whenever it is felt essential. Because underpinning is mostly needed for the antique homes, the existing set of plumbing and electrical units are changed with fresh sets. Moreover, it provides the owner with a fresh concrete floor. Ultimately, it ensures enduring energy saving, protection, and accomplishment for the whole unit. Underpinning incredibly indeed boosts the utility of the underground space, up to half of the existing room within the structure. Ultimately, it can be concluded that underpinning provides the utmost level strength to the existing structure. It also provides needful stability to the available foundation. It avoids any kind of safety threats. All that it needs is to make the entire unit get thoroughly inspected by a certified professional. Only if it involves safety threats, underpinning should be gone through.
Battle of Guilford Courthouse Battle Summary Name:Battle of Guilford CourthouseTotal Forces:45002100 Location:Greensboro, North CarolinaWounded:185413 Duration (days):1Captured:10 Victory:BritishTotal Ships: Col./Ally Cmdr.:Nathanael GreeneShips Lost: Brit./Ally Cmdr.:Charles CornwallisShips Captured: The Battle of Guilford Court House was a battle fought on March 15, 1781 in Greensboro, the county seat of Guilford County, North Carolina, during the American Revolutionary War. A 2,100-man British force under the command of Lieutenant General Charles Cornwallis defeated Major General Nathanael Greene’s 4,500 Americans. The British Army, however, sustained such heavy casualties that the result was a strategic victory for the Americans. The battle is commemorated at Guilford Courthouse National Military Park. Following the Battle of Cowpens in South Carolina, Lt. General Charles Cornwallis was determined to destroy Greene’s army. But the loss of his light infantry at Cowpens led him to burn his supplies so that his army would be nimble enough for pursuit. He chased Greene in the “Race to the Dan”, but Greene escaped across the flooded Dan River to safety in Virginia. Cornwallis established camp at Hillsborough, foraged for supplies and recruited North Carolina Tories. However, the bedraggled state of his army and Pyle’s massacre deterred Loyalists from turning out. Due to the fighting, thousands of slaves had escaped from plantations in South Carolina and other southern states, many joining the British to fight for their personal freedom. In the waning months of the war, the British evacuated more than 3,000 freedmen to Nova Scotia, with others going to London and Jamaica. Northern slaves escaped to the British lines in occupied cities such as New York. The advance guard met near the Quaker New Garden Meeting House. Dragoons from Banastre Tarleton’s British Legion were briefly engaged by Light Horse Harry Lee’s Dragoons about 4 miles (6 km) from the Guilford Court House. The British 23rd Regiment of Foot sent reinforcements forward and Lee withdrew, ordering a retreat to Greene’s main body. The 71st Regiment, grenadiers and 2nd Guards moved up the center, following the musket shots from the 33rd and 23rd regiments to their left. To the right, the 1st Guards and Hessians were being harried by Lee’s Legion. The British guns and Tarleton’s light dragoons moved forward along the road, keeping pace. The 2nd Guards in the centre found themselves coming out into open ground around the court house to the left of the Salisbury road. They spotted a large force of Continental infantry, and immediately attacked them and captured two six-pounders. They then pursued the Continentals into the wood and were repulsed by Lt. Col. William Washington’s light dragoons, and the 1st Maryland Regiment, abandoning the two guns they had just captured. Lieutenant John Macleod, in command of two British three-pounders, had just arrived and was directed by Cornwallis to fire on the Dragoons and the British alike. The battle had lasted only ninety minutes, and although the British technically defeated the American force, they lost over a quarter of their own men. The British, by taking ground with their accustomed tenacity when engaged with superior numbers, were tactically victors. Seeing this as a classic Pyrrhic victory, British Whig Party leader and war critic Charles James Fox echoed Plutarch’s famous words by saying, “Another such victory would ruin the British Army!” In a letter to Lord George Germain, delivered by his aide-de-camp, Captain Broderick, Cornwallis commented: “From our observation, and the best accounts we could procure, we did not doubt but the strength of the enemy exceeded 7,000 men… I cannot ascertain the loss of the enemy, but it must have been considerable; between 200 and 300 dead were left on the field of battle…. many of their wounded escaped…. Our forage parties have reported to me that houses in a circle six to eight miles around us are full of others…. We took few prisoners”. After the battle, the British were spread across a large expanse of woodland without food and shelter, and during the night torrential rains started. Fifty of the wounded died before sunrise. Had the British followed the retreating Americans they might have come across their baggage and supply wagons, which had been left where the Americans had camped on the west of the Salisbury road prior to the battle. On March 17, two days after the battle, Cornwallis reported his casualties as 5 officers and 88 other ranks killed and 24 officers and 389 other ranks wounded, with a further 26 men missing in action. Webster was wounded during the battle, and he died a fortnight later. Lieutenant-Colonel Tarleton, commander of the loyalist provincial British Legion was another notable wounded officer, losing two fingers after taking a bullet in his right hand. Greene reported his casualties as 57 killed, 111 wounded and 161 missing for the Continental troops and 22 killed, 74 wounded and 885 missing for the militia: a total of 79 killed, 185 wounded and 1,046 missing. Of those reported missing, 75 were wounded men who were captured by the British. When Cornwallis resumed his march, these 75 wounded prisoners were left behind at Cross Creek, Cornwallis having earlier left 70 of his own most severely wounded men at the Quaker settlement of New Garden near Snow Camp. At Wilmington, the British general faced a serious problem. Instead of remaining in North Carolina, he determined to march into Virginia, justifying the move on the ground that until Virginia was reduced, he could not firmly hold the more southerly states he had just overrun. General Clinton sharply criticized the decision as unmilitary, and as having been made contrary to his instructions. To Cornwallis, he wrote in May: “Had you intimated the probability of your intention, I should certainly have endeavoured to stop you, as I did then as well as now consider such a move likely to be dangerous to our interests in the Southern Colonies.” For three months, Cornwallis raided every farm or plantation he came across, from which he took hundreds of horses for his Dragoons. He converted another 700 infantry to mounted duties. During these raids, he freed thousands of slaves, of whom 12,000 joined his own force. General Greene boldly pushed down towards Camden and Charleston, South Carolina, with a view to drawing his antagonist after him to the points where he was the year before, as well as to driving back Lord Rawdon, whom Cornwallis had left in that field. In his main object—the recovery of the southern states—Greene succeeded by the close of the year, but not without hard fighting and repeated reverses. “We fight, get beat, rise, and fight again,” were his words. Three current Army National Guard units (116th IN, 175th IN and 198th SIG) are derived from American units that participated in the Battle of Guilford Courthouse. There are only thirty Army National Guard and active Regular Army units with lineages that go back to the colonial era. ===In popular culture=== * In the 2000 historical epic The Patriot, the final battle was inspired by the battles of Cowpens and Guilford Courthouse. The Americans used the same tactics in both battles. In the film, the name of the battle, as well as the winning side, was taken from the Cowpens battle. The sizes of the armies, as well as their being led by generals Greene and Cornwallis, come from the Guilford Courthouse battle. The scene where Cornwallis orders his artillery to “concentrate on the center,” during which they killed both Continentals and his own troops, took place at Guilford Courthouse.
Topbar Menu EN The Sustainable Development Goals Fund (SDG Fund) is an international multi-donor and multi-agency development mechanism created in 2014 by the United Nations to support sustainable development activities through integrated and multidimensional joint programmes. Its main objective is to bring together UN agencies, national governments, academia, civil society and business to address the challenges of poverty, promote the 2030 Agenda for Sustainable Development and achieve SDGs. Convening public-private partnerships for SDGs is in the SDG Fund’s DNA. As an inter-agency mechanism, the SDG Fund works across the UN system, currently with 14 agencies, implementing joint programmes around the globe. The government of Spain made the initial contribution to establish the fund, and more than 20 donors have donated since. The SDG Fund is supporting joint programmes in 23 countries with an approximately US $70 million budget. National and international partners, including the private sector, provide approximately 58% of the resources through matching funds. Each joint programme contributes to the achievement of several SDGs. The SDG Fund is the first UN development cooperation mechanism specifically established to implement the 2030 Agenda. Here you can see how the SDG Fund is contributing to each SDG.
Bladder Control Problems What causes bladder control problems? Urinary continence is all about being able to control the storing and passing of urine. As bladder control relies on the complex coordination of many nerve pathways and muscles, there is potential for things to go wrong. When this control is lost, it can lead to incontinence. There are a number of common causes of bladder control problems, some leading to temporary types of urinary incontinence and others to a longer term issue. To learn more about the different types of incontinence mentioned below, visit our page about incontinence diagnosis. CauseCommonly associated bladder control issue Neurological conditions such as Multiple Sclerosis, Parkinson’s disease, stroke, Spina Bifida or spinal cord injury can make people susceptible to many different types of bladder control problems, due to disturbed messages between their brain and bladder.All types of incontinence Pregnancy and childbirth - e.g. damage during vaginal labour, or pressure on the bladder from the growing babyStress incontinence Surgical damage - common during hysterectomy or prostate gland removal surgeriesStress incontinence, Overflow incontinence Connective tissue disorders – such as Ehlers-Danlos syndromeStress incontinence Some medications, particularly anti depressants, sedatives and diureticsAll types of incontinence Poor fluid intake - either insufficient amounts, or drinking too much alcohol / caffeineUrge incontinence Urinary Tract Infections (UTIs) and other conditions affecting the bladder and urethra e.g. tumoursUrge incontinence Bladder obstruction or blockage - e.g. from bladder stones or severe constipationOverflow incontinence, Urge incontinence Incomplete emptying - sometimes due to spinal injury, other nerve damage or certain medicationsOverflow incontinence Join The SecuriCare Service Today For ongoing support, product advice & home delivery Join Securicare Enter your email address to join our email list Message Sent
Immunity is essential for all beings populating our earth and it is the foundation for all sorts of performances. If you are ill all available energy is first of all dedicated to healing and re-balancing the organism. This does not only apply to humans but to all earthly beings. Whether you look at plants, insects, birds or mammals they all express the property of immunity. Natural science with its experimental results can underline the assumption made, as researchers identified the same receptors of innate immunity all the way through from plants and invertebrates to humans. These molecules have been conserved genetically over thousands and thousands of years and recognize the huge space of distinct forms of essential molecular patterns we live with in our inside and outside world. This knowledge may entitle me to conclude that there is no life without immunity. This is the text of the above video podcast. Enjoy listening! Since three decades biology and its complexity relations are my passion. Making the invisible in somehow visible using uncommon means, is great fun, I love it. Cells moves through membranes Immune cells have the property to move around, they never sit still. They migrate to the place where they are needed. For this reason all of them send out and receive a variety of signals. They know how to interpret the signal patterns if nothing goes wrong and change their functional state accordingly. For example in the case of an acute inflammation immune cell wander through vessel walls to reach the injured aera for the sake of initiating the healing process. The image does not show the process of migration through a vessel membrane, it is not made by an electron microscope. The form you see is created by the asphalt on the roed exposed to the season's temperature fluctuations. The cell Cells have a nucleus containing lots of DNA, be it useful or chunk. The cytoplasm is crammed with tiny bodies which are necessary to keep the cell alive, to guaratuee its replication, its specific function and its communication with its surrounding. The image is lichen growing into a wall out of stone.  Borders are delicate areas An equlibrium of exchange, communication and protection has to be maintained along all borders. This applies to all species, to all living beings. The immunity is a body state - if working smoothly - has a great share caring for the integrity of the borders within the organism.  What you see on this picture is the part of a with asphalt tinkered stony road. Between the wall and the asphalt is a crack where tender plants grow towards the sun light. These are a few examples that want to illustrate what I  mean by metaphoric physiology. The term is an invention of mine. It occrrued to me on my many outside runs and walks with my dogs. The similarities between the microcosm of the living and the matter for me is just stunning. I think the topic is worth this project. It is exciting to discover the realm of forms.
Professor Lewis Dartnell, Professor in Science Communication, was quoted in Metro on space colonisation and the possibility of a first off-planet colony as an alternative to Earth.  Lewis Dartnell Some experts, predicting that humanity may face a civilisation-threatening disaster in the next century, suggest that the creation of the first off-planet permanent colony could be the alternative.  In an interview with Metro, Professor Lewis Dartnell commented on this possibility: “In the next 100 years, it’s very feasible we will have a self-sustaining colony on the Moon or Mars. These could then keep themselves going and serve as a sort of ‘backup file’ if we suffered some sort of apocalypse event here on Earth.” He explained why Mars could be the best location for a space colonisation and said: “There’s much more stuff you can use there [than on the Moon]. Nasa is very keen on what’s called ‘In Situ Resource Utilisation’ which basically means using the stuff you’ve got up there. So, they would send astronauts up with basic infrastructure and then use Martian regolith to build things.”  He added: “They would also thaw out the subsurface ice to create water on the planet. Mars is more likely a destination because there’s more you can use – the Moon is closer but it’s that much more barren. Bear in mind that Elon Musk is already talking, very credibly, about the first human missions to mars taking place in the next ten years.” Read the full piece on Metro Online.  Press and media enquiries Contact us on: +44 (0)7970 483 778 [email protected]
Glanum Dam Glanum Dam Glanum Dam Glanum Dam is located in France Glanum Dam Location of Glanum Dam Location Glanum (Saint-Rémy-de-Provence), Bouches-du-Rhône, France Opening date 1st century BC Dam and spillways Impounds Vallon de Baume Height 12 m Length 18 m Width (base) 3.9 m Creates Lac des Peiròu The Glanum Dam, also known as the Vallon de Baume dam, was a Les Alpilles in the Roman province of Gallia Narbonensis. Dating to the 1st century BC, it was the earliest known dam of its kind.[1] The remains of the dam were destroyed during the construction of a modern replacement in 1891, which now facilitates the supply of water to Saint-Rémy-de-Provence in the Bouches-du-Rhône region of France.[2] The remains of the Roman dam at Glanum were rediscovered in 1763 by aqueduct that in turn supplied the Roman town of Glanum.[4] A modern arched gravity dam was constructed on the same site in 1891, destroying the remains of the Roman dam.[2][4] The dam's reservoir is called in French the Lac du Peirou and is accessible via the Chemin du Barrage. 1. ^ Smith 1971, pp. 33–35; Schnitter 1978, pp. 31f.; Schnitter 1987a, p. 12; Schnitter 1987b, p. 80; Hodge 2000, p. 332, fn. 2 2. ^ a b c Hodge 2002, p. 81 3. ^ a b James 2004, pp. 39-56 4. ^ a b c Hill 1996, p. 53 • James, Patrick; Chanson, Hubert (2002), "Historical Development of Arch Dams. From Roman Arch Dams to Modern Concrete Designs", Australian Civil Engineering Transactions CE43: 39–56  Further reading • Agusta-Boularot, S.; Paillet, J.L. (1997), "Le Barrage et l'Aqueduc Occidental de Glanum: le Premier Barrage-Voûte de l'Histoire des Techniques?", Revue Archéologique 1: 27–78  • Benoit, Fernand (1935), "Le Barrage et l'Aqueduc Romains de Saint-Rémy de Provence", Revue des Études Anciennes: 331–340  See also
Idaho State Counties State Highlights Idaho: Median age by Hispanic origin Median age is the age at which half the population is younger and half is older.  A lower median age indicates a relatively younger population, while a higher median age indicates a relatively older population.  Median age varies by ethnicity. The median age in 2013-2017 in Idaho... • was 35.9 years for the total population; • was 23.8 years for the Hispanic population. Source: 2013-2017: U.S. Bureau of the Census, (; DATE LAST UPDATED: December 6, 2018. Designed and hosted by First Step Internet -
/   /  Countries The phenomenon of armed associations will firstly be studied from a national perspective. That should outline the national political framework which influenced the armed associations operating within a given country. In order to define the general political, cultural and social national framework within which various armed associations acted, the political, cultural, social and economic characteristics of each country will be analyzed in terms of policing policies, the effectiveness of state institutions, general political, social or economic features, political cultures, legislation, etc. Armed associations operating within a specific national framework will be then studied as to determine the social background and equipment of these groups, and of their diffusion across the national territory. The analysis will be based on primary sources (national archives, the national press) as well as secondary sources (books of the period, memoirs, diaries, etc.) The analysis of individual countries and of the various local realities and armed associations operating within their boundaries will allow to: a) provide a general overview of the spread and nature of organised violence in a given country b) carry out a comparison on a national level to isolate local specificities as well as to reveal nation-wide trends. In this way, the local cases will significantly contribute to deepening our knowledge of each country by allowing us, for instance, to test how policing policies were actually put into effect across different regions. At the same time, it will also be possible to understand how local armed associations were able to exert some influence on national politics, for example by fuelling social conflicts and disorders (as in the case of the Yellow Trade unions in Northern France). Want to get in touch with us? Drop us an email at
@article{Pawłowski_Lucjan_Characteristic_2019, author={Pawłowski, Lucjan and Pawłowska, Małgorzata and Cel, Wojciech and Wang, Lei and Li, Chong and Mei, Tingting}, howpublished={online}, year={2019}, abstract={ The reports of Intergovernmental Panel for Climate Change indicate that the growing emission of greenhouse gases, produced from the combustion of fossil fuels, mainly carbon dioxide, leads to negative climate changes. Therefore, the methods of mitigating the greenhouse gases emission to the atmosphere, especially of carbon dioxide, are being sought. Numerous studies are focused on so-called geological sequestration, i.e. injecting carbon dioxide to appropriate geological strata or ocean waters. One of the methods, which are not fully utilized, is the application of appropriate techniques in agriculture. The plant production in agriculture is based on the absorption of carbon dioxide in the photosynthesis process. Increasing the plant production directly leads to the absorption of carbon dioxide. Therefore, investigation of carbon dioxide absorption by particular crops is a key issue. In Poland, ca. 7.6 mln ha of cereals is cultivated, including: rye, wheat, triticale, oat and barley. These plants absorb approximately 23.8 mln t C annually, including 9.8 mln t C/yr in grains, 9.4 mln t C/yr in straw and 4.7 mln t C/yr in roots. The China, these cereals are cultivated on the area over 24 mln ha and absorb 98.9 mln t C/yr, including 55 mln tC/yr in grains, 36 in straw, and 7.9 mln t C/yr in roots. The second direction for mitigating the carbon dioxide emission into the atmosphere involves substituting fossil fuels with renewable energy sources to deliver primary energy. Cultivation of winter cereals as cover crops may lead to the enhancement of carbon dioxide removal from the atmosphere in the course of their growth. Moreover, the produced biomass can be used for energy generation. }, type={Artykuły / Articles}, title={Characteristic of carbon dioxide absorption by cereals in Poland and China}, volume={vol. 35}, number={No 1}, pages={165-176}, journal={Gospodarka Surowcami Mineralnymi - Mineral Resources Management}, publisher={Komitet Zrównoważonej Gospodarki Surowcami Mineralnymi PAN}, publisher={Instytut Gospodarki Surowcami Mineralnymi i Energią PAN}, doi={10.24425/gsm.2019.128205}, keywords={climate change, carbon dioxide emissions, terrestrial ecosystems, carbon dioxide sequestration, photosynthesis}, }
Home » Local News » Politics » The Results of Super Tuesday and Why It Matters The Results of Super Tuesday and Why It Matters Andrew Burton/Getty Images   Andrew Burton/Getty Images Photo by Pat Sullivan, AP Photo by Pat Sullivan, AP The Results of Super Tuesday and Why It Matters  Super Tuesday 2016 Results What You Need To Know About Super Tuesday Thirteen states vote on Super Tuesday in the presidential primaries or caucuses — the most in 2016. What is Super Tuesday? Super Tuesday is a Tuesday in the presidential primary election season in which the largest number of states hold their primaries or caucuses. This year’s Super Tuesday takes place on Tuesday, March 1. The Super Tuesday election day typically features at least a dozen contests, which makes it likely that a candidate who performs well on Super Tuesday will go on to secure the nomination. The Super Tuesday moniker dates to the 1980 election, when Alabama, Florida and Georgia held primaries on the same day. According to a report by National Public Radio, the current, high-stakes Super Tuesday contest came about in 1988, when a dozen Southern states decided to hold Democratic primaries on the same day with the goal of nominating a more moderate Democratic presidential candidate. The effort failed, when then-Sen. Al Gore (D-Tenn.) and Jesse Jackson split the Southern states, setting the stage for then-Massachusetts Gov. Michael Dukakis (D), a Northern liberal, to become the party’s nominee. What are this year’s Super Tuesday states? Thirteen U.S. states and one American territory will hold primaries or caucuses on Tuesday. In the vast majority of the Super Tuesday states, both Republican and Democratic elections will be taking place. Those elections are: 1. Alabama 2. Arkansas 3. Colorado caucus 4. Georgia 5. Massachusetts 6. Minnesota caucus 7. Oklahoma 8. Tennessee 9. Texas 10. Vermont 11. Virginia The contests taking place exclusively on the Democratic side are the American Samoa caucus and the primary for Democrats living abroad. In Alaska and Wyoming, which are hosting caucuses, only Republicans will vote. What is the difference between a primary and a caucus? A primary election is a simple secret-ballot vote administered by a state or local government. A caucus, by contrast, is run by the state-level political party and involves some element of party activists convincing one another to join their preferred candidate. There are typically complicated historical and political reasons that some states hold a caucus rather than a primary.
Likelihood of a future event count within a range, from a history of events: in Excel First stage: the likelihood distribution Second stage: trials Third and final stage: likelihoods for ranges What to read first: Likelihood of a future event count within a range, from a history of events Risk specialists Version 1.0 Beta How you can run Excel Monte Carlo trials to find the likelihood of a future event count within a range, from a history of events. First stage: the likelihood distribution To generate the likelihood distribution, create a list of candidate values for the long-term frequency, expressed as the average event count per time unit. A reasonable initial range for your candidate values is from zero to ten times the average frequency within the history. The spacing between adjacent candidate frequency values should be tight, perhaps the range divided by 10000, so you get 10001 candidate values starting with 0. (Zero is not a real candidate, even if your history contains zero event occurrences.) Name your list column CandidateFrequencies_CandidateFrequency (this is a Named range, created with the Name Manager). For each candidate value, calculate the probability of the exact number of actual historical events, assuming that the real long-term frequency matches the candidate value. In Excel, that’s =POISSON.DIST(historicaleventcount,candidatefrequency*history duration,FALSE) This probability is called the likelihood function of the long-term frequency, and you have generated its likelihood distribution. It includes an adjustment for the duration of the history, which may not be one time unit. Call this column CandidateFrequencies_Likelihood. You now have a list of 10001 points in the likelihood distribution, each with a separate likelihood. Later stages use a cumulative version of this function. Add a column representing the cumulative likelihood (starting at 0 for candidate frequency 0), and a further column representing relative cumulative likelihood, with an accumulation of exactly 1 at the end. Name these columns CandidateFrequencies_CumulativeLikelihood and CandidateFrequencies_RelativeCumulativeLikelihood respectively. In the Cumulative Likelihood column, use: =<cell above>+(CandidateFrequencies_Likelihood*(candidate frequency-previous candidate frequency)) In the top cell, just put 0, not a formula. Multiplying by the difference between candidate frequencies allows for uneven spacing of the candidate frequencies. In the relative cumulative likelihood column, use: That creates your cumulative relative likelihood that starts and runs up to 1, assuming that your range of candidate frequencies covers virtually all plausible values. Second stage: trials As at 11 December 2018, this method has been questioned in community consultation on LinkedIn. There will be updates here when the questions are resolved. The spreadsheet implementation of this stage is a bit messy. You may have your own way to do it. I’ll give the key points in my method, in case you haven’t thought of those. Build on the workbook created for the first stage. In that workbook, name your first sheet ‘Candidate Frequencies’. Add a further sheet called ‘Control Panel’. Within the Control Panel, name three cells ControlPanel_HistoryCount, ControlPanel_HistoryDuration and ControlPanel_FutureDuration respectively. Put in some values representing the number of events in the history, the length of the history, and the length of the future prediction interval (in the same time units). Create a second workbook sheet for trials, with one trial per row. Call it ‘Trials’. You can put trial reference numbers in the first column. Eventually you will want thousands of trial rows, but you can start small and grow later. In the new Trials sheet, add a column for generating for each trial a simple random number from between 0 and 1, with uniform probability distribution: =RAND(). This random value is used to select the candidate frequency for the trial. Name this column Trials_FrequencySelector. Add a further column that finds the row in the candidate frequency sheet containing the lowest relative cumulative likelihood higher than the random selector value from the column to the left: The third parameter of MATCH(), the ‘1’, just tells Excel to look for the first value higher than the random selector value. Name this column Trials_RowInCandidateFrequencies. Add a column to look up the candidate frequency in that matched row: The +1 is necessary because The Excel MATCH() function counts the first cell as 0, whereas INDEX() counts the first cell as 1. Call this column Trials_TrialCandidateFrequency. This value is the candidate frequency for the trial row. Add a column containing a further random generator =RAND(). This random value is used to select the trial event count from within the Poisson distribution for the trial’s candidate frequency. Name this column Trials_EventCountSelector. Leave two columns spare for filling later. You next create 101 further columns representing all potential event counts for the trial, starting at zero. So put the potential count (0..100) at the top of each column. Name that row Trials_PotentialCounts. Also name the 101-column range Trials_PotentialEventCountColumns. While you’re there, also name the left-most column of that area Trials_FirstPotentialCountColumn (that’s the column representing 0 events). In each cell within the added grid, calculate the cumulative probability of the event count for the column, given the long-term frequency for the trial: =POISSON.DIST(Trials_PotentialCounts, Trials_TrialCandidateFrequency*ControlPanel_FutureDuration,TRUE) You might pick a range of potential event counts other than 0-100. Whatever the range of potential event counts, it must run much higher than a simple extrapolation of the history. You find the event count for the trial by matching the random value in Trials_EventCountSelector with one of the cumulative probability cells in the row. The event count for the trial is shown at the top of the column containing that cell. To do this in Excel, go back to the two columns left spare. In the left one, identify the cell within the current row containing the lowest cumulative probability that is higher than the random number selector for the count. You can do this with the MATCH() function. =IF(Trials_EventCountSelector<Trials_FirstPotentialCountColumn,0,MATCH(Trials_EventCountSelector,3:3 Trials_PotentialEventCountColumns,1)) The 3:3 Trials_PotentialEventCountColumns refers to the intersection of row 3 (the current row in my example) with the named area Trials_PotentialEventCountColumns. The 3:3 will remain the current row when you fill down further rows. Call this column Trials_ColumnForEventCount. The enclosing IF() is needed because of the way the Excel MATCH() function works. The value displayed is the number of the column containing the matched probability, starting at 0 for the first column of cumulative probabilities. In the remaining spare column, look up the potential event count for the matched probability cell, at the top of the matched column: =INDEX(Trials_PotentialCounts PotentialCountColumns, Trials_ColumnForEventCount+1) This cell represents the trial outcome, the event count. Name this column Trials_TrialEventCount. Third and final stage: likelihoods for ranges In your Control Panel sheet, add two cells to hold the lower and upper end of the range of interest for the future period event count (the ‘target range’). Call these cells ControlPanel_CountTargetRangeLowEnd and ControlPanel_CountTargetRangeHighEnd. Also in the Control Panel sheet, add a cell containing the number of trial rows. Name this cell ControlPanel_NumberOfTrials. In the Trials sheet, add three further columns containing TRUE/FALSE values. The first column is TRUE if the trial row’s event count is below the low end target range. The second column is TRUE if the trial row’s event count is above the high end of the target range. The third column is TRUE if neither of the previous conditions apply. Name these columns Trials_CountBelowTargetRange, Trials_CountAboveTargetRange, and Trials_CountInTargetRange. The formulae can be: Back in the Control Panel sheet (or wherever you prefer), calculate the proportion of cells in the Trials_CountInTargetRange that have the value TRUE. A simple formula to do that is To allow for an open-ended target range, the Clear Lines used this long but straightforward variation: Map of the series Likelihood of a future event… How to turn an event frequency into likelihood count within a range, from a long-term event frequency count within a range, from a history of events size total within a range About the Excel implementation …in Excel. …in Excel. This article …in Excel. Download the complete Clear Lines Excel Workbook (17 MB) Main article on repeating risk events and likelihood Next article for risk specialists Likelihood of a future event size total within a range Conceive a distribution for event sizes Find the LogNormal parameters A table for your LogNormal distribution Include sizes in trials Find the proportion of trials that will push your buttons Conclusions you may draw Risk specialists Version 1.0 Beta Parent articles First stage: the likelihood distribution Second stage: trials Comparing the trial distributions with the simple Poisson distribution Third and final stage: likelihoods for ranges Conclusions you may draw Count ranges and risk decisions Risk specialists Version 1.0 Beta Index to the topic Risk in work unit business planning Leave a Reply
“In Medias Res” Writing Exercise for Craft of Prose In “In Medias Res,” students write and re-write a scene in the three different points of view from a YouTube video of a man texting and running into a wild bear. They likewise create a character profile for their point of view character to navigate Anne Lamott’s suggestion of an “emotional acre.” In doing so, they negotiate the scope, immediacy, and language of each point of view, and consider how “in the middle of things” each point of view feels.
Difference between revisions of "Securing your wallet" From Bitcoin Wiki Jump to: navigation, search (Add to category Security.) (Choosing A Strong Password) Line 241: Line 241:    12 char = good security (good enough for your wallet)    12 char = good security (good enough for your wallet)    13 char = very good, enough for anything.    13 char = very good, enough for anything. You might want to read [http://security.stackexchange.com/questions/662/what-is-your-way-to-create-good-passwords-that-can-actually-be-remembered What is your way to create good passwords that can actually be remembered?] and [http://security.stackexchange.com/questions/6095/xkcd-936-short-complex-password-or-long-dictionary-passphrase XKCD #936: Short complex password, or long dictionary passphrase?] ==== Email-based Archival and Remote Backup ==== Revision as of 22:08, 1 January 2013 Wallet security can be broken down into two independent goals: 1. Protecting your wallet against loss. 2. Protecting your wallet against theft. In the case that your current wallet hasn't been protected adequately (e.g. put online with a weaker password): 1. Making a new secure wallet, using appropriate long-term protection. For a brief overview see also: Wallet Security Dos and Don'ts Paper Wallets Paper wallets are a fairly simple way to store your bitcoins independent of a computer. When generated securely and stored on paper, or other offline storage media, a paper wallet decreases the chances of your bitcoins being stolen by hackers, or computer viruses. With each entry on a paper wallet, you are securing a sequence of secret numbers that is used to prove your right to spend the bitcoins assigned to one of your addresses. This secret number, called a private key, is most commonly written as a sequence of fifty-one alphanumeric characters, beginning with a '5'. One way you can create a paper wallet is by going to the website bitaddress.org. This website features a free client-side paper wallet generator written in JavaScript. The webpage can be saved as a file and used on an offline computer. Using it online is relatively safe, for storing smaller amounts, but not airtight unless you take extra precautions to ensure your keys are not stolen by spyware. Alternatively Blockchain.info offers a tutorial on how to generate a paper wallet with an online component so you can still check your balance easily. To generate a safer paper wallet, it is best to "clean-boot" your computer with a bootable CD (such as a Linux Live CD), with your computer not connected to the Internet, to ensure that you do not have any active spyware that might steal any private keys you generate. Disconnecting from the Internet allows you to confirm that the paper wallet generator is truly self-contained and isn't depending on communication with a remote server. Run the saved paper wallet generator in a web browser, then print your paper wallets or store them on external media (do not save them on the computer), and then shut down the computer. You may need to load an appropriate printer driver in order to print while booted from the live CD. A paper wallet lists multiple Bitcoin addresses and their corresponding private keys. You can send Bitcoins to any address on the page and they will be inaccessible until the private key is imported into a wallet. Since version 0.6.0, the bitcoin software has a command called "importprivkey" that can load private keys, but you can also use the "Add Funds" - "Private key" screen at MtGox or Blockchain.info's "My Wallet" service to recover bitcoins from a private key. In the case of MtGox, bitcoins are deposited in your account, and can be sent out of MtGox after the standard number of deposit confirmations. Remember, spyware and viruses often attempt to monitor your computer activities so that their authors can steal from you. They are interested in passwords to online accounts, and anything of value. Bitcoin wallets and private keys are something of value that have already been targeted by malware. Paper wallets isolate you from much of this risk. If your computer is infected with spyware or viruses - even if there are no symptoms, or your antivirus isn't reporting anything - then anything you type, view, or save on your computer, could potentially be stolen by someone remotely controlling your computer. Your private key can then be intercepted while you enter it, so only enter a Bitcoin private key into your computer when your intent is to redeem its value immediately. Importance of security updates No software is perfect, and from time to time there may be security vulnerabilities found in your Bitcoin client as well. Be sure you keep your client updated with the latest bug fixes, especially when a new vulnerability is discovered. We maintain a list a known vulnerabilities on this wiki - you can watch that page to get updates. Note that you don't need to be running the latest major client version: some clients, including the popular Bitcoin-Qt, have older versions available with bugfix-only updates. Securing the Bitcoin-QT or bitcoind wallet Bitcoin transactions send Bitcoins to a specific public key. A Bitcoin address is an encoded hash of a public key. In order to use received Bitcoins, you need to have the private key matching the public key you received with. This is sort of like a super long password associated with an account (the account is the public key). Your Bitcoin wallet contains all of the private keys necessary for spending your received transactions. If you delete your wallet without a backup, then you no longer have the authorization information necessary to claim your coins, and the coins associated with those keys are lost forever. The wallet contains a pool of queued keys. By default there are 100 keys in the key pool. The size of the pool is configurable using the "-keypool" command line argument. When you need an address for whatever reason (send, “new address”, generation, etc.), the key is not actually generated freshly, but taken from this pool. A brand new address is generated to fill the pool back to 100. So when a backup is first created, it has all of your old keys plus 100 unused keys. After sending a transaction, it has 99 unused keys. After a total of 100 new-key actions, you will start using keys that are not in your backup. Since the backup does not have the private keys necessary for authorizing spends of these coins, restoring from the old backup will cause you to lose Bitcoins. Creating a new address generates a new pair of public and private keys, which are added to your wallet. Each keypair is mostly random numbers, so they cannot be known prior to generation. If you backup your wallet and then create more than 100 new addresses, the keypair associated with the newest addresses will not be in the old wallet because the new keypairs are only known after creating them. Any coins received at these addresses will be lost if you restore from the backup. The situation is made somewhat more confusing because the receiving addresses shown in the UI are not the only keys in your wallet. Each Bitcoin generation is given a new public key, and, more importantly, each sent transaction also sends some number of Bitcoins back to yourself at a new key. When sending Bitcoins to anyone, you generate a new keypair for yourself and simultaneously send Bitcoins to your new public key and the actual recipient's public key. This is an anonymity feature – it makes tracking Bitcoin transactions much more difficult. So if you create a backup, do more than 100 things that cause a new key to be used, and then restore from the backup, some Bitcoins will be lost. Bitcoin has not deleted any keys (keys are never deleted) – it has created a new key that is not in your old backup and then sent Bitcoins to it. Making a new wallet If a wallet or an encrypted wallet's password has been compromised, it is wise to create a new wallet and transfer the full balance of bitcoins to addresses contained only in the newly created wallet. Examples of ways a wallet may be compromised are through password re-use, minimal strength passwords, computer hack or virus attack. There are a number of ways to create a new wallet with Bitcoin-QT or bitcoind but this is a process that has been tested with bitcoind 0.6.3. We use the copy command to minimize the chance of any data loss but you are warned to make backups of any wallet.dat that holds a balance for you. 1. Shut down the Bitcoin program. 2. Find and make a backup of the "compromised" wallet.dat file and rename it, perhaps adding a short description: wallet.dat -> wallet-compromised.dat Depending on your OS, the wallet file will be located at: Windows: %APPDATA%\Bitcoin\ Linux: ~/.bitcoin/ Mac: ~/Library/Application Support/Bitcoin/ 3. Start the Bitcoin program and it will create a new wallet.dat. You may then encrypt the wallet as desired and make a new backup. 4. Once you've made a new wallet, you can obtain one or more addresses and copy them into a text editor. After obtaining the new address(es), shut down the Bitcoin program, make a backup of the new wallet.dat file and copy it to a new file named wallet-new.dat. 5. Copy the wallet-compromised.dat file back to wallet.dat, start the Bitcoin program and transfer your balance to the new address(es) you put in your text editor. Once the balance is back to 0 for your compromised wallet, you may want to wait a couple minutes or for a confirmation or check block explorer to be sure the transactions have been broadcasted. Then you may shut down the Bitcoin program. 6. Rename wallet.dat to wallet-compromised.dat. 7. Rename wallet-new.dat to wallet.dat. You should now have a new wallet with all the bitcoins from the old wallet. Making a secure workspace If you are using your computer to handle bitcoins, a wallet, Bitcoin-related passwords, or Bitcoin private keys, you must take care that the system is free of malware, viruses, keyloggers, remote access tools, and other tools that may be used to make remote copies of any of the above. In the case that your computer is compromised, the precautions taken below may provide additional protection. The first step is to make a new user, so as root, run: adduser new_user_name When you get to the prompt 'Enter the new value, or press ENTER for the default', just keep hitting ENTER. Then switch user to the new user. To get to the new user you can use the switch user icon for your system, which on Ubuntu is in the 'System/Quit' screen, or if there is no switch icon on your system you can log out and log back in as the new user. Then click on a folder in the new user to display the file browser, then keep going up folders until you see the new user home directory, then right click to bring up the Properties dialog, then click on the Permissions tab, then in the Others section, set the folder access to None. For secure browsing, open Firefox, and then go into the Edit menu and click Preferences. Starting from the left, click on the General tab, and in the 'Startup/When Firefox starts' pop up menu, choose 'Show a Blank Page'. Then click on the Content tab, and deselect 'Load images automatically' and deselect 'Enable JavaScript'. Then click on the Privacy tab, and in the 'History/Firefox will' pop up menu, choose 'Never remember history'. Then click on the Security tab, and in the Passwords section, deselect 'Remember passwords for sites' and deselect 'Use a master password'. Then click on the Advanced tab, then click on the Update tab, and then in the 'Automatically check for updates to' section, deselect 'Add-ons' and 'Search Engines'. When JavaScript is disabled, the Linux download page will not download automatically, so you'll have to click on the 'direct link' part of the "Problems with the download? Please use this 'direct link' or try another mirror." line. After you've made your secure new user, to maintain security you should only use it for Bitcoin. It's also a good idea to encrypt the Home directory of whatever user you run Bitcoin under using ecryptfs-utils. To do this: 1. If the Home directory is not empty you should back it up first, by just copying the data to an external drive or something. 2. install ecryptfs-utils (on Ubuntu: sudo apt-get install ecryptfs-utils) 3. log out of X (graphical system) and press Ctrl+Alt+F1 to login to the command shell (you must be logged out or some files will be open and the tool won't be able to encrypt your data) 4. change directory to something that's not in your home folder (ex: cd / ) 5. run the migration tool (on Ubuntu: sudo ecryptfs-migrate-home -u username) 6. if it's successful, you can now press ALT+F8 to go back to the GUI and login 7. run 'ecryptfs-unwrap-passphrase' and WRITE DOWN OR SAVE THE CODE IT RETURNS because you will need it if you ever have to pull your data off while the OS is not working. (You can run it again later if you need to, but run it now so that you can get your data if your Linux install gets botched.) 8. run 'ecryptfs-setup-swap' to encrypt your swap partition (the encrypted folder data is not encrypted while it's in memory, and so if it's ever sent to the swap partition it can be stolen from there unless that too is encrypted - be aware that this will mean you cannot use Hibernate anymore, as the bootloader won't be able to restore the hibernation data) (instructions from [1]) This solution does not scale; the amount of needed space can grow beyond the image size. Backup all data Follow these instructions to backup all the bitcoin data (wallet and block chains) to an encrypted disk image. 1. Open Disk Utility 2. Click New Image and choose a big enough size, 128-bit or 256-bit (faster or more secure) encryption and single partition. 3. Save it somewhere you won't lose it (like your Wuala, Dropbox, Strongspace or whatever) 4. Choose a safe and strong password 5. Move everything from ~/Library/Application Support/Bitcoin/ to the image 6. Symlink it back so the app would be able to use it ln -s /Volumes/Bitcoin ~/Library/Application Support/Bitcoin Don't forget to mount your image before using Bitcoin and unmount it after quitting. Backup just wallet.dat Follow these instructions to backup just the wallet.dat file. This results in a smaller disk image, but it's more complicated to do. 1. Open Disk Utility 4. Choose a safe and strong password 5. Move your wallet.dat file to the image ln -s /Volumes/Bitcoin/wallet.dat ~/Library/Application Support/Bitcoin/wallet.dat Mount Wallet and launch Bitcoin Don't forget to mount your image before using Bitcoin and unmount after quitting it. Note: If you start the Bitcoin application without having the image mounted, the application will overwrite your symlink with a new wallet. If that happens, don't panic. Just delete the new wallet.dat, mount the image, and recreate the symlink like above. Automation: You can create a small application using Automator (included in OS X) to automatically mount the wallet and then launch Bitcoin App. See the Screenshot on how to do this. If one doesn't want to use encrypted Disk images, then a small shell script can be used instead that takes care of decrypting the wallet, launching bitcoin client, and encrypting it after the client exits. This script works on both OSX and Linux: bitcoin-launch-script Due to the frequency with which Windows computers are compromised, it is advised to encrypt your wallet or to keep your wallet on an encrypted disk image created by third-party software, such as TrueCrypt (open source) or Jetico BestCrypt (commercial). This also applies to the storage of passwords, private keys and other data that can be used to access any of your Bitcoin balances. Assuming that you have installed the Windows Bitcoin client and run it at least once, the process is described below. To mount the Bitcoin data directory on an encrypted drive 1. Use the third-party disk image encryption program of your choice to create and mount an encrypted disk image of at least 5GB in size. This procedure stores the entire block chain database with the wallet.dat file so the required size of the encrypted disk image required may grow in the future. 2. Locate the Bitcoin data directory, and copy the directory with all contents to the encrypted drive. For help finding this directory, see Locating Bitcoin's Data Directory. 3. Create a Windows shortcut that starts Bitcoin with the -datadir parameter and specifies the encrypted drive and directory. For example, if you installed Bitcoin in the default directory, mounted your Bitcoin encrypted drive as E:\, and stored your Bitcoin data directory on it as Bitcoin, you would type the following command as the shortcut Target: C:\Program Files\Bitcoin\bitcoin.exe -datadir=E:\Bitcoin 4. Open Bitcoin's settings and configure it NOT to start automatically when you start Windows. This is to allow you to mount the Bitcoin encrypted disk image before starting Bitcoin. 5. Shut down Bitcoin, and then restart it from the new shortcut. After doing this, any time you want to use Bitcoin, you must first mount the Bitcoin encrypted disk image using the same drive designation, and then run Bitcoin from the shortcut that you created, so that it can find its data and your wallet. Locating Bitcoin's data directory The data directory is the location where Bitcoin's data files are stored, including the wallet data file. explorer %APPDATA%\Bitcoin Bitcoin's data folder will open. For most users, this is one of the following locations: C:\Documents and Settings\YourUserName\Application data\Bitcoin (Windows XP) C:\Users\YourUserName\Appdata\Roaming\Bitcoin (Windows Vista and 7) If you have trouble browsing to these folders, note that "AppData" and "Application data" are hidden by default. By default Bitcoin will put its data here: You need to do a "ls -a" to see directories that start with a dot. If that's not it, you can do a search like this: find / -name wallet.dat -print 2>/dev/null To change the directory Bitcoin stores its data in: Run in terminal or script: ./bitcoin(-qt) -datadir=./[Directory_Name] By default Bitcoin will put its data here: ~/Library/Application Support/Bitcoin/ Note: Using Dropbox to back up your Bitcoin data is not recommended as doing so introduces the following security concerns: 1. Dropbox stores your encryption key (meaning that a disgruntled Dropbox employee or an attacker who gained access to the system could decrypt your Dropbox data and steal your bitcoins) 2. the Dropbox client only needs a password for the first login. After it authenticates once, the server assigns it a token which it uses to show that, at one time, its user knew the password rather than sending the actual password (meaning that if you ever use the Dropbox client on another PC, that PC's users can access your Dropbox - even if you change your password - and can steal your bitcoins or get a virus that will steal your bitcoins). For these reasons, an alternative that always uses password authentication such as Wuala should be used. Wuala's servers do not store your encryption key and the program authenticates with the password each time it is started. Whether you use Dropbox as your backup or not, it is advised to use what Steve Gibson calls "pre-Internet encryption" which means to use some form of encryption on your files before you back them up, in case an attacker gains access to that backup. Make sure to pick a password that is memorable but secure. The only file you need to back up is "wallet.dat" which can be done one of two ways. To make a copy of the wallet.dat file, ensure that Bitcoin is closed and copy this file somewhere else. The other way is to use the backupwallet JSON-RPC command to back up without shutting down Bitcoin. Once a copy has been made, encrypt it, and put it in two or more safe locations. Consider the risk due to theft, fire, or natural disaster in proportion to the value of bitcoins stored in the wallet. General Solutions Your wallet.dat file is not encrypted by the Bitcoin program by default but the most current release of the Bitcoin client provides a method to encrypt with a passphrase the private keys stored in the wallet. Anyone who can access an unencrypted wallet can easily steal all of your coins. Use one of these encryption programs if there is any chance someone might gain access to your wallet. • 7-zip - Supports strongly-encrypted archives. • AxCrypt by Axantum • lrzip - Compression software for Linux and OSX that supports very high grade password protected encryption • TrueCrypt - Volume-based on-the-fly encryption (for advanced users) There is also a list of open source encryption software. Decrypting and encrypting the wallet.dat every time you start or quit the Bitcoin client can be tedious (and outright error-prone). If you want to keep your wallet encrypted (except while you're actually running the Bitcoin client), it's better to relegate the automation to a small shell script that handles the en/decryption and starting up Bitcoin client for you (Linux and OSX). There is also a method to print out and encrypt your wallet.dat as a special, scannable code. See details here: WalletPaperbackup Password Strength Brute-force password cracking has come a long way. A password including capitals, numbers, and special characters with a length of 8 characters can be trivially solved now (using appropriate hardware). The recommended length is at least 12 characters long. You can also use a multi-word password and there are techniques to increase the strength of your passwords without sacrificing usability. The Usability of Passwords However, simply using dictionary words is also insecure as it opens you up to a dictionary attack. If you use dictionary words, be sure to include random symbols and numbers in the mix as well. If you use keyfiles in addition to a password, it is unlikely that your encrypted file can ever be cracked using brute-force methods, even when even a 12 character password might be too short. Assume that any encrypted files you store online (eg. Gmail, Dropbox) will be stored somewhere forever and can never be erased. Choosing A Strong Password Make sure you pick at least one character in each group: Lowercase: abcdefghijklmnopqrstuvwxyz Number: 1234567890 Symbol: `~!@#$%^&*()-_=+\|[{]};:'",<.>/? (space) <9 char = unsuitable for use 09 char = insecure 10 char = low security 11 char = medium security 12 char = good security (good enough for your wallet) 13 char = very good, enough for anything. You might want to read What is your way to create good passwords that can actually be remembered? and XKCD #936: Short complex password, or long dictionary passphrase? Email-based Archival and Remote Backup One of the simplest methods for storing an appropriately encrypted archive of your wallet.dat file is to send the archive as an email attachment to your own e-mail address. Services like Gmail use very comprehensive distributed networks that make the loss of data very unlikely. One can even obfuscate the name of the files within the archive, and name the archive something less inviting, such as: 'personal notes' or 'car insurance'. Another solution is to use a file storage service like Wuala ( encrypted, instructions), Dropbox (after encrypting the wallet first) and others, including the more secure SpiderOak. Autmated Backups using Cron, Bash and GNU/Linux Linux users can setup backups using cron by telling it to run a backup script at set intervals of time. Run 'crontab -e' and add this line near the bottom: 01 * * * * /usr/local/bin/backupwallet.sh This cron line will run the /usr/local/bin/backupwallet.sh script at the 01 minute of every hour. Remember to add a newline after the last line of the crontab file, or else the last line won't run. You may also wish to ignore the script's output by appending " > /dev/null 2>&1" to the line (this will also prevent emails from being sent). Create /usr/local/bin/backupwallet.sh: # /usr/local/bin/backupwallet.sh # Performs backup of bitcoin wallet. # Written by: https://en.bitcoin.it/wiki/Securing_your_wallet # Standard Options TS=$(date "+%Y%m%d-%H%M") BITCOIN=bitcoind # /path/to/bitcoind GPG=gpg # /path/to/gpg GPG_USER=username # Username of gpg recipient. User should have gpg setup. USE_SHRED=0 # Flip to 1 to use `shred` instead of `rm`. SHRED_OPTS='--force --iterations=9 --zero --remove' # Storage Options # Only 1 set of options should be un-commented (the last one will be used). # Update CP_DEST paths as neccessary. # CP - Storage on a local machine. Could be Dropbox/Wuala folder. #CP_DEST='/var/data/backups/' # '~/Dropbox/', etc. # SSH - Storage on a remote machine. # S3 - Storage on Amazon's S3. Be sure s3cmd is installed and properly setup. # You may need "s3cmd put --force" if you use a sub-directory in CP_DEST. #CP=s3cmd put do_clean() { # Remove temporary wallets. if [ 1 -eq $USE_SHRED ]; then do_fail() { echo failed! exit 1 # Perform the backup. echo -n Making backup... $BITCOIN backupwallet $WALLET [ ! -s "$WALLET" ] && do_fail # If the backup does not exist or is empty, fail. echo done. echo -n Encrypting backup... $GPG -r $GPG_USER --output $WALLET_E --encrypt $WALLET [ 0 -ne $? ] && do_fail # If gpg returns a non-zero result, fail. echo done. echo -n Copying to backup location... [ 0 -ne $? ] && do_fail # If the $CP command returns a non-zero result, fail. echo done. exit 0 The shell script: • Calls bitcoind backupwallet to create a time/date-stamped wallet. • GPG encrypts the wallet with your public key. • Copies the result using one of several storage options (cp, scp, and s3cmd). • Uses the rm or shred command to remove the temporary wallet files. Be sure to modify the script options to fit your setup. After you save, make sure the file can be executed properly by the cron user. Common permissions for files in /usr/local/bin/ can be applied using (verify with your distribution!): cd /usr/local/bin/ && chown root:root backupwallet.sh && chmod 755 backupwallet.sh Assuming your backup is recent enough that you haven't used up all of your key pool... restoring a wallet to a new (or old) location and rescanning the block chain should leave you with all your coins. Just follow these steps: • Shut down the Bitcoin program. • Copy your backed-up wallet.dat into your bitcoin data directory. • If copying into existing profile, delete files blk*.dat to make the client re-download the block chain. Erasing Plain-text Wallets In most operating systems, including Windows, Linux, and Mac OS X, simply deleting a wallet.dat file will not generally destroy it. It is likely that advanced tools can still be used to recover the wallet.dat file, even after it has been deleted. The Linux shred command can be used to overwrite the wallet file with random data prior to deleting; this particular copy of the file will then be practically impossible to recover. Using shred (and similar tools on Windows) however does not guarantee that still other copies don't exist somewhere hidden on your HD. That will depend on your system configuration and what packages you have installed. Some system restore and backup tools, for instance, create periodic snapshots of your filesystem, duplicating your wallet.dat. In Mac OS, the equivalent of shred is srm (introduced in Leopard). Using the Finder to remove files, clicking "Secure Empty Trash" in the Finder menu will shred the contents of the trash can. As with any OS this doesn't guarantee that there are not other copies elsewhere on your system. For Windows, the built-in command cipher /W will shred all previously-deleted files. CyberShredder can securely deleted individual files. Online and Mobile Wallets Thus far, this article has been discussing the security of a wallet file for Bitcoin-QT or bitcoind that is under your sole control. Additional wallets applications and services have become available that offer other features and more convenience but not without introducing additional risk. When storing bitcoins with an eWallet such as Instawallet or Easywallet, you are essentially storing your private keys or wallet with that provider. Online wallets have a number of pros and cons to consider. For example, you can access your wallet on any computer in the world, but depending on the service, your bitcoins may be lost if the service is compromised. Mobile wallet applications are available for Android devices that allow you to send bitcoins by QR code or NFC, but this opens up the possibility of loss if mobile device is compromised. It may be possible to encrypt and backup the wallet or private keys on a mobile device but it is not advisable to store a large amount of bitcoins there without doing your own research and testing. See Also
I previously asked a technical question on StackOverflow about getting the thickness of the underline from a font in Java/Android. Since it is starting to appear that there may not be a solution, my new problem becomes: how do I design a good underline thickness and position for any particular font size? The following image is an example: enter image description here The red lines show the top, baseline, and bottom of the font. The black line is a standard underline. If that black line didn't exist and I had to design it myself, how would I know how thick to make it? And how far should it be placed below the baseline? Just by analyzing the image it looks like the thickness is about 1/16th of the font height and about one line thickness below the baseline. Is this a good guideline? I'm sure there must be design standards or at least recommendations out there, but I wasn't able to find them. I am not sure if there's a straight forward way of calculating this (I hope that if anyone else here knows the contrary to correct me). Most go with what looks best. I also don't thing the height of the font has anything to do with this, more likely the stroke weight of the letters themselves. For a basic rule I saw many using, keep the stroke thinner than the font's stroke weight. Other than that, do what looks best for your designs. PS: In your example, the underline has a weight of 2/3 of the font weight. Why not start from there? enter image description here • Sounds like good advice about the stroke weight of the letters. This will be difficult to calculate from a technical perspective, but probably right from a design perspective. – Suragch Oct 7 '17 at 11:11 • @Suragch In your example, the underline has a weight of 2/3 of the font weight. Why not start from there? – Alin Oct 7 '17 at 11:15 Your Answer
From Wikipedia, the free encyclopedia Jump to navigation Jump to search Stop-motion film example. Mary and Gretel (1916) Stop motion is a way of animation which makes it look like still objects are moving. Clay animation is a good example of how stop motion is used. Stop-motion requires any camera that can make single frames (or photos). It works by shooting a single frame, moving the object a little bit, and capturing a frame again. Cartoons use a similar way; one of the main differences is that stop motion uses real objects instead of drawn. Tim Burton, Will Vinton and the Aardman studio have used this method in their productions. Related pages[change | change source] Listen to this article · (info) Spoken Wikipedia This audio file was created from an article revision dated April 22, 2011, and does not play the most recent changes to the article. (Audio help) Symbol question.svg
Aabadi Ghatanay...KataoDhandli FizaBadbu Kay Nuqsa...Tizabi BarishMahool Ki AloodgiAisi Shiay Jis ...KenwasAab O HawaGandi HawaKhush Gawaar MosamAcha Mosam Bhet...Sukoon BakhshiHawa BaghairSukoon Ka DorToofan KheziAbr AloodgiWeraniAmreki Film Ind...Kisi Khas Dar K... Aab O Hawa : آب و ہوا 1. Climate, Clime : آب و ہوا - موسم : (noun) the weather in some location averaged over some long period of time. Muqaam : Location : a determination of the place where something is. "He got a good fix on the target" Rakhny Ka Amal : Location : the act of putting something in a certain place. Waqf Lazim : Period : a punctuation mark (.) placed at the end of a declarative sentence to indicate a full stop or after abbreviations. "In England they call a period a stop" Bar : Time : an instance or single occasion for some event. "This time he succeeded" Mosam : Weather : the atmospheric conditions that comprise the state of the atmosphere in terms of temperature and wind and clouds and precipitation. "The weather turned cold again" Haiz Ka Mahana ..., Haiz Aana, Mahawari : Period : the monthly discharge of blood from the uterus of nonpregnant women from puberty to menopause. "The women were sickly and subject to excessive menstruation" شادی کے قابِل عورت
Infrared principle Infrared heating sends out heat radiation – similar to a tiled stove – which is absorbed by all solid bodies in the room. The heated body or object stores the heat up to three times longer than air and gives it off again into the environment. In this way, there is a constant and mutual heat exchange. For the most part, the rising and cooling of air which is part of classical convection heating is omitted – your sense of well-being increases. The VDE-certified infrared heating systems with their low-emission heat radiation provide for constant drying of the walls. This leaves almost no chance for mold to grow! There is also a clear reduction of dust, which means that you will be able to breathe better again. Infrared heating systems can be installed on walls, ceilings or as auxiliary heating and thus guarantee a steady and therefore efficient room temperature, which ensures a feel-good atmosphere and an optimum room climate. Infrared heat promises comfort During the cold season we like to heat our own four walls so the temperature level is consistently pleasant. Ideally, the desired room temperature is reached quickly and maintained at a constant level, thus contributing to our sense of well-being. This is provided by VDE-certified infrared heaters; physically, their low-emission radiation heat is similar to energy-rich sunlight or the heat emitted by a tiled stove. Again and again our customers report that they find heating with infrared heat extremely pleasant, even if they had been a little skeptical before deciding to buy. Why don’t you try it out as well and see for yourself how comfortable and cozy this heat can be? Heat: electrical heating? Absolutely! There is still a lot of uncertainty when it comes to electrical heat. And yet we have been heating with electricity for a long time and in many situations. • Medicine has been using heat lamps or infrared lamps for a long time. • Your kettle is heated by electricity, as is your stove. • The fan heater in a car is operated electrically, even though there is a combustion engine. • A heat cushion for an aching tummy or sore muscles? • Even the international space station ISS is heated with infrared heating. Heating with electricity is a matter of course. In tune with health Heating with infrared radiation has a number of benefits for your health, and for several reasons: 1. Because infrared heat primarily heats walls, ceilings and objects and not the air in the room, as conventional heating systems do, a direct comparison between the two shows that the air is a little cooler which in turns means that the humidity is higher. This is an invaluable advantage during the cold season when our immune systems might be weakened. You will feel fitter and have potentially more resistance to fight ‘flu-like infections. 2. IR heat radiation effects a constant drying of the walls. This leaves almost no chance for mold to grow! This is also beneficial for your health. What cannot be cured by medicines is cured by the knife. What the knife cannot cure, heat will cure. Those who cannot be cured by heat, cannot be helped. (Hippocrates, 460 – 370 BC) You can see that infrared heating systems have provided health benefits for decades. And heat itself for centuries. Comfortable living and sleeping A homely, feel-good atmosphere is of the utmost importance in order to flee the constant physical pressures caused by stress, air pollution and everyday noises, and to maintain your health as well as your mental balance. It doesn’t always have to be Feng-Shui to feel good in your own four walls. An infrared heating system can make a substantial contribution to a healthy and cozy living space. When using infrared heat, living and especially sleeping areas are no longer negatively affected by circulating air masses. Since it is mainly the objects in the room (instead of the air) that is heated, temperatures can be sustained three times as long. For the most part, the rising and cooling of air which is part of classical convection heating is omitted – your sense of well-being increases. Irritated eyes due to dry air in a heated room occur predominantly with convection heating. If you are using infrared heat, you can expect a possible relief from these symptoms. And less dust and a clearly reduced propensity for forming mold (compared to night storage heating) are particularly beneficial for asthmatics and people suffering from allergies. The result is living and sleeping in complete relaxation! Infrared house Our interactive infrared house will give you an insight into modern living with infrared radiation heat. Using concrete numbers, it highlights emphatically that Welltherm’s efficient infrared heaters can hold their own in a direct cost comparison with established heating systems like oil and gas, but also with heat pumps or pellet heating systems. Slow electrical heating systems (night storage heaters) have long been a thing of the past! Infrared radiation heat is inexpensive and able to react flexibly to changing outside temperatures. Welltherm is synonymous with the feel-good warmth of a new heater generation.
