text
stringlengths
144
682k
A comparison of the ecology and behaviour of parthenogenetic and sexual taxa of the Australian skink, Menetia greyii: implications for coexistence. Author: Clare Louise Griffin Griffin, Clare Louise, 2006 A comparison of the ecology and behaviour of parthenogenetic and sexual taxa of the Australian skink, Menetia greyii: implications for coexistence., Flinders University, School of Biological Sciences Menetia greyii, a small Australian skink, has recently been determined to be a species complex that consists of both sexual and parthenogenetic taxa (Adams et al. 2003). In total, seven distinct taxa have been identified in the south-central region of Australia. This includes three sexual taxa, three apparent parthenogen lineages, and one lizard of uncertain status The study population occurs near Bundey Bore station in the semi-arid region of South Australia (approximately 160km north east of Adelaide). At this site, one sexual taxon (SAS) and two all-female parthenogenetic taxa (WP and RP3) were found to occur in sympatry. In a search for ecological differences, I examined spatial, thermal, physiological and morphological niche relationships in the parthenogenetic and sexual forms. Capture rates were used to determine microhabitat and macrohabitat use in the field. The use of different microhabitats and the amount of time spent occupying different exposures (sun vs. shade) were also examined under laboratory conditions. Thermal preferences, physiological performance (sprint speed ability) and daily activity periods were investigated in the laboratory. The study failed to find any major differences among the different taxa that would indicate they are partitioning resources and therefore explain how the sexual and parthenogenetic forms are coexisting. The only difference observed was that the parthenogens expressed superior sprinting ability, running faster than the sexuals over a range of temperatures. In addition, I found that sexual and parthenogenetic females within this population differed very little in their reproductive effort and output, indicating that RP3 and WP parthenogens possess a reproductive advantage over sexual females as a result of not having to produce males (Williams 1975, Maynard-Smith 1978, Bell 1982). In staged interactions between pairs of sexual and parthenogen individuals, the parthenogens were more aggressive and dominated the sexuals. As a result, the parthenogens were able to outcompete the sexuals for food items. This had serious consequences on fitness, with the sexuals losing significantly more weight than the parthenogens. All of these factors would suggest that the parthenogens should eliminate the sexuals at Bundey Bore. Despite this, the parthenogenetic females at Bundey Bore do not outnumber the sexual subpopulation. This raises the question of how the sexuals are persisting. An examination of endoparasites in the scats of parthenogen and sexual M. greyii found that WP parthenogens had significantly higher parasite prevalence than sexuals. Further to this, there is evidence of matings occurring within the study population between sexual males and WP parthenogen females with five tetraploid males being captured. Therefore, WP parthenogens may be suffering from destabilising hybridization. These factors may account for why the parthenogens (or at least the WP parthenogens) have not competitively excluded sexual M. greyii from Bundey Bore. Other possible reasons are discussed in the general discussion in Chapter 8. Keywords: parthenogenesis,asexual,Menetia greyii,competition Subject: Biological sciences thesis Thesis type: Doctor of Philosophy Completed: 2006 School: School of Biological Sciences Supervisor: Professor CM Bull
Quick Answer: How Circus People Transport Ferrous Wheel? How do they move Ferris wheels? In operation, the ferris wheel revolves about a horizontal axis, and the riders are alternately lifted and then lowered as they are carried around the wheel in a circle. When the wheel stops, the people in the seat or platform at ground level exit the ride, and new riders take their place. How did the first Ferris wheel work? The first Ferris wheel was supported by two 140-foot tall steel towers, with a 45-foot long axle between them. The wheel had a diameter of 250 feet, and had 36 wooden cars that could each hold up to 60 riders. It was lit up by 3000 of Thomas Edison’s new light bulbs. How much did it cost to ride the first Ferris wheel? During its first two months, the Fair was not doing as well as anticipated. It was not until the Ferris Wheel opened that the Fair began to make more money. It cost fifty cents to ride the Ferris Wheel and people were more than willing to pay because the ride gave a magnificent view of the White City (29). You might be interested:  FAQ: When Does The Ringling Brothers Circus? What is the purpose of a Ferris wheel? wheels of the Ferris or other types for the purpose of observation or amusement”. Design variation includes single (cantilevered) or twin sided support for the wheel and whether the cars or capsules are orientated upright by gravity or by electric motors. Is the first Ferris wheel still standing? It was first moved in 1895 to nearby Lincoln Park, then sold in 1896 when Ferris died of tuberculosis at the age of 37, and then moved to St. Louis in 1904 for the World’s Fair. But by 1906, after 13 years of operation, the original Ferris Wheel had fallen into disrepair and was eventually slated for demolition. What happened to the double Ferris wheel? A crane that had been used to put up the rides was parked on a hill. Somehow — possibly from kids fooling around — the brake got disengaged, and the riderless machine rolled down the hill, through the crowd, and into the base of the double wheel. What force does a Ferris wheel use? Objects that have circular motion have something called “centripetal force ”. Centripetal is a word meaning “centre seeking.” The centripetal force always points to the centre of the circle. Ferris wheel physics is directly related to centripetal acceleration. Why do Ferris wheels go backwards? This is because as the Ferris wheel spins the seats, or gondolas, can freely rotate at the support where they are connected to the wheel. The Ferris wheel spins upwards with the help of gears and motors, while gravity pulls the wheel back down again. You might be interested:  FAQ: When Does The Universal Soul Circus Start? How long is the average ferris wheel ride? The wheel is constantly in motion so when you get on and off it is moving but at an extremely slow pace. I would say 10-15 minutes, maybe 20. over a year ago. Each trip around took about 15 minutes. Has anyone ever died on a Ferris wheel? Many Ferris wheel deaths and accidents can be blamed on the rider not following the posted rules, such as rocking the gondolas or unsecuring latches or safety mechanisms. Since 1985, at least 12 carnival workers have been killed while assembling or disassembling a portable Ferris wheel ride. Who really invented the Ferris wheel? The original Ferris wheel, designed by George Washington Gale Ferris, built for the World’s Columbian Exposition, Chicago, 1893. What are the seats in a ferris wheel called? What problems did the Ferris wheel solve? Conceived for entertainment, Ferris solved a deeper problem of the time: how to build lighter bridge spans. Ferris was a graduate of New York’s Rensselaer Polytechnic Institute and worked as a bridge-builder in Pittsburgh. He foresaw the growing need for structural steel. The Ferris wheel delivered in every respect. How fast did the first Ferris wheel go? In 1893, Ferris completed the attraction and the Ferris wheel was born. Soaring to a height of 264 feet, the original Ferris wheel offered fairgoers a 10- to 20-minute ride unlike anything they’d experienced before. Leave a Comment
news + views + events Experimental Use of an Invention Inventors must take care that their invention is “new” for it to be patentable. That means the invention hasn’t been disclosed to the public. Trade show announcements, press releases, publications, offering the invention for sale – all of these can be considered a public disclosure, and if disclosure of the invention occurs before the date of filing of the patent application, this disclosure could defeat patentability, since the invention is no longer “new” for patenting purposes. In Canada and the U.S. there is a 12-month grace period, so the date of prior disclosure is measured against this 12-month period: put another way, patentability may be lost if the invention was disclosed by the inventor more than one year before the filing date of the patent. So how does this apply to experimental use? How can an inventor test new inventions and avoid the problems associated with public disclosure? The recent decision in Bombardier Recreational Products Inc. v. Arctic Cat Inc. is interesting in a number of ways, but in this discussion I want to flag one element of the case. Arctic Cat was sued by Bombardier for infringement of certain snowmobile patents, which related to a particular configuration of rider position and frame construction.  Arctic Cat raised a number of defences and one of them was “prior public disclosure.” Since Bombardier, the patent-holder, tested its prototypes of the snowmobiles on public trails, Arctic Cat argued that, in and of itself, constituted public disclosure, since “someone could have witnessed the rider's hips above his knees, and the ankles behind the knees, and the hips behind the ankles.” Unhappily for Arctic Cat, the court dryly dismissed this defence as “another one of those last-ditch efforts.” Citing an inventor’s freedom to engage in “reasonable experimentation”, the court went on to say: “Since at least 1904, our law has recognized the need to experiment in order to bring the invention to perfection. …In this case, the evidence is that [Bombardier] was conscious of the need for confidentiality and took steps to ensure it would be protected. The experimentation was necessary in view of the many uses that would be available for that new configuration.” The court noted that, even if a member of the public could have seen the prototype snowmobile “there is little information that is made available to the public while riding the snowmobile on a trail, even for the person skilled in the art. The necessary information to enable is not made available. The invention disclosed in the Patents is not understood, its parameters are not accessible and it would not be possible to reproduce the invention on the simple basis that a snowmobile has been seen on a trail.” Applying the well-recognized experimental use exception, the court found that experimental use on a public trail did not constitute prior public disclosure of the inventions. Inventors should take care to handle experimental use very carefully. Make sure you get advice on this from experienced IP advisors. ,Partner, Trademark Agent, CLP
The Cruelty of Tail Docking Dogs Picture the following breeds: the springer spaniel, the German short haired pointer, and the Rottweiler. Was the tail a part of your image? Dogs belonging to these, and many other breeds worldwide, are subjected to painful tail docking procedures just a few days after birth, often leading to lifelong physical and psychological damages. The practice of tail docking has gone on for so many centuries that many docking supporters incorrectly claim it’s pain-free, normal, and even beneficial to the dog. We now know this to be false, so why is it still happening? Scotland, which had originally elected to ban tail docking in a groundbreaking 2007 decision, has recently voted to reintroduce the practice. The new ruling includes a paltry stipulation in an attempt to mollify the many opposed: now puppies in Scotland can legally have their tails docked only if they will be used as working dogs later in their lives. Legislators have ignored the argument that it is unreasonable to predict whether or not a puppy will eventually become a working dog when they are only a few days old. Lawmakers seem equally unfazed that not a single animal protection or veterinary organization has voiced support for either the practice of tail docking or the new legislation. The British Veterinary Association is “appalled.” Some have postulated that Scotland’s decision to reintroduce tail docking leaves puppies as collateral damage in the wake of a fractured political system. The issue falls under the jurisdiction of the Environment, Climate Change, and Land Reform Committee. The seven out of ten committee members who favored the decision, all of whom are members of either the Scottish National or Conservative Party, defended their vote by citing Environment Secretary Roseanna Cunningham. Cunningham, herself a member of the Scottish National Party, claims that she has seen evidence that tail docking protects dogs from injury. Whether or not she is sincere in these assertions, the fact remains that this legislation was passed in the face of vehement opposition from animal groups, veterinary organizations, and other animal experts. Tail docking for dogs is banned, or at least seriously restricted, in eleven countries of the European Union, in addition to Australia, Iceland, Israel, Norway, South Africa, Switzerland, and the Virgin Islands. Tail docking is legally defined as mutilation, “interference with sensitive tissues or bone structures of an animal.” The procedure is performed on puppies between two and five days old. It is carried out using scissors, nail clippers, or even a tightly wound rubber band that cuts off blood flow to the tail until it falls off. While most countries require docking to be done by a veterinarian, these laws are rarely enforced and unlicensed, untrained individuals perform the procedure without supervision. Anesthesia is not used. A common argument made in favor of docking is that the puppies are too young to remember the pain. Many docking supporters believe that the young nervous systems are not sufficiently developed to understand what is happening. In fact, experts say that very young animals tend to actually feel pain more acutely than adults. Recklessly damaging nerves, as is done with tail docking, can result in later complications such as neuromas. Neuromas are swollen and often chronic bundles of regenerating nerve fibers that cause the individual to experience pain more drastically than is normal. There is also a link between neuromas and long term behavioral problems due to the heightened perceptions of pain. Docking has been shown to lead to atrophy of the pelvic muscles, causing fecal and urinary incontinence and perineal hernias. The crucial process of puppy socialization is disrupted by the intense pain inflicted by tail docking during an important period in the maturation process. Puppies are unable to build the necessary relationships with their litter-mates and mothers. The American Veterinary Society of Animal Behavior explains that “incomplete or improper socialization during this important time can increase the risk of behavioral problems later in life including fear, avoidance, and/or aggression.” The trauma from having their tails docked then puts them at a disadvantage when the time comes to socialize with humans and may prevent bonding with their future owner. The practice is not new. It was first used by the Romans, who believed that removing the tip of the tail and tongue would prevent rabies. Later, it served as a means to hinder the dogs of belonging to people banned from hunting by stripping them of an essential tool — the tail.  Eventually docking was used to prevent injury, but only then if the tail was disproportionately long. Today, the reasons are almost entirely cosmetic. Proponents of docking argue inaccurately that it protects the dogs from injuries later in life. But, tail injuries occur only in 0.23% of dogs. For an estimated 500 dogs whose tails are docked, only one has been preemptively spared from later injury. Veterinarians assert that almost all tail injuries in dogs can be remedied with basic first aid. If amputation is required after an injury or illness, the relatively simple procedure can be performed in a vet’s office on an adult dog, with anesthesia. In essence, tail docking prevents the extremely slim chance of injury by forcing dogs to undergo a much more dramatic tail injury. We wouldn’t amputate human limbs just to avoid the possibility of later injury, so why are we subjecting dogs to the same logic? For many breeds, the American Kennel Club breed standards require surgical alterations of the dogs’ natural form, whether it is tail docking, ear cropping, or both. How is this anything but completely contradictory to the AKC’s obsession with purity? Tail docking is condemned by veterinarians as unnecessary cosmetic surgery. Humans may elect to have cosmetic surgery, however, the American Veterinary Medicine Association explains: “Because dogs have not been shown to derive self-esteem or pride in appearance from having their tails docked (common reasons for performing cosmetic procedures on people), there is no obvious benefit to our patients in performing the procedure. The only benefit that appears to be derived from cosmetic tail docking of dogs is the owner’s impression of a pleasing appearance. In the opinion of the AVMA, this is insufficient justification for performing a surgical procedure.” For those who wish to maintain the aesthetic or function of a docked tail, there is an alternative. The natural bobtail (NBT) is an autosomal dominant gene in dogs resulting in the appearance of a docked tail. Dogs who have the gene include the Australian shepherd, Jack Russell terrier, Pembroke Welsh corgi, and Savoy sheepdog. Dr. Bruce Cattanach, a British geneticist and boxer breeder, responded to concerns over docking by crossing a boxer with a corgi to achieve the NBT gene. By the fourth generation of NBT boxers, his dogs were accepted into the Kennel Club in England as purebred. However, it is worth remembering that dogs, like humans, deserve to be loved no matter how they look, and that breeding dogs takes away from the millions of existing dogs that already needs homes. Furthermore, as with human children, the best pet parents are the ones who will love their dog regardless of conventional “breed standards” or “beauty norms.” All arguments in favor of tail docking have been refuted by reputable veterinary and animal protection organizations. There is even a way to introduce the natural bobtail gene into dogs. So why are some people still stubbornly in favor of this barbaric procedure?  It is a practice rooted in ignorance, defended by faulty explanations from ancient eras (rabies prevention) to today (evading tail injuries). While Scotland has taken animal care standards a significant step backwards, more and more countries are leading the way by placing comprehensive bans on an archaic practice.  Meanwhile, there is plenty we can do to keep fighting this horrific practice. The biggest advantage we have against tail docking is the scientific evidence that it is cruel and unnecessary.  Many proponents simply refuse to accept the facts, but that isn’t any reason to give up on them. Share the science with your family, friends, co-workers, and social media. Contact your local legislators. Don’t support veterinarians or breeders who perform tail docking procedures.  Celebrate your dog’s tail and most importantly, love him or her just the way they are! *For All Animals is against the intentional breeding of dogs for profit or sale. Kim Herbert Cornell University: College of Agriculture and Life Sciences, Candidate for Bachelor Science Degree in Animal Science, May 2018. Guardian to Phoebe, a Brittany Pointer, and Chester and Harley, two tuxedo cats.   “I am so excited to be interning at For All Animals because I want to become a more effective advocate for animals and help others to do the same!”
Is It Safe To Eat Orange Peels? Oranges are one of those fruits that teeter on the line between good for you and maybe you should stay away. With the high acidity content, oranges can actually have the same effect on your teeth as that of sugar in soda. Before you ban oranges from your shopping list for good, though, there may be one part of the orange that you're overlooking, which actually renders more nutrients than the flesh itself — the peel. Yup, that pesky, hard-to-separate orange peel may not be meant for the garbage after all, but is the nutrient rich outer layer of an orange really safe to eat? Let's first talk about why you would even consider an orange peel worth eating. According to Live Science, the orange peel is nutritionally beneficial. It contains more fiber than the fruit itself and is packed with flavonoids. Flavonoids are naturally occurring plant pigments and one of the main reasons fruits and vegetables are so good for us (via Psychology Today). The consumption of flavonoids have been known to reduce the risk of heart disease, stroke, and asthma, and minimize the growth of cancer cells.  Even though the health benefits of orange peels make you want to skip the peeling process altogether and take a big bite of the rind, there are a few things you should know. Orange peels are incredibly bitter and unappetizing, though they are not poisonous. The tough exterior can be difficult to chew and with the peel being so high in fiber, it can also be difficult to digest. Healthline says consuming large pieces of an orange peel at a time may cause cramps or bloating.  Thankfully, Cooking Light offers a tasty way to stomach an orange peel by throwing them on the grill. This helps to soften the peel and makes it more tender and easier to eat. The bitterness of the orange peel mellows out a bit and the citrus flavors become more intense. Potential for cramps and bloating aside, there is another drawback to consider when eating orange peels, and that's the use of pesticides. Pesticides are frequently used on citrus fruits in order to protect them from insects and molds. Even the recommendation of using organic oranges may not keep you from ingesting these pesticides. When it comes to whether or not orange peels are safe to eat, the answer is yes. If you can put up with the somewhat uncomfortable digestive issues it may cause, along with the tough texture and bitterness you'll have to endure during consumption, then go for it. It is worth noting that some orange peels are dyed to look, umm, more orange. According to Taste of Home, some growers use the dye known as Citrus Red #2 to make their fruits more appealing to consumers, who tend to favor bright and vibrant produce. While the jury is still out on the red dye, some studies have shown it to be harmful and it is banned in California and Arizona. If you prefer to avoid foods that contain artificial dyes, the outlet suggest you shop from a local producer or organic market, or look for produce grown in one of the two states mentioned above that don't allow the dye to be used.
Phone: 86-0760-85331121 Email: Home > Other News > What is Food Grade Silicone and Why is it Better Than Plastic? Apr 30,2021 | Other News Single-use plastics were made for convenience, but there’s no question that plastic is toxic to the environment and our bodies. Americans use 100 Billion plastic bags per year with only 1% of those being recycled. The rest? They end up in landfills where it takes over 500 years for each of those bags to break down. The good news is, we here at Stasher are committed to eliminating the need for single-use plastics around the world and it's the reason why we created the world’s first and only plastic-free storage bag that's made out of pure platinum, food grade silicone. Never heard of platinum, food grade silicone or wondering what the difference is between it, plastics, and other silicones? We break it down for you below.  Benefits of food grade silicone: · Highly resistant to damage and degradation from extreme temperatures · Lightweight, saves space, easy to transport · Made from an abundant natural resource · Non-toxic and odorless – contains no BPA, latex, lead, or phthalates · May be 100% recycled at select locations and is considered non-hazardous waste What is plastic made of?  Plastic that doesn’t end up in a landfill often ends up in the ocean and enters the food chain which is a big concern for human health. The harsh chemicals and toxins found in plastic can lead to cancer, infertility, immune disorders and more. these chemicals include: · BPA  · BPS  · PVC  · Phthalates  Fortunately, you now have a healthier option. Food grade silicone, which is what Stasher bags are made entirely of, is a more flexible, sustainable, and safer alternative to plastic, so it’s safe for people and the planet. Unique by design, Stasher is engineered to get people to rethink the plastic in their lives.  What is food grade silicone? Food grade silicone is a non-toxic type of silicone that doesn’t contain any chemical fillers or byproducts, making it safe for use with food. Silicon, the naturally occurring chemical element that makes up silicone, is a metalloid, which means it has properties of both metals and non-metals and is the second most abundant element in the earth’s crust, after oxygen. The silicone molecule is comprised of silicon and oxygen. Due to its resiliency, non-porous surface and sustainability, food grade silicone is kinda like the Superman of silicones.   While mason jars and other glass containers are great for plastic-free storage, they can break, take up a lot of space, and are inconvenient for taking on the go. Stasher bags make it easy to store your food at home or on-the-go while keeping what you’re eating away from plastic. Is silicone plastic?  No. In fact, most say it’s closer to the rubber family than plastic. Food grade silicone (the material we use to make Stasher bags), is free of BPA, BPS, and phthalates. Aka, dangerous-to-your-bod fillers. Is silicone recyclable?  Yes. Check your local recycling center for information on silicone recycling options. If you’re a Stasher customer, you can send your Stasher back to us (for free!) to recycle and repurpose. Contact us for more info.  Is silicone safe for food?  Food-grade silicone is made without petroleum-based chemicals, BPA, BPS, or fillers. It’s safe to store food, put in the microwave, freezer, oven, and dishwasher. You can even cook right in your Stasher bag, sous vide style. It won’t leak, break down, or degrade over time. This is why platinum, food grade silicone is so much better for health and our environment. It’s also why we’re so passionate about our repurposing program to make sure a Stasher can live up to its "endlessly reusable" reputation, even if it means being reused as playground pebbles!  Key words: Food-grade silicone Plastic BPA BPS Share this post About us Contact us Melon Rubber&Plastic Products Co., Ltd Tel: +86 760 85331121 facebook Twitter Linkedin Google+Youtube Get Free Quote • Name • E-mail • Message
Face masks, yes, but don't forget hand-washing too • Wearing a face mask by itself isn't enough to protect against Covid-19 • There are other essential safety measures like hand-washing  • Two studies, however, found that people wearing a mask didn't neglect to wash their hands For most people, wearing a face mask to protect against Covid-19 doesn't lead to a false sense of security that leads them to forgo other precautions like hand washing, a new study finds. But how often does that happen? To find out, a British team led by Dr Theresa Marteau at the Behaviour and Health Research Unit at the University of Cambridge, looked at the evidence to see if those concerns might be real. Masks increase distancing They looked at "risk compensation", which is when people have a level of risk they are comfortable with and they adjust their behaviour to maintain that level of risk. The review of 22 published studies with more than 2 000 households found that wearing masks does not reduce the frequency of hand-washing. "Many public health bodies are coming to the conclusion that wearing a face-covering might help reduce the spread of SARS-CoV-2, and the limited evidence available suggests their use doesn't have a negative effect on hand hygiene," said researcher Dr James Rubin, from the department of psychological medicine at King's College London. The report was published recently in the journal BMJ Analysis. Image credit: Pexels We live in a world where facts and fiction get blurred Subscribe to News24
A Pill To Cure Cancer? Saturday, March 1st 2008, 10:38 pm By: News On 6 Cancer is the second most common cause of death in the U.S. A remarkable medical breakthrough is happening in Oklahoma City that could eventually lead to a cure. In a lab environment, researchers have been able to stop normal cells from turning into cancer cells. There is still a lot of work to do, but the goal is a pill that could end cancer. OU Health Sciences Center researchers have developed a drug that, in a lab setting, is killing cancer cells.  Doris Benbrook is leading the research.  Testing includes treating normal cells with a carcinogen.    "The exciting part is that when we take those right after the carcinogen treatment and add our drug we can prevent it from turning into cancer," Benbrook said. Lab testing shows the drug is effective against 12 different types of cancer, including colon, ovarian and breast cancer. There is millions of dollars worth of testing that needs to be done before the researchers can apply to the FDA to start clinical trials.  If that goes well, they could apply in three years.  Dr. Benbrook would like to see the trials done at the University of Oklahoma Cancer Institute.
HomeThe Modernisation of Classic Games! The Modernisation of Classic Games! The origins of modern-day chess can be traced back to around 1475, where the common rules and mechanics still seen in the game today were first introduced. Whilst the actual gameplay of chess has not changed very much, the formats of the game and how it is consumed have changed significantly in order to appeal in the modern age. Classic casino games have also had to adapt, and the changes in the representation of the games and how they are played can be seen across different platforms Representation in TV and Film Chess has often been represented in TV and film, allowing more people to become aware of the game in the modern age. The popular Netflix TV series ‘The Queen’s Gambit’ is an example of how modern media platforms are helping to popularise the game in a modern format. The Queens’ Gambit has the game of chess as one of its main focal points, with the title itself even a reference to a specific chess move. It has broadcast the game in an interesting light, showing the intricate thought processes that chess players go through and highlighting the interesting complexities of the game. The success of the show has had a direct impact on a rise in the popularity of chess, with more people getting involved with the game. Similarly, casino games have also been made more accessible and appealing to a bigger audience due to the representation within TV and film. The popular casino game blackjack has been the focal point of many films such as ‘21’.  This Hollywood drama helped to introduce the game of blackjack to new audiences and raise its mainstream popularity. Other casino games such as poker have also been represented in popular films, including ‘Rounders’ starring Matt Damon and Edward Norton which is centered around the game of Texas hold ‘em poker. The James Bond classic film ‘Casino Royale’ also heavily features poker, and is another example of how modern media has been able to showcase and enhance the reputation of classic games. Accessibility of Online Platforms Chess and casino games have recently been adapted even further due to the advances in modern technology. Chess and casino games are now readily available to play online through platforms such as smartphones, tablets, and PCs. The digitalization of these games has allowed players to play against friends and strangers easily due to the accessibility of the platforms and the game software. Sites such as bonus.ca show a range of online casino websites where games such as blackjack and poker are available to play against live dealers. Chess is easily accessible through websites such as chess.com where players have the option to play against others or against an AI.   The introduction of online play in these games through modern technology has made them even more appealing, as people can access the games anywhere from a number of devices and play against friends from around the world. This has also helped to build a bigger and more international audience. In addition to playing the games, video platforms such as YouTube and Twitch have allowed online chess and some casino games to be broadcast for spectator entertainment. This is another way in which new media has allowed these classic games to develop and adapt to the modern age. Whilst many aspects regarding chess and classic casino games have changed over the years, the fundamental appeal of these games is that they are entertaining for the people playing them. This key aspect has managed to remain and it will be interesting to see how these classic games evolve in the future. Sushant Gupta Please enter your comment! Please enter your name here Must Read
Humans have been playing games for centuries, but we’re still not perfect at them: We make mistakes, underestimate opponents, and can think only a few moves ahead. Computers have no such shortcomings. An artificial intelligence can master most of the classics if it runs enough simulations. As processing power has increased, machines have grown adept enough to trounce their creators at everything from tic-tac-toe to backgammon (though the programs still can’t compete at more creative pursuits like crosswords). Here’s a timeline of their march to victory. The history of AI arguably begins with chess. Around 1948, computing pioneer Alan Turing scribbled the first lines of an algorithm for pondering rooks and bishops. Nearly 50 years later, IBM’s Deep Blue program edged out world champ Garry Kasparov in a sweat-soaked competition. IBM whiz Arthur Samuel wrote the first checkers program on his company’s clunky 701 computer in the 1950s. A generation later, researchers at the University of Alberta solved the board for good: Their Chinook program clobbered a checkers champ in 1994 and became officially unbeatable by 2007. Texas Hold’em Card games are tricky for AIs because they lack “perfect information”: in chess you can see all the pieces, but in cards you can’t peep your opponent’s hand. Poker pro Mike Caro constructed the first electronic player in 1984, and a subsequent software became unbeatable at two-person Hold’em 30 years later. Starcraft II This war simulator has players build fortresses and command alien troops. Google’s DeepMind neural network defeated a group of champs in 2019, deploying unusual strategies that confounded even elite contestants. One of its sister bots had mastered the notoriously complex game Go two years prior.
Dimed & Dangerous: Preamp Tubes—Little Bottles, Big Sounds Fig. 1 When I was learning about amps and wondering how a tube actually amplifies a guitar’s signal, I was a little stumped. It took many nights of reading my new favorite books, Dan Torres’ Inside Tube Amps: The Book on Tube Amps Technology and Gerald Weber’s A Desktop Reference of Hip Vintage Guitar Amps, over and over to set the mental stage. The key for me was grasping the concept of bias. Essentially, we set the bias of an amp to a setting that is just right for the flow of current when that amp is idling—that is, turned on and ready to rock. How do we figure out what that setting is? Read on, and remember that the guitar signal coming out of our pickups is AC. It is modulating up and down—plus and minus—in reaction to our strings moving back and forth over the pickups. And please remember we are generalizing. For a preamp tube to amplify effectively, it needs to be in its happy place: not too hot, not too cold—the electron porridge flowing through the tube must be around the midpoint of the tube’s safe current capacity. So, if a tube is safe running from 0 milliamps to 10 milliamps, then we want to set it at 5 mA. From this midpoint, the tube can conduct more or less current in response to our guitar signal. The British call tubes valves, and it makes a lot of sense when thinking about bias. Consider a garden hose. When the spigot is closed, no water flows. When you fully open the spigot, there is maximum flow. When you just open the spigot or valve enough so half the water flows, you can now mimic the less-and-more signal flow of the guitar by twisting the spigot back and forth. Similarly, electrical guitar signals increase and decrease tubes’ current flow. The key is that small changes at the tube input create bigger flow changes at the tube output, aka gain! For us to take the next step forward, we need to look back to 1827. Did Georg Ohm know he was helping plug Malcolm’s SG into something loud and wonderful? I like to think he did. Look at his eyes in a portrait—they’re wicked! Ohms Law is voltage = current x resistance (V = IR). So, with basic math we can see how bias comes to be. If a preamp tube was not biased (set to middle range electron flow), it would draw as much current as possible and probably burn out. A preamp tube like a 12AX7 has three parts: the grid, where the guitar signal goes in; the plate, where the guitar signal/electrons come out; and the cathode, which connects the tube to ground, where the electrons live. The electrons flow from ground up to the cathode and onto the plate and back to the filter caps/power supply. If a preamp tube was not biased (set to middle range electron flow), it would draw as much current as possible and probably burn out. A typical 12AX7 likes about 1 mA of idle current as its middle ready-to-work happy spot. Different tube types have different current capacities, all the way up to large power tubes that are fine with 100 times more current then a preamp tube. The electrons are negatively charged, and the plate has a large positive voltage that attracts those electrons in the worst way! They want to get there bad. But for the tube to be a good valve, we need to put the brakes on and let only some of those eager electrons through. It turns out that if the grid is negative with respect to the cathode, some of the negatively charged electrons will be repelled by the grid and will be shielded from the attractive force of the positive plate. Essentially, opposites attract and like charges repel. Got that? Okay. Now, take a look at the drawing (Fig. 1). If 1 mA flows through the 1.5k cathode resistor, this will create a voltage over the resistor following Ohms Law. So, as we see at the top of the drawing and in its diagram, .001 amps x 1500 ohms = 1.5 volts. So a typical 12AX7 likes a bias of 1.5 volts. But wait. We want the grid to be negative with respect to the cathode, which is at +1.5V. To get this relationship, we need another part: the grid leak resistor. This large resistor is there so the grid has a reference to ground, where the cathode is also connected. There is no current flow through the grid leak resistor, so there is no voltage change, so the grid stays at 0 volts—just like the ground point. And the cathode enjoys its +1.5V. Eureka! Now the grid is at 0 V and the cathode at +1.5V, so the grid is 1.5V less (negative) with respect to the cathode. To the tube, this is the same as the cathode at 0 and the grid at -1.5V. We have achieved our bias! All tube types are different, but for your average 12AX7, a bias of 1.5V yields a 1 mA current flow (in general—please). If you are into this stuff, get those books and make some amps! Read More Show less Read More Show less
Oral Hygiene The Importance of Oral Hygiene Dental Room Did you know that more adults loose teeth to periodontal disease than to decay? Nearly 75% of adults are affected by periodontal disease at some time in their lives. Brushing and flossing daily are the best methods of preventing gum disease and cavities. The American Dental Association recommends a soft bristle toothbrush along with plain cavity control toothpaste and floss to clean the teeth. The most important time to clean the teeth thoroughly is at night before going to bed. This prevents plaque from sitting on the teeth all night. Plaque is a biofilm that contains the bacteria that causes both decay and periodontal disease. It is formed constantly on the teeth after eating a meal. It can be removed by brushing and flossing the teeth within 24-48 hours after its formation. If left on the teeth for an extended period of time, it forms calculus otherwise known as tartar on the teeth. Professional scaling and cleaning is then needed to remove tartar. Plaque and tartar cause inflammation of the gum tissue which leads to gingivitis and periodontal disease. How to Brush The best way to brush the teeth is to position the bristles of the brush at a 45 degree angle to the gum line and use a gentle circular motion. Apply light pressure when brushing. Make sure to massage the gums as you go along, being careful not to scrub the gums and cause recession. A great way to avoid scrubbing is to hold the toothbrush with just the thumb and pointer finger while brushing. This prevents heavy pressure of the brush on the teeth and gums. In the back of the mouth, it is helpful to close slightly allowing the muscles of the face to relax and give more room for the head of the toothbrush to clean. To clean the inside surfaces of the upper and lower front teeth, hold the brush vertically and make several back-and-forth strokes. For cleaning the biting surfaces of the back teeth, position the brush perpendicular to the chewing surfaces and use short strokes. Try to watch in the mirror while brushing to ensure you are cleaning each surface of the tooth and also the gums. Rinse thoroughly when finishing to get rid of all the plaque that was loosened from the teeth. Dr. Molina does not normally recommend the use of Antiseptic mouth wash due to the high alcohol content. This has a tendency to dry the mouth over time and halt the production of saliva. The less saliva that is present, the more food sticks to the teeth. The more the food that stays on the teeth, the more cavities we tend to see. How to Floss Flossing is the best way to combat periodontal disease. It allows for the removal of the plaque that is in between the teeth and cannot be removed by the toothbrush alone. Developing the proper flossing technique takes time and practice, but is necessary for effective plaque removal and periodontal health. First, get a piece of floss that is about 20 inches long. The waxed floss will glide more easily than the unwaxed floss if the teeth have tight contacts. Wrap the floss around both middle fingers and use the pointer fingers and light pressure to shimmy the floss between the teeth. You should avoid snapping the floss as that can injure the gums. Wrap the floss making a C-shape around each tooth then bring the floss out. If the floss gets plaque on it, rinse it off or wind the floss until you get to a clean area. Repeat until all the teeth have been flossed. Managing Sensitive Teeth Sensitivity of the teeth can be caused by gum recession, cavities or can be experienced after dental treatment. One way to alleviate sensitivity is to use a high fluoride mouth rinse like ACT Fluoride Rinse. Fluoride has the ability, when consistently applied to the teeth, to desensitize and strengthen the enamel. Using plain cavity control toothpaste can also reduce sensitivity. The new whitening toothpastes have very large abrasive particles that can wear the enamel away. Once it is worn, it cannot be replaced. This results in thermal and sweet sensitivity. Having regular 6 month dental exams and cleanings can also prevent sensitivity by revealing cavities while they are still in a manageable state. Sometimes, when cavities are left to grow and large fillings have to be placed, patients can experience sensitivity. Usually this sensitivity is temporary and resolved within a few weeks. Whitening can also cause sensitivity which is completely reversible. When the whitening agent is discontinued, the sensitivity goes away almost immediately. Note: Whitening is a safe and effective procedure and used regularly to improve esthetics. Oral Hygiene Products With the overwhelming number if dental products on the market, choosing dental products can be difficult. Our office recommends electric toothbrushes and sells the Oral B Genius. It is a great tool for the sonic removal of plaque. The combination of spinning, pulsing, and vibration has proven superior to manual brushing. We also recommend other electric brushes such as the Sonicare, the Braun, and the Ultreo but we do not sell them in the office. All four brushes achieve excellent oral hygiene on a daily basis and over the long term. When using manual brushes, the soft bristles are the only ones that should be used. Medium and hard brushes will significantly damage the gums and soft tissue due to their stiffness and inflexibility. Toothpaste comes in all brands and flavors. The ideal toothpaste has fluoride and does not have any whitening agents or mouth rinse. The fluoride strengthens the tooth on a structural and molecular level, making enamel more dense and strong. The abrasive particles in whitening agents cause tooth abrasion which can be seen mostly at the gumline. This can be a source of sensitivity and also a food trap. Floss is available in waxed and unwaxed versions and both are good for plaque removal when good technique is used. For patients with gaps or small spaces between the teeth, tape (a thicker form of floss) is ideal. Floss threaders are important for cleaning bridges and under retainers. They are located in the dental aisle near the floss.