Natural Gas Fossil fuels, including natural gas, will not be part of any final clean energy solution to climate change. It makes no sense to transition to natural gas, only to have to replace it with something better in the near future. As a technology, carbon capture and storage (CCS) attached to gas power plants is unlikely (see Table 1) to be clean enough for use in any solution. Key Objectives
home Articles Types of Food Allergies Types of Food Allergies Types of Food Allergies So, what are the types of food allergies? There is a multitude of food allergies, and seem to be growing by the day.  Basically, any type of food can cause an allergic reaction. But, most commonly found food that causes allergies are known as the ‘top 8’ food allergens. These eight types of food are the most commonly causing food allergies in babies, children, and increasingly in adults too. A list of food allergies that are common are: Tree nuts (such as almonds, cashews, walnuts) Fish (such as bass, cod, flounder) Shellfish (such as crab, lobster, prawns) Wheat (Celiac/Coeliac disease) These types of food allergies are the most frequently causing allergies. They also happen to be the most common food types. Even though these are the most common allergens, any type of food can trigger an allergy. Certain food allergens can lead to allergies to non-food items, for example an allergy to Kiwifruit can trigger an allergic reaction to Latex. It’s rather scary to know that anything you eat has the potential to cause you an allergy. This is why it’s important to recognise and understand the dangers related to food allergies. They can pop up at any time without warning, and you may have even eaten that particular food before. Translate »
University of Amsterdam and University of Missouri-St. Louis Initially published 14 May 2019 Activities that one can retrospectively label as ‘sport’ have probably been part of human beings’ repertoire for millennia, but sports as we know them today are the product of a modernity that arose from the late eighteenth century at the juncture of civil society, industrial capitalism, muscular Christianity, and the colonial expansion of North Atlantic states. Today, it is deeply intertwined with neoliberal capital, media technology, and neocolonial relations between the Global South and the Global North, as well as structures of inequality within nation-states in the Global North. Despite its neglect as an anthropological subject, sport under all its guises, from its effect on individual bodies to its spectacular manifestations in the rituals of mega-events, is a perfect object for an anthropological analysis inspired by ritual theory, exchange theory, feminist anthropology, and ethnographic approaches to globalization. Sport in anthropology All humans have probably engaged in sport-like activities since time immemorial, and today’s sports events and massive infrastructures are simply the latest permutation of a relationship amongst sport, spectacle, and political power that harks back to antiquity in the Greek Olympic Games, Roman gladiator games and chariot races, and Mesoamerican ball court games. Throughout the world and across the centuries, humans have engaged in rule-governed activities that exhibit certain features, the relative importance of which varies considerably across societies and contexts. These features include skill, physical exertion, sociality, pleasure, chance, theatricality, and competition. The task of surveying sport cross-culturally is hampered by the problem that the term ‘sport’ describes a category of activities that only coalesced in the West in the nineteenth century and was then carried around the globe by Western colonialism and imperialism and later globalization (Guttmann 1994). Many languages did not have a term with an equivalent semantic value until they borrowed it from a European language (Besnier, Brownell & Carter 2017: 3). Today, the category is highly contested because being defined as a sport makes an activity eligible for official recognition by powerful international sports organizations; these organizations, in turn, defend the borders of their membership by constantly revising their definition of sport. The two international sports organizations with the broadest multi-sport representation and greatest global influence, the International Olympic Committee (IOC) and the General Association of International Sport Federations (SportAccord), emphasise that sport should be characterised first and foremost by competition, reflecting contemporary popular understandings in the West. For heuristic purposes, we follow this dominant usage here, while acknowledging that thinking of competition as central to sport may impose a Western view on activities that their local practitioners may understand differently. Understanding competition as central to sport implies that sport is typically enacted in public events underpinned by complex social organization, with the events being the most visible part of the total phenomenon. Behind the scenes, however, there may be a great deal of sport-like non-competitive physical activity, such as athletes’ daily practice routines. In other contexts, such as the fitness practices that have become widespread throughout the world since the 1980s, competition may not be central to most practitioners, although these practices can potentially be codified into sports such as competitive aerobics. Moreover, even the concept of competition is not straightforward, since in some societies competitions are ‘fixed’ to conform to their social organizations. For example, ritualised footraces, archery, and wrestling reinforced the authority of kings among the ancient Egyptians, Sumerians, and Hittites (Scanlon 2012). In the 1950s, the Gahuku-Gama of the Eastern Highlands of Papua New Guinea played a sport loosely based on rugby to settle disputes, and the game ended in a draw when elders, watching from the sidelines, deemed the dispute solved (Read 1965: 190). In Afghanistan in the 1970s, khans (leaders) hosted buzkashi, a horseback game in which riders compete to seize the carcass of a dead goat and carry it to a goal; the scores were decided by debate, and often the most powerful khan won the debate (Azoy 2011). In games of cricket in the Trobriand Islands in the 1970s, the home team always won (Leach 1976). Late-eighteenth- and nineteenth-century archaeologists had embraced sports as a hallmark feature of ‘Western civilization’ because of the prominent place that Greek games in ancient Olympia and Roman gladiator games in the Coliseum occupied in the archaeological record. But the attempt to arrive at a definition of sport is an anachronism influenced by the fact that the global reach of activities labelled as ‘sport’ today means that what counts or doesn’t count as such is laden with social, cultural, political, and economic repercussions that did not exist in previous epochs. Rather than seeking to establish an all-encompassing definition, anthropological approaches are attentive to the questions of when a particular activity qualifies or not as a sport, for whom, and to what end. A heated debate amongst historians has centred on whether the keeping of records is found in any other historical or cultural contexts, or whether it defined modern sport (Guttmann 2004). Indeed, the use of the English term ‘sport’ to denote an athletic activity governed by rules of competition first appeared in the Oxford English Dictionary in the 1860s, almost simultaneously with the concept of the sports record (Mandell 1976). But the definition of ‘record’ has also proven to be problematic: there are multiple examples of individuals being ranked by their number of victories in such diverse cultural contexts as the ancient pan-Hellenic Games and weightlifting in nineteenth-century Edo Japan. In societies without standardised measurements or timekeeping, it was difficult or impossible to measure sports records in ways we take for granted today. Efforts at record-keeping and quantification for purposes of comparison may not be modern, but what is decidedly modern is the keeping of local, national, world, and other such records that reflect the bureaucratic structure of modern society since the nineteenth century. Until recently, sport was a much more common topic of enquiry in history and sociology than in anthropology. In 1985, Kendall Blanchard and Alyce Cheska made the first attempt to define an anthropological approach to sport in The anthropology of sport: an introduction. They took a multiple subfield approach and ran through a list of archaeological, biological, and cultural theories and concepts that could be applied to sports. The cultural approach was functionalist, i.e. seeking to explain the existence of a feature in terms of the need it is supposed to meet, and did not have the benefit of the feminist, postmodern, and critical cultural studies that were then getting underway in the discipline, so the ideas presented in the book were quickly considered outdated. A pioneer sport ethnographer was Alan Klein, who documented baseball in the Dominican Republic (1991, 2014) and the U.S.–Mexico border (1997) as well as bodybuilding in Los Angeles (1993). By the twenty-first century, the number of ethnographically informed works on sport had increased significantly (for example, Carter 2011; Dyck 2012; Joo 2012; Kelly 2018; Laviolette 2011; Starn 2011; Thangaraj 2015). One reason for the increase was that, more than ever before, sport plays an important role in people’s everyday lives as well as in economics and politics. Another was that sport operates on multiple scales, from intimate aspects of people’s lives to mega-events that bring together the entire world, such as the Olympic Games and the FIFA World Cup. Sport is therefore a particularly attractive field to ask how people’s local lives are intertwined with global processes, a question that stands at the centre of anthropology in the twenty-first century. It is also a productive lens through which anthropologists have studied other important questions about the nature of contemporary society and culture, such as the role of nationalism,  changing norms of gender and sexuality, and the growing role that particular forms of capitalism play in our everyday activities. The emergence of modern sport In nineteenth-century Europe, many forms of sport-like activities preceded the emergence of modern sport. They had unwritten, locally specific rules and particular versions bore only a loose resemblance to others. In the 1840s, standardised ballgames emerged, primarily in elite British public schools, but for several decades their rules were unstable and they coexisted with the localised games of the working classes (Kitching 2015). By the 1880s, national sport associations had codified the rules of most sports as we know them today and two institutions – clubs and schools – quickly began carrying them around the world along with colonialism and imperialism. School sports became part and parcel of industrial capitalism as schools in Britain and Switzerland used them to attract the sons of the British old rank-based and new money-based elites. Club sports followed as the now-grown sons established them wherever they settled as they expanded their global industrial footprint (Lanfranchi & Taylor 2001). Local sports were incorporated into local, national, regional, and international systems that imitated the layers of the political structures emerging at the same time. Modern sports took shape alongside the rise of the nation-state, incorporating rites of nationalism such as flag raising, anthem singing, and parades, as is still evident at many sporting events. National athletic unions that oversaw multiple sports appeared in the last third of the nineteenth century. Although the events they organised were new, they were legitimated by grounding them in a romanticised past, a process that Eric Hobsbawm and Terence Ranger (1983) call the ‘invention of tradition’. This was the case of the revival of the Olympic Games in 1896, which was fuelled by the idealization of classical Greece that had accompanied the rise of modern democracy. Nationalism existed in an uneasy relationship with ethnicity. Folk sports that were standardised and incorporated into the emerging national structures – such as the national school system, the club or professional sport system – held a higher status and were carried abroad along with colonial and imperial projects. Non-Western sports and the sports of ethnic minorities in the West were at a disadvantage. In 1964 judo was the first sport of non-Western origin to enter the Olympic Games (it did not become an official sport until 1972): often hailed as a ‘traditional oriental’ sport, it was actually invented in the 1880s by combining principles of Western physical education with Japanese martial arts (Niehaus 2006). The Chinese martial art of wushu was not accepted onto the program for the Beijing 2008 Olympics despite the heavy pressure that the Chinese government exerted on the IOC (Brownell 2012a). For many ethnic sports, the price of exclusion from the international sport system is a concomitant exclusion from their national sport system, resulting in lack of funding, exclusion from school physical education, and the declining interest of younger generations. A few ethnically marked sports such as judo, wushu and Thai kickboxing (Muay Thai) have managed to thrive and spread internationally; others, such as traditional wrestling in Senegal and India, or kabaddi in India, have maintained a national fan base on account of their intense identification with national and ethnic identities (Hann 2018; Alter 1992, 2000). Generally, however, Western cultural imperialism has replaced local sports with sports of Western origin throughout the world. The disseminators of nineteenth- and early twentieth-century British and North American sports were fervent adherents of muscular Christianity, a form of Protestantism that idealised athleticism, virility, and discipline. They also firmly believed in their own superiority as white men, and used sport to justify masculinism, nationalism, and colonialism (Mangan 1981). In the US sphere of influence, particularly East Asia, the Young Men’s Christian Association (YMCA), offered sports to young men (and to a lesser extent women) to convert them to Christianity (Gems 2006). Arguably, their more lasting contribution to world history was not the diffusion of Christianity but the diffusion of British and North American sports, particularly rugby, football, and cricket (spread by the British), and baseball and basketball (spread by North Americans). Well into the twentieth century, sport was deeply entangled with European colonialism and American imperialism. The racist ideology that undergirded colonialism and slavery extended into sport and generated the enduring stereotype of the ‘natural athlete’ who possesses physical prowess adapted to his ‘savage’ existence, although this stereotype had its opponents among those who believed in the physical superiority of the ‘civilized’ white man (Brownell 2008). Anthropologists have long rejected that race is a biological category and demonstrated that race is a subjective interpretation of people’s superficial appearance, and these interpretations shape the reality of individuals being judged. Individuals may be naturally predisposed to certain forms of physical activity, but to say that entire groups are is nonsensical, because sports skills are the product of individual life histories shaped by social opportunities (Marks 2008: 395). In schools, the military, and the police, colonisers taught sports to the colonised so as to instil in them what they considered civilised values. Later, however, sport became a conduit for decolonization as the colonised appropriated sport toward their own ends. In some cases, the desire of colonised people to beat the coloniser at their own game led to a national passion for a sport. In the Caribbean, cricket games became the stage for anti-colonial resistance against their British masters, as famously documented by Afro-Trinidadian intellectual C.L.R. James (2013). In other cases, the colonised adapted sports to their own social and cultural contexts. Such was the case with cricket in the Trobriand Islands off the coast of Papua New Guinea, made famous in Trobriand Cricket (Leach 1976), a documentary that has delighted many anthropology undergraduates worldwide over the decades with its scenes of several dozen players dancing in military formation to songs larded with sexual innuendos. Sport under capitalism and socialism In the colonial metropoles, sport replicated the class hierarchies on which industrial capitalism was based. In Britain, public-school-educated elites were anxious to distinguish their sporting activities from the rough-and-tumble and morally suspect working-class ballgames. By the 1870s, the government had regulated the punishing industrial work schedules and workers could finally enjoy some free time, and blue-collar boys and men enthusiastically took up the newly codified sports, particularly football, encouraged by factory owners who saw an opportunity to distract them away from social unrest and improve their work ethics (Munting 2003). As football became popular among workers, public schools gradually abandoned it in favour of rugby. Elites used arguments based on moral imperatives to justify the role of sport in maintaining the social divide: the amateur ideal maintained that athletes should be motivated by fair play and honour and not by material interests and was alleged (incorrectly) to have been inherited from ancient Greece (Young 1984). Amateur rules excluded members of the working classes, whose participation in sport often depended on skipping work. Late nineteenth-century Britain saw the eruption of conflict over ‘broken time’, namely compensation for time away from work to engage in sport. The IOC, which has regulated the Olympic Games from their revival in 1896, forbade Olympic athletes from openly receiving payment for competing until the late 1980s (Llewellyn & Gleaves 2016). Continental European and North American IOC members sometimes chafed at the rigidity of British members on this point. In the twentieth century, as elite-level sport became increasingly commodified, social classes became polarised in a different way. In many professional sports, athletes now were largely of working-class or ethnic and racial minority (and later migrant) background, while team owners, managers, and other technocrats were overwhelmingly members of the elite classes. The class structure of sport thus reproduced that of nineteenth-century industrial capitalism, with athletes selling their labour for wages and capitalists owning the labourers, controlling contracts and setting wages. Only recently have court challenges and collective bargaining granted professional athletes greater control over their labour power. In the United States, most elite-level athletes have benefited from athletic scholarships to universities, where they are unremunerated despite generating huge revenues for the institutions (Gilbert 2016). Even at the non-professional level, sport is deeply entangled in social-class politics. We owe the most systematic analysis of these dynamics to French sociologist Pierre Bourdieu (1984), who observed that members of the same social strata tend to gravitate towards the same kinds of sport and have little enthusiasm for (and sometimes despise) the sporting activities associated with other social classes, a process that he labelled ‘distinction’. Football in Britain and France, for example, appeals largely to the lower-middle and working classes, while elites prefer golf, tennis, and skiing. In some cases, these distinctions can be attributed to the resources required (e.g., for most people, skiing assumes the ability to travel, take time off work, and purchase expensive equipment), but in other cases material explanations are insufficient. Sport ‘choices’ thus have the effect of inscribing persons into a particular position in hierarchies of social class, race, ethnicity, gender, sexuality, and age. In reaction to the class, gender, and ethnic distinctions that were already so deeply ingrained in ‘bourgeois’ sport in the early twentieth century, the Soviet Union, after its founding in 1917, attempted to develop an alternative socialist model of sport. Sport in the USSR was originally financed by industries and, after the 1950s, increasingly by the state, as the country began seeking sporting victories to demonstrate the superiority of socialism. State-supported athletes were derogatorily called ‘state shamateurs’ in the capitalist West for violating amateur rules, while socialist countries maintained that they were remunerated as soldiers, workers, or students. The West acquiesced in this fiction because international sports fields were one of the few meeting places where citizens of the communist and capitalist worlds could come together. Socialist nations further demonstrated their commitment to equality in sport by organising sporting events that showcased ethnic minorities. The USSR organised the first Central Asian Games in 1920, which inspired China’s National Games of Minority Nationalities, held quadrennially from 1953 to the present, featuring sports associated with the 55 officially recognised non-Han nationalities. The relationship between sport and ethnic identity was a legacy of the continental European traditions of folklore and ethnology that predominated in Russia and China: traditional sports counted amongst the local customs (along with dances, rituals, and other practices) that scholars used to classify people into ethnic groups. However, these events clearly serve the assimilationist goals of the state (Liebold 2010). In multicultural capitalist countries, indigenous minorities started using sports events as an identity-affirming political strategy in the 1970s. Indigenous peoples of Canada and the United States organised the first Arctic Winter Games in 1970 and the North American Indigenous Games in 1990. These competitions include both indigenous and global sports (Paraschak & Morgan 1997). The neoliberal restructuring of sport In the late twentieth century, the expanding global economy wiped out the socialist experiment (except for China, North Korea, and Cuba) and the inexorable increase of commercialization and professionalism compelled international sport organizations to eliminate the amateur rules. In many parts of the world, neoliberal economic policies privatised television channels, which found in the most popular sports a readily available and at-first inexpensive content with which to fill airtime. Corporate advertisers soon flocked to the new media platform, fuelling the escalation of television broadcasting rights fees. With it came an exponential rise in the wealth of elite clubs, sport federations, and top-level athletes and the dramatically uneven distribution of this wealth, as only a few sports are regularly televised and very few athletes earn enormous salaries. Corporate sponsorship of teams and events attracted multinational sources of capital into sports. Meanwhile, satellite television became commercial in 1982, bringing images of sporting glory to viewers in the Global South. The wealth that today revolves around the most popular sports, such as football, rugby union, and basketball, has mobilised the yearning of ethnically and racially marginalised young men in the destitute urban settings of the Global North. In the inner cities of North America or the underprivileged suburbs of Western Europe, a career in sport was a way out of poverty. Very few actually made it, but ethnic and racial minorities came to numerically dominate some professional sports, such as basketball and American football in the United States, although the corporate structure of the sports continued to be dominated by wealthy white men. More than a century has passed since racist evolutionary theories were abandoned in anthropology, yet in popular culture the hyper-visibility of non-white athletes continues to provoke searches for biological factors that supposedly explain sports skills in terms of race. Sometimes the biological argument about an innate athletic gift is twisted to argue that people of European descent are still superior in the ways that count. For example, Pacific Island and Māori male rugby players are said to be extremely successful players thanks to their ‘natural’ talent, but they are widely branded as undisciplined, unreliable, and unteachable (Hokowhitu 2004; Besnier 2015). Race-based arguments erase the fact that athletic prowess is the result of extraordinary personal efforts, and that young women and men of colour may be disproportionately represented in sports because other paths to mobility are closed to them. Since the 1980s, clubs and teams of the most popular sports like football and basketball, now corporate entities, have been embroiled in a cutthroat competition for economic survival. They have recruited increasing numbers of players in the Global South. Concurrently, many economies in the former colonial world have collapsed as a result of the world’s turn to neoliberal economic policies, and entire countries have become emigrating societies. In this context, many young men, who have been particularly affected by shrinking labour markets, dedicate themselves to sport with the dream of signing a contract with the top teams they watch on satellite television (Besnier et al. 2018).  The transnational mobility of athletes has reconfigured the relationship between national identity and citizenship, as increasing numbers of athletes representing cities and nations are immigrants or children of immigrants. Some countries fast-track migrant athletes to citizenship, most blatantly oil-rich countries in the Persian Gulf, which have sometimes mounted teams consisting mostly of newly-minted citizens from the Global South while at the same time barring access to citizenship to low-level migrant workers who had toiled there for decades (Besnier, Brownell & Carter 2017: 219-22). Sports have become a battleground of racial conflicts, in which some athletes have used their hyper-visibility to protest discrimination, as illustrated in the protests in the United States since 2017 by African-American football players who ‘took a knee’ during the national anthem to protest racial oppression. The decision of team owners in the National Football League to ban the practice as ‘unpatriotic’ served as a reminder that the world of professional and international sport is a system that reproduces racial and other hierarchies extant in society. Although athlete protests have stimulated public debate about race in the United States, there is little evidence that longstanding power structures have been reformed in response. Sport, gender, and sex In the West, most modern sports were a ‘male preserve’ at their inception and continued to be a last bastion of traditional masculinity (Dunning 1986). In the early modern Olympic Games, women competed in sports that did not challenge Western ideals of femininity, such as figure skating and archery, but it was not until 1928 that a few running events were added for women, and not until 1964 that the first team sport, volleyball, was added. In the United States, gender inequality was not addressed until the US Congress enacted in 1972 sweeping legislation known as ‘Title IX’, whose effect on sport was the requirement that women’s sports in schools and universities be allocated the same funding as men’s sports. In contrast, sport in China after the 1949 Revolution quickly became a path to upward mobility for peasant women and never was a male preserve (Brownell 1995). Gender segregation is woven into the very fabric of modern sport. The common argument is that it ensures ‘fair’ competition, since men are thought to be stronger than women. However, there are sports in which women compete successfully with men, such as equestrian events, yet women were only allowed in an equestrian event at the 1952 Olympics. Men and women do not have to be separated by gender, as is evident in mixed-sex sports such as doubles in tennis or mixed-sex running relays. Women might also be competitive with men in some sports if they were divided by weight-class divisions rather than gender (Healy et al. 2014). That the gender line is not just about fairness for female athletes is demonstrated by the fact that the world of sports has been a bastion of heterosexuality, characterised by strong homophobia, from the nineteenth century up to the present. It is ironic, because the Western all-male institutions meant to turn boys into men, such as public schools in Britain and the YMCA in the United States, tacitly encouraged surreptitious same-sex attractions that were forbidden in mainstream society (Gustav-Wrathall 1998). Still today, male professional sports and the international sports system display a homophobia that is in many ways more profound than that of mainstream society. Very few professional athletes have ‘come out’ of their own accord. This has prompted gay, lesbian, and transgender people to form their own associations and events, most prominently the Gay Games held every four years since 1982 (Symons 2010). Moreover, the clampdown on homosexuality has persisted even while rampant sexual abuse of both boys and girls has been endemic in sports and has been covered up by coaches and administrators, a reality that is only now undergoing widespread public examination. The most egregious example is the case of USA Gymnastics national team doctor Larry Nassar of Michigan State University, who was brought to justice in 2017–8 for assaulting hundreds of young female athletes over many years while the institutions turned a blind eye (Carr 2019). Taken as a whole, the history of sex, gender, and sexuality in modern sports reveals sport’s role in defending the gendered structures underpinning industrial capitalist society of the past century and a half, including a fundamental division between male and female, and compulsory heterosexuality.   The ongoing controversies over sex testing reveal the centrality of the gender paradigm in international sports up to the present. Sex testing dates back to the Cold War, when the International Association of Athletics Federations (IAAF) and the IOC instituted a visual exam and later a chromosome test for women on account of the suspicion that the communist block was fielding men masquerading as women in order to win medals. Political tensions were expressed in a gender idiom: questioning the sex of socialist women neutralised the political challenge posed by the gender equality in sport under socialism at a time when Western women were oppressed by the postwar cult of domesticity (Besnier, Brownell & Carter 2017: 129-34).  Sex testing has never exposed a man competing as a woman, but it has identified, often in the worst possible way, a small number of athletes who are intersex; that is, who exhibit non-normative combinations of biological markers of sex (e.g., chromosomes, hormones, genitalia). Most are individuals with Complete Androgen Insensitivity Syndrome, which heightens their testosterone level, although this has never been shown to confer an athletic advantage. Those who are targeted are frequently athletes from the Global South, the best-known case being Caster Semenya, a South African runner who had won world and Olympic championships. The historical realignment of suspicion from the Soviet block to the Global South suggests that global geopolitics plays a role in sex testing in sport despite its appearance as neutral science (Jordan-Young & Karkazis 2019). Sport as cultural performance Sports take on the role of defending fundamental structures of power by putting those structures on public display in embodied form. Such public events are typically organised by elites, who try to control what is put on display so that their social status remains unchallenged. Contextualised in the classic anthropological theory of the gift, sports events take on another dimension (Brownell & Besnier 2016). It is well-known that humans will go into deep debt to fund rituals and ceremonies. While this doesn’t make sense according to market economy logics, it is unproblematic in the context of a gift economy in which elites increase their prestige and strengthen alliances by organising extravagant events. For example, buzkashi in Afghanistan was deeply embedded in a gendered world of men and their competition for reputation through extravagant displays of generosity in grand gatherings during which buzkashi was played (Azoy 2011). Because the gatherings required considerable volunteer labour, only a khan with a large network of kin and non-kin who owed him labour could pull off a buzkashi tournament. Similarly, summer Olympic Games would not be possible without the armies of volunteers who provide basic labour. More heads of state, CEOs of major corporations, billionaires, and celebrities attend Olympic Games than any other world event. There they lavishly entertain guests, display their influence, create relationships with new allies and partners, and seal deals with old ones. The dynamics of buzkashi festivals are found in the Olympics, but on a much grander scale, and critiques of the Olympics that only analyze them through market economic principles may be missing the point. Sports events enthral audiences because they are cultural performances, namely condensed moments when participants consciously represent and evaluate values, roles, and societal institutions (Singer 1959; Turner 1982, 1988). The most widely-read example of such a cultural performance is Clifford Geertz’s (1972) interpretation of cockfighting in Bali in the late 50s, as ‘a story the Balinese tell themselves about themselves’. The metaphors he employed to illuminate the Balinese enthusiasm for cockfights are frequently applied to sports events: they are a mirror for society, an expression of a culture as a whole, and a story that we tell ourselves about ourselves. Three important theorists of cultural performances, Max and Mary Gluckman and Victor Turner, debated whether a sports event could qualify as a secular ritual, a ritual-like behaviour not clearly associated with religious beliefs. They all concluded that sports do not qualify as rituals because they do not possess mystical or liminal qualities. However, subsequent scholars who conducted more research specifically on sports have found it enlightening to apply ritual theories to sports. In particular, they have emphasised that sports events may induce a sense of communitas, a sentiment of solidarity and shared humanity. Scholars have asserted that the World Cup and Olympics create an ‘upsurge of fellow feeling, an epidemic of communitas’ (Dayan & Katz 1992: 196) and ‘an enhanced consciousness of humankind’ (Giulianotti & Robertson 2004: 558; see also Roche 2000; Rothenbuhler 1988). However, these scholars were based in sociology and media studies, while anthropologists were not part of this trend because, since the end of the 1980s, many have become critical of communitas as an overly optimistic concept that fails to recognise that not every participant and spectator is equally vested in the event. Who produces the performance and controls the symbols, whose agenda is served, and who is disadvantaged? Are common people being duped by the elites who organise big events? These questions would best be answered through ethnographic research, but to date there has been little ethnographic work on major sports events that has sought to understand the power relations between elite organisers, spectators, and athletes and their networks. Perhaps predictably, such work has tended to show that the on-the-ground reality is not a simple divide between exploiter and exploited, because major events involve a large number of social groups, the relationships between them are complex and under constant negotiation. Disadvantaged groups can benefit from the media spotlight by drawing public attention to their causes in a way that is not possible under normal circumstances (Klausen 1999; Brownell 2012b; Lindsay 2014). The competition in sports means that the results are unpredictable, and so athletes worldwide deploy a wide range of practices designed to deal with uncertainty and fate, some derived from local cultural contexts, others derived from global flows, blurring the distinction amongst religion, magic, morality, gender, and bodily technique. Their practices include local magical practices (Gmelch 1978), revivalist religions such as Pentecostalism, which is increasingly popular amongst athletes from the Global South (Rial 2012; Guinness 2018; Kovač 2018), as well as sports techniques and training, the ideology of scientific professionalism, and sport psychology. In the national sport of wrestling in Senegal, wrestlers employ the services of marabouts, magico-religious specialists who prescribe potions, amulets, and rituals that merge Islamic and local cosmologies; but they combine the services of the marabouts with the hard training of an individualistic self and commercial sponsorship in the neoliberal mode (Hann 2018). Even when they emigrate to other countries to play professionally, indigenous New Zealand Māori rugby players call upon mana, the supernatural power that draws from their connection to kinship, spirits, and land (Calabrò 2014). Young men from upper-middle and upper-class families in exclusive rugby clubs in Buenos Aires participate in a Christian spiritual movement with the logo of a cross inside a rugby ball. Outside the door of some clubs stands a statuette brought back from the Our Lady of Rugby chapel in southwest France (Fuentes 2018). Body enhancement and its limits Sport has increasingly given us a glimpse into bodies of the future. The records for wheelchair athletes competing in track and road races are faster than those for runners on legs, but the clear separation between human and machine has enabled their segregation into their own divisions, such as the Paralympic Games. In 2015, the IAAF banned South African runner Oscar Pistorius, a lower-limb double amputee, from competing with the argument that the properties of the carbon-fiber prosthetic legs he wears gave him an unfair advantage, but he successfully sued and made it to the 400-metres semi-finals in the Rio 2016 Olympic Games. His case opened up entirely new ethical dilemmas, but since no other Paralympian has achieved his level of success, Pistorius must be credited with a great deal of talent, whatever advantage his prostheses might have given him. However, new technologies may soon allow even average athletes to compete with top natural-limbed athletes. Gene doping, the non-therapeutic use of genetic enhancement to improve sports performance, does not yet exist, but genetic manipulation has produced ‘super-mice’ with superior strength and endurance. So far as we know this has not yet been tried on humans, but it was banned in 2003 as a preemptive strike by the World Anti-Doping Agency. Clearly, the future holds novel technologies that will bring along increasingly complicated ethical dilemmas extending beyond the world of sports. Are we heading toward ‘transhuman athletes’ who have exceeded the bounds of normal human capabilities (Miah 2010)? All elite athletes exceed the bounds of normal capabilities—whether because they are taller or shorter than average, have large lung capacity, or any number of other physical traits. In the future, maybe it will become common practice for average humans to seek genetic and prosthetic enhancement in order to succeed in sports, careers, and life. Should this be prohibited? If defending class and gender lines occupied the greater part of the attention of administrators of international sport in the nineteenth and twentieth centuries, it may be that defending the line between what is ‘human’ and what is not will occupy them in the twenty-first century. Conclusion: sport and scale By the beginning of the twenty-first century, the wealth that revolved around sport, particularly the major international sports, had become so huge and its presence in popular culture so powerful that the longstanding tendency amongst academics, journalists, and many politicians to dismiss it as inconsequential began to change. Critics of sport mega-events, particularly the FIFA World Cup and Olympic Games, became increasingly vocal, countering rhetoric about the potential of sport to contribute to a better world by publicising violations of human rights common in the context of mega-events, such as mass evictions for construction, the silencing of dissidents, the exploitation of migrant workers, and the corruption by government officials and the leaders of sport organizations. ‘Social responsibility’ in sport became a keyword taken up by sport organizations in response to the critics. Sport is somewhat unique in the repertoire of human activities in that it connects the intimacy of bodies, emotions, and personal projects to a global system of capital, world politics, and mega-spectacles. These connections operate on multiple fronts. For example, the collapse of economies in the Global South under pressure from neoliberal policies has destroyed labour markets, while the glamour of sport broadcast on satellite television fuel impossible dreams of sporting success among disenfranchised youth in these countries. Anthropologists are concerned to make sense of all the entanglements of the world in which we live, and sport distils them into clearer structures that can help us comprehend the complex whole. Further reading Besnier, N., S. Brownell & T.F. Carter 2017. The anthropology of sport: bodies, borders, biopolitics. Oakland: University of California Press. Besnier, N. & S. Brownell 2012. Sport, modernity, and the body. Annual Review of Anthropology 41, 443-59. Alter, J.S. 1992. The wrestler’s body: identity and ideology in North India. Berkeley: University of California Press. ——— 2000. Kabaddi, a national sport of India: the internationalization of nationalism and the foreignness of Indianness. In Games, sports and cultures (ed.) N. Dyck, 81-115. Oxford: Berg. Azoy, G.W. 2011 [1982]. Buzkashi: game and power in Afghanistan. Long Grove, Ill.: Waveland. Besnier, N. 2015. Sports mobilities across borders: postcolonial perspectives. International Journal of the History of Sport 32, 849-61. ———, D. Guinness, M. Hann & U. Kovač 2018. Rethinking masculinity in the neoliberal order: Cameroonian footballers, Fijian rugby players, and Senegalese wrestlers. Comparative Studies in Society and History 60(4), 839-72. Blanchard, K. & A.T. Cheska 1985. The anthropology of sport: an introduction. South Hadley, Mass.: Bergin & Garvey.  Bourdieu, P. 1984 [1979]. Distinction: a social critique of the judgement of taste (trans. R. Nice). Cambridge, Mass.: Harvard University Press. Brownell, S. 1995. Training the body for China: sports in the moral order of the People’s Republic. Chicago: University Press. ——— (ed.) 2008. The 1904 Anthropology Days and Olympic Games: sport, race, and American imperialism. Lincoln: University of Nebraska Press.  ——— 2012a. Wushu and the Olympic Games: ‘combination of East and West’ or clash of body cultures? In Perfect bodies: sports, medicine and immortality (ed.) V. Lo, 61­-72. London: British Museum. ——— 2012b. Human rights and the Beijing Olympics: imagined global community and the transnational public sphere. British Journal of Sociology 63(2), 306-27. ——— & N. Besnier 2016. Do the Olympics make economic sense? The Olympic Games aren’t financially rational, but their value can be explained in other ways. Sapiens. The Wenner-Gren Foundation for Anthropological Research (available on-line: Calabrò, D.G. 2014. Beyond the All Blacks representations: the dialectic between the indigenization of rugby and postcolonial strategies to control Māori. Contemporary Pacific 26(2), 389-408. Carr, E.L. At the heart of gold: inside the USA Gymnastics scandal (prod. S. Ungerleider & D.C. Ulich). New York: HBO documentaries, 2019. Carter, T.F. 2011. In foreign fields: the politics and experiences of transnational sport migration. London: Pluto. Dayan, D. & E. Katz 1992. Media events: the live broadcasting of history. Cambridge, Mass.: Harvard University Press. Dunning, E. 1986. Sport as a male preserve: notes on the social sources of masculine identity and its transformations. In Quest for excitement: sport and leisure in the civilizing process (eds) N. Elias & E. Dunning, 267-83. Oxford: Basil Blackwell. Dyck, N. 2012. Fields of play: an ethnography of children’s sports. Toronto: University Press. Fuentes, S. 2018. Rugby, educación solidaria y riqueza en las elites de Buenos Aires: la construcción de una clase moral. Etnográfica 22(1), 53-73.  Geertz, C. 1972. Deep play: notes on the Balinese cockfight. Dædalus 101(1), 1-37.  Gems, G. 2006. The athletic crusade: sport and American cultural imperialism. Lincoln: University of Nebraska Press.  Gilbert, D.A. 2016. Not (just) about the money: contextualizing the labor activism of college football players. American Studies 55(3), 19-34. Giulianotti, R. & R. Robertson 2004. The globalization of football: a study in the glocalization of the ‘serious life’. British Journal of Sociology 55(4), 545-68. Gmelch, G. 1978. Baseball magic. Human Nature 1(8), 32-40.  Guinness, D. 2018. Corporal destinies: faith, ethno-nationalism, and raw talent in Fijian professional rugby aspirations. HAU 8(1-2), 314-28. Gustav-Wrathall, J.D. 1998. Take the young stranger by the hand: same-sex relations and the YMCA. Chicago: University Press. Guttmann, A. 1994. Games and empires: modern sports and cultural imperialism. New York: Columbia University Press. Guttmann, A. 2004 [1978]. From ritual to record: the nature of modern sports. New York: Columbia University Press. Hann, M. 2018. Sporting aspirations: football, wrestling, and neoliberal subjectivity in urban Senegal. PhD thesis, Amsterdam Institute of Social Science Research, University of Amsterdam. Healy, M. L., J. Gibney, C. Pentecost, M. J. Wheeler, & P. H. Sonksen 2014. Endocrine profiles in 693 elite athletes in the postcompetition setting. Clinical Endocrinology 81(2), 294-305. Hobsbawm, E. & T. Ranger 1983. The invention of tradition. Cambridge: University Press. Hokowhitu, B. 2004. Tackling Māori masculinity: a colonial genealogy of savagery and sport. The Contemporary Pacific 16, 259-84. James, C.L.R. 2013 [1953]. Beyond a boundary. Durham, N.C.: Duke University Press.  Joo, R.M. 2012. Transnational sport: gender, media, and global Korea. Durham, N.C.: Duke University Press. Jordan-Young, R. & K. Karkazis 2019. Testosterone: an unauthorized biography. Cambridge, Mass.: Harvard University Press.  Kelly, W.W. 2018. The sportsworld of the Hanshin Tigers: professional baseball in modern Japan. Oakland: University of California Press. Kitching, G. 2015. The origins of football: history, ideology and the making of ‘The People’s Game.’ History Workshop Journal 79(1), 127-53. Klausen, A.M. (ed.) 1999. Olympic Games as performance and public event: the case of the XVII Winter Olympic Games in Norway. Oxford: Berghahn. Klein, A. 1993a. Sugarball: the American game, the Dominican dream. New Haven, Conn.: Yale University Press. ——— 1993b. Little big men: bodybuilding subculture and gender construction. Albany: State University of New York Press. ——— 1997. Baseball on the border: a tale of two Laredos. Princeton, N.J.: University Press. ——— 2014. Dominican baseball: new pride, old prejudice. Philadelphia: Temple University Press.  Kovač, U. 2018. The precarity of masculinity: football, Pentecostalism, and transnational aspirations in Cameroon. PhD thesis, Amsterdam Institute of Social Science Research, University of Amsterdam. Lanfranchi, P. & M. Taylor. 2001. Moving with the ball: the migration of professional footballers. Oxford: Berg. Laviolette, P. 2011. Extreme landscapes of leisure. Farnham, U.K.: Ashgate. Leach, J. 1976. Trobriand cricket: an ingenious response to colonialism (prod. G. Gildea & J. Leach). Port Moresby: Papua New Guinea Office of Information. Leibold, J. 2010. The Beijing Olympics and China’s conflicted national form. The China Journal 63, 1-24. Llewellyn, M.P. & J. Gleaves 2016. The rise and fall of Olympic amateurism. Urbana: University of Illinois Press. Mandell, R. 1976. The invention of the sports record. Stadion 2(2), 250-64. Mangan, J.A. 1981. Athleticism in the Victorian and Edwardian public school: the emergence and consolidation of an educational ideology. Cambridge: University Press. Marks, J. 2008. The growth of scientific standards from Anthropology Days to present days. In The 1904 Anthropology Days and Olympic Games: sport, race, and American imperialism (ed.) S. Brownell, 383-96. Lincoln: University of Nebraska Press. Miah, A. 2010. Towards the transhuman athlete: therapy, non-therapy and enhancement. Sport in Society 13(2), 211-33. Munting, R. 2003. The games ethic and industrial capitalism before 1914: the provision of company sports. Sport in History 23(1), 45-63. Niehaus, A. 2006. ‘If you want to cry, cry on the green mats of Kôdôkan’: expressions of Japanese cultural and national identity in the movement to include judo into the Olympics. International Journal of the History of Sport 23(7), 1173-92. Paraschak, V. & W.J. Morgan 1997. Variations in race relations: sport­ing events for Native Peoples in Canada. Sociology of Sport Journal 14(1), 1-21. Read, K. 1965. The high valley. New York: Charles Scribner’s Sons. Rial, C. 2012. Banal religiosity: Brazilian athletes as new missionaries of the neo-Pentecostal diaspora. Vibrant 9(2), 128-59. Roche, M. 2000. Mega-events and modernity: Olympics and expos in the growth of global culture. London: Routledge. Rothenbuhler, E.W. 1988. The living room celebration of the Olympic Games. Journal of Communication 38(4), 61-81. Scanlon, T. 2012. Contesting authority in ancient myth and sport. In From Athens to Beijing: West meets East in the Olympic Games (ed.) S. Brownell, 87-109. New York: Greekworks. Starn, O. 2011. The passion of Tiger Woods: an anthropologist reports on golf, race, and celebrity scandal. Durham, N.C.: Duke University Press. Symons, C. 2010. The gay games: a history. Abingdon, U.K.: Routledge. Thangaraj, S. 2015. Desi hoop dreams: pickup basketball and the making of Asian American masculinity. New York: University Press. Young, D.C. 1984. The Olympic myth of Greek amateur athletics. Chicago: Ares. Some of Niko Besnier’s research discussed in this article received funding from the European Research Council under Grant Agreement 295769 for a project titled ‘Globalization, sport and the precarity of masculinity’ ( Susan Brownell received funding for some of the research discussed here from International Studies and Programs and the College of Arts & Sciences at the University of Missouri-St. Louis. Note on contributors Niko Besnier is Professor of Cultural Anthropology at the University of Amsterdam. His books include On the edge of the global: modern anxieties in a Pacific island nation (2011) and Gossip and the everyday production of politics (2009). He is co-editor of Gender on the edge: transgender, gay, and other Pacific Islanders (2014) and Crisis, value, and hope: rethinking the economy (2014). In 2014–9, he was editor-in-chief of American Ethnologist. Niko Besnier, Afdeling Antropologie, Universiteit van Amsterdam, Postbus 15509, 1001 NA Amsterdam, The Netherlands. Susan Brownell is Professor of Anthropology at the University of Missouri-St. Louis. She is the author of Training the body for China: sports in the moral order of the People’s Republic (1995) and Beijing’s games: what the Olympics mean to China (2008), and is the editor of The 1904 Anthropology Days and Olympic Games: sport, race, and American imperialism (2008). Susan Brownell, Department of Anthropology & Archaeology, 507 Clark Hall, One University Boulevard, St. Louis, MO 63121-4400, United States. If you liked what you just read Support the encyclopeadia
Arte Povera mixed media & sculptures ArtePovera attempted to create a new sculptural language through the use of humble, everyday materials. By using non-precious and impermanent materials such as soil, rags, and twigs, Arte Povera artists sought to challenge and disrupt the commercialization of art. • Although Arte Povera is most notable for its use of simple, artisanal materials, it did not use these to the exclusion of all else. Some of the group’s most memorable work comes from the contrast of unprocessed materials with references to the most recent consumer culture. Believing that modernity threatened to erase our sense of memory along with all signs of the past, the Arte Povera group sought to contrast the new and the old in order to complicate our sense of the effects of passing time. Arte Povera’s interest in “poor” materials can be seen as related to Assemblage, an international trend of the 1950s and 1960s that used similar materials. Both movements marked a reaction against much of the abstract painting that dominated art in the period. They viewed it as too narrowly concerned with emotion and individual expression, and too confined by the traditions of painting. Instead, they proposed an art that was much more interested in materiality and physicality, and borrowed forms and materials from everyday life. Arte Povera might be distinguished from Assemblage by its interest in modes such as performance and installation, approaches that had more in common with pre-war avant-gardes such as Surrealism, Dada and Constructivism. In addition to opposing the technological design of American Minimalism, artists associated with Arte Povera also rejected what they perceived as its scientific rationalism. By contrast, they conjured a world of myth whose mysteries couldn’t be easily explained. Or they presented absurd, jarring and comical juxtapositions, often of the new and the old, or the highly processed and the pre-industrial. By doing so, the Italian artists evoked some of the effects of modernization, how it tended to destroy experiences of locality and memory as it pushed ever forwards into the future.