Study Guide The Jungle Book Revenge By Rudyard Kipling You've heard the phrase an eye for an eye, and a tooth for a tooth before. In the jungle, you have to add a fang for a fang or a hide for a hide or a thirty-foot-long recently shed snakeskin for a thirty-foot-long recently shed snakeskin to the mix. Animals take their revenge seriously in The Jungle Book. With all that Law of the Jungle talk, you'd think they'd be more civil, but mostly the Law encourages sweet, sweet revenge. Watch your back. Questions About Revenge 1. Why is Mowgli expected to kill Shere Khan? What does Shere Khan have against Mowgli? 2. Why does Kaa hate the Bandar-log? What does he do to exact his revenge against them? 3. Does Mowgli take revenge on the wolves for kicking him out of the Pack? Or the humans for kicking him out of their village? Why or why not? 4. Why doesn't Kala Nag ever try to take revenge against the men who have captured him? Chew on This Revenge is a dish best served cold, which is why Mowgli bides his time before putting an end to Shere Khan—when the not-so-vicious tiger is napping. If Shere Khan had gone away, Mowgli never would have tried to kill him. Mowgli's revenge kill of Shere Khan is more a result of the tiger bothering the wolves than the tiger actually being a danger to Mowgli. This is a premium product Tired of ads? Join today and never see them again. Please Wait...
First Baby Born Using 'Three Parent' Technique A healthy baby boy has been born after he was conceived using a "three-parent" technique to manipulate his DNA, doctors said Tuesday (Sept 27, 2016). Fertility specialists from New York, Cincinnati and Britain did the experimental treatment in Mexico. It has not been approved in the U.S. It has been approved in Britain. It's not the first so-called three-parent baby, but it's the first time modern techniques have resulted in a healthy birth, the doctors said. The mother carries genetic defects known to cause Leigh syndrome, an incurable, progressive disorder in which brain cells gradually die off, causing a range of symptoms. The treatment, in which a second woman's DNA is used to replace the faulty genetic material, is aimed at producing a child free of the disease. "She had four pregnancy losses and two deceased children at age 8 months and 6 years from Leigh syndrome," Dr. John Zhang of New Hope Fertility Center in New York and Guadalajara and colleagues at Cincinnati Children's Hospital and Reprogenetics in Britain and in Livingston, New Jersey wrote. The doctors have given a bare-bones rundown of the experiment in a brief written summary submitted to a meeting of the American Society of Reproductive Medicine scheduled for mid-October. One ethics group questioned the decision to do the experiment in Mexico. "This fertility doctor openly acknowledged that he went to Mexico where `there are no rules' in order to evade ongoing review processes and existing regulations in the United States," said Marcy Darnovsky, executive director of the Center for Genetics and Society. "No researcher or doctor has the right to flout agreed-upon rules and make up their own. This is an irresponsible and unethical act, and sets a dangerous precedent." The clinic declined any further comment and declined to identify the mother. Leigh syndrome or Leigh's disease is a disorder caused by defects in structures inside a cell called mitochondria. Zhang's team used a technique called spindle nuclear transfer to take the patient's DNA out of an egg cell and put it into a healthy egg donated by another woman, whose own DNA had been scraped out. Sperm was used to fertilize the egg using intracytoplasmic sperm injection (ICSI), a standard in vitro fertilization (IVF) technique. This method uses some cloning technology, and if everything goes as planned, the resulting embryo has DNA from three parents - the mother, the sperm donor and a bit from the egg donor. That's because not all your DNA is in the nucleus of the cell. Some is in the mitochondria. This mitochondrial DNA is passed down virtually unchanged from mother to child. The research team got four very early embryos growing using this technique and one was healthy and normal. It was implanted into the 36-year-old mother and developed normally. The baby boy was born at 37 weeks gestation, which is slightly premature, the team said. "The baby is currently 3 months old and doing well," they wrote. The team said they have found small amounts of the donor woman's mitochondrial DNA throughout the baby's body. Mitochondria help provide energy inside a cell. Mitochondrial DNA accounts for less than 1 percent of a person's genetic traits, but these functions are important to health. Damaged mitochondria are responsible for more than 200 different diseases.They include Alper's disease, which causes seizures, dementia and blindness, and Leigh syndrome. There's no known cure for any of these conditions. "This work represents an important advancement in reproductive medicine," said Dr. Owen Davis, president of the American Society for Reproductive Medicine. "Mitochondrial disease has been an important, and challenging problem. If subsequent research determines the safety and efficacy of spindle nuclear transfer, we look forward to it being an option for patients who risk transmitting mitochondrial diseases to their children," Davis added in a statement. Earlier this year, an expert panel said experimenting with three-parent babies is OK if it is carefully monitored and regulated. The National Academy of Medicine panel said these "three-parent" babies could be a way for people with a high risk of rare, devastating genetic diseases to have healthy children that are genetically their own, but said the Food and Drug Administration should carefully regulate such experiments. And at first, the panel advised, only male embryos should be made this way until it's clear that dangerous mutations would not be passed down to future generations. Babies conceived using these fertility techniques could have what are known as germline changes, which can be passed down from generation to generation and open the door to a lab mistake potentially causing problems in a person born decades later. Fertility specialist Dr. Jamie Grifo of New York University was one of the first to try mitochondrial IVF techniques in the 1990s to help older women conceive healthy children using healthy eggs donated by younger women, but the FDA asked him to stop. Since then, others have tried. About two dozen children were born using various approaches, the FDA says, and at least three of them had developmental disorders including Turner syndrome, a genetic condition in which a female doesn't have the usual pair of two X chromosomes. But the FDA says it's hard to tell whether the IVF technique is what caused the problems. The babies and children will have to be followed for years to see if they develop genetic diseases, experts say. Source: NBC News Featured Posts
Is Chewing Gum Bad For Teeth? by Williams, Daily & Frazier on Jul 22, 2021 7:45:00 AM Is chewing gum bad for your teeth? Dentists hear that question a lot, and the answer is – it depends. Chewing gum has its drawbacks, but it also has some benefits that make gum not so bad after all. What’s more, a number of factors can influence just how good or bad chewing gum is for your teeth. When it comes to gum, for example, type matters: what you chew is almost as important as whether you chew. Gum that contains sugar bathes teeth in a sticky sweetness that bacteria love to eat. However, as bacteria feed on the sugar in gum, they produce acid that can erode tooth enamel; this increases your chances of getting a cavity. Sugar-free Gum Sugar-free gum, on the other hand, does not feed the bacteria that cause cavities. In fact, science says chewing sugar-free gum can actually help prevent cavities. As you chew sugar-free gum, you mash it between your teeth, which forces the gum into the little nooks and crannies where your toothbrush and floss cannot reach. The gum sticks to food debris and pulls it out of the deep spaces between your teeth. Sugar-free gum also cleans your teeth by stimulating saliva production inside your mouth by as much as ten times. Saliva helps rinse off and neutralize the acids that are harmful to tooth enamel. Saliva also washes away food particles. Xylitol in Chewing Gum Your gum gets double points if it contains xylitol, which is a sugar alcohol that is close to the sweetness of sugar, so your chewing gum is as delicious as always. Xylitol inhibits the growth of Streptococcus mutants, one of the oral bacteria that cause cavities, but does it in a surprising way. These bacteria cannot use xylitol as fuel, but they do ingest it. The xylitol then prevents the bacteria from absorbing other sugars, which means the bacteria cannot get the energy they need to live, so they die. In other words, chewing gum with xylitol starves the bad bacteria in your mouth before they can cause tooth decay. In the presence of xylitol, the bacteria also lose their ability to adhere to the tooth, which protects the tooth enamel even more. When Not to Chew Knowing when to chew gum is almost as important as knowing what gum to chew. Chewing gum may be bad for you if you have jaw pain that worsens when you chew gum. Jaw pain may be from temporomandibular disease (TMD), which is a condition that affects the temporomandibular joint where your jaw attaches to your skull. Chewing gum can worsen this pain. Bottom Line While chewing gum does have its advantages – especially if you chew sugar-free gum with xylitol – it is not a replacement for brushing and flossing. Instead, chewing gum is a good way to temporarily clean your mouth immediately after a meal, when the food and debris in your mouth are still fresh and haven’t hardened. For more information about the benefits and drawbacks of chewing gum, visit Healthline. To make an appointment, or if you want to know more about Williams, Daily, and Frazier, visit our website. Leave a Comment
CASE expressions in Oracle SQL CASE expressions are the standard way to implement IF … THEN … ELSE logic in SQL statements. Oracle provides the DECODE function, which does something similar and is widely used by Oracle developers, but CASE expressions are actually more flexible and often make statements more readable. There are 2 types of CASE expressions: Simple and Searched Simple CASE Expressions Simple CASE expressions are those in which you provide an expression that must be compared with values or expressions provided for each case. For those who have worked with Java or C, it works almost exactly like the SWITCH statement in those languages. Here is an example: SELECT country_name, CASE region_id WHEN 1 THEN 'Europe' WHEN 2 THEN 'Americas' WHEN 3 THEN 'Asia' WHEN 4 THEN 'Middle East and Africa' ELSE 'Undefined' END Region FROM hr.countries; In this query region_id is the expression that is going to be compared with all the cases provided. If region_id is equal to 1 then the whole CASE expression returns ‘Europe’. If region_id is equal to 2, then it returns ‘Americas’, etc. If none of the values provided is equal to region_id, then the expression in the ‘ELSE’ case is returned, in this case, ‘Undefined’. Notice that no comparison operator was provided, and that is because in simple CASE expressions the comparison is always performed using the equality operator. In Oracle the system starts evaluating the cases in order, and it stops when a match is found. Searched CASE Expressions Now, in searched CASE expressions, instead of providing an expression to be compared to the other expressions provided, you can have more complex and independent conditions, which makes CASE expressions a lot more flexible than the DECODE function. In the article about the power of the DECODE function I used this example: Suppose we have a list of products that can or cannot be sold depending on certain conditions. A product is saleable if it has been verified (column verified=’Y’) or if it is not expired and is in stock. How do we get a list of products with a column that tells us if it can be sold? It can be solved by nesting 3 calls to the DECODE function, and thus it can also be solved by nesting simple CASE expressions, but using a searched CASE expression makes it more easy to read and understand: Instead of this: DECODE(verified,'Y','YES', -- If verified=Y it is saleable DECODE(SIGN(sysdate-expiration_date),1, -- If not verified but not expired, we need to check stock DECODE(in_stock,'Y','YES','NO'),'NO')) AS saleable -- If not expired and in stock, then is saleable otherwise no ORDER BY product_id; I can do something like this: SELECT product_id, product_name, WHEN verified = 'Y' OR (expiration_date > sysdate AND in_stock = 'Y') THEN 'YES' ELSE 'NO' END AS saleable ORDER BY product_id; As you can see, I’m comparing very different things in the conditions, and I can have several sub-conditions connected by ANDs and ORs, and I don’t need to nest functions. I’m sure you would agree that understanding the logic for a product to be saleable is a lot easier by looking at this CASE expression than with the DECODE function. I only have one case here, but I could have any number of cases with completely different and unrelated conditions, and, in case you are wondering, yes, you can also nest CASE expressions. And as with simple CASE expressions, cases are evaluated in order here too, and the evaluation ends when the first case condition evaluates to true. Oracle SQL Video Course Discount Offer What else can I do with them? You can also use CASE expressions with aggregate functions, as in this example in which I’m including the bonus column in the sum when the bonus_active column is set to ‘Y’: SELECT department_id, SUM( CASE bonus_active WHEN 'Y' THEN salary + bonus ELSE salary END) earns FROM employees GROUP BY department_id; And there are some cool things you can do with CASE expressions outside the SELECT list. For example, you can use it in the HAVING clause: SELECT region_id, COUNT( * ) FROM my_countries GROUP BY region_id CASE region_id WHEN 1 THEN COUNT( * ) ELSE COUNT( nullable_column ) ) > 5; And you can even use it to order the results conditionally: SELECT country_name, region_id, CASE region_id WHEN 1 THEN 'Europe' WHEN 2 THEN 'Americas' WHEN 2 THEN 'Asia' WHEN 4 THEN 'Middle East and Africa' ELSE 'Undefined' END Region FROM hr.countries CASE region_id WHEN 1 THEN SUBSTR(country_name, 1, 1) ELSE SUBSTR(country_name, 2, 1) Here if region_id is 1 I’m ordering by the first letter of the country name, otherwise I order by the second letter. Pretty cool, isn’t? In what other uncommon ways have you used or seen CASE expressions? Opt In Image Don't want to miss any Oracle SQL tips? Subscribe to be informed about new posts, tips and more awesome things. 0 0 votes Article Rating I've been working with Oracle databases on a daily basis for the last 18 years. newest most voted Inline Feedbacks View all comments
The area of modern technology is the collection of skills and also processes used to create goods and also services. These methods can be divided into three classifications: typical, advanced, and also arising. Each group concentrates on details objectives and also purposes that can be accomplished through the application of technology. This short article discusses the interpretations of these groups. You can discover more regarding the various sorts of modern technology and exactly how they connect to each other. To get a far better understanding of technology, take a look at our definitions below. Necessarily, modern technology refers to the application of the knowledge base to the human atmosphere. While lots of people refer to used science as the technique of a clinical concept, this is too narrow a definition. Words “innovation” has a broader range. It includes whatever from fundamental tools and materials to innovative devices and also interactions devices. The term is likewise used to define the art of making something. There are a number of subtypes of technology. The most basic kind of innovation is the wheel, which was utilized by Rock Age human beings to move about their environment. Various other innovations consisted of the printing machine as well as the Net, which assisted people communicate with one another in real time. Furthermore, monkeys utilize simple tools as well as apply innovative modern technology. In fact, there are even some varieties that utilize the very same methods, such as dolphin neighborhoods and also crows. This is a listing of one of the most basic as well as essential modern technologies of humankind, as well as you can read about them on the complying with web links: Another kind of technology is called “dealt with modern technology.” This sort of innovation, on the other hand, belongs to chemistry. For instance, fungicides are utilized to deal with germs and also mold. Silicon chips are utilized in several items, and repaired technologies are related to a solitary product. Tough and soft technologies are equally vital in the field of scientific research. They all contribute to the development of a society as well as are important to its development. However while both sort of technologies are various, they have comparable functions. The word modern technology is a complex concept. It consists of all sort of tools, resources, and processes. Its purpose is to improve the lives of people. It is used to improve human efficiency and quality of life. Nonetheless, it is not a neutral term. Some pupils of modern technology do not also want to specify innovation in a purposeful method. They choose to use terms like “postmodern” to define it. So, words can have several definitions in a society. The term “ideal technology” is a basic term that includes a range of different sorts of modern technology. Relying on its context, it can describe a particular product things, system, or process. Simply put, it can be a complex combination of principles. In some cases, technology has to do with a certain use a product. In various other instances, it is about using a product. For example, maybe made use of in a medical setup. There are various meanings of modern technology. Some of them are software and hardware. Various other types of innovation are much more intricate, such as the use of rules. Jacques Ellul’s interpretation of technology states it is the organized use a method to create something. Various other concepts, on the other hand, state that innovation is a collection of techniques and also skills that are developed to boost a particular process. As an example, a tool can be considered a tool that manipulates the habits of an individual. Some definitions of modern technology are somewhat unclear. In one of the most basic sense, modern technology is anything that enhances the problem of the human. A few of these terms are not only related to computer system usage, yet may also consist of older teaching aids. In other instances, technological systems might be defined as the process of producing a product. This consists of the advancement of brand-new innovations and the renovation of products. The technical process of the process itself is a basic part of the society. The definition of technology is often uncertain. There are numerous meanings of innovation, however it is usually based on the suggestion of modern technology itself. The term “innovation” describes a selection of technological methods. There are many different types of modern technology, however some are better than others. For instance, an invention could be a simple gadget made use of to boost the problem of the bordering populace. A tool that can enhancing the health of individuals using it might be a robotic. Moreover, technology likewise has an abundant background. Its interpretations vary from computer system software to the history of human civilization. In ancient times, the term technology referred to the modern. Its definition is more varied than one might assume. Its applications are huge and also differed. In addition, it is constantly evolving. Its uses consist of computer systems and video games, clinical devices, and also instructional help. These developments have made our lives simpler and also extra lasting. Another interpretation of innovation describes the idea of the system. It can be either hardware or software program. It can include the use of guidelines. As an example, a technical system may be classified as a not natural or organic system. Its applications include sex manuals, tools, as well as microchips. And it might also be a mix of both. Its effects influence the lives of individuals and also the environment. As well as it is not limited to equipment, however it can also influence the way we live. The most usual meaning of innovation is the expertise of just how to do something. It can be easy and also straight, or it can include complicated systems. One of the most fundamental type of innovation is the advancement of basic devices. Later, it can consist of the advancement of computer systems, ships, and also ships. Nonetheless, a technological system is a means of organizing systems. It can even encompass methods and also structures. A few of these technologies are used in various industries, such as medical care, manufacturing, and information. The concept of modern technology brings into play used scientific research as well as design. The application of these tools is important to our lives. In some cultures, modern technology has changed faith. Similarly, it has eliminated polio. The growth of computer systems and also the web has made life extra reliable. Consequently, individuals can currently gain more money. Ultimately, all of the world’s people will certainly appreciate the exact same standard of life. The next phase of advancement will be the next modern technology.
The Lost Leonardo London, England, 2008. Some of the most distinguished experts on the work of Italian artist Leonardo da Vinci (1452-1519) gather at the National Gallery to examine a painting known as Salvator Mundi; an event that turns out to be the first act of one of the most fascinating stories in the history of art.
6 Steps for Writing a Speech 6 Steps for Writing a Speech Do you have to give a speech publicly any time soon? If you do, you need to know how speeches that are given publicly differ from presentations that will be viewed online. You need to know how to write a good public speaking speech before you give your speech. One difference between speeches written to be given publicly and presentations written to be viewed online is that the former is given before a live audience at specified time and place. The later may be shared, viewed, and reviewed at the reader’s convenience. The steps for writing a speech for public speaking are for similar to the steps for writing a presentation in general. However, at each stage of the writing process you need to keep your audience in mind. 1. Research Your Audience Whenever you do any type of writing you need to consider who you are trying to reach with your writing. Speech writing is no different. In general, the more you know about your target audience the more effective your writing will be in reaching them. In the example above, you know that your audience is going to be the other members of the Chamber of Commerce—who are likely to be small business owners just like you are. Once you’ve defined your audience, you can gear your speech towards them. To do this, ask yourself questions like: What does this audience need? What problem can I solve for them? Is there anything else I need to consider about my listeners? 2. Select a Topic • Identify the nature of the speaking event and purpose behind it; • Know your audience; • Think of your personal interests, knowledge and experiences; • Identify any relevant latest news; • Brainstorm any possible ideas; • Make a short list of possible topics; • Make a decision and commit to it. 3. Research Your Topic Some public speaking situations may require that that you cover a topic that you are less familiar with. You are free to use any Google-source and articles to find a reliable data. 4. Write Your Speech Once you’ve completed the steps above, you’re ready to write your speech. Here are some basic speech writing tips: Begin with an outline. To create a speech your audience will remember, you’ve got to be organized. An outline is one of the best ways to organize your thoughts. Use a conversational tone. Write your speech the way you would normally talk. Work in some small talk or humor, if appropriate. Use the speaker notes. Typically, speaker notes are not seen by the audience. So, this is a good place to put reminders to yourself. Be specific. It’s better to give examples or statistics to support a point than it is to make a vague statement. Use short sentences. It’s likely you’re not going to give your speech word for word anyway. Shorter sentences will be easier to remember. 5. Select a Presentation Tool For most presentations, you’ll want to use a professional presentation tool such as PowerPoint, Google Slides, or a similar package. A presentation tool allows you to add visual interest to your public speaking speech. Many of them allow you to add video or audio to further engage your audience. 6. How to Make a Public Speech Now that you’ve completed all of the steps above, you’re ready to give your speech. Before you give your speech publicly, though, there are a few things you should remember: Don’t read your speech. If you can, memorize your speech. If you can’t, it’s okay to use note cards or even your outline—but don’t read those either. Just refer to them if you get stuck. Practice. Not only will practice help you get more comfortable with your speech, it’ll will also help you determine how your speech fits into the time slot you’ve been allotted. Do use visual aids. Of course, your presentation template adds a visual element to your public speech, but if other visual aids work with your presentation they can be helpful as well. Dress comfortably, but professionally. The key is to fit in. If you’re not sure how others at your meeting will be dressed, contact the organizer and ask. Speak and stand naturally. It’s normal to be a little nervous, but try to act as naturally as you can. Even if you make a mistake, keep going. Your audience probably won’t even notice. Be enthusiastic. Excitement is contagious. If you’re excited about your topic, your audience will likely be excited too. You’ve just learned how to write a good public speaking speech. Now, it’s up to you to create the best speech for your needs. Good luck! Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s Start a Blog at WordPress.com. Up ↑ Create your website with WordPress.com Get started %d bloggers like this:
A man was reinfected with coronavirus after recovery, so what does this mean for immunity? A 33-year old man was found to have a second SARS-CoV-2 infection some four and a half months after he was diagnosed with his first, from which he recovered. The man, who showed no symptoms, was diagnosed when he returned to Hong Kong after a trip to Spain. There is no published peer-review report on this man—only a press release from the University of Hong Kong—although reports say the work will be published in the journal Clinical Infectious Diseases. Here I address some questions raised by the current news reports. Why wasn’t the man immune to reinfection? Immunity to endemic coronaviruses—those that cause symptoms of the common cold – is relatively short-lived, with reinfections occurring even within the same season. So it isn’t completely surprising that reinfection with SARS-CoV-2, the virus that causes COVID-19, might be possible. Immunity is complex and involves multiple mechanisms in the body. That includes the generation of antibodies—through what’s known as the adaptive immune response—and through the actions of T-cells, which can help to educate the immune system and to specifically eliminate virus-infected cells. However, researchers around the world are still learning about immunity to this virus and so can’t say for sure, based on this one case, whether reinfection will be a cause for broad concern. A STAT News article reports that the genetic make up of the sequenced virus from the patient’s second infection had 24 nucleotides—building blocks of the virus’s RNA genome—that differed from the SARS-CoV-2 isolate that infected him the first time. The man was asymptomatic—what does that mean? What can we say about reinfection based on this one case? Source: Read Full Article
How genetics influence how much you enjoy cannabis Published Feb 13, 2019 01:22 p.m. ET Marijuana has the amazing ability to influence each and every individual differently. This is why one person may find a particular strain potent or harsh whereas the next person who tried the same bud may have a somewhat different experience. A specific marijuana strain could make you want to run for miles while making your friend feel lazy and couch-bound. Every aspect of a user’s experience is unique to their bodies reaction to ingesting it. Anyone who has had some experience smoking in a group can attest to these sorts of varied responses, but most people don’t know why it happens. Cannabis genetics research There have been some studies on the relationship between cannabis and genetics. Cannabis, when ingested, will interact with different receptors and mechanisms is the user’s brain. The most notable of them are the CB1 receptor and CB2 receptor which work to help the body absorb and process the cannabinoids like THC, terpenes, or CBD. The receptors are only one kind of protein that the human body creates inside of our cells. Much like many other proteins that are also produced by the human body the instructions for how to create them is stored long term within our DNA. Human genomes tend to be relatively similar across all other human’s genes, mutations and malformations are incredibly common. Abnormalities in the CB1 receptor were first discovered almost two decades ago leading scientists on a path to the discovery of nine different recipes for this gene in humans. What that means is that every human on earth contains at least nine different variations of the CB1 receptor protein. Genetic effects of marijuana Not all genes are created as a part of the endocannabinoid system. Most mutations are not caused by the use of cannabis, but all of them can affect how an individual feels after ingesting marijuana. When a person uses cannabis, it is the THC which is the cannabinoid that best binds and reacts to CB1 receptors and is also the chemical compound that is responsible for the plant’s psychoactive and mind-altering effects for a user. These are just two of the most influential gene factors and how they can affect a person's entire experience with the drug. CB1 Protein In very rare instances an abnormality in the CB1 protein can make a person more susceptible to diseases such as Crohn's Disease, addiction, or anorexia. In other situations, a mutation could change a person’s sensitivity to any molecules that try to bind to it like THC or CBD. This is why one person’s sensitivity or experience with using a particular strain could be either heightened or hindered in comparison to anyone else who ingested the same product.   Akt Gene Abnormalities or mutations that are found in the Akt gene can also have negative consequences. The gene Aktis responsible for the bodies ability to keep cells alive and slow down tissue growth. People who harbor this mutation are at greaterrisk of errors in judgment and difficulty with basic motor functioning skills after consuming cannabis.   Genetic effects of marijuana through liver absorption One of the most influential genetic factors in how a person is affected by marijuana is based on how the plant is consumed. When it is ingested through oral methods including edibles, tinctures, or drops the cannabinoids are first processed through the liver before they are distributed throughout the body and then the brain. A human's liver contains a large number of enzymes which are another form of protein that is both encoded and created by our individual DNA. One of those enzymes is responsible for converting delta 9 THC into 11 hydroxy THC. This essentially makes the THC more potent as the 11 hydroxy THC is twice as efficient at interesting with CB1 receptors than delta 9 THC. While our genes certainly do make up a large part of what we are and how we experience things like cannabis, our gene blueprints are shapeable and often changed through our entire lives. Many abnormalities may be found right from birth, but they are frequently switched on or off from other influences and interactions we have every single day. One of the most significant benefits we hope to see from this sort of genetic understanding of our bodies interaction with marijuana and cannabinoids would be a way to test for gene mutations to narrow down which strains could work best for you. Related posts
Unix systems have for a long time offered a way for users to store their user name and password for remote FTP servers. ftp clients have supported this for decades and this way allowed users to quickly login to known servers without manually having to reenter the credentials each time. The .netrc file is typically stored in a user's home directory. (On Windows, curl will look for it with the name _netrc). This being a widespread and well used concept, curl also supports it—if you ask it to. curl does not, however, limit this feature to FTP, but can get credentials for machines for any protocol with this. See further below for how. The .netrc file format The .netrc file format is simple: you specify lines with a machine name and follow that with lines for the login and password that are associated with that machine. machine name Identifies a remote machine name. curl searches the .netrc file for a machine token that matches the remote machine specified in the URL. Once a match is made, the subsequent .netrc tokens are processed, stopping when the end of file is reached or another machine is encountered. This is the same as machine name except that default matches any name. There can be only one default token, and it must be after all machine tokens. To provide a default anonymous login for hosts that are not otherwise matched, add a line similar to this in the end: default login anonymous password [email protected] login name The user name string for the remote machine. You cannot use a space in the name. password string Supply a password. If this token is present, curl will supply the specified string if the remote server requires a password as part of the login process. Note that if this token is present in the .netrc file you really should make sure the file is not readable by anyone besides the user. You cannot use a space when you enter the password. macdef name Define a macro. This is not supported by curl. In order for the rest of the .netrc to still work fine, curl will properly skip every definition done with macdef that it finds. An example .netrc for the host with a user named 'daniel', using the password 'qwerty' would look like: login daniel password qwerty It can also be written on a single line with the same funtionality: machine login daniel password qwerty User name matching When a URL is provided with a user name and .netrc is used, then curl will try to find the matching password for that machine and login combination. Enable netrc -n, --netrc tells curl to look for and use the .netrc file. --netrc-file [file] is similar to --netrc, except that you also provide the path to the actual file to use. This is useful when you want to provide the information in another directory or with another file name. --netrc-optional is similar to --netrc, but this option makes the .netrc usage optional and not mandatory as the --netrc option. Last modified 15d ago Export as PDF Copy link Edit on GitHub
What is a quant fund? What is a quant fund or a quantitative fund? A quant fund is an investment fund that utilizes quantitative techniques to invest in the financial markets. This includes methods like statistical and mathematical analysis of securities, as well as computer models that automatically place buy and sell orders. Quant funds, sometimes called quantitative funds, have been on the rise since the success of Renaissance Technologies, a highly successful quant fund founded by Jim Simons. Since then, many quant funds have faced criticism for engaging in speculative trades that are thought to have detrimental effects on the market economy. Answered by Rick Baker | 2019-02-02 | · 19 Quant hedge funds are funds that make money using quantitative trading strategies, such as statistical arbitrage, high-frequency trading, and mathematical valuation models. Some popular quant funds are Two Sigma and Rentech. Both funds have enjoyed unusually high returns compared to their peers. Answered by Steven Johnson | 2019-02-04 | · 2 Quantitative funds use mathematics and computer-based models to make investment and trading decisions. Unlike hedge funds led by human decision-makers, quant funds usually let their models decide when to buy and sell stocks. They perform extensive backtesting to investigate which models are likely to be successful in the future, and rarely do they override the trading signals given by their models. Answered by Jordan Garcia | 2019-02-03 | · 1 Answer this question yourself:
FIU as Text The Nature Preserve at FIU (Photo by JW Bailly CC BY 4.0) This City as Text (CAT) is adapted for a class of the FIU Honors College.  It is designed for a small class section, as an introduction to CAT.  The aim is to foster discourse in the class, discover the campus, and to develop observational skills. Students will form 4 groups of 5 students.  Each group will be assigned one FIU location.  During the course of one hour, the student group must explore the people, architectural spaces, and nature of their respective locations. 00:00-00:15: Orientation 00:15-01:15: Discovery 01:30-02:30: Presentation Protocol for engaging FIU community. Introduce yourself and state that you are participating in an educational assignment. “Hello, my name is X. I am a student here at FIU participating in a learning program today. May I ask you a few questions?” Since the visitor likely answered questions for you, please be open to answering questions they may have about the activity, class, or the Honors College. Students will deliver oral presentations in class. Each member of the group must speak. Groups can supplement presentations with images, but the emphasis should be on personal reflections. FIU Nature Preserve Frost Art Museum Graham Center Green Library Lakes and Public Art Primera Casa Fifth Floor Students should aim to engage a diversity of perspectives in order to form their personal reflection. Try to speak with a student, staff, faculty, and/or administrator. Machonis, Peter A., ed. Shatter the Glassy Stare: Implementing Experiential Learning in Higher Education. Birmingham, AL: NCHC, 2008. ISBN 978-0-9796659-2-9 “As an experiential-learning method, CAT makes students step outside their conventional classroom paradigms, and at no time is it easier to do this than when they are experiencing an alienation from what they know. Outside their ordinary habits of thought, the students respond to the call to figure things out for themselves, using the tools of mapping, listening, and observing.” – Joy Ochs Excerpt from Shatter the Glassy Stare: Strategies: Mapping, Observing, Listening, Reflecting City as Text™ methodology is based on the concept of active or experiential learning. Participants are split up into small groups with an assigned area of the city/place to explore. They report back for a general discussion at the end of their walkabout and exchange their insights with others who have explored other areas of the same city. The idea is that the sum of everyone’s experience is a better view than just one person or one group doing the same exercise. There are four basic strategies used in these exercises: mapping, observing, listening, and reflecting. Mapping: You will want to be able to construct, during and after your explorations, the primary kinds of buildings, points of interest, centers of activity, and transportation routes (by foot, vehicle, or other means). You will want to look for patterns of housing, “traffic” flow, and social activity that may not be apparent on any traditional “map.” Where do people go, how do they get there, and what do they do when they get there? Observing: You will want to look carefully for the unexpected as well as the expected, for the familiar as well as the new. You will want to notice details of architecture, landscaping, social gathering, clothing, possessions, decoration, signage, and advertising. Listening: You will want to talk to as many people as you can and to find out from them what matters to them in their daily lives, what they need, what they enjoy, what bothers them, what they appreciate. Strike up conversations everywhere you go. Ask about such matters as: how expensive it is to live there (dropping by a real estate agency could be enlightening), where to find a cheap meal (or a good one or an expensive one), what the local politics are (try to find a local newspaper), what the history of the place is, what the population is like (age, race, class, profession, etc.), what people do to have a good time. In other words, imagine that you are moving to that location and try to find out everything you would need to learn to survive there. Reflecting: Throughout your explorations, keep in mind that the people you meet, the buildings in which they live and work, the forms of their recreation, their modes of transportation—everything that they are and do—are important components of the environment. They are part of an ecological niche. You want to discover their particular roles in this ecology: how they use it, contribute to it, damage or improve it, and change it. You want to discover not only how, but why they do what they do. Don’t settle for easy answers. Don’t assume you know the answers without doing serious research. Like all good researchers, make sure you are conscious of your own biases and that you investigate them as thoroughly as you investigate the culture you are studying. John William Bailly & Stephanie Sepúlveda 24 November 2016 Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
Does Removing The Ban On Elephant Trophies Help Conservation? Does Removing The Ban On Elephant Trophies Help Conservation? Did Donald Trump lift the ban on trophy hunting? Trump Administration Quietly Decides — Again — To Allow Elephant Trophy Imports. The Trump administration has lifted a ban on importing sport-hunted trophies of elephants from certain African countries, just over three months after President Trump appeared to pause a first attempt to do so amid public uproar. What will happen if elephants go extinct? In short, if elephants were completely eliminated or prevented from roaming freely within a broad ecosystem, these ecosystems will cease to flourish. They will become less diverse and, in some places, will collapse to over-simplified impoverishment. What is the elephant Conservation Act? African Elephant Conservation Act – Declares it to be the policy of the United States to assist in the conservation and protection of the African elephant by supporting and providing financial resources for the conservation programs of the African countries and the Convention on International Trade in Endangered Does Removing The Ban On Elephant Trophies Help Conservation – Related Questions Does trophy hunting really help conservation? Indeed, research on trophy hunting does show that it can produce substantial financial benefits, is likely to be supported by local communities, and can be associated with conservation gains. Does hunting exotic animals help conservation? But for-profit ranches have succeeded in establishing healthy, growing populations financed by hunting. Exotic-game ranches see themselves not as an enemy of wildlife conservation but as an ally, arguing that they contribute a percentage of their profits to conservation efforts. Does trophy hunting help endangered species? Hundreds of thousands of wild mammals, including endangered or threatened species, are slain by trophy hunters each year. Trophy hunters prefer to kill the largest, strongest animals, whose loss causes population declines in lions and leopards, among other species. How does elephant poaching affect the environment? Elephants are poached primarily for ivory, and rhinos for their horns. Poaching threatens many species and can contribute to extinction. The removal or reduction of a keystone species can have negative consequences on its entire ecosystem, affecting many other species of animals and plants as well. How do elephants help the environment? How are people stopping elephant poaching? Direct species protection work includes training and equipping rangers, community scouts, and eco-guards to monitor and protect elephant and rhino populations, deploying dog-and-handler units to track down poachers, helping governments manage protected areas, and conducting wildlife censuses. Who lifted the ban on elephant trophy hunting? Botswana has the world’s largest elephant population, with some 130,000 animals. Is killing elephants legal? Along with other animals, elephants have killed 139 community members since 2010. Elephant hunts are still legal there, but leaving behind the animal’s tusks is a deal-breaker for most big-game enthusiasts. After the 2014 trophy ban, 108 of 189 American hunters canceled their trips. Is it legal to bring elephant ivory into the US? Commercial import of African elephant ivory into the United States is prohibited. Why is elephant conservation important? Elephants help maintain forest and savanna ecosystems for other species and are integrally tied to rich biodiversity. Elephants are important ecosystem engineers. Why do elephants need to be protected? As icons of the continent elephants are tourism magnets, attracting funding that helps protect wilderness areas. They are also keystone species, playing an important role in maintaining the biodiversity of the ecosystems in which they live. What would happen if sharks went extinct? The loss of sharks has led to the decline in coral reefs, seagrass beds and the loss of commercial fisheries. By taking sharks out of the coral reef ecosystem, the larger predatory fish, such as groupers, increase in abundance and feed on the herbivores. What are the consequences of breaking the elephant conservation Act? Any violation of the African Elephant Conservation Act increased from $5,000 to $9,893. Any violation of the Marine Mammal Protection Act increased from $10,000 to $25,000. Knowing violation of the Lacey Act Amendments of 1981 increased from $10,000 to $25,000. Who enforced the elephant conservation Act? (e) Enforcement. The Secretary, the Secretary of the Treasury, and the Secretary of the department in which the CoastGuard is operating shall enforce this part [16 USCS 4221 et seq.] Why is this study so important to elephant conservation efforts quizlet? Why is this study so important to elephant conservation efforts? This research identified African elephant poaching hot spots that can be targeted by law enforcement efforts to prevent future poaching. Elephants are a keystone species and play a pivotal role in the forests and savannas in which they live. Why trophy hunting is not good for conservation? American trophy hunters pay big money to kill animals overseas and import over 126,000 wildlife trophies per year on average. They also do their sport-killing domestically: Bears, bobcats, mountain lions, wolves and other domestic wildlife also fall victim to trophy hunting, damaging natural ecosystems. Does trophy hunting help African conservation? Do safaris help conservation? Some may even include hunting safaris. Ecotourism has both positive and negative effects. It can contribute to conservation, or impact wildlife, or both. Furthermore, income from ecotourism may be used for conservation and local community development projects, but not always. How many animals are killed each year due to trophy hunting? More than 125,000 animals are killed each year for trophies. How much do hunters contribute to conservation? All-together, hunters pay more than $1.6 billion a year for conservation programs. No one gives more than hunters! Every single day U.S. sportsmen contribute $8 million to conservation. Hunting funds conservation AND the economy, generating $38 billion a year in retail spending. Why is elephant poaching a problem? One of the problems associated with poaching male Asian elephants is the creation of serious imbalances in the ration between the sexes. This affects not just the rate of reproduction, but also leads to a decline in the necessary genetic diversity required to ensure healthy populations.