24 Becomes The First Television Show Ever To Be Carbon Neutral Nearly a year after announcing its aim to reduce its carbon footprint and inspire its viewers to do the same, "24," the Emmy award-winning series from Imagine and Twentieth Century Fox Television, has far exceeded its carbon-reduction goals and will be the first television production ever to achieve carbon neutrality. Through aggressive and innovative changes in its production practices, the show reduced the carbon emissions associated with its production by a staggering 43%, and to demonstrate a further commitment to leading the television industry on the issue, "24" has purchased high-quality carbon offsets to address its remaining unavoidable emissions. Tell Us What You Think Leave your feedback
Intermediate Egrets Heron Information ... Heron Species (Listing) ... Heron Species Photos Intermediate Egrets Intermediate Egret: Non-breeding versus breeding plumageThe Intermediate Egret (Ardea intermedia) is a medium-sized heron. This species, as its name implies, it is intermediate in size between the Great Egret and smaller white egrets like the Little Egret and Cattle Egret, though nearer to the Little than the Great. Distribution / Range It is a resident breeder from east Africa across tropical southern Asia to Australia. Nesting / Breeding It often nests in colonies with other herons, usually on platforms of sticks in trees or shrubs. Two to five eggs are laid, the clutch size varying with region. It is about 90cm tall with all white plumage, generally dark legs and a thickish yellow bill. Breeding birds may have a reddish or black bill, greenish yellow gape skin, more loose filamentous plumes on their breast and back, and dull yellow or pink on their upper legs (regional variations). Males and females look alike. Diet / Feeding The Intermediate Egret stalks its prey methodically in shallow coastal or fresh water, including flooded fields. It eats fish, crustaceans and insects. Intermediate Egret Intermediate Egret Identify from Great Egret The non-breeding colours are similar, but the Intermediate is smaller, with neck length a little less than body length, a slightly domed head, and a shorter, thicker bill. The Great Egret has a noticeable kink near the middle of its neck, and the top of its longer bill nearly aligns with the flat top of its head. Close up, the bare skin of the Great Egret's gape line extends in a dagger shape behind the eye, while the Intermediate's is less pointed and ends below the eye. The Intermediate tends to stalk upright with neck extended forward. The Great is more patient, often adopting a sideways-leaning "one-eyed" stance. Identify from Little Egret Little Egrets have yellow-soled feet. They often run after fish in shallow water. Breeding birds have long nuptial plumes on the back of their heads Intermediate Egret (Ardea intermedia) Intermediate Egret in flight Intermediate Egret in flight
Christmas season animal cruelty that gave rise to vegetarianism slaughter house in Elburgon Workers slaughter goats at a slaughter house in Elburgon, Nakuru. In the eighteenth century calves and pigs were whipped to death with knotted ropes, and bulls killed only after dogs had baited them. PHOTO | JOHN NJOROGE   Christmas is a special time of the year for many people around the world. Families get together to share food, gifts and happy times. It is supposed to be the festival of peace and happiness yet it has never been a good season for animals. Goats are the favourite delicacy of choice in Kenya and they are slaughtered in their thousands during this festive season, in homes, abattoirs, hotels and other places of entertainment. Chicken come a close second and often go side by side with goat. In many western countries, turkey is the favourite meal for Christmas. But if you think that this is cruel, the situation was rather worse in England two or three centuries ago. According to Ian Jack, writing in The Guardian, Christmas dinner was preceded by an artisanal cruelty in all its terrible variety. For instance, poultry: the less they ran and flattered about the fatter they got, so geese would be nailed by their webbed feet to the floor, while chickens and game birds were confined to windowless cells, sometimes after their keeper had taken the extra precaution of blinding them or cutting off their legs while still alive. Mammals were, literally, a tougher proposition. Popular belief said that meat was best tenderised while it was still alive, so calves and pigs were whipped to death with knotted ropes, and bulls killed only after dogs had baited them. Succulent Dorset lambs, according to historian Keith Thomas, arrived at the tables of Georgian gentry only after a lengthy imprisonment in “dark little cabins.” A desire for paler meat led to longer deaths. A calf’s executioner, having cut the animal at the neck, would let it bleed for a while and then staunch the wound for a day to let death come slowly. As for turkeys, the custom was to snip a vein inside their mouths and hang them upside down, so that their blood dripped out little by little. The upside-down position remains a constant of turkey slaughter today, though the process is industrial, possibly less painful and necessarily quicker. Bread and cheese kept the poor alive in 18th century England, but the middle and upper classes stuffed themselves with roasts, steaks and chops; a morning, noon and night gluttony that turned England into the most carnivorous country in Europe and left many of its wealthier population corpulent and suffering from gout. In his excellent history of vegetarianism, The Heretic’s Feast, Colin Spencer suggests that the consequent revulsion against the obese and the drunk, slobbering under their cockeyed wigs, made the idea of a strict vegetable and water diet almost fashionable. The “almost” is important because people like Benjamin Franklin who took up the vegetarian diet usually put it down again, seeing it as a cure, the equivalent of two weeks rehab in the Priory, rather than a lifetime commitment. Percy Bysshe Shelley was probably the cause’s most celebrated advocate until George Bernard Shaw and Mahatma Gandhi came along adding economic efficiency to a list that already included human well-being and the humane treatment of animals. Other than sounding like an animal-rights activist, I hope I have made you feel better about your murderous pursuits this festive season. It could get a lot worse, if that gives you cold comfort! Spare a thought for those that are less fortunate this Christmas and of course those poor animals and fowls! Merry Christmas!
Saint Adalbert Saint Adalbert,st adalbert,catholic saint Saint Adalbert was a bishop of Prague, martyred in his efforts, to convert the Baltic Prussians. He was made the patron saint of Bohemia, Poland, Hungary, and PrussiaHe was born in a Czech noble family of Prince Slavník in Libice. His father was a rich and independent ruler of the Zličan princedom that rivaled Prague. He had five full brothers: Soběbor , Spytimir, Pobraslav, Porej, Caslav and a half-brother Radim. Radim chose a clerical career as did Adalbert, and the name Gaudentius. Adalbert was well educated, having studied for about ten years in Magdeburg under Saint Adalbert of Magdeburg. Upon the death of his mentor, he took on the name Adalbert. Adalbert soon became well-known all over Europe. In 989 He went to Rome and lived as a hermit in St. Alexis Benedictine monastery. Four years later, in 993, Pope John XV sent him back to Bohemia. Adalbert became the Bishop. He founded a monastery in Břevnov, near Prague, In 995 Slavniks' former rivalry with the Přemyslids resulted in the storming of Libice and a cruel murder of four or five of Adalbert's brothers. All this was done by Boleslav II of Bohemia, and the executioners were his confederates from a powerful clan of Vršovci. The Zličan princedom became part of the Přemyslids' estate. Adalbert went to Hungary and baptized Géza of Hungary and his son Stephen in Esztergom. He then went to Poland where he was cordially welcomed by Bolesław I the Brave. After the short visit Adalbert went to Prussia with a Christian mission. Christian missionaries chopped down sacred oak trees, because the trees were worshipped and the spirits who were believed to inhabit the trees were feared for their powers, this was done to show the non-Christians that no supernatural powers protected the trees from the Christians. Saint Adalbert,st aldalbert,catholic prayer They did not heed warnings to stay away from the sacred oak groves; Adalbert was executed for sacrilege, which his co-religionists interpreted as martyrdom, in April 997 on the Baltic Sea coast east of Truso. His body was bought back for its weight in gold by Boleslaus the Brave. Later Adalbert was canonized as Saint Adalbert of Prague. His life has been written about in Vita Sancti Adalberti Pragensis by various writers.. Born c. 956, Libice nad Cidlinou, Bohemia Died 997, Truso (Elbląg) or Kaliningrad Oblast Venerated in Roman Catholic Church Major shrine Gniezno, Prague Feast April 23 Patronage Bohemia; Poland; Prussia Finesh reading about Saint Adalbert, Bring me back to Catholic Saints
AI And Machine Learning: How Much Data Is Enough? It's no secret that artificial intelligence is on every executive's mind. In enterprises across the globe, business leaders are talking about how to take advantage of AI insights and build new revenue streams. Six out of 10 C-level executives surveyed by Forbes Insights believe AI is a key enabler of their organization's future success. Four out of five of those organizations have AI programs in place or are currently piloting them; 74 percent have 10 or more separate initiatives underway. The oxygen that breathes life into these programs is data. You can't build, validate, or measure the success of a machine learning model without the right amounts and types of data, notes Yiwen Huang, CEO of, an automated machine learning platform. "The amount of data you have is important, but what's more important is whether the attributes of that data and its distribution represent the population you're going after," he says. For many organizations, the sheer volume of data they have is a problem, it’s not just a matter of needing more and more data but also of understanding how to manage and value the data you already have, says Ray O'Farrell, executive vice president and CTO of VMware.  The bigger issue is identifying and organizing that data that has the most value to the organization, understanding where you might be missing some data, and then managing it in a way that is consistent and compliant with privacy, security and frequently with ethical rules. "Questions I hear quite often from our customers are, 'Do we have the right types of data to fuel our AI programs' and, 'How do we value it?'" says O'Farrell. "Organizations know there's value in the data they've collected, but they don't always know how to quantify that value or how to extract it." The worth or value of this data may also change over time: often information loses its value as it gets older or becomes “out of date”, but that's not always the case, says O'Farrell. The value of a data set may suddenly increase or decrease in value in response to an external event. Take autonomous vehicles, for example. With video, LiDAR, and other sensors, testing and training driverless cars generates and archives enormous amounts of data, the vast majority of which is repetitive and offers little immediate value. "Ninety percent of the time nothing interesting happens," he says. "But at a future time, one of those vehicles is in an accident: now the manufacturer needs to go back and understand whether it validated the safety model correctly. The value of that data is now suddenly much higher, possibly even from a legal POV.” To be safe, many organizations seem to default to keeping all data in case they might one day need it, O'Farrell says. But the more data organizations keep, the more resources they must expend to store and secure it. The larger that data trove becomes, the more tempting a target it is for external attackers. And when that data is controlled by multiple siloed units within a company, the potential for compliance issues and data breaches grows significantly. No Single Source of Truth While organizations collect massive amounts of data, they aren't necessarily keeping it all in the same place or handling it in the same way. In the Forbes Insights survey, 68 percent of companies surveyed are actively building a company-wide roadmap for handling data, but only 11 percent have completed it. Just two percent say they have a solid data governance process in place across the enterprise. And that's often a direct consequence of information silos. In most organizations, the information technology department has a good data strategy in place, says O'Farrell. But IT often isn't the only group collecting data. If an organization has deployed IoT sensors, for example, that data is usually handled by a separate operations technology team. Meanwhile, sales and marketing typically collect and manage customer data. Not only do disparate groups end up managing data using different policies, they may be storing it in different places – on premise, in the cloud, or at the edge. Those decisions are typically based on the nature of the data and how it's used, says O'Farrell. If you're serving up a million videos a day to people's phones, you want that data in the cloud and distributed widely. If you're securing customer or employee records, you're more likely to keep it close to home in your data center, or if it is in the cloud you need assurances of sovereignty and security (even as to where the data is located and the ability to delete it). But these silos make it harder for organizations to apply analytics across their entire data set, leading to the potential for conflicts and compliance issues. Enterprise data is also likely to be mirrored, replicated, or backed up in multiple places, notes O'Farrell. Under the EU's General Data Protection Regulation (GDPR), an organization's customers have some rights to ask that their information be “forgotten”. The sheer number of places where that data might reside makes fulfilling such a request enormously complicated. The data storage problem becomes more acute when dealing with industries that are highly regulated, such as financial services or healthcare. "Companies are uncomfortable with having multiple sources of truth," O'Farrell says. "They're uncomfortable not knowing where their data is, or whether it's private and secure. Companies are starting to ask, 'How do I unify and coordinate this in some fashion?'" Data that leaders want The challenges posed by the data deluge lead some enterprises to seek out a new class of executives who combine business acumen with analytics expertise, says Scott Snyder, a partner with Heidrick & Struggles, an executive search and consulting firm based in Chicago.  "At Heidrick we place a lot of leadership positions like Chief AI Officer and Chief Data Officer," Snyder continues. "We're also looking for people with data-intensive backgrounds who can graft those skills with institutional or functional knowledge, such as HR, legal, or supply chain. Companies are very interested in finding those kinds of leaders." While O'Farrell doesn't necessarily see the need for a chief data officer, he says every large organization needs someone who can look at these issues from a 30,000-foot view to ensure that its data sets are up to date and relying upon the best sources of information. "What I've seen is the emergence of a digital officer as a subset of the CIO organization," he says. "As organizations extract ever more insights from all this data, I definitely see the need for someone who can look at an organization's data policies on a macro level, to make sure the data is valid and secure, its source is known and ensure they're using the data in a legally and ethically compliant fashion.” Agility, faster decision making, and smarter innovation. When you partner with Dell Technologies, we provide you with the transformational devices, processes and service...
A human landscape opens up in front of us where the planetary changes are steered less by natural forces and rational sense, and more by fanciful attempts to achieve abstract freedom, spirituality and beauty. Soon after all the areas of the globe had been mapped, conquering space became one of humanity’s most important missions. The Russian cosmists of the 19th century saw the Earth as a ship, which enabled them to travel towards God. The name of Antti Majava’s exhibition, Victory of the Sun, refers to the plan for an opera named Victory over the Sun, which was created during the futurists’ first all-Russian union meeting in the town of Polyany in the summer of 1913. This opera became a culmination point for the art movement called Suprematism, which was possibly best known for Kazimir Malevich’s extreme abstractions, such as a black square on a white background. Malevich’s Suprematist Manifesto (1915) begins with these words: ”Under Suprematism I understand the supremacy of pure feeling in creative art. To the Suprematist the visual phenomena of the objective world are, in themselves, meaningless; the significant thing is feeling, as such, quite apart from the environment in which it is called forth.” In 1921 Malevich wrote to his comrade Osip Brink: ”The earth’s surface is not organised. It is covered with seas, mountains. Some nature exists. I want to create instead of that nature, a Suprematist nature, build pursuant to laws of Suprematism. Hannah Arendt begins her book The Human Condition (1958) by describing the flight of the first satellite through empty and silent space as it revolves around the Earth. According to Arendt, satellites and space programmes illustrate one of the basic traits of Western thinking: experiencing the body and the Earth as factors that restrict life and thinking. In 2016, man has dominance over all ecosystems on Earth through land use, global warming, ocean acidification and numerous other changes. Antti Majava’s Victory of the Sun reflects the suprematists and researchers’ views on ecological development until the present day. He simultaneously reflects on the role of the arts as a builder of the current condition of humanity, and in producing and spreading information which is highly important for our future.
Photograph by Tom Murphy Read Caption A grizzly bear in a field of wildflowers in Yellowstone National Park, Wyoming. Photograph by Tom Murphy Will Grizzly Bears Survive Being Hunted? Fierce debate brews over whether Greater Yellowstone bears should be hunted, as a federal judge has postponed hunting seasons in two states. For more than 40 years, it’s been illegal to hunt grizzly bears in the area surrounding Yellowstone National Park, after widespread killing of the creatures left their total regional population severely depleted. But last year, the federal government declared Yellowstone grizzlies as officially recovered and no longer in need of the protections normally afforded to endangered species. That paved the way for hunts to be planned in Wyoming, which set a quota for 22 of the animals, and Idaho, which set its quota at one bear. But on August 29, two days before the hunting seasons was to start, a federal judge temporarily blocked the states from going forward, for a period of two weeks. During these 14 days U.S. District Judge Dana L. Christensen, in Missoula, Mont., will deliberate over the merits of a suit brought by conservation groups against the Trump administration’s rule to strip grizzlies of endangered species protections. In announced the temporarily block, Christensen has for now sided with the conservation groups, who argue that hunting would cause “irreparable harm” to Yellowstone-area grizzlies. In the Field The federal government made its decision after gathering data from animals like Grizzly Bear 927, a 300-pound male grizzly bear who, drawn to a pungent deer leg early one June morning, was sedated by researchers. He woke a few hours later with a lip tattoo, an ear tag, a GPS radio collar. Researchers say information collected from bears like this one hold the key to the species’ future, after nearly half a century on the endangered species list. Whether the solitary carnivores can sustain an annual hunting season is a subject of fierce debate. Set aside the ethical discussion—whether or not people should kill grizzlies for sport—and some wildlife managers say the bears’ population can absorb limited hunting. (Read about how Jane Goodall joined Wyoming protestors in buying up grizzly hunt tickets.") “Large carnivores are never short of controversy,” says Dan Bjornlie, a large carnivore biologist with the Wyoming Game and Fish Department. “But hunting, as long as it’s maintained within the mortality thresholds, is not a threat.” Critics disagree. Bear numbers might be greater than they were in the ‘70s, when over-hunting, human expansion and a general effort to eradicate carnivores seen as dangerous to humans and livestock saw the species’ population plummet as low as 136 bears in the wild, but that doesn’t mean they are stable enough to allow for sport hunting, says Bonnie Rice, senior representative of the Sierra Club in the Greater Yellowstone and Northern Rockies Region. “This population is always going to be vulnerable,” Rice says. “It’s the second-slowest reproducing mammal in North America....It’s a species that can’t take that kind of driving down of the population.” An “Ultra Conservative” Estimate Beyond the controversy, most wildlife researchers and conservation groups agree that the Yellowstone grizzly bear’s comeback is a remarkable success story. Officially, more than 700 bears now live in the Greater Yellowstone Area. Researchers say that estimate is low, and as many as 1,000 may actually wander the remote mountains and valleys. The population can support hunting because it has reached its carrying capacity in many portions of core habitat, says Frank van Manen, leader of the Interagency Grizzly Bear Study Team, a group of scientists formed by the Department of Interior. And scientific data like that collected from Bear 927 can help effectively manage a hunt by tracking not only the total number of bears, but also factors that affect how many bears could be sustainably removed from the population by hunting, such as the number of reproducing females and survival rates of their young. Each spring and summer, biologists spend several months capturing bears in and around Yellowstone. Almost all of the bears get GPS or VHF collars to track their movements, survival and reproduction. The resulting information, combined with confirmed sightings of females with cubs, are fed into a series of formulas used to estimate annual mortalities and the species’ overall population. “When they came up with ways to estimate it, they wanted to be ultra conservative that there was no way you could overestimate the population,” Bjornlie says. “We’re currently underestimating the population a lot.” Protecting Populations So what will protect bears from dropping to the same numbers they did decades ago? Grizz Quiz: How Much Do You Know About Grizzly Bears? Wildlife filmmaker and ecologist Chris Morgan helps bust some common myths about the grizzlies of Washington's North Cascades. The Short Film Showcase spotlights exceptional short videos created by filmmakers from around the web and selected by National Geographic editors. The filmmakers created the content presented, and the opinions expressed are their own, not those of National Geographic Partners. Multiple safeguards, managers say. Western states can technically hold hunts if the population estimate is above 600, at which point states begin to receive a small percentage of the extra bears. However, there likely wouldn’t be enough extra bears to hunt until the population reached closer to 674, Bjornlie says. This year Wyoming voted to allow 10 male bears and one female bear to be potentially killed in what’s called the “demographic monitoring area,” a relatively undeveloped swath of land considered suitable habitat, and 12 male or female bears outside of it. Idaho decided on one male bear tag, while Montana declined to hold a hunt. Only one hunter can be in the field in Wyoming’s core area at a time. If a female is killed, the hunt ends because it would be difficult for future hunters to tell whether they were aiming at a male or a female. If a hunter in Idaho kills a female, then that female will be subtracted from the next year’s quota, Bjornlie says. If the grizzly population drops further, to below 500, they could be placed back on the endangered species list pending a federal review. Planning for the Unknown Environmentalists like Rice says those contingencies offer little comfort. The Sierra Club is one of several groups suing the federal government to place bears back on the endangered species list. A judge will decide in late August. Rice worries about a lack of genetic diversity—Yellowstone’s grizzlies are disconnected from any other bear populations—and shifting food sources. Climate change may be reducing the annual crop of whitebark pine nuts, a favorite grizzly food source. Researchers from the interagency team say the data shows bears are well equipped to survive those challenges. When whitebark pine cone production drops, for example, bears switch to elk calves or bison, says van Manen. There are enough Yellowstone grizzlies to prevent most inbreeding. And the rising number of fatalities in young bears is largely attributable to the climbing density of adult bears, which are now likely killing cubs. Whether or not a hunter pulls the trigger in September, researchers like Bjornlie will remain in the field trapping bears like 927, keeping tabs on one of the world’s most-studied bear populations. Editor’s note: This story was originally published August 1, 2018. It was updated on August 31 to include new developments.
A Different Perspective on Marbled Murrelets USFWS Pacific, Flickr Creative Commons USFWS Pacific, Flickr Creative Commons During a recent conversation with a fellow birding friend, the topic of marbled murrelets came up. Although marbled murrelets are widely known as a species which nest in old-growth redwood forest, my friend pointed out how different the bird is compared to other members of its family. Marbled murrelets are part of the Auk (Alcidae) family along with other seabirds such as puffins, guillemots and murres. Common traits of this family are that they hunt for fish underwater and nest in colonies or groups. They also usually create nests either on rocky areas, in burrows, in holes in the sand, or around logs or roots. Most of the birds also have some variation of bold, black backs and white bellies, especially during breeding season. The marbled murrelet, on the other hand, has  its own unique behavioral traits. First, murrelets are the only bird in the Auk family to nest in pairs and not in colonies or smaller groups, and they often keep their same mate for their entire life. Additionally, marbled murrelets make their way inland to breed and nest in coastal forest trees, preferring the iconic old-growth redwood forests, which have made the murrelets famous! During the breeding season when other male birds are displaying their bold, bright colors, the murrelet has a cryptic brown plumage, most likely to camouflage with its environment – how do they ever attract the ladies? I am not sure why the marbled murrelet is so different from other members of its family, but it just reminds me that there are sometimes exceptions to the rule when it comes to nature.   Tags: , , , , About Deborah Zierten Climate change is good for the redwoods…But is it climate change and is it good? I’ve spent much of the past week thinking about our Redwoods and Climate Change Initiative, and what our recent results mean for the future of the redwood forest.  As with any good scientific research, the first phase of RCCI raised far Continued Redwood Trees Inspire Innovation in the Desert During my years teaching and taking students out into nature, the question that always crossed my mind was, “What can we learn from this forest ecosystem?” Some of us learn to identify plants, trees and birds. Others learn the art Continued Leave a Reply Join our newsletter Get the latest redwood updates in your inbox    Please leave this field empty
Subscribe:       iTunes        Stitcher        Spotify        Google Play Before being able to teach behavior skills effectively, parents need to ask, “Where am I emotionally?” Understanding where they are emotionally is vital in teaching your kids. Remember, our first role is parents as teachers. If we are frustrated, angry, upset, or stressed, we aren’t effective in helping our children change their negative behavior.  Parents need to take time to make sure they are emotionally aware. It can be difficult when we are dealing with situations that can be stressful. It may mean taking a few minutes to decompress, allowing yourself a treat, breathing exercises, or going for a walk, etc. Each of us will have a different way to regulate. Asking ourselves, “Where am I emotionally?” allows us to approach teaching behavior skills without the emotions that would sabotage and to be aware of what behavior skill we need to teach our child. Being calm allows us to walk our children through the steps of behavior skills. It’s using the steps where change happens. If you want to be successful in changing negative behavior for positive behavior, you have to use the steps of the behavior skills found on We can’t stress enough that change happens when using the steps. Learn the steps of the behavior skills if you want to see change happen in your family. Raising children isn’t easy. Children have their own thoughts, feelings, and emotions. Dealing with those can be hard if we aren’t emotionally aware of where they and we are. If we are angry, stressed, or frustrated, often we pass those feelings onto our children and make the situation worse. The same goes for our children. Understanding where our children are emotionally makes teaching behavior skills more successful. If they are frustrated, angry, or upset, they won’t be in a place to learn or make changes. Learning behavior skills require patience, but the payoffs hard massive. The behavior skills found on Smarter Parenting help parents make the changes.  Need help implementing behavior skills? Sign-up for a free 15-minute ADHD Parenting Coaching mini-session. Episode Transcript This is episode 44. Let’s get started. Smarter Parenting welcomes you to our podcast series, The Parenting Coach For ADHD. Here to heal and elevate lives is your Parenting Coach, Siope Kinikini. Hello my friends. How is everybody? I hope everyone is doing well and I am doing fantastic. I’m super excited about today because we’re covering the second element in your coaching process, which is answering the question of, “Where am I emotionally?” Now, I do need to clarify some things. I’ve been doing some coaching over the last couple of weeks and it’s been fantastic to meet you and to talk to you and to hear what’s going on in your families and then to provide avenues for you to use in order to help your child. So, thank you for those of you who have reached out for coaching and if you haven’t already and would like, please reach out to us and register for a free 15-minute session and be happy to answer questions. During this process of coaching, there was some questions about the Teaching-Family Model, which is what we use, and this coaching approach. So, the Teaching-Family Model is actually the core and the basis of the skills that you need in order to effectuate change in your child. The skills that you need to teach to change and to shape behaviors. Everything. That is the core, that is the essence, that is the focus of what we do. Now, the coaching part of it is a map and that’s to help you ask questions to assess where are you, where’s your child and how do we implement those skills and teach them effectively so we can see the change happening. So I just want to clarify those two things. The skills is where you are going to see the change, and the skills come from the Teaching-Family Model. And again, this Model is being used worldwide by agencies, professionals, therapists, by parents who are trying to help their children shape and change their negative behaviors. Okay? So the skills, those are the meat and potatoes of what we do here and those are the skills that you will find on the Smarter Parenting website. Teaching-Family Model, super, super important. The coaching elements that we’ve been talking about, there are five questions that you should ask yourself, are actually a roadmap for you. If you’re using these skills, what are the questions you should be asking yourself to guide you along and to teach these skills effectively so you can see the change. So, I just needed to clarify that because I think it’s super important for parents to understand that concept, specifically that it is the skills themselves from the Teaching-Family Model that you will see changes start to happen. And then the coaching elements are for you as a parent to implement so you know how to do it, how to do it on your own. Because my goal in doing the podcast, in the creation of the Smarter Parenting website, is actually to help parents be able to implement these things on their own in their home. Right? I don’t want to keep anything a secret from anybody. In fact, I just want to share everything that I’ve learned over the years and also that others have learned over the years using this Model. It’s super, super effective, the Model itself. Okay? So, we’ve talked about the five elements and of your self-coaching and questions you should be asking yourself, and actually questions that I would ask you if you were to call me in for a coaching session. These are five questions I would ask you. First is we’re going to observe the behavior, but the first question is, “What skill do we need to teach to this behavior?” The second question, which is what we will cover today, is, “Where am I emotionally with what is happening?” Okay, “Where am I emotionally?” The third question, and we will cover this in the future, is, “How can I teach this effectively?” And then we will move onto the fourth question, which is, “When will I know my child understands this and really gets it?” And then the last question, the fifth one, is, “Why are we doing all this?” And the Teaching-Family Model answers that by saying, “The answer is always relationship.” That is the goal. Having a strong, confident relationship. Let’s jump into what we’re going to talk about today, which I’m super, super excited about, which is let’s talk about, “Where am I emotionally?” The second part of that whole process. After you determine what skill you need to teach because you’ve identified the behavior and you’ve identified and paired it with the skill from the Teaching-Family Model, you have to ask yourself, “Where am I emotionally to deal with this?” Where are you emotionally when you’re dealing with a behavior? The reason that this question is important, and I think you already know the answer to this, is because if you are in a space or you are in a place where you are upset, you are angry, you are frustrated, you are overwhelmed, then teaching this skill will not be as effective. Being able to teach your child something requires a parent to be calm. It requires a parent to be able to teach them and be patient enough to walk them through each of the individual steps. So, it’s funny because I was watching a movie, Mission Impossible. What’s fascinating about the Mission Impossible movies is that they seem to have all these things that are on timers, these massive things, like, “You better fix this or the bomb’s going to explode,and you only have, like …” It’s under a lot of stress and it’s under a lot of pressure and it drives this adrenaline for them, for the characters in the movie, right? And everything works out in the end. Well, that’s a movie and everything works out in the end when you’re under pressure. When you’re under pressure in real life, it can go great or it can go completely awful. And a lot of times, it doesn’t work out. I mean, can you imagine being under that type of pressure and only having 15-minutes to diffuse a bomb and yet they’re able to do it? Okay, that’s Hollywood. So the idea that we can address a behavior and be frazzled and be tense and frustrated and pressured, it’s difficult. And when you’re dealing with a child and you’re under those constraints, it’s actually even more difficult because, instead of dealing with an inanimate object like diffusing a bomb, you’re actually working with a child who has his own thoughts, his own process, and will respond in various ways to whatever it is that you’re doing. I know, kind of a weird example, but I was watching the movie and I just thought, “You know, in movies that that is exciting and it’s like, ‘Oh.'” What we want to do is take the excitement out because if we’re dealing with a negative behavior, we have too much excitement. We need things to calm down and we need ourselves to calm down. Now, I want to share an example of a coaching situation that happened actually just last week. So I received a call from a mom who’s dealing with behaviors with her child at school, and the school would call and say, “Okay, your child is acting out, your child is throwing things across the classroom and the teacher has given instructions and the child continues to throw things and does not listen to the instruction.” Okay? So as I was coaching her through this, we identified the behavior and then we identified a skill to pair with the behavior. So we decided to pair it with the skill from the Teaching-Family Model called Correcting Behaviors. Right? And so she was able to watch the video on the Smarter Parenting website to guide her along with the steps. Okay. So we practiced it and so she knew exactly what skill to pair with it. Now, when she would receive these calls, it was actually in the middle of the day and she was at work. Now, she didn’t work too far away from the school and luckily she had a job where she can leave and come back. So, as these calls were happening during the last week, she received two calls during the week, and she had to go to the school to address the behavior because they had actually pulled her into the principal’s office. So, we were like, “Okay, we know the behavior, we’ve paired it with what skill you need to teach to address the behavior,” and then we started working through the, “Where are you emotionally when you arrive at the school?” And what she found out is, she didn’t realize this, but on her way driving to the school, her temper would elevate. She would just become so upset. Now, when she got to the school and she’d meet with the principal, things escalated even more internally. Now, they didn’t manifest, according to her, in her presentation, so she was able to appear calm and communicate, but inside, she was overwhelmed, frustrated and upset as any parent would be if they had to leave their work to go address a behavior. What we did was we had to get to her to a place where she could calm down before she actually saw the child and started teaching to the behavior. So, we decided on a few strategies to help her calm down, but she had to ask the question of, “Where am I emotionally when I’m going to be teaching this child this skill?” One of the things that we did was we, I suggested that on the drive over she listen to a very specific type of music that would help calm her down. And we also worked through some breathing exercises to help relax her body before she entered the room to communicate with the principal. We also worked on some breathing techniques that she could just use Wallace speaking to the principal and speaking to her child as she’s teaching. This happened twice again last week, and the first time it was a struggle for her to implement those things because the default was to be upset and get there and be super upset. However, we worked through it and she had to continually ask herself, “Where am I emotionally?” And what she found was when she approached her child with a more calm and a more peaceful presence, her child actually responded better. So, the child was receiving a lot of the frustration and anger from teachers and from principals, rightly so, their role is to protect the class and be sure everything is safe and a good learning environment. And so, they were working with this behavior and this child was reacting to that, but when the mom came in, it was almost like this shift and this is how she described it. It was a shift, and she became more accepting of the instruction that she was doing and the teaching that she was doing. So she was able to actually teach the skill while she was there in that short time. And what she found is it didn’t take as long to get her child to comply with practicing the skill that they were trying to learn together. Super, super fantastic that she was able to recognize that. But that is the type of thing that will happen when you ask yourself that question, “Where am I emotionally?” And if you can approach the issue and the behavior and teach what skill you’re going to teach in a calm and peaceful way, your child is more likely to adapt and accept it. Now, there’s also a flip side to this and the question is, “Where’s my child emotionally in order for me to teach this skill?” You do need to assess that as well. Where is your child? If your child is out of control, then teaching to them that skill, you may have to adapt to a different skill on there. You have to evaluate where are you all emotionally, but specifically for the parent, you have to ask yourself, “Where am I emotionally to deal with this behavior?” If you can approach it in a calm and peaceful way, neutral and in a teaching way, your child will adapt to that. And it may not happen the first time, but it does happen as the child starts to recognize, “Okay, this is a different dynamic that I’m dealing with here and I can adjust to this and I can do this and I can learn from this.” So it’s super important for parents to ask this question, “Where am I emotionally?” Now, if you are unable to be calm, you need to find some strategies that will help you to calm yourself down before you begin teaching to the behavior. Sometimes it doesn’t take very long. I worked with a parent once who, one thing that helped calm them down was actually hot cinnamon Jolly Rancher candies. Kind of weird. Right? But it was a good childhood memory that they had that they could always recall where they were when they first had it and they just loved the flavor of it. So what we did is I recommended that the parent keep it in their pockets and then they could pop one in when they were feeling frustrated and as it dissolved, the heat from the cinnamon flavor dissolved, they’d just imagine that their temperature, their anger would actually decrease as well. I know it sounds super weird, but we all have different things that help us to calm down. And some of them will take breathing exercises like the mom, and some will take really quick things like just some type of sensory change will do that. So, being able to taste the cinnamon and then feeling it dissolve in your mouth and then calming down by the end of that. We all have different coping skills and different things that actually help us realize how to calm down, and we can implement those things in order to help you get to a point where, when you’re teaching, you can answer this question, “Where am I emotionally?” You can answer that by saying, “I’m okay. I’m calm, I’m relaxed. I can do this. I can teach the skills effectively, step-by-step,” instead of approaching the situation like you would a Mission Impossible movie where you’re trying to diffuse all these things all at once and it’s super frustrating. Remember, that works well in movies because it’s scripted, but it’s not real. Okay? So you want to approach things in a very calm and systematic and plotted, planned out way. That will be the most effective for you. Now, I did work with a father once who had a teenage son. He was a single father. He had a job that required a lot of manual labor and so he came home exhausted from work. He was super tired. And then he was dealing with his son who had behaviors at home, just really struggling at home. And so, he came home and he needed some time to decompress before he could address any of those issues. However, when he was coming home, he was, as soon as he opened the door, he was met with behaviors that he needed to correct. And so, what he found was he’d go to work and it would be high stress and then he would go home and high-stress. Right? Which actually caused him to shut down. Where he would shut down was actually at home because there was a lot more leeway. He couldn’t shut down at work because he would lose his job, but he chose, “Where can I shut down for a little bit to kind of decompress and actually get the energy to deal with what’s happening?” So he would do it at home and unfortunately that escalated the behavior in his son. We talked about that and we talked about, “Where are you emotionally when you are at work and how can we decrease some of that there, some of the things that are happening at work, to help let off some of that steam and then how can we continue to do that on your way home? How can we do that at home?” So, instead of approaching it with just one systematic thing that we can try like breathing and so forth, we actually tried to implement different things he could do throughout the day that would help him decompress. One thing was going out for coffee. He loved to go out for coffee in the morning, but he had a very specific place that he would go and get his coffee from. So, he would fill up gas, he’d usually grab a donut and a coffee. And so, we almost created this routine where he could ask himself this question all day, “Where am I emotionally?” And then he would do things throughout the day and that would help to calm him down. So he would get a coffee in the morning. Then in the afternoon, he would treat himself to something else for lunch, something that he would look forward to. So it took a little bit of planning on his part, so instead of just throwing whatever or buying whatever sandwich, he actually planned out a reward that he could get for himself during the middle of the day. And then the evening, we’re all different, all parents are different. We all adjust to things very differently and we need certain things to motivate us and to help us make it through our day, I think. I know a lot of parents use Diet Coke, they need some Diet Coke throughout the day in order to function. And that’s a way of helping them to replenish. Now, I’m not saying food is the only way that you can do this, but these are things that I’ve heard from parents over the years of ways that they can deal with things that are highly stressful to help bring them back and calm down or refocus or some sense of comfort for them. So with this father, we implemented things he could do throughout the day in order to help him, when he got home, be in a more resourceful place. Now, it wasn’t perfect for him. However, over time, he was able to develop a routine that actually made it more possible for him to teach when he was home. What would happen before is he would come home, he’d get frustrated, he would yell, ground his son, and then he would just disappear into the couch and watch a TV show and just avoid everything and then start the day over. Over time, that built up more frustration and more attention in the home, which is why I was called in to help work through some of these issues. So, these are techniques that we use, but the purpose, and this is, again, something that I emphasized at the beginning, the purpose of all of this is actually so we can pair a skill with a behavior so we can change the behavior so everything else is working better in the home and with your children. Super, super important question for parents to ask, and it’s one that I recommend most parents ask multiple times throughout the day because your child may misbehave, but sometimes that behavior sticks with parents and they’re thinking about it all day long and they’re worried about it reoccurring all day long. So assess yourself, ask yourself that question, “Where am I emotionally? What can I do to calm myself down so I can deal with this, teach a skill to this behavior in the most effective way possible?” Right? So, super, super important. Now, if you call me up for a coaching session and we go through a coaching session, I will be asking you these questions. I will be asking you, “Okay, you’re telling me the behavior, what skill do we need to teach to correct the behavior?” Then I will follow up with, “Where are you emotionally?” That’s the second question I will ask you. “Where are you emotionally to teach what we’ve decided you need to teach to correct the behavior?” Right? Once we get you to a point where you can be calm and collected and resourceful, then we will move on to the other elements of this coaching pattern. So I will be asking you these questions. After that follows the how. “How are we going to teach this? Will we use a game or an activity? Will we sit down and talk about it? Will we do an example? What are we going to do? How am I going to teach this effectively? Because all children learn differently.” The fourth question I’ll ask is, “When will you know that they understood it completely? And when will I know that they’ve grasped the concept?” And then the last one, again, is, “Why?” The relationship. So, that’s it for me for this week. Remember, you have to do some self assessment. You have to ask yourself, “Where am I emotionally to teach this skill to my child?” Right? Also ask, “Where’s my child? Is my child in a place where they can be taught?” Sometimes they will be, sometimes they won’t be. And you can teach sometimes to both, but you have to be sure that you are in a good place yourself. So, thank you again for joining me. If you haven’t signed up for a coaching session, please do. I would love to hear from you. I’m learning a lot from you and obviously I’m sharing a ton of information from here at Smarter Parenting and from other professionals who have been using this Model, the Teaching-Family Model, for over 50 years with various populations around the world. I’m super excited for what is to come. I’m super excited for what this podcast is actually transforming to be. As I continually coach, we’re starting to find some very nuanced ways to reach out and share this with you in very, very profound and concrete ways that you can learn and do on your own. We want you to be successful. We want your children to be successful and we’re looking forward to helping you get to that point. All right? All right. I will see you again next week. Be sure to subscribe and leave us a five star rating if you’re listening on whatever application that you’re listening to this podcast at, and share it with a family or a friend who is dealing with children who struggle with ADHD or with somebody who doesn’t understand what it is you’re going through so they can understand it a little bit better. All right. That’s it for me and I’ll see you later. Thanks, bye. Episode 26: Relationships–the Why of the Teaching-Family Model Episode 39: Avoiding ADHD parenting burnout Episode 41: When do I need ADHD Parenting Coaching? Episode 42: What parents need to teach–behavior skills Episode 43: When–teaching to negative behaviors The Teaching-Family Model Our Teaching-Family Model Family The Teaching-Family Association Behavior skills of the Teaching-Family Model Behavior skill: Correcting Behaviors Free 15-minute ADHD coaching mini-session Siope Kinikini ADHD parenting coach Siope Lee Kinikini, LCMHC, is a mental health professional who has worked with hundreds of ADHD families. As someone with ADHD, he knows what your child is going through and is able to help you understand what they need. He is married and has a wonderful teenage daughter. Pin It on Pinterest
The Keepsake of the Shrine Keepers Since the close of Misra (the capital of Kemet located along the Nile River Valley), traditional Kemetic spirituality has lost a major portion of its followers to the Abrahamic beliefs that have not yet ceased their rampage. Long misperceived by many modern believers to beSince the close of Misra (the capital of Kemet located along the Nile River Valley), traditional Kemetic spirituality has lost a major portion of its followers to the Abrahamic beliefs that have not yet ceased their rampage. Long misperceived by many modern believers to be witchcraft, paganism, and demonic religion, traditional spiritual practices of the Mother of Civilizations continue to survive. It is essential that novice believers, adpets, initiates, disciples and pilgrims understand that the existential realities (existing before the birth of the sun, the moon and the stars), spiritual rituals (such as fasting, cleansing, daily prayers, offerings and sacrifices), pilgrimages to sacred sites, grand ceremonies honoring the Deities and Gods, and the worship of the Ancestral spirit, along with the spirits of trees, rivers, mountains, and forests have always been the bedrock of all spiritual practices. The detachment and seclusion of certain lines and clans known by the name Naba, was necessary for the maintenance of the spiritual professionalism amongst the ranks of humanity.  The following story has not been heard by modern ears outside of our initiations. It reveals how the powerful temples of the Naba bloodline were preserved, and came to be revered as the paramount temples of the Gulmu/Dagomba (or Gourmantche/Dogon) Kingdom.  Since the beginning of civilization, every family has been entrusted wth a specialty enabling its members to heal a specific ailment or make a specific contribution towards the survival or well-being of humanity. Since then, the Naba bloodlines have been known as the shrine (temple) keepers holding the responsibility for all activities regarding astronomy, Kemetic science, philosophy, spirituality and geomancy.  The Nabas are referred to as the intermediaries between humans and the Divine World. Devoted to this duty, the bloodline has been initiating every one of its descendants to carry on the legacy of the very first ancestors of the bloodline, those called the patriarchal ancestors. These initiations have been going on since that time from father to son, from mother to daughter, from mouth to ears, and from generation to generation… and they continue to the present day.  The name “NABA” is a very old name. It comes from the Medu/Hieroglyphic word “NEB” which means “priest”. We are a long line of priests. The modern believer can verify that in the bible, one can read: the only people that the children of Israel listened to and bowed to are called the Nabateans. You can study one of the many historical civilizations of the Nabateans which existed right to present day Arabia. The name in Arabic for prophet is Anaba or Anebi. The history is there.  So, the story I’m about to tell is a story that has been told since our very first Ancestors. This story provides a clear understanding, to whoever seeks to understand how the temples of the Nabas have become the most powerful and essential temples for not only the Kings, Prophets, and Pharaohs of Kemetic society but for any person looking for spiritual salvation and redemption.   The Naba temple elevates any pilgrim/worshipper who brings their wishes and kneels before the Deities that dwell within it.  During the time of the Greco-Roman invasions, to avoid having their essential knowledge fall into the hands of barbarians, our Naba Ancestors were asked to migrate with all of the knowledge that will preserve humanity, all of the knowledge that enables humanity to achieve. They migrated towards Western Meritah in order to protect their culture. Over many generations of migrations, avoiding the invaders in their relentless usurpation of welath and knowledge, the Nabas travelled through the desert, creating settlements in Chad before continuing towards the Djoliba or Niger River Valley. They eventually settled around the Djoliba river.  Throughout history, there have been many attempts to take the knowledge and Deities away from us, many attempts made to separate us from our customs and cultural responsibilities. Many of the Nabas from generation to generation resisted these attempts. Most of them sacrificed their lives and their families to be able to protect and preserve all of the knowledge that the line has been safe-keeping in spite of the invaders and their ambitions.  Long ago, amidst this historical backdrop, there were two kings who possessed two antagonistic yet Divine powers. The first was the King of our Ancestral nome, the second was a King who was coming to invade our Ancestral lands. When he came to invade, he was accompanied by his warriors. His army fought for many days but were unsuccessful in conquering the nomes which were home to the temples kept by the Naba bloodline. As one can imagine, after such an intense battle warriors on both sides were tired and wounded.  The high priest Naba Mouri and his disciples came to support these weary warriors. When they came to assist, instead of bringing relief aides to their own people first, they went and gave assistance to the invaders. The priest stated,  We know you’re coming to destroy us, but our principles and our Gods are against inhospitality and deprivation of subsistence, so we have brought you some water, milk and food to nourish you and your people. The invading King and his people were surprised and astonished. They had thought that the Priests were going to support their own Kings and people first.  Naba Mouri said, Every human being stands equal in front of the Divine (the Gods in our temples). We are the intermediaries between humans and the Divine. We stand on the principles of Gods - not in allegiance to the authority of any particular Kings.  Shocked, the invading King and his people accepted the supplies and took care of themselves. Afterwards, the foreign King took off his crown and placed it on the ground. All of the Divine powers and Deities that he had (powers passed down to him by his predecessors), he removed them all and put them in the crown. With this act the King had shown his allegiance to the knowledge, abilities and position of the priest as an intermediary to the Divine. Then the other King, after seeing all that had transpired, completed the action.  He took the invading King’s crown and all of the supernatural things within it, and put it all inside of his Royal crown, and all of the Divine powers and Deities were added together. They then made a pact that,  No other King has the right to fight, all of the Kings will have to kneel down in front of the priests of this temple because of what you have done… As long as you [Nabas] know how to take care of this responsibility, all of the Kings will have to bow to you to have legitimacy in front of humans and Gods. To this day, that is why all of the legitimate Kings of the Gulmu/Dagomba regions kneel down in front of the Nabas. The Nabas don’t bow before a King. For any King to have legitimacy in front of their people and the Gods, that King has to show allegiance to the temple of the Nabas just as their Ancestors have before them.  The crowns and amulets that they put together that day, have been kept in the Naba temples for all of the Kings around the world. This is what remains in the Gulmu regions for the whole world to benefit from.  Many millennia have passed since the temples have been closed in order to preserve the knowledge and power from the ambitions of the pretentious leaders of today. Now, the Nabas from the Dagomba (Dogon) tribe have been grandted permission from the Ancestors and the Divine World to re-open their temples in order to assist humans in resisting the degeneration of the modern era.  The year 413 of the Sidereal Calendar brings the opportunity for the first new wave of pilgrims, initiates, and Kings to honor, by their presence and/or offerings, this temple established at the heart of humanity’s spiritual pursuit. Traditional prayers, offerings, spiritual traditions of music and dance, will be held during the re-opening of the temple this year.  The offerings in the Naba temple have four main benefits:  The first one is “Divination” or the interpretation of the past, present and future actions.  The second one is “identity” or assistance in establishing a liaison between the world of humans and the world of Ancestors.  The third one is “Purification” or a cleansing process on the individual from the spiritual debris and blockages coming from filth, impurities, mistakes, and crossing forbidden territories.  The fourth one is the “Rite of Passage.” This only happens every eight years on what is known as the Munny Cycle according to Kem Society. This process helps initiates to preserve the harmony of our Ancestral legacy by properly setting the individual for a new function in his/her destiny within the greater existence.  This is the Ancestral Legacy carried by Master Naba Lamoussa Morodenibig when he was sent into the Diaspora with a mission to establish The Earth Center schools and reconnect those interested to their original spiritual culture. We invite you to accompany the disciples of Master Naba on this year’s annual pilgrimage in order to participate in this important spiritual event. May your Ancestors grant their permission for your journey to the Land of Mystery and may the Divine World show their approval.  Our Mission The Earth Center is an 501C(3) Non Profit organization based on respect of human dignity regardless of race, gender, age, religion, socioeconomic status, philosophical or political belief. It represents the first mission or cultural outreach institution of the existing Kemetic temples. Contact us US Headquarters: (773) 359-4160 UK Headquarters: (0207) 175 4144 Meritah (West Africa): (226) 25-37-53-13 Canada: (514) 583-2320 The Earth Center Preserving and Promoting Kem Culture
More from Our Blog What Causes Rotten Egg Smell Burps The smell may seem similar to the smell of a rotten egg. Though the condition is said to be normal, it may be embarrassing for the affected individual. These are also sometimes referred to as ‘eggy burps’. Causes of Gas that smells like rotten eggs and diarrhea Endogenous hydrogen sulfide ere is still a lot to do in providing enough evidence to back the fact that hydrogen sulfide is also an endogenous substance. Many things can cause your burps to smell like sulfur. Most of the time, sulfur burps are caused by eating too much of certain foods or by eating habits. Less often, sulfur burps. Certain vegetables like onions, garlic and cabbage contain lots of Sulfur, also eggs contain a lot, too. Your body needs Sulfur in your diet; it is essential for the metabolism of many biomolecules. What is the cause of belching that has a ‘rotten egg’-type odor [when eggs have not been eaten]? If not treated, the odor becomes stronger and stronger. read more Sep 08, 2017  · Burping is considered a rude bodily function, but producing sulfur burps or rotten egg burps can be far more embarrassing. In fact, burping is a. Dec 30, 2010  · Why does keflex smell bad? Asked 30 Dec 2010 by rose11 Updated 8 September 2017 Topics keflex Does Drinking Water Before Bed Cause Acid Reflux Many of my patients prone to acid reflux. that stomach contents can easily travel backward, drinking too much alcohol after a large, higher-fat meal is a recipe for reflux. You’re far more likely. Drink water. Become a connoisseur of water. for the contents of my stomach smothering all the food and acid before it goes Sulfur burps are burps that are accompanied by a foul smell that resembles rotten eggs. Many people burp non-odorous air after eating or drinking, while others are prone to burping air that has a. It’s the trace gases found in intestinal gas that are responsiblefor the smell. Hydrogen sulfide produces the rotten egg smell. Thistype of intestinal gas contains a high leve…l of sulfur. Our best check is the smell. When we smell the sulpher it just means the car is doing what its supposed to do. If you want the chemistry specifics there are loads of papers on the subject. Just do a. which smells like rotten eggs, is released through the mouth when one burps. If you have indigestion, try using over the counter anti-acids and consult a doctor if the symptoms persist. Habits like. Is Cinnamon Ok For Acid Reflux Mar 24, 2013  · 1. A spoonful of baking soda… A spoonful of sodium bicarbonate, or teaspoon-full to be exact, can help put an end to the gnawing, burning, sensation of heartburn caused by acid reflux. Jan 27, 2011. In the few months since the publication of Dropping Acid: The Reflux Diet Cookbook. Here are other The Sulphuric smelling burps are common with nasty d and v bugs. Unfortunately it will be v hard for your baby to not catch it but they generally don’t last more than 48 hours. Spray loo and taps with anti bac after every loo trip and have a towel of your own for drying. A sulfur burp is a dispelling of gas through your mouth that has a strong smell of sulfur or rotten eggs. This can be an embarrassing and distressing problem for those affected. These sulfur burps come from three main sources. Heartburn What To Drink What causes heartburn during pregnancy? Those muscle-relaxing pregnancy hormones are to thank. Here are some pregnancy-safe home remedies and other treatments for heartburn you can try. Drinking lots of water, especially with meals. Hoffman, MD, a physician in New York City and author of Seven Weeks to a Settled Stomach. If you know you get Here Is What Your Farts Reveal About Your Health and Why They are Good For You (Photo: Jay Calderon/The Desert Sun) When windstorms sweep across the desert and churn up the water, the sea regularly burps out hydrogen sulfide, which smells like rotten eggs. Fish die-offs. Dr. Suffering from severe bad breath from nose and mouth. feel that people sitting 10ft also can sense the bad smell, which causing depression and stress everyday. Nov 14, 2016  · I am concerned about the dangers of inhaling sewer gas. Can you help me? I want to know of what kinds of health issues – Answered by a verified Doctor Sep 03, 2006  · What causes rotten egg stench belches? My 4yr old nephew has been complaining of stomach cramps, which must be trapped wind, because he feels abit better once he’s farted. But that stinks awful like rotten eggs, and so do’es his burps. INTRODUCING THE INFECTIOUS DISEASES Since ancient times, physicians have known that many diseases are transmissible, but because of the subtle and idiosyncratic ways in which infections seem to travel, the early-modern physicians thought the responsible particles must be much smaller than our cells (correct) and closer in size to atoms (not correct). Helpful, trusted answers from doctors: Dr. Cohen on urine that smells like rotten eggs: Besides getting some more details (pain? Frequency? ), we’d probably want to check that urine for signs of infection (urinary tract, sexually transmitted disease etc) feel better. Sneezing And Acid Reflux The standard GI workup for GERD—endoscopy, barium esophagram, prolonged esophageal acid monitoring, and impedance monitoring—may not detect mild. Heartburn And Shortness Of Breath Heart Attack (Myocardial Infarction) How To Detect A Heart Attack. The first hour of a heart attack is known as the "golden hour." If you get help during that first hour, your HealthTap: Doctor answers on Symptoms, Diagnosis, Treatment, and More: Dr. Fowler on burps taste like boiled eggs: It can happen when hydrogen sulphide produced in stomach, usually due to slower evacuation of semidigested food like meat, for example. Depending on frequency and severity, your doctor can advise you futher. How To Get Rid Of Cough Due To Acid Reflux When she ended up hospitalized due to severe vomiting, she began asking her doctor. a surgical device that wraps around the esophagus to control acid reflux. Linx is a ring-shaped device made up of. Tips To Get Rid Of A Yeast Infection Home Remedies For Yeast Infections In Mouth with Holistic Treatment For Candida Infection What Side Should I Sleep On If I Have Heartburn Acid Reflux Felt In The Throat Aug 28, 2018. For example, conditions like acid refluxcan damage the esophagus and. Your throat will also be numbed, so you shouldn't feel pain when the. Gastro-oesophageal reflux disease (GORD) is a condition where acid from the stomach. acid reflux (where stomach acid comes back up into your mouth Sulfur burps occur due to accumulation of gas in the stomach and they need to be expelled to relief the discomfort. The forceful expulsion of gas sometimes makes a sound. Burp expulsions are quite embarrassing in public; it gets expelled as a loud sound with/without a sulfur smell. Aug 29, 2018  · Home remedies to treat rotten egg burps. You will be surprised that the simple remedies resolve and helps you get rid of egg and sulfur smelling burps Hot Water For Acid Reflux Certain foods are known heartburn triggers, but they aren't the same for. can make your mouth water, if you're prone to heartburn you may want to skip it. Some of the biggest offenders are dishes loaded with hot peppers and hot sauces. After making “bone broth cubes,” it's easy for me to pour hot water Creation Day 1 (Sunday) In the beginning there was nothing in our region of the universe but darkness. Then God spoke and the power of His voice produced electromagnetic waves that were the basis of all created things. When He spoke there was light. You don’t have to eat a lot of eggs to produce “rotten egg” burps. If you have excessive belching or your burps have a sulfur odor to them it could be caused by a bacterial infection in your stomach, irritable bowel syndrome, a bacterial overgrowth in your gut, or a parasitic infection in the gut.
Glossophobia – The Fear Of Public Speaking By 31 July 2017Uncategorized Govornistvo i javni nastupi, Verbalisti The term Glossophobia comes from the Greek words “glossa” meaning “tougue or language” and “phobos” is the personification of fear in Greek mythology. It’s estimated that 75% of people suffer from speech anxiety, making it one of the most common phobias that exist and along with other social fears, is thought to begin at around age 13. People who suffer from Glossophobia tend to freeze in front of any audience, even a couple of people. They find their mouth dries up, their voice is weak and their body starts shaking. They may even sweat, go red and feel their heart thumping rapidly. This fear may happen at school where a pupil prays that the teacher doesn’t call on him to answer a question. It can happen in the workplace where the employee experiences panic attacks at the thought of making a presentation to her superiors. It can happen at home where the jobseeker becomes emotionally distraught before going on a job interview.  It can happen to actors, actresses and musicians who find shows and concerts extremely difficult. Others Beat Fear. So Can You. To inspire you in your quest to become an influential public speaker, here is a list of famous people who have made a successful living out of performing or speaking in front of thousands of people despite their deep-seated anxiety. 1. Warren Buffett – Once a college student who was “terrified of getting up and saying [his] name,” Buffett was able to overcome his aversion to speaking in front of others by facing his fears head on. 2. Mahatma Gandhi – During his student life, he suffered from frequent panic attacks. For years, the “the awful strain of public speaking” became a burden so great for Gandhi that he even avoided speaking at friendly get-togethers and dinner parties. 3. Nicole Kidman – “I panic in front of all the cameras. My hands start shaking and I have trouble breathing.” 4. Harrison Ford – It is hard to believe, watching a movie like Indiana Jones that Harrison Ford is scared of anything, but in his own words, “its people I’m scared of.” He suffers from anxiety and in particular, he has a fear of public speaking. The thought of speaking in public can leave us frozen with fear. It can also cause you to miss out on many academic, social, and career opportunities. Don’t suffer this fearful phobia in silence; the team at VoiceWorks is passionate and motivated to help you conquer the fear of public speaking and open a whole new world of opportunity for you.
1. How many SNP's equal one STR? one RFLP? 2. Without population data The Power of SNP's – Even Without Population Data Poster presentation at the 10th Promega Symposium on Human Identification, Orlando, Florida, 29 September 1999 CH Brenner, Consulting in forensic mathematics, 1999: Department of Genetics, Univ of Leicester, UK 2000: Berkeley, California, USA Feel free to link to this page, but please do not reproduce this material without permission of the author. How many SNP's equal one STR? one RFLP? Single nucleotide polymorphisms (SNP) have the potential to be just as discriminating as loci of high polymorphism such as VNTR-RFLP or MVR systems – you just need more of them. This is obviously true for forensic identification. It is also true for more complex problems such as deciding sibling-ship or drawing inferences from mixed stains. So there is a tradeoff possible: 1. a handful of highly polymorphic systems, or 2. a larger number of less-polymorphic systems. What is the rate of tradeoff? How many SNP's per STR? per VNTR-RFLP? The rate of tradeoff is not simple. 1. The tradeoff is different for different kinds of casework – i.e. stain matching, paternity, mixed stain, kinship ... 2. The tradeoff is sometimes different for proving, than for disproving. 3. The tradeoff depends somewhat on ones choice of criteria. (The " typical likelihood ratio" is not always a possible choice.) SNP's can be valuable in casework even without population data. Methods and ground rules The method of analysis is exact calculation, using an idealized model of loci, to wit: SNP=2-locus (optimistically assuming heterozygosity=1/2) STRis roughly equivalent to a 4-locus or a 5-locus. VNTR-RFLPis modeled by 12<k<100 roughly. k=40 typical. Likelihood ratios are used of course for the analysis. The "typical" likelihood ratio is defined as a geometric-mean-value – i.e. not the arithmetic mean (which is not sensible) – but as an average taken in the multiplicative sense. From the graph (triangle heights) we have tradeoff rates 1 :2.6 :6.4 for the stain matching ("forensic") problem. It takes 6.4 SNP's (or 6.4/2.6=2.5 STR's) to equal the power of one VNTR-RFLP. Paternity casework gives a different set of ratios: 1 :4 :12 To replace three VNTR-RFLP's, you need more than 30 SNP's. Suppose a laboratory does both kinds of casework, at present using a battery of non-SNP markers. They consider switching to a battery of SNP's. They determine that the SNP battery will be equal to what they now get for forensic work. Then, they will be losing performance on their paternity work. Paternity is "harder" than forensic work for SNP's. Other Problems I made calculations and comparisons for the following set of problems: forensic simple stain matching mixed mixture of victim and suspect mix2 mixture of suspect and an unknown trio true paternity situation: mother, child, and father no ma true paternity case with mother not tested sib full sibs present; distinguish them from half-sibs non-sib half-sibs present; distinguish them from full-sibs SNP's per k-locus, various problems Different Problem, Different Tradeoff # of SNP's equivalent to a k-locus Number of (equi-frequent) alleles per locus From the graph we have tradeoff rates mix21 :6.5 :27 mixed1 :7 :23 no ma1 :3.5 :14 trio1 :4 :12 sib1 :3.3 :11 forensic1 :2.6 :6.4 non-sib1 :2.7 :5.1 Absolute difficulty of various problems; loci needed for likelihood ratio=1000 Different question, different order expected # of loci needed for LR=1000 Number of (equi-frequent) alleles/locus Summary – Power of SNP's 1. The tradeoff – amount of polymorphism vs number of loci – depends on several things, especially the type of problem (forensic, paternity, sibship, mixture). 2. Mixed stain problems, and to a lesser extent motherless paternity, are "relatively hard" for SNP's – a lot of SNP's per STR for equivalent performance. But no problem is impossible. Simple stain matching is not the "relatively easiest" problem for SNP's; disproving sibship ("non-sib") is easier. 3. The problems that are "relatively hard" are not necessarily the ones that are "hard" in the sense of requiring many loci. Paternity and sibling problems are "relatively easier" than mixed stain problems, but they are "harder" in the sense of requiring more loci for equivalent likelihood ratio. Without Population Data Why is a database of size N=0 big enough? because you can afford to have a lot of SNP's. Suppose we have a panel of 100 SNP's for stain matching. Genotypes are AA, AB, and BB. Suppose a crime is committed in a possibly highly inbred population for which there are no population statistics. Nonetheless, it is reasonable to hope (not assume!) that the people are not genetic clones, and that the allele frequencies will generally be in the 30-70% range since the loci were presumably screened for polymorphism in some population. Moreover, we assume that the loci have been confirmed to be selectively neutral, and unlinked. A 100-locus genotype, matching between suspect and crime stain looks like Ignore all but the heterozygous loci. Every heterozygous locus contributes a likelihood ratio > 2 even in a substructured population. If there are 24 heterozygous loci among the 100, the matching odds will be > 224 or >10 million – practically definitive. Even if only 10 loci are heterogeneous, the matching odds are certainly >1000. Database of size N=0 – some details (1) Every heterozygous locus contributes a likelihood ratio > 2 [I originally discussed this idea in 1997 under the title "The littlest database".] even in a substructured population. Proof: Let p and q=1-p be the allele frequencies. The proportion H of heterozygotes is 2pq if genes flow freely in the population, otherwise even less. So H < 2pq = 2(0.5-(0.5-p))(0.5+(0.5-p)) = 2[(0.5)2-(0.5-p)2] < 0.5, thus 1/H > 2, Q.E.D. (2) 24 heterozygous loci If all loci have allele frequencies ¼ and ¾, in 99.9% of cases there will be >23 heterozygous loci out of 100. Even if the allele frequencies are 0.1 and 0.9, it is 99% to have at least 10 heterozygous loci. top of SNP Power page This work was partially supported by table legs and a chair.
Kamus Online   suggested words Hasil cari dari kata atau frase: take over (0.01157 detik) Found 2 items, similar to take over. English → Indonesian (quick) Definition: take over ambil alih, memborong, mengambil English → English (WordNet) Definition: take over take over v 1: seize and take control without authority and possibly with force; take as one's right or possession; “He assumed to himself the right to fill all positions in the town”; “he usurped my rights”; “She seized control of the throne after her husband died” [syn: assume, usurp, seize, arrogate] 2: take on titles, offices, duties, responsibilities; “When will the new President assume office?” [syn: assume, adopt, take on] 3: free someone temporarily from his or her obligations [syn: relieve] 4: take on as one's own the expenses or debts of another person; “I'll accept the charges”; “She agreed to bear the responsibility” [syn: bear, accept, assume] 5: take over ownership of; of corporations and companies [syn: buy out, buy up] 6: do over; “They would like to take it over again” [syn: repeat] 7: take up and practice as one's own [syn: adopt, borrow, take up ] 8: take up, as of debts or payments; “absorb the costs for something” [syn: absorb] Cari kata di: Custom Search Touch version | Android | Disclaimer
Publishers of technology books, eBooks, and videos for creative people Home > Articles > Web Design & Development > Ajax and JavaScript Events in JavaScript • Print • + Share This Charles Wyke-Smith shows you how to monitor and respond to events in JavaScript. This chapter is from the book In a modern web site or browser-based application, JavaScript’s primary purpose is to provide responses to the user interactions with the interface, or to be more technically precise, to handle events that are triggered by user actions. Events are messages that the browser fires off in a constant stream as the user works; for example, every time the user moves the pointer over an HTML element, clicks the mouse, or moves the cursor into a field of a form, a corresponding event message is fired. JavaScript receives these messages, but does nothing unless you provide an event handler that provides a response to them. Your ability to write code that can monitor and respond to the events that matter to your application is key to creating interactive interfaces. To make your application respond to user action, you need to: 1. Decide which events should be monitored 2. Set up event handlers that trigger functions when events occur 3. Write the functions that provide the appropriate responses to the events You’ll see the details of this process throughout this chapter. For now, just get the idea that an event, such as click, is issued as the result of some specific activity—usually user activity, but sometimes browser activity such as a page load—and that you can handle that event with an event handler. The event handler is always the name of the event preceded by “on”; for example, the event click is handled by the onclick event handler. The event handler causes a function to run, and the function provides the response to the event. Table 4.1 lists the most commonly used event handlers. Table 4.1. This table contains a list of the most commonly used event handlers. Event Category Event Triggered When... Event Handler Browser events Page completes loading Page is removed from browser window JavaScript throws an error Mouse events User clicks over an element User double-clicks over an element The mouse button is pressed down over an element The mouse button is released over an element The mouse pointer moves onto an element The mouse pointer leaves an element Keyboard events A key is pressed A key is released A key is pressed and released Form events The element receives focus from pointer or by tabbing navigation The element loses focus User selects type in text or text area field User submits a form User resets a form Field loses focus and content has changed since receiving focus Techniques to Handle Events In this section, I’ll show you four techniques that you can use to trigger JavaScript functions in response to events. The first two require adding JavaScript into the markup, so I try to avoid them, preferring techniques where event handlers are programmatically added to and removed from elements as needed. In small projects, such as simple Web sites, the first two techniques work just fine, but with important caveats that I will discuss for each one. JavaScript Pseudo Protocol If you worked with JavaScript in years past, you may have used the the JavaScript pseudo protocol to trigger a function from a link: <a href="javascript:someFunctionName();">Link Name</a> When the user clicks the link, the function someFunctionName is called. No onclick is stated; this technique simply replaces the href value. The problem with this approach is that it completely replaces the URL that normally would be the href value. If the user doesn’t have JavaScript running or the associated JavaScript function fails to load for some reason, the link is completely broken. This approach also adds JavaScript into the markup, an issue I’ll discuss after I show you the second method. In short, avoid triggering events with the pseudo protocol. Inline Event Handler An inline event handler, as you saw briefly in Chapter 2, attaches an event handler directly to an element. <input type="text" onblur="doValidate()" /> Here, a form text field has the JavaScript function doValidate associated with its blur event—the function will be called when the user moves the cursor out of the field by pressing Tab or clicks elsewhere. The function could then check if the user actually typed something in the field or not. Inline event handlers have been the standard way of triggering events for years, so if you have to work on a Web site that has been around for a while, you will no doubt see inline handlers all over the markup. A benefit of inline handlers is that the this keyword is bound to the function that is called from an inline handler. To illustrate this point, here’s a link that calls a function named addClass <a href="somePage.html onClick="addClass()"> so in the function you can simply write without having to first “get” the element. Additionally, you don’t have to worry about users triggering JavaScript events that act on the DOM before the DOM has loaded into the browser, because the event handler is attached to the markup. We’ll examine this DOM ready issue in “The First Event: load” section of this chapter. However, both benefits can be realized using the two other ways of associating events with elements. Before I describe them, keep in mind that neither of the first two techniques is ideal in that they mix JavaScript with the HTML. In the previous example, the addClass function is permanently associated with this HTML element. If you change the function’s name or remove it from your code, you’ll also have to find and remove every occurrence of the handler in the markup. Also, if for some reason the addClass script doesn’t load, JavaScript will throw an error when the link is clicked. In a modern Web application—in the interests of accessibility, maintainability, and reliability—you want to keep JavaScript and CSS out of your HTML markup. Because inline handlers are still widely used, it would be remiss of me not to show you how they work in some detail, because they will be around for years to come. In later chapters, I’ll show you examples of inline handlers and how to use them. That said, I hope they will be fading into obscurity as programmers become more aware of Web standards and the advantages of using JavaScript to register events with their associated elements. With all this in mind, let me now show you the ways you can create responses to events without adding JavaScript into the HTML markup. Handler as Object Property var clickableImage=document.getElementById("dog_pic"); This example shows a two-step process. First, I assign an object—an HTML element with the ID dog_pic—to a variable. In line 1 of the example, the object representing the HTML element is stored in the clickableImage variable. Second, I assign the event handler onclick as a property of the object, using a function name as the onclick property’s value. The function showLargeImage will now run when the user clicks on the element with the ID dog_pic. While this technique has the desirable quality of keeping the JavaScript out of the markup, it has a couple of serious drawbacks. First, only one event at a time can be assigned using this technique, because only one value can exist for a property at any given time. I can’t assign another event to the onclick property without overwriting this one, and for the same reason, another event that was previously assigned is overridden by this one. Second, when the user clicks on this element and the function is called, that function has to be hard-coded with the name of the object so that it knows which element to work on. function showLargeImage() { // do something with the pic If you change the object that is the source of the event, you will also have to modify the function. For this reason, the “handler as object property” technique is suitable only when you just want to assign one event to one object, such as running an initial onload function once the page is first loaded (see “The First Event: load” section later in this chapter). However, for the reasons noted, it really doesn’t provide a robust solution for use throughout an RIA, where events commonly get assigned and removed from objects as the application runs. In almost every case, the best way to manage events is to use event listeners. Event Listeners Introduced with the W3C DOM model, event listeners provide comprehensive event registration. An event listener does what its name suggests: After being attached to an object, it then listens patiently for its event to occur. When it “hears” its event, it then calls its associated function in the same way as the “handlers as object properties” method but with two important distinctions. First, an event listener passes an event object containing information about its triggering event to the function it calls. (I emphasize this point because it is so important.) Within the function, you can read this object’s properties to determine the target element, the type of event that occurred—such as click, focus, mousedown—and other useful details about the event. This capability can reduce coding considerably, because you can write very flexible functions for key tasks, such as handling clicks, that provide variations in their response depending on the calling object and triggering event. Otherwise, you would have to write a separate, and probably very similar, function for every type of event you have to handle. You will learn how to write functions with this kind of flexibility later in the chapter. Second, you can attach multiple event listeners to an object. As a result, you don’t have to worry when adding one listener that you are overwriting another that was added earlier, as you do when simply assigning an event as an object property. While both the W3C and Microsoft browsers enable event handlers, they differ in the way those handlers are attached to elements and in the way they provide access to the event object. I’ll start with the W3C approach, which will be the de facto standard in the future, and then discuss how event listeners work in Microsoft browsers. W3C Event Model Here’s the W3C technique for adding listeners to elements. I’ll add two listeners to a form’s text field that will cause functions to run when the user clicks (or tabs) into or out of the field: Now the function doHighlight will be called when the cursor moves into the field, and the function doValidate will be called when the cursor moves out of the field. (The third argument, false, relates to event bubbling, a concept that can wait until later in this chapter.) I can attach as many event listeners as I want to the object in this manner. I can remove the events from the element in a similar way using the removeEventListener method. The Microsoft Event Model Microsoft’s event registration model is slightly different. The equivalent of this W3C style in the Microsoft model is and the equivalent of this W3C style in the Microsoft model is Note the use of on, as in onfocus, in the name of the event for the Microsoft version. Clearly, there are some syntax variations here, so let’s look at how to write code that works on both browsers. An Addevent Helper Function To add event listeners to elements correctly, regardless of the user’s browser type, I’ll use an existing helper function written by John Resig that can determine the correct event models to use. This function accepts the following arguments: • The element to which the listener should be attached • The type of event to listen for • The name of the function to call when the event occurs It will then use these arguments to construct a correctly formatted event listener registration for the user’s browser. The function first tests if the browser supports Microsoft’s attachEvent method (highlighted) and then branches the code accordingly. Removing events can be achieved with a second, similar helper function. These functions, as you can see, are somewhat complex, but fortunately you don’t have to understand them; you just have to be able to use them. If you wanted to add an event listener to the email field from the preceding example, all you would have to do is call the addEvent helper function like this: addEvent(emailField, 'focus', doHighlight); The three arguments are the element, the event, and the function to call when that element receives that event. The function then takes care of formatting the event registration appropriately for the browser on which it is running. A common time at which to add listeners to elements is when the page first loads, or to be more specific, upon an event that virtually every JavaScript application must detect and handle—the load event that is triggered when the page is fully loaded and rendered in the browser. • + Share This • 🔖 Save To Your Account
Monday, 5 May 2014 Inter-caste Marriage: A Real Measure to Eliminate Caste Based Discrimination Standing in the polling booth, I thought that reaching 18 grants us at least one freedom - the freedom to vote whomsoever we want. You might be thinking we get so many rights after getting to the age of 18, e.g. we become eligible for marriage, get the license and capability of taking decisions related to our life. But how far is it true? Today I will focus on one such freedom i.e. the freedom to get married with the person of our choice, particularly when our choice belongs to another caste in the Indian social structure. The Caste Barrier to Marriages  For years, Indian society has had an orthodox mindset. Indian sociology (a book by G.S. Ghurye) defines six features of caste, and marriage is one of them. The practice of endogamy (marrying within a confined community) is believed to have emerged around 2000 years ago when the Hindu religious text Manusmriti (The Laws of Manu) was written, which supports the practice of endogamy.  Many citations of inter-caste marriage before that period suggest that inter-caste marriages were common before that period.  In the traditional Indian society, members of each caste and sub-caste were to marry within their own endogamous group. Any violation of this rule was a serious offense, the punishment for which was usually excommunication from the caste. Moreover, considering inter caste marriage as a taboo is not just a rural phenomenon; even the educated families are not much present numerous examples.  The gravity of the situation has increased more and more with time, due to continued hardening of the social beliefs. There has been an increasingly aggressive response of the society against inter-caste marriages. In the cases of love affairs in the past, only family members concerned used to intervene. However, nowadays, the intervention of outside groups in such affairs has become a trend; recent attack on Divya-Ilavarasan of Dharampuri is testimony to this. Why inter caste marriage – Why not?  The very first answer to people who condemn inter caste marriages is – Why not? When we support love marriages, we automatically support inter-caste marriages, because love does not see caste, religion, faith etc. Taking legal perspective, love marriages (irrespective of caste) are legal under Special Marriages Act, 1954.  Even the Supreme court of India, the highest authority in Indian democracy, also held the view that inter caste marriages are in national interest and are a unifying factor where caste system is a curse ( See Article). Even history doesn’t deny the notion of inter-caste marriages. For example, Santanu married Ganga and later Satyabati; both were from outside his own caste. In 160 B.C., Agnimitra, a Brahmin king, married a Kshatriya princess Malavika. Majority of historians believe that the practice of endogamy didn’t start until around 2000 years ago, before which, very few restrictions existed on marriage. Who resists? Recently, my friend's cousin got married for the second time. His first marriage was to the women of his choice who didn’t belong to his caste. However, the guy had to succumb to continuous resistance from his parents, had to break the bond of his first marriage and got married to the woman of his parents’ choice. The thing that shatters me the most is that if our society considers marriage as an unbreakable bond (a common saying that marriage is a bond that persists for 7 lives); how can they disapprove a marriage that has already happened. I assume that most of the readers have heard of Khap Panchyats, and majority of readers would also condemn their acts in the name of "honor killing". What is the difference between those sinners and people denying inter caste marriage in the name of whatever excuse they have? In fact, this difference is a very thin line that can be crossed anytime. So, I would suggest those people, before condemning Khap Panchayats, they should be ready to answer the question, “what if their children were to marry outside the caste?” keeping the lame excuse of "It would be better if our children give us half of what we have provided them" aside. Even if parents concede to their children’s wishes, it’s the society that doesn’t let them. Now, we can ask the philosophical question – What is society; rather, what constitutes the society? The answer is simple; we are the society, society emerges from us. If we want the society to change, we need to change first and then spread that change. Social perspective: Practical answer to caste based discrimination When we compete with the West in culture, technology, and development, we need to modernize our thoughts to rise above petty issues. Few people give argument that it will lead to clash in culture and values.  If that is the case, there should not be any communication or trade between states because they are of different culture, and same stands for different communities too. India is gifted with diverse cultures; then why we are so scared of unifying people from different cultures for the common good while maintaining diversity (I am trying to emphasize and assume here that girl is not bound to forget her culture after marriage). Moreover, this amalgamation of different cultures will put an end to mindless racism and discrimination on the basis of caste in our exotic land. Wouldn’t we want our next generation to be more peaceful and more socially acceptable to different people in the world? Restriction on feeding and social intercourse will also go when physical intercourse is acceptable to the higher castes; assuming we don’t want any taboo on social intercourse. So this caste based discrimination can be uprooted through inter-caste marriages. I will go so far to say that if we want to end this division of country on the basis of castes, inter-caste marriages are the fastest and the most effective solution. Political Perspective: Answer to caste-based politics It is no news that Indian politics has been revolving around the notion of castes for at least a couple of decades. This change in Indian political system, marked by caste mobilization and narrow identity politics is worsening the problem of caste-based discrimination. In the Ilavarasan case, the government and the police failed to take action against members of the dominant caste even though they knew well that they were doing something illegal, because of vote bank politics. Unless we emerge united, we cannot fight this dirty politics where corrupt politicians come into power making promises to a certain set of castes, instead of having any motivation to serve in the country itself. This kind of politics serves nobody’s purpose and divides India while those corrupt politicians fill their pockets with everyone’s money irrespective of what the caste of a person is. Medical Perspective: Better Genetic Adaptation There is an interesting observation from the point of view of genetic adaptation, if you consider people from different castes to be of different genetic structures. This is an answer to the people who propagate the concept of Pureblood . First of all, we need to understand that the concept of Pureblood has nothing to do with blood (We transfuse blood to people all the time in hospitals). The concept of PureBlood comes from the concept of evolution that certain sections of society have evolved to a better genetic structure over time. It might be true, but it does not support the negative impacts of inter-caste marriages. Moreover, the tendency of genes to try to evolve to a better structure supports the concept of inter-caste marriages. The idea is that, if we assume that two castes are different genetically, on inter-caste marriage, the genetic set of the child has more good qualities to choose from than just marrying people with similar genetic structure (genes have tendency to choose the best from the constituting genes). This was just one aspect of how inter-caste marriages can be advantageous from the medical point of view. In her article, Dr. Shuchita Vatsal explores the medical/genetic upsides of an inter-caste marriage in detail. What needs to be done? Education has broadened the scope of thinking and helped people develop analytical powers. We need to do better in education sector to provide people with better thinking level so that they grow above these barriers of caste. A survey revealed that 80% of women, adversely affected in inter-caste marriages, belonged to the Dalit community. This incites fear in women from Dalit community from taking the step of going for an inter-caste marriage. One possible remedy is to make changes in the SC/ST (Prevention of Atrocities) Act and encourage by giving incentive to the people taking initiative in this direction that could be in the form of reservation. Financial incentives can also be given by the government to encourage youth and to make them independent (as done in one such government scheme here ). Summing Up We discussed that marriage is one of the features in the Indian caste system. The inter-caste marriages will attack on remaining five features of the caste system and ultimately help in eliminating the oppressive caste system as Dr. B.R. Ambedkar said, "it will cause disappearance of caste - based Segmental Division of Society". Economic divisions, class etc. will still remain, but that is currently being dealt by reservation. After all, a marriage is considered as the union of two souls, which never requires caste, creed, and other customs of the society; it only requires that happiness, understanding and peace should always remain there in the family. Moreover, inter-caste and inter-religion marriages serve as a beacon light for social equality. In order to eliminate the perils of the caste system, it has become incumbent that there should be a lot more inter-caste marriages. As we close this discussion, I would like to quote Dr. Ambedkar again "Caste is a mental state, therefore it cannot be eradicated through constitutional measures alone”. It is time we gave a second thought to our hypocrisy in which we applaud movies like "Two states", but we don’t have the guts to accept inter-caste marriages in front of the society.  This article solely expresses the views of the author on subject matter. It is not intended to conflict with individuals' views. Please feel free to comment to suggest improvements or report problems. No comments: Post a Comment (Don’t) Waste the Thunder, Recycle
The chance of suffering from obesity which can lead products that we consume (our diets) can have a major impact on our fitness. This is because some of the foods and drinks that we consume will conation a lot of unwanted fats and sugars which our body does not need meaning that you can ends up with a lot of health conditions if you excessively consume a high number of calories and do not eat the right kinds of foods. If you consume a high amount of fatty and sugary foods, then you are at risk of having blood pressure and high cholesterol levels. If you lead an unhealthy lifestyle and have a poor diet then you will have a higher chance of suffering from obesity which can lead to serious health conations such as hypoglycaemia, heart disease and diabetes. This can also have an impact on our fitness levels because you will need to lead an active lifestyle to ensure that you are keeping your body healthy. When you exercise you will allow the body to burn of the excess mounts of calories that you may have consumed in your diet and this then keeps your body healthy. If you have a balanced and varied diet (meaning you ensure that your meals consist of at least one item of foods or drinks of each of the foods groups) and you have an active lifestyle then you will also allow your body and mind to rest and recuperate itself because if you lead a healthy lifestyle then you will be able to get better sleep, which will allow your brain to continue to Grow and develop itself. can make sure that you are leading and active lifestyle by participating in representational and sport activities. This is because alongside retaining the rights kinds of food you should also ensure you are undertaking the daily limit of exercise (at least 10 mins of exercise a day) which will keep your mind and body healthy, this can also help with your emaoitional wellbeing because you can use sport as a form of escapism rather than dealing with your issues by eating an excessive amount or not enough amounts of food and people may undertake bad habits such as taking drugs, drinking or smoking, as they believe that this is the best method of dealing with tough situations that occur during their life’s. This can lead the individuals to suffer from addiction. This is because they may end up relaying on these kinds of activities to get them by each day and they will feel the need to have them all the time, therefor, they may become addicted to them. have a serious impact on your health as they can lead to serious health conditions in the future and they can also have an impact the amount of sleep that an individual has because they have an impact on the brains ability to process information. Sleep is important because it allows for our minds and body to be able to rest, repair and recuperate from the days actions and this then aids in a human growth and development
I have the task of creating a map in which the objective would be to help determine a site for a conference. I have the following data: Addresses of possible conference attendees (I have already geocoded them). 6 possible city sites in the Northeast. I have the Spatial Analyst extension but not network analyst. I think a major factor in determining a site would be proximity to the city site and keeping driving time to a minimum for as many people as possible, say less than 3 hours or so or 150 miles). How can I make a heat map as a general overview of clusters? Answered below I used the kernal density analysis. How can I figure out the best site based on least driving distance without using network analysis? Answered below. This may suit your needs: 1. Create raster layer of your roads (coarse scale is fine). 2. Calculate all cells in raster layer to equal 1. 3. Set a definition query on your potential sites so only the first site is displayed. 4. Calculate the Cost Distance for all roads to that site. 5. Go back to step 3 and set query for next site. Repeat for all 6 sites. This could be automated with Python, but 6 sites is manageable. 6. You'll have 6 cost maps, like below, for your area. enter image description here 1. For each cost map, Extract Values to Points, for your addresses. You'll have 6 point layers, with a distance for each point to the potential site. 2. Run Summary Statistics on each extracted point layer, calculating the mean value for each site. The lowest mean value is the site where, on average, your attendees will drive the least. Depending on the distribution of your points, you could do something relatively simple, such as using the Minimum Bounding Geometry tool to create a bounding box. Ideally you would use a convex hull as an option, but depending on your license that might not be available. In the following screenshot I have, for example, I used rectangle by area: enter image description here (assuming the point sare the location of the potential attendees) Now, all you have to do is finding the center of that bounding box. You could either use the Feature To Point tool to convert the polygon into a point (which would return the center), or you could calculate it using the Field Calculator. Either way you would have your central point, which you can now use to see which city it is closest to. Of course this method depends on your data. If you have some extreme outliers, or if your points form heavy clusters, the central point that is returned might be nonsensical. EDIT: To generate the heat map, since you have Spatial Analyst you could use Kernel Density. But attention: since your extent is quite large it might take a very, very long time to run, depending on what pixel size you will choose for the output. So I would recommend saving everythin else before you test this tool ;-) • Hi. Sorry yes I have about 38,000 addresses across the U.S. They are clustered. Lots of points in the NE, SE, and California area. Since this is a conference in the NE, (we have midwest and west conferences too) people in the eastern US will most likely attend. – Andrew Feb 9 '15 at 15:43 • OK; then my option one will not work well! Check out my edit about the heat map. You could also add a screenshot of your data, so it might be easier for some to come up with a good solution. – BritishSteel Feb 9 '15 at 16:33 • Hi thanks. I tried the kernal density. I used the default pixel size and it did not take long at all. Maybe I'll decrease the pixel size and compare them. I think this will be useful. – Andrew Feb 9 '15 at 17:05 Your Answer
Analyzing Your Test Data Once you have acquired the data, you can use analysis and visualization tools in MATLAB and related data analysis products. Acquiring and analyzing the data in the same environment lets you quickly extract the information you need from your data. Using interactive tools and command-line functions, you can perform tasks such as signal and image processing, statistical analysis, digital filtering, curve fitting, and nonlinear optimization. In addition, you can build graphical interfaces for data acquisition and live analysis of your test data. When working with acquired data, you can use digital filtering routines to focus on the signal or feature of interest and easily view time-domain data in the frequency domain. When working with image data, you can restore noisy or degraded images and analyze shapes and textures. For projects that involve acquiring data repeatedly, you can investigate the statistics of a phenomenon over time.