From Nordan Symposia Jump to navigationJump to search b : an unmarried girl or woman 4a : a person who has not had sexual intercourse b : a person who is inexperienced in a usually specified sphere of activity <a virgin in politics> 5: a female animal that has never copulated A virgin (or maiden) originally meant a woman who has never had sexual intercourse. Virginity is the state of being a virgin. It is derived from the Latin virgo, which means "sexually inexperienced woman". As in Latin, the English word is also often used with wider reference, by relaxing the age, gender or sexual criteria. Hence, more mature women can be virgins (The Virgin Queen), men can be virgins, and potential initiates into many fields can be colloquially termed virgins, for example a skydiving "virgin". In the latter usage, virgin simply means uninitiated. By extension from its primary sense, the idea that a virgin has a sexual "blank slate", unchanged by any past intimate connection or experience, leads to the abstraction of unadulterated purity. Hence, virgin can even be used with non-human referents. Unalloyed metal is sometimes described as virgin. Some cocktails can be described as virgin, when lacking the alcoholic admixture. Similarly, olive oil may be called virgin if it contains no refined oil and has an acidity below 2%, or extra-virgin if it comes from a cold pressing with an acidity below 0.08%. Wool, computer systems, and unfertilized gametes can be virgin. Females of various species, by analogy with Homo sapiens, if they have never mated, can also be called virgin. The loss of virginity may call to mind the end of innocence, and the beginning of sexual maturity. In this association "virgin" often references the first instance of a potentially extended series of like events. Just as extra-virgin olive oil is from the first pressing, so a maiden or virgin speech is an incumbent's first address. The same metaphor, using the synonym maiden, is applied to the first or maiden voyage of a ship. In cricket, a maiden over is an over from which no runs were scored. Maiden castles are those with the reputation of never having been captured. Chastity does not imply virginity. Chastity derives from the Latin castitas, meaning "cleanliness" or "purity"—and does not necessarily mean the renunciation of all sexual relations, but rather the temperate sexual behavior of legitimately married spouses, for the purpose of procreation, or the sexual continence of the unmarried.[1]
Is hockey ball hard? A Field Hockey Ball is constructed out of solid plastic and is very hard. Sometimes, it also has a core made out of cork. A Field Hockey Ball for outdoor use is generally dimpled to have a consistent speed while playing on turf or wet surfaces. Which sport has the hardest ball? Jai Alai – 302 km/h. Jai Alai (aka pelota) is known as the most lethal ball in sports. It is three-quarters the size of a baseball and harder than a golf ball. The best in the sport can toss the pelota at speeds greater than 300 km/h. Why are hockey balls so hard? Most field hockey balls are made from a tough plastic, which is either filled with cork, rubber, or air (source). Both cork and rubber cores make the hockey ball firmer and more rigid, giving the ball more strength and stability. How hard can you hit a hockey ball? The ball used in hockey is the same size as a cricket ball. Covered by a hard plastic coating it’s usually white, although other colours can be used as long as both teams agree. When hit correctly a hockey ball can travel at around 100 mph. IT IS SURPRISING:  Frequent question: Why do they freeze the hockey pucks in the NHL? Which is harder cricket or hockey ball? Sport Ball Weights, Sorted from Lightest to Heaviest sport weight (ounces) weight (grams) Baseball 5 to 5 1⁄4 142 to 149 Lacrosse 5 to 5 1/2 142 to 156 Cricket 5 1/2 to 5 3/4 155.9 to 163.0 Field Hockey 5.5 to 5.7 156 to 163 What is the easiest sport? Easiest Sports To Play – Ranking In 2021 • Ping pong or Table Tennis. • Baseball. • Curling. • Volleyball. • Bowling. • Golf. • Tug of war. • Swimming. What is the most mental sport? It may be surprising to most people that swimming is number 1 in the list of the most mentally challenging sports in the world. Many professional swimmers fall into a 7-day self-sabotage cycle. This is a period where they may doubt themselves and grow continuous stress on themselves. How heavy is a hockey ball? A normal field hockey ball roughly weighs 162g, whereas a small one like the Kookaburra Fury Mini ball weighs around 104g. What is a hockey ball called? A hockey puck is either an open or closed disk used in a variety of sports and games. There are designs made for use on an ice surface, such as in ice hockey, and others for the different variants of floor hockey. They are all designed to serve the same function a ball does in ball games. How tall should a hockey stick be? The butt of the handle should fall between your Adam’s apple and your eyebrows. The general rule of thumb is to have a stick that reaches the tip of your nose — but the trend seems to be toward shorter sticks, reaching the chin or lower. IT IS SURPRISING:  Why are hockey sticks so short? How fast is hockey shot? During a hockey game, a puck can reach the speeds of 100 miles per hour (160 km/h) or more when struck. What sport has the fastest swing speed? While sports like badminton can reach speeds of up to 253 mph and squash players can hit the ball as hard as 176 mph. Men’s field hockey has the fastest swing speed out of any sport, even golf or baseball, at 103 mph (source). Is a softball harder than a baseball? Many people often question if softball is harder than base ball or vise versa. … However, it is scientifically proven that softball is harder than baseball. The speed of pitches, the reaction time for hitters and fielders, and the distance of the field indicates that softball is indeed harder than baseball. Which sport has the biggest ball? A squash ball is just a little smaller than the golf ball. At the other end of the scale, the largest is the basketball. Sport Ball Diameter, Sorted from Smallest to largest. sport Bowling diameter (inches) 8.500 to 8.595 diameter (mm) 215.9 to 218.3 notes this is the maximum size What are the 10 most popular sports in the world? Top 10 Most Popular Participation Sports In The World • Soccer/football. … • Badminton. … • Field Hockey. … • Volleyball. … • Basketball. … • Tennis. … • Cricket. … • Table Tennis.
SPARKS! A STEMteachersNYC and NYC Parks Department partnership. With the twin goals of engaging students in the dynamic research taking place in their local parks, and of bringing the STEM in Parks into classrooms, in the early spring of 2021, six teams of STEMteachersNYC teachers, from across all boroughs and from K-12 public and independent schools, partnered with six teams of researchers and educators from across NYC Parks Department divisions, to collaborate on diverse ways of integrating the outdoor, highly place-based work of NYC Parks with K-12 STEM teaching and learning. Products of the partnership will include a set of free lessons and units that support teachers and schools in bringing students outside and into their local parks, to think critically and engage as stewards with the environment around them. Apply here to join fall or spring cohort Check back soon for FREE alumni project lesson plans! Alumni Projects: Elementary Grades Unit: Water chemistry/Water in NYC. Aim: Where does New York City’s water come from? How does it get to New York City? Location: Carl Schurz Park/Virtual (Manhattan) Description/Outdoor component: Teacher: Juliette Guarino Berg, 4th Grade Science Parks Division: Stormwater, Jeff Botula This year started with pH testing. Students had an interest in water pollution and metal contaminants in drinking water (lead, copper). Focus of the unit will include how NYC tap water can become contaminated – what are contributing factors, watershed study, neighborhood/infrastructure connections, and an engineering design challenge. Students will work on a home water filter design challenge. Comparative study will also include: Green infrastructure (such as rain gardens) filter water coming from parking lots and streets, helping to reduce trash, soil and sediment, fecal bacteria, nitrogen and phosphorous, oil and petroleum products, pesticides, road salt, metals like copper, lead, zinc, arsenic, cadmium etc. Mechanism for some pollutants is physical filtration (trash), dispersion into groundwater (salt), sometimes with the dispersion in combination with adsorption to soils (metals), others it’s actual treatment like nitrogen and phosphorus. All of these would otherwise be continuing straight to the waterways all at once. Middle School Unit: The Environment Aim: Factors Affecting Water Quality (Anthropogenic effects on Aquatic Systems) Location: Prospect Park (Brooklyn) Description/Outdoor component: Teacher team: Kimesha Reid-Grant, Grade 8 Science Parks Division: MS4, Pollutant of Concern, with Alex Sokol and Matthew McEnerney Students began by exploring the 4 spheres of the Earth in this unit, and investigated how these spheres interact. They then zeroed in on the Hydrosphere, and explored some of the many factors that affect the health of the hydrosphere specifically with regards to anthropogenic effects.  • Virtual Classroom Visit: Park representatives visited with the students via Zoom to share their careers and then discussed how they carry out assessments as part of their work day.vParks Dept. representatives provided scholars with a modified version of an assessment tool and had scholars review the questions, and practice who and how they will use this form in the field. • In-Person Field Site Visit: We met at Prospect Park in the afternoon in late April/early May, and toured; the park with the group split in two and led by the Parks Dept. specialists. Students completed their own assessments of the park using the rubric provided and collected water samples from the Prospect Park Lake and tested it for: Nitrates, Phosphate, pH, Temperature. Scholars then diagnosed the park based on their various observations and tests and used this information as the foundation of their Sage Modeler which will model the characteristics of a healthy aquatic system.  Students then composed a letter to the Parks Department outlining some measures to take to ensure the health of our aquatic system. High School Unit: Independent and group research projects. Students participated from grades K-5 and HS. Aim: Using wildlife cams to investigate human wildlife interactions at or near schools in the NYC area. Teacher team: Joan Fei, Science Research:10-12 grades, and Chemistry: 10th grade. The focus of these lessons was on skill building, tools and data related to current and relevant outdoor research taking place in NYC Parks. In collaboration with Sunny Corrao from the Wildlife Stewardship division, three teachers participated from three different locations. Students initiated the project with a pilot that helped them develop the skills to use game cameras and understand the kinds of data that can be collected. In collaboration with Parks, students decided on a Parks location close to their school to set up their cameras and plan an experiment around the human/wildlife interactions in their neighborhood. The three groups then compared the data collected. Parks contributed datasets, guidance on tool use and set up, and additional time with teachers and students to discuss research questions and plan experiments. Data to be collected: Wildlife camera data and field observations. Student Guiding/Project/Research Question(s): How do we design a research study to analyze human-wildlife interactions at our area’s schools? What specific interactions do we want to analyze? How do we implement the study across several schools? As we collect and analyze the data, ask: How can we alter these interactions for safer co-existence? Aim: Designing a Rain Garden for the School Description/Outdoor component: Aside from providing support for students working on stormwater related projects in Science Research, the unit integrates the stormwater problem with chemistry concepts. The goal is to focus on using the engineering design process to solve stormwater problems on campus (located on the Byram river watershed), and engage students in designing a rain garden for the school. There are two NGSS standards for this unit: 1) HS-PS1-1: Plan and conduct an investigation to gather evidence to compare the structure of substances at the bulk scale to infer the strength of electrical forces between particles; 2) HS-PS2-6: Communicate scientific and technical information about why the molecular-level structure is important in the functioning of designed materials. Student Guiding/Project/Research Question(s)The guiding question of the unit: How can differences or modifications to the local environment affect water quality in the Byram River watershed? Students engage in experiments that allow them to determine the best materials for filtering out pollutants of various types in addition to infiltration. At the end of the unit, students create a model (as part of their rain garden proposal) that shows stormwater before, during and after interaction with a rain garden, focusing on both the molecular and bulk level. Aim: Reimagining Public Spaces: Making sustainable and green infrastructure recommendations Teacher team: Diana Lennon (HS) Parks Division: Emerging Technologies/Greenspaces, with Max Lerner Research/Project Part 1: Mapping of a research on local park (Morningside Park) Students conducted background Urban Environment research zoning, smart growth, compact development planning. Connections were made to Sustainable Cities and to UN SDG #11: Sustainable Cities and Communities. After reviewing what makes a great public space students identified a public space in their neighborhood they thought could be made great or greater, drew a map that incorporated their design ideas along with a FlipGrid to share their thinking. Students then identified stakeholders near the chosen community space, from whom to gather input.  Research/Project Part 2: What is the problem you would like to solve about the space that became evident through your mapping and research? Students gathered feedback from communities about redesign of the neighborhood space, considered feasibility and prioritized one change they would like to see. Students worked in small teams to write up recommendations to communicate plans to the Parks Dept or local Community Council.
The Sounds of Endurance by This Land The Scottish missionaries boarded their ship and crowded its deck, smiling and waving to their loved ones, who stood on the dock below. America, with its vast unexplored lands, was their destination. As their way of bidding farewell, the missionaries began singing their favorite hymns in their native Scottish Gaelic. Their friends and family on the dock responded in song, even as the ship departed. They sang until neither party could hear the other, until the ship and the dock faded from sight. The Scottish missionaries embarking to America planned to change the lives of the Indians they’d meet, but they had no idea their traveling songs would plant the seed from which American music would grow. Hear Sterlin Harjo discuss the songs of his youth, his grandfather, and returning home: * * * For most Oklahoma kids, Sunday school is just as important as any other kind of school. For Sterlin Harjo, it was no different. He divided his Sundays between the Muscogee (Creek) and Seminole churches near his home in Holdenville, depending on which grandmother was driving that morning. Some of the Indian churches Harjo attended incorporated the traditions of the Muscogee (Creek) ceremonial grounds into their Baptist or Methodist religion. In nearly all of them, song was (and is) the heart of the service. The Creek hymns stuck with Harjo, especially at the Baptist churches. Song leaders would stand before the congregation and begin singing, usually a slow, mournful hymn, in Creek and a cappella. A few beats later, the congregation would join in. Some held hymnals (most knew the songs by heart), but the books contained only the Creek lyrics to the songs, no music. The songs were never taught, rather learned. The Muscogee people picked them up as a matter of course. The Creek hymns have been part of Harjo’s life for so long he can’t even remember when he first heard one. They were just always there. And for most Muscogee people, the same is true. They may not know the details of where those hymns came from—common belief is they’re handed down from God himself—but they know what’s important: the people, the milestones, and the stories the songs represent. Hugh Foley has studied the history of the Creek hymns. Foley is a music historian and a professor of fine arts at Rogers State University in Claremore. A white man, he began attending Hutche Chuppa Indian Baptist Church 17 years ago. He married a Muscogee woman, and, before they divorced, they had a son. To bring his son closer to the Creek people and their language, Foley found a church that had been founded by one of his son’s ancestors, and they began attending. Foley was quiet at first, listening and observing, careful to tread lightly around those who might consider him an uninvited and unwanted guest. But his fascination grew. He began asking questions. Foley asked if he could bring a tape recorder into one of the services. He wanted to record the words and play it back for them, to see if they could tell him about specific parts. What he got on tape, though, was much more than a word. The services at Hutche Chuppa were filled with singing, and when he played the tapes back, Foley heard something familiar in those hymns. It wasn’t just that he had heard them dozens of times in the years he’d been attending the church; they sounded like the black spirituals sung by slaves in the South. Listen to Hugh Foley talk about becoming the first white member of Hutche Chuppa Indian Baptist Church: * * * Missionaries from the Society in Scotland for Propagating Christian Knowledge were the first to bring the gospel to the Creeks and Seminoles in Alabama and Georgia in the early 1800s. When the Scots landed in America, they set up Christian churches on tribal ground to steer Natives away from their traditional ceremonial worship and, through intermarriage and evangelism, toward the Christian faith. They also brought African slaves, both to the Muscogee Nation and to church. And, with them, the slaves brought their African melodies, immediately influencing the songs sung inside the church—songs that were translated to Muscogee, in an effort to proselytize to the Indians. “From the very beginning of the first decade of the 1800s, you have Scottish-inspired missionaries with their songs, which have taken on African melodies, then put into the Creek language,” Foley explained. For that reason, Foley contends that the Muscogee (Creek) hymns are the first American music. Foley wrote a chapter on the Muscogee (Creek) hymns in his book Oklahoma Music Guide, which chronicles the history of music in the state. In that chapter, he wrote that the Muscogee hymn tradition is “a model for cultural diffusion influence, adaptation, and re-appropriation, evolving into what very well could be the first American music that embraces the three major cultures of the nascent United States: the Anglo-Scot European, the African, and the American Indian… No other American music has those three elements as early as Muscogee (Creek) hymns, which may make the hymns the first truly American music.” Though other Indian tribes adopted Christianity and its customs, including hymns, none of them exhibit the equal influence of those three cultures like the Creek’s hymns do. The Scottish missionaries in Alabama were beginning to make headway in their conversion of the Muscogee people when the upheaval began. While America and Great Britain fought the War of 1812, the Creek Civil War broke out over whether or not to expel white people from their tribal lands and return to their traditional, ceremonial ways of life. The war was fought first between members of the same tribe, who were later joined by U.S. forces. Andrew Jackson led an Army of Choctaw and Cherokee warriors, along with enlisted soldiers and members of the Tennessee militia, on an attack of the Upper Creek people that lasted a year and killed several hundred. The Creek War ended with the battle at Horseshoe Bend and with the signing of the Treaty of Fort Jackson. Andrew Jackson seized all of the Native land involved in the battle, even from the tribes that had been his allies. The Muscogee were confined to a strip of land in what is now Alabama until 1830, when Jackson, now president, signed the Indian Removal Act and America began the process of forcibly removing Indians from their lands. That process took upwards of 10 years and resulted in the loss of thousands of Indian lives. But through it, through the hardship and bloodshed, through rape and death, the songs remained. It’s widely believed Indians sang hymns as they were being led down the Trail of Tears. In his Oklahoma Music Guide, Foley writes: One can relate a double meaning to many hymns that refer to a hard journey, or otherwise represent the removal of Creeks to Indian Territory, while at the same time representing the Christian spiritual journey from this world to heaven. “Cesvs em Vhakvn Pohis” (“Christian Triumph”) refers to land that has been appointed for the singer, and after wickedness has been overcome, the singer will go and see that land. … Of a particularly solemn note, Muscogee people have relayed to the author that “Heleluyvn” (“Hallelujah”) was often sung when a Creek person could go no further on the removal and perished. Not given time to bury the body, the people could only cover the fallen relative in leaves or a blanket, stand in a circle and sing “Heleluyvn,” and then press on. Therefore, the hymns also act as permanent records of that tragic time, although fewer and fewer people seem to know the older songs, their sources, or their purpose today, which is why community singings have started to be organized to pass on that information. * * * Once the Indians made it to Indian Territory, the Scottish missionaries resumed their efforts to Christianize them, establishing churches and continuing the practice of intermarriage. Some Creeks established their own churches. The hymns survived as well and were further developed within the Indian churches. From Foley’s Oklahoma Music Guide: After removal, since slaves could often speak both Muscogee and English, many early interpreters and preachers in Indian Territory were African-Creeks, often preaching to mixed audiences. When all missionaries were ejected from the Creek Nation in 1836 for upsetting the balance of participation in the traditional religion, African-Creeks became the de facto ministers until the missionaries were allowed to resume their work in the Nation in the mid- to late-1840s. … After the Civil War, as slaves of African descent began to separate from their tribal owners and form their own churches, the Muscogee Christians maintained some of the older styles of singing African-American hymns and spirituals, as well as some songs directly from the earlier Scottish missionaries, and some common Southern Baptist hymns, often converted into the language. As a result, as of 2011, rural Muscogee Baptist and Methodist churches feature hymns in Muscogee and English, some of which are descended form the previously mentioned Scottish sources, but also spirituals reflective of 19th century African-American slaves. Interestingly, these hymns are not heard in Oklahoma’s African-American rural churches. Therefore, the rural Muscogee Baptists and Methodists are the stewards of the centuries-old African hymn styles in the United States. Some of those hymns have influenced popular music as well. “Espoketis Omes Kerreskos” is the Muscogee version of the African spiritual “This May Be the Last Time, We Don’t Know.” The Staples Singers adopted the hymn’s melody in their 1955 hit “This May Be the Last Time,” and Keith Richards of The Rolling Stones borrowed the Staples Singers’ version for their 1965 chart-topper, “The Last Time.” The song was borrowed once again by Sterlin Harjo as the title and centerpiece of his new film, a feature-length documentary produced by Matt Leach and This Land Films about the Muscogee (Creek) hymns. Harjo met Foley at Rogers State University, where Foley was showing his Harjo’s 2009 film, Barking Water. Foley pointed out Harjo’s use of the Creek hymns in both that film and his previous feature, Four Sheets to the Wind, and the two got on the subject of the hymns’ history. “Learning their history got me thinking of making a film about the songs,” Harjo said. “When you talk to the Creek people, they talk about the songs in story.” It was important to Harjo to relay not just thehistory of the Creek hymns, but their role in the Muscogee peoples’ lives, so the film is a series of vignettes. The characters, people who attend Indian churches in rural Oklahoma, tell their own stories, and talk about how their songs have helped shape those stories. “It’s a different kind of documentary,” Harjo admitted. “I can’t tell you if the film industry is going to like it very much. I’m not trying to show an outside audience, ‘Hey, look at these Indians singing these songs.’ I want the Creek and Seminole people to realize how special they are. I wanted to really honor the way we talk about the hymns, which is that we tell stories about them. We remember people in connection to the songs. They remind us of people who died, stories we heard, stories that have been passed down, and I wanted to make a film that reflected that. “The film is going to be so dear to the people here and to the people who know these songs. That’s the most important thing to me.” A few weeks after Sterlin, Leach, and their team finished filming the documentary and were preparing it for its debut at the Sundance Film Festival, Harjo went back to the First Indian Baptist Church, the one he’d attended regularly while growing up in Holdenville. The church doesn’t sing as many Creek hymns as it did when Harjo was young, but on that day, the song leader, seeing Harjo in attendance, asked him lead the people in song. He told Harjo he thought his film could inspire the congregation to re-learn the songs of their past. It was the first time Harjo had led a song in church. He began the first few words of his favorite hymn, “Momis Komvke Hvlwe Tvlofvn” (“patiently endure to that heavenly city”), and soon other voices began to melt with his.