The REAL Cause of Trochanteric Bursitis (And What You Can Do About It) trochanteric bursitis surgery, arthroscopic trochanteric bursectomy What is trochanteric bursitis? Trochanteric bursitis is a common cause of hip pain.  Trochanteric bursitis is traditionally described as an inflammation of the bursa at the lateral side of the hip.  Pain is usually over the bony point of the hip known as the greater trochanter.  Most physicians will tell you that simply relieving the bursitis is all that’s required to stop the pain of trochanteric bursitis. But after years of taking care of hip pain and operating on trochanteric bursitis, I no longer think that inflammation is the major cause of long term problems with trochanteric bursitis.  Inflammation plays a role at first, but it merely sets the stage for the real cause of chronic trochanteric bursitis. So what’s the REAL cause of trochanteric bursitis?  And what can you do about it? Well, that’s what this entire article is about, my friend! trochanteric bursitis How does trochanteric bursitis start? All trochanteric bursitis starts with some kind of injury, either acute or chronic.  As a surgeon specializing in sports medicine, I see a few cases of bursitis in some active adults between thirty and fifty years of age.  But that’s not common.  Most of the time, hip bursitis is a problem that we see in adults 60 and over. And while all cases of trochanteric bursitis may wind up similar, the starting causes can vary quite a bit:   Direct Injury This can include falling onto the hip, bumping the hip into an object, or lying on one side of the body for an extended period.  A car accident or major fall can be the cause in younger people.    Chronic Injury Repetitive activities might include running, climbing, or standing for long periods of time.  I see a few functional fitness athletes with this problem, but it’s rare.  But in that age group, it’s most common in long-distance runners.    Spinal Disease This is a very common problem in our older patients.  Arthritis of the lumbar spine and scoliosis are quite common in patients with trochanteric bursitis.  But we’ve never been sure which is the chicken and which is the egg: does spine disease cause trochanteric bursitis? Or do they both come from an unidentifiable common cause? Or does the lack of mobility from spinal disease lead to progressive bursal adhesions?  My bet is on the latter. Read further to find out why I think this.   Inflammatory Diseases Rheumatoid arthritis, gout, or psoriasis can cause hip bursitis too. Calcific bursitis would fall into this category as well.  We don’t know why some people get calcific bursitis or tendinitis, but there does seem to be a genetic predisposition.  These diseases aren’t injuries though, but rather situations where your body’s immune system attacks the tissue around the joints and muscles, leading to inflammation. But most of the time, we don’t even know how a patient’s bursitis began. And as you can see, many of the known causes deal with inflammation.  But if inflammation was the only problem, we could relive bursitis with oral anti-inflammatories or injections.  So why don’t they always work? The REAL cause of trochanteric bursitis I believe the reason that anti-inflammatory medications don’t always resolve this problem because the process has entered the second phase.  That’s what I think of as chronic trochanteric bursitis.  This chronic phase is characterized by the production of thick adherent connective tissue filling the bursa. These adhesions grow between the different structures around the bursa and glue everything together.  And that’s where the real problem lies.  You can check it out in this video.  WARNING: this is an actual video of an arthroscopic surgery that I’ve narrated for you all, to show you some of the adhesions that I’m talking about, as well as the bursa and what it looks like. What is a bursa? To understand why the scarring of the bursa could cause problems, you have to understand what a bursa is.  Look at any anatomy book and you will see the bursa drawn as little blue bubbles. We describe them as fluid-filled spaces that allow tissue to slide over each other.  But that is just plain wrong. A bursa is simply an area between to planes of tissue that has few if any fascia connection.  Between each muscle, bone, tendon, organ, and ligament in your body, there are small fibers of collagen, connecting your entire body in a web of tissue that some now consider to be an organ in it’s own right.   In some areas, these connections need to be firm and solid to keep organs, muscles, and other tissues in a certain location. But in other areas, the tissues need to move freely from one another.  So in those areas the connective fascia is sparse and thin, almost like spiderwebs.  And that’s what a bursa REALLY is: just a loose plane between two body structures with few fascial connections.  That’s because they have different jobs and need to move in different ways. Why Do We Have Bursa? The trochanteric bursa is a great example of why we need bursa.   The IT band is a support structure, used to balance the side of your leg and pelvis like the cables on a suspension bridge. It needs to stay stable. But the trochanter and all the muscles attached to it need to move in many directions to allow for a full range of motion at your hip.  Those muscles have places to go and things to do. Think of them like the cars on the same suspension bridge.   If the cars get stuck to the bridge, they can’t do their job.  And that’s why the adhesions of late-stage bursitis cause problems:  Two tissues that have different jobs and need to move in different ways are now tethered together and pain is the end result. What are the symptoms of trochanteric bursitis? Trochanteric bursitis symptoms are usually pretty classic.  Symptoms typically include the following: • Pain on the outside of the hip, sometimes radiating into the thigh or buttock. • Soreness lying on the affected side, especially problematic at night. • Pain when you push on the outside of the hip. • Sitting for long periods can cause pain, especially if the seat is firm. • Pain on the side of the hip when walking, especially long distances or going up stairs. If your symptoms don’t match these ones, check out my other article:  Hip Pain While Squatting.  You can find my entire list of common problems of hip pain to see if they match your symptoms better. How do you prevent trochanteric bursitis? Because most cases of bursitis are caused by overuse, the best treatment is prevention. It is important to avoid or modify the activities that cause the problem. Stay mobile and flexible, but don’t overdo things.  When you notice that your workout is causing hip pain, take a break and stop doing the exercises that cause pain.   You should also correct the underlying problems like leg length differences, spine disease, poor posture, or poor form when working out.  And be sure to stretch and mobilize regularly. Using a foam roller and working on hip stretching before and after workouts. foam roller, foam rolling How is trochanteric bursitis treated? Usually conservative treatment of trochanteric bursitis is pretty effective.  This is especially true when you seek treatment EARLY.  Injections, pain relief, and physical therapy are the mainstays of treatment.  But if the adhesions are too thick, we sometimes need to release them with surgery. When in the early inflammatory phase, injections can be very effective.  I often use Toradol when I inject a painful bursa, instead of steroids. Toradol is a non-steroidal anti-inflammatory medication.  I like it better than steroids because repeated steroid injections have been known to lead to tendon tears. You don’t need gluteus medius tears in addition to the bursitis. Physical therapy This is also very effective early on.  The goals of therapy are to strengthen the hip muscles, mobilize the soft tissues, and correct any underlying problems.  Predisposing problems can include pelvic tilt, poor posture, leg length differences, and gait disturbance. Foam rolling, IASTM, and manual treatment modalities can also help keep the tissues free of each other. Pain Relievers These are also important since trochanteric bursitis can make it difficult to get any quality sleep.  Some of the best ways to relieve the pain of trochanteric bursitis include: • Anti-Inflammatories (ibuprofen, motrin, tylenol) if you can take them. • Try anti-inflammatory supplements if you can’t take the medications above. One of the best options is Turmeric (make sure you get it in either liposomal form or with Bioperine in order to aid absorption.) • Lidocaine patches:  These can really help decrease pain just below the skin.  They work pretty well on shoulders, trochanteric bursitis, and back pain. Surgery is a last resort.  But it can be very effective at relieving pain from trochanteric bursitis.  As you can see from the video above, surgery is usually done through a couple of small incisions, arthroscopically.  Doing these arthroscopic trochanteric bursectomies is what made me realize the error of our theories about the disease.  This surgery doesn’t remove inflammation. I simply free up the two layers and remove the garbage that has grown between them.   And that led me to think about the REAL reason behind trochanteric bursitis.  It’s not inflammation. At least not in the long term. The long term problem is those adhesions that grow between the IT band and everything below.  Early on, you need to get rid of the inflammation and keep the adhesions from forming. But once the adhesions are there, you need to break them up to have any hope of relief.  Whether you break the adhesions through surgery or other means, it’s the best way to address chronic trochanteric bursitis. If you live in Virginia, Maryland, or West Virginia and think you may need surgery for trochanteric bursitis please call my office for an evaluation.  Conservative treatments for greater trochanteric pain syndrome: a systematic review Efficacy of treatment of trochanteric bursitis: a systematic review Disclaimer, there are some affiliate links on this page.  These return a small percentage of your purchase to help keep this website running, but it does not increase your costs at all. Leave a Reply Pin It on Pinterest
When teaching introductory OR courses I have often found that presenting counter-intuitive or paradox-like results is a great eye-opener for the students. I use these examples and results as a motivation for why we need to learn OR techniques. One of the examples I have used is the Braess Paradox stating that adding a link to a congested road network can end up increasing the overall journey time. What other counter-intuitive results do we have in OR that could be used as motivating examples? I like to introduce students to the need for optimization algorithms by talking about the traveling salesman problem (TSP). I introduce the problem statement, which is easy to do, then let them brainstorm ways to solve it. Usually students suggest methods that are similar to nearest neighbor, etc. Eventually, someone usually says something like: If we're solving it on a computer, then why not just let the computer check all the possible routes and pick the best one? I ask whether this method could work even for large instances, and usually the consensus is that we could solve instances with 100s or 1000s of nodes this way. We figure out together that there are $n!$ possible routes, and sometimes students revise their estimates downward, but not by much. Then I say, OK, let's suppose my computer can evaluate 1 trillion routes per second. Then: • To solve a 10-node instance takes 3.6 microseconds. (great.) • To solve a 15-node instance takes 1.3 seconds. (not bad.) • To solve an 18-node instance takes 1.8 hours. (hmm.) • To solve a 20-node instance takes 28.2 days. (not great.) • To solve a 22-node instance takes 35.6 years. (uh-oh.) • To solve a 25-node instance takes 491,857.2 years. • To solve a 30-node instance takes hundreds of times the age of the universe. Then I tell them that the Concorde iPhone app can solve a 30-node instance in a fraction of a second, to optimality, and then it's an "easy sell" as to why we need optimization algorithms. Some results are highlighted below. 1. There is one similar to the Braess paradox. In the paper by Spieksma and Woeginger, a paradox is proposed in which: • Increasing the speed of some machines in a no-wait flow-shop instance may actually worsen the optimal makespan. We construct instances for which the ratio between optimal makespan with improved speed and optimal makespan without improved speed becomes arbitrarily bad. • The authors of the paper call it the no-wait flow-shop paradox. 2. Another counterintuitive result is Bélády's anomaly. It is • the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns. This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm. In FIFO, the page fault may or may not increase as the page frames increase, but in Optimal and stack-based algorithms like LRU, as the page frames increase the page fault decreases. 3. The transportation paradox, where transportation can be more costly when the number of demands/supplies is reduced. [1] Spieksma, F.C.R., Woeginger, G.J. (2004). The no-wait flow-shop paradox. ScienceDirect. 33:6. pp 603-608. https://doi.org/10.1016/j.orl.2004.10.007. [2] Bélády, L.A., Nelson, R.A., Shedler, G.S. (1969). An anomaly in space-time characteristics of certain programs running in a paging machine, Commun. ACM 12:349–353. [3] Charnes, A., Klingman, D. (1971). The more-for-less paradox in the distribution model, Cah. Cent. d’Etud. Rech. Oper. 13:11–22. Finding the shortest path from A to B on a network is easy enough that a high-schooler can do it with pen and paper (Dijkstra's algorithm). Finding the longest path (without repeats) is much harder. (I once edited a maths textbook where the authors had assumed that a longest-path algorithm would be a simple modification of Dijkstra's algorithm. Noooope.) • $\begingroup$ +1 Although whether it is counterintuitive depends on your intuition. For instance, see my answer or.stackexchange.com/questions/13/… in which for every "easy"convex optimization problem with nonlinear objective, there is a corresponding difficult concave optimization problems in which the sense (min or max) is reversed from the original problem. $\endgroup$ – Mark L. Stone Jun 20 '19 at 15:15 • $\begingroup$ @MarkL.Stone Indeed. It was counter-intuitive to the authors who wrote that textbook, at any rate! $\endgroup$ – Geoffrey Brent Jun 21 '19 at 1:07 • $\begingroup$ Well, that actually does work for directed acyclic graphs, so the authors' confusion is perhaps understandable (if those were the only examples they had seen), if not forgivable for someone claiming to be expert enough to write a textbook. $\endgroup$ – mjsaltzman Jun 27 '19 at 15:07 • $\begingroup$ @mjsaltzman no, the working examples in the book were non-directed and had cycles. In fairness to my authors, I don't believe they ever claimed expertise in this. An education board decided network theory should be on the curriculum, and the teachers who write high school maths texts had to scramble to learn it so they could put a book out. It's understandable that some things will fall through the cracks, and this is why the publisher pays somebody (me) to check their work. $\endgroup$ – Geoffrey Brent Jun 29 '19 at 23:57 One nice similar result I have seen in the Open shop scheduling problem, where Three is easy, two is hard! In the paper Gribkovskaia et al. (2006), they write: "In discrete optimization the complexity of a problem often increases dramatically when a numerical parameter changes its value from 2 to 3. Fascinated with this issue, Eugene Lawler wrote: “Sad to say, but it will be many more years, if ever, before we really understand the Mystical Power of Twoness (or what Jan Karel [J.K. Lenstra] calls the Magical Power of Threeness): 2-SAT is easy, 3-SAT is hard, 2-dimensional matching is easy, 3-dimensional matching is hard." However, they proved a rarely found opposite behavior. It was proved by Glass et al. (2001) that for the two-machine open shop sum-batch problem to minimize the makespan, an optimal schedule is known to contain one, two or three batches on each machine. Also they proved that finding a two-batch optimal schedule is NP-hard. Hence it was conjectured that it is NP-hard for three-batch schedules as well. Surprisingly, Gribkovskaia et al. (2006) showed that three-batch optimal schedules can be found in linear time. Glass, Celia A., Chris N. Potts, and Vitaly A. Strusevich. "Scheduling batches with sequential job processing for two-machine flow and open shops." INFORMS Journal on Computing 13.2 (2001): 120-137. Gribkovskaia, Irina V., et al. "Three is easy, two is hard: open shop sum-batch scheduling problem refined." Operations Research Letters 34.4 (2006): 459-464. One neat example is in the context of network design problems and is brought about by the concept of a Steiner node. In brief, a Steiner node is an auxiliary node that may or may not be included in a particular network design problem (say, a spanning tree or a survivable network design problem). Why would you ever need such a thing, since presumably adding such a node, optional by definition, would necessarily increase the solution cost, right? Wrong. Consider a minimum spanning tree problem defined on an equilateral triangle with each side equal to 1, for simplicity. Clearly, the MST solution would pick any two edges for a total cost of 2. Now, suppose that you're also allowed to place a fourth node somewhere inside the triangle. Can you improve the solution cost? You could, if you remember your elementary geometry and place such a node precisely at the centroid (the intersection of the medians) of your triangle. You remember that the centroid is two thirds away from the vertex and one third away from the base and therefore the distance from the centroid to any vertex is $\sqrt{2}/3$. Therefore, connecting this Steiner node to each vertex creates a new MST on the original graph, with a total cost of $\sqrt{2} < 2$! enter image description here If I remember correctly, this example comes from the wonderful book How to Solve It: Modern Heuristics by Zbigniew Michalewicz. Later edit: As an example, consider a telecommunication design problem, where each node in the given network has a connectivity requirement $\rho \ge 0$ associated with it. Steiner nodes have $\rho=0$, meaning that they may or may not be included in the solution. So-called local access nodes have $\rho=1$, meaning they should be reachable via (at least) a path from any other node in the network. Backbone nodes have $\rho \ge 2$, meaning that any other node in the network must reach the backbone node via (at least) two edge disjoint paths. In such a problem, typically the objective is to minimize the cost, the constraints are enforcing the connectivity requirements and the decision variables are the edges that have to be included in the solution. The existence of Steiner nodes leads to potential solutions like the graphs above and explaining to a pointy-haired boss why they work explains the paradox. • $\begingroup$ This example applies to geometric length in euclidean space. Can you explain a little more how this relates to network design? $\endgroup$ – fhk Jul 2 '19 at 18:03 • 1 $\begingroup$ I have added an example to my original post. Hope this helps. $\endgroup$ – baudolino Jul 3 '19 at 15:23 • $\begingroup$ Somewhat related: rockets $\endgroup$ – ktnr Aug 21 '19 at 16:18 • $\begingroup$ @baudolino not that it changes the validity of your example, but shouldn't the distance from the centroid to any vertex be $\sqrt{3}/3$ as you're looking at $2/3$ of $\sqrt{1- 1/4}= \sqrt{3}/2$? $\endgroup$ – EhsanK Nov 24 '19 at 19:28 Consider a transportation problem with positive cost for all arcs. Now consider an augmented problem which is identical to the original, except there is an increase in supply at one origin, and an increase in demand by the same amount at one destination. The optimal cost of the augmented problem can be less than for the original. See EXERCISE 16 in the freely downloadable chapter 8 of Bradley, Hax, and Magnanti "Applied Mathematical Programming" for a numerical example. Unlike all other answers so far to this question, the following is presented to the world for the first time ever. Inspired by the preceding example, I conceived of how a similar phenomenon could occur in nonlinear math: the numerical computation of the estimated variance of the ratio estimator in the Regenerative Method for Discrete Event Simulation (very much an O.R. thing). Specifically, running the regenerative simulation for $n$ cycles produces $n$ i.i.d. observations $(Y_i,\alpha_i) , i=1,\cdots,n$ with $\alpha_i \ge 0 \, \forall i $. The standard point estimator for $$r = \frac{E(Y_1)}{E(\alpha_1)}$$ is $$\hat{r}_n = \frac{\sum\limits_{i=1}^n Y_i}{\sum\limits_{i=1}^n \alpha_i}.$$ The standard estimator of $\sigma^2 = \Bbb E(Y_1 - r\alpha_1)^2$ is $$S_n^2 = \frac{\sum\limits_{i=1}^n (Y_i - \hat r_n\alpha_i)^2} {n-1}$$ and is used to form a confidence interval for $r$. As we all know, if we have scalar data points $x_1,\cdots,x_n$, having mean $\bar{x}_n = \frac1n\sum\limits_{i=1}^n x_i$ then $$\sum\limits_{i=1}^{n+1} (x_i - \hat{x}_{n+1})^2 \ge \sum\limits_{i=1}^{n} (x_i - \hat{x}_{n})^2.$$ However, the analogue for the above ratio estimator is not true! It is possible that $$\sum\limits_{i=1}^{n+1} (Y_i - \hat{r}_{n+1}\alpha_i)^2 < \sum\limits_{i=1}^n (Y_i - \hat{r}_n\alpha_i)^2.$$ For example, $(Y_1, \alpha_1) = (1,1)$, $(Y_2, \alpha_2) = (26,2)$ and $(Y_3, \alpha_3) = (13,1)$ for which $S_2^2 = 128$ and $2S_3^2 = 126$. Talk about counter intuitive. Whoa Nelly!! Ouch, this means there is no naturally numerically stable way to compote $S_n^2$ in one pass as there is for the i.i.d variance estimator using a Welford or similar algorithm. Even though the math in this case is nonlinear, it is similar in spirit (at least it was to me when I conceived it more than 37 years ago) to the counterintuitive transportation problem. When we add a new data point, we have all the same "work" to do as before, plus some extra work, but the total cost decreases. This is because the new data point better "centers" $\hat{r}$ to decrease the cost of getting some of the existing work done, enough so to more than compensate for the additional "work". I belatedly realised that we've missed one of the most famous OR paradoxes of all: In WW2, the Statistical Research Group at Columbia University considered the problem of how best to protect bombers from enemy fire. They observed patterns of bullet and shrapnel damage on bombers returning from missions over Europe. The obvious interpretation of these patterns was that bombers should be armoured in the areas that were hit most often, as shown by recorded damage frequency. A diagram of a WW2 bomber showing red spots for areas where returning aircraft showed damage. Some parts of the plane have many spots, others such as the engines and cockpit have none. However, Abraham Wald's group realised this was exactly the wrong interpretation. The data was compiled from bombers that had survived damage. The lack of reports of damage to areas such as engines and cockpits didn't mean that enemy fire never struck these areas - rather, it meant that they didn't survive when hit in these areas, so bombers should be armoured in these locations. Another story from WW2, though I can't remember enough specifics to find a cite for this one: ice on wings is a major danger to aircraft, and the Allies were considering installing de-icing gear on bombers, but eventually concluded that even though it improved the survival rate for bombing missions, it actually increased the danger to pilots. The reason for this was that the weight of de-icing gear reduced the payload that bombers could carry, requiring more flights to deliver the same weight of bombs, and hence more risk from enemy fire and other causes, something which more than outweighed the reduction in crashes due to icing. These examples might not be considered "hard OR" by modern standards, but both of them have some important lessons that are relevant to hard OR practitioners. (I wasn't sure whether to edit this into my old answer, but since it's in a completely different area, maybe it makes more sense to separate it?) In my opinion the following result is counter intuitive. At least it was for me when I started studying OR. If you study probability theory, you typically start by manipulating discrete laws which are intuitive and easy to grasp, for example when you study the probability of getting a certain deck of cards, or a certain combination of balls from an urn. When studying such probabilities you perform summations and (almost) everything is nice and smooth. Then, you are introduced to continuous laws, and sums become integrals. In my opinion, things become more complex and much less intuitive. In operations research, it is the opposite. You start with continuous (linear) optimisation (typically with the simplex algorithm), and (almost) everything is nice and smooth. Then, you are introduced to discrete optimisation and its algorithms where the simplex is embedded in more general frameworks such as branching procedures. Discrete optimisation becomes harder to grasp. From a computational point of view, continuous (linear) optimisation is easy, while discrete optimisation is hard. I find this counter intuitive ! I expected that manipulating finite and discrete elements would be easier than continuous ones (as in probability theory), where you have to deal with infinity at some point. • $\begingroup$ I would not say that continuous optimization is easy, but rather than convex continuous optimization is easy. For instance, the resolution of non-convex (continuous) QCQP problems is NP-hard. But I agree with you concerning linear optimization, introducing discrete variables complexify a lot the problems. $\endgroup$ – fpacaud Nov 12 '19 at 12:46 • $\begingroup$ Yes I agree ! I was refering to linear (i.e., convex) optimization. Anything non linear quickly becomes ugly ^^ $\endgroup$ – Kuifje Nov 12 '19 at 12:57 Your Answer
List of Input Output Devices Related to Computer The computer is a vast technology. You may have used so many features of computer and its related devices. But I am sure, many of them might have known about their features. If you are a computer user then you must be using a mouse, keyboard, printers, monitors, joysticks, webcams, speakers, touchpad, etc. Do you really know what exactly they mean? What kind of devices they are? In what terminology they come under? Hereby, providing you input output devices list related to computers and their brief description: You must be using a mouse, keyboard, touchpad, monitor, printers, speaker, scanners, etc. Few of them comes under Input devices and some of them comes under output devices. Check out the list below, separated input output devices: List of Input Output Devices Input Devices: Computer related input devices are Keyboard, Mouse, Touchpad, TrackPoint, Scanner, Microphone, Digital Cameras, Barcode reader, Joystick, Webcam, etc. Output Devices: Few examples of output devices are Printers, Projector, Plotters, Monitor, Speakers, Head Phone, etc. Brief Explanation of Input Devices Keyboard: A computer or laptop keyboard is kind of hardware device that you can use to type data in a computer system. It usually plugs and play device. A computer keyboard includes a set of alphabets (A-Z), numbers (0-9), symbols and function keys. A computer keyboard type should be PS/2 (5-Pin DIN or 6-Pin DIN), USB (Universal Serial Bus), Wireless. Now days USB and Wireless keyboard are common in use. Earlier, PS/2 was the most used keyboard. computer input output devices Mouse: A computer mouse is an input and a hardware, pointing device that you can connect to your computer system. You can move cursor on your screen. It’s a hand held device that you can move with your hand and do clicks (right or left) on your screen to send commands to your computer screen area. Earlier PS/2 mouse was in existence but now a days USB and Wireless Mouse have taken place. input device mouse usb ps2 List of Input Output Devices Click To Tweet Touchpad: A touchpad or trackpad is a kind of input device that has a limited area wherein you can Point, scroll, click and swipe. A Touchpad most commonly found on computer laptops (computer brand doesn’t matter). Touchpad allows to use all the features as you do with a computer mouse. series of input output devices TrackPoint: Most commonly TrackPoint found in IBM ThinkPad Notebook computers, and originally introduced by IBM in 1992. TrackPoint is a cursor control device that’s built between laptop keyboard and also known as pointing stick. Now the days touchpad method is in existence. trackpoint, pointing stick Scanner: A scanner is an electronic and input device that allows user to scan any of document, images, etc. and convert them to digital formats that you can see on your computer screen. It’s a kind of hardware device that you can connect to your desktop computer/laptop by using USB connection. Most uses in offices to create an image files of physical documents. Microphone: Also knows as its common name “Mic”. Basically Microphone converts your voice/sound into electrical signals and you will get an output on connected speakers. Can be used to record voice. input output devices Digital Cameras: A Digital Camera allow user to take pictures by using digital technology in cameras. You can click and take photographs/pictures of anything that you have focused. You can control it by its certain features. Barcode Reader: A Barcode Reader is an input device and also known as Barcode Scanner is a hand held device. It is an electronic device that can read barcodes those has printed on any product, etc. It is generally used to track products and prices in a computer software system. barcode readerList of Input Output Devices Click To Tweet Joystick: Joystick is a kind of control stick that most used for computer gaming’s that allows users to control characters or machine. joystickWebcam: Webcam is a short form of Web Camera is an input device. It should be connected to computer directly or indirectly. It allows users to stream live video calling, take pictures, etc. webcam input device Brief Explanation of Output Devices Printers: A printer is an output device that can print any document, web page, photographs, etc by command send by your computer desktop or laptop. There are several brands and type of printers available for an example: Laser-jet, Office jet, Ink jet, Line printers. Now days most of the printers includes the feature of scanner and copier. input output devices Projector: A projector is a hardware device that you can connected to computer desktop/laptop by using HDMI or VGA cable (depends compatibility) to project your computer display in a large screen. If you are using a projector, you also required a projection screen where you can project the computer display. projector output device list of input output devices Projector Screen Plotters: A Plotter is a big size printer that allow users to get big size print that cannot be done by basic printers. Most of the plotter has the feature of LTP, LAN and USB printing ports that connectivity to your computer. Generally, plotters are used to take prints of line-art application, big maps, architecture designs, drawings, etc. what is input output devices? Monitor: In computing, a monitor screen is a computer display. A monitor could be a CRT, LED or LCD. Whatever you do in your computer, monitor is the hardware device that shows you the output. So, without monitor you can’t work in your computer.monitor output device Speakers: Computer speaker is an output device because you are getting sound from it whenever you play any online or offline music, video or anything that has sound in it. Basically, speaker is a hardware device that you can connect to your computer to generate sound.speaker output device Head Phone: A head phone is an output device that also generate sound. Headphones are a pair of small loudspeakers. Headphones can be placed inside or outer part of your ears to listen anything and won’t disturb anyone else while playing anything. Can be used on computers or smartphones. headphones output deviceList of Input Output Devices Click To Tweet Share This Post To Help Others!! 7 thoughts on “List of Input Output Devices Related to Computer Leave a Reply
January 21, 2020 Primary Source Spotlight: Holidays Guided Primary Source Analysis: Celebrating America Why do you think we have fireworks display on July 4th, the day the U.S. celebrates its birth as a country? Read the article from America's Library, Independence Day: Americans Celebrate the Birth of Their Nation, then answer the question at the end about how you celebrate. Do you think it is important for citizens to celebrate the birth of their country? Why or why not? What other observations, reflections or questions does this source inspire? Let us know! Related resource … [Read more...] Featured Image: Independence Day at Last [Read more...] Today in History: Independence Day
Wiggins’ Weather 22 September 1882 Canadians love to talk about the weather. This undoubtedly reflects the fact that we get a lot of it—four distinct seasons with a wide variability of rain, snow, wind, and temperature. In Ottawa, temperatures of plus or minus 30 degrees Celsius are not unusual. Weather-loving Canadians may also be channelling their farming forebears. During the days before the Weather Network or Environment Canada, when Canada was primarily an agricultural country, the weather really mattered. Livelihoods depended (and still do) on the right mix of sun and rain. For farmers, a reliable weather forecast might mean the difference between a good harvest and crops rotting in the fields. For fishermen, an ability to read the clouds and other signs of approaching storms literally meant life or death. Recall the adage Red sky at night, sailors’ delight. Red sky in morning, sailors take warning. It therefore not surprising that in the years before meteorology became a serious science, famers’ almanacs, which provided detailed weather forecasts, were popular. Any guidance about weather trends, however dubious, was welcomed. The Old Farmer’s Almanac, founded in 1792, remains in print today. Based on arcane weather lore, its weather predictions are still eagerly read, if not taken seriously. Back in the 1870s, a well-respected almanac was produced by Henry George Vennor of Montreal. Vennor came to prominence when he accurately predicted a green Christmas for Montreal in 1875. The Vennor Almanac was much sought after throughout North America until Vennor’s premature death in 1884. Wiggins march 1883 Topley StudioLAC-PA-201322 Dr E. Stone Wiggins, March 1882, Topley Studio, Library and Archives Canada, PA-201322. As a weather prophet, Vennor was eclipsed by another Canadian, Ottawa’s Dr Ezekiel Stone Wiggins who took the weather forecasting business to a whole new level. On 22 September, 1882, he announced in the Ottawa Citizen that: A great storm will strike this planet on the 9th of March next. It will first be felt in the Northern Pacific and will cross the meridian of Ottawa at noon (5 o’clock London time) on Sunday, March 11th, 1883. No smaller vessel than a Cunarder [a large passenger ship of the Cunard Line] will be able to live in this tempest. India, the south of Europe, England, and especially the North American continent will be the theatre of its ravages. As all the low lands on the Atlantic will be submerged, I advise ship-builders to place their prospective vessels high up on the stocks, and farmers having loose valuables as hay, cattle, etc., to remove them to a place of safety. I beg further most respectfully to appeal to the Honorable Minister of Marine, that he will peremptorily order up the storm flags on all the Canadian coast not later than the 20th February, and thus permit no vessel to leave harbor. If this is not done hundreds of lives will be lost and millions worth of property destroyed. In November 1882, Wiggins sent a telegram to President Arthur of the United States in which the doctor reiterated his fantastic prediction. He also fine-tuned his forecast adding that the “planetary force” would especially submerge the coastal lands bordering the Gulf of Mexico and those “washed by the Gulf stream” [i.e. from Florida to the Carolinas] and that the New England States would suffer “severely from the wind and floods.” As well, there would be “universal destruction” along the east side of the Rocky Mountains, “owing to the great stratospheric pressure in those regions.” He added that the March 1883 storm would be “the greatest storm that has visited this continent since the days of your illustrious first President.” He advised President Arthur to order “all United States ships into safe harbor not later than March 5th till this storm shall have passed.” News of Wiggins’ prophecy was picked up by American newspapers across the United States. There was little commentary about the merits of the forecast, though a few papers noted that “a Toronto press dispatch says Wiggins’ standing as scientific authority is somewhat doubtful.” Some papers gave Wiggins the benefit of that doubt. One Kansas newspaper recalled that before the biblical Flood, people had scoffed at Noah and his ark. The newspaper opined that “Wiggins and his kind deserved encouragement.” News of Wiggins’s storm also crossed the Atlantic, and was even reported in New Zealand. Official reaction to Wiggin’s forecasts were decidedly negative. Mr Charles Carpmael, director of Canada’s meteorological service based in Toronto, told the Minister that “We have no reason to anticipate any violent disturbance between the 9th and 11th of March.” He added that “Mr Wiggins’ letter is patently absurd.” The American reaction was less restrained. General W. B. Hazen, the U.S. Chief Signal Officer, said “Too severe rebuke cannot be inflicted upon those who attempt to deceive or needlessly alarm the people by publishing such statements as that of Mr Wiggins. Their words are totally untrustworthy and the people should be so informed by those who are familiar with the subjects upon which these prophets presume to speak. Such statements fill lunatic asylums, and those who make them are enemies of society.” Hazen noted that it is difficult to refute such predictions since there are bound to be storms in March on or about the date specified. Over the previous ten years, there had been on average a dozen March storms. He added that meteorology is in its infancy, and that nobody can forecast more than a few days ahead, at most a week. “All predictions of the weather to be expected a month or more in advance, whether based upon the position of the planets, or of the moon, or upon the number of sun spots, or upon any supposed law of periodicity of natural phenomena, or upon any hypothesis whatever which to-day has its advocates, are as unreliable as predictions of the time when the end of the world shall come.” Despite the official rejection of Wiggins’ prophesy, many people took him seriously, or at least wanted to err on the side of caution despite the fact that Wiggins had no track record of success beyond what he himself trumpeted in the press. So who was Dr E. Stone Wiggins, and why was he so convincing? Wiggins was born in 1839 in Queens County in central New Brunswick. His family descended from United Empire Loyalists, who had fled north from New York after the American Revolution. Settling in New Brunswick, the family became prosperous merchants. After his early education in New Brunswick, E. Stone Wiggins became a teacher in Ontario, and the author of a book on English grammar for school children. He married his cousin Susan Anna Wiggins, age 16, in 1861. An amateur astronomer, Wiggins published at the age of only 24 a book titled The Architecture of the Heavens in which he claimed to have discovered that comets travelled through space by virtue of the positive and negative forces of electricity. In the same volume, he postulated the existence of dark planets that emitted no light. (While this might be interpreted as foreshadowing the concept of black holes, in Wiggins’ universe, planets and stars were dark if they had no atmosphere.) For this book, he was apparently awarded an honorary doctorate by some un-named school. He later took second place for a prize among 125 astronomers for an essay on comets. In 1866, Wiggins was appointed superintendent of schools in Prince Edward County on Lake Ontario. He later attended the Philadelphia School of Medicine and Surgery, obtaining his M.D. in 1869. Returning to Canada, he was awarded a B.A. from Albert College, Ontario.  He later became principal of a school for the blind in Brantford. Returning to New Brunswick in 1874, he established a boys’ school in St John. In 1878, he unsuccessfully ran as the Conservative candidate for Queens County. Sir Leonard Tilley, who was from the same county and who became Finance Minister in the Conservative government of Sir John A. Macdonald, gave Wiggins a post in his department in Ottawa, a position he held until retirement in1908. Wiggins almanacWiggins’ credibility as a weather prognosticator likely derived from the fact that he was a university-educated “astronomer” working for the Canadian government. (What he actually did for the Department of Finance is unclear.) He was also likeable and articulate, and held a fervent belief in his own forecasting ability. So convinced was he of his prophecy of a storm of biblical proportions that he published the criticisms levelled at him by the Canadian and American government meteorologists in his Wiggins’ Storm Herald with Almanac, 1883, along with his warning messages to the Canadian and American authorities. As you might imagine, the world watched with bated breath the arrival of Wiggins’ storm. Fishermen on the east coast pulled in their boats. Passengers on trans-Atlantic liners postponed voyages. The day before his predicted Armageddon, Wiggins announced that the planets were moving into alignment for the great storm. But on March 9th, the weather across Canada was reported as being exceptionally fine. Wiggins still confidently predicted that the storm would hit the following day as heavy meteor showers during the previous two days showed that “an unusual pressure may be expected on the earth.” According to the Globe newspaper, Wiggins couldn’t sleep the five nights before the predicted date of his storm. He also had received threatening letters from people. One said that if there were no storm “he had better secure a lot in the Beechwood Cemetery.” Wiggins told friends “Uneasy lies the head that dips into the future.” Early in the morning of March 10th, a large group of women asked Wiggins where they could find safety. Wiggins assured them that Ottawa would only get the tail end of the storm. In the event, Ottawa got 18 centimetres of snow on Sunday March 11th, the day that he had predicted that the great storm was to pass the meridian of Ottawa—admittedly not a very pleasant day but hardly an event of biblical proportions. In Toronto, the Globe reported that the wind was “scarcely ruffling feathers in ladies’ hats.” There was no flooding of the eastern seaboard. No lives were lost at sea, and there were no financial losses. Wiggins Devlin 13-3-83 J. Devlin, retailer, known for his funny advertisements, mocks Wiggins, The Ottawa Daily Citizen, 13 March 1883. Newspapers denounced Wiggins as a fake and a charlatan. One paper called him “a contemptible nincompoop who…has produced a commotion more injurious to the human family than the kick of Mrs O’Leary’s cow [that caused the Chicago fire].” Another American newspaper said “Some philanthropic Canadian woman should send Mr Wiggins a thimble in which to soak his head.” Wiggin’s responded: “It is evident from the failure of my predictions that something is wrong with the solar system if not with the Cosmos.” He hypothesized that there was a dark moon “the invisibility of which may account for its never having been discovered, while its mere existence as a satellite of the earth will explain the apparent failure of my best-predicted storms.” Notwithstanding his failure, Wiggins continued to issue weather forecasts. However, he became discouraged. In early 1886, he despondently told an Ottawa Journal reporter that although he had foreseen the big storm of the previous October and had been on the way to the press to warn people, he had turned back—“too much mental wear and tear to make these predictions even when you know you are right.” Instead of the weather, Wiggins turned to predicting earthquakes, which he believed were also caused by celestial forces. Following the major Charleston earthquake that struck at the end of August 1886, Wiggins predicted an even larger tremor would hit the southern United States a month later. Despite his failure to predict the Charleston quake and efforts of newspapers and experts to allay concerns, people became terrified. On the day of his predicted tremor, many people in Atlanta spent the night in churches praying. Shops didn’t open, schools remained deserted, and high buildings were emptied of their occupants. When no shock materialized there was a “widespread feeling of relief in the community” along with widespread condemnation of Wiggins. The Moncton Transcript opined that “It is about time Wiggins as a prophet was suppressed and compelled to attend the work for which the country pays him.” Oddly, when Ottawa experienced a minor earthquake in January 1888, Wiggins, the prophet, slept through it. When asked, Wiggins attributed the tremor to “the sun which was near the tropic of Capricorn.” He added that there would be no serious disturbance for many years, but North America should watch out after August 19th 1904. (The great San Francisco earthquake struck in April 1906.) Wiggins Arbour Plaque erected by the City of Ottawa on Arbour House, Britannia, built by E. Stone and Susan Wiggins in 1892-93, Wikipedia. Wiggins had many other interesting and entertaining ideas. He thought the world was solid and if you dug to its centre, temperatures would drop. Similarly, he believed the closer one got to the sum the lower the temperature. He had little sympathy with “the prejudices of the old school men [who] persist in declaring that our moon is a dead planet and is not possessed of an atmosphere.” He also believed that plesiosaurs, an extinct marine reptile of the Jurassic Period, existed in Rice Lake, Ontario and in the North Atlantic. When a meteor fell in upstate New York in 1897, Wiggins thought it contained hieroglyphs that were a message from Martians. At one time, he asserted that there would come a time when “generals on the battlefield would converse with each other by merely striking their swords into the ground.” Things he did get right include his forecast that one day a traveller would be able “to converse with his family while trudging his weary way to the northern pole.” Hinting at global warming to come, Wiggins claimed that “every man and animal … is a stove to raise the temperature.” He anticipated that some day one would be able to grown oranges in Canada. Wiggins and his wife lived on Daly Street for much of their lives in Ottawa. In the early 1890s, the couple built Arbour House in the then summer resort town of Britannia where they were pillars of the community. Wiggins was the commodore of the Britannia Yacht Club in 1899. He died at their summer cottage in 1910. Wiggins was buried in Queens County, New Brunswick at St Luke’s Anglican Church at Youngs Cove. The memorial on his grave reads Professor E. Stone Wiggins B.A., M.A., M.D., L.L.D. Canada’s Distinguished Scientist and Scholar. DEC. 3 1839-AUG. 14 1910. His wife Susie. In 1994, the City of Ottawa designated Arbour House as a heritage property. With thanks to Dr John D. Reid who described Wiggins’ contributions to weather lore in a wonderful presentation on Ottawa weather history at the Historical Society of Ottawa, 27 October 2017. Billings Herald (Montana), 1883. “Wiggins and his Storm,” 15 March. Brooklyn Eagle, 1899. “Questions Answered,” 11 June Chicago Tribune, 1883. “Wiggins Nothing But An Astrologer And A Copier of Popular English Almanac-Makers,” 8 March. Fort Wayne Daily Gazette, 1884. “Wiggins’ Dark Moon,” 6 July. Globe, 1883. “Prof. Wiggins’ Storm,” 10 March. ——-, 1907. “Two Moons In Sky Says Prof. Wiggins,” 30 May. Memphis Daily Appeal, 1883. “Wicked Wiggins,” 12 March. New York Times, 1883, “Wiggins A False Prophet,” 10 March. ——————-, 1897. “Wiggins on the Aerolite,” 17 November. Ottawa Daily Citizen, 1883. “Freaks of the Storm,” 13 March. Ottawa Evening Journal, 1886. “Wiggins Claims the Storm,” 18 January. —————————–, 1886. “The Shaken South,” 1 October. —————————–, 1888. “Just a Wee Shake,” 11 January. —————————–, 1910. “Astronomer Passes Away,” 15 August. Ottawa Free Press, 1883 in Greensboro Watchman (Alabama), 1883. “Predicting Storms,” 15 February. Rose, Geo. Maclean, 1888. A Cyclopaedia of Canadian Biography, Toronto: Rose Publishing Company. Somerville, Scott, 1979. “A Vennorable Weather Prophet,” Chinook, Spring. Transcript (Moncton), 1886 in Ottawa Evening Journal, “Victimizing Wiggins,” 5 October. Wiggins, E. Stone, 1883. Wiggins’ Storm Herald with Almanac, 1883, Toronto: GMP Printing & Publishing, https://archive.org/stream/cihm_25726#page/n5/mode/1up.