Defined Benefit Defined Contribution Insurance Assets PCE and CPI: What’s the Difference? PCE and CPI: What’s the Difference? 2 min 51 sec The Consumer Price Index (CPI) rose by 5.0% year-over-year in May, the biggest jump since 5.4% in August 2008, and core CPI (which excludes food and energy) climbed by 3.8%. The Personal Consumption Expenditures (PCE) Index rose 3.6% (YOY), and core PCE rose 3.1%. Markets are worried about inflation because these numbers are well above the Federal Reserve’s long-run inflation rate objective of 2% (on the core PCE Index). What accounts for the difference between the two inflation measures? Why does the Fed prefer one over the other? And what are some of the issues that may drive future inflation increases? The CPI is released by the Bureau of Labor Statistics and the PCE is issued by the Bureau of Economic Analysis. While both measure inflation based on a basket of goods, there are subtle differences between the indices: • Sources of data: The CPI uses data from household surveys; the PCE uses data from the gross domestic product report and from suppliers. In addition, the PCE measures goods and services bought by all U.S. households and nonprofits. The CPI only accounts for all urban households. • Coverage: The CPI only covers out-of-pocket expenditures on goods and services purchased. It excludes other expenditures that are not paid for directly (e.g., medical care paid for by employer-provided insurance, Medicare, or Medicaid). These are included in the PCE. • Formulas: The CPI formula is more likely to be affected by categories with wide price swings such as computers and gasoline. The PCE calculations smooth out these price swings, which makes the PCE less volatile than the CPI. PCE vs. CPI, YOY Percentage Changes In January 2012, the Federal Reserve stated at its monthly Federal Open Market Committee meeting that it would use the PCE as its primary measure of inflation, preferring it for three primary reasons: • The expenditure weights in the PCE can change as people substitute away from some goods and services toward others. Thus, if the price of bread goes up, people buy less bread, and the PCE uses a new basket of goods that accounts for people buying less bread. The CPI, however, is less fluid in response to changing consumer preferences. • The PCE includes more comprehensive coverage of goods and services. • PCE data can be revised more extensively than the CPI, which can only be adjusted for seasonal factors and only for the previous five years. In summary, the CPI represents a basket of goods and services that a consumer would buy without making substitution changes when prices change. The PCE encompasses a broader range of goods and services than the CPI, from a broader range of buyers. It tries to track what is actually purchased, and represents how consumers change their buying patterns when relative prices change. This leads to smoother price changes in the PCE and typically lower levels of reported inflation, at least as experienced by consumers. Projecting future inflation is tricky in placid times, and trying to do so as the U.S. economy rebounds from pandemic lockdowns (with highly contagious variants potentially complicating the re-opening picture) is even more daunting. One key issue affecting inflation is the labor market, and it is worth paying attention to underlying trends. Wage pressures have been muted so far, but it is reasonable to expect any future pay increases will be reflected in goods and services in time and thus show up in both CPI and PCE. For more detail about the labor market and inflation, please see my colleague Jim Van Heuit’s blog post. Posted by Share on facebook Share on twitter Share on linkedin Related Posts Defined Contribution DOL Shifts Tone on Private Equity in DC Plans Patrick Wisdom Patrick Wisdom analyzes the new DOL guidance on the role of private equity in DC plans. Defined Benefit Can U.S. Equities Outrun Inflation? Adam Lozinski Adam Lozinski and Gordon Weightman analyze the long-term performance of U.S. equities compared to inflation. Defined Benefit The Road to Building Better Infrastructure Benchmarks Jan Mende Jan Mende explains how infrastructure benchmarks are evolving and becoming more sophisticated. Defined Benefit Exclusive Callan Study Analyzes Investment Management Fees Paid by Institutional Investors Ivan "Butch" Cliff Butch Cliff provides the latest update for our proprietary investment management fee study. Defined Benefit U.S. Stocks Thrive While Global ex-U.S. Shares Lag; U.S. Fixed Income Flat Kristin Bradbury Kristin Bradbury analyzes 4Q21 performance for U.S. and global equities and fixed income. Defined Benefit Cautiously Optimistic Forecast on the Economy, Tempered by Clouds Kristin Bradbury Kristin Bradbury analyzes the U.S. economy in 4Q21 and the macroeconomic outlook for 2022. Defined Benefit Do Fiscal Policies Influence Investment Returns? Paul Erlendson Paul Erlendson examines whether fiscal policy and tax rates affect investment returns. Defined Benefit What We Found in Our Latest Private Equity Fees and Terms Study Ashley DeLuce Ashley DeLuce updates our annual Private Equity Fees and Terms Study with a significantly larger dataset. Defined Benefit How Investors Should Respond to Evergrande and China’s Regulatory Crackdown Fanglue Zhou Fanglue Zhou analyzes how China's recent challenges impact institutional investors' emerging market allocations. Defined Benefit Virtuous Circle of Rising Valuations and Liquidity Gary Robertson Gary Robertson analyzes private equity activity, including fundraising, investments, exits, and returns, for 3Q21.
How Science Proves Addiction is a Brain Disease Technology is Moving Quickly We are all aware of the explosion in social networking opportunities since the world rang in the 21st century just 13 years ago—Facebook, Twitter, YouTube, Smartphone, Instagram, Pinterest, to name the most obvious. I ask, “Who could have imagined?” But then it is obvious a lot of people had to have done just that, for without it, we would not have had the advances in technology, funding sources and, of course, the brilliant minds, that made this explosion in social networking opportunities possible. Well, the same is true in a different realm—the realm of the science, and specifically, the science of the brain disease of addiction. Thanks to advances in imaging technologies, such as SPECT, PET and fMRI, scientists and medical professionals are now able to study the live human brain in action, under development, during substance abuse, with mental illness, with medications and after treatment. Some of the key outcomes of these 21st century findings with regards to addiction are a clear understanding of the disease itself. What We Now Know 1. Addiction is a chronic, often relapsing brain disease. By its simplest definition, disease is something that changes cells in a negative way. Addiction changes cells in the brain. Given that the brain controls everything a person thinks, feels, says and does, the nature of the cell changes caused by addiction changes a person’s behaviors, explaining why an addict|alcoholic will lie, steal and break promises made to those they love.  Understanding the science behind these cell changes is helping treatment professionals develop more effective methods for treating this disease. 2. Addiction is a developmental disease. People are not born addicts|alcoholics. Addiction starts with substance abuse. When a person abuses a substance, the substance interrupts the brain’s communication system—a system comprised of cells (neurons), neurotransmitters, receptors, synapses, to name a few of the key components of what are called neural networks. Drugs and alcohol contain chemicals that tap into this communication system and when abused disrupt how cells normally send, receive and process information.  Repeated substance abuse chemically and structurally changes the brain making a person’s brain more susceptible to his or her key risk factors for developing the disease. 3. Relapse can be part of the disease for some people. This is due to addiction’s effect on the brain’s pleasure or reward neural networks. Relapse does not mean treatment has failed, nor that brain healing has not occurred. But it does mean treatment should be reinstated or adjusted, as necessary. More about Addiction To learn more about the brain disease of addiction, including risk factors, relapse, how a person develops the disease, how drugs or alcohol hijack the brain, what works to help get a loved one into treatment and more, check out The Addiction Project. It is produced by HBO in partnership with the Robert Wood Johnson Foundation, the National Institute on Drug Abuse (NIDA) and the National Institute on Alcohol Abuse and Alcoholism (NIAAA). We’d like to thank Lisa Frederiksen for writing this guest post for our site. Lisa Frederiksen is a consultant, national speaker and author of nine books, including If You Loved Me, You’d Stop! and Loved One In Treatment? Now What! She is the founder of and writes a blog of the same name.
Bryophytes (Mosses, Liverworts, and Hornworts) • Hypnodendron camptotheca (Hypnodendron camptotheca) Camptotheca (happy tree, cancer tree, or tree of life) is a genus of medium-sized deciduous trees growing to 20 metres (66 ft) tall, native to southern China and Tibet. The genus is usually included in the tupelo family Nyssaceae, but sometimes included (with the tupelos) in the dogwood family Cornaceae. The name "happy tree" is a direct translation of the Chinese name: There are two species: 1. Camptotheca acuminata Decne.2. Camptotheca lowreyana S.Y.Li, The bark and stems of C. acuminata contain the alkaloid camptothecin. Several chemical derivatives of camptothecin are under investigation for or used as drugs for cancer treatment, including irinotecan, topotecan, rubitecan. C. acuminata also contains the chemical compounds trifolin and hyperoside. Taxonomic tree: Kingdom: Plantae Class: Bryopsida News coming your way The biggest news about our planet delivered to you each day
Climate change and the Philippine seas: Unlocking blue carbon solutions for a cooler planet Protecting and growing blue carbon ecosystem—such as mangroves, tidal marshes, and seagrass meadows—offers a way to fight climate change. How is the Philippines, an archipelago blessed with many mangrove forests, doing this? Children plant mangrove saplings in the Philippines Children plant mangrove saplings in San Francisco on the Camotes Islands in the Philippines, where mangrove forests protect the islands from tidal waves, strong winds and storm surges. Image: UN ISDR, CC BY-NC-ND 2.0 It was 2014 when I first set foot in an island community called Nasingin in Bohol province. Nestled just below Banacon island, Nasingin is home to at least 2,400 people. The whole community stretches 1.7km long and I was able to walk around in less than 15 minutes. The ground, made from dirt and coral, disappears twice a day when the high tide comes in. I visited Nasingin on a research mission to get the locals’ notions of climate change. Constantly battered by fierce typhoons, sea surges, and strong winds, the community knows that nature’s course has changed drastically in the last few years. Artemio Vergara, chief of the peoples’ organisation, eagerly showed me around. It didn’t take long for me to realise that the community lives in poverty—freshwater supplies are scarce, livelihood options are limited to fishing, and heads of households usually go to neighbouring towns in search for jobs and better opportunities. But despite these conditions, Nasingin has something that they consider a treasure: the 300ha mangrove forest cover that frames their island, protecting it from harsh winds and the unfriendly sea. According to Vergara, the mangrove forest is a result of collective community action. “I was 12 years old when we started planting mangroves. Local chieftains here consider this a priority and as years passed, we were able to grow this mangrove forest,” he narrated. Nasingin often faces destructive typhoons along with sea surges and strong winds. When disaster strikes, nobody can go fishing. Economic activities are disrupted and most families are forced to go hungry. During these trying times, they turn to their mangroves. “It has always protected us. The mangroves act as a barrier between us and strong waves. That’s why we’re still here. When we couldn’t go out to fish, we usually find shellfish in the mangroves and that’s enough to help us survive,” shared Maria Luz Sagarino, a community member and a mother of four. The 300ha mangrove that cradles the community not only provides valuable protection against the forces of nature, it is also a lifeline for residents of Nasingin. The forest cover serves as a breeding ground and nursery for various species of fish, shellfish, and marine animals—most of which can be viable sources of livelihood and sustenance. And with climate change increasing the likelihood of extreme weather disturbances, Nasingin’s mangrove forest will prove to be a valuable resource not only to the community but to its neighboring towns as well.  The Philippines as a frontrunner for blue carbon solutions The Philippines, as an archipelagic country, hosts a significant portion of the world’s mangrove stocks. According to this report by PEMSEA, the East Asian region alone accounts for four million ha of mangroves—roughly 30 per cent of the global total. The country has the third largest mangrove ecosystem at 0.26Mha, after Indonesia’s 2.71Mha and Malaysia’s 0.56MHa. These mangrove cover are extremely important in addressing climate change. Research conducted by the Nature Conservancy and IHCantabria for the WAVES program of World Bank found that mangroves help reduce flooding for 613,000 people annually, 23 per cent of whom live below the poverty line. Mangroves are also responsible for saving as much as US$1 billion in residential and industrial property damages. If mangrove forest cover can be reverted back to their 1950s level, added benefits will be felt by 267,000 people, 61,000 of whom are living in extreme poverty condition. On top of these, mangroves are efficient in sequestering CO2 from the atmosphere. The PEMSEA report underscored that East Asia’s mangrove stocks hold 8.8 billion tons of CO2 and collectively, these mangrove ecosystems sequester 22.4 MMt CO2 from the atmosphere. Mangroves are part of coastal blue carbon ecosystems—an umbrella term used to describe mangroves, tidal marshes, and seagrass meadows that can sequester carbon dioxide from the atmosphere and store these for hundreds of years. These ecosystems, aside from sequestering carbon, provide rich breeding grounds for fish stocks, contribute to the filtration of sediment, and ensure the protection of coral reefs from erosion and flooding. It is essential to unlock blue carbon solutions to help cool down the planet. Experts agree that for humanity to survive, global temperature levels should not increase by more than 20C. As such, a 1.5-degree increase in global temperature still brings in catastrophic events: more frequent extreme weather disturbances, sea level rise, stronger and longer spells of drought and El Niño, and the extinction of flora and fauna. Mangrove ecosystems, with its proven capacity for carbon sequestration, can be leveraged in a way that strongly supports a country’s achievement of its NDC towards meeting this global goal. The Philippines, as one of the countries that ratified the Paris Agreement in 2016, has identified the potential of blue carbon solutions in climate change adaptation and mitigation. In fact, the country is one of the five countries that explicitly used this term in its Nationally Intended Contribution (NDC). In its NDC, the Philippines agreed to “about 70 per cent of emission reductions by 2030 relative the business-as-usual (BAU) scenario.” To achieve this, the country highlighted the role that marine ecosystems play, citing blue carbon potentials. The threat to blue carbon solutions Despite their valuable contribution to climate change mitigation, coastal ecosystems around the world are threatened by anthropogenic activities, with over 800,000ha destroyed per year. When these ecosystems are destroyed, they release enormous amounts of CO2 in the atmosphere, further contributing to the rise of Earth’s temperature. According to this policy brief by Nature Conservancy, halving the annual loss in coastal ecosystems would reduce greenhouse gas emissions by 0.23 GT per year—an amount equivalent to the 2013 emissions of Spain. Further, if wetlands are to be restored to their 1990 cover, potential carbon sequestration can amount to 160Mt CO2 per year—enough to offset 77.4 million tonnes of coal burned. In terms of protecting communities against climate-related disasters, the paper posits that 100 metres of mangroves are enough to reduce wave height by as much as 66 per cent. Mangroves help reduce flooding for 613,000 people annually, 23 per cent of whom live below the poverty line…[and save] as much as US$1 billion in residential and industrial property damages. Local communities, blue carbon solutions towards a cooler planet The 2020 deadline for limiting global temperature increase to 1.5C is fast approaching and there is a need to act now. The Philippines is strategically endowed with massive assets towards blue carbon solutions. Measures should be in place to ensure that local communities take the centrestage in managing and protecting their resources. In the case of Nasingin, the community was awarded a certificate of stewardship from the Department of Environment and Natural Resources that grants them the authority to plant, manage, and protect their mangrove forest. The agency and the community also entered into a Community-Based Forestry Management (CBFM) contract to ensure that the community will always have the agency and power over their resources. Communities should always be in the spotlight in scaling up blue carbon solutions. Technical assistance through capacity building and livelihood programmes should be made available to them. As such, the government, together with academe, should identify and value indigenous approaches to blue carbon solutions and develop these for replication. Lying in the Pacific Ring of Fire, the Philippines is constantly battered by nature’s forces. Climate change continues to threaten the country’s vulnerability and proves to be a multiplier in the social pressures that it is currently experiencing. However, the Philippines has a lot of solutions under its belt—blue carbon solutions being one of these. Addressing climate change lies in ensuring the well-being of our people and making sure that they have the capacity to survive and thrive in these trying times. Val Bugnot is Communications Officer of the ICLEI Southeast Secretariat. Most popular Featured Events Publish your event leaf background pattern Transforming Innovation for Sustainability Join the Ecosytem → Strategic Organisations City Developments Ltd
A great way to improve your memory is a physical exercise While you typically think of physical exercise as good for the body, it’s also an exceptional way to increase your memory. By increasing the supply of oxygen to your brain, exercise helps reduce your risk for diseases and disorders that eventually lead to memory loss. Writing by hand is a great way to help your memory. Writing with a pen or pencil engages your brain in a different way than typing on a computer. You can either copy out a speech your trying to memorize or keep track of your daily to do list by writing in a calendar. If you’ve written it out, you may be able to remember without even checking your list! See also  Herbal Remedies That Can Help Increase Your Memory Try to stay away from pills that promise to help improve your memory. Most of the time, these pills are not effective and could cause you physical problems. Instead, you may want to look into supplements like Niacin, Thiamine, and Vitamin B-6. They all help to improve the part of the brain that deals with memory. Try to visualize what you are trying to remember. When you see a mental picture of what you want to learn, you can recall it better. Visualize things like images, charts, or special aspects of the material that you are reading. When you remember those characteristics, you can recall the material more effectively. If you have a large amount of information to commit to memory, a good strategy is to break the information down into many separate pieces. It is much easier to remember things in parts, than to remember them as a whole. As a simple example, when trying to memorize a standard United States phone number, you can memorize it as three separate parts consisting of area code, first three digits, and last four digits, as opposed to all ten digits together. See also  Alzheimer's Disease and Assisted Living Pay attention to your surroundings and live in the moment. The more attention you pay to what’s going on around you, the more likely you are to remember it later. You won’t be able to remember things that you never experienced. Try not to dwell on the past or future while creating new memories. One of the ways to keep your brain functioning at its best is to eat foods that are good for your brain health. Foods that contain healthy fats are vital to healthy brain function. Stay away from trans fats. Instead, consume fish, walnuts, and oil from flax seeds. One fun way to help keep your memory sharp is to play brain games, such as puzzles and logic games. These types of games will help improve attention span, concentration, mental flexibility and memory. To keep your brain in top shape, it is recommended that you play brain games at least 15 minutes each day. According to recent research, playing brain games can even aid in the prevention of Alzheimer’s Disease. Taking a fish oil supplement has been shown to improve memory and cognitive abilities. There is evidence suggesting that the omega-3 fatty acids from fish oil supplements can improve memory. Because you can have too much of a good thing, you should consult your doctor about the proper dosage. If you are a person who easily forgets things, make a mental checklist before leaving your home. Ask yourself what you usually bring with you and check to make sure that you have it. By doing this, you are reducing the risk of going somewhere without something you may really need. See also  Things You Need To Know About Memory Studies have shown that Omega-3 and other nutritional supplements found in fish can increase memory and brain cell development. For this reason, a diet rich in fish and products laced with Omega-3 can help you improve your abilities of reasoning and recall. Make sure your diet is consistent with overall brain health, and try not to ignore fish on the menu. In conclusion, your memory is an extremely powerful device. You can use it in many ways to both benefit you and those around you. Hopefully the advice provided in this article will be beneficial and give you all that you need to properly store and recall important data.
How Can an Accountant Help in Your Business? What does ‘accountant’ mean? In simple terms, an Accountant refers to someone who independently maintains financial records, controls, and reports a company’s financial transactions. The purpose of accounting is to provide information to the relevant decision-makers about the status of a company’s economic activities to make informed decisions. The documents that are created in the method of accounting can either be on hand-copy or computerized. The term ‘accountant’ covers any person who audits, measures, modifies, prepares, provides advice to the management about the financial records, company, organization, etc. The scope of accountant jobs is quite significant. There are different accountants like Chartered Accountants, Certified Public Accountants, Financial Accountants, tax accountants, mortgage accountants, auditors, etc. These job titles reflect the variety of accountant jobs available in the market. As far as the qualifications required to become an accountant are concerned, the requirements are not very stringent. To practice as an accountant, one needs to have a high school degree and pass the examination conducted by the Institute of Chartered Accountants of India. The candidates who appear for the exam performed by the ICAI are called Chartered Accountants. All those individuals who win the examination for the post of Chartered Accountant are called CPA. Generally, all the accountants who want to be called professional Chartered Accountants need to pass the examination conducted by the Institute of Chartered Accountants of India. Candidates who pass the exam are awarded a license. After being professionally licensed, the individual may start their career as an IAS (initiated accountants). This license does not facilitate them to practice as an auditor in any other institution. All the professional Chartered Accountants have to keep themselves abreast of all the changes in the taxation laws and the changes in the accounting standards. The job titles of Chartered Accountants and IAS accountants imply that the individual has to supervise the activities of both jobs closely. There is no scope for regular casual supervision, as is the case with the general accountants. The auditor has to scrutinize all the financial records and prepare the audit reports. A few simple accounting principles help the accountant provide reliable financial data to the management and enable them to make decisions regarding the resources required for the growth and welfare of the organization. All the employees of the organization need to be aware of the significance of accounting reports and its verification. The job titles also convey essential financial analysis, internal control, risk management, audit reporting etc. The financial data which is provided by the accountant is mainly used to implement the strategies of the management. The major part of the work involves preparing the financial statements (in the case of IAs) or the tax returns. The accountants prepare the income statement, the balance sheet, the statement of cash flows and other related documentation such as purchase order papers. At times it may happen that the tax returns are prepared by the staff but they are not always accurate. These forms are generally prepared by the certified public accountant or CPA. The individuals who prepare these forms include chartered accountants, lawyers, accountants, junior accountants, investment bankers, payroll processors and others. Chartered accountants generally concentrate on one or two areas of accounting. Most of the time they specialize in a particular field of expertise. The tax laws and regulations are so complex that it is hard for any one person to understand them. In such situations the services of an experienced Chartered Accountant are called for. It is advisable to discuss with your accountant on how you can benefit from the use of his services. They also help in drafting the financial statements in accordance to the existing tax laws. How to Explore Instagram Advertisings Instagram Ads Instagram Ads is a great way for businesses to promote themselves through the use of images and visual content. There are numerous ways to make these advertisements, something that will be talking more about in the following paragraphs. Launching an Instagram Ads campaign needs you to either have a Facebook commercial account (which you should already have if you already use Facebook for other promotional purposes), or you could Visit Link. There is one benefit to using Instagram ads for branding purposes: they work much better than regular forms of social media. Most people are constantly connected to their social media on a daily basis. This means that a post from your company’s Instagram account can gain a lot of eyeballs in a very short amount of time. However, most people are not active users of Instagram, so your company’s brand will not have the advantage of immediate brand awareness. On the other hand, regular social media can have this benefit, but it is not as quick-acting as ads. As aforementioned, when running ads in Instagram you want to get as many people to click on them as possible. You also want to use captivating imagery to grab their attention and encourage them to take the desired action. There are several ways that you can effectively do this, one example of which is to post a picture of your product. If the product is something that people need frequently (for instance, food products), then they are more likely to click on your ad, and even add you as a friend to see what you’re up to. You can also increase your brand awareness through Instagram ads in a number of different ways. The most basic method of getting brand recognition with your Instagram ads involves creating three different profiles for each product that you are selling. Every time you put a new product up for sale, you should update all of your current profiles so that users know what product you are referring to. Additionally, you should create a new Instagram page for each individual product, so that users know that you are making updates on your products for everyone to see. There are other factors to consider when it comes to Instagram ads. For instance, the ad placements that work best for your business may not necessarily be the most effective for your brand as a whole. It is important to find the right placements for your company and products in order for these ads to work well. You should look at the top advertising spots that get the most clicks, as well as work to improve upon those spots to make them even more appealing. In addition, you should focus on getting as many people as possible to click on your ads, as high visibility ads tend to give you a higher click through rate. If you are simply running ads on Instagram, there are also a number of tools that you can explore in order to get the most out of your efforts. One such tool is the Instagram Insights tool, which is provided by Google. With this tool, you will be able to find out which ad placements are working best for your business. You can also learn more about the demographics that you need to focus on in order to gain the most success. It can be a challenging challenge to try and advertise on social media networks. That is because it has become widely known that many of the largest internet brands are largely ignoring the largest concentrations of internet users. While some have resorted to ad placements on their own websites or in paid advertisements on television, a majority of brands have remained content to run ads through other avenues such as social media. As a result, it can be difficult for small businesses to compete against the ads of larger companies that have large ad fleets on television, newspapers, and even in magazines. The purpose of this article is to help small businesses that are seeking Instagram advertising solutions to explore potential placements on Instagram so that they can attract more customers. By providing targeted marketing solutions for brands and businesses, the power of Instagram ads can become highly effective. In fact, according to one recent study, brands that advertised via Instagram had a three times higher open rates than those that advertised via other forms of online advertising campaigns. As such, it can be smart for small businesses to take advantage of the social media platform to maximize the potential of their advertising campaigns.
Upton Sinclair's Horrible Working Conditions In The Meatpacking Industry 775 Words4 Pages In The Jungle, Upton Sinclair explains how horrible working conditions were for people in the meatpacking industry. Have you ever wondered what effect Upton Sinclair had on American industry? The Jungle is about the poor working conditions and the very poor sanitation in 1906. We will also be talking about the backstory behind Upton Sinclair. Upton Sinclair discovered how bad working areas were. There were repetitive and dangerous assembly lines. People could easily break their backs in any of the jobs. They didn’t even get breaks. People couldn’t advance their careers, and they worked in foul and filthy spaces. They worked ten hours a day, with six days a week. The corporations and management system was faulty. They didn’t provide worker safety measures. They focused on consolidation, and simply removed competitors. They had…show more content… They would shriek, as they were cut open alive, without anesthetic. They were stabbed onto a hook before being killed. They were frightened. They were chained up and yanked from their feet. They were moved by machinery and carts. Upton Sinclair said that “It was like some horrible crime committed in a dungeon.” Upton wrote a lot of books. Most of them failed, until he wrote The Jungle. He went to Princeton, but only to access their collection on the Civil War. To support himself, he wrote dime novels. He also sold humor bits to newspapers and magazines. He had an unhappy marriage to Meta Fuller, with one son, David. He almost died of pneumonia. Upton Sinclair was born in 1878, and died in 1968. He condemned education, because it didn’t fit poverty. The Meat Inspection Act was created because of him in 1906. Animals have to pass a test before and after death to be fed to humans. These animals include cattle, sheep, pigs, and goats. There are now rules for cleanliness in slaughterhouses and processing plants. The Beef Trust act fought against the Meat Inspection Act, but More about Upton Sinclair's Horrible Working Conditions In The Meatpacking Industry Open Document
Home / Featured / When the Muslims of Burma were free When the Muslims of Burma were free The Rohingya Muslims are predominantly from the region in Myanmar, Burma, called Arakan. It is also known as the Rakhine State which has exerted considerable political and cultural influence on the Southern and South-Eastern parts of Bangladesh from the early medieval times. A long mountain range separates the rest of Burma from Arakan which is bounded by the bay of Bengal. It is in this region that a group of Muslims trace their history back to the 8th century when their ancestors from Arabia were allowed to settle in Southern Arakan by King Maha Taing Chandra (788-810). The Arakan region was once a separate state ruled by the Arakanese (Theravāda Buddhists) who were surrounded by first the Bengal Sultanate and then the Mughal Empire. At the beginning of the 17th century, Arakan was at the height of its power with Mrauk U as its capital during the reign of King Sanda Thudhamma. Its dominion extended across a thousand miles of coastline from Chittagong to Syriam. In the previous century, the Arakanese had extended their trade through the Arakanese littoral up to Chittagong with the help of Portuguese mercenaries. It had grown wealthy from trade, including trade in slaves, which it actively raided from the Ganges delta. The Buddhist Arakanese were noted for their skill in navigation and naval warfare and the Kings of Arakan never left the nearby Muslims of the Mughal Empire in peace. They sent naval expeditions to Bengal at intervals and plundered whichever part of the countryside fell on their route. Arakan grew even stronger, raiding the entire Sundarbans delta to Calcutta in the west and Murshidabad in the north whilst Tripura became a tributary. The Arakanese sacked Dhaka in 1625 taking many prisoners including the wife of a Mughal military officer who they carried off in chains. These raids continued for a long time and not a house was left inhabited on either side of the river from Chittagong to Dhaka. The coastal districts became desolate and, according to contemporary historians, they were swept clean with the broom of plunder and kidnapping so that no one was left in that region. With each raid, the Arakanese and their Portuguese counterparts (referred to as Ferinigis) carried off Hindu and Muslim men, women and children along with their property. The captives were sold to Europeans for a handsome profit. Aurangzeb’s Response  In 1665, the Mughal Emperor Aurangzeb decided to take action on the menacing Arakanese Buddhist and Portuguese Christian marauders and launched the Mughal conquest of Chittagong. The Mughal Empire during his time stretched from the Balkh province in the Afghan-Uzbek-Iranian border to present day Java. Shaista Khan, who was Aurangzeb’s maternal uncle, served as the Mughal Governor of Bengal from 1664 to 1688 and was a key figure during his nephew’s rule. Aurangzeb knew that the Arakan Kingdom had developed its military and naval strength significantly over the years and, as such, he ordered Shaista to reorganise the navy immediately. The old boats were repaired and new boats were built in the dockyards of Dhaka, Jessore and other river ports. Crews were recruited and assembled, provisions collected and expert officers were chosen for higher posts such as Admiral Ibn Hussain. Within a year, 300 vessels were assembled and readied for naval warfare. Under the command of Aurangzeb, Shaista Khan also made diplomatic efforts to win the support of the Dutch East India Company. They had set up base in Indonesia in this period as well as the Portuguese who were given refuge in Arakan and who were supporting the Arakan Buddhist Kingdom with its resources, troops and often superior weaponry. The Portuguese, who were effectively mercenaries, were offered generous terms for the withdrawal of their support from the Arakanese whilst the Dutch were informed that failure to support the Mughal Conquest would affect their trade throughout the Mughal Empire. Shaista Khan began the campaign by leading the Mughal forces in an assault on the island of Sandwip which lay in Arakanese control. The Muslims gained a considerable advantage when a conflict erupted between the Arakanese and the Portuguese. To escape from the wrath of the Arakanese King, the Portuguese fled from Chittagong with their families, ships and artillery and, by promptly offering protection and support, Shaista Khan sequestered the aid of the Portuguese against the Arakanese and the Mughal forces succeeded in capturing the island Sandwip in November 1665. In December 1665, Shaista Khan launched a major military campaign against Chittagong which was the mainstay of the Arakanese Kingdom. A base for the fleet was necessary as Chittagong was to be attacked by land and sea simultaneously; Sandwip provided the ideal naval base. The imperial fleet consisted of 300 Mughal vessels and approximately 40 Portuguese auxiliary vessels. The overall command was given to Buzurg Ummed Khan, a son of Shaista Khan, while Admiral Ibn Hussain remained in charge of the navy and supplied provisions for the campaign. After simultaneous bombardment by land and sea, the Mughals held sway after a number of days and the conquered territory was placed under direct imperial Mughal administration. It should be noted that the Dutch East India Company did send two ships to Aurangzeb to be used in his expedition however Shaista Khan achieved victory over the Arakanese before their arrival. Upon the victory against the Arakanese, thousands of Muslim and Hindu peasants who were being held captive by the Arakanese forces were released. The conquest caused indescribable joy throughout the country as the people were saved from the plunder, oppression and tyranny of the Arakanese. Captives returned to their homes and joined their families. Peace was restored in the area and agriculture, trade and commerce flourished. Points to Note: Much like the Muslims in Burma today, the 17th century Muslims of this region were persecuted, kidnapped and killed. However, unlike today, the Muslims in that era had a strong Muslim leader and personality in Aurangzeb and his general, Shaista Khan, who defended the lives of the believers and repelled the menacing oppressive enemy. Terrorists such as the Burmese Buddhist Monk, Ashin Wirathu, and his ‘969 Movement’ are dedicated to the eradication of Islām and Muslims in Burma. They follow the same branch of Buddhism, Theravāda, that the Arakanese of the 17th century belonged to. Today, Muslims in Burma are surrounded by Bangladesh, the fourth largest Muslim nation on earth; Pakistan, one of eight nuclear powers in the world; Indonesia, the most populated Muslim nation, and Malaysia. Defending the defenceless Muslims in Burma should not even be a contentious issue, and yet we are witness to the impotence of these and other Muslim nations. The leaders of the West also sit idly by whilst tyranny runs rampant in Muslim lands which are led by Muslim leaders they are responsible for instating. The condition of the Rohingya Muslims grows daily more desperate – just how bad does the tyranny in Burma have to get before more Muslim nations take action? Aurangzeb and Shaista Khan understood well the words of Allāh when He said: and the words of the Messenger of Allāh (sallAllāhu ‘alayhi wasallam) when he said: A Muslim is the brother of a Muslim. He does not wrong him, forsake him or despise him[2] We pray Allāh delivers the believers from their present situation and raises for them the likes of Aurangzeb and Shaista Khan who send an army against the oppressors. May He fulfil the long-cherished desire of the Rohingya Muslims to be relieved from brutal attacks and oppression and for peace to be restored as it was for the believers before them. Source: www.islam21c.com [1] Al-Qur’ān, 21:92 [2] Bukhāri Other resources: N Sarkar, History of Aurangzib; Karim, Abdul (1992). History of Bengal: Mughal Period. University of Rajshahi; Eaton, Richard Maxwell (1996), The Rise of Islam and the Bengal Frontier, 1204–1760. University of California Press. About Z A Rahman Z.A Rahman is a community activist and a member of a large Mosque in the UK. He has a keen interest in politics and history, particularly Islamic history. He also enjoys traveling and has visited numerous countries in the Middle East and North Africa. 1. I’m not joining the yah boo sucks rehashing of the history of Islamic conquests. Enough to say that they didn’t spread by magic. Same as other empires. I’m more concerned that given the treatment that the Mayanmar authorities are dishing out to the Muslims of the country, why is Bangladesh not taking them in? It’s got a huge population. What difference would a few million more make? Who saved Bangladesh when the Muslims of (West) Pakistan were slaughtering a million of them? 2. Re -tom,Malcolm We Muslims did the really poor job of eradication of Hindus and Buddhists because that’s not our aim Never is We want to always give you the chance to know about islaam and….. The quraan does tell us no compulsion in religion, so I guess sympathy overtaking us. You’re not accepting islaam -cant force you – destiny hell. Gave you the bit of paradise on earth ‘wholesale eradication….eradic • ‘… Eradication of Hindus Buddhist….’Thats why the Hindu pop is so high and the Buddhists are going on their murder rampage in Burma As a Muslim pray for the guidance of all people but the terror afflicted by the burmese on the Muslims of burma makes me ‘forget’ them. Not to say the Hindus are saints, with their stripping, raping, burning, killing of our Muslim sisters… 3. Had to reply after the moors was used. Came across two catholic born men in the past years from the spanish peninsula. One of the them used the term moors absolutely degoratively with hatred. The other, alhamdulillah, accepted islaam with the help of another born catholic Muslim within the past decade His islaam did amaze me and showed me How the ties of islaam, so many centuries ago, were still capable of having their strings fully raised and erected and capable of producing another full practising, feeling for our brethren member of our family. Faith fully rekindled Can say same for European land by ottoman. Born xtians becoming Muslim Not the majority at all, but the few w that do • Tired of this propaganda. Islam is responsible for the largest genocide in human history. And that is the wholesale slaughter and eradication of Hindus and Buddists in India, Pakistan and other places. Those people were once safe too until they were massacred or enslaved by Islam. • LOL Islam did such a poor job of its ‘wholesale slaughter and eradication of Hindus and Buddhists’ that the place is full of Hindus and Buddhists until today! Sometimes I really wonder if people thick enough to swallow let alone regurgitate such manifestly false myths have ever wandered outside of their Mums’ basements… • The wholesale slaughter of Hindus and Buddhists by Muslims in places like Afghanistan is no joke. And for some odd reason isn’t taught in schools. It’s very odd that history books are full of stories about the Jewish Holocaust , but no mention of the massacre of Hindus in the Hindu Kush by Islam. Try reading an actual book instead of the propaganda spoon fed to you by your Imams. Afghanistan and other countries were once Hindu and Buddhist. Muslims either killed them, forced conversion, enslaved tgem or forced them to other regions. Learn some facts instead of your propaganda. • Don’t you just love it when trolls accuse you of reading propaganda in the middle of a rant spewing clear myths and orientalist stereotypes that have been refuted for over a century even in western academies! • Try again Einstein. Afghanistan,Pakistan and many other “Stans” were once A Hindu or Buddhist majority. Your brethren either killed them, enslaved them or force them to convert to your backwards way of life • Cool story, Goebbels. Your brainwashed beliefs aren’t evidence lol especially if they go against basic logic known by necessity. • You telling us the Hindu Kush is propaganda? Your backwards “so called religion” has killed more people than Hitler, Stalin or Mao combined. Get real before it’s too late for you 4. So when the Moors invaded Spain and the Ottomans invaded parts of a Europe that was OK? 5. Burma is not surrounded by Pakistan. May be you are talking about India. 6. a european playground; one of the many brits, potuguese,dutch…………. africa- italians belgians, french…… middle east- all of these and more….not fogetting the major addition of the yanks, we await and make du’aa for the appearance and coming of our shaista khan and aurangzeb 7. Excellent beneficial article, JazakAllahKhair Leave a Reply Send this to a friend
Panax Ginseng                                     Dr. Francesco Pensato The history Ginseng, in the Chinese language " Jen-Shen " has the meaning of: "Root Man. The pronounced ideogram Jen is associated to the meaning of man, and  shen is associated to the meaning of root. Also the botanical name Panax Ginseng, reflects hits  fame and  greatness. In fact, Panax, from the Greek pan-axos,  literally means "that it recovers all ." An early reference to Ginseng, we can find  in the Bible, where in a passage of Ezechiele  : They dealt in wheat of Minnith and Pan-nang ( Ginseng )  honey and oil and balm. Concerning  the first meeting between man and ginseng, they are in circulation  different legends, but the concensus , is that tha plant had a  divine origin . "The root of ginseng was not found by the man, but he  was found by the root." The first newsworthy report from China is around  3500 B.C. period of the emperor Shen Nung, called the Celestial Grower, in his  studies on the grass called "Pen-tshao kan mu", that is' teachings on the understanding of the grass.  Emperor Shen Nung's discoveries were taken back and widened by another emperor, Huang Ti, in 2600 B.C. With the span  of  centuries, Chinese medicine evolved  and  Ginseng accompanied this growth. We find in many quotations about the  plant in different documents. In 200 B.C. the emperor Cho-who-Clu, in one of his writings describes Ginseng as a remedy to recover every sort of illness, reestablishing the normal equilibrium of the organism. From the seventh, to the tenth century, the dynasty You Ang elected   Ginseng  to the dignity' of "Imperial Plant." Around around the year 1000, the dynasty of  Sung' declared  that its value was equal to its weight in silver. Seven hundred years after, the emperor K'ang-hsi I sent  10.000 tartars soldiers, to look  for ginseng, ordering  theirs , that each brought  to  him not less than two kati (around 1 Kg)  of the  best quality and  he authorized  the sale of any surplus  with price equivalent to the  weight in silver. Around  the eighteenth century  Ginseng spreads in the European medical circles, thanks to a Jesuit and to a progressive emperor. The Emperor had  a lot of respect for the erudition of the Jesuits,  so submitted ' to Father Jartroux, some topographical papers of central China. The journey by horse was long and hard through endless central China, It was' really during a particularly arduous trek, that father Jartoux felt exhausted and deprived of his strengths so much that he could not seat on  his  horse. But then , a  "miraculous " thing  happened ! His guide offered him a piece of a strange root to be chewed and the tiredness disappeared and he was able' to continue the trip with renewed energy. After that he wrote to the Royal Society in London, describing the effects of this mighty root, called by the tartars "Orhota" that is' “Head of the plants”. After a few years ginseng was elected, by law, for the first time into an official Pharmacopoeia, The ginseng has been the most precious plant in the history of far  east. Real wars have been fought for the possession of the forests, in which ginseng spontaneously grew. A Tartar emperor erected an enormous paling, around a whole province, in defense of his ginseng plantations. Poachers were punished with death. In the second half part of the eighteenth century the cultivation of this wild and precious plant, finally took root  in Korea perhaps favored by the positive climate. The botany The Panax Ginseng belongs to the family of the " Araliacee ". It is a perennial and deciduous plant, whose leaves dies every autumn and revive in spring. In the wild state the plant grows in  groups propagating itself from the seeds falling from  the mother plant. When it grows naturally  the seeds  of  ginseng  buds at  the beginning of  spring,  having remained under earth from 18 to 21 months - a incredibly long germination. But also the duration  of growth is  not brief. The first year of bud only grows to 5 centimeters and has three small oval leaves. In autumn the stem and the leaves fall, leaving a sort of scar on the rhizome of the plant. The rhizome is a kind of root  defined  "neck." Counting the number of scars on the neck of the root ,we are  able to count the age' of the plant. In the third year of growth the plant reaches only around 20 cm tall with only three groups of leaves, each group  formed by five leaves (quinquefolium) By the fourth year it reaches 40 cm , with five groups of leaves. The fleshy root of ginseng has  pale yellow color, with a characteristic bitter  taste, and possesses various forms: dragon, child and man -“the most  appreciated”. The root of the Panax ginseng his as edible as carrots or radishes.. In the world exist some varieties of Ginseng classified in a chart from Professor Hara. In general the most precious variety is " Panax Ginseng C.To. Meyer (jen-Sheng), coming from China. There are different  kind of ginseng .such  as  Korean Panax Ginseng or  Panax pseudoginseng (seven leaves)  from  Nepal, or from  Japan. Other existing kinds are Panax bipinnafitidum in Thailand and in Myanmar , or  the Panax Americano quinquefolium  from  America. As previously explained in the brief history , to this root divine powers  has been attributed . In  the light of accurate clinical and toxicological studies we can confirm such voices  from the history, affirming that the root of  Panax Ginseng contains beneficial properties In general it is able to restore and to regulate the correct dynamic equilibrium of the human organism, because it increases adaptation to the environmental changes. Ginseng is the more' effective "natural Adaptogen " existing in  the world. The human organism, through a complicated mechanism of physiological equilibrium, is always in an activity', called "homeostasis" - it maintains a constant environment inside the body. To understand to best,  the concept of "homeostasis" and of " Adaptogen ", we observe what happens in a human body, that is  in a situation of danger -  defined " fight or flight ", as under threat of an aggressor. We immediately say that this situation of "stress", following which a series of physiological mechanisms of self-defense are instigated, with the objective to optimize the availability of vital trials. Cardiac pulsations and blood pressure are increases for bringing more' oxygen to the muscles. The senses of hearing and of smell will be stronger and the pupils more dilated to pick up more' information. Breathing becomes faster, using a great quantity' of oxygen . The  blood o capillaries become  constrained  to reduce  perception to  pain or  bleeding  in case of wounds. Perspiration increases for maintaining under control any heat produced by an intense muscular exercise. Blood  is momentarily hijacked from the stomach and the bowel towards  the brain. The Hypothalamus is tied up with hormonal management  for  the equilibrium of these complex mechanisms. This happens through the production, from the pituitary gland, of a neurological transmitter hormone, called  ACTH. This hormone orders all the necessary variations, through the targetted stimulation of other organs ,appointed to the production of further hormones. This self-defense, will finish in the moment  at which the situation of danger comes' to pass  and all the physiological mechanisms will return to a situation of normalcy.' Such a mechanism of adaptability' to  external conditions, in order  to maintain a constant environment inside our organism, is  defined "homeostasis." The factor that is  able to favor  this physiological return to normalcy is defined as " Adaptogen " The problems start when the organism doesn't have time or the opportunity to relax, and the mechanisms described before don't stop, rather continue to increase. This condition  we call  “negative stress”, as it is able to cause: asthenia, fatigue, attrition, that will be translated in  middle to  long term into  serious health problems. All the experiments developed for studying the effects and the effectiveness of ginseng, it appears to act on the cerebral bark as a stimulant and also acts on the centers that check the homeostasis, situated in the inferior part or "visceral" of the brain, making the hormonal answer to the external stimuli more’ effective, thanks to its active components: The Ginsenoids . Ginseng makes  the organism' more resistant, reducing consequent damage for  every type of battle, both because of pathogenic  agents and because of situations of negative stress. In fact more' then that, ginseng takes care of specific illnesses, restoring a correct “homeostasis “normalizing possible dysfunctions. In general the main properties of Ginseng are: 1          It increases resistance to the infections and illnesses 2          It improves the general physical conditions of the user and it prolongs life 3          it Improves   mental faculties 4          It reduces fatigue and  increases vigor 5          it Improve it visual capacity. Some laboratory tests   Many tests, on the properties of Ginseng, have given amazing results. One of the first , developed  in 1948, in Russia, by the Dr. Brekman, left  the experimenter literally without breath. On  a group of one hundred soldiers , was asked to make a run  of  three km .  An hour before, fifty of them got a spoon of ginseng extract, while to the other fifty got only  a spoon of water and flavoring . All the soldiers that had ingested the extract arrived half a minute before the group that had received only water. From that first, and encouraging experiment, numerous follow-ups were made all over the world. A second, very interesting experiment it was' developed by the dr. Medvedev,,in Russia, on a sample  of 32 radio-operators ,all from  the 21 to  23 years old. Also in this case the, result was' amazing, Although the ginseng did not seem to influence the number of transmitted characters, however  the number of the  errors due  to  tiredness, notably smaller in the group treated with Ginseng. Other interesting tests, turned-out  to show an effectiveness in the fields of the hypertension  and a arteriosclerosis, They had comforting results. A 56 year-old patient of  dr. Popov, had  a rate of middle cholesterol of 350 mgs / dl and he  had been suffering for years from  chronic  hypertension resistant  to all the medicines. He was administered extract of ginseng, twice a day, for one month.  At the end of the month his rate of cholesterol was normal. His blood  pressure had also reentered to  normal level  and surprisingly  his mild diabetes had disappeared. Another clinical test, developed in Korea by Dr. K.H.Koo, showed the effectiveness of the ginseng in the treatment of the hepatitis B, through the normalization of different liver enzymes. Also in to oppose the aging process, ginseng has shown, in the tests, to have notable effects .  A lot of the existing pathologies in the elderly people can be referred to as a physical and mental deterioration. In the mechanism of the aging process, role of Free Radicals has strong effect. These are substances produced by biochemical reactions that happen inside our organism. Free Radicals have a notable oxidizing power and in contact with cellular molecules they provoke damage and destruction. In the ginseng there have been isolated components with strong antioxidant, power (phenol and Poly acetylene compounds) to oppose the harmful effects of free radicals and oxidizers In the final analysis, we can assume that using ginseng only results in positive outcomes. In fact no tests have ever demonstrated any negative collateral effect on the the human organism.   Dr.Francesco Pensato
Meaning of Mouthpiece Mouthpiece is short for mouth: the cavity where the teeth and tongue meet, which allows food to enter the digestive tract. Different types of holes and openings are also called mouth. According to DigoPaul, a mouthpiece can be a hollow piece that is part of certain musical wind instruments. The musician must rest his mouth on the edges of the mouthpiece and blow to generate the sound. Made of wood, ivory or metal, the mouthpieces appeal to the vibration of the person’s lips to produce sounds. In the case of the ensemble of brass instruments, such as the trumpet, the clarion, the trombone and the tuba, the mouthpiece is usually made of brass. This class of instruments have the particularity of changing notes without pistons or keys, only through the pressure changes made by the player on the mouthpiece. Woodwind instruments, such as the clarinet, flute, oboe, and saxophone, have mouthpieces in which the vibration is generated by reeds. These types of mouthpieces allow you to produce a single sound on each instrument. How to choose the right mouthpiece for a trumpet Unlike other instruments, such as the guitar or piano, to which musicians can easily adapt without many demands, the experience of playing the trumpet is largely influenced by the characteristics of the mouthpiece. For this reason, it is very important to choose one that allows us to play comfortably, and for this we must take into account various factors. In the first place, there are the questions about the size of the mouthpiece: it must have an adequate thickness, so that the part that comes into contact with our lips gives us the feeling of having an extension of the body and not with a foreign object. that has gotten stuck in our mouths. If the mouthpiece is too wide, the performance becomes less flexible; On the contrary, the narrower the more flexibility it provides, but the resistance is reduced and this can lead to discomfort. The shape of the mouthpiece is also important. This can be sharp or rounded: the first allows to attack the notes with greater clarity, and produces a more metallic sound; the second, on the other hand, increases comfort but reduces the clarity of the lower notes. It should be noted that most musicians lean toward sharp mouthpieces. Another point to take into account is the diameter of the cup, the opening that remains inside the oral cavity, since both this property and its depth directly affect the tonal extension of the instrument (the number of notes it can produce, from the lowest to the highest) and the volume of the sound. The neck, on the other hand, is a gear that is in the mouthpiece and connects it with the instrument. Its size is important to achieve the best results, and that is why it is necessary to inform yourself and try several options until you find the most appropriate one. A neck that is too large can lead to more fatigue in the mouth; In short, a small one is a good idea, since it reduces the effort of the musician and improves the quality of the performances. Other meanings A type of tube with a wide sector where a cigarette is placed is also called a mouthpiece. The person who smokes inhales the smoke through the opposite sector, on which he rests his mouth. Thus the smoker avoids touching the cigarette with his fingers when smoking. Finally, the mouthpiece is the sector of the pipe that the subject places in his mouth to smoke.
ログイン / 登録 アカウント As IT systems continue to evolve and grow, their scale and complexity are becoming increasingly difficult to manage. The sheer volume of data these systems generate is overwhelming, and -- without sufficiently intelligent monitoring and analysis tools -- can result in missed alerts, opportunities and excessive (and expensive) downtime. With the advent of big data and machine learning, however, a new category of IT operations tool has emerged: AIOps. What is AIOps? AIOps stands for artificial intelligence for IT operations and it is the practical application of artificial intelligence (AI) to enhance, support and automate IT operations. AIOps uses analytics and machine learning (ML) to monitor and analyze complex streaming data in real time, helping teams detect and react to potential issues more quickly. Why AIOps is important As more businesses undergo digital transformation, AIOps is increasingly important due to: • Increased security threats and compliance requirements • Technology and systems increasing in scale and complexity • The continually growing quantity of data these systems generate • More complex and varied information and analyses required by different stakeholders • Too little available human talent to deal with all of the above An AI operations platform helps by enhancing and automating a wide array of IT tasks and processes. Rather than relying on people to manually cope with the growing flood of data generated by modern IT systems, AIOps takes care of the monitoring and analysis parts, leaving your DevSecOps and Site Reliability Engineering (SRE) teams free to focus on other things. What can AIOps do? Through real time processing of streaming data, an AIOps platform can help provide continuous insights across IT operations, including, among other things: • Anomaly detection • Outlier detection • Malware traffic detection • Vulnerability detection • Historical analysis • Performance analysis • Root cause analysis • Remediation advice In addition to providing these sorts of insights, AIOps platforms can also be trained to respond to alerts automatically so many issues can eventually be resolved without human intervention. How does AIOps work? AIOps works by turning data into insights through analysis and machine learning. Modern IT systems generate an enormous (and ever increasing) quantity of data across their many and varied components. And this data is often noisy, redundant, inconsistent and coming in at speeds impossible for a human to comprehend. This is where AIOps comes in. An AIOps platform: • Ingests both historical data and real-time streaming data from across the IT environment. • Filters out the noise so only the most relevant data is analyzed. • Discovers and understands patterns within that data. • Issues alerts or events when potential problems are detected • Identifies root causes for problems and proposes (and potentially implements) solutions. And this is not a simple "one and done" process -- through ongoing machine learning, AI operations platforms continue to improve, becoming more efficient and effective over time. 6 AIOps benefits While this is not a comprehensive list of all the benefits AIOps tools can provide, here are six ways it can help IT operations teams and organizations as a whole.  1. Reduce downtime Application and system downtime can be costly in terms of lost revenue, lower productivity and damage to your organization’s reputation. AIOps helps DevSecOps and SRE teams detect and react to emerging issues before they turn into expensive and damaging failures. 2. Improve operational confidence AIOps can take the guesswork out of many IT operations processes and tasks by helping pinpoint potential issues, evaluating their impact on your environment and providing step-by-step remediation guidance. 3. Continually manage vulnerability risks As environments grow in size and complexity, there are an increasing number of risks to manage. Manual methods are unable to keep up with the rate of change, but AIOps tools help you identify, analyze, prioritize and remediate vulnerability risks. 4. Optimize skills and resources By providing root cause analysis and remediation guidance, AI operations can help your team solve problems more efficiently while simultaneously deepening their own understanding and skills. 5. Focus on innovation With much of the day-to-day drudge work required to "keep the lights on" eliminated, AIOps gives teams the freedom to develop and deliver more strategic and higher value projects and innovations. 6. Control complexity AIOps can help teams understand the differences between systems, streamlining system patch and configuration management, simplifying operations and improving reliability. AIOps challenges On the flip side, however, implementing an AIOps platform also presents a number of challenges. • Expertise: there’s an intimidating barrier to entry because extensive data science expertise is required • Infrastructure: expensive and specialized infrastructure and deployments are needed • Time to value: AIOps systems can be difficult to design, implement, deploy and manage, so it can take some time to see any return on investment • Data: the volume, quality and consistency of data produced by modern IT operations can be overwhelming and difficult to wrangle into something that can be used for modelling If you’re unfamiliar with AI and ML, spend some time learning about the concepts and existing capabilities so you’re familiar with what is (and isn’t) currently possible. And, if you haven’t already, a practical thing you can do right now is start to build your organization's DevSecOps pipeline and culture. A robust DevSecOps system improves operational efficiency and security, and allows you to take advantage of existing automation tools and platforms. By developing these capabilities now, it will be easier for your organization to adopt new and improved AI and ML tools as they continue to evolve.  About the author Deb Richardson is a Contributing Editor for the Red Hat Blog, writing and helping shape posts about Red Hat products, technologies, events and the like. Richardson has over 20 years' experience as an open source contributor, including a decade-long stint at Mozilla, where she launched and nurtured the initial Mozilla Developer Network (MDN) project, among other things. Read full bio
Heroin is one of the deadliest drugs in America. In 2017, the Centers for Disease Control and Prevention (CDC) reported that approximately 494,000 Americans ages 12 and older used heroin in the year before taking the survey. The CDC also reported that more than 15,000 people died from a heroin-related overdose during 2017. These reports leave many people wondering, what are the psychological effects of heroin that make it so addictive and deadly? The short- and long-term mental effects of heroin can completely change the way a person behaves and thinks. Once the euphoria from the high fades, people are left to face challenging withdrawal symptoms. Many people seek more heroin to avoid withdrawal symptoms. It’s important to know the mental health effects that heroin causes to understand what people with heroin addiction face daily. Article at a Glance: Heroin’s powerful short- and long-term mental effects make it addictive, harmful and deadly. Keep the following key points in mind regarding the mental effects of heroin: • Some of heroin’s short-term mental side effects include euphoria, warmth, calmness, delirium, and drowsiness • Heroin dependence, tolerance, addiction and withdrawal symptoms can develop from long-term heroin use • Heroin is so potent that addiction can develop after a single-use • Thousands of people die from heroin-related overdoses each year Short-Term Mental Effects of Heroin The short-term mental effects of heroin are what someone feels when they get high. The nature and strength of these effects depend upon the individual’s tolerance to heroin and specific drug-related factors: dose, purity, route of administration and co-ingestion with other substances. • What are the short-term effects of heroin? • Euphoria: Heroin’s euphoria begins within seconds and lasts for a few minutes. This rush of pleasure is due to heroin’s high absorption rate in the bloodstream, making it even more addictive than morphine. Heroin is so intense that some people become addicted to the drug after just one use. • Warmth: Sensations of warmth and burning may blend into the initial euphoric state. Interestingly, body temperature does not rise with heroin use. This feeling of warmth is simply a short-term mental effect of the drug. • Analgesia: The arms and legs may start to feel heavy, and the body may feel little to no pain. Just like prescription opioid medications, heroin is a pain reliever. It is effective in relieving physical and emotional pain. This analgesic effect lessens as tolerance develops. • Calmness: Together, these pleasurable feelings contribute to a sense of calmness, wellness and security. This initial calming effect is short-lived. Unfortunately for the individual using heroin, the drug does not make their mental or physical health any better, nor does it make their situation any safer. • Drowsiness: The individual may also feel drowsy, falling in and out of sleep. In this way, heroin can serve as a sleep aid. Unfortunately, the quality of sleep it produces is poor. Over time, heroin ends up disrupting sleep instead of improving it. • Changes in mood, memory and attention: Heroin worsens memory and attention. It also creates negative changes in mood. These disturbances in cognition and mood can prompt an individual to start looking for their next dose of heroin. • Opioid-induced mental health conditions: The following conditions can be provoked by heroin intoxication. • Opioid intoxication delirium: waxing and waning of orientation and attention • Opioid-induced psychotic disorder: altered bodily senses, impaired sense of reality and unusual speech or behavior • Opioid-induced mood disorder: most commonly with mixed manic and depressive symptoms • Opioid-induced sleep disorder: most commonly hypersomnia (sleeping too much) • Opioid-induced sexual dysfunction: most commonly impotence (inability to have an erection or orgasm) Heroin can be snorted, smoked or injected. Heroin injected into the vein rather than into muscle or fat delivers the most immediate and longest-lasting high. The maximum intensity of the high can last for hours, as opposed to minutes when people smoke or snort heroin. Injected heroin is more potent because it travels faster and more extensively through the bloodstream to the brain. Long-Term Mental Effects of Heroin The long-term mental effects of heroin begin with the development of drug tolerance and drug dependence, followed by drug withdrawal and culminating in drug addiction. After long-term heroin use, a person’s heroin tolerance and dependence increase. At that point, the drug is no longer used to get high, but simply to avoid withdrawal symptoms. • What are the long-term effects of heroin? • Tolerance: Tolerance is when a drug gives a diminished high after repeated use. People who develop a tolerance to heroin may show little signs of being high after using the drug. These individuals may go on to ingest heroin of a higher purity or dose, or via a faster route of administration, to recapture the euphoria of their first high. • Dependence: Psychological and physical dependence on heroin develops when an individual cannot function normally without the drug. Dependence can begin within days of first use. Signs of heroin dependence include continued anticipation and prioritization of heroin use despite personal and professional consequences. • Withdrawal: Heroin withdrawal occurs due to an abrupt cessation of use in people with opioid dependence. It can also occur with premature administration of an opioid antagonist medication to reduce craving (i.e., naltrexone) or to treat overdose (i.e. naloxone). Withdrawal is especially concerning in pregnant women, as it can be life-threatening for fetuses and newborns. Notable mental effects of heroin withdrawal include: • Mood swings • Agitation or irritability • Fatigue • Anhedonia (lack of motivation or pleasure) • Insomnia • Difficulty concentrating • Anxiety • Depression • Addiction: Also known as a substance use disorder, addiction is an acquired disease of the brain that affects the brain’s reward system. Often, the personal and professional consequences of the individual’s drug use are life-altering or life-threatening. Addiction occurs under necessary and sufficient conditions. • Necessary conditions: genetic predisposition to addiction, or first use of the substance at an early age • Sufficient conditions: poor coping with trauma and adversity, and continuous use of the substance How Addiction Changes Your Brain Drugs like heroin hijack the brain’s reward system, strengthening the desire to use more heroin. The reward system’s biological purpose is to reinforce natural rewards. Such rewards include life-sustaining behaviors like eating, sleeping, working, socializing, procreating and parenting. Your brain’s cells, known as neurons, first anticipate the drug in the thalamus, the brain’s relay center. This anticipation generates an electrical signal in one neuron that causes a neighboring neuron to release chemical messengers. These chemical messengers, known as neurotransmitters, bind to their receptors on the next neuron, regenerating the electrical signal. This process continues until the signal reaches the brainstem. Anticipated or actual heroin use signals the midbrain structure of the brainstem to release the pleasure neurotransmitter, dopamine, from its sites of production, known as the ventral tegmental area and the substantia nigra. Drugs like heroin produce much more dopamine than natural rewards do. This surge of dopamine then projects on to receptors in other areas of the brain: • Amygdala: where emotions evoked by the drug are processed • Insula and hippocampus: where emotions and memories regarding craving and drug-seeking behavior are processed • Prefrontal cortex: where the choice to use is weighed and executed • Nucleus accumbens: where motor activity associated with reward obtainment and reinforcement is initiated Chronic heroin use repeatedly floods the reward system with dopamine. The brain adapts by decreasing its dopamine production in response to natural rewards and drugs. It also decreases the number of dopamine receptors and increases the number of opioid receptors. Together, these brain changes result in psychological and physical dependence, and the need for greater heroin consumption to overcome tolerance and avoid withdrawal. The levels of other neurotransmitters and hormones are also altered: • Serotonin: the contentment neurotransmitter, increases with short-term heroin use, and decreases with long-term use. Anxiety, depression and other negative emotional states increase as a result. • Glutamate: a stimulating neurotransmitter associated with learning and memory increases with heroin use, cementing the desire to use • GABA: a neurotransmitter that inhibits dopamine release, decreases with heroin use, increasing the potential for addiction • Endorphins: the body’s natural opioids, increase with short-term heroin use, and decrease with long-term use • Corticotropin-releasing hormone (CRH): this hormone increases with heroin use, increasing the production of the stress hormone, cortisol • Cortisol: a hormone that helps mediate stress. In the short-term, increased cortisol is protective, but in the long-term, it is damaging to our minds and bodies. Both gray and white matter of the brain are damaged, resulting in impaired brain functioning and connectivity. Fortunately, there is a silver-lining: Treatment with abstinence, medication, and therapy, as seen in fMRI and PET imaging studies, can reverse some of the brain damage caused by heroin in as little as six months. Recovery from heroin addiction is possible and can be life-saving. If you or a loved one struggle with heroin addiction, The Recovery Village can help. You can receive comprehensive treatment for heroin addiction from one of several facilities located throughout the country. To learn more about heroin treatment programs, call The Recovery Village to speak with a representative today.  Share on Social Media:
Multiple pregnancy What is a multiple pregnancy? A multiple pregnancy is a pregnancy that involves the development of more than one foetus in the womb, resulting from the fertilisation of two or more ovules. Children who are the result of a multiple pregnancy can be identical twins (sharing the exact same set of genes) or non-identical twins (born from two eggs released at the same time). The rate at which identical twins occur is the same across the world, but the rate of non-identical twins varies from country to country, due to the age and ethnicity of the mother. In the UK, 16 in 1,000 births involve multiple pregnancy , 98% of which are twins. What are the symptoms of a multiple pregnancy? The symptoms that distinguish a multiple pregnancy from a normal pregnancy include: • more intense morning sickness and vomiting • extreme drowsiness and fatigue • rapid weight gain (5 kg in the first trimester, compared to 2-3 kg in a normal pregnancy) • larger expansion of the uterus • earlier sensation of foetal movement (two weeks before normal pregnancy) What are the causes of a multiple pregnancy? The main factors related to multiple pregnancy are: • a family history of multiple pregnancy • previous multiple pregnancy • getting pregnant later in life • ethnicity, with multiple pregnancy more common in women of West African ancestry Fertility treatment in the form of IVF is a major risk factor for multiple pregnancy – with 24% of successful IVF procedures resulting in multiple pregnancy. What is the treatment for a multiple pregnancy? Treatment is based on a more controlled consultation throughout pregnancy since it is a type of pregnancy that carries more risks than normal. This check-up may involve: • better nutrition including iron supplementation and folic acid • more frequent consultations and scanning • screening for conditions such as Down’s syndrome • referral to a perinatologist (maternal-foetal specialist) to coordinate the follow-up • tocolytic drugs (if a premature birth occurs) • medications with corticosteroids (to help the lungs of foetuses mature) • the choice to have an elective birth after 35-37 weeks What are the risks and complications of a multiple pregnancy? Multiple pregnancy carries the greater risk of a range of conditions including:
VisionCircles diagram VisionCircles in a nutshell Four concentric circles represent the four elements that make up the story of life. We discover who we are, what is important to us, who we want to become, and whether we are being effective in making our ideals come true in the up's and down's of living. Circle One represents the situation that concerns us (eg. improving a relationship, advancing in a career, overcoming a personal weakness, etc.). In this circle we talk to ourselves about our concerns. When we take apart our internal conversation we can identify our emotions, our behaviors, our expectations, our ideals, and the ways of thinking underlying all the above. Circle Two represents our productive and unproductive responses to our concern such as, procrastination or withdrawal from unpleasant people, that make our situation worse; or, confronting, listening and planning that work toward realizing our ideals. Often we ask ourselves, "What was I thinking when I did that?" There's usually an idea behind our behaviors. Sometimes the idea is clear, like "I'm doing this because I care for this person". Sometimes the idea is camouflaged, like "I'll get to it tomorrow". Underneath the behavior of putting off fulfilling a responsibility is the idea of procrastination that leads to the habitual behavior of putting off certain responsibilities. The aim in this circle is to discover the practical ideas that will help us realize our ideals. Eg. Planning and monitoring my time will help me realize the ideals of excellence and reliability. Procrastination will not help. Circle Three represents the ideals that we want to realize in our lives such as, love, integrity and excellence. As we strengthen our vision, that is, our intuitions and understandings of what is important to us, the awareness of our ideals becomes a daily motivating force attracting us to realize what we see. Circle Four represents our irrational, rational and supra-rational tendencies. To realize our ideals we need to strengthen our rational and supra (more-than) rational tendencies. Each tendency is made up of certain emotions, behaviors and types of thinking. For example, when I am overwhelmed by confusion I feel anxious and frustrated, I am either paralyzed in my behavior or erratic, and my thinking is not following the rules of common sense. To repeat, the aim of the Vision Circles program is to change our situation in Circle One for the better by applying effective, practical concepts in Circle Two that will actualize our ideals in Circle Three. To accomplish this goal we will use the OSCAR method of personally and creatively solving our problems to strengthen the mental skills of our rational and supra-rational tendencies in Circle Four. This method of clarifying our ideals and of discovering the means to achieve them will give us a sense of confidence in our judgments, control over our circumstances and freedom to create our career world, our social world and our personal world. The Human Tendencies Profile (The dodo in us) (The beaver in us) Supra (more than) rational (The eagle in us) 1. Confusion 2. Dependence 3. Rebellion 4. Skepticism 1. Order 2. Control 3. System 4. Certainty 1. Vision 2. Freedom 3. Change 4. Creativity Lead to... Self-destruction Self-profit Making my world If we read down the columns, we see how one tendency is the springboard for the next tendency. By monitoring our self-talk and by reflecting on our thinking we develop the habits of minimizing the strength of our irrational tendencies and maximizing the power of our rational and more-than-rational tendencies. (Example: "I just lost my job, and I don't know what I'm going to do. I'm drinking much more than I use to, but it gives me a breather from all this tension. I'm so damn angry. After giving my all I get this. I thought I could trust the system and the people in it. I guess I was wrong." ) (Same situation with different self-talk: "I just lost my job, and I don't know what I'm going to do. I got to get my thinking in order. I've got to stay focused on what is important to me. I have to start thinking in different ways to get control of this situation.") This second example of self-talk expresses our connection to our rational (the beaver in us) and more-than-rational tendencies (the eagle in us). The first example expresses our downward spiral in the irrational zone (the dodo in us). For a detailed explanation of The Human Tendencies Profile go to chapter two in the book, What Do I Believe In, A Rational Intuitive Guide For Creating a Personal Creed
clock menu more-arrow no yes How creationist legislation has evolved, in one chart Sandy Huffaker/Getty Images Creationism has evolved. Since the Scopes Monkey Trial in the 1920s, state legislatures and the courts have been fighting over teaching evolution and creationism in the classroom. Secular interests have won the biggest cases, which has forced creationists to adapt. In the latest issue of Science, Nicholas Matzke — a former staffer at the National Center for Science Education, a nonprofit dedicated to protecting evolution education — traces the evolution of creationist legislation since the 2005 ban on teaching intelligent design. Matzke is a phylogeneticist, which means he uses DNA and fossil data to graph how different species are related on an evolutionary tree. Then a computer program draws the most likely evolutionary scenario. He ran 65 proposed state and local policies skeptical of evolution through such a program and created the following chart: Creationist bills have evolved to include climate change "[The analysis] lets you say not only do these bills share some kind of family resemblance, but these legislatures probably copied their bill from this specific bill," Matzke tells me. "Early on, Alabama bills were the source. After that, Louisiana and Tennessee — places where these policies passed — it’s pretty clear that they inspired further policies." Matzke's analysis shows the biggest leap creationist legislation took is when a policy proposed in Ouachita Parish, Louisiana, in 2006, broadened the language to encompass other contentious scientific topics like human cloning and global warming. "The tactic appears to be an attempt to circumvent earlier legal decisions suggesting that targeting evolution alone is [on the face] evidence of religious motivation and, thus, unconstitutional, perhaps also motivated by the dislike of climate change research by economic and religious conservatives," Matzke writes in Science. After the Ouachita proposal, similar language popped up in a dozen other proposals. After a federal court banned teaching intelligent design in 2005, policies promoting "academic freedom" began to circulate. "These don’t mention creationism," Matzke says. "These don’t mention intelligent design." In 2008, Louisiana passed a bill that advocated for "open and objective discussion of scientific theories being studied including, but not limited to, evolution, the origins of life, global warming, and human cloning." In 2012, Tennessee passed a similar resolution. By encouraging "academic freedom," these bills presumably give teachers who want to discredit evolution or students who won't hear any of it some protection. "You can make a more specific analogy to diseases," he says. "We know that microbes evolve. They evolve to get around the immune system. They evolve to become sneakier. Animals evolving camouflage to avoid predators and stuff like that. We’re really seeing that happen with these creationist bills. The more obvious forms of these bills got shot down." But sneakier bills — ones couched in terms of "academic freedom" — can still get passed. These shifting creationist tactics go way back • In 1968, in Epperson v. Arkansas the Supreme Court declared bans on teaching evolution to be unconstitutional. After: Creation-education proponents invented "creation science," an attempt to reconcile Bible stories with science. The Creation Museum in Kentucky founded in 2007 put these theories on wild display. • In 1987, the Supreme Court declared that teaching creation science was unconstitutional in Edwards v. Aguillard. After: Creationists proposed "intelligent design theory," an intentionally vague idea that suggests some phenomena in nature are too complex to have been developed without an "intelligent designer." And since then, creationists proposals have evolved yet again. "Courts provide the selection pressure," Matzke says. "The ones that can avoid that selection pressure survive and produce the next generation of bills. It’s a pretty basic thing. If something is killing off one strategy, then policies that take a different strategy will propagate."