1)      General pedagogy 2)      Specific to maths In some cases there are ideas or knowledge that I’ve found useful, and so would like to share.  In other cases it’s more about provoking questions and discussion.  Since the first post was fairly general in nature, I want to carry on in that vein for the next three, closely related posts.  Education theory also underpins a lot of what I do in the classroom, so it will be useful to refer back to in later posts.  From there I might detour into some things specific maths for a while. The next three posts will all relate to memory.  Preamble over, let’s get to it. You can’t spell preamble, without ramble. A few weeks back a fellow teacher posed a question to my form group that I probably should have spotted the answer to much quicker.  Having had a difficult time around her own exam years, she didn’t have all the qualifications she might like, and has faced barriers to her progression as a consequence.  I’ve known her work hard towards achieving the C grade in maths that she needs to further her career.  She told the group that she understands the mathematics, so, given that, what’s her problem, why has she not yet passed the exam?  The kids tried a few guesses; it’s too hard, you don’t know what to do, you haven’t seen the questions before – they hadn’t quite picked up on the first point she made: she understood the mathematics, no problem there.  My first guess was that the arithmetic might be the barrier.  It was much simpler still, and I should have picked up on it more quickly: she understands everything, but then gets to the exam and remembers too little. Several months ago another colleague told us what a Year 10 girl had said: “What’s the point of learning this?”  Fairly typical question unfortunately, but she didn’t mean ‘when am I ever going to use it?’ she was pointing out that in a week we’d be on to a new topic, and she’d forget everything she could now do, so where was the point in learning it? Why do we keep forgetting so much of what we learn? There seems to be fervour in education around ‘understanding’, deep understanding, ‘relational’ understanding.  ‘Understanding’ has become a much loved buzz word.  There’s nothing wrong with that; on the contrary understanding is certainly what we should be aiming for.  If I sound disillusioned, if it feels like I’m detracting from its pursuit by referring to understanding as a ‘buzz word’… it’s only because I see so little of that understanding forthcoming, despite the heavy rhetoric and valiant efforts.  Perhaps more importantly, I see little that I think would lead to understanding, or worse, a possible institutionalised misconception of where and why understanding is useful.  It’s beginning to feel like the rhetoric is in pursuit of understanding at all costs, ironically even at the cost of understanding; blinkers down, off we go!  Given how focussed we are on understanding, shouldn’t each child by now be a micro-genius? Why is understanding important?  There are several responses to this.  This list is not exhaustive, but if you actually understand something, you’re more likely to be able to abstract and apply it to any new context, rather than just exam questions, say.  You’re more likely to be able to twist and manipulate what you understand to form new knowledge, and new understanding, accelerating learning.  There’s a further reason, sometimes implicitly understood, other times made explicit: ‘If you understand something, you are more likely to remember it.’ I’d like to set up a straw man: ‘If you understand something, you are certain to remember it.’  This is easily knocked down.  Just think of all the lectures you have attended, understood perfectly, and of which you can now consciously remember none.  It doesn’t have to be lectures; how about simple TV documentaries?  No doubt you’ve seen some, no doubt you had little problem understanding the content, no doubt you’ve forgotten much of it.  Books…? Kris 1, Straw Man 0 It still seems reasonable to say that understanding leads to better memory, but what if it’s not enough?  What if memory is a function of understanding and something else?  I actually don’t imagine this is a controversial statement.  I know several experienced teachers who make a point of revisiting old topics in new lessons wherever they can, though doing so is not part of the curriculum.  Who’s going to speak out against the importance of revision?  My concern is that all this seems very ad hoc.  Individual, experienced teachers, sometimes maybe doing something that might aid memory. What I’d like to challenge is what I perceive to be the institutional focus on understanding, to the detriment of memory. Daniel Willingham writes a fascinating article on memory here.  He also talks about using narrative to help improve memory in his book, Why don’t students like school?  Importantly he talks about the distinction between forming memories, and then later accessing them.  In brief, we form memories by thinking about something a lot, but there’s then a separate job to do of building what he calls ‘cues’ to be able to access those memories at a later date (I’ve also heard people refer to this as ‘building pathways.’)  He notes that memories rarely fade, but the cues can – so we don’t lose well-formed memories, we don’t ‘forget’ as we might imagine – we instead lose our ability to access our memories. Stage actors memorise tens of thousands of words through simple rote repetition.  The fact that these words ‘make sense’ no doubt aids the process; if they had to memorise a list of ten thousand random words, it would be a much more difficult task.  So understanding helps, but it’s not enough; were they to read the script once, they may understand it all, yet remember few or none of their lines!  Understanding and practice were both needed. Stage actors memorise thousands and thousands of words There are so many techniques available for building stronger memories, and stronger memory cues.  Simple repetition is one, mnemonics are another – and they come in several forms – stories are another.  Some teachers use these to great effect, others may use them occasionally; some may never focus specifically on building memory at all, and I’ve never seen a check list for ‘Outstanding’ that even suggests they should.  I haven’t yet seen any institutional focus on the importance of building memories.  Whenever I do see it mentioned in the public arena, I see it derided.  It’s tarred with the brush of ‘meaningless facts,’ ‘dry facts,’ ‘rote learning’ and so forth.  When one person writes about asking students to memorise things, someone seems to have responded referring to the ‘pub quiz curriculum.’  I’ve often heard the idea of memorisation spoken of as pointless: these days, ‘you can always just Google it.’  As an incidental, rote memorisation is not the same thing as rote knowledge, though the two are frequently conflated. Here’s the crux of this post: I suggest that if we put all our thought and effort into building understanding, we do so at the expense of memory, and will nurture students who understood everything, once, rather than understand it, still. Understanding alone does not = memory; it’s possible to forget what we once understood.  I saw the proof that root 2 is irrational on four separate occasions, across the space of a year, before I could reproduce it from memory, despite having fully understood it every single time.  …actually as I write this now, I’m not wholly sure whether I still can remember it, or whether I’ve forgotten again.  Why does that matter when I can always just Google it?  Well for example if in conversation with a student I thought it was appropriate to quickly introduce them to the existence of the proof, then I would do so.  If I have to Google it, I’d probably spend those minutes Googling, and have no time left to explain – this has happened before in various forms; opportunity lost.  In addition, if I can’t actively recall the proof, then I cannot relate it to any new knowledge I gain, leaving my overall intelligence undermined. Understanding may be an important pillar, helping to support the burden of memory, but is it the only such pillar? I’d like to offer just one example of where I’ve tried to deliberately focus on helping students remember something that they had already learnt, and understood. I created a story to help students remember the quadratic formula. Quadratic.formula Non-maths specialists will appreciate students’ apprehension when presented with this intimidating formula I’ve heard many teachers in different schools tell students not to try remembering the formula; it’s provided on the formula sheet in the exam paper, so you don’t need to.  I’ve also heard one or two teachers insist their students learn it by heart, stating that if they don’t, they haven’t really learnt it.  Returning to the philosophical theme of my first post, in The Phaedrus, Plato writes of Socrates’ disdain for the written word.  I quite enjoy the following line: “…they will be the hearers of many things and will have learned nothing.”  While Socrates arguably takes an extremist position against ‘the gift of letters,’ I think there is a truth to his words – that to truly understand something, completely, you need to have it with you, in you, a part of you, not just symbols on a page you may or may not be able to decipher at some later date. When I told my Year 11s I wanted them to remember the formula by heart… well you can imagine the reaction, and yes, some of them leapt up to helpfully note that it’s given at the front of the exam paper.  I asked them to trust me, and then told them the following story – in the lesson, it was accompanied by my acting out the story a little. A lady comes home from work, and sees a scratch in her car. Before she can worry about too much about it, she sees a bee! She jumps up and ducks down to escape the bee, before running into her house. She sees the bee through her square window, ‘Phew!  I’m safe, but man is it hot in here!’ So she decides to turn the heating down by four degrees, using her air conditioning. But on her way over to it, she accidentally falls over two apples. They looked at me like I’d gone mad.  I retold the story, and as I did, a few of the quickest in the group clocked what I’d done.  As more started to see it, there were more excited cries of ‘Oh I get it!’  For the remainder who still thought we’d all gone a bit strange, I retold the story, and this time drew out the formula as I did – everyone now spotted the link.  I told the story one last time, then asked them to try and redraw the formula now, from memory.  A wave of excitement swept over the classroom as they eagerly took up pens to test out their new memory.  There was almost perfect recall across the whole class – naturally there were still a few minor errors here and there.  The students were so proud that they could reproduce, from memory, the most complicated formula they’d ever seen, that the story didn’t stay in my classroom; many of them told it to other students in other classes, and even in other years.  As far as I’m aware, to date every student who’s heard it has been excited by, and proud of, what they can remember.  That was months ago.  How did they do later?  Well we never revisited it as we should have done, so as you can imagine, they didn’t do a great job when I asked them to try again maybe three months later.  I talked them through the story again, and they got it back – I helped them strengthen the cue.  Another month on (last week) I asked them to try again, and nearly everyone now had it back to 100% accuracy from memory, while some no longer need the story to recall the formula. I’d really like to hear other people’s thoughts and experiences of students and memorisation.  Have I failed to make the case that understanding is necessary but not sufficient?  Is memorisation a waste of time?  Is it simply not as important as understanding?  Are my perceptions wrong, and memorisation is a part of all our curricula?  Can anyone share stories of how they helped students effortlessly remember what they had learned? p.s. Here’s the rest of that quote from The Phaedrus About Kris Boulton Teach First 2011 maths teacher, focussed on curriculum design. This entry was posted in Memory. Bookmark the permalink. 51 Responses to Why is it that students always seem to understand, but then never remember? 1. Reblogged this on Scenes From The Battleground and commented: 2. debrakidd says: Really like this – Kieran Egan writes quite a lot about narrative memory and it’s really powerful. I use this and spacial memory techniques to get pupils to remember key complex vocabulary. They attach a movement to the word or idea – it’s basically what the Jolly Phonics programme works on. When my son was revising for A levels he tried it and said it really worked, but he kept twitching in the exam!! The other thing that helps actors remember lines is making an emotional connection to the text – either through emotion memory or attaching an emotive quality like a super objective to the line. That makes it more memorable, so it’s more complicated than rote learning. Love your bee story idea – will share with our maths dept! • krisboulton says: Thanks Debra. I liked what you added about spacial memory techniques – I’ve used something similar in creating sheets to help kids memorise the prime numbers up to 100 and angle facts. The spatial element seems to make a real difference. I borrowed the idea from Sporcle, after using their Africa quiz to learn and memorise its 54 countries last year. That anecdote will feature in full in a future post. I’ve heard similar tales to that of your son as well; anecdotally I was told once that they heavy use of abacuses in Chinese schools meant kids there were very good at rapid mental arithmetic, but that you’d see their fingers moving in assessments as though using an imaginary abacus! Don’t know if anyone can corroborate that story? 3. Very much enjoyed and agrees with this piece Kristopher. Thanks indeed. Colin 4. bt0558 says: I think this is an interesting topic and an equally interesting example. Could you (or someone else) explain what you mean when you say “that they had already learnt, and understood”. What do you mean in this case by “learnt” and what do you mean by “understood”. I learnt this formula 36 years ago and have not really used it since. I can recall this formula without any problem, without the need for a story like that you present here. Old Andrew, who has reposted your post on his blog is one for talking of dumbing down. I have a feeling that making up a story like this to remember what is a fairly strightforward formula might be an example of dumbing down. I understand it is a memory aid but I have not come across too many examples of kids who couldn’t recall the thing easily. The number who could understand it and actually use it effectively is somewhat less in my experience. In a situation in which a person does not have access to the forumla externally, the kid who can remember it will clearly have an advantage. If asked whether is would be better to be able to remember the thing but not use it, or be able to use it but not remember it I would suggest that the latter is more valuable. If asked whether it is better still to be able to both recall it and use when faced with a problem then I would respond “of course”. A very interesting and thought provoking post. Thanks • krisboulton says: It’s fair to say that what we each mean when we use the words ‘learn’ and ‘understand’ can be different. In this case I meant that they had seen the formula, knew its purpose, and could successfully substitute the coefficients of quadratic equations into the formula and determine correct solutions. Being able to do this, though, does not automatically mean they can recall the formula from memory. If they were to practise using it again and again then over time it might be that they would grow to remember it that way (something that should be touched on in the next blog post). If for any reason that kind of time won’t be dedicated to practice however, the story serves as a kind of memory short cut. As I noted in the post, with additional practice, some students are now quickly writing it down without referring to the story anymore, but the kids I work with don’t always recognise their potential, and so had I not first shown them that they were capable of memorising such a scary formula, they would have forever insisted I provide it for them – which I would have had to do, since they hadn’t memorised it! Dumbing down in Andrew’s sense refers to expectations. If you’ve largely worked with children who can easily remember a formula like this, then I would hazard we’re perhaps engaged with cohorts in differing circumstances. The students I teach have not necessarily had the most structured and consistent mathematical experience for myriad complex reasons; for example they’re mostly learning to factorise and solve quadratics in Y11 for the first time. In this context, ‘dumbing down’ would be always providing them with the formula, and never expecting them to remember it, which we can get away with since it’s given on the exam paper. By contrast, I expect my students to memorise the formula, but I intend to make that as easy for them to do as I’m able. 5. Sam Yeager says: Interesting blog post and I quite like the cue to remember the formula. As a non teacher it occurs to me that perhaps you, and other teachers, should go further and aim to develop the ability within pupils to create their own cues to aid recall. Obviously recall is useless if you don’t have understanding as well. I can look at that formula to my heart’s content but I still don’t know/remember what a,b and c stand for. 😦 • krisboulton says: Thanks Sam, and totally agree, you need to know how to use it as well. Currently though the push as I perceive it would be to get them to *understand* why it works, i.e. derive it from first principles by completing the square of a quadratic in general form. If they understand that, it’s certainly valuable, and then a further argument would suggest that they’d never forget again, since they’d always be able to derive it. However, it takes an awful lot more to learn the derivation than it does to remember a simple story, and actually trying to derive the formula again is incredibly slow! There is also a public voice that suggests as you say that kids should be asked to come up with these things themselves. There’s nothing wrong with that, and I do think it can have some value, but I hesitate at suggesting it’s a ‘better’ alternative for a number of reasons. First, it means the cohort lose that sense of having shared knowledge, something they all know and value. Second… it’s hard to do! They simply may not succeed, or may not what to try, and in the end it’s rare that a student will individually come up with a mnemonic that’s *so* much better than one we can provide that it’s worth that risk (it does happen, but I’m talking cost-benefit analysis now.) Finally it takes a lot of time. I worked on that little story in my head on and off over several days, maybe even a few weeks before I got it to a place where it would work nicely. Argument can be made for spending that time in class asking students to do it – they’d be spending a lot of time thinking about the formula, and therefore would be *even* more likely to remember it later – but again it’s a cost-benefit that needs to be balanced. • bt0558 says: “Obviously recall is useless if you don’t have understanding as well” As a general statement I would disagree. In this particular example, one is required to solve a quadratic equation. Being able to recall the formula but not apply it would mean that this had not been achieved, however recalling the formula clearly had. A reasonable aim here might also be to recognise this as the formula that could be used, and following recgognition to apply it to a problem. As a first step towards learning how to apply the formula then I think being able to recall it is quite useful. I am not necessarily one for learning a whole raft of random facts just in case they might be useful one day, but I do think there are many occasions where being able to recall knowledge is actually quite useful. Later, opportunities to apply such knoledge might well present themselves. When the time comes for you to learn what a,b and c stand for, as you can already redcall the formula you will have an awesome tool at you disposal. Until then, whenever you are asked by someone who is unable to recall the formula, you will be able to tell them without hesitation. That is not an achievement to be sneezed at. After all, it isn’t possible for everyone to know/understand everything. 6. HeatherF says: I have put much more focus on memory with our GCSE sets in History. There is just so much to learn, especially as they they don’t do modules. Learning the material is by far their biggest challenge and yet we had no regular testing. I applied what I had realised from teaching my own children primary maths using direct instruction. I realised that when we did test it was often after half a term’s worth of work and too daunting. I identified the absolute bare bones I wanted all students to know and set regular tests using exactly the same format every two or three weeks. What really made it work well was telling the students exactly what would come up in the test (e.g. learn four reasons there was growing tension at the Potsdam Conference). It meant everyone had a chance of full or nearly full marks. I then set a high pass mark and was ruthless about re-testing those that failed. It has been a really great success and actually well liked by the kids that enjoy the fact they can do well and get a sense of achievement. I am chuffed because they are all remembering the really crucial facts and understanding the ‘next bit’ better because even the week ones know the basic outline of events so far. My department really like the format too after some concern that we just didn’t have time to fit in regular tests (I was a bit worried too). This said, although I have chatted about the principles behind the format, when I leave making the tests to colleagues the gap of time between tests expands and the guidance becomes much less prescriptive. Its harder than I thought to share the principles behind the method! 7. Solid stuff! I’d also recommend having a look at Robert Bjork’s stuff on introducing ‘desirable difficulties’ to aid learning & memory: http://bjorklab.psych.ucla.edu/research.html i blogged about introducing desirable difficulties into the English curriculum here: http://learningspy.co.uk/2013/03/25/redesigning-a-curriculum/ 8. steve says: Teaching trig as an NQT to a difficult Intermediate GCSE group I talked about ways to remember which ratio applied to which sides of the right angled triangle. SOHCAHTOA didn’t seem to cut the mustard; Silly Old Hens didn’t trigger anything – I set them off to make up one of their own for homework. Next lesson we had a wide variety of little stories that all seemed to use “Sex” as the word to represent the S (for sine). Worked well though – although I did have to read quite a few stories about hilltops and animals; alcohol and holidays etc. when marking the mocks! • krisboulton says: Fair enough! Can’t argue with what works. I’m surprised to hear SohCahToa didn’t do the job; I’ve found students to love trigonometry because the acronym’s easy to remember, and it effectively encodes everything they need to know. • steve says: Yeah SOHCAHTOA works for most of mine. Thsi class were really boderline between (old) Foundation and Intermediate tiers and this just seemed to stick better for them. Not sure any actually move into the stage of not needing to actually recount the story before tackling the problem though – I wonder if any still remember it? • Amitabh says: Sometimes relating to interesting facts about the subject being memorized helps. For example, remembering that for angle in degrees, sin(30) = 1/2, and tan(45) = 1 is a simple substitute for the acronyms. Visualizing a triangle and these values will make it obvious which sides are involved in each case. ‘cos’ is the remaining combination. And then after practice you just remember the combinations. 9. Phil H says: Really interesting, and sounds like great teaching. I have taught ESL in China, in an education system which apparently prizes memorisation above all else, and even here, no-one actually teaches children how to remember things. I personally hate mnemonics, but they do seem to work for a huge number of people, so this is very valuable stuff. I also like your analogy with a script. I think part of the reason why there’s such an emphasis on understanding, is that people now want to focus on learning skills, and the idea is that you never forget a skill. You never forget how to ride a bike, for example (so they say!). And I agree with that in many ways: understanding why something works is a qualitatively different experience to memorising how it works. It stays with you, and teachers should aim for that where possible. But it’s not always practical. To this day I struggle to derive the quadratic formula, whereas learning it, with a mnemonic or otherwise, is pretty easy. For children, learning it is definitely the best way to (a) get through exams and (b) get a step closer to the intuitive understanding that will make them able to derive it. • krisboulton says: Thanks Phil. I didn’t use to like mnemonics either. I remember picking up a book on memory from my university library during revision time, and it talked about a similar idea of writing a story to remember a complicated formula. For my part, I looked at it and didn’t see the point! I could just rote memorise the formula, and have to remember less than remembering a much longer story! But that works for me; I have the patience to sit and cram things into memory, where others don’t. I think in those cases, being led towards an easy way of memorising something that otherwise seemed insurmountable, is inspiring. While Willingham has a fair bit to say on different mnemonic techniques, I started to come round to them much more when learning French ‘with Michel Thomas’. His command of mnemonics is so powerful that, having listened to CD1 once, 7 years ago, I can *still* recall that “Venir means ‘to come,’ like the veneer that won’t come off the walls.” To this day I’m not sure what veneer is, but it did the job! Just one of many he uses to outstanding effect. 10. Pingback: Peace, love and understanding | websofsubstance 11. alexbaileywriter says: We remember the knowledge that we use. The rest is ‘something we did once at school but didn’t use’ (or didn’t use soon enough), so all we remember about it is that we once did it at school. Without practice, knowledge remains passive. Actors remember their lines because they’ve used them, during rehearsal. I remember equations that I’ve had to use to solve practical problems. When knowledge it actively applied it becomes something more than mere knowledge: it gets wound up in skill. Interestingly at that point, you don’t have to work at remembering it. You just know it, and you just use it. It’s part of you. It’s there to draw on again and again, when a problem requires it. The question relating to teachers’ planning is therefore: ‘how am I getting my students to use the knowledge I’ve taught them?’ 12. blueink21 says: I think the idea of memory and what students actually remember is an important aspect of teaching and learning. We have an exam system that relies quite alot on what students actually remember and can then recall when sitting their exams and so we do need to pay some attention to getting pupils to think about this aspect of their learning. For some things memory is perhaps more important than the understanding of a concept – I am particularly thinking about times tables. I learned these by mainly by rote at school as that was the favoured technique then. This is not a very fun way to learn times tables but it did help me understand that with repetition my brain was capable of remembering and recalling lots of information. My son found learning times tables pretty hard and I found myself trying to explain to him that he didn’t really have to understand them, just simply memorise sets of numbers and familiarise himself with the patterns. This video clip demonstrates the use of the counting stick as a simple way to show students how their memory can do pretty impressive things. I wonder what other educators think about the way the school day is usually organised in high school, and if a change to timetables may result in more embedded learning. I have often wondered what it might be like if high school students spent a whole day on one subject rather than the one hour one subject timetable that most schools follow. I can imagine there being huge benefits in spending a full day to properly explore a subject or concept, or to complete a painting or a design technology project. 13. I would suspect that retention is related to the coupling of understanding with the simple matter of living and breathing what has to be understood. The comparison I can make is with Cognitive Behavioural Therapy, where you create a journal of your thoughts and emotions in order to identify those that fail to serve you well.. The process can be understood, but is almost valueless unless undertaken – you must actually do the journalling. So many self-help book readers understand what they need to do to improve their lives, but the understanding is not acted upon. Maybe not an ideal analogy, but I hope you see my gist. 14. Roque Segade Vieito says: I was transfixed reading through this. Very stimulating. As a Science teacher, a huge amount of content from key words to equations through to explaining abstract concepts is required to be accessible to students’ memories in the exam. I find that week in week out students leave the classroom demonstrating understanding only to be surprised all over again next time I see them. I particularly enjoyed Willingham’s paper. I feel like starting the year with every year group using his suggested activities. 15. Pingback: Edssential » Why is it that students seem to understand, but then never remember? 16. Pingback: The superior nature of understanding | Webs of Substance 17. Pingback: What does simplicity look like? | …to the real. 18. Pingback: Teaching cycle stage 1: Explaining « David Didau: The Learning Spy 19. hodteacher says: I have been working on ideas for ‘stickability’ in my Maths Department. I agree that we need to be careful, too much focus on ‘understanding’ could mean throwing the baby out with the bath water. We need to make sure the concepts ‘sticks’! 21. Pingback: Trying to put the ‘continuing’ into CPD | Improving Teaching 22. Roosevelt says: 23. Pingback: Understanding is Not Enough, and First Steps into a Level-Free World | MissQuinnMaths 24. Pingback: Does memorisation get in the way of learning? – Part 2 | …to the real. 25. Pingback: Does memorisation get in the way of learning? – Part 3 | …to the real. 26. Pingback: Why don’t students remember what they’ve learned? | Pragmatic Education 27. I love your technique here. Very powerful. Another example: when I was in high school two of my friends decided to give every element in the periodic table a personality based roughly on their properties. They then spent hours talking about how the different elements would react to each other when they met. You can probably guess the result. Both students aced Year 12 chemistry, a subject that the majority of us found dead boring. Personification and stories are the original vehicles of knowledge. We’d all do well to bring them into our teaching a lot more. 29. Mark smith says: The real problem (that you elude to here) is not that they can’t remember but that they don’t want to enough. As you say, they don’t recognise their potential and don’t bother trying to remember it. As human beings we are capable of remembering the strangest things but only if it seems meaningful to us. It is getting the students to want to remember which is the biggest hurdle. • Kris Boulton says: Can we ever achieve that? Is it an inherent flaw in universal education that, since it’s not any kind of opt-in system, we can never guarantee interest across the board? Or could we, if content were delivered in some ideal way? If we can’t, are there alternative ways ensuring retention over time? 30. The much maligned French system does this with poetry, conjugating verbs and weekly dictations (at Primary School). For a long time the reasoning behind this has been to improve retention. In the UK and US we often look down at the French system, and yet international comparisons such as PISA do not support this supposed superiority. 31. Pingback: How Best to Track Assessment? - Mr Thomas' Blog 33. Eleni Pepona says: Hi Kris, you touch upon so many things here and they are all interconnected! In a chinese cookie once I read the following “To learn, read; to know, write; to master, teach”. Over my years as a student of maths and then practitioner I ve had dozens of peers or students thinking they know something, becuase they read it and it made sense to them at that point in time, but then failing exams miserably because they could not recall it, same as you describe here. Unfailingly, it was becuase they had not practised writing it on their own enough. I asked a friend how he studied for his exams once. He said he read through his notes. I said ‘no silly, you need to solve every single of these problems by hand on your own, not just read through it’. So, yes, as with so many other skills practise is paramount to convert something from short term to long term memory. You also need to make retrieval links in wider context problems. Example: you need to solve a quadratic as part of figuring out the intersection points of a parabola and a line. that’s your context, solving the quadratic is then a means to an end, not the end itself; just an intermediate step on a wider solution process of a more meaningful problem. If a kid asked me why they need to remeber the formula, or any formula for that matter, I d say, when you are driving from home to school or work, you need to follow a route, right? You need to turn at certain points, and in order to turn, you need to check your mirrors, indicate, and then complete the manouvre. If you had to think hard about completing this task every time you needed to take a turn, your driving would be slow, clumsy and it would take you a long time to reach your destination. You d probably also feel a bit deflated and demotivated to drive further distances. why do we learn so complicated things like driving to the extend we do them mechanically from memory, on autopilot, but we have difficulty remembering a formula? there is definitely an element of motivation involved. Clearly we want to learn to drive, at the age of 17, probaby because it is cool to do so and shows we are grown ups now. We find it cool because this is the value that has been passed onto us from a very young age, many many people do it very effectively and we want to do it too. this is not the case with maths in this country. other countries do not have this issue. In Greece, Russia, France, India, Singapore it’s not cool not to be good at maths. Not that everyone is good at it, but those who are not recognise it as a stigma, not something to joke about. So the motivation from the society is there, maths is valued for what it is, not for the job you ll get if you are good at it, like you comment on a different post. And even though thats a different discussion, I do feel Kris that unfortunately despite our best intentions as maths educators we cannot beat the societal values we live in. No one would joke about not being good in English but somehow falling behind in maths is fine. Back to your memory versus understanding questions though. For me, as with every skill a human possesses knowing is the same as doing. You know how to write means you can write, to know how to speak, means you can speak, to know how to play the piano, means you actually play the piano. All these things, you learn through practice, right? You practice your scales, so that then you can play your piece effectively and focus on being musical and interpretation rather than just trying to hit the notes. As you say in your recent TES article re times tables, memory is there to support further understanding, to help us identify patterns, to help the brain draw relations and come to conclusions. 34. Susan Wilson says: Just a note about the quadratic formula… I prefer to build student understanding of completing the square and the generalization of completing the square. Memorize/remember the formula if that is useful to you but know and understand how to recreate it should you forget and have the need. • Kris Boulton says: So do I, but that is a much more complex task, requiring much greater time. Being able to memorise the formula is a quick win; I would argue it’s easier to do this first, then join it up to completing the square of a general quadratic later. 35. Pingback: Why do our students forget what we teach them? – How then should we teach? 36. Pingback: Why don’t students remember what they’ve learned? – GODSENT NNAEMEKA NNAJI ACADEMIC WORLD 37. David says: I am not totally convinced such a technique could be used in general. Of course, this will help to memorize one maybe ten formulas, but what about a 2 pages long proof? I cannot imagine I would create a story for every single problem I need to remember because I would not be able to memorize the stories themselves. But on the other hand, I have no clue how to tackle memorization for more complex problems and your technique is the best one I found so far. Do you use any other techniques? • Kris Boulton says: Hi David. I picked up a book on memorisation from my university library back when I was studying for my exams, and felt exactly the same way. (A) surely this means remembering more than just memorising the formulae directly? (B) can I actually create a story for all of it? For GCSE maths, there aren’t that many complex formulae, so I think it takes care of B… And even for higher level content, and things like two page proofs, it’s certainly possible (far more has been achieved using techniques like this) But it is still a capability that either not everyone has, or that one would need to develop… Not ideal! For A, I think I was just plain wrong – even if something has more information content, putting it into story form makes it much easier for the brain to recall later. There are other techniques, but more than I could put into a comment. I’d suggest picking up some books maybe? Like moonwalking with Einstein, and make it stick. There’s a free article you can find online as well by Daniel Willingham, ‘What will improve students memory’ Leave a Reply to krisboulton Cancel reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
Tue. Jan 21st, 2020 Waste management in Lean Manufacturing Lean manufacturing is a whole heartily process done to reduce waste at any cost. Nothing could more define this mechanics better than above line. An organization and company runs on its employees and machines, then this is obvious that they owe maximum responsibility and Lean manufacturing focus on the management of these two pivotal parts to minimize waste due to equipment breakdown and maximize output due to employees correct maintenance system. But how lean manufacturing works to achieve this target, let us see. 1. Stages of Lean manufacturing process It has three key stages of waste management. 1. Identify the waste- Even in the well-running top companies, waste exists. Any manufacturing organization would have some waste, no matter how good the process is. So, the first stage is to identify the waste. A deep look that how raw material is processed to bring final product, how all the departments are connected, would able to highlight the waste. See which process is beneficial and which is not to get a better idea. 2. Find the root cause- Each waste would have a basic reason which causing it. It might be the machine, which continuously causing breakdown or it may be the only operator which is unskilled to operate it. Whatever the reason is, it should be identified. 3. Solve the root cause- Once you identified the waste then find means to solve it and consistently repeat it. Tools to Reduce Waste There are various tools to reduce wastage 1. Just in Time The first handy tool to reduce waste is JIT. This tool is based on ‘pull’ model. Through this tool the production is done depending on the exact demand of the customers rather than expected demand i.e. the raw material is purchased and processed according to the requirement. Also, small batches are produced for smooth and efficient production. It ensures the quality and reduces risk of wastage. 1. 5S The proper arrangement of your working equipment is very necessary. Leans believe in standardization so 5S tool could help in accomplishment of this goal. This tool includes Sort (eliminate that which is not needed), Set In Order (organize remaining items), Shine (clean and inspect work area), Standardize (record standards for above) and Sustain (maintain the standards). 1. Continuous flow Most of the wastage form due to irregular chain of production process. This tool ensures that work process smoothly flow for production with minimal buffers between steps of the production process. It could help in eliminate many forms of waste for example waiting time, transport. 1. Zero Defects Any defect in the production process or within organization is completely unacceptable. This tool ensures this notion. It motivates workers of every department to execute work and fix problems permanently on the first time itself, rather than waiting or doing it temporarily. Above process are applicable to almost every company but the areas of wastage is different for every other organization. It is better to hire a Lean Manufacturing Consultant, which can professionally asses your company and could give beneficial advises.
Alice's Adventures in Wonderland 著者: Lewis Carroll ナレーター: Julia McKenzie シリーズ: Alice in Wonderland 再生時間: 2 時間 50 分 カテゴリー: 洋書, Classics Alice's rather wild adventures in Wonderland begin on an unadventurous picnic, when her attention, wandering off from the lesson it was supposed to be glued to, is caught by a passing white rabbit who happens to be wearing a waistcoat and muttering to himself, "Oh dear! Oh dear! I shall be too late!" As he disappears down a rabbit hole, and Alice, for want of anything better to do, follows him, a tale of almost hallucinogenic wildness unfolds as she finds herself in Wonderland - a fantastical world where the characters Alice meets and the situations in which she finds herself have the whiff of symbol and allegory about them but are too whimsical to be pinned down as such. The story of how Alice's Adventures in Wonderland came to be written, and the author’s association with the Liddell family - and Alice Liddell in particular - is now the stuff of legend. One summer afternoon in 1862, the author, in the company of the Reverend Robinson Duckworth, took the three Liddell sisters, Lorina Charlotte, Alice Pleasance and Edith Mary, out in a rowing boat on the River Thames, near Oxford. On that boat trip, he entertained the girls by telling them a story about a bored little girl called Alice who goes looking for an adventure. Two years later, Alice's Adventures in Wonderland was published - and sold out rapidly. Public Domain (P)2007 Silksoundbooks Limited
The “SAD” Truth about the Winter Blues Got the “winter blues”? As the weather begins to get colder and days get shorter, many people report having problems sleeping, experience changes in appetite, have low energy and feel depressed. While many people attribute these feelings to the weather, there can be an actual clinical issue causing these “SAD” feelings. Seasonal Affective Disorder, also known as SAD, is a type of depression that comes and goes with seasons, typically around late fall and early winter. The causes of SAD are unknown but one hypothesis speculates the association of these symptoms with Vitamin D levels. Vitamin D is a fat-soluble vitamin that is essential for calcium absorption, bone health, cell growth and immune function. Vitamin D is naturally found in only a few dietary sources like fatty fish (salmon, halibut and tuna) and egg yolks. As a result many food sources like milk and breakfast cereals have been fortified to provide more Vitamin D than is naturally occurring. Many individuals take supplemental forms of Vitamin D, as well. While you can get some Vitamin D exogenously from food or supplemental forms, Vitamin D can also be endogenously produced (in the body) via sun exposure. Since dietary sources of vitamin D are limited and sun exposure in late fall and early winter decreases, clinicians began to hypothesize the association between low vitamin D levels and Seasonal Affective Disorder. In a recent study by a researcher Tenna Frandsen and colleagues, they wanted to explore this hypothesis by testing the effectiveness of vitamin D supplementation for the treatment of SAD symptoms. Participants completed a questionnaire determining the severity level of SAD symptoms and then were separated into two groups; one receiving 70 milligrams of vitamin D and the other one a placebo. After 3-months of this intervention, participants retook the questionnaire and their scores were compared. While this study was unable to definitively demonstrate the scientific effectiveness of vitamin D as a treatment for SAD, many individuals did self report an improvement in the symptoms they were experiencing. If you are experiencing any symptoms related to Seasonal Affective Disorder you should consult your primary care physician to check your vitamin D levels. While you can’t get enough vitamin D via dietary sources, you can synthesize enough vitamin D by exposing your forearms to natural sunlight for 15 minutes each day. However for those living in states where the sun may not shine during these winter months, supplemental vitamin D may be a beneficial treatment for your winter blues. And if that doesn’t work, maybe try putting on some good music and dance!
In Mary Shelley's Frankenstein, how does Victor's lab look? Expert Answers info booboosmoosh eNotes educator | Certified Educator calendarEducator since 2003 write4,119 answers starTop subjects are Literature, History, and Social Sciences In Mary Shelley's Frankenstein or the Modern Prometheus, Victor Frankenstein leaves his home to attend school. He begins by listening to lectures of different professors with ideas that are diametrically opposed to one another. One of Victor's favorite instructors is Waldman, who opens a new world of thought to Victor, however in retrospect, Victor recalls that these lectures set him on his path to self-destruction. Victor studies a great many subjects, including philosophy. Ultimately, he begins to study death as it relates to life and the animation of flesh. He visits charnel-houses, where the dead are kept, and even graveyards. However, to achieve his purpose, he must conduct his experiences with the utmost secrecy: playing "God" is not a welcomed activity at the university. Victor sets up a laboratory of sorts. He lives in a house, and on the top floor of that house, in what he describes as a chamber or a "cell," he keeps his "workshop of filthy creation" which is carefully separated from the rest of the house. It is in this place that he brings the fruits of his labors in gathering materials for his experiments: bones, flesh and body parts. Also in his work area: check Approved by eNotes Editorial
Solid Performance Q: I am planning to purchase a new computer, and I’ve heard that solid-state drives are much faster and use less energy but are more expensive. In your opinion, is the higher cost of a solid-state drive justified? A: Solid-state drives (SSDs) use flash memory and have proven to be very fast. Because they have no moving parts, and hence require no time to spin up to full speed, they deliver data almost instantaneously, even if the data is significantly fragmented. Compared with hard-disk drives (HDDs), SSDs are faster, lighter, quieter and less susceptible to vibrations, shock or magnetic interference. They also are far more energy-efficient. The drawbacks to SSDs are that they tend to have a limited life span, performance can degrade over time, and they cost about five to 10 times more than traditional HDDs. While HDDs typically cost 10 to 20 cents per gigabyte, SSDs typically cost about $1 to $2 per gigabyte. Therefore, price and longevity are factors you should consider. Recently, hybrid drives have emerged that combine the reliability of HDDs with the speed of SSDs through SSD caching. With these devices, a built-in SSD caches data before it is written to the hard disk and (at times) anticipates and pre-fetches data before the computer needs it. The results are reliable HDDs with faster performance. These hybrid drives cost about 25 to 50 cents per gigabyte, and to find one, simply look for drives that include SSD caching. I recommend 16 GBs or more. A computer’s read/write activities represent the slowest function in a computer and are typically where performance bottlenecks occur; therefore, it does make sense to pay attention to hard-drive performance. However, the type of performance gains offered by SSD and hybrid drives are more noticeable when working with heavy transaction applications such as accounting system and ERP applications, or larger amounts of data. If your current computer is operating fast already, you probably will not notice significant performance gains offered by the more expensive SSD and hybrid drives. More from the JofA: What’s next for potential CPA licensure changes What RPA is and how it works
The Difference Between Raft Foundation vs Pile Foundation The construction industry serves as one of the formidable pillars of the progress of our civilization. Throughout history, various construction projects have shaped the face of mankind’s presence on Earth as we know it today. However, many of us do not deem it worthy of wondering about the intricacies in the world of construction. That brings us to the question of the most important part of any construction project. The sole answer to the question is the foundation. Foundation is the most crucial part of a construction project, and its effectiveness is very important for the success of the project. Therefore, it is very important to understand the purpose of a construction project and the suitable foundation type for it. In the following discussion, we shall explore the differences between two noticeable types of foundation, i.e., raft foundation and pile foundation. Defining the foundation Before moving into the two types of the foundation under concern in this discussion, let us know more about the foundation. Every foundation structure consists of two parts, known as the superstructure and the sub-structure. The superstructure of a foundation is above the ground. The sub-structure of a foundation is the part that lies below the ground level. The foundation works for transmitting the load of the structure to the ground soil. The foundation rests on solid ground known as foundation bed. The foundation transmits loads of the structure and its weight to the soil in a manner so that it does not exceed the ultimate bearing capacity of the soil. Types of foundation The different types of foundations are classified on the grounds of load transmission to the ground. As a result, we get two broad categories of foundation, namely shallow foundation, and deep foundation. Let us learn about them in brief before outlining the differences between the raft foundation and pile foundation. Shallow foundation involves a lesser depth of placing the foundation than the foundation’s width. Shallow foundations are also known as spread footing because of transmitting a load of superstructure to the ground laterally. Deep foundation, on the other hand, has a higher depth of foundation than the foundation’s width. The deep foundation ensures the transmission of a load of the superstructure vertically to the deep underlying rock strata. Difference between raft and pile foundation The raft foundation or mat foundation is a prominent example of a shallow foundation. On the other hand, the pile foundation is an example of a deep foundation. This is one of the first and the most general point of difference between these two types of foundations. Raft foundation design The design of raft foundations involves a mat of concrete that just sits on the ground or above the ground. The foundation is spread across the complete area of the building for supporting heavy structural loads of the columns and walls. Therefore, the important factors for consideration in the design of the raft foundation include edge conditions, the variability of column loads, and mat stiffness. The raft foundations are ideal for buildings with moderate size and a regular layout. The design involves placement of the mat’s center at the center of vertical loads held by columns with uniform soil pressure. The horizontal column actions to the outside get neutralized within the mat, and inward reactions neutralize with the friction of mat on the soil. The weight of the concrete removes any concerns about uplift pressure. Pile foundation design The design of pile foundations is highly focused on two significant components. The components are pile cap and a single pile or group of piles. Piles are generally installed in groups of three, and they can help in tolerating inaccurate column placement. The pile foundations are made of steel, wood, or reinforced concrete and are available in the prefabricated state. The design involves laterally braced columns piercing through weaker soil and reaching the suitable ground. The lateral loading receives resistance in the pile foundation through bending. The use of pile foundations is appropriate for areas that do not have sufficient land for construction, or the ground is soft. Therefore, you can notice clearly that there are differences between the raft and pile foundations. The most prominent point of different lies in the types of buildings for which they are suitable. Both types of foundation are distinct in terms of design and offer different cost benefits also. For example, raft foundations prove cost-effective in the short-term while pile foundations are built for the long journey!
IBM's Blue Gene Supercomputer Models a Cat's Entire Brain Simulating Cat Minds Can I haz brainz?IBM IBM and Stanford University researchers modeled a cat's cerebral cortex using the Blue Gene/IP supercomputer, which currently ranks as the fourth most powerful supercomputer in the world. They had simulated a full rat brain in 2007, and 1 percent of the human cerebral cortex this year. A separate team of Swiss researchers also used an IBM supercomputer for their Blue Brain project, where a digital rat brain's neurons began creating self-organizing neurological patterns. That research group hopes to simulate a human brain within 10 years. Another more radical approach from Stanford University looks to recreate the human brain's messily chaotic system on a small device called Neurogrid. Unlike traditional supercomputers with massive energy requirements, Neurogrid might run on the human brain's power requirement of just 20 watts -- barely enough to run a dim light bulb. [via AP and PhysOrg]
What Happens When There Are High Chloride Levels in Your Blood? High chloride levels in the blood cause dehydration, states Lab Tests Online. It may also be a sign of Cushing syndrome or kidney diseases. In addition, high chloride levels may result in excessive fatigue, muscle weaknesses, respiratory issues, high blood pressure and gastrointestinal symptoms, states Healthline. Chloride is an electrolyte that aids in maintaining optimum fluid and acid/base balance in the body, states Healthline. The proper balance of these electrolytes is essential for normal functioning of the nerves, muscles and heart. It is also useful for normal fluid absorption as well as excretion. Electrolyte imbalance due to high chloride level in the blood is referred to as hyperchloremia, according to Chemocare.com. The normal value for chloride is 97 to 107 milliEquivalents per liter. Causes of hyperchloremia include high levels of blood sodium, kidney disorders or kidney failure, and diabetic coma or diabetes insipidus, reports Chemocare.com. Drugs such as estrogens, androgens, corticosteroids and certain diuretics may also increase chloride levels in blood. High levels of chloride in the body may also be attributed to medications such as those used to treat glaucoma, according to Healthline. Other causes of hyperchloremia include bromide poisoning; respiratory alkalosis, or low levels of carbon dioxide in the body; and metabolic or renal acidosis, which occurs when the body produces excess acid or the kidneys fail to eliminate acid from the body.
Posted by on 12 comments printer ink cartridge dirtyThere are several different types of printer ink cartridges. Most printer manufacturers make their own ink cartridges custom-made to fit the various models they manufacture. Therefore Canon cartridges will be different from HP Deskjet cartridges, even though the essential function is the same. How it Works Printer ink cartridges are basically replaceable sealed units that contain the specially processed ink a printer uses during its functioning. The cartridges typically contain one or more partitioned ink reservoirs. There are basically two core designs as far as cartridges are concerned: the thermal and the piezoelectric. Most printers meant for home or business (such as the LaserJet M1212nf) use thermal inkjet cartridges. The ink reservoirs of these cartridges contain a heating element equipped with a tiny metal plate or resistor in each of their partitions. It is important to remember that the ink in thermal inkjet printers perform a dual role by also acting as a coolant to heating elements. This makes it all the more essential that the cartridge is refilled or replaced as soon as the ink supply is depleted, so the print head isn’t damaged. Types of Printer Ink Cartridges It becomes essential that users know exactly what type of ink cartridge to purchase for their printer. There are three main kinds of ink refill packs available on the market. The first is the Original Equipment Manufacturer (OEM) cartridges, made of company-produced refills for each printer model. They are the oldest type of refills available and the most expensive, though the quality can be high. printer ink cartridge color The second type is compatible cartridges. They are manufactured by third-party companies and do not carry the original brand names. They cost only a fraction of the price of the OEMs. Last, there are remanufactured (or refurbished) cartridges, consisting of OEM or compatible cartridges which have been recharged after use. Priced midway between the other two choices, refurbished cartridges are very popular among environmentally conscious users. In conclusion, customers need to take care when choosing printer ink cartridges as they can end up buying one that is not compatible with their particular model. An HP Printer, for example, will use laser toner cartridges such as the CE285A or the HP 85A, but one meant for a similar model from another company may fail to take. It always pays to research your own technology! What kind of ink do you find works best with your printer? Any stories of experimenting with different kinds of ink? Tell us in the comments! 1. This comment has been removed by a blog administrator. 2. This is great information. I have a home office and I use Micro Solutions Enterprises because I appreciate their green initiative, as I try to practice a sustainable lifestyle. I haven't experimented much with my ink. I have to create a lot of printed material for my business, so once I found ink that provided the quality I needed, I stuck with it. 3. This comment has been removed by a blog administrator. chemical color toner 5. Great post, I've been gathering enough information regarding OEM and alternative printer cartridges and this post gives a handful of ideas. My blog as well at thetonerexpert also features some contents related to this kind of topic. Reading facts and consumer responses based on their experienced with the product helps me a lot. 6. There is obviously a lot to know about this. I think you made some good points in Features also.It is really informative article. Samsung Printer Cartridges Manufacturing consultancy recycle ink cartridges 9. For buying a good printer you should considered some point and i think above post helps you for this. Cartouche Encre Pour Imprimante 10. Canon ink cartridges are really tested. I have a canon printer and i know that it will last. 11. Its a great start of the day with a website like this. very informative, i’m now one of the regular visitor of your web. web designing company in jaipur 12. I can sense that this article was knowledgably written. Really useful information before buying cartridges. I should be keener the next time and use these points.