Breaking News More () » YOUR HEALTH: Giving pancreatic cancer patients more time Surgeons are testing new technology that can prolong the lives of their patients BALTIMORE — Pancreatic cancer is an aggressive cancer that is often not caught until it is late stage.  People with cancer that has spread usually live just one year after diagnosis. Caught early, patients often live three years after diagnosis.  Now, surgeons are evaluating a high-tech tool called the NanoKnife to increase patients' odds of survival. It's helped Barbara Valenza who said her family and friends noticed a change in her appearance last year, starting with a sudden drop in weight. "I lost about 50 pounds before, you know, and people were Barb, you're losing too much weight, you need to go to the doctors." Barbara and her husband Joe found out she had pancreatic cancer. Unsettling, but not entirely surprising.  Barbara lost three family members to pancreatic cancer.  Surgical oncologist Debashish Bose felt Barbara was a good candidate for treatment with Nanoknife.  Nanoknife uses a process called IRE, or Irreversible Electroporation During surgery, doctors insert probes to deliver targeted electrical pulses to the cancer tissue. "If you give just enough, but not too much, you'll cause live cells to form these pores, but the structures around them don't get destroyed," explained Dr. Bose. The small holes in the tissue cause the cancer cells to die but protect the delicate blood vessels and organs nearby. "It might mean the difference between seeing a child married or have a baby, you know, just looking for a little extra time," he added.  NanoKnife technology is offered in the Chicago area. Barbara underwent surgery with the NanoKnife in March of 2021.  Her latest scans show the NanoKnife treatment, along with chemo and radiation, is working. "The disease hasn't moved any more, and they want to do everything possible so that I will be here."  Dr. Bose says patients with pancreatic cancer that is locally advanced and who receive chemotherapy and radiation and the nanoknife treatment live an average of two years after diagnosis.  Patients who receive chemotherapy and radiation alone live 12 to 18 months on average.  High hopes for the NanoKnife By the time pancreatic cancer reaches stage 3, it is often too advanced to be able to remove surgically.  The average life expectancy after diagnosis of stage 3 is about nine to 15 months.  "Thus far, we're seeing studies that using the NanoKnife virtually doubles life expectancy for pancreatic cancer patients," said Tom Cox, director of Radiology, Radiation Oncology and OSF Cancer Services at OSF Saint Francis.  The NanoKnife probes are placed around the tumor with image guidance and deliver a series of high voltage pulses to cancerous cells.  Rather than burning or freezing, like the thermal ablation probes, the NanoKnife pulses punch holes through the cell membranes.  The key is being able to target the diseased cells and minimize peripheral damage. "This is another option we can show and give them another chance to live longer and maybe the chance to live a lot longer." said Cox.
Little is known about the strengths people develop in harsh environments. If we learn more about these strengths, we will be able to leverage them in education, the workplace, and interventions. Growing up under conditions of adversity can undermine children’s development and learning.  Scientific research has illuminated these detrimental effects, generating knowledge that has, in turn, informed policies and interventions designed to prevent and repair deficits. However, we know very little about the adaptive mental skills and abilities that people develop in harsh environments. Accordingly, we lack an empirical basis for designing policies and interventions that leverage these “hidden talents.” This lacuna provides a critical opportunity and agenda for the future: We need to identify the mental skills and abilities that are enhanced by exposure to stress. These skills could be used as building blocks for success, while boosting confidence and motivation in youth and adults suffering from stigma and hardship. Identifying these skills and abilities could lead to the development of an assessment battery that captures the “hidden talents” of stress-adapted individuals. Such an assessment battery, which would be the first of its kind, could then be used to assist these individuals through education, jobs, and interventions. But first, we need solid scientific evidence. Through our current research, we are laying down the foundations for a “hidden talents” approach. We are learning more about untapped potential of stress-adapted individuals based on social and cognitive studies of humans, other primates, birds, and rodents. Four questions can help to guide research on hidden talents: 1. What challenges do people face in a given environment? 2. What mental skills and abilities do they develop for solving such challenges? 3. What instruments best measure these skills and abilities? 4. How might we leverage these skills and abilities? To illustrate: If perceptions of social rank are highly salient to youth from low socioeconomic backgrounds, then these individuals may be better able to reason about social dominance than about abstractions (e.g., symbols, numbers). These enhanced abilities may be leveraged in teaching and intervention efforts. Young people can be taught mental operations (e.g., transitive inference, syllogisms) in the context of social-dominance problems, which they may find more relevant, motivating, and engaging than other types of problems. Once they have mastered these operations in this “more applied” context, they may learn to generalize them to other contexts. This, in turn, can help to reduce educational gaps. It is useful to complement experimental research with structured interviews with young people living in high-stress environments and with those who work with them (e.g., educators and social workers). These interviews, which can provide valuable information about the respondents’ lives and daily experiences, should be conducted by qualitative experts. Such interviews would help to generate hypotheses that might inspire experimental research. In the coming years, my collaborator Bruce Ellis and I intend to examine how learning environments can be optimized for stress-adapted youth. Specifically, we would like to explore variations in curricular content (e.g. abstract vs. social), information delivery (e.g. static books vs. dynamic touch screens), and instructional practices (e.g. sitting vs. moving around in the classroom). We plan to develop this work in collaboration with the Research Network on Adaptations to Childhood Stress. The “hidden talents” approach has broad social implications: The better we understand stress-adapted minds, bodies, and brains—including their strengths—the more effectively we will be able to tailor education, jobs, and interventions to suit the needs and potentials of the affected individuals. Keep up to date with the BOLD newsletter
Building a more secure financial future Make the most of your investment opportunities To make the most of your investment opportunities, it’s your goals that count, so keep them firmly in mind when you make financial decisions. It’s important to take a consistent, long-term strategy to build a more secure financial future through steady purchases of well-diversified investments. Main types of investment There are four main types of investments, known as ‘asset classes’. Each asset class has different characteristics and advantages and disadvantages for investors. This involves putting your money into a savings account, with a bank, building society or credit union. Your money may not hold its spending power if inflation is higher than the interest rate. Cash is the most basic of all investment forms. Saving money into a deposit account with a bank, building society or credit union is considered cash saving. Cash can be used to save for immediate needs or as a parking place in between investing in other assets. Why have cash savings? If you need instant access to your money or are saving for the near future, cash could be a good option. You earn interest on cash. How much you earn varies from one account to another. You can save in cash without paying tax on the interest by saving in a Cash Individual Savings Account (ISA). What are the risks? The amount you invest will not go down in actual terms, but you may lose spending power if interest rates you receive don’t keep up with inflation rates while you are saving. In other words, the nominal value of your savings will stay the same, but the real value could fall. Cash deposits are guaranteed against the failure of a bank, building society or credit union from 1 January 2016 to the value of £75,000 per person by the Financial Services Compensation Scheme. A bond is a loan to a government or company. In return for the loan, you receive interest and the amount you invested back at an agreed future date. Bonds are issued by governments and companies as a way for them to borrow money. In return, lenders get paid interest and the full value of their money back at a specified date, called the ‘redemption date’. The market price of a bond will rise as interest rates are expected to fall. Bonds have a fixed interest rate. Imagine you hold a bond with a fixed interest rate of 5% whilst general interest rates fall from 4% to 2%. Your bond would be a lot more attractive when general interest rates are 2%; therefore, its price on the market rises. What are bonds? Bonds issued by the UK Government are called ‘gilts’. You can buy these directly at the Post Office or the Government Debt Management Office. Bonds issued by companies are called ‘corporate bonds’. They are bought and sold on the stock market. Their price will go up and down, which means that if you decide to sell before the agreed redemption date, you may get more or less than the price you originally paid. The interest you receive from your bond will be specified before you buy. While the end value and annual interest payments are normally fixed amounts, in some cases (such as with UK Government index-linked gilts) they may be related to a price index. Index-linked bonds ensure your money keeps in line with inflation, but at times of low inflation a fixed rate bond could provide higher returns. What are the risks of investing in bonds? There is still the risk that the issuer may be unable to fulfil its promise to return your money on the redemption date. This could mean that you lose some or all of your initial investment. To help you manage this risk, bonds are rated by credit rating agencies. The rating on a bond is a good guide on how capable the issuer is in paying back their debt i.e. how likely you are to get your money back when the term of the bond ends. You can invest in a company by buying shares. In return, you may get a proportion of any profit the company makes (depending on how many shares you hold). Shareholders are entitled to have a say on the way the company operates, including voting at company general meetings. Companies issue shares, often referred to as ‘equities’, as a way of raising money from outside investors. In return, the investor may receive a portion of the company’s profit, called a ‘dividend’. Investors receive a dividend for each share they own. Shareholders are in effect the owners of a company. Why invest in shares? • Historically, shares have been one of the highest performing asset classes over long periods • Dividends are normally paid annually or biannually • Dividend payments have usually risen over time. But if a company suffers a loss, dividend payments can decline or even stop What are the risks? The value of your shares is dependent on a number of things including the performance of the company and the wider economic outlook. The value can go up and down over time. It is sensible to invest in shares only if you can afford to put money away for a period of years. The fluctuating nature of the value of shares means you do not want to be forced to withdraw your money when share prices are low, as you may get back less than your original investment. Becoming a landlord is a well-known way to invest in property. The aim is to get an income from the rent you charge and that the house or flat increases in value after expenses so you make a profit if you sell it. Land and commercial buildings, such as shopping centres, are other forms of property investments. Why invest in property? Property provides a relatively high and stable rental income with the possibility of making your money grow over time. What are the risks of investing in property? Buying and selling buildings can take a long time, and if you invest in property you might not be able to withdraw your cash as quickly as you would wish. Investing in property via a fund generally means it is easier to get access to your cash when you need it. However, providing this level of access can mean lower returns. The value of properties fluctuates over time, so there is a potential that you could lose money. You can invest in property by buying a property on a buy-to-let basis. However, the cost and complexity of owning and managing an individual property is high. There are two ways to invest in property indirectly: • Invest in shares of companies that own or develop properties • Invest in a property fund which gives you exposure to a range of assets. These may include property company shares or commercial property, such as offices, shopping centres and warehousing The articles featured in this digital magazine are for your general information and use only and are not intended to address your particular requirements. They should not be relied upon in their entirety. Although endeavours have been made to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No individual or company should act upon such information without receiving appropriate professional advice after a thorough examination of their particular situation. For more information please visit Leave a Reply
After they are prepared in this manner they have to be reheated to a welding temperature, placed under a steam hammer and welded, this last operation requiring 30-40 minutes. (0. K. Stewart.) (6) Although large structures of wrought iron and of mild steel commonly have their parts united by bolting or by riveting, and although much ingenuity has been expended in so arranging and proportioning riveted joints as to obtain, in the joints, the greatest percentage of the strength of the material, nevertheless, cases occur in all structures where the union of these metals by welding becomes almost a necessity, or if not a necessity, a matter of con* venience and economy. Wrought iron, in addition to its many other merits, has the merit of being, par excellence, the weldable metal; mild steel also possesses this merit, but nevertheless there is always a feeling of doubt about a weld, although welds are of necessity largely trusted. No better illustration of this can be given than that of a common chain, each one of its manifold links having a separate weld. In the early days of making suspension bridges, the links, unless the wasteful process of cutting away a large portion of the bar was resorted to, were made by forming the eyes separate from the bar, and by welding them on. To obviate these difficulties, as long ago as 1845, Howard devised a plan which, while avoiding the necessity of welding on the eyes, avoided also the waste of material before alluded to. Within the last few years a plan of "upsetting " the ends of the bars by mechanical means, so as to obtain the requisite material for the formation of the eye, has been introduced in the United States. All hough imperfection in a weld may arise from insufficient heat, or indeed from an excess of heat, or from the application of inadequate power to bring the heated surfaces together, probably by far the greater proportion of defective welds arises from the presence of some foreign body between the surfaces to be welded, or, as it is expressively called, "dirt" of some kind or another. Attempts have been made to obviate these difficulties by employing gaseous or liquid fuels, and, in rare cases, by the removal of the oxide of the metal from the surfaces, by turning or planing. The welds that were successively employed for the welding of railway tires in the days prior to the present system of making these tires by continuous rolling, and in the hoop form, comprised an ordinary scarf weld, bird-mouth welds in both directions, single-wedge welds, and double-wedge welds. In all these cases hammering was employed; but for carriage tires, at all events, the butt-weld was used. In the early days of wrought-iron ordnance, where it was desirable to have in one piece a wrought-iron tube, so long in relation to its diameter that it would have been difficult to have welded it up as a single coil, it was made by welding two coils together, each of about half the length of the desired tube. It need hardly be said that every one of the modes of heating employed involved that the heat should proceed from the outside inwards. There were also the chances of inadequate heat; of an excess of heat; and, as has already been stated, of the presence of " dirt " in the weld. Moreover, there was the difficulty of ascertaining to what state he heat had attained; commonly in small welds the pieces were withdrawn from the fire, with the consequent risk of picking up " dirt" during re-introduction. Among the desiderata for heating for welding purposes, the mode adopted should admit of uniform heating throughout the sectional area to be welded; it should admit of absolute regulation of the heat; it should be free from the possibility of introducing either particles of fuel or gases between the welding surfaces, and it should admit also of complete inspection during the time the heating is going on. All these desiderata are afforded by electrical heating. As regards the power of an electric current in passing through substances to develop heat, the most familiar instance is probably that of the carbon filament of an incandescent lamp, now so largely used in theatres, in clubs, and in private houses. It is common knowledge that electrical energy is compounded of electro-motive force or potential, or preferentially "pressure," multiplied into the amount of the current, or the pressure multiplied into the quantity. Whenever this electrical energy has to pass through a conductor, the resistance of that conductor to its passage destroys a certain portion of the electrical energy, which energy so destroyed reappears in the form of heat, and must appear in the very conductor which has been the cause of the destruction of the electrical energy. Therefore the amount of heat produced must be. that which was the thermal equivalent of the electrical energy destroyed. What the temperature would be, and in most cases it was the temperature reached by the conductor, as the result of the passage of a given quantity of current, which is of importance, depends not only upon the heat-units produced, but upon other considerations. Although electric energy is represented by the multiplication of the pressure into the current, it will be found that the heating effect of any given current is independent of the pressure, and that the heat produced is in proportion to the current employed. As regards the heating effect of any given current upon different materials, if there were an absolutely perfect conductor, which offered no resistance to the passage of an electric current, no amount of electrical energy could heat it, because no extent of conductor could destroy any part of that electrical energy. On the other hand, in the case of a material absolutely impermeable to an electrical current, it need hardly be said that no heating could result, as no current could pass. Fortunately, the materials commonly welded, iron and steel, hold a very happy position as conductors in the scale of metals for the purpose of being electrically heated. The electrical resistance of metals increases, however, with an increase in their temperature. This question of the increase of resistance due to increase of temperature has been investigated by Dr. Hopkinson, and the results obtained have been published in the Philosophical Transactions for the year 1889. This increase of resistance to the passage of the current, as the temperature increases, is of great utility in electrical welding. Consider the two ends of bars to be welded; mere ordinary rough surfaces; the first contact is made upon numerous points, through these the current passes, and they become rapidly heated, and offer more and more resistance. As endway pressure is applied, the surfaces in contact become of larger and larger area, until all are heated up uniformly. The greater current seeks those parts which, although in contact, are at a lower temperature, and this goes on until contact and uniform temperature are obtained. Having regard to the fact that the particular form of electrical energy needed for imparting heat is that of large current and low pressure, it will be seen that there is very great difficulty, amounting almost to a commercial impossibility, of transmitting electrical energy in such a form over any but very short distances, for, unless the conductors were of enormous size, they themselves would be Injuriously heated by the passage of the current; and, moreover, the preasure required to drive these large currents through any considerable length of conductor would be so large a percentage of the working pressure at to add very greatly to (be power required. For these reasons it is desirable that the electrical energy "hould only take the form of large cuireat and low pressure in the very neighbourhood of the welding-machine itself. In all probability the great use of electric welding-machines would be for uniting pieces of special and difficult form, and for dealing with refractory metals - refractory in the tense that they do Dot lend themselves to successful welding by any of the ordinary processes. At the Crewe works one of tbese welding machines Is in use, shutting on eyes to screwed rods of some 7/8 in. diameter; the weld is made close np to the screw, which is in no way Injured in the process. It has also been employed to weld ends to tubes, to weld together the parts of twist drills which have been broken, and to weld materials. It is obvious that a machine that gives, the power of heating any material with an absolutely controllable heat, and that enables that heat to be inspect- .1 and to be communicated without the advent of impurities, must have many uses in the arts, in preparing p;rres for brazing, for stamping, and m a variety of other ways; in fact, there can be no doubt that the exist-ence of such a machine will itself give rise to a large number of new uses. (Sir F. Bramwell.) (c) The reason for which machines have been invented, has been for the purpose of reproduring faithfully and constantly a set of conditions necessary to obtain a certain result. When the conditions in any case are few, and the product simple, generally one design of machine will be sufficient. With an Increased Dumber of conditions, how ever, the compleiity of the apnaramany casea, subdivisions into different processes to be executed by separate machinery. What constitutes skill in a working man, for instance, is the ability co-ordinately to reproduce a number of operations or movements; to be, in other words, a perfect machine, or to produce the tame result, even if other conditions than those previously contemplated should arise. Electric welding apparatus. Electric welding apparatus. To secure uniform results in the practice of a difficult operation, there are two ways possible. 1. To employ skilled help for the complex portion of the work alone. 2. To substitute for the more complex portion of the operation, one more readily controlled. The ordinary welding process requires the greatest skill at the hands of the blacksmith for heating the metals to the proper temperature and at the right spot, while preventing the accumulation of cinder or scale. While skill may be successful with metals of high melting points and low conductivity for heat, easily fusible metals, aud especially good conductom, baffle all attempts as long as an exterior heating source is The electric welding process has not only made it possible that operators not particularly skilled in the art of blacksmithing can produce good substantial welds, hut has created an art equally adaptable to all metala and combinations of metals. The following are all the metala, alloys, and combinations so far actually welded with success by the Thomson
Q is for … Quantum computing You probably know by now that typical computers function by using 1s and 0s, using binary maths. The transistors in them are either off (0) or on (1), with data being held as binary digits (bits). In quantum computing, quantum mechanics form the basis of the machine. Rather than bits and bytes, quantum computers use quantum digits (qubits). I have to confess that I don’t understand the maths involved, but the two things to bear in mind are these: • There are more than just 1s and 0s: qubits can be in multiple states at the same time • Viewing the state of a qubit changes it • What these mean is that quantum computers have the potential to be incredibly fast, but it’s difficult to make use of their multiple states because looking at their state changes them. • Some organisations eg IBM have built small prototype quantum computers, but the technology is in its infancy. It will probably be several years before this sort of processing becomes commercially available. • When they are finally built, processing speeds will be massively increased, which also means that existing cryptography techniques will be at risk because even brute force attacks will be able to be carried out so much faster. A new form of quantum cryptography will have to be developed and implemented. • E is for… The process of scrambling a message or data as part of cryptography is called encryption. This is what makes the message impossible to read unless you know how to unscramble it using decryption. As the years have gone by this process has become more and more complicated, and there is heavy reliance on computing power and very advanced maths to make it work without risk of the message being compromised. You may often hear the phrase endpoint when talking about computer equipment. The term refers to devices such as laptop and desktop computers, smartphones and tablet devices ie things which the end user uses to access data. Code written to take advantage of vulnerabilities in software is known as an exploit. It may be used to inject code, to run a different program, or to cause other damage to the system. An extranet is a controlled network environment which is used to give non company staff members access to company resources (for example, data files) typically through some sort of remote access solution. D is for… Dark Web Most of us are familiar with the Internet, and using search engines such as Google and Bing to find information we need. Those operate in a part of the World Wide Web that is often called the Surface Web. It seems like we can find a huge amount of data on the surface web, but in actual fact it’s only about 5% of all material that is available online. A large portion of the remaining data is found on the Deep Web – see below – but there’s a very murky area which is hidden away and can only be accessed by using special web browser software, the most well known being The Onion Router, or ToR. Most users will never have cause to visit this area, because it’s where various illegal web sites / services are found, including drugs, stolen goods, child abuse, false identity documents, counterfeit money etc. It’s therefore an area where criminals globally congregate to deal in and share their services. Data Centre A data centre is typically a large room – or set of rooms – with multiple servers in it. It can vary in size from one room with a few racks of servers, to a site with many thousands of servers. Typically they will have redundant power supplies, some form of backup solution, and will often provide services to multiple companies at the same time. Some organisations will run their own data centres, some will outsource their services to a Third Party, and some will operate a mix. Data centres are typically where cloud services live. Companies such as Microsoft, Google and Amazon offer multiple data centres across most of the continents. Distributed Denial of Services (DDoS) are a method of attack on a company’s services (typically internet based, like web sites or file sharing). They are carried out by multiple internet connected devices including PCs, laptops and IoT machines, often using botnets. The word Distributed is used to signify that the devices are spreads around, possibly even al over the globe. When a DDoS attack is carried out, the target is overwhelmed by multiple messages being sent from all the devices in the botnet, to the extent that it is rendered unusable. A way of thinking of this is if you have a crowd of people trying to get through a door. If they move one at a time through the door, there’s no problem. If everyone tries to get through the door at the same time, it will become blocked and take time to become unblocked. Deep Web As mentioned above in Dark Web, the Deep Web makes up a huge proportion of the World Wide Web. The sites in this area are not indexed, which means they can’t be found by search engines like Google and Bing, but that doesn’t mean that they are providing illegal services. Deep Web sites are typically where you can find information that isn’t really for public consumption, but which is used by special interest groups. This will include research groups, academic communities, file sharing sites etc. Users access the sites only if they know the exact address, but can use standard browsers such as Internet Explorer and Chrome – other browsers are available. Decryption is how cryptography makes messages readable again after they have been encrypted. Depending on how data is encrypted, decryption may happen automatically, or you may have to carry out a specific routine using special software. Disaster Recovery Disaster Recovery (DR) is most commonly seen as the provision of the IT part of a Business Continuity Plan. It’s about getting your IT systems back up and running within set timescales in order to enable key resources to work as normal. For example, if you’ve planned to move to an alternate location in the event of an outage with your business, your DR solution will probably include appropriate network connections, having enough desktop or laptop devices available and having the relevant data and software available from the alternate location. It’s not uncommon for businesses to run tabletop exercises to work out who would do what in the event of a problem, but it’s also a good idea to actually test that the plan works. For example, if your DR plan is to have 20 people up and running within 4 hours at the alternate site, but there are only 10 devices available for them to use at the site, then your plan will fail. It’s important to note that when testing your plan, things not working are good things to find. It’s better to find that out during a test than when you actually need it. Denial of Service (DOS) is similar to DDoS, but instead of being based on multiple devices acting concurrently, is based on a single device. That single device will send multiple messages consecutively at a very high rate, with the aim of overloading the target device. C is for… We don’t really hear this term very often any more, but it refers to probably the most common form of network cabling in offices and homes over the last 15-20 years. It’s the cable you may connect from your home router to your laptop if you don’t use Wi-Fi – it’s almost certainly been provided with the router and you may have left it in the box. The picture below shows the ends of a CAT5 cable. Recognise it? CIA Triad This is a common term used to refer to the three main pillars of information security, Confidentiality, Integrity and Availability. Information Security is all about addressing these three topics when applied to data. “The Cloud” is a term used by many, and the common reference for it is “someone else’s computer”. That’s a pretty good explanation, in that cloud services are provided by a range of companies where they have buildings housing lots of servers, and you effectively rent out one or more of those servers. The benefits are that you don’t have to manage the servers, procurement of parts or maintenance. You don’t have to worry about ensuring the power is always on and quite often your backups are done for you. You can also generally flex storage space up and down as you need it, rather than having to own lots when you don’t always use it. Cloud can therefore seem quite attractive from a cost point of view. The disadvantages – which are actually things you need to ask about – are that you don’t know who has access to your physical servers, you don’t know who you’re sharing server space with, and you don’t necessarily know which country your data is being held in. You therefore need to have a good handle on the security of data, and make sure your Governance / audit processes take this into account. Part of the CIA triad, confidentiality is concerned with making sure only authorised people have access to data. For example, you would not want just anyone to be able to read your medical records: your doctor’s surgery or hospital will keep that information confidential. Put simply, cryptocurrency is an electronic form of currency which is not regulated, managed or overseen by any banks or governments. Based on cryptographic techniques, it uses blockchain technology to validate every transaction. There is no single point of control. Some stock exchanges and banks are starting to recognise the various currencies, such as Bitcoin, Ripple and Ethereum, and to actively trade in them, while others are banning cryptocurrency altogether. At the time of writing this article, values for the various currencies have been fluctuating massively and it’s likely that they will take some time to settle down. Cryptography is all about scrambling data to make it unreadable or impossible to understand without first unscrambling it. The technical terms for these processes are encryption and decryption. Many methods have been used over the years to encrypt data. Manual manipulation of messages eg using one time pads (as the name infers, these were sheets of paper which were to be used only once: messages were scrambled using the random set of letters on the pad and the recipient would have to be using the same pad to decrypt the message) has been done for at least 2000 years or more. Computers have been increasingly used for this process in the last 70 years. Enigma was a machine used by the Germans in WW2 to securely swap messages and was the name given to the code which was broken by Polish mathematicians in the 1930s and again by a team led by Alan Turing at Bletchley Park during the war, as dramatised in the film The Imitation Game. Later in the war, a code called Lorenz was broken using a machine devised by Bill Tutte and built by Tommy Flowers. The machine was called Colossus and was the first real computer in the world. It was destroyed after the war and its creation kept secret until many years later, so an American invention in the late 1940s called ENIAC has until recently been thought to be the first computer. Modern cryptography relies on complicated maths and massive processing power, which can only be provided by computers. Techniques are continuously evolving, and manual cracking of codes is nigh on impossible now. We all use the term, but what exactly is cyber? There are many different definitions, all of which are right. The most basic is probably “something to do with computers”. It’s important that all people in a business share the same definition, so you all know exactly what you mean by the term. I believe that in 5 to 10 years we won’t be talking about cyber- anything. Cybersecurity, cyberwarfare etc will have lost the prefix and we’ll just be talking about security, warfare etc. B is for… I’ve talked about these in a previous post, but essentially backups are copies of your data or computer which you can use to replace files which are inadvertently deleted, or as an alternative to paying the ransom in a ransomware attack. You should make backups on a regular basis, whether by simply copying your important files to another hard drive or perhaps a USB stick, or using specific software for backups. The really important bit is this though: once your backup is complete, disconnect the backup media from your computer. If your computer is encrypted in a ransomware attack and your backup media is still attached, your backup likely to be encrypted too. When trying to decide what to backup, think about what files at most important to you, about those which you really can’t do without. That’ll probably be financial information, including mortgage and insurance, but think about your photos and videos too. Put another way, if your house was on fire what would you save first, once family and pets were safe? Biometrics are used as a form of authentication. They sound really technical, but all they really mean is a physical part of your body which is unique to you. That means fingerprints, palm prints, scans of your retinas and other unique factors which you’ve probably seen in spy movies etc, like ear prints. Some mobile devices eg the latest iPhones already use fingerprint recognition, so it’s not entirely all Hollywood make believe! Probably the best known cryptocurrency, the value of Bitcoin soared towards the end of 2017, but many financial experts believe that this is a bubble which will burst soon. Created by someone called Satoshi Nakamoto – no-one knows who that really is – there can only ever be 21 million Bitcoins. Each Bitcoin can be split into 100 million units, known as a satoshi. The process of creating bitcoins is based on cryptography and maths, and is called mining. Black Hat hacker Taken from the old western movies, a black hat hacker is one of the bad guys. They’re the ones trying to break into systems without permission, probably either to steal data or to cause damage to the organisation. They’re the ones you are most likely to hear about in the news, often with a White Hat hacker talking about what they’ve done. (White Hats are the good guys, and there are also Grey Hats which we’ll cover later in the year.) Block chain Blockchain is the technology used to create cryptocurrency, but in future it will be used for much more. If you think of blockchain as a sort of bank account where every transaction is visible to everyone in the world, where it is possible to track the origin and path of every piece of currency since the currency began, but without knowing who owns each account, that’s pretty much the principle behind it. The first ever transaction contained details of how much was spent and what account number (technically, which wallet) it went to, as well as the date and time, along with some other information. All the details were encrypted into one block. The second transaction did much the same, but also which wallet the transaction originated in and where it ended up. When encrypted it also included the details from the first block. The third transaction was the same, but on encryption it included the first and second block. And so on – that’s how the blockchain was born. One of the benefits of blockchain is that each transaction is validated by all other participants, so it is pretty much impossible to falsify a record: fraud is therefore unlikely, and provenance has an unbroken chain. This is useful in cryptocurrency, but has many other uses too. For example: • When buying a house, wouldn’t it be great to have a complete list of every transaction ever carried out from land purchase to addition of a conservatory or work to fix a problem with rot, which could not be falsified. • When new drugs are created to treat specific illnesses and diseases, think about how beneficial it would be to hold details of all tests and their results as part of the proof that they work, and which cannot be tampered with. When a device has been compromised, it may be used to attack other computers over the Internet. When this is the case, it is said to be running as a bot (like a robot). When multiple bots are used to carry out a simultaneous attack, or to run in a similar way, this is called a botnet ie a network of robots. Business Continuity Often used almost synonymously with Disaster Recovery (DR), Business Continuity is all about making sure that your business can carry on working in the event of an issue eg power cut, loss of data, flooding. It’s not all about cyber, though cyber is a constituent part. Most commonly people talk about Business Continuity Planning (BCP) which is all about determining, documenting and testing how you will react to something that affects your business. For example, you may have an alternate site for people to work from, or they may be able to work from home, but how do you tell people that’s what they need to do? How do you know that they will be able to access systems from the alternate location? How do you know they will have access to all the software and data they need from that alternate location? A key part of BCP is understanding who your key assets are, and what they need to do their job. You also need to understand the impact to your business if various components are unavailable, and how long you can afford to not be working. For example, if your business only provides services through the internet, having no internet access for several days could kill your business: your BCP will set out what you will do to get back online quickly. It’s not uncommon for businesses to run tabletop exercises to work out who would do what in the event of a problem, but it’s also a good idea to actually test that the plan works. For example, if your BC plan is to have 20 people up and running within 4 hours at the alternate site, but it takes more than 4 hours to travel to the site, then your plan will fail.
forced arbitration The Growing Threat of Forced Arbitration To protect the ability of both plaintiffs and defendants, the 7th Amendment was included in the Bill of Rights in the Constitution. This Amendment grants citizens that “the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.” This means that consumers, employees, and other parties who may have a dispute have the right to pursue a claim in Court. If a person is cheated by a company, or is hurt through negligence, they have legal recourse to present their case in front of civil courts, which uphold the law and have the means to enforce their rulings. However, an alarming trend among many companies is the practice of including forced arbitration in their contracts. Arbitration is a means of settling a dispute out of Court. Typically, both parties present their cases to an arbitrator or panel of arbitrators, who decide on the outcome. Many consumer contracts, such as those signed by customers when they sign up for services with companies like Verizon, Comcast, Ticketmaster, or Netflix, now include a clause that states that any disputes must be handled through arbitration, forfeiting the right to pursue the issue in Court, to participate in a class action suit, or to appeal any decisions. This detail is usually hidden in copious amounts of fine print, and most individuals do not even know that it’s been included. The right to sue or pursue compensation in various situations is guaranteed through legislation such as the Credit Repair Organization Act, but the U.S. Supreme Court has already established in the 2012 case of CompuCredit v. Greenwood that this only means than an individual must have some general forum to dispute their claims, not necessarily a U.S. Court. For many companies, customers are locked in to the only form of arbitration chosen by the company. Despite opposition from many groups, these forced arbitration clauses are finding their ways into more and more contracts, from phone service providers to employment contracts. Customers and workers are losing their rights to sue for negligence, defective products, discrimination, and abuse through signing away any recourse in the court systems. While the effects and scope of forced arbitration continue to develop, it is imperative that each individual carefully review any contract before signing. You could be signing away more than you intended.