Developer Guides Few words about architecture of GrandNode Most of the projects, directories, and files are named so that you can get a rough idea of their purpose. For example, I don't even have to look inside the project called Grand.Plugin.Payments.PayPalStandard to guess what it does. The Grand.Core project contains a set of core classes for GrandNode, such as caching, events, helpers, and business objects (for example, Order and Customer entities). The Grand.Data project contains several classes for CRUD database operations. The most important is MongoDBRepository, which plays a role as repository layer between database and application Services. GrandNode uses the Mongo DataBase (all application core entities (domain models) are defined in Grand.Core\Domain). MongoDB is more simple and require less code than SQL counterpart. This project contains a set of core services, business logic, validations or calculations related with the data, if needed. Some people call it Business Access Layer (BAL). Grand.Web.Framework is a class library project containing some common presentation things for both Grand.Admin and Grand.Web projects. Projects into \Plugins\ solution folder \Plugins is a Visual Studio solution folder that contains plugin projects. Physically it's located in the root of your solution. But plugins DLLs are automatically copied in \Presentation\Grand.Web\Plugins\ directory which is used for already deployed plugins because the build output paths of all plugins are set to "..\..\Presentation\Grand.Web\Plugins\{Group}.{Name}\". This allows plugins to contain some external files, such as static content (CSS or JS files) without having to copy files between projects to be able to run the project. Grand.Web is also an MVC web application project, a presentation layer for public store. This is the application that you actually run. It is the startup project of the application. Grand.Core.Tests is the test project for the Grand.Core project. Grand.Services.Tests is the test project for the Grand.Services project. - Service Service is plain implementation of Interface, a convenient layer between repository and Controllers (worth to mention – Services should be used only by Controllers – and inside Controllers shouldn’t be any operation on repository). You should use these structures consistent with thier purpose. Of course, why don't request Repository straight from Controller. It is so straightforward (it is not an advice). To enable access to database and its collections with records, you need to declare IRepostiory<DomainModel> IRepository’s implementation is MongoDBRepository<DomainModel> MongoDBRepository (definition of Repository layer) does direct operations on database - Dependencies Inversion of Control and Dependency Injection are two related ways to break apart dependencies in your applications. Inversion of Control (IoC) means that objects do not create other objects on which they rely to do their work. Instead, they get the objects that they need from an outside source. Dependency Injection (DI) means that this is done without the object intervention, usually by a framework component that passes constructor parameters and sets properties. Martin Fowler has written a great description of Dependency Injection or Inversion of Control. I'm not going to duplicate his work, and you can find his article here. GrandNode uses Autofac library as its IoC container. Once a service and an appropriate interface, which the service implements, are written you should register them in any class implementing the IDependencyRegistrar interface (Grand.Core.Infrastructure.DependencyManagement namespace). For example, all core GrandNode services are registered in the DependencyRegistrar class located in the Grand.Web.Framework library. idepandancy registrar You can create as many dependency registrar classes as you need. Each class implementing IDependencyRegistrar interface has an Order property. It allows you to replace existing dependencies. To override GrandNode dependencies, set the Order property to something greater than 0. GrandNode orders dependency classes and runs them in ascending order. The higher the number the later your objects will be registered. folder view class example HERE you can see source code of examples used in this documentation. back to top
What We Shouldn’t Take For Granted The state and market were able to provide people with stability. It gave people food, shelter, protection, and health. Those loyal to it would be rewarded, reimbursed for their contribution and efforts put into it. People against it would often be entirely on their own. Without the additional support. You had to obey anything the state and market had put out. The focus of the individual came along with the creation of state and market. People were encouraged to work any career they desired, marry whomever they wished to marry. However, this, in turn, broke up the family and community culture. This all started when we started to care for ourselves and our technology was advancing at a decent rate according to the texts in Harari. Historians should play the role as sort of message-heavy storytellers. They know all the past experiences of humankind. They know of everything that went in favor of and against our development. It is vital that we have Historians to keep our future generations from making the same mistakes we have made in the past. In the event of potential setbacks to mankind, historians can help with the jumpstart, or boost in human advancement. They also know the limits that we can achieve with technology. With this knowledge, we as a species can advance even farther than we have previously. Their role and importance in society exponentially increase as time goes on. They are essential to our societal success and forever will be that important, despite sounding like their use today isn’t as important as it is.   Leave a Reply
Hamer Tribe Also well known as the hamar or hammer, they are one of the most known tribes in Southern Ethiopia. They inhabit the territory east of the Omo River and have villages in Turmi and Dimeka. Tourists visit the hamer hoping to see a traditional leaping ceremony (the jumping of bulls). They are cattle herders and practice agriculture. Very colorful bracelets and beads are worn in their hair and around their waists and arms. The practice of body modification is used by cutting themselves and packing the wound with ash and charcoal. Some of the women wear circular wedge necklaces indicating that they are married. Men paint themselves with white chalk to prepare for a ceremony. Hair ornaments worn by the men indicate a previous kill of an enemy or animal. The traditional bull jumping is a rite of passage for men coming of age. The event last three days and involves only castrated cattle. The man must jump over a line of 10 to 30 bulls four times completely nude without falling. If this task is complete, the man joins the ranks of the Maza. Maza are other men that have successfully completed the bull jumping event. During this ceremony, the women of the tribe provoke the maza to whip them on their bare backs. This is extremely painful and causes severe scaring on the women. The scars are a symbol of devotion to the men and are encouraged by the tribe. Night dancing called evangadi is also a Hamer tradition. The Hammers have unique huts that are made up of mud, wood and straw. Call us Tele: +251912608430 Contact Us S5 Box
What is Prejudice throughout Numbers? You are wondering what is prejudice in math and if you are in the midst of a mathematics assignment, here are a few useful hints to get helping you deal with a circumstance. Finding out mathematics generally is a good deal connected with entertaining for pupils. Since math is interesting this is sometimes, because math works that kids react to, or it can be. Many kids would sit in the front of the course and select their own books to read, In regards to learning math. They would rather read https://hope.edu/academics/biology/ the various math problems this pupils get. While this may be good for mathematics students in middle school, it is frequently not the most effective way to understand math. Kids who seem to then go back to the publication, solve them and study the problems often have a lot harder time by using the problems. If you’re a middle school student who would like to excel in mathematics, you will have to learn to avoid picking at your own assignments. What is opinion inside mathematics may also become a very practical application regarding helping you to definitely study. If it is possible to find then you definately may receive preoccupied plus begin searching regarding a different solution. If grademiners.com/ you study such issues, you may notice you have a great deal of answers that you have written down and those answers are likely to be biased. You’re more likely to spend more time looking for different replies, as you do this. You are more inclined to ignore the problem, forget the response, and not look at the issue, Should you do this. If you’re new to math, you’ll end up spending more time looking for answers and ignoring the issue. This may include beneficial consequences for college kids. If you invest much time looking for the solution that is very best, you might not have the ability to develop one. You can occasionally get diverted, if you spend much time searching for replies and also ignore the problem. If a person then ignore it and study a problem, you actually may forget some of the information that is key and forget to discover additional details. Even if you opt to read troubles, you need to have some training books which you find beneficial. Ones teachers need to assist you in choosing many training books considering that of your math concepts publications widely available are not by far the most a resume editing good choice for individuals. For individuals that require additional assistance, they are able to check out many mathematics software package on the net which can help those to hunt for and learn more info concerning mathematics complications. Quite sure is extremely of great help for college students that want added help in the location regarding math. Understanding what is prejudice in mathematics can assist pupils steer clear of having this difficulty that any of us were discussing previously. By learning to avoid bias you can ensure that you develop with the solution possible. By working in math, you can make sure that you develop with the most helpful solution. Deixe uma resposta
Chapter: Modern Pharmacology with Clinical Applications: Antiprotozoal Drugs Protozoal Diseases The protozoan Entamoeba histolytica causes amebiasis, an infection that is endemic in parts of the United States. Amebiasis and Balantidial Dysentery The protozoan Entamoeba histolytica causes amebiasis, an infection that is endemic in parts of the United States. The parasite can be present in the host as either an encysted or a trophozoite form. Initial ingestion of the cyst may result either in no symptoms or in severe amebic dysentery characterized by the frequent pas-sage of bloodstained stools. The latter symptom occurs after invasion of the intestinal mucosa by the actively motile and phagocytic trophozoite form of the proto-zoan. Trophozoites may spread to the liver through the portal vein and produce acute amebic hepatitis, or more rarely, the trophozoites may encyst and produce an amebic liver abscess many years later. On rare occa-sions, amebic abscesses are found in other organs, such as the lungs or the brain. Many patients continue to excrete cysts for several years after recovery from the acute disease and there-fore are a hazard to themselves and other persons; the public health risk is greatest when persons employed as food handlers are affected. More recently, it has been recognized that infection can be transmitted by sexual activities. Balantidium coli is the largest of the protozoans that infect humans. The trophozoite form is covered with cilia, which impart mobility. Infection is acquired through the ingestion of cyst-contaminated soil, food, or water. The trophozoite causes superficial necrosis or deep ulceration in the mucosa and submucosa of the large intestine. Otherwise healthy persons commonly exhibit nausea, vomiting, abdominal pain, and diarrhea, whereas debilitated or nutritionally stressed patients may develop severe dysentery. Trichomoniasis and Giardiasis Trichomoniasis is a genital infection produced by the protozoan Trichomonas vaginalis. Infections frequently are asymptomatic in the male, whereas in the female vaginitis characterized by a frothy pale yellow discharge is common. Relapses occur if the infected person’s sex-ual partner is not treated simultaneously. Giardiasis is caused by the protozoan Giardia lam-blia and is characterized by gastrointestinal symptoms ranging from an acute self-limiting watery diarrhea to a chronic condition associated with episodic diarrhea and occasional instances of malabsorption. The parasite is similar to E. histolytica in that it exists in two forms, an actively motile trophozoite (usually confined to the up-per small bowel) and a cyst (commonly excreted in the feces). Leishmaniasis and Trypanosomiasis The flagellate leishmania is transmitted to humans by the bite of the female sandfly of the genus Phlebotomus. Three principal diseases result from infection with Leishmania spp. L. donovani causes visceral leishmania-sis (kala-azar); L. tropica and L. major produce cuta-neous leishmaniasis, and L. braziliensis causes South American mucocutaneous leishmaniasis. In visceral leishmaniasis, the protozoan parasitizes the reticuloen-dothelial cells, and this results in an enlargement of the lymph nodes, liver, and spleen; the spleen can become massive. Cutaneous leishmaniasis remains localized to the site of inoculation, where it forms a raised disfiguring ulcerative lesion. South American leishmaniasis is vari-able in its presentation. It is characterized by ulceration of the mucous membranes of the nose, mouth, and phar-ynx; some disfiguring skin involvement also is possible. African trypanosomiasis follows the bite of Glos-sina, a tsetse fly infected with the protozoan Trypano-soma brucei. The ensuing illness (sleeping sickness) is initially characterized by the hemolymphatic stage of fever, headache, and lymph node enlargement. These symptoms are followed by meningoencephalopathic in-volvement, with wasting, mental disturbances, and drowsiness as the disease progresses. This latter more serious stage requires different, more potentially toxic drugs than does the hemolymphatic stage. There are ge-ographical variations of the disease. Rhodesian sleeping sickness, acquired in the savannah and woodlands of East Africa from Glossina morsitans, is a much more acute and rapidly progressive disease than Gambian sleeping sickness, acquired in riverine areas of West Africa from Glossina palpalis, in which the incubation period can be more prolonged and the disease more protracted. Chagas’ disease, the South American variety of try-panosomiasis, is caused by Trypanosoma cruzi. It is quite different from African trypanosomiasis in its clin-ical and pathological presentation and in its failure to respond to many agents effective in that disease. It has both an acute and chronic phase. The latter frequently results in gastrointestinal and myocardial disease that ends in death.
Tag Archives: Star Spangled Banner Francis Scott Key’s Lost Legacy You heard the story so many times growing up, you can recite it by memory. How Francis Scott Key was detained on a boat by the British as they attacked Fort McHenry outside Baltimore. How he couldn’t tell during the dark night whether the Americans inside the fort had given up. How when dawn revealed the American flag still flying, he was so inspired he wrote a poem whose words became “The Star Spangled Banner,” our national anthem. And it’s all true. But then, as soon as Key’s poem was published, he vanished from history as abruptly as he appeared. Which is a shame, according to Key scholar and filmmaker Philip Marshall. “Americans need to know that Key made a huge contribution to the American story, that he was also flawed and a real person just like anyone else.” Continue reading
Heart Disease Symptoms Learn how it happens Knowing the heart disease symptoms may help save lives... Please take a moment to read the following. Did You Know That: • The heart is a powerful muscle that depends on a continuous flow of oxygen and nutrients. • The blood supply is provided by coronary arteries, which originate from the aorta and branch out to deliver oxygenated blood throughout the myocardium, the muscular layer of the heart wall. • Now, do you know how heart disease symptoms occur? This is how: Over time, the walls of the coronary arteries can become narrowed by a gradual building of fat and cholesterol deposits called plaque. This process called "atherosclerosis" reduces the interior diameter of the arteries and restricts blood flow to the heart muscle, starving it of vital oxygen and nutrients. THE RESULT: Coronary artery disease(CAD). From there, three major complications of coronary disease are identified as: angina, heart attack, and congestive heart failure. What is ANGINA? There are two primary types of angina, a painful condition caused by reduced oxygen flows to the muscle fibres in the heart. (1) "Angina pectoris" is characterized by sudden, brief attacks of chest pain, often triggered by exercise and other strenuous or stressful activities. The pain usually subsides when the activity ceases of after a period of rest. (2) "Unstable angina" is associated with longer or more severe attacks of chest pain. Key warning signs are changing patterns of chest pain or decreased activity preceding the pain. Unstable angina can lead to a heart attack. What is a HEART ATTACK? Also known as myocardial infarction, a heart attack occurs when a coronary artery is suddenly blocked by a blood clot. Deprived of oxygen, the affected area of the heart muscle dies. A heart attack immediately reduces the heart’s pumping ability and may lead to cardiac arrhythmias and cardiac arrest (a complete stoppage of the heart). The severity of the attack is determined by the amount of heart muscle damage and the function of nearby arteries. A Heart Attack Explained on Video (below) Learn more about heart attacks with expert tips from a certified emergency medical technician (emergency medical technician (EMT) in this free video on heart disease. Expert: Michael Herbert Bio: Michael Herbert is a certified emergency medical technician (EMT) with New Hanover County in Wilmington, NC. Filmmaker: Reggie Hayes What causes coronary artery disease? The heart disease symptoms process that leads to CAD has been attributed to many different causes. They include genetic, age and gender factors as well as lifestyle and modifiable risks. • High blood pressure • Smoking • High cholesterol • Diabetes • Inactive lifestyle • Stress • Go back to Top In principle, all people can take the following simple ways toward the prevention of heart disease symptoms. Prevent and Control High Blood Pressure Lifestyle actions such as healthy diet, regular physical activity, not smoking, and healthy weight will help you to keep normal blood pressure levels and all adults should have their blood pressure checked on a regular basis. Blood pressure is easily checked. If your blood pressure is high, you can work with your doctor to treat it and bring it down to the normal range. Also, beware of excessive alcohol use which increases the risk of high blood pressure, heart attack, and stroke. People who drink should do so only in moderation and always responsibly. A high blood pressure can usually be controlled with lifestyle changes and with medicines when needed. Smoking increases the risk of high blood pressure, heart disease, and stroke. Never smoking is one of the best things a person can do to lower their risk. And, quitting smoking will also help lower a person’s risk to experience symptoms of heart disease. A person's risk of heart attack decreases soon after quitting. If you smoke, your doctor can suggest programs to help you quit smoking. Prevent and Control High Blood Cholesterol High blood cholesterol is a major risk factor for heart disease. Preventing and treating high blood cholesterol includes eating a diet low in saturated fat and cholesterol and high in fibre, keeping a healthy weight, and getting regular exercise. All adults should have their cholesterol levels checked once every five years. If yours is high, your doctor may prescribe medicines to help lower it. Maintain a Healthy Weight Healthy weight status in adults is usually assessed by using weight and height to compute a number called the "body mass index" (BMI). BMI usually indicates the amount of body fat. An adult who has a BMI of 30 or higher is considered obese. Overweight is a BMI between 25 and 29.9. Normal weight is a BMI of 18 to 24.9. Proper diet and regular physical activity can help to maintain a healthy weight. Prevent and Control Diabetes People with diabetes have an increased risk of heart disease but can reduce their risk. Also, people can take steps to reduce their risk for diabetes in the first place, through weight loss and regular physical activity. Regular Physical Activity Adults should engage in moderate level physical activities for at least 30 minutes on most days of the week. Diet and Nutrition Along with healthy weight and regular physical activity, an overall healthy diet can help to lower blood pressure and cholesterol levels and prevent obesity, diabetes, heart disease symptoms, and stroke. This includes eating lots of fresh fruits and vegetables, lowering or cutting out added salt or sodium, and eating less saturated fat and cholesterol to lower these risks. If stress itself is a risk factor for symptoms of heart disease, it could be because chronic stress exposes your body to unhealthy, persistently elevated levels of stress hormones like adrenaline and cortisol. Studies also link stress to changes in the way blood clots, which increases the risk of heart attack. From this "Heart Disease Symptoms"page, back to "Home Page" Page copy protected against web site content infringement by Copyscape Heart Disease Symptoms - Heart Disease Symptoms
Help Your Lungs With This Asthma Advice A lot of medications can trigger an asthma attack without you knowing. NSAIDs and aspirin are known for their ability to cause symptoms. Beta blockers that are used to treat high blood pressure and heart disease can develop asthma like symptoms. Make sure your doctor knows if you are taking such medicine and also have asthma. It is important that you take vitamins everyday in order to control asthma symptoms and attacks. Vitamins and nutrients help to promote oxygen and blood flow to your lungs which also controls asthma symptoms. Try to eat foods that will also provide you with nutrients, such as green vegetables and fruits. People suffering from asthma should stick to unscented products. Using products in your home such as incense, perfume or air fresheners can increase the amount of microscopic pollutants indoors and trigger asthma attacks. Certain things in the home, such as newly installed carpet or fresh paint, can also release chemical irritants. Try to see that the air inside your home remains as fresh as possible. Categories: Asthma
Product Reviews   Loading... Please wait... Do You Have Light? Taking a break from all of those instructional materials that we keep current on, here is a more general look at how to plan for hydroponics. Some interesting questions come up when experts look at the average process, when they think about how beginners usually set up their systems. There's also the question of how grow products and grow kits are presented to beginners -- do they really give them the tools that they need to succeed? One of the things that you often see people reminding beginners of is the necessity of having adequate sources of light. When you really don't look at the marketplace, it's astounding how many DIY grow kits do not come with any sort of grow lights. The assumption is that they'll use natural light, and that growers will be savvy enough to recognize this. But the reality sometimes doesn't fit that assumption. Think about the number of sunny days that you'll have in a northern climate. Think about how much light a plant can get sitting on a windowsill that only faces one way. You’ll soon start to realize why a lot of these efforts were doomed from the start -- the plants might have the right climate, the right nutrients and enough water, but they never get the light that they need, and so they don't survive. To remedy this, you need artificial grow lights with a particular spectrum and luminosity, along with a timer. Without a timer, you could easily forget when to turn lights on, and accidentally kill your plants anyway. One other issue has to do with light distribution. In many grow setups, you have what you might call “corner plants” or isolated plants -- these plants are just too far away from the light to get enough, or they're crowded out by other plants closer to the light source. This happens whether or not you use natural or artificial grow lighting. The good news is that manufacturers and retailers have set up ways to deal with this. For example, in many closed-door systems, reflective interior materials bounce the light in different directions so that all plants get a good amount. But again, without understanding this concept, beginners can doom a lot of their plans by not situating lights correctly. These are the kinds of issues that people sometimes need reminders about -- and that's one reason why you see so much of this kind of commentary around. To be sure, it's not just giving plants light, it's giving them the right kinds of light for each stage of the process. But one thing’s for sure, if you set up a DIY hydro kit with no lights or insufficient natural sunlight, you’re in for trouble. For much more on the ways that hydroponics works, read up on the process at Dealzer, and look at thousands of pieces of equipment that you can use to build your dream garden. comments powered by Disqus
Simon Says The Simon Says ESL game is the classic kids game you can use to practise body parts vocabulary, imperatives, or question intonation. Students for Simon Says ESL Game:4+Time for Simon Says ESL Game:5-15 mins Resources for Simon Says ESL Game: With very low level students, you may want to display the body parts vocabulary on the board during the game. 1. One student stands at the front of the class. The other students stand up facing the board. 2. The student at the front has to give an instruction e.g. Touch your toes. If they precede that instruction with “Simon says…” (they could also use their own name instead of Simon) the other students have to follow that instruction. Otherwise, they have to remain still. 3. If one of the students follows an instruction that they are not supposed to, or doesn’t follow an instruction correctly, they have to replace the student at the front. The game can quickly become too easy for a lot of students. A useful variation in this case is to use intonation as an indicator instead of “Simon Says”. If the instruction is said with the normal intonation it is followed. If a rising intonation is used (as in a question), it is not. Target Language Although the Simon Says ESL game is normally for kids, it can also work well with beginner level adults. It is perfect for practising body parts vocabulary using Touch your… or Shake your… instructions. However you could also vary the instructions to practise imperatives in general. Possible examples could be “Turn around”, “Jump up and down” or classroom instructions like “Stand up”, “Sit Down” etc. Obviously you may want to save the more active instructions for kids classes! The intonation version is great listening practise; identifying the difference between an instruction and a question being an essential real-life skill.
A Conversation for The Gladiators of Rome Thumbs up or Thumbs down Post 1 Some years ago I read that the thumbs up gesture smiley - ok was actually a gesture to dispatch the bested opponent in gladiatorial games and was thus a "bad symbol". The signal to spare the opponent was in fact the thumbs down gesture. How did these gestures get changed to their modern values of thumbs up good, thumbs down bad? It seems all the old gladiator movies from the mid-twentieth century had it backwards from the historical facts. Thumbs up or Thumbs down Post 2 There is an entry on this alone. The most likely is... The emperor would give an open or closed hand The palm was flat, it meant life, The palm was closed as a fist, it meant death If a gladiator killed an opponent before permission, the gladiator would be put on trial for murder. Others were Thumb clenched by the fist meant death Thumb to the neck to indicate the death stroke The thumb up or down appears not to have been used Key: Complain about this post Thumbs up or Thumbs down More Conversations for The Gladiators of Rome Write an Entry Write an entry Read more
As October 5, 1970, with the kidnapping of As Pierre Trudeau once said, “Canada will be a strong country when Canadians of all provinces feel at home in all parts of the country, and when they feel that all Canada belongs to them.” Prime Minister Pierre Elliot Trudeau was arguably Canada’s best-known politician, both at home and abroad. During his two terms, Pierre Trudeau made some decisions that still affect Canada to this day. Three major events that prove his significance as an important Prime Minister are The October Crisis, War Measures Act, and The Official Language Act. Trudeau First took office in 1968–79 as fifteenth Prime Minister of Canada, and later again in 1980-1984. HE was third longest lasting Prime Minister of Canada, next to Prime Minister Mackenzie King and Sir John A. Macdonald. The October Crisis was arguably one of the devastating terrorist attacks in Canadian History. The October Crisis was a dark time for Canada it consisted of bombings, kidnappings, and murders. The group behind these horrors was named the Front de Libération du Québec (FLQ). “The October Crisis began on October 5, 1970, with the kidnapping of James Cross, the British trade commissioner in Montréal, by members of the Front de Libération du Québec (FLQ).”(The Canadian Encyclopedia) The FLQ was formed in 1963, with a  simple goal it was to help create an independent Québécois state, using any means necessary, since of the course of the Organization life the group is responsible for committing nearly 200 crimes. During the October Crisis 2 important government officials were kidnapped, “James Cross at his home, and Pierre Laporte as he played with his nephew on his front lawn.” (Canadian Encyclopedia) In exchange for the two hostages, the FLQ demanded a series of things, included freeing of all detained FLQ members, a half-million dollar ransom and the broadcast of the FLQ manifesto. Pierre Trudeau denied all of the demands and said they would not negotiate with terrorists. Eventually, the FLQ manifesto was published by the media, and the Quebec Minister of Justice assured safe passage out of Canada for the FLQ members in exchange for the victims.  The kidnapping of the officials raised a quick response from Trudeau’s government. On October 15 the Quebec government for assistance from the military to aid the local police force. On October 16  the federal government issued the War Measures Act under the emergency regulations. The following day, Laporte’s body was found in the trunk of a car near a military base. In early December James Cross was found, the police negotiated his release for safe passage for some FLQ members and their families. Four weeks later, the Laporte’s captures were found and were severely punished. Two of the captures Paul Rose and Francis Simard received the heaviest sentences: life in prison for the death of Pierre Laporte.The War Measures Act was adopted by Parliament in WW1 (1914)  to maintain security and order during war or a time of crisis. The Act was used three times, it was used in both World Wars and during the October Crisis. It was made to limit the freedoms Canadians had in a time of crisis. This gave the government the power to charge people without cause, censorship, price fixing, and the ability to control the economy.  During the climax of the October Trudeau’s government deemed that it was necessary to put the War Measures Act into effect, claiming that Canada was at war with itself. Under the War Measures Act, the FLQ was outlawed, and joining became a criminal act. Normal rights and freedoms were stripped from the citizens of Quebec and the police were authorized to make arrests and detentions without cause. While the Act was in place over 450 arrests were made. The public opinion of the government’s decision to use the War Measures Act was positive but was highly criticized by Quebec nationalist and was called extreme and unnecessary. Although the Act lead to the disappearance of terrorism in Quebec it is said to be one of the causes of the growth of the democratic separatist movement in the 1970s.   Pierre Trudeau promised to refine and adjust the War Measures Act but was not able to when his government lost the election in 1984. In 1988 the War Measures Act was repealed and replaced with the Emergencies Act, which created more limited and less extreme powers for the government to use in times of crisis. The most beneficial impact that Pierre Trudeau made while he was in office would be The Official Languages Act of 1969. The Official Languages Act of 1969 was a federal government law that made French and English the official languages of Canada. It required all federal institutions to provide both French and English services. It was suggested by the Royal Commission on Bilingualism and Biculturalism, which was additionally settled by Prime Minister Trudeau as well. Also, the Act leads to the creation of the Office of the Commissioner of Official Languages.  The Languages Act of 1969 had 39 segments, the principle segments was the presentation of English and French as the official languages of Canada ( Section 1). The Act describes that all rules, regulation, and laws are required to be published in both official languages. It also outlines when the exceptions to this general rule. The Act also outlines the job and powers of the Commissioner of Official Languages, essentially the “Commissioner has the same legal status as a deputy head of a department.” ( Canadian Encyclopedia, Official Language Act of 1969). When the Act was being proposed all political parties supported the Act when it was introduced, while the provincial responsible was not as accepting. Some provinces were accepting such as New Brunswick, while provinces such as Ontario only settled for providing both French and English services in certain areas. While Manitoba a province an anglophone province since 1890 was forced to comply with the new laws. In 1988, the Official Languages of 1969 was repealed and replaced with a new and improved version of the  Official Languages Act, this version aimed to improve the official rights of all linguistic minorities in Canada, which complied with the development in the Canadian Language Policy.Not only is Pierre Trudeau the most well known Canadian Prime Minister but is also one of the most influential Prime Minister ever to step foot in Parliament. During his two terms as Prime Minister, he has done a thing that has benefited Canada in a very positive aspect. For instance, being able to deal with terrorism with the least amount of collateral damage possible,  keeping Canada safe by using the War Measures Act, and also by making Canada a bilingual country. Also, over his lifetime Pierre Trudeau has left a legacy as his own son is now Prime Minister following in his footsteps.
AIDS and the Community by Dr Ian Clarke. Many AIDS programmes involve the community. But even though programmes work in the community, the community may not feel involved in them. There is a huge difference between something that is community located and something that is community controlled COMMUNITY LOCATED - located in the community but actually controlled by people from outside COMMUNITY CONTROLLED - most of the ideas and control come from the community A good way to understand whether there is real community participation is to ask, ‘Will this project continue without outside support?’ In the case of AIDS, community participation is very important. Preventing the spread of AIDS will only happen when people change their behaviour. However, people are all part of their communities. The community affects their behaviour. It is very difficult for one person to change behaviour if the community expects a different kind of behaviour. Knowledge about AIDS is now fairly easily available – but many communities do not know what to do with this information. They often do not see how their accepted values and lifestyles affect the spread of AIDS. They do not see how the new information can make a difference in their lives. They still do not see how to change their behaviour. Photo: Mike WebbFirst, encourage the community to learn more about itself. When people begin talking together about AIDS, they begin to look at how AIDS affects them. They begin to understand how their own local values and behaviour affect the AIDS situation. Outsiders need to understand the community’s values – to learn about why certain kinds of behaviour are acceptable. This can only happen if the community talks and outsiders listen. Providing opportunities where people can meet and talk openly is not easy. It requires some understanding of how the community works and the enthusiasm to continue encouraging people to move their discussion forward. Next, provide the opportunity for community leaders to speak out about AIDS and what is happening in their community. As people have the opportunity to deal with the issues they are facing, they will get away from superficial ‘right’ answers and work out their own responses to the problem. At this point, outsiders may be helpful in supporting them. They will need resources and support to maintain their enthusiasm and develop their ideas. In many countries the churches have a large role to play in all this. They are part of the local community. They can show an alternative lifestyle and can show love, acceptance and support for AIDS patients. People with AIDS or HIV infection are not ‘bad’. They are not responsible for this epidemic. Because people often feel guilty, they try to hide their condition. The church can show the way of acceptance – AIDS patients will not have to hide if they know there are people to love and support them. Changing attitudes and priorities within communities takes a long time. When it does happen, it can have a great impact on individuals. When our communities take hold of the AIDS situation themselves and find their own answers, only then will we see the changes in individual behaviour for which we long. Dr Ian Clarke worked for many years as a CMS missionary in Uganda, setting up Kiwoko Hospital.
Out of the 4 instruments of the Violin Family (Violin, Viola, Cello, Double Bass), the bass is the only instrument tuned in fourths. Wikipedia states Why is it so, when the other three are tuned in fifths? • 7 Just speculation, but were it tuned in fifths reaching the fourth of an open string in first position might require an uncomfortable hand span, I guess. Not a problem with the violin. – Some Dude On The Interwebs Jun 24 '15 at 16:21 • 13 Part of the reason is it's not in the violin family! While it is in the string section, it is technically a viol and not a scaled up violin like the viola and cello are. One name for it is "contrabass viol". Viols are tuned in 4ths. en.wikipedia.org/wiki/Viol – Todd Wilcox Jun 24 '15 at 16:50 • 2 @ToddWilcox it's not clear if it is in the viol or the violin family. See the first paragraph – Shevliaskovic Jun 24 '15 at 16:54 • 1 Ok: telegraph.co.uk/inluxury/66245/1427731731835/unnamed-4jpg/… Notice in particular the f-holes. – Some Dude On The Interwebs Jun 24 '15 at 17:04 • 1 Without a clear lineage, we can only guess at reasons why it is tuned the way it is. Playability is probably the best guess. – Todd Wilcox Jun 24 '15 at 17:07 It is because the double bass, essentially, comes from a different family of instruments than the cello, viola and violin. This is a controversial assertion among music historians, as these things evolved continously, but many scholars do not consider the double-bass to be a part of the violin family at all. The argument goes like this: About two centuries before the violin, viola and cello were invented, there was the viola da gamba family: the violone (the double-bass viol), the viola da gamba, the tenor viol, and the treble viol. These instruments came into prominence in the late 1400s, after originating in Spain. These were instruments of six strings, tuned in fourths, like the modern guitar. (and they had frets, too.) enter image description here Instruments of the viol or viola da gamba family, from the violone on the left to the treble viol on the right. The violin, viola and cello were newer inventions that came along almost 200 years after the first appearance of the viola da gamba family. The violin family of instruments came from Italy, and as they were originally conceived, there was no bass instrument in that family. The lowest-pitched instrument of the violin family was the cello. Violin-family instruments have four strings tuned in fifths. They also have structural differences which give them a much stronger, louder sound than the relatively quiet viola da gamba family instruments. Once the newly-designed violin, viola and cello came on the scene, the viola da gamba family fell out of usage, because they could not compete with the loud, cutting sound of the violin, viola and cello. Since there was not originally a bass member of the violin, viola and cello family, luthiers adapted the existing design of the violone (the bass viol, six strings tuned in fourths) to make it better able to accompany the new violin-family instruments. Along the way the violone became longer in scale length, to increase string tension, tone and projection, and it lost its two highest strings. It also lost its frets. This became the modern double-bass. The structure and design of the modern double-bass still has more in common with the earlier viola da gamba than with the cello -- even if, superficially, they look similar. The Wikipedia article on the history of the cello explains the relationship of the older, lower-pitched Spanish violone (tuned in fourths) to the younger Italian cello (tuned in fifths). • Side note: "violoncello" means exactly "small violone", "violone" in turn means "large viola". A "violoncello" is thus a "smallish large viola". One would assume a "small large viola" to be just a "viola", except that as you point out the instrument changed a bit in the meantime :) – Some Dude On The Interwebs Jun 26 '15 at 15:08 • 2 Informative answer overall, but one small point of contention: The viola is acoustically imperfect and does not harbor the resonance or the volume of the cello or the violin. Although a lovely instrument in its own right, it is by an large considered to be a "weaker" instrument because of its acoustical traits. – jjmusicnotes Jun 26 '15 at 17:01 • 1 Brilliant - I read once (I think in a note in the RCM museum) that one of the ways of telling something in the violin family from something in the viol family was how the body joins the neck. Violins join perpendicular while viols slope in. It's always bugged me that double-basses seem to break this rule. But they don't! – dumbledad Nov 17 '15 at 11:33 • @SomeDudeOnTheInterwebs and "violin" means "small viola," too. The original family distinction is between "gamba" and "braccio." – phoog Feb 9 '16 at 18:20 • That's all fascinating, but the tuning isn't an inherent characteristic of the instrument. A double bass can be tuned however you'd like (within limits), and some actually do tune in fifths: en.wikipedia.org/wiki/Fifths_tuning. So I'm more sympathetic to the argument based on left-hand fingering concerns. Though this: joelquarrington.com/tuning-in-fifths also suggests technical limitations of older instruments may have been a factor. – Bruce Fields Feb 13 '17 at 17:18 With long open strings, the span to reach notes especially at the nut end would be too much for a lot of players if it retained the 5ths pattern of tuning. Making the tuning in fourths means that the left hand can encompass three notes in a scale and then move across to the next string in the same hand position. That said, it's not difficult to slide up a couple of inches, but accuracy is compromised when this happens. Here is a video by Adam Neely that briefly says the history of Double Bass and its tuning, stating the same: • 12 +1 because this is the likely root cause. The fact that the double bass comes from a long line of instruments that were already tuned in fourths is true but misleading; if that family had never existed and the violin family had included a native bass instrument, it would have had exactly the same fingering problems, and I believe that it would have had to implement the same solution, i.e. different tuning. – Kilian Foth Jun 25 '15 at 7:20 I can think of two reasons: 1. Bass is difficult enough the way it is. If you were to play it like a cello, you would need a) much more frequent position changes, and/or b) a strong, independent and wide-reaching (much wider than on cello with its shorter scale) pinky. I think most bassists never use the pinky on its own at all (or do they?), because a bass requires so much more force than cello. That would get very troublesome in fifths tuning. 2. In the bass' register, polyphonic playing is largely just usable as a special effect: often it simply sounds to muddy-undefined. So you wouldn't really benefit from the mandolin-like chord capabilities the cello and violin have. (Of course, fourths tuning is excellent for chords too as the guitar demonstrates – but these chords really don't work very well on fretless fingerboards. Chords on fretless guitar are rather more difficult than on cello!) One could also argue that the bass doesn't “need” such a wide range as cello and violin. But I'd say, why not? Violin and cello also don't really need such a wide range, they just happen to have it. And the viola clichee-wise uses an even narrower range than the bass, despite its fifths tuning... • 2 The pinky is one of the most used fingers :P the ring finger isn't used that much. At least in Simandl's method which is one of the most common methods – Shevliaskovic Jun 24 '15 at 16:56 • I thought Simandl's method always grouped the pinky together with the ring finger? – leftaroundabout Jun 24 '15 at 20:17 • 1 Yes, but you press with your pinky. the ring finger just supports – Shevliaskovic Jun 24 '15 at 20:46 • 2 Well I don't play upright bass so I can't really judge, but to me it sounds like you might as well say “you press with the ring finger, the pinky just supports and defines the exact spot”. Anyway, my point was that the pinky is never used on its own, certainly not stretched out away from the ring finger. Isn't this more or less true? – leftaroundabout Jun 24 '15 at 20:53 • Yes, that is true – Shevliaskovic Jun 24 '15 at 20:58 The early history (from about 1500 to 1850) of bass tunings are very variable, with anything from 3 to 6 strings and tunings in anything from thirds to fifths. Reference. In the classical period, the virtuoso Domenico Dragonetti played a 3-string bass tuned C G D an octave below the cello, which was more or less the standard instrument that Haydn, Mozart and Beethoven wrote for. The current "standard" (E A D G tuning with a string extension down to low C) is a relatively modern invention. • But, why is the modern tuning invention in fourths? That's the question – Shevliaskovic Jun 24 '15 at 18:20 • 3 "Relatively modern invention"? No way. The current E A D G tuning, in fourths, was used by the violone almost two hundred years before the invention of the cello. What we have today with the modern double-bass is a return to the original tuning of the violone, which is older than the cello, viola and violin. See my answer. – user1044 Jun 24 '15 at 19:15 • @user1044- I've never heard of the modern E A D G tuning being used by violone at all- the most common tuning was an octave lower than the bass gamba, that is D G C E A D. Do you have a source for the E A D G tuning being used in the Renaissance? – Scott Wallace Feb 12 '17 at 21:03 The reason for tuning an instrument a certain way is always for playability reasons (and instrument construction/design/purpose). One could certainly make the argument that a particular instrument belongs to a certain family but it doesn't fully answer the question- the same question still applies- why does that family get tuned a certain way. "Just because" isn't an answer. I often tune my guitar to standard tuning (E A D G B E) and sometimes curious students ask why. I don't know who invented this tuning but we can make observations. 1. Alternate tunings are completely valid. I can tune my sixth string E down to D and the reason is to get a low D in the bass for a fuller sound when playing in D. The next D is a bit high. 2. Standard guitar tuning is all fourths except for between strings 3 and 2 which is a major third. Why? Not because it's in the guitar family. If I were to tune in all fourths, major scale shapes would become symmetrical across all the strings making playing melodies a bit easier. However if I wanted to play full chords, I quickly find that I don't have enough fingers and fingering becomes impossible. I have a low E and and now a high F and a C on the second string. So we tune asymmetrically and sacrifice the ease of melody playing slightly since we can shift one note and still play chords well. Symmetrical tuning is not so practical for everyday use. Last year I played Golijov's Ayre at a music festival and my solo was original written for ronroco. Playing this on guitar was extremely difficult even though the music wasn't "extremely difficult". I altered one string's tuning, used a capo and everything fell into place fingering wise. I did this for purely functional reasons. So why might a bass instrument tune in fourths instead of fifths? First we need to understand the reason for multiple strings in the first place. If I have only one string (a bass string for example) I can only move lengthwise up and down that string. Moving from root to fifth or root to fourth is a fairly large distance and requires some energy in hand movement. If I now add a string next to it, tuning the string to the same note gives me no advantage fingering wise. Let's say I decide to tune that next string to a fifth higher. This creates a situation where the next string is simply a continuation of the original string but starting at the fifth. This means less hand energy is needed to play from the root to the fifth. I simply move a shorter distance to the next string. This is analogous to teleportation. In open position I don't even need to use the left hand, just the right. However if I also need a fourth I still need to move up that E string to get the A. Considering that our key system is based on I, IV and V, tuning a fifth isn't so great. Tuning the two strings to fourths gives me those three notes within a short distance of each other. I can move from root to fourth very easily and now the fifth is just little further away. This will be mirrored in every position on every string. This is desirable for any instrument expected to play bass notes. This is the same reason a guitar tunes its bass strings in fourths normally. When you begin to shorten the scale length and expect your instrument to mainly play melodies this distance from root to fourth becomes less of an issue technically. Lastly, six string electric basses usually tune all in fourths. The reason is the same as above and also because playing chords like a guitar isn't that great- the instrument is big and those low notes can get muddy quickly. In that case symmetrical fingerings are preferable. • Heads up that you have to use two line breaks to get Markdown to make a new paragraph. – delete me Jun 25 '15 at 20:50 • 1 Good answer, though I wouldn't say fourths tuning is necessarily ideal “for any instrument expected to play bass notes”. Cello is used a lot for bass lines too and it works just fine in fifths-tuning, because the scale is shorter and you need much less force than on double-bass. I'm pretty sure fifths tuning would work well on electric bass too – only, it wouldn't really have much advantage over fourths either; habit (electric bassists are rather more likely to also play guitar or double-bass) has established the fourths tuning. – leftaroundabout Jun 26 '15 at 20:05 • It's already fairly difficult to get the 9th on (electric) bass. I wouldn't say "fifths tuning would work well on electric bass" ... having the root, 5th, and octave easily reachable with a hand-span and two frets away is extremely convenient. – Kevin_Kinsey Jul 14 '16 at 22:12 I play the double bass and I know if it were tuned in fifths it would require a lot more shifting. No double bass player has the finger span to have the strings tuned in fifths. I say no double bass player because the instrument goes up in sizes to fit the player. It may be possible to tune in fifths if someone who normally played a full-size were to play an eighth size double bass because their finger span would be too large for the instrument, but they would probably be playing the instrument like a cello anyway. It was common in the French Schools of the 19th century to tune in fifths. At that time the German and English bassists were switching to fourths. It was noted that the German and English bassists didn't need to work as hard as their French counterparts. The French were reluctant to leave fifths as they felt fifths tuned basses blended better with the cellos violas and violins as their harmonic series was similar. I don't know what time the switch was made. Here is an American bass method book from 1891 that is for three string basses tuned low to high, C, G, D. http://imslp.org/wiki/Method_for_the_3-String_Double_Bass_(Fischer,_Carl) I have strung my bass CGDA an octave lower than cello. I love it! Also check out Joel Quarington's website to learn more about fifths tuned contract bass. http://joelquarrington.com/ The bass waltzes composed by Dragonetti have a lot of paired notes that go from 1st to 4th finger across strings to minimize shifting. The same can be said for the 6 Vivaldi sonatas and Benedetto Marcello sonatas. It seems that composers in that period took into account the tuning in 4ths and made pieces that fascilitated the playing to bassists. (I'm aware Dragonetti played a 3 string bass, But I believe the tuning was still in fourths.) The pieces in question would have been annoying difficult to play at speed if the bass were tuned to 5ths. I'm not a really experianced bassist, but that it how the pieces seem to be structured. I might be totally wrong, but this is how I see it. It seems the Spanish decided the fourth tuning best suited their guitar that was an instrument that mainly provided chords to backup dancing or singing. Playing the chord positions on the double bass would be more difficult on an instrument tuned in fifths. The Italians had a different point of view. • 2 Do you have any evidence of this? – musarithmia Feb 24 '16 at 3:34 Your Answer
It's very well known that Wittgenstein thought that with the Tractatus the problems in philosophy were pseudo-problems, but then went on to produce further philosophical works like The Philosophical Investigations. I've read the former, but not the latter. What were his later opinions on philosophy? In particular, did he think that metaphysical questions could be answered? Why did he change his mind? Specifically, how did that side of Wittgenstein's thought evolve? • See related post. – Mauro ALLEGRANZA Sep 25 '19 at 18:06 • Possible duplicate of What are the problems with Tractatus? – Conifold Sep 25 '19 at 20:10 • 2 The Philosophical Investigations still does not answer its questions, it sort of unwinds them into things that aren't questions, with the implication that the original questions were never really questions either. So the problems remain pseudo-problems. But they are more resolved, and less dismissed. – user9166 Sep 25 '19 at 23:17 • thank you @jobermark i will go with that for now at least – another_name Sep 25 '19 at 23:41 I believe what you are looking for is the notion that Wittgenstein went from thinking objectively to intersubjectively about language. According to Borchert's entry, where the original Wittgenstein believed strongly in notions that propositions were a "logical form of reality" with his belief sentences were "psychological constituents" which made them a literal "picture" as fact of which the facts were "atomic" and formed the basis of axiomatic reasoning (See Agrippan trilemma) and corresponded to the "state of affairs", he moved, in Philosophical Investigations, to meaning as it came from a game played between persons in which usage was the primary determinant of meaning and began to recognize through observations about the definition of 'game'; that there were means of definition that went beyond necessity and sufficiency, and termed them "family resemblances" which anticipated prototypes in cognitive science. Why change? Well, that's a complicated issue (some write books on it), but it boils down to the idea Wittgenstein's metaphysics changed as it admitted new phenomena into his ontological commitment and epistemic attitude! If one concedes that Wittgenstein started and developed a correspondent theory of truth, it is plain that ultimately he landed in a much more pragmatic theory, and he moved away from "logical compulsion", that is rejecting deduction as a primary mode of reasoning moving towards inferential and abductive modes. Meaning no longer came from names which corresponded with facts, but elsewhere, such as the language game. "In your act of meaning or understanding, 'your mind as it were flew ahead and took all the steps' before they were taken physically (*Investigations, Sec. 188)" [P.813]. On page 814, the encyclopedia says, "[Wittgentstein] held that the way a rule is applied in particular cases determines its meaning." In other words, he went from truth and meaning grounded in an objective reality to which our thoughts were mere correspondence, to a position that truth and meaning itself became a reflection of the intentionality of the person using it. In a way, doesn't our metaphysical development generally follow that thinking, a path starting with subjectivism, moving on to a better theory of meaning and truth derived from objectivity, to an ultimate understanding that objectivity itself is just a tacit agreement of subjective parties? Here's a comic I came across which makes the point in painted panes. Existential Comics: Wittgenstein's Monster • 1 @ JD While still occasionally visit the site and look around, I have not encountered an entry that prompted me to actually sign in in many months. However, your simple yet somehow elegant answer to this long ponderous question motivated me to do so. – gonzo Sep 26 '19 at 19:49 • 1 Not only to up vote the effort, but to ask whether you have given any thought to how Wittgenstein’s intellectual path from the Tractatus to the Investigations mirrors the path of Western epistemology and philosophy of science in the 20th Century. – gonzo Sep 26 '19 at 19:49 • 1 @ JD That is, from positivism/realism through pragmatism and postmodern relativism to a "post-positivistic realism”, characterized essentially as a socially constructed realism based upon the purportedly superior epistemological status of lived experiences, located or situated knowledge, stand-point theory, etc. See my answer here: philosophy.stackexchange.com/questions/57382/… – gonzo Sep 26 '19 at 19:50 • @gonzo Yes. I think there's a Hegelian dialectic at play between positivists (thesis) and phenomenologists (antithesis) which is culminating in a science undergirded by a positivist-defended notion of phenomenology (synthesis). I believe it to be developing among analytical philosophers who reject traditional objectivist leanings and are returning to a form of transcendental realism. I think it's coming out of cognitive science, will resolve the question of the origins of semantics, will lay groundwork for AGI, and is based on en.wikipedia.org/wiki/Embodied_cognition. Thoughts? – J D Sep 27 '19 at 3:36 • @ JD Are you kidding? Your comment, and your answer above and philosophy.stackexchange.com/questions/63443/… (and others I have perused) have evoked more “thought” on these issues, issues over which I have been obsessing while observing Rortian PoMo philosophy’s surreptitious creep into the [American] socio-political realm, ultimately resulting in an utter transformation of the cultural discourse over the course of this young century. – gonzo Sep 27 '19 at 20:27 Anat Biletzski and Anat Matar describe the change in terms of "dogmatism": They also note at the beginning of their article that there is a difference of opinion on how significant this change actually was: One might use the idea of dogmatism when trying to identify differences between these two periods keeping in mind that the difference may not be as great as imagined. • thanks for the answer, but i don't feel it's informative, nor specifically addressed enough to my question, to upvote – another_name Sep 25 '19 at 20:00 Your Answer
How do I cite this in my bibliography? Dayah, M. (1997, October 1). Ptable: The Interactive Periodic Table. Retrieved January 21, 2020, from Ptable: Dayah, Michael. Ptable: The Interactive Periodic Table. 1 Oct. 1997. Web. 21 Jan 2020 <>. What makes Ptable different? A true web application Many other periodic tables use the word interactive to describe themselves while offering nothing more than links to pages of data about elements. Pages of data are fine, and Ptable "outsources" these write-ups to the heavily-curated and quickly revised Wikipedia. Ptable shines when used as a true application, more interactive and dynamic than any standalone software. Please continue reading to learn about all the interesting things you can do with Ptable that make Mendeleev's creation come alive. Read while you browse Want to read about elements while perusing the table? Write-up windows can be torn off or docked to the edges (depending on your pop-up blocker settings) to allow simultaneous use of the table while reading. Instantly change layouts Use the check boxes at the top of the page to dynamically switch between simple, with names, with electron configuration, and inline inner transition metals. As you resize your browser, Ptable resizes with it. Realtime data view Select Properties and move your mouse over any element to instantly update 16 properties as well as a detailed view of that element. Instantly swap data Only want to see one piece of data at a time, like electronegativity? Whatever you choose in the Properties tab appears in place of atomic weight. Visualize trends Does atomic radius increase or decrease with group? Select it and the color of all elements will change in proportion to their values. Reliable source data Data is acquired from primary sources and curated libraries such as the excellent Wolfram|Alpha. Layout and presentation were reviewed by the world's foremost periodic table academic Eric Scerri and match the official layout offered by IUPAC. Significant digits are preserved in readouts whenever space permits. Translations and non-English element names, however, should be considered no more reliable than Wikipedia. State of matter slider Drag the slider above the nonmetals and see the state of matter of each element at that temperature. Time machine After selecting discovery year in Properties, use the slider to go back in time and display only the elements discovered by that year. Data subsets Once you've selected a dataset, the slider area reveals related properties. After selecting radius, for example, covalent, empirical, calculated, and van der Waals radii are available. All told, the slider area exposes another 17 properties in addition to the 16 shown, not including the first 30 ionization energies, allowing efficiency functioning on multiple levels and in multiple dimensions. Complete orbital readout for each element's ground state, quantum numbers, oxidation states, and diagram following Hund's rules. Hover over each electron pair for a 3-D view of that orbital or hover over the element to view its highest energy level electron pair. Click an element in the isotope view to overlay selected or all known isotopes. Hover over to fan through like a deck of cards as 5 properties update including half-life. Borders indicate primary decay mode. Compound mixing Click elements in the compounds tab to see possible compounds they form, complete with Wikipedia articles when available. As you narrow your search, other elements that do not form compounds with your chosen elements will dim. Elements that do combine will show the number of potential compounds in their atomic weight area. Miniature elements will appear in the close-up area which you can adjust with arrows to only match compounds with a specific number of that atom. Compound searching Type the CAS number or name of a compound to find all matching compounds. As you search, elements not in matching compounds will dim. Typing acid in the slider area search box dims all but the nonmetals. Looking at the numbers in the atomic weight area, we can see that there are about 300-400 acids, and most contain hydrogen, carbon, and oxygen. Formula searching Enter a formula into the slider area search box to find all compounds matching those elements, regardless of the order in which you enter them. Require an exact formula by adjusting the miniature elements in the slider area or entering the formula's subscript numbers. Dozens of languages Element names in dozens of languages. If your browser sends a compatible language header, you'll be automatically served the site in the language you prefer. Force a different language using the drop down box. Why is it important for the periodic table to be offered in so many languages? Symbol origins Why is lead Pb and mercury Hg? Choose the Latin translation to see the origin of element symbols. Instant search Can't seem to find an element? Type its name, symbol, or atomic number into the box at the top right and it will instantly highlight. You can even do advanced searches. Entering ~200 in the first tab finds the element with atomic weight nearest 200. Searching for =3 in Orbitals highlights all elements with oxidation state +3. Even expressions like >1000 or 400-800 confine results to those ranges. Tablet friendly Layouts for your tablet allow viewing on the go in both portrait and landscape rotations. Deep linking Want to save the URL for a specific visualization or send someone a link to a list of compound search results you're viewing? Just send them the URL in the address bar and they will see what you are seeing. Print any view or visualization you can see. The print style sheet will take care of removing extraneous clutter. Just remember to print background colors (Internet Explorer, Firefox, Safari), select landscape, and minimize the margins. Latest new elements The day a new element is discovered or synthesized, we'll have the details for you. We even keep up with new, more precise relative atomic weights as IUPAC publishes them and keep in touch with prominent chemistry scholars and standards bodies regarding the layout of the table and categorization of elements, which are much more fluid than you might imagine. Small and fast Built from the ground up to be extremely fast and efficient, Ptable is pure JavaScript made with no frameworks or libraries. Other sites' strength and their speed are still based in a world that is built on libraries. Because of that, they will never be as strong or as fast as Ptable. Keyboard accessible Not a mouse user? Your keyboard's tab and arrow keys expose the full functionality of the site. Enter and Escape open and close the Wikipedia window, just like you'd expect. Arrow keys, PgUp/PgDn, and Home/End also manipulate the slider when activated. Flexible interface Whether you prefer to hover around or click to view data, the site accommodates you by offering a click-to-lock interface in the Properties and Orbitals tabs. Hovering accesses most of the interactivity until the first click, which locks whatever element you're viewing in place until another is clicked or the same element is clicked again to revert to hover mode. Hovering is never necessary to reveal data or interactivity; clicks do it all—important for tablets and interactive whiteboards like the SMART Board. Can I buy a poster? Yes! Our periodic table posters are available on vinyl in sizes from 3 to 15 feet wide, and are designed for high distance legibility. Get closer and each element's square reveals 27 additional properties, and goes together great with our free printouts and lesson plans. Can I print it? The PDF can be distributed as is in printed form without permission provided it or whatever it is included in is not sold for any amount of money. It must also be offered in its original form with no additional or removed branding. Contact me if this is unclear or to inquire about including it in published materials. I'll most likely let you use it but request a copy of whatever it's going into. Can I link to it? Please do! Others' links are what made it popular enough in search engines for you to find it in the first place. Can I upload it to my site? Electronic redistribution is strictly prohibited. Do not save the site or any portion of it and then offer it to others through electronic means including but not limited to a web site, CD, or flash drive. While the periodic table itself is public domain, the web application I've created and its design are copyright me. Secondary reproductions in an educational context are allowed. For example, recording and annotating a video of the site to illustrate periodic trends and then uploading this to YouTube is acceptable. Contact me for clarification. When was it made? Ptable has a rich history stretching back to September 1997, a year before the founding of Google. It was introduced as a piece of HTML artwork and published to the web October 1, 1997. Simple dictionary element descriptions were added later in December. A version utilizing HTML 4 and CSS was introduced March 1999 and replaced the original version September 2004. Wikipedia integration and the addition of other languages came in August 2005. Dynamic layout switching was later added in September. The first low resolution-friendly layout (no names) came in October 2006. Interactivity was radically enhanced throughout summer 2007 and continues into the present day. Enjoy historic versions. Privacy policy This web server retains only standard access logs. No personal information is collected. Logs will not be shared with any other entity. Cookies store site preferences such as layout and last used tab. If you're not a fan of the single ad banner, you can donate on Patreon and hide ads. It's also immensely helpful if you buy a poster and leave a favorable review. However, if you wish to show your appreciation and inspire further enhancement, consider writing me a letter . Ptable® is Copyright © 2018 Michael Dayah
this article by Sandra Dodd appeared in the September/October 2002 issue of Home Education Magazine article in French Links to others' deschooling articles follow. Once upon a time a confident and experienced scholar went to the best Zen teacher he knew, to apply to be his student. The master offered tea, and he held out his cup. While the student recited his knowledge and cataloged his accomplishments to date, the master poured slowly. The bragging continued, and the pouring continued, until the student was getting a lapful of tea, and said, "My cup is full!" The master smiled and said, "Yes, it is. And until you empty yourself of what you think you know, you won't be able to learn." Weird Al says it a different way in "Everything You Know is Wrong," and Christians say "You must surrender yourself." Before that Jesus said, "Unless you become as a little child..." So much for philosophy and buildup. How can this be done? Can it work for former teachers? What about engineers who are sure their children need lots of math in an organized fashion? What about moms who love schedules and organization? Here's a way to schedule some deschooling and avoid the time-wasting stress of trying to build unschooling out of school-parts. Quick Installation for Unschooling: Just stop. Stop thinking schoolishly. Stop acting teacherishly. Stop talking about learning as though it's separate from life. Gradual Installation (necessary in most school-trained cases): • Watch some or all of these movies. If they make you think of any other movies you haven't seen for a while, or never got to see before, watch those too. But watch these, with or without kids: Mary Poppins Heidi (with Shirley Temple) The Sound of Music Searching for Bobby Fischer ("Innocent Moves" is the British title) Ferris Bueller's Day Off You don't need to think too hard about those movies. No tests, analysis or reports. Just let the images and ideas flow through and over you. Come back to them sometime, when you've been unschooling a while. First Phase: "Learning" replaces "teaching" Replace any form of the verb "to teach" with "to learn." It will involve some rephrasing, and sometimes you have to back up and totally revise the statement or the idea. Replace "I taught him..." with "He learned...". Replace "I plan to teach him..." with "When he learns..." (You might want to retroactively revise your earlier thoughts too. If you think you taught your child to eat or talk or walk, you might want to replace those memories with "He learned to walk by pulling himself up and trying it," and so on.) Advanced Phase: Speech Purge Don't use any of these school words: semester, grade, age level, grade level, scores, subjects, school year, school hours, school day. Don't even have a school minute. And when school is gone, life will be left. Get a coin bank or change cup or a box with a hole in it. This is important. It can be literal and earthly, or an imaginary coin bank in your head, if you're shy. If you use a school word, put a coin in your fine-bank. If you're using the word to convince yourself that unschooling isn't going to work, double the fine. When the cup fills up, spend that money on something for you and your child. Ice cream or a movie, maybe. A slinky or a helium balloon. Not a workbook or a protractor. If a year goes by and the cup didn't fill up, take the whole family to dinner at a cool restaurant you've never been to before and celebrate! Final Phase: Thought Purge Fine yourself for even thinking in those school terms. Having excised the offending concepts you will have extra room in your head and you can fill it up with your newfound unschooling awareness. • Change your schedule. Some people like to see learning parceled out evenly over the year, over the week, or over a day. But life is lumpy. As with chaos theory, or statistics and probability, there are "busy" times and big quiet loops which seem to be going nowhere and actually have a destination. Think "leaps and bounds," with rests in between. Instead of looking for "steady pace," look for fits and starts. What if a child has a great piano week and practices two hours a day and then he's tired of it for the rest of the month? It wouldn't all be lost and over and ruined. What if, one day, he just GETS some mathematical concept. Will you recalibrate the level at which you want him to work steadily? Or can he take a break for a month or a year without you panicking? Kids at school each "get" multiplication once, and after that they're just hearing the explanation over and over while the teacher rephrases and re-introduces and reviews in hopes that some of the other kids will "get it" that day. The "steady" pace schools simulate is 1) not real, and 2) not applicable to natural learning anyway. "Having history" 180 times a year is like trying to teach a pig to sing. In one good half an hour, an interested and curious (i.e. "ripe") child might learn as much about the Civil War or Apollo 11 as she would in a week at school (if ever). And history is all around us all the time. We're making it today. • Look directly at your child. Practice watching your child without expectations. Try to see what he is really doing, rather than seeing what he's NOT doing. If you hold the template of "learning" up and squint through that, it will be harder for you to see clearly. Just look. When you have completed some or most of the exercises above and you no longer tense up at the thought of whether your child could possibly get into college, and when you can hear "math worksheets" without thinking "Maybe we should get some of THOSE!" you can consider yourself a graduate of Sandra Dodd's Advanced School of Deschooling. Congratulations! Below is your combination final project and field trip: Rent some movies and watch with your kids. Here's my recommended list, but let personal preference rule. You might have better ideas: El Cid Ben Hur The King and I Monty Python and the Holy Grail           (maybe send little kids for popcorn during Castle Anthrax) Star Wars (all) Karate Kid (all three in marathon can be good!) Hamlet (I like the one with Mel Gibson) Romeo and Juliet (Zeffirelli's, from the late 60's) Singing in the Rain Joseph and the Amazing Technicolor Dreamcoat O Brother, Where Art Thou? The Music Man Last Action Hero Galaxy Quest The Miracle Worker Fly Away Home Paper Moon (Holly's recommendation) Discuss as little or as much as the kids seem interested in discussing. By this point you'll be past the need to wonder whether there's anything worth learning in those movies, and you'll see your kids learning and laughing and being glad you're there. Have fun learning for the rest of your life! Sandra Dodd, former mother of toddlers, has had three large children sneak up on her over the past ten years. They just keep hanging around the house and learning things. Read more at SandraDodd.com anytime. More Movie Recommendations: Movies for Unschoolers 2013 UPDATE NOTE: Pam Laricchia wrote a great companion piece for Ferris Bueller's Day off: Living Joyfully Newsletter Issue 8 Joyce Fetteroll, September 2013: Probably the hardest piece of baggage to remove while deschooling is trying to get your family to match your vision for them. Wanting your family to be happy, joyful and learning seems a perfectly fine goal! But you won't get there by focusing on what you want. You'll get there by focusing on what they want. What are your kids interested in? What do they want? How can you support that? That's where everyone, regardless of their kids' ages, can begin to create an unschooling home and grow better relationships. The more you focus on your need, the harder it will be to hear what their needs are. * Click here to read comments on this page or ensuing discussions. More on deschooling by many authors here. Search WWW Search SandraDodd.com Title by Holly Dodd
Geek Trivia What Was The First TV Show To Use Computer Generated Models? Star Trek: The Next Generation Babylon 5 The First Woman To Appear On U.S. Currency Was? Answer: Babylon 5 Babylon 5 was an American television show and sci-fi space opera set in the 23rd century. The show aired from 1993 to 1998 with a total of 110 episodes and six TV films. Babylon 5 was highly praised for its development of complex storylines that involved religious conflict, economic disputes, racial tension, and more, all woven together with excellent writing and character development. Besides doing a service to the sci-fi television genre by demonstrating how mature and developed a sci-fi story could be, Babylon 5 also pioneered the use of computer-generated models in television. The trend at the time was to use real-world models mocked up against various backdrops to create the illusion of things like space travel—the U.S.S. Enterprise 1701-D, from Star Trek: The Next Generation, for example, was simply a trio of large and well-done models of the ship hung in front of a screen. In Babylon 5, however, the space station (the nexus of the show’s many story arcs) and the ships that visited it were all rendered using computers. In addition to using CGI as the primary method for its visual effects and being the first TV show to use virtual sets, it’s notable that the computer crew behind the models invested a significant amount of energy into creating computer models that followed the laws of physics so as to create a realistic experience for the viewer. Image courtesy of Warner Bros.