Too close to be true. VR images bring the visible speaker into your face (literally). In Virtual Reality (VR), images of persons are displayed closer to the viewer than ever before. Therefore, images of strangers can come much closer into the experiences and private sphere then in accustomed socio- cultural interactions or in “conventional” moving images. Each micro movement of the face is visible in focus, allowing to read the face of a virtual person in greater detail than ever permitted in conventional distances in the real non-virtual reality. The sensation of immersion in VR changes the way the images are depicted compared to regular moving images. The bodily representations of a virtual person differ depending on the distance of the image- framing. Thus distance affects how vision and sensorimotor interaction are anchored into somatic, mental and neural processes – into an embodied perception. Accordingly, images not only affect the visual and kinesthetic imagery but also influence the way of thinking, analyzing and understanding something or someone, and VR adds a new dimension to all those cognitive processes by enabling extreme close-ups impossible on a common screen. An unconventional immersive close-up of a person can intimidate through the unfamiliar, extremely short interpersonal distance, as the speaker is just too close to be true. Darmstadt, Germany, 2016
Basenji with Blue Eyes?  When bringing a new pet home, especially a dog, it is common for us to get carried away by its physical appearance more than anything else. In this article, we will talk a little about Basenjis and a very peculiar and unusual characteristic related to the color of their eyes.  Basenji breed canines are amazing animals, particularly if you have one as a pet. These dogs are extremely friendly, especially with their masters and human family members.  The coat of these dogs is short, fine, dense, and lustrous. Their hair comes in a variety of colors and hues, including black, white, red and white, black and tan, brindle, tan and white, and so on. It could also have white markings on its legs, chest, and tail tip, as well as red markings on its nose and cheeks.  The standard eye color of a Basenji ranges from dark hazel to dark brown. However, there are certain Basenjis that can have blue eye color, although that is rare. A curious fact is that this phenomenon occurs in only one eye, not in both. It should be noted that the color is not exactly blue but rather has a light tone that gives a bluish perception.  Theoretically, there should be no Basenjis with blue eyes because it is not the standard color for this breed. That said, there is no hard evidence that allows us to know why a Basenji can have a light eye color. However, due to various investigations, we can determine two reasons why this occurs:  The Basenji is Not Purebred  That could be one reason why your Basenji has that shade of color in its eye. The canine you purchased from a breeder or store may not be purebred. It probably has an offspring in which its parents or grandparents were crossed with other breeds of dogs.  The only way to determine it would be by testing the DNA of several of its ancestors, which would be quite complicated.  Persistent Pupillary Membrane (PPM)  In the basenji breed, PPM is a very prevalent condition. It’s an iris anomaly that’s usually congenital and common in these dogs. It occurs when the embryonic pupillary membrane fully covers the lens to deliver nourishment during ocular growth, resulting in a deformity.  The eyes of a Basenji pup are a bluish color when they are born. The fetal membranes that cover the eyes generate this tint. The membranes break down as the pup develops, and by four to five weeks of age, they are usually gone. When these membranes don’t really disappear, they are referred to as PPMs. There are numerous forms of PPMs:  • Iris Sheets  • Iris to Lens  • Iris to Cornea  • Iris to Iris  Apart from the Basenji, there are other breeds that can inherit this disease:  • Alaskan Malamute  • Basset hound  • Cocker spaniel  • Poodle  • Samoyed  • Scottish Terrier  • West Highland Terrier
Arrhenius' law is a law that describes the kinetics of a chemical reaction as a function of temperature. It was enunciated by Svante August Arrhenius in 1889. However, this law is an empirical law even though it has been verified experimentally on numerous occasions. • k, being the speed coefficient • T, the temperature in degrees Kelvin (K) • R, the perfect universal gas constant (i.e. 8,314 J.mol-1.K-1). • Ea, the activation energy in joules per mole (J.mol-1) This law can be simplified as follows when the activation energy is not dependent on temperature. This law makes it possible to conclude the following points: • The higher the temperature, the greater the kinetics of a reaction. This evolves even exponentially, generally speaking, an increase of 10 K (or 10°C, it is equivalent in this case), can multiply the kinetics of the reaction by 2 or 3. • The lower the activation energy of a chemical reaction, the faster the kinetics of the reaction. • At absolute 0, the kinetics of the reaction is zero and it does not occur. Did this answer your question?
Units of Measurement Wiki This page uses content from the English Wikipedia. The original article was at SI. The list of authors can be seen in the page history. As with the Units of Measurement Wiki, the text of Wikipedia is available under Creative Commons License see Wikia:Licensing. The International System of Units (abbreviated SI from the French language name Système International d'Unités) is the modern form of the metric system. It is the world's most widely used system of units, both in everyday commerce and in science. Cover of brochure The International System of Units The older metric system included several groupings of units. The SI was developed in 1960 from one of these, the meter-kilogram-second (MKS) system, rather than the centimeter-gram-second (CGS) system, which, in turn, had many variants. The SI introduced several newly named units. The SI is not static; it is a living set of standards where units are created and definitions are modified with international agreement as measurement technology progresses. With few exceptions (such as draught beer sales in the United Kingdom), the system is legally being used in every country in the world, and many countries do not maintain official definitions of other units. In the United States, industrial use of SI is increasing, but popular use is still limited. In the United Kingdom, conversion to metric units is official policy but not yet complete. Those countries that still recognize non-SI units (e.g. the US and UK) have redefined most of their traditional, non-SI units in terms of SI units. See main articles: meter, kilogram, second, ampere, Kelvin, and candela. The metric system was officially adopted in France after the French Revolution. During the history of the metric system a number of variations have evolved and their use spread around the world replacing many traditional measurement systems. By the end of World War II a number of different systems of measurement were still in use throughout the world. Some of these systems were metric system variations whilst others were based on the Imperial and American systems. It was recognised that additional steps were needed to promote a worldwide measurement system. As a result the 9th General Conference on Weights and Measures (CGPM), in 1948, asked the International Committee for Weights and Measures (CIPM) to conduct an international study of the measurement needs of the scientific, technical, and educational communities. Based on the findings of this study, the 10th CGPM in 1954 decided that an international system should be derived from six base units to provide for the measurement of temperature and optical radiation in addition to mechanical and electromagnetic quantities. The six base units recommended were the meter, kilogram, second, ampere, Kelvin degree (later renamed the kelvin), and the candela. In 1960, the 11th CGPM named the system the International System of Units, abbreviated SI from the French name: Le Système International d'Unités. The seventh base unit, the mole, was added in 1970 by the 14th CGPM. The International System is now either obligatory or permissible throughout the world. It is administered by the standards organisation: the Bureau International des Poids et Mesures (International Bureau of Weights and Measures). Main articles: SI base unit, SI derived unit, SI prefix The international system of units consists of a set of units together with a set of prefixes. The units of SI can be divided into two subsets. There are the seven base units. Each of these base units are dimensionally independent. From these seven base units several other units are derived. In addition to the SI units there are also a set of non-SI units accepted for use with SI. SI base units Name Symbol Quantity kilogram kg Mass second s Time meter m Length ampere A Electrical current kelvin K Temperature mole mol Amount of substance candela cd Luminous intensity A prefix may be added to units to produce a multiple of the original unit. All multiples are integer powers of ten. For example, kilo- denotes a multiple of a thousand and milli- denotes a multiple of a thousandth hence there are one thousand millimeters to the meter and one thousand meters to the kilometer. The prefixes are never combined: a millionth of a kilogram is a milligram not a microkilogram. SI writing style[] • Symbols are written in lower case, except for symbols derived from the name of a person. For example, the unit of pressure is named after Blaise Pascal, so its symbol is written "Pa" whereas the unit itself is written "pascal". The one exception is the liter, whose original abbreviation "l" is dangerously similar to "1". The NIST recommends that "L" be used instead, a usage which is common in the U.S., Canada and Australia, and has been accepted as an alternative by the CGPM. The cursive "ℓ" is occasionally seen, especially in Japan, but this is not currently recommended by any standards body. For more information, see Litre. • Symbols are written without grammatical markers when used with singular numerals: i.e. "25 kg", not "25 kgs". Pluralization would be language dependent; "s" plurals (as in French and English) are particularly undesirable since "s" is the symbol of the second. Other cases may be marked in a language-dependent manner, e.g. Finnish 25 kg:lla = 25 kilogrammalla "with 25 kg". • Symbols do not have an appended period (.). • It is preferable to write symbols in upright Roman type (m for meters, L for liters), so as to differentiate from the italic type used for mathematical variables (m for mass, l for length). • A space should separate the number and the symbol, e.g. "2.21 kg", "7.3×102 m2", "22 °C" [1]. Exceptions are the symbols for plane angular degrees, minutes and seconds (°, ′ and ″), which are placed immediately after the number with no intervening space. • Spaces should be used to group decimal digits in threes, e.g. 1 000 000 or 342 142 (in contrast to the commas or dots used in other systems, e.g. 1,000,000 or 1.000.000). • The 10th resolution of CGPM in 2003 declared that "the symbol for the decimal marker shall be either the point on the line or the comma on the line". In practice, the full stop is used in English, and the comma in most other European languages. • Symbols for derived units formed from multiple units by multiplication are joined with a space or centre dot (·), e.g. N m or N·m. • Symbols formed by division of two units are joined with a solidus (/), or given as a negative exponent. For example, the "meter per second" can be written "m/s", "m s-1", "m·s-1" or . A solidus should not be used if the result is ambiguous, i.e. "kg·m-1·s-2" is preferable to "kg/m/s2". Spelling variations[] • Several nations, notably the United States, typically use the spellings 'meter' and 'liter' instead of 'metre' and 'litre' in keeping with standard American English spelling. In addition, the official US spelling for the SI prefix 'deca' is 'deka'. • The unit 'gram' is also sometimes spelled 'gramme' in English-speaking countries other than the United States, though that is an older spelling and its use is declining. Cultural issues[] The swift worldwide adoption of the metric system as a tool of economy and everyday commerce was based mainly on the lack of customary systems in many countries to adequately describe some concepts, or as a result of an attempt to standardize the many regional variations in the customary system. International factors also affected the adoption of the metric system, as many countries increased their trade. Scientifically, it provides ease when dealing with very large and small quantities because it lines up so well with our decimal numeral system. Cultural differences can be represented in the local everyday uses of metric units. For example, bread is sold in one-half, one or two kilogram sizes in many countries, but you buy them by multiples of one hundred grams in the former USSR. In some countries, the informal cup measurement has become 250 mL, and prices for items are sometimes given per 100 g rather than per kilogram. A profound cultural difference between physicists and engineers, especially radio engineers, existed prior to the adoption of the meter-kilogram-second (MKS) system and hence its descendent, SI. Engineers work with volts, amperes, ohms, farads, and coulombs, which are of great practical utility, while the centimeter-gram-second (CGS) units, which, though appropriate for theoretical physics, can be inconvenient for electrical engineering usage and are largely unfamiliar to householders using appliances rated in volts and watts. People with diabetes test their plasma glucose level regularly. In the U.S., measurement are recorded in milligrams per deciliter (mg/dL); in Europe, the standard is millimole/liter (mmol/L). The fine-tuning that has happened to the metric base units over the past 200 years, as experts have tried periodically to refine the metric system to fit the best scientific research do not affect the everyday use of metric units. Since most non-SI units, such as the U.S. customary units, are nowadays defined in terms of SI units, any change in the definition of the SI units results in a change of the definition of the older units as well. See also[] External links[] Pro-metric pressure groups Pro-customary measures pressure groups Further reading[] • I. Mills, Tomislav Cvitas, Klaus Homann, Nikola Kallay, IUPAC: Quantities, Units and Symbols in Physical Chemistry, 2nd ed., Blackwell Science Inc 1993, ISBN 0632035838.
Associations to the word «Anemia» ANEMIA, noun. (American spelling) (uncountable) (pathology) A medical condition in which the capacity of the blood to transport oxygen to the tissues is reduced, either because of too few red blood cells, or because of too little hemoglobin, resulting in pallor and fatigue. ANEMIA, noun. (countable) (pathology) A disease or condition that has anemia as a symptom. Dictionary definition ANEMIA, noun. A deficiency of red blood cells. ANEMIA, noun. A lack of vitality. ANEMIA, noun. Genus of terrestrial or lithophytic ferns having pinnatifid fronds; chiefly of tropical America. Wise words Leo Buscaglia
Featured Articles Interpretive Summary: Dietary zinc concentration and lipopolysaccharide injection affect circulating trace minerals, acute phase protein response, and behavior as evaluated by an ear-tag–based accelerometer in beef steers By Anne Zinn The National Animal Health Monitoring System estimates that bovine respiratory disease affects 21.2% of all beef cattle placed in feedlots. Bovine respiratory disease often affects cattle during the receiving period, which can involve many stressors; identifying morbid cattle early may lead to improved animal welfare through decreased morbidity and mortality and increased treatment efficacy. Symptoms of bovine respiratory disease can be mimicked using an injection of lipopolysaccharide and, due to the potential positive role of zinc in immune function, consulting feedlot nutritionists have recommended supplementing zinc with dry matter. This requires further research. A paper recently published in the Journal of Animal Science assessed plasma trace mineral concentrations, the acute phase protein response, and cattle behavior when given various doses of injected lipopolysaccharide and supplemented with either 30 or 100 mg Zn/kg dry matter. It was hypothesized that regardless of lipopolysaccharide dose, plasma trace mineral concentrations and blood cell populations related to the acute phase response would decrease, but that increased supplemental zinc would lessen the severity of these changes. Additionally, it was hypothesized that ear-tag–based accelerometers would detect illness behaviors, such as less time spent eating or ruminating in cattle treated with lipopolysaccharide. Overall, results of the present study suggested that increased supplemental zinc may alter the rate of recovery of zinc status from an acute inflammatory event. Additionally, ear-tag-based accelerometers used in this study were effective at detecting sickness behavior in feedlot steers, and rumination may be more sensitive than other variables. It is suggested that future work should evaluate proteins involved in transport and storage of trace minerals that would allow for a greater understanding of the mechanisms behind the lipopolysaccharide disruption of trace minerals homeostasis, which could potentially allow for more strategic trace minerals supplementation strategies for sick cattle.
Migraine does not cause stroke. However, there may be a link between the two. Sometimes a stroke can occur during a migraine attack. Migraine with aura can increase the risk of stroke, particularly in females. Symptoms of migraine and stroke can also overlap. In this article, we look at the link between migraine and stroke, symptoms, when to seek help, and treatment. a person with migraine is touching their headShare on Pinterest Robert Niederbrach/EyeEm/Getty Images A migrainous stroke, or a migrainous infarction, is a stroke that happens during a migraine attack. Although migraine does not cause stroke, people who have migraine with aura have an increased risk of stroke. If a migrainous infarction happens, it usually occurs during prolonged aura symptoms, although this is very rare. Stroke and migraine symptoms can overlap. Migraine with aura can also appear similar to a transient ischemic attack (TIA). During a TIA, a blockage temporarily stops blood flow to the brain and causes stroke-like symptoms. Symptoms of migraine with aura include: • usually last 60 minutes or less • visual disturbances, such as a bright crescent-shaped light with jagged edges that obscures some vision • tingling on one side of the body, from fingertips to the side of the face, that may last for around 5 minutes or longer Symptoms of TIA or stroke start suddenly and include: • loss of vision in one or both eyes • numbness or weakness in the body, usually on one side • confusion • dizziness or difficulty walking • severe headache People can use the acronym FAST to identify and respond to signs of a stroke: • Face drooping on one side • Arm weakness on one side • Speech unclear or slurred • Time to call 911 if people have any of the above symptoms Some types of migraine, such as hemiplegic migraine, can mimic stroke symptoms. Symptoms of a hemiplegic migraine include: • weakness or paralysis on one side of the body • feelings of numbness or pins and needles • visual problems • confusion • difficulties with speech • headache Symptoms of hemiplegic migraine usually come on gradually compared to stroke or TIA, which happen suddenly. According to the American Migraine Foundation, migraine with aura increases the risk of stroke. This may be due to a temporary narrowing of blood vessels. This can lead to the formation of blood clots which can cause a stroke. Among people who have migraine with aura, females have a higher risk of stroke. Around 25–30% of people with migraine experience aura. Aura is a set of sensations or sensory disturbances that happen just before a migraine attack. Aura may last between 20-60 minutes, and may include: • tingling sensation on one side of the body • seeing sparks, bright spots, or zig-zags in vision • being unable to speak clearly People may not have aura with every migraine attack. According to a 2020 review, other risk factors for ischemic stroke in people with migraine include: • female sex • being younger than 45 years old • use of oral contraceptives • smoking Males are three times less likely to have migraine than females, so risk factors are less clear. Stroke risk may increase if people: • have active migraine (a migraine attack took place within the previous 12 months) • have a high frequency of migraine attacks • are older adults who smoke • experience migraine onset later life There is currently no clear evidence that the severity of a migraine attack relates to the risk of an ischemic stroke. There is currently no clear connection between migraine and stroke. A 2020 review suggests that migraine increases the risk of diseases that affect the brain and blood vessels, such as stroke. Brain imaging has also shown a higher occurrence of brain lesions in people with migraine. People with migraine may also have more risk factors related to blood vessels. The review also suggests that the risk of stroke is higher in people with migraine who do not have any traditional risk factors for stroke. Stroke symptoms come on very suddenly, while migraine with aura usually develops more slowly. Although symptoms can overlap, migraine symptoms usually add sensations, while stroke takes them away. For example, migraine with aura symptoms can include tingling or seeing bright lights or shapes in line of vision. Stroke symptoms include weakness on one side of the body, difficulty speaking clearly, or droopy face. Hemiplegic migraine is a rare type of migraine that can also cause weakness on one side of the body. If people experience any new symptoms with migraine, they should seek immediate medical attention in case it is a stroke. To diagnose migraine, a doctor carries out a number of tests to check vision, reflexes, sensation, and coordination. It can also be helpful for people to keep a record of any symptoms they experience, lifestyle factors such as diet and sleep, and frequency of migraine attacks. A doctor will also assess any medication people are taking. To diagnose a stroke or TIA, doctors carry out a range of tests including: • MRI or CT scans to provide imaging of the brain • electrical impulse tests to show electrical activity in the brain • blood flow tests to look for any issues with blood flow to the brain According to a 2017 article, there are currently no clear guidelines for preventing stroke in people with migraine. People can take steps to help reduce the risk of stroke through lifestyle changes, such as: • controlling high blood pressure and high cholesterol • quitting smoking • maintain a healthy weight • for females who have migraine with aura, avoid using estrogen supplements or contraceptives containing ethinylestradiol People who have migraine with aura should get regular check-ups with a healthcare professional to evaluate their risk for stroke. Aiming to prevent migraine headaches may help. Certain medications may also help to reduce the severity and frequency of migraine attacks, such as: • beta blockers • candesartan, an angiotensin II receptor blocker • tricyclic antidepressants • CGRP monoclonal antibodies • topiramate and divalproex, which are anti-seizure medications • onabotulinum toxin A It is also important for people who have migraine with aura to recognize any warning signs. Changes to their aura, such as longer duration, increased frequency, or weakness in one side of the body, require medical attention. According to research, there is usually a good outcome for functionality in people who have an ischemic stroke that relates to migraine with aura.
Thomas Jefferson inherited his father’s plantation, slaves, and livelihood. Peter Jefferson was a planter, surveyor, county justice, member of the colonial Virginia legislature, and a loyal citizen of the British Empire. Jefferson’s mother, Jane Randolph Jefferson, belonged to one of the colony’s most prominent families. The intellectual and material character of his parents’ household at Shadwell shaped Thomas Jefferson in childhood and young adulthood. Peter and Jane Jefferson owned books, scientific and drafting instruments, fashionable furniture and table wares, over 7,200 acres of land, and 60 slaves. At Shadwell the young Jefferson learned the customs of an elite, slaveholding society while developing a great curiosity about the wider world.
Aseptic Technique By Kasper Møller, MD and Helene Rasmussen, BSN Nosocomial infections after surgical procedures can lead to morbidity and death. To reduce the risk of postsurgical nosocomial infections, all members of the surgical team must know the aseptic techniques and increase their focus on decontamination practices, hand hygiene, and behavioral precautions in and around the surgical suite. Hand transmission is a major factor in the spread of nosocomial infections and the surgeon must meticulously clean his or her hands, nails, and forearms to reduce the resident microbial count and inhibit the rebound growth of microorganisms.  Video made by Kasper Møller
Making every drop count Increasing levels of water stress are pitting the demands of business against individuals and country against country. How can we relieve water stress and protect the human right to water? 19th June 2019 Residents fill their containers with drinking water from a municipal tanker in New Delhi, India. Over two billion people live in countries experiencing high water stress. © Adnan Abidi/Reuters Making every drop count By Maria Helena Semedo, FAO Deputy Director-General for Climate and Natural Resources Water is one of our most precious resources. It is universal, crosses borders and nourishes all life. Water is a human right – we cannot live without it. Yet with global population growth, environmental degradation, climate change impacts, changing lifestyles and greater urbanisation, water risks becoming more and more scarce as demand for it increases. According to the United Nations World Water Development Report launched in March 2019, over two billion people live in countries experiencing high water stress. By 2050, global water demand is expected to increase by 20 to 30 per cent, while supply will dwindle alarmingly. Water scarcity is a complex issue for many reasons. An increase in the number of people on our planet and sweeping economic development is making water use grow twice as fast as compared to the last century. As the availability of fresh water decreases, we also see an increase in water demand from the agricultural, industrial and energy sectors. This struggle for balance is one of our greatest challenges. With this in mind, the international community committed to a specific Sustainable Development Goal (SDG) on water. SDG 6 aims to ensure the availability and sustainable management of water and sanitation for all. It underlines the urgency to better manage this key natural resource to reach the aspirations of the 2030 Agenda for Sustainable Development. Climate change isn’t making things any better. For every 1°C rise in global temperature, it is expected that 500 million people will face a 20 per cent decrease in the availability of freshwater resources. Dry areas tend to become drier, droughts tend to become more recurrent and severe, and coastal areas are more affected by seawater intrusion due to rising sea level. More frequent and intense extreme weather events have major impacts on water supply and food security, especially in already vulnerable rural areas. Cyclone Idai, which recently struck Mozambique, Malawi and Zimbabwe, affecting over 2.9 million people, is an example. The fury of these events can leave thousands of people without homes, decimating their crops and cutting off access to safe water. Competition for water is a strong social stressor and can be a major driver of migration. An average of 25.3 million people worldwide are displaced each year by sudden disasters. Water scarcity also threatens food security and nutrition, leading to conflicts and jeopardising livelihoods and ecosystems. Already, millions of family farmers in developing countries suffer from lack of access to fresh water. Agriculture is by far the most affected sector in periods of drought, leading to severe crop losses and reduced production that hit farmers and the rural population hardest. About 84 per cent of the economic impact of drought falls on the sector. Ensuring water security for millions of rural residents is vital to achieve the 2030 Agenda. Collectively, the world’s smallholder farmers feed the world but individually face repeated risks of food insecurity and malnutrition. The Food and Agriculture Organization of the United Nations (FAO) works with countries and partners to create stronger and more resilient rural communities, helping them to combat water scarcity and expand livelihood opportunities. Leaving no one behind requires increased attention to sustainable water management in agriculture, increased investment in water infrastructure and availability of safe drinkable water for all. It calls for actions such as water harvesting for irrigation, improved advisory services for water management, and developing drought preparedness plans. Good decision-making relies on reliable and timely information. Since 1960, FAO has been collecting, analysing and providing global information on water resources and agricultural water management through AQUASTAT, its global information system. AQUASTAT draws on national capacities and expertise with an emphasis on Africa, the Middle East, countries of the former Soviet Union, Asia, and Latin America and the Caribbean. It plays a central role in monitoring SDG 6 and, in particular, indicators on water stress and water use efficiency. But the pendulum swings both ways: agriculture suffers from water scarcity but is also a cause. Irrigated farming accounts for around 70 per cent of freshwater withdrawals to produce approximately 40 per cent of the world’s food on only 20 per cent of global cropland. Against this background, irrigated agriculture will remain important in the future, when we have to produce around 50 per cent more food by 2050 to feed a greater population. Therefore, it is essential for food production systems to use less water, and use it more efficiently. FAO, acutely aware of these challenges, promotes actions to produce more with less water and reduce losses in agriculture. The positive effects of promoting water use efficiency, water recycling and rainwater harvesting – combined with measures like selection of drought and salinity-resistant species and sustainable soil management – can lead to wider benefits. They can help tackle extreme poverty, hunger and malnutrition, and climate change. For instance, our ‘one million cisterns for the Sahel’ programme focuses on vulnerable rural communities in arid and semi-arid regions of five countries affected by climate shocks. Inspired by a similar programme implemented in Brazil, this initiative aims to give access to safe drinking water to millions of people across the Sahel. The idea is to improve families’ lives on a number of levels: to increase what they grow for nutrition and for income, to improve health and, ultimately, to build the resilience of millions of families, especially women. My home country, Cabo Verde, suffers from a dry and unpredictable climate and, like many small island developing states, limited access to fresh water. This exposes us to significant risks for the primary sector, especially agriculture. But despite the country’s arid climate, by adopting innovative technologies such as desalination, solar power energy, reuse of waste water for agriculture and even fog harvesting, 90 per cent of the population has access to potable water. This is an impressive figure. Actions and strategies must address water use, agricultural production, food security and climate change in an integrated manner. The FAO-led Global Framework on Water Scarcity in Agriculture (WASAG), launched during the UN Climate Change Conference in Marrakech in 2016, is bringing together leaders in water and agriculture to design such strategies. Last March, 47 countries adopted the Praia Commitment. This is aimed at promoting sustainable water management as a driver of development, maximising synergies across the 2030 Agenda. They are designed to support farmers, providing improved access to financing, innovative technologies and sound water management practices. While this kind of political leadership is crucial, there is much more that can be done, from modernising irrigation schemes to improving water supply systems to supporting water data and information systems. The tools are all at our disposal. We now need to take up the challenge, raise awareness and recognise that water is limited. We all need to use it wisely to make every drop count.