Created with Sketch. Created with Sketch. Explained: Clinical Grade Tinctures (Liquid Extracts) The Next Generation of True Dual Extracts Tinctures—also referred to as liquid extracts—are an important method for extracting, for preserving, and for using herbs (including plants, fungi, and other substances). Tinctures produce potent extracts that have an incredibly long shelf life. Tinctures are also very easy for the body to assimilate because they do not have to be digested as whole herbs or powdered extracts need to be since the alcohol in the tincture passes directly through the epithelial cell lining of the digestive system. Clinical Grade Tinctures Tinctures are one of the most important tools in the herbalist’s toolbox and they are indispensable in using the herbal medicine at home. What is a Tincture? There are two basic components used in producing tinctures: The substance being extracted and the liquid solution it is being extracted into. For example, in making a Yarrow (Achillea millefolium) tincture, one would combine Yarrow leaves with a 40/60 blend of alcohol and water. A that goes into the tincture are the herbs that are being extracted and the liquid used to extract them (while alcohol is the most common, some applications cause for other solvents to be used, such as vinegar). Making Herbal Medicine Tinctures Unlike powdered extracts (hot water and ethanol), where the targeted compounds in the herbs are extracted into the solids and the liquid is precipitated off, with liquid extracts, those compounds are dissolved into the liquid and the solids are removed. This is the major differentiator between liquid extracts (tinctures) and powered extracts: With tinctures, the targeted compounds become part of the solution of alcohol. This means that the solids are discarded and that when taking the tincture, it passes through the cells of the lining of the digestive tract rather than having to pass through the stomach and into the small intestine for digestion and assimilation, as is the case with whole herbs and powdered extracts.  Alcohol passes through the cell membrane, and because the plant compounds are dissolved into the alcohol, they pass, too. Commonly, when tincturing, the herbs and alcohol (including water) are combined, left to sit for a minimum of 2 weeks, and then the solids are pressed, discarded, and the liquid bottled (learn more below). Crafting Clinical Grade Tinctures RAW Forest Foods offers only Clinical Grade Tinctures, a nomenclature that refers to the quality of the ingredients used (including the herbs, alcohol, and water), the facility where the tinctures are produced, the FDA cGMP compliance of the facility where the tinctures are products, and—perhaps most importantly—the potency of the final extracts. Gathering Herbs and Preparing for Extraction Before the extraction process starts, the raw materials for the extraction and the documentation of the extraction begins. cGMP compliance stipulates strict documentation and record collection when producing tinctures. This includes full COA and source verification of the herbs being used in the tinctures. Gathering Herbs for Tincture Making Collection of inputs: • This includes the plants, fungi, et cetera, that are to be extracted (wild-harvested, cultivation) and the alcohol and water used to extract them into; • Sorting, selecting, and cleaning of herbs; • Powdering herbs to increase extraction; • Selecting an extraction ratio for the final extract. FDA cGMP guidelines stipulate continually documentation the production of all tinctures, where measurements are taken and recorded, ensuring that each tincture contains exactly what is stated on the label. Tincture Extraction Ratios and Concentrations All tinctures worth purchasing should have a listed extraction ratio. This ensures the amount of herb present in the extract—both how much of the whole herb went into production and the equivalent of that whole herb in the final extract. Extraction ratios are listed in ratio form, where the first number represents the amount of herb in relation to the amount of liquid used (represented by the second number. Here are several demonstrative examples: • 1:10. A 1 to 10 tincture has 1 part of herbs for every 10 parts of liquid; • 1:5. A 1 to 5 tincture has 1 part of herbs for every 5 parts of liquid; • 1:2. A 1 to 2 tincture has 1 part of herbs for every 5 parts of liquid. A 1:2 tincture is five times more concentrated than a 1:10 tincture. With a 1:2 tincture, there is an equivalent of ½ gram of whole herbs per dropperful (1 mL) of tincture. Stage One: Combining and Extracting Producing liquid extract is a practice of patience. Once the raw ingredients are combined, they must sit for a minimum of fourteen days, being agitated daily. The combination of time and agitation ensures a full extraction. In stage one, the herbs are combined with a solvent. While different solvents may be used, a blend of ethanol (alcohol) and water is the most common. Ethanol and water are unique solvents in that they are widely accessible, effective, and relatively non-toxic, and product full spectrum extracts. RAW Forest Foods uses a blend of pharmaceutical grade (USP) ethanol (alcohol) and filtered water in tincture production. What determines the final extraction ratio is the ratio of the weight of the herbs used to the volume of alcohol. Once the herbs and liquid have been combined, they are stirred to allow full dispersion and are stored. The storing of the tincture is often called percolation. The combination of herbs and liquid is often called a menstruum. Stage Two: Pressing the Tincture Once the menstruum has been allowed to sit long enough for a full extraction to take place, the menstruum is pressed to separate the solids from the liquids. At this time, all of the targeted compounds in the herb have been dissolved into the liquid, and the solids that remain are mostly just plant cellulose and is a waste material. That waste material is called a marc. Tincture Processing and Bottling In the professional setting, pressing is usually done by either hydraulic pressure or by vacuum. The final liquid can be further filtered after pressing, removing traces of the marc. It is a common misconception that the more sludge in a tincture the stronger the potency, but that sludge is largely just detritus of the marc and add no value to the final product. After pressing and filtering, the liquid (containing the dissolved, targeted compounds from the herbs) is then bottled, labeled, and stored. True Dual Extract Tinctures The RAW Forest Foods Difference Different compounds will be extracted from the plants using different extraction methods, and with tinctures, using different solvents (e.g. alcohol, vinegar, and glycerin). To maximize the extraction and provide a stronger, more potent product to our customers, we have taken an extra step in our tincturing process: Decoction. Typically, when using decoction to extract herbs, the herbs are combined with water and then cooked over low heat (barely a simmer). This provides a very thorough extraction, but the resulting liquid is not shelf stable and the base of water does not pass through the epithelial cell wall lining of the digestive tract as alcohol does. When preparing our tinctures, we take the menstruum (the combination of herbs, alcohol, and water) and decoct it. This allows us to gain the benefits of decoctions and tinctures in one product, producing a more comprehensive, more thorough extraction than simply using the traditional tincturing process or using traditional decoctions. This is the RAW Forest Foods difference, and one of the defining characteristics of what sets our tinctures apart from others on the market. We are proud of this difference.  Tincturing: One of Several Extraction Methods Tinctures (liquid extracts) are of of several extraction methods used in the products offered by RAW Forest Foods: • Liquid (tincture) extracts (as discussed above); • Ethanol/alcohol powdered extracts (learn more here); • Hot water powdered extracts (learn more here). Together, these three extraction methods represent those methods used to produce standardized extracts, where the exact amount of herbs used and present in the final product are known.  Tincture Dictionary Definition They are important methods both for using herbal medicines, but also in researching the medicinal potential and therapeutic uses of herbs. Research using liquid (tincture) and powdered (hot water and ethanol) extracts can be found at sites like NCBI's PubMed or Google Scholar.
Artboard Created with Sketch. Close Search Dialog Main ideas Antagonist If Macbeth is the protagonist of the play, nearly every other character serves as his antagonist. Banquo, who is ambitious but knows how to check his ambition, threatens Macbeth with his nobility and belief that time will bring his children to the throne. Duncan opposes Macbeth by holding the throne Macbeth desperately wants. Malcolm, Siward, Macduff and the other nobles actively work against Macbeth, opposing his desire to be and stay king. At the same time, Macbeth can be seen as his own antagonist. At the beginning of the play, Macbeth doesn’t lack anything. He has a wife, a title, and is in the good graces of his king. In allowing his ambition to override his own morality, he not only loses everything he has, he also sets his entire country in disarray. In deciding to commit to murder to ensure the Witches’ prophecies come true, Macbeth acts against his own best interests. His ascendancy to the throne is tainted, and in order to maintain his power he must kill again. Every decision Macbeth makes takes him further from his goal of ruling securely over the kingdom of Scotland.
Skip to main content How to spot suspicious processes in Windows 7 How to identify suspicious processes Malware can disguise itself as a harmless process, so we show you how to spot it before your anti-virus does Windows 7 is a big operating system with an efficient architecture, but its inner world of processes and services can be a confusing place if you're not used to it. If you don't know what you're looking at, it's easy for malware to masquerade as a legitimate process and for legitimate processes to frighten you so much that you kill them, crash the system and lose data. Then there's the problem of your anti-malware protection or Windows popping up warnings about processes needing your permission to access resources. Will accepting the request infect your machine, or worse? Hierarchy of processes To work out whether a process is benign or malicious, it's useful to understand something about the structure of a running installation of Windows 7. After you power up the PC and it passes its self-tests, the BIOS loads the master boot record from the primary hard disk partition and runs it. This in turn loads and runs the Windows 7 kernel image, which then begins unpacking the other processes it needs help it create all the processes that constitute the OS. All modern operating systems have a hierarchy of processes. In Windows 7, there are usually three or four top-level processes. One such process is called 'wininit', the direct descendent (the process it personally starts running) of which is called 'services.exe'. As you might expect, it's the job of this process to spawn child processes that run as independent services in the background. However, there's often a degree of confusion that creeps into the user's mind over this seemingly simple task. The confusion is that 'services. exe' starts multiple instances of a process called 'svchost.exe'. Search for the term and you'll find many forum posts from worried users asking if their PC has been taken over by malware and asking how to kill all those multiple processes. However, it's normal to have many instances running in parallel, and killing them can harm the running OS. If this happens, you'll need to reboot and may lose data or even corrupt your hard disk. The reason there are so many instances of 'svchost.exe' is that it acts as a launcher for processes that run from DLLs rather than EXE files. These are apportioned between many instances of 'svchost.exe' for efficiency, speed and system resilience. 'Services.exe' also starts many other service processes that run directly from EXE files. These include the service portion of your anti-malware products, updaters for third-party products and Windows 7, and services for power management and the Windows Live Sign-in Assistant Manager. Another process that causes confusion and fear in the minds of users is the innocent 'Search Indexer.exe'. When the hard disk light stays lit for prolonged periods of time, it's normal to worry about what's going on, but it's usually down to this benign and useful part of Windows 7. It simply indexes all your files for use in Windows Search. Its index is used when you type in the name of a file in the Start Menu search box and when you search for files in Explorer. It's even used by Windows 7's Libraries feature. Another vital top-level process is 'explorer.exe'. This process runs the Windows 7 desktop and is the mother process for all your running applications, including those that sit in the system tray of the task bar, ready for use. Improving the view Traditionally, processes, services and applications are viewed using Task Manager. In Windows 7, it's started by pressing [Ctrl]+[Alt]+ [Del], then selecting it from the menu. Task Manager sorts full applications, underlying system processes and services into three tabs, but it doesn't show you everything. Where are all those 'svchost.exe' processes? Task Manager hides a lot from you, and when you're investigating system activity, this limited view of what's going on is to be avoided. Process explorer Instead, a better option is to download and run our old friend Process Explorer, available from Windows Sysinternals author Mark Russinovich. Process Explorer needs no installation. Simply unzip the archive and drag the files into a convenient directory.
March, 2019 Vivian Davidson Duncan Graham As humans in nations we are comprised of a diversity of ethnicities, cultures and other forms of individualism, yet as a human species we are all one family, the brotherhood and sisterhood of humankind.  This identity is not adequately or sufficiently considered within the present nation-state system. Throughout history we have been represented as national individuals with national identities. Now is the time to be represented at the global level by an institution that acknowledges and protects us as global citizens, all part of the same human family.  As Saul Mendlovitz once proclaimed, “Human sovereignty must supersede national sovereignty” when it comes to dealing with global issues like climate change, technological threats and nuclear warfare. Fulfilling the 1948 United Nations Declaration of Human Rights (UDHR) is a forgotten aim of the dysfunctional United Nations with the UN Security Council having the same Five Permanent Members (China, France, Russia, UK and USA), with their veto privilege, as at its founding in 1945. “To save succeeding generations from the scourge of war as stated in the UN Charter has been a disaster when the logic of the UN is the nation-state Neanderthal posture of tribal power-mongering. The UN was not a re-make of the League of Nations and a post-UN structure is required as the termites of decay enfeeble the present UN.  As Yunker states in his book, Rethinking world government: a new approach, '”Political  evolution at the international level seems to be at a standstill; the UN represented little more than good intentions when it was established in 1945 and so it remains today.” Essentially, a World Parliament is not just a laudable vision; in today's world where we are a 'Global Village', it is a necessity.  As Emery Eves stated in The Anatomy of Peace in 1945, “There is no first step to world government; world government is the first step.”                                                                                                                         cont'd over Globalization and the integration that the planet is facing is unprecedented; everything from technology to climate changes are global in scope and effect, except the political structures we currently have at the international arena that continue to operate solely with a nation-state mentality. Nation-states are essentially designed to procure for their national interests and the good of their citizens above all else. A World Parliament is a step beyond that where issues affecting the human family as a whole and the well-being of the planet would be addressed. A World Parliament to direct us as a global civilization is now necessary. It would be one where each person would be considered the global citizen that she/he already is and would be given equal voice in the democratic election and oversight of the World Parliament. This of course, regardless of what nation they were born or reside in. The UDHR would no longer be a dream- it would be a reality. Clearly, World Government is not a new idea; yet the reason why it hasn’t been implemented and has become a much silenced idea is because national governments and the many institutions upon which they rely on see any type of Global Government as a threat to their own agendas. Yet, the time for a World Parliament has never been more demanding and the circumstances never more ripe for this type of globally-conscious system. The system needs to change. But, if we don’t change our mindsets and those of our politicians and leaders nothing will change.  Let us determine to bring ourselves together, settle our differences, and shape and realize our common dream for the future.  In that pursuit, let us create a global democracy and parliament under the grand idea of one planet, one person, one vote. Essentially, “There is no solution for civilization or even the human race, other than the creation of world government,” as Einstein proclaimed. The progression for the next quantum leap in human sovereignty is waiting for all of us to take action. We hope you can heed the lessons of history and help us be part of the change we so desperately need.
Why vitamin supplements are important essay They also play important roles in bodily functions such as metabolism, immunity and digestion. According to the U. National Library of Medicine, the best way to meet your vitamin needs is to eat a balanced diet containing a variety of foods. If you can't meet your needs through food alone, you may require dietary supplements. Why vitamin supplements are important essay What You Need to Know The majority of adults in the United States take one or more dietary supplements either every day or occasionally. Dietary supplements come in a variety of forms: Popular supplements include vitamins D and E; minerals like calcium and iron; herbs such as echinacea and garlic; and specialty products like glucosamine, probiotics, and fish oils. The Dietary Supplement Label All products labeled as a dietary supplement carry a Supplement Facts panel that lists the contents, amount of active ingredients per serving, and other added ingredients like fillers, binders, and flavorings. The manufacturer suggests the serving size, but you or your health care provider might decide that a different amount is more appropriate for you. Other supplements need more study to determine their value. Food and Drug Administration FDA does not determine whether dietary supplements are effective before they are marketed. Safety and Risk Many supplements contain active ingredients that can have strong effects in the body. Always be alert to the possibility of unexpected side effects, especially when taking a new product. Dietary supplements can also interact with certain prescription drugs in ways that might cause problems. Here are just a few examples: Antioxidant supplements, like vitamins C and E, might reduce the effectiveness of some types of cancer chemotherapy. Why vitamin supplements are important essay Be cautious about taking dietary supplements if you are pregnant or nursing. Most dietary supplements have not been well tested for safety in pregnant women, nursing mothers, or children. If you suspect that you have had a serious reaction from a dietary supplement, let your health care provider know. He or she may report your experience to the FDA. In addition, report your reaction to the dietary supplement company by using the contact information on the product label. Quality Dietary supplements are complex products. The FDA has established good manufacturing practices GMPs for dietary supplements to help ensure their identity, purity, strength, and composition. These GMPs are designed to prevent the inclusion of the wrong ingredient, the addition of too much or too little of an ingredient, the possibility of contamination, and the improper packaging and labeling of a product. The FDA periodically inspects facilities that manufacture dietary supplements. In addition, several independent organizations offer quality testing and allow products that pass these tests to display their seals of approval. These seals of approval do not guarantee that a product is safe or effective. Organizations that offer this quality testing include: Check with your health care provider about the supplements you take if you are scheduled to have any type of surgical procedure.Why Are Supplements Important? Today more than ever, the significance of dietary supplements has significantly increased. It’s true that the food we consume lacks the essential nutrients our bodies need to function properly, but more than that it is the time we live in and the lifestyles we’ve adopted that prevent us from acquiring the. As the vitamins cannot be produced in the body in sufficient quantity, they have to be supplemented through the diet words medical essay on Vitamins. Some 13 vitamins are stated to be needed by the human body and these are widely distributed in foods, in most instances, a well balanced diet supplies the vitamin needs of a healthy person. Vitamin C: Why we need it, sources, and how much is too much Why Supplements Are Necessary -- And Introducing the Optimum Daily Allowances It is often necessary to make decisions on the basis of information sufficient for action, but insufficient to satisfy the intellect. Here's the latest on why vitamins are so important; includes a great guideline to support your efforts. Learn more. Importance Of Vitamin Supplementation: Guideline Helps You Fight Back! Raine Saunders Vitamin And Mineral Supplements. Essay on Why Music is Important. Why Music is Important Music education is important for several different reasons. Music is a very valuable resource for students and teachers alike. Oct 16,  · Most of these vitamins and minerals can be acquired through a healthy diet. Therefore, many Americans are taking vitamin supplements unnecessarily. The reasons why Americans may be taking vitamin supplements unnecessarily include misinformation, trend, and clever marketing making some vitamins "in vogue," (Nierenberg, ). Vitamins - Essay
This is an old revision of the document! Antivirus software The purpose of antivirus software is, as the name suggests, to block and delete viruses from the computer. The software can usually either be set to actively scan all files or to run the scan separately when wanted. There are several antivirus software in the market and an unambiguously best one cannot be names. If you feel the need to get an antivirus software, it can be bought or sought online for free. Free software include, for example, Avira and AVG. F-Secure is an example of a payable software. All of these are perfectly usable programmes, so by getting one you are already fairly safe from viruses. Please note, however, that the antivirus software does not protect the computer from its user. So, remember to be careful when using the internet!
Socks5 proxy server Fast Introduction to SOCKS Proxy SOCKS Proxy 2.pngThis means that the external server is only aware of the SOCKS Server (the proxy). How is this different from NAT SOCKS is a completely different way of solving the external access problem from NAT. Consider the following diagram using a firewall for network address translation: The internal system forwards a packet through the firewall. The packet is inspected by the firewall, and the source address is modified (in the header usually, and in the payload depending on the application), the external server receives the packet and replies. Key factors to think of: • the IP session initiation (three way handshake) is directly from the client to the server • the firewall modifies the packet • there is no authentication • inspection of the packet / application / data is much more difficult • no changes to the client operating system – it is transparent to the user. SOCKS was originally developed by NEC before NAT was a possible solution. As such, it was often only way to access the Internet. It has the following key features: • provides authentication for protocols that cannot be authenticated • by passes default routing in the internal network Consider that protocols such as HTTP and Telnet support firewall authentication. Anyone who has configured Authenticated Proxy on a Cisco firewall will understand this. However, encrypted protocols can never be authenticated by firewall, only by a SOCKS Proxy. SOCKS Proxy.pngHowever SOCKS can be a problem in real life : • the client program must have a SOCKS client capability • the client operating system must have SOCKS client capability (and ‘intercept’ specific network requests and divert to the SOCKS proxy) • you must run and maintain a SOCKS server (which has been problem in the past) The Blue Coat SOCKS server is easy to use, and using the same GUI to control and manage the rules. SOCKS Versions There are only two version of SOCKS. The main differences between SOCKS V5 and SOCKS V4 are: SOCKS V4 does not support authentication. SOCKS V5 supports a variety of authentication methods. SOCKS V4 does not support UDP proxy. SOCKS V5 does. There is no interoperability. SOCKS V4 DNS lookups must resolve the external hosts. SOCKS5 clients can passing the un-resolvable host names to SOCKS servers and the servers will try to resolve those names. Why choose SOCKS ? A little history lesson Around 1999 / 2000 SOCKS was the pre-eminent secure remote access technology, especially for Unix system administrators. It effectively provided for secure SSH Gateways with logging and access control. There were a number of SOCKS clients in production (such as the free WinSOCK in Windows 95/98, and Hummingbird) but they were expensive and licensed on a per client basis. The worst part of the SOCKS was that MS Windows (of the time) had such a lousy TCP/IP stack that getting the clients to be reliable was almost impossible. This led to a poor reputation for SOCKS that it never really shook off. IPSec / PPTP / L2TP were just beginning to penetrate the market. Most IT folks chose IPSec for remote access because it could applied universally and required no modifications to the client applications. Related posts: 1. Xbox One proxy server 2. Socks5 proxy Port 3. Youku proxy server
Rail Stress Meter Rail Stress Meter The Rail Stress meter is a portable device to measure longitudenal rail stress. The method involves the gluing of a strain gauge to the rail. The Rail Stress Meter is connected to the Strain Gauge, then zeroed. The rail is subsequently cut near the strain gauge, which releases all stress, provided the rail is unclipped in the vicinity of the cut and strain gauge. The Rail Stress meter is calibrated in degrees temperature instead of units of strain. If the rail was under stress, the Rail Stress Meter will indicate the temperature difference between the stressed and the unstressed rail. A built-in temperature sensor provides the current rail temperature, adding the stress temperature difference yields the original neutral temperature. The Rail Stress Meter also performs the addition. The electronic unit is powered by internal AA batteries. Model number: #382 AUD $1,835.90 free postage
In the year 1884 the temple was given its final shape. In 1944, the church was blown up by retreating Germans, and rebuilt in 1951 - 1958 by the efforts of the parish priest Telesfor Podbielski. Currently, it is a reconstruction of the church in its oryginal, Gothic shape. Next to the church there is a brick belfry. It was built around 1650. The church together with its surroundings is a sacred unique complex in the region, which testifies to the rich history of the city and its great importance during the Middle Ages and the Renaissance.
learning opposites Lion and Lamb: March Opposite Fun Play-of-the-Day Today’s play-of-the-day is March opposite fun. Learning opposites isn’t a black and white challenge, it’s really quite complicated.learning opposites Opposites aren’t only one thing or the other, like on-off or black-white. They often depend on the context. For instance, the temperature outside can feel too warm if you are wearing a parka, hat, snow pants, and mittens or too cold, if only wearing flip-flops and a swimsuit. The temperature hasn’t changed but how we describe it will be based on how it affects us. The relationship of objects also influences opposites. A preschooler is small compared to a teenager, but big beside the new baby. In order to figure out how opposites work, kids need lots of opportunities and experiences. There are some great stories and books about opposites and even some songs. Did you ever sing The Duke of York? There are actions kids can do with the opposite words: There was a Duke of York, he had ten thousand men. He marched them UP to the top of the hill and He marched them DOWN again. When they were UP, they were UP, And when they were DOWN, they were DOWN. And when they were only HALF-WAY UP, They were neither UP nor DOWN. For the word UP, kids stand as tall as they can and for DOWN, they crouch way down near the floor. For HALF-WAY , just scrunch down a little. Some kids will be able to pop up and down and sing at the same time but some will only sing or do the actions. A quick opposite game is STOP-GO. At the word GO kids can run, hop, wiggle, bounce or whatever there is room to do. When you, or another child being the leader, says STOP all the others must freeze and be as still as they can be. Kids can play this opposite game inside or outside. Where appropriate in the day, can you and your child have some March opposite fun? Children’s Books for Learning Opposites babies and booksThe calendar says March, but the weather may have a different idea: is it like a lion or a lamb?  Here are some  children’s books for learning opposites. There’s a lion in this book and a little lamb reading it. Or could that be a dear? children's books about oppositesA favorite book that some parents and caregivers might remember is Opposites by Sandra Boynton. This story has wonderful illustrations of animals that show each pair of words. The funniest two are right and wrong. One pig talks on the phone and another wears it on his head. The text rhymes to add to the fun. children's books about oppositesPaul and Henrietta Strickland’s book, Dinosaur Roar is another great choice. The dinosaur pictures are amazing, with vivid colors and details. Wait until you see the size of the dino teeth. The clean/slimy dinosaurs and the spiky/lumpy ones are very unusual choices for opposites. The end of the story uses some opposites describing different ways for dinosaurs to eat. Careful you’re not lunch. children's books about oppositesThe book You are (Not) Small, written by Anna Kang shows one of the tricky parts about opposites. Things are not just one thing or the other. Opposites exist in relationship. Sometimes things that are big can seem small if something bigger comes along. Small things can be big if there’s something tiny that appears. This is one aspect about opposites that we forget but can be very confusing for kids. In order to understand how items can be both opposites, children will need lots of experiences with opposites. children's books about oppositesHave you and your child shared The Very Hungry Caterpillar book? Eric Carle has another book called Opposites. Done in same style of illustrations, this book has an added feature with pages to lift up. Kids can guess what the opposite in a pair might be and lift the page to check. The words in this book are more common pairs. Besides a book about opposites, you and your child may have an opportunity to explore some others. Are there any opposites that come to play at your house? Soccer Helps Kids Learn About Opposites Learning about opposites is quite complicated for young children and needs lots of experiences; soccer can help. The excitement and involvement can help kids with opposites as they watch and play. Some soccer opposites are up-down, in-out, win-lose, happy-sad, big-little, close-far, fast-slow, and these are only a few. learning about opposites Opposites: big-little…photo courtesy of Patrick B. In a soccer game, most of the time players are up, but sometimes they fall down. The soccer ball is usually down on the ground but sometimes it’s up in the air. Up-down are fairly easy to figure out, but other pairs, such as fast-slow are much more difficult. Even though the players are running back and forth across the field, grownups might say that a game is slow. The soccer ball is pretty little but when it goes in the net, it could be a big score. No wonder learning opposites can be challenging. Opposites are not easy to get right, but they are an important language and thinking skill. Some of them are easy to learn, like still and moving, and some are much harder. Opposites are not just all of one thing or all of another, it often depends on what objects are being compared. Is a running player slow or is it just that the ball is really fast? Kids need to compare two ideas or things in relation to each other. This takes considerable thinking. Lots of opportunities and a variety of experiences will help. For a play-of-the-day, whatever your child is doing, take advantage of any possibilities to use some opposites. Still and moving are not a possibility; kids are rarely still, but your child might be building a tower with blocks. It goes up and up and up and then falls down. Toys are a variety of sizes. Are some big and some small? And if you are watching soccer, is the ball going in the net? What other opposites are in play? Lego and Duplo Help for Learning Opposites Playground Fun, Learning, and Kindergarten Readiness #8 Playgrounds are great places for fun and learning that will support children’s development, and kindergarten readiness, sometimes in unexpected ways. One of these is learning about opposites. Figuring out opposites can be challenging. Usually, opposites are all of one thing or another, such as up/down, open/close, or empty/full. This kind is easier to learn. Opposites … Continue reading Playground Fun, Learning, and Kindergarten Readiness #8 Some Handy Ideas for Kindergarten Readiness: Opposites This kindergarten readiness learning idea about hands is so obvious I’m surprised I didn’t think of it earlier–opposites. Left and right are opposites. Learning about opposites can be challenging. Opposites that are usually all of one thing or the other such as empty/full, hot/cold, or up/down are fairly easy to learn. But others, like big/little … Continue reading Some Handy Ideas for Kindergarten Readiness: Opposites Readiness for Kindergarten – Learning With Dr. Seuss, #7 What can your feet do? Check out The Foot Book: Dr. Seuss’s Wacky Book of Opposites. Opposites are not easy to get right, but they are an important language and thinking skill. They require brain connections not just for the meaning of each word or concept, but linking of one idea and it’s opposite. Some opposites are easy … Continue reading Readiness for Kindergarten – Learning With Dr. Seuss, #7
5 Ways Cryptocurrencies Helps Developing Countries This article has been originally published in, to read the original click here. Cryptocurrencies are changing the world in more ways than meet the eye. They have made transactions easier and safer, and the blockchain technology that allowed them to exist is now being used for more than just cryptocurrencies. Among the most promising developments that have spawned from the cryptocurrency space are the ones that are taking effect in developing countries. Some people believe that cryptocurrencies have thus far functioned only as another game for wealthy investors. The truth is that many people in developing countries are now able to join global commerce in ways that they haven’t been able to before. The biggest advantages that cryptocurrencies offer the developing world are increased access to money, the improved ability to send or receive it, greater access to ATMs and digital wallets, and a huge increase in transparency, which is sorely missing in many countries. Cryptocurrencies are helping out developing countries in more ways than one. 1. Access to Banking The World Bank estimates that over two billion people around the world lack access to banking services. There are several reasons for this, most of which center around poverty, but the end result is that these people are disconnected from global commerce. This is where cryptocurrency now shines… There are many applications that allow you to open a cryptocurrency wallet and use it for banking purposes from your mobile device. Because mobile devices have proliferated in the developing world far faster than banking services, there is now a perfect opportunity for cryptocurrency to fill in a huge gap in international commerce. The end result is a higher level of inclusivity than would ever be found in traditional banking services. 2. Easy Transactions Over Mobile Devices The accessible nature of cryptocurrencies allows you to easily complete transactions over your mobile device. It is now safer and easier to maintain a cryptocurrency wallet than it is to deal with banks and various financial institutions, which make international transactions difficult or costly. 3. Greater Transparency Of all of the challenges holding developing countries back, corruption is one of the most persistent. Unnecessary bureaucracy and corrupt officials cause the ever-growing gap between the rich and the poor to persist, and even money that is set aside for the public interest simply goes missing on a regular basis. The blockchain technology that enables cryptocurrencies to function comes with tools that make corruption impossible; or at the very least too visible to go unnoticed. The blockchain is an immutable ledger of all transactions. This means that every transaction is publicly recorded on a ledger and it can never be deleted. This level of transparency makes unscrupulous activities difficult to get away with, while also allowing ordinary people to safely conduct transactions. 4. Greater Social Mobility Despite the stereotype of cryptocurrencies being another game available only to the rich, cryptocurrencies offer a new solution to global income inequality. One of the greatest setbacks to social mobility in the developing world is corruption, but as we have seen, that issue is tackled ferociously by cryptocurrencies and their blockchain technology. Unlike traditional banking institutions, no physical presence at any specific location is required for crypto banking. Generally speaking, you just need an internet connection and a crypto wallet. Now some countries are seeing the rise of crypto ATMs, allowing any user to purchase, send or receive money from anywhere in the world. Cryptocurrencies provide accessibility, transparency and clarity, three things that are often in short supply in many developing countries. 5. Easier Remittances Every year, hundreds of billions of dollars in remittances are sent to developing countries. According to the World Bank, this figure stood at approximately $441 billion in 2016. The remittance payment process has created a global industry that is seldom favourable to migrant workers and immigrants. Traditional remittance services such as Western Union collect fees and sometimes enact various different charges, making these transactions more expensive. Cryptocurrencies have allowed remittance payments to be made in an easier and far more affordable way. Crypto transfers are conducted very easily, but not at the expense of safety. This is another factor that has made Bitcoin popular in developing countries. There have been new services emerging in developing countries, such as SureRemit from Nigeria, that are targeting the growing crypto remittance demand. The Verdict Cryptocurrencies have offered the world an alternative to the problems that come with traditional banking. These alternatives have extended to countries of all levels of economic development. It will be interesting to see how the world at large changes as a result of cryptocurrencies, but there is no doubt that they are also helping developing countries. Cryptocurrency -Blockchain is Revolutionizing the Medical Industry This article is originally posted at . As part of series of articles in the subject. Here you can find the innovative block chain technology is going to revolutionaize our health system. Going to the doctor’s can be a real pain. Unless you’re fortunate enough to live in one of those Scandinavian countries where everything just works, for most of us, a trip to the doctor is a never-ending cycle of bureaucratic misery. Trying to get an appointment, verifying insurance, searching for medical records. If even the thought of it makes your stomach tighten in knots, take heart… Blockchain will revolutionize the medical industry soon enough. So, sit back and relax. You won’t have to worry about your intimate details circulating around the net, or being hung up on by a sour-faced receptionist ever again. And the safety of the medical devices you use and the drugs you take (assuming they’re legal) will be beyond question. Because frankly, between data leaks, malpractice, and insurance scandals; if ever there were a broken system screaming to be fixed, it’s healthcare. And while blockchain may not exactly be a superhero descending from the heavens like a lightning bolt to fix the world’s problems; sometimes even the smallest details can make our lives better. Blockchain may not have a cure for cancer just yet. But it can add a much-needed layer of efficiency, privacy, and security to our lives and just make the whole painful process of going to the doctor’s a little easier to swallow. Let’s take a closer look. Keeping Healthcare Records Secure There are several blockchain companies working on solutions to improve the management of private healthcare records. In the same way that your cryptocurrency account uses a public key instead of a name, your medical records can be stored securely, easily accessible to authorized parties. Dispatch Labs is creating an enterprise-ready blockchain protocol that can store any type of data, no matter the size. CMO Ivan Goldensohn says: “Our medical system is not just outdated, it’s so large and successful that it has become encrusted and immobile. There is no lightning bolt to fix big pharma or healthcare or medical research, but shared ledger technology provides a natural solution to improve many of its worst problems: lack of transparency, inefficiency, and bureaucracy.” Blockchain can also keep medical records secure and prevent them from being tampered with. Or as Howard Orloff of Herd Consulting so plainly puts it: “two guys and a lawyer would never be able to walk into a doctor’s office and remove medical files… even on behalf of the President of the United States!” Shared-ledger technologies like the blockchain can greatly improve the efficiency of many aspects of the medical industry. From record keeping to patient scheduling, ease of transfer of information, and ensuring for things like HIPAA and GDPR compliance. Embleema, for example, is releasing a HIPAA-compliant blockchain to store EHR/EMR data securely in an environment where the owner (the patient) has complete control over the data. Unlike many blockchain companies, Embleema’s leadership team has more than 100 years of healthcare industry experience. And they found blockchain technology provides the perfect solution to securely storing and accessing medical records and data. Improving Efficiency and Communication Praveen Suthrum President and Co-founder of NextServices, a healthcare technology and management company that works with doctors and administrators, says: “The medical industry operates in vast silos. Systems don’t talk to each other. Even though data is digitized with the help of EHRs, systems don’t talk to each other. Data is locked up. Tracking the supply chain of drugs and medical is unknown. Blockchain has the potential to streamline the flow of medical information in a secure manner.” So, you know when you show up for an appointment with a specialist and have to fill out a new form, provide your details for the fiftieth time, or call your insurance provider and wait on the line to ‘Careless Whisper’ on repeat? Blockchain tech will fix all that, allowing you to just show up and get started. Your data will be secure and portable between doctors and providers. Combating Counterfeit Drugs “Counterfeit drugs kill over a million people a year worldwide,” says Jeff Stollman of RMTM. “By tracking all pharmaceutical transactions on the blockchain, it can be easily determined when a company sells more product than it buys. A company that does this is likely introducing counterfeit or diluted product into the market because there is no other explanation for being able to sell more product than they purchase.” There are numerous projects underway to develop a solution for this. One Network’s Chain-of-Custody Solution, for example, is designed to secure the medical supply chain and combat counterfeit drugs. The company is also looking to mitigate threats in pharmaceutical authentication and the serialization of medical devices. Using blockchain tech will provide an end to end management system for the entire distribution process. Allowing for Self-Diagnosis Finally, blockchain will revolutionize the medical industry by removing the need for doctors completely through self-diagnosis.!!!! OK, maybe not. Unless blockchain really does have superpowers after all, we’ll still need doctors and surgeons for the foreseeable future. In fact, robotics and AI have the upper hand on blockchain when it comes to removing human error during surgical procedures or aiding diagnosis. But when blockchain and AI team up, interesting things can happen. Aaron Vick is an Advisory Board Member for C3D Medical LLC, a company exploring future research capabilities by creating a consumer-based blockchain for transporting interaction data between providers. He says: “We will create the first direct to consumer genetic drug interaction test designed to inform individuals of efficacious and ineffective drugs, as well as dangerous interactions.” Ever googled your symptoms and self-diagnosed with a list of life-threatening conditions? Or checked out the side effects of your medication and given yourself heart palpitations? You won’t have to do that anymore. Blockchain will revolutionize the medical industry, and it’s already begun. Are you already convinced that blockchain technology is the future? Share with me your ideas and thoughts. Join my blog today and discover the most interesting conversation about the world we are marching into. Read more now