WOTUS replaced with the Navigable Waters Protection Rule A final rule defining and clarifying the scope of  “waters of the United States” federally regulated under the Clean Water Act has been published. This definition will increase the predictability and consistency of Clean Water Act programs, according to the Department of the Army, Corps of Engineers, and Environmental Protection Agency. Pictured here: Wildhorse Creek Wild and Scenic River in Oregon. Remember when you were a kid and you would calculate whether to ask your mother or your father depending on the answer you wanted? That is exactly what the Biden administration did with the definition of “waters of the U.S.” (WOTUS) under the Clean Water Act (CWA).  As of Sept. 13, there are two opposing court decisions regarding the effect of the Trump administration’s definition of WOTUS, followed by a Biden administration announcement picking which court it wanted to follow. On March 2, the 10th Circuit Court of Appeals ruled it did not have the jurisdiction to stop the enforcement of the former President Donald Trump WOTUS rule until there was a ruling on the merits of the case or President Joe Biden had legally issued a new rule. In stark opposition, on Aug. 30, a federal district judge vacated the enforcement of the Trump rule even before the Biden administration had a new rule to put in its place.  Thus, in contrast to the 10th Circuit’s decision, with the stroke of a pen, the Arizona judge vacated the application of the Trump rule throughout the nation. The decision is very frustrating. Normally, the previous regulation remains in place until it is replaced. However, instead of simply dismissing the case and sending the regulation back to the Environmental Protection Agency (EPA) and Army Corps of Engineers to revise, the Arizona judge, appointed by former President Barack Obama, issued a national vacatur of Trump’s WOTUS definition.  Her ruling brings up a major issue—should a federal district judge in Arizona, who does not have any jurisdictional authority outside of the state of Arizona, have the power to nationally end a legally adopted rule? Judge Rosemary Marquez’s ruling once again muddies the waters and allows the EPA and Corps of Engineers to arbitrarily enforce a law that could result in thousands of dollars in fines and jail time to a violator.  The CWA was passed in 1972 to protect WOTUS by making it illegal to discharge a pollutant into a WOTUS unless a permit was obtained. However, the law became mired in controversy when the federal agencies began charging people with CWA violations for discharging pollutants in waters that were never intended to be regulated, including irrigation ditches, stock ponds and isolated and seasonal wetlands.  The lack of a tangible statutory definition for a WOTUS has generated hundreds of cases to ascertain the span of the federal government’s jurisdiction. In turn, the CWA has a history of being weaponized to prevent development projects from moving forward and harassing farmers and ranchers.  Also, it is important to note that just because a body of water may not be defined as a WOTUS, does not mean that it is not protected. All waters not directly under the federal government’s jurisdiction usually fall into the state’s jurisdiction. For example, the Wyoming Department of Environmental Quality is the state agency tasked to protect Wyoming’s water quality.  By killing the Trump CWA rules, we are once again left in an impossible position because no one actually knows what a WOTUS is. Does the federal government have jurisdiction over your irrigation ditch? How about the bog down the street? In its pleadings before the court, the EPA identified 333 projects it believed it would have had jurisdiction over prior to the Trump rules.  Disturbingly, the Trump rule has only been in place for less than a year. Thus, Washington, D.C. will again arbitrarily insert itself into our lives. The situation surrounding the national demise of the Trump CWA rules begs an even bigger question. How does a single judge in Arizona have the power to invalidate legally enacted regulations for the entire nation? By allowing district court judges to invalidate regulations on a national scale, we are giving an undemocratically elected judge the ability to affect people outside of their jurisdiction.  It is particularly egregious when the 10th Circuit Court came to the opposite result. This unprecedented power encourages the worst kind of forum shopping in which organizations target specific judges to advance their radical agendas. In the past couple years, the Supreme Court has questioned the authority of district courts issuing nationwide injunctions. The hope is the Supreme Court finally puts an end to this form of radical lawmaking and forum shopping from the judge’s bench. — Conner Nicklas, Budd-Falen Law Offices LLC  What do you think? Load comments
computer – Overview This finally led to the creation of the tutorial fields of computer science and software engineering ; Both fields analysis software program program and its creation. Computer science is the theoretical analysis of computer and software program (Turing’s essay is an instance of computer science), whereas software program program engineering is the application of engineering and improvement of software. If you happen to’re not a gamer, you then undoubtedly could also be capable to skip the high-end graphics card. Modern CPUs, just like the Intel Core i7 Kaby Lake , can handle almost all graphic desires that a enterprise client might have. Irrespective of your specific use case, it’s not a foul idea to put money into a large amount of reminiscence to keep up your machine working easily, significantly when multi-tasking. It is a program to consider if you occur to enjoy combining technical and customer support skills in a wide range of business and office settings. Computer assist consultants working with these on-line distributors are licensed and have the experience wanted to provide you with computer help in your desktops, laptops, software program , hardware and peripherals. At current, they’re recognized to provide top-of-the-line service and help for a lot of computer purposes, technologies, and allied devices. Moreover, they go for the safest, easiest way to provide technical help proper over the online. As soon as the software program program is put in on the computer arduous drive , this technique can be utilized anytime by discovering this system on the computer. On a Home windows computer, a program icon is added to the Begin menu or Start display display , depending on your version of Windows. The newest industrial wi-fi safety customary is WPA2. WPA stands for Wi-Fi Protected Entry which is a certification program created by the Wi-Fi Alliance to point compliance with the safety protocol created by the Wi-Fi Alliance to safe wireless computer networks. Inside units are designed to be positioned contained in the computer at all times. Examples embrace onerous disk and solid state disk drives. On premise utility software program is carried out at an organization’s bodily location, leveraging the hardware, IT infrastructure, and assist of that group. The company’s IT department generally maintains and solves points associated to the software program. One of many COMPUTER’s biggest strengths is its extreme flexibility. There is a vast selection of hardware out there, of all completely different styles and sizes and makes and models—lots in order that even if your value vary’s not a priority, purchaser’s paralysis very properly could very nicely be. With the rise inside the number of computer users, there was a corresponding increase within the number of computer threats. Your computer might be infected by many viruses in case you’re a common client of the web & you use the Internet with none protection on your computer system. Software refers back to the packages your computer makes use of to carry out the actions you need it to. Be taught all about computer software program program, from Internet browsers to the newest working methods, with our explanations, critiques, movies and costs. The motherboard is on the middle of what makes a LAPTOP COMPUTER work. It homes the CPU and is a hub that every one totally different hardware runs by way of. The motherboard acts as a mind; allocating vitality the place it is wanted, speaking with and coordinating throughout all completely different parts – making it one of the crucial pieces of hardware in a computer. Computer hardware refers back to the bodily elements that make up the whole thing of a computer. Hardware consists of the electrical, mechanical, knowledge storage and magnetic parts amongst different parts. You know how it’s whilst you get a model new piece of LAPTOP hardware—it might very nicely be a CPU, a storage drive, or a gaming peripheral—and it just feels life-altering. And, after all, computers of every type run software program. Desktop computers, which we used to call non-public computers, are in all probability still the commonest sort of computer. Dearer and complicated computers, referred to as servers, moreover run software program program. Once you open a Net browser and kind in an handle, you connect with a type of servers. It’s just about inconceivable to do something with know-how proper this second with out using software program program. On a private stage I really feel the low charge I paid for the software program is essentially the most correctly spent money I’ve needed to make use of on-line. Most often, and until you have got accomplished your analysis, you can easily free a whole lot of money shopping for from the impulse of high quality product sales pitches. I am yet to watch the ultimate of the 3000 TV channels that include this software program and already I’m studying loads of international languages. Thanks.
Click here to Skip to main content 15,178,918 members Articles / Programming Languages / C# Posted 20 Mar 2006 22 bookmarked Stripping Accents from Latin Characters: A Foray into Unicode Normalization Rate me: Please Sign up or sign in to vote. 4.63/5 (19 votes) 20 Mar 2006Apache9 min read How to turn accented characters into ASCII for search purposes. Flattened French! We've come a long way from the world of 7-bit ASCII. In the beginning, the language of the PC was most definitely English, with a smattering of hard-to-find characters for a few Western European languages. Now the PC works in just about any language. The Unicode Consortium did some stunning work reconciling all of the many disparate standards, and Unicode is now part of the PC's basic plumbing. The .NET framework uses Unicode from the ground up, and its programming languages keep improving the ways they handle it. Representing language will never be completely trouble-free or automatic, but this is as good as it's ever been. Now that people can spell their names correctly and write in their own languages, the opposite problem comes up – how to normalize all the different (correct) spellings. The first question is: Why would you do such a crazy thing after people have gone through all the trouble to put in the correct accents? There's only one admissible answer, but that one answer is a very important one: "Searching". Divided by a Common Alphabet The Latin alphabet is used for many languages. In order to adapt it to individual languages, letters had to be altered and diacritics put in. While the basic Latin alphabet is about 30 characters, there are around 900 variations. It's less of a problem when a program works in one language alone, but when a program coordinates multiple languages, something has to be done. For instance, a French keyboard doesn't have an "a" with a tilde, but the French customer service person still needs to find the Portuguese client whose name has that character. It's great to show your customers respect, but you'll still annoy them if you lose their data. What we need to do is to "normalize" the data, so that we're comparing apples to apples. And to do that, we need to find a basis that everyone has in common. So, as far as we've come with Unicode, it looks like ASCII isn't quite dead yet. ASCII – the new common denominator! What we want to do is to strip out the diacritics, come up with an ASCII string, and use the result for searching. That way, everyone has an equal chance of finding their data. This technique is purposefully "lossy", so we don't want to replace the correct values with simpler ones. Rather, we want to use these values alongside the originals, internally, out of the end-user's sight. Behind-the-scenes isn't a bad thing, since what we're about to do to the text may cause the end-users to worry. For instance, in real German, the name "Händel" resolves to "Haendel". By stripping diacritics, it resolves to "Handel". No, it's not real German, but that's not our goal. How to Lose Your Accent in a Hurry, and Find Yourself in the Process Our aim is to be language-independent, and to get the same data out as the data that went in, without special keyboards. This is a practical issue, not a scholarly one. The good news is that in true democratic fashion, every language gets fractured equally, and also … we have the original text anyway. Nothing's lost, and data is found. There are two cardinal rules in searching: 1. The search expression must match the data being searched. This means that you should use the same function to prepare the search expression as you use on the data, or else you won't find what you're looking for. Consistency wins over everything, especially correctness. 2. Avoid doing expensive conversions at runtime. Unless it's unavoidable, you don't want to go through an entire table, convert each value, and then compare it. The lights will go dim! The best place to do your thinking is at design time, and a "search value" column alongside the well-spelled column will make life easy. This also enables you to use normal database indexes for searching, which really makes a difference. Since you only need to calculate values when they change, the best place to normalize strings is at data entry time. During data entry, most of the clock cycles are spent waiting for the user to type something, so there are very few calculations at this stage that are too expensive. Besides stripping the accents, you can also convert everything to upper or lower case, which solves the more mundane issues of normalization. To co-opt a stupid joke, "Händel's not composing any more. Now he's decomposing." If Mr. Händel wants the umlaut out of his name, that's exactly what he'll need to do – decompose. Unicode has a concept of composition, which means that we combine several simple characters to get a single complex character. Unicode has the opposite concept as well. You can view a complex character as one character, or, you can view it as the combination of several simple ones. "Decomposition" is what we need to get back the simple ASCII characters we're looking for. There's a bit of complexity, and there are multiple flavors of decomposition. All of this is covered in a set of scholarly papers by the Unicode Consortium ( To cut to the chase, we want the most granular form of decomposition. The other thing we need to know is that the main characters (the ASCII characters, that is), are the most significant, and are guaranteed to come at the beginning of the decomposed sequence. It turns out that our work is easy. Two approaches I'll present two approaches here. The easiest approach is to use the inbuilt string normalization function, which is new to .NET 2.0. This function closely parallels the normalization functions in Java, and is a great addition to the language. The idea is to take each character of a string, put it through the strongest decomposition, and then extract the ASCII characters. There are three things we need to be aware of: 1. Some characters, like the diagraph "dz" break down to a "d" and a "z", so we have to test for multiple ASCII characters in a loop. 2. Other characters, like the combined "AE" character, don't break down any farther. The Unicode Consortium made some hard choices, and couldn't possibly please all the people all of the time. For our purposes, then, we have the choice of keeping the character as-is, or straining it out because it isn't an ASCII character. The code below keeps it, because it is reduced to a single character. You may have a different opinion. 3. If there are embedded characters from other sets, such as Greek or Chinese, we want to leave them alone completely. They're not ASCII, they'll never be ASCII, and we can only cause mischief if we decompose them. We can run non-ASCII characters through transliteration routines to make them ASCII, but that's a story for another day. Option One private string LatinToAscii(string InString) string newString = string.Empty, charString; char ch; int charsCopied; for (int i = 0; i < InString.Length; i++) charString = InString.Substring(i, 1); charString = charString.Normalize(NormalizationForm.FormKD); // If the character doesn't decompose, leave it as-is if (charString.Length == 1) newString += charString; charsCopied = 0; for (int j = 0; j < charString.Length; j++) ch = charString[j]; // If the char is 7-bit ASCII, add if (ch < 128) newString += ch; /* If we've decomposed non-ASCII, give it back * in its entirety, since we only mean to decompose * Latin chars. if (charsCopied == 0) newString += InString.Substring(i, 1); return newString; The advantage of this code is that it's short, simple, and largely built-in, so this is the code to use if your needs are simple and the output doesn't cause you any trouble. You should test the output, of course, before putting the code into production! One thing to note is that the decomposition here is very conservative. The Unicode Consortium had nobler things in mind than the cheap-and-nasty job that we're doing here. For instance, the combined character "æ" stays combined, since that character has its own identity. Similarly, the Scandinavian "Ø" stays as-is, since to Scandinavians, it's not an "O with a stroke" – it's an "Ø". However, basic accents are taken care of, and we have a working function. If none of the drawbacks bother you (after testing!), consider the job done. If you need to take care of other characters, obviously, we need to do some more work. You could adapt the code to test specific characters which don't decompose, and if you only have a few exceptions, that's easy. If you have strong opinions (and a lot of them), the code will need some organization. You could either use a switch/case statement (which could get bulky), or a collection such as a hash table. Option Two takes the hash table approach, and loads the entire Latin character set with its decomposition values. Rather than figuring out the decomposition at runtime, we decide what it is at compile time, and then simply look up the value. We suffer a bit when we load the table, and we gain a bit when we do the lookups. The table is static, and it's only loaded once. Option Two is a much more labor-intensive solution, though, of course, the labor has already been done, and it's presented to you here. If you have strong opinions and lots of them, this is the approach to take. And if you haven't upgraded to Visual Studio 2005, this is the only approach to take, since you don't have normalization yet. Option Two is more complete, and can also be tweaked if you don't like the output as it is. The way this was done was: 1. The Unicode database (which is a text file) was loaded into Oracle, with composition sequences. 2. A program was written to write a program, specifying Unicode characters and their most granular conversions. Composite characters can contain other composites, so a bit of iteration was necessary. 3. Where 100%-correct Unicode wasn't indicated, the values were hand-corrected using PDF files from the Unicode Consortium. Substitutions for the weirdest characters were done by appearance. The code for this approach is even simpler than Option One. The first time the function is used, a static HashTable is loaded with values. Making the data static means that we only have to load it once. Otherwise our performance would be atrocious. After the initial load, every character gets a lookup. We have to check to see if our item is in the HashTable first, since we'll get an exception if we search for a non-existent item. If the item isn't in our table, we return it as-is, since it's outside our domain anyway. In theory, this code should be faster, both for the static data and the pre-calculated mappings, though it seems to average about the same as Option One. In any case, performance shouldn't be a huge issue, since we're using the code intelligently ;-) Option Two public static string LatinToAscii(string InString) string returnString = string.Empty, ch; if (mCharacterTable == null) ch = InString.Substring(i, 1); if (!mCharacterTable.Contains(ch)) returnString += ch; returnString += mCharacterTable[ch]; return returnString; I hope all of this is useful. All of our differences are so much easier to celebrate once we find we have something in common - even if it's only ASCII! About the Author Evan Stein United Kingdom United Kingdom I'm a London-based software developer. Originally from New York, I came here in 1997 to run European application development for Standard & Poors. I now work independently ... and I'm still here! Having seen how US software behaves outside the US, I'm keenly interested in problems of global and multilingual software design. I also used to write intelligence-gathering software, and still can't resist a well-turned algorithm! Before my IT career I was in music, and I'm now combining both interests in a highly-exciting 'Project-X'. I could tell you what it is, but .... When not thinking about all of the above, I'm fascinated by all aspects of different cultures. (You can't take New York out of the New Yorker.) Interests include jazz, classical and world music, languages, history and ethnic food. I'm also an amateur travel writer and photographer, and run a site at, which you're welcome to stop by and visit! Comments and Discussions QuestionThank you! Pin Jecho Jekov19-Apr-19 15:37 MemberJecho Jekov19-Apr-19 15:37  QuestionPerformance Improvement Pin Fade (Amit BS)18-Oct-11 7:33 MemberFade (Amit BS)18-Oct-11 7:33  AnswerRe: Performance Improvement Pin Evan Stein6-Dec-11 6:54 MemberEvan Stein6-Dec-11 6:54  GeneralRemember to use StringBuilder! Pin Greg010102-Dec-08 14:58 MemberGreg010102-Dec-08 14:58  GeneralLatinToAscii Pin Luis Crespo20-Sep-07 8:36 MemberLuis Crespo20-Sep-07 8:36  QuestionHow From Ascii Value to Char ? Pin maimosa18-Jun-06 11:57 Membermaimosa18-Jun-06 11:57  AnswerRe: How From Ascii Value to Char ? Pin Evan Stein19-Jun-06 21:54 MemberEvan Stein19-Jun-06 21:54  GeneralRe: How From Ascii Value to Char ? Pin maimosa19-Jun-06 22:05 Membermaimosa19-Jun-06 22:05  GeneralStripping Accents Pin Patrice Dargenton29-Mar-06 4:00 MemberPatrice Dargenton29-Mar-06 4:00  GeneralRe: Stripping Accents Pin Evan Stein2-Apr-06 3:32 MemberEvan Stein2-Apr-06 3:32  AnswerNot working with non-latine language (solution inside) Pin Jcmorin27-Apr-07 11:51 MemberJcmorin27-Apr-07 11:51  Try to convert for instance... Here is a fast working full unicode compilant strip accent. Remember that japanese people also have accent! static string StripAccent(string stIn)<br /> {<br /> string normalized = stIn.Normalize(NormalizationForm.FormD);<br /> StringBuilder sb = new StringBuilder();<br /> <br /> foreach (char c in normalized) {<br /> UnicodeCategory uc = CharUnicodeInfo.GetUnicodeCategory(c);<br /> if (uc != UnicodeCategory.NonSpacingMark) {<br /> sb.Append(c);<br /> }<br /> }<br /> return (sb.ToString());<br /> GeneralRe: Not working with non-latine language (solution inside) Pin Fade (Amit BS)18-Oct-11 7:27 MemberFade (Amit BS)18-Oct-11 7:27 
“Jesus accepted This question. He replied. ‘A man Was going down From Jerusalem To Jericho. He fell Into the hands Of robbers. They stripped him. They beat him up. They went away, Leaving him half dead.’” Gerasenes (Lk 8:26-8:26) “Then they arrived At the country Of the Gerasenes, Which is opposite Galilee.” Luke said that Jesus and his disciples sailed down (Καὶ κατέπλευσαν) to the country of the Gerasenes (εἰς τὴν χώραν τῶν Γερασηνῶν), which was opposite Galilee (ἥτις ἐστὶν ἀντιπέρα τῆς Γαλιλαίας).  All three synoptic gospels, Matthew, chapter 8:28, Mark, chapter 5:1, as well as Luke here, have Jesus cross to the other side of the Sea of Galilee.  They went to the country or region of the Gerasenes.  Matthew called it Gadarenes, while Luke called it Gerasenes, like Mark.  This might be one of two different towns on the east bank of the Jordan in the Decapolis territory, a group of 10 cities.  One was called Gadara, about 6 miles away from the southeast side of the Sea of Galilee, near where the Sea of Galilee ran into the Jordan River.  Today, it is in the country of Jordan, known as Umm Qais.  The other Decapolis town was called Gerasa, a town about 40 miles from the Sea of Galilee, which would be more inconsistent with this story.  Nevertheless, this was Gentile territory with only a few Jewish people there.  Jesus had traveled over to the other side of the Sea of Galilee to its southern tip, to one of the 10 cities of the Decapolis territory.  Have you ever traveled to an area where they had different religious beliefs than you? “In those days, Mary set out. She went With haste Into the hill country, To a Judean town.” The blind beggar Bartimaeus (Mk 10:46-10:46) “They came to Jericho. As Jesus With his disciples And a large crowd Were leaving Jericho, The son of Timaeus, A blind beggar, Was sitting By the roadside.” Καὶ ἔρχονται εἰς Ἰερειχώ. Καὶ ἐκπορευομένου αὐτοῦ ἀπὸ Ἰερειχὼ καὶ τῶν μαθητῶν αὐτοῦ καὶ ὄχλου ἱκανοῦ ὁ υἱὸς Τιμαίου Βαρτιμαῖος, τυφλὸς προσαίτης, ἐκάθητο παρὰ τὴν ὁδόν. Both Matthew, chapter 20:29, and Luke, chapter 18:35, have something similar, but with some differences.  Luke had Jesus entering or approaching Jericho, not leaving it, as Matthew and Mark indicate.  Mark said that Jesus had come to Jericho (Καὶ ἔρχονται εἰς Ἰερειχώ).  However, he was leaving Jericho (Καὶ ἐκπορευομένου αὐτοῦ ἀπὸ Ἰερειχὼ) with his disciples (καὶ τῶν μαθητῶν αὐτοῦ) and a large crowd (καὶ ὄχλου ἱκανοῦ), when this incident occurred.  Jericho was about 15 miles east of Jerusalem and about 8 miles north of the Dead Sea.  Jesus was getting closer to Jerusalem, but not quite there.  Mark is the only gospel writer that named this blind beggar Bartimaeus (Βαρτιμαῖος), the son of Timaeus, even with the name of his father (ὁ υἱὸς Τιμαίου).  Bartimaeus was a blind beggar (τυφλὸς προσαίτης), sitting by the way or the roadside (ἐκάθητο παρὰ τὴν ὁδόν).  On the other hand, Matthew had 2 unnamed blind beggars, while Luke only had 1 unnamed blind beggar. Jesus sees Simon and Andrew (Mk 1:16-1:16) “As Jesus Passed along The Sea of Galilee, He saw Simon, And his brother They were casting a net Into the sea. They were fishermen.” Mark, as well as the other 3 canonical gospels, has Jesus meeting Simon for the first time at the beginning of his ministry.  Luke, chapter 5:1:11, has an elaborate story about Simon, where there was no mention of his brother Andrew, as Jesus and Simon went out fishing together.  In John, chapter 1:35-42, Andrew and Simon were disciples of John the Baptist, from the town of Bethsaida, about 5 miles north of Capernaum, near the Sea of Galilee.  However, here as in Matthew, chapter 4:18, which is almost word for word, there are only the simple comments about the brothers Simon and Andrew being fishermen.  Mark recounts that as Jesus was passing by, walking, or strolling along the Sea of Galilee (Καὶ παράγων παρὰ τὴν θάλασσαν τῆς Γαλιλαίας), he saw Simon and his brother Andrew (εἶδεν Σίμωνα καὶ Ἀνδρέαν τὸν ἀδελφὸν Σίμωνος) casting or dropping a net into the sea (ἀμφιβάλλοντας ἐν τῇ θαλάσσῃ), since they were fishermen (ἦσαν γὰρ ἁλεεῖς).  Mark did not mention the other name of Simon as Peter, like Matthew did.  However, it was common for people to have both a Hebrew name like Simon and a Greek name like Peter.  Both these brothers were casting their large fishing nets into the Sea of Galilee, which was about 13 miles long by 8 miles wide, about 80 miles north of the Dead Sea, at the north end of the Jordan River. “When they had sung The hymns, They went out To the Mount of Olives.” Καὶ ὑμνήσαντες ἐξῆλθον εἰς τὸ ὄρος τῶν Ἐλαιῶν. Great crowds (Mt 4:25-4:25) “Great crowds Followed Jesus From Galilee, From the Decapolis, From Jerusalem, From Judea, And from beyond the Jordan.” Matthew finished off this unique section by talking about the huge crowds that followed Jesus in Galilee (καὶ ἠκολούθησαν αὐτῷ ὄχλοι πολλοὶ ἀπὸ τῆς Γαλιλαίας).  However, he added something that had not been talked about.  Matthew said that the people from Decapolis (Δεκαπόλεως), Jerusalem (καὶ Ἱεροσολύμων), Judea (καὶ Ἰουδαίας), and from beyond on the east bank of the Jordan River (καὶ πέραν τοῦ Ἰορδάνου) were following Jesus.  So far, Jesus has not done anything there.  Decapolis was an area of 10 cities or towns east of Galilee, with 9 of these cities on the east side of the Jordan River that included Damascus.  So that the news about Jesus may have spread there, as well on the east side of the Jordan.  However, the mention of Jerusalem and Judea, which were way south, at least 100 miles away, seems like a stretch. “Jesus left Nazareth. He made his home In Capernaum By the sea, In the territory Of Zebulun, Of Naphtali.” The birth of Jesus in Bethlehem (Mt 2:1-2:1) “In the time Of King Herod, Jesus was born In Bethlehem Of Judea.” We have a specific time and place for the birth of Jesus. He was born (δὲ Ἰησοῦ γεννηθέντος) in Bethlehem in Judea (ἐν Βηθλέεμ τῆς Ἰουδαίας), during the reign of King Herod (ἐν ἡμέραις Ἡρῴδου τοῦ βασιλέως). Bethlehem was always in the territory of Judah, about 6 miles south of Jerusalem, with a current population of about 25,000 in the present day Palestinian territory. David was from Bethlehem, where Jesus was born. Matthew did not say why Joseph and Mary were in Bethlehem, like Luke, chapter 2, did because of a census. King Herod the Great (74 BCE-1 CE) was the Roman client king of Judea. In fact, the Roman Senate named him King of the Jews in 40 BCE. He built many things during his reign, including expanding the Second Temple in Jerusalem. At his death, his kingdom was divided among his children. “Woe to you! Inhabitants of the seacoast! You nation of the Cherethites! The word of Yahweh Is against you! O Canaan! Land of the Philistines! I will destroy you Until no inhabitant is left. O seacoast, Shall be pastures, Shall be meadows for shepherds, Shall be folds for flocks. The seacoast Shall become the possession Of the remnant Of the house of Judah. They shall pasture In the houses of Ashkelon. They shall lie down at evening. Their God, Will be mindful of them. He will restore Their fortunes.”
Manufacture of basic iron and steel List of business classifications grouped under C241 - Manufacture of basic iron and steel in Indonesia. KBLI Name Description Status Iron and steel making industry Businesses in the manufacture of iron and steel in basic forms, such as iron ore pellets, sponge iron, pig iron and the manufacture of iron and steel in the form of rough steel such as steel ingots, steel billets, bloom steel and steel slabs. Including the manufacture of iron and alloy steel. These include furnace activities, steel converters, rolling and finishing mills; production of pig iron in basic forms such as blocks; mixed iron production; production of iron products directly reduced from iron ore and other hollow iron products; iron production from refining by electrolysis and other chemical processes; iron grain and iron powder production; production of steel ingots or other basic forms; remelting of remaining iron or steel ingots; and semi-finished steel production. Steel rolling industry The steel milling business, both hot and cold milling, which makes grinding products for steel wire rods, reinforcing steel, profile steel (H-beam, I-beam and the like), strip steel, rail steel, steel plate, steel. hot rolled sheet and cold rolled sheet coated or uncoated with other metals or non-metals including grinding steel scrap. Including the beam or hot rolled cut steel industry, the hot rolled open section steel industry, the beam and solid section steel industry as a result of the cold drawing, grinding and turning processes, the open section steel industry resulting from progressive cold forming on rolling or folding machines on pressing machines or on rolling of steel flats, cold drawing or stretchuing of steel wire industry, Manufacture of pipes and pipe exposure of steel and iron Businesses in the manufacture of tubes, pipes and pipe fittings from iron and steel. Including Manufacture of seamless steel hollow tubes, pipes and profiles as a result of hot rolled forming, hot drawing or hot extruding, cold rolling or cold drawing; industry of welded steel tubes and pipes as a result of hot or cold welding and forming, as a follow-up process of cold rolled or cold drawing; and the steel pipe fittings industry, such as flat flanges and flanges with forged collars, butt-welded fittings, threaded fittings and socket-welded fittings. Let's grow your business in Indonesia
Philadelphia is one of the oldest municipalities in the United States Philadelphia is a single specified of the oldest municipalities in the United States. William Penn, an English Quaker, commenced out the metropolis in 1682 to resource as belongings of the Pennsylvania Colony. Philadelphia concluded an instrumental work in the American Revolution as a meeting location for the Founding Fathers of the United States, who signed the Declaration of Independence in 1776 at the 2nd Continental Congress, and the Composition at the Philadelphia Conference of 1787. Numerous other critical attributes took place in Philadelphia for the dimension of the Groundbreaking War which is made up of the Actually preliminary Continental Congress, the preservation of the Liberty Bell, the Wrestle of Germantown, and the Siege of Fort Mifflin. Philadelphia remained the nation’s most essential town appropriate up until finally preceding but not the actually minimal getting overtaken by New York Metropolis in 1790 the metropolis was also a solitary of the nation’s capitals for the period of the revolution, serving as nominal time time time time interval U.S. funds even with the simple fact that Washington, D.C. was beneath enhancement. In the nineteenth and twentieth hundreds of a prolonged time, Philadelphia turned a principal industrial coronary coronary coronary heart and a railroad hub. The metropolis grew many a entire fantastic offer of a lot of numerous many thanks to an inflow of European immigrants, most of whom at 1st arrived from Ireland and Germany—the two most essential described ancestry groups in the town as of 2015. Afterwards on on on immigrant teams in the twentieth century arrived from Italy (Italian buying the third leading European ethnic ancestry at the subsequent reviewed in Philadelphia) and other Southern European and Jap European nations all about the earth. In the early twentieth century, Philadelphia grew to flip into a principal getaway location for African Males and females in the united states in the pc laptop computer software technique of the Wonderful Migration pursuing the Civil War. Puerto Ricans commenced relocating to the town in big portions in the interval of time of time of time amongst Earth War I and II, and in even enhanced portions in the established up-war time interval of time of time. The city’s inhabitants doubled from one unique specific particular million to two million males and girls amongst 1890 and 1950. The Philadelphia area’s a exceptionally wonderful give of universities and educational institutions make it a truly superb appraise location, as the metropolis has contemporary into an tutorial and fiscal hub. As of 2019, the Philadelphia metropolitan area is regarded to make a gross metropolitan remedy (GMP) of $490 billion. Philadelphia is the center of fiscal movement in Pennsylvania and is residence to 5 Fortune a 1 thousand companies. The Philadelphia skyline is climbing, with a marketplace spot place of almost eighty one particular,900 industrial characteristics in 2016, which involves a assortment of nationally properly acknowledged skyscrapers. Philadelphia has considerably a excellent offer a excellent offer a great offer more out of doorways sculptures and murals than any other American metropolis. Fairmount Park, when blended with the adjacent Wissahickon Valley Park in the genuine specific distinct fairly exact same watershed, is a solitary of the really perfect contiguous metropolis park spots in the United States. The metropolis is acknowledged for its arts, current day present functioning day culture, delicacies, stunning Philadelphia escorts and colonial historic before, attracting forty two million domestic vacationers in 2016 who expended $6.eight billion, generating an regarded as $eleven billion in complete monetary conclude final result in the city and bordering four counties of Pennsylvania. Philadelphia has also emerged as a biotechnology hub. Philadelphia’s financial sectors integrate fiscal businesses, precisely turning out to be treatment, biotechnology, particulars technological innovation, trade and transportation, making, oil refining, foodstuff processing, and tourism. Economic pursuits account for the truly ideal economic sector of the metropolitan location, which is also a solitary of the finest properly acquiring education and studying and understanding and finding out and understanding and investigation solutions in the United States. Philadelphia’s annualized unemployment benefit was seven.eight% in 2014, down from ten% the prior calendar yr. This is enhanced than the countrywide widespread of six.two%. Also, the price tag of new operate further to the city’s fiscal system lagged guiding the countrywide work enlargement. In 2014, about 8,800 positions seasoned been developed-in to the city’s fiscal software. Sectors with the principal quantity of have out developed-in have been in schooling and learning and learning and wellness resolution, leisure and hospitality, and professional and staff corporations. Declines have been witnessed in the city’s technological innovation and govt sectors.
1) Okasha notes that, if we want to use abductive inferences, we have to know how to determine if one explanation is better than another. What popular answer for deciding which theory is best does he mention? 1A)The simplest explanation (i.e. the one with the fewest necessary components) is the best one 2)According to Sober, what two factors influence the strength of an inductive inference? 2A)(1) The size of the sample and (2) the representativeness of the sample 3)According to Okasha, what feature makes an inference a deductive inference? 3A)If the premises are true, then the conclusion must be true as well 4)True or False: According to Okasha, scientists are not interested in probability, so it need not be a major concern for philosophers. 5)True or False: According to Sober’s definition, the following argument is an abductive argument that avoids the “Only Game in Town Fallacy”: A theist (i.e. one who believes in God) asks an atheist to explain how the universe came to be. The atheist says that she does not know. The theist says that his explanation is that God spoke the universe into existence. He says that since the atheist can’t come up with a better explanation of her own, then she should accept his explanation. 6)According to Sober, which of the following best describes philosophical method? 6A)Trying to reach answers to important philosophical questions by reasoning correctly from assumptions that are plausible
What Does the Word “Cloth” Mean? What Does the Word “Cloth” Mean? The word cloth is a very versatile word, as it can mean different things. For example, it can describe a piece of clothing or a small piece of material used for cleaning and drying. However, the word is always used singularly, and does not have a plural form. Some common words for cloth are “silk,” “cotton,” and even “wool.” The term cloth is also used to refer to various kinds of fabrics and clothing. The word “cloth” is a noun, meaning a woven piece of material. It can also be used as an adjective to describe the material. The word can refer to a person or an object. In the case of the plural form, it describes a piece of cloth made of a specific material. This is why a garment, a shirt, a dress, or a robe is called a garment. There are two words that mean the same thing: cloth and clothes. While the two terms are used synonymously, they have different meanings. A cloth is a piece of material worn by someone. While a garment may be made of a variety of materials, it is not a dress. It is a blanket made of fabric. It is not a sexy or expensive garment. A simple shirt is not considered a luxury item. The term cloth is derived from the Old English words claede and klade, which both mean cloth. The singular form of the word is klaede, while the plural is klaed. If we want to use a plural form of the word, we use claede. It is also a type of noun because it is a woven piece of material. Its definition is the same: a piece of cloth that is used for dressing, cleaning, or practical purposes. Another word for cloth is klaid. In Old English, claede means garment. It is the plural of klaid. The former is a short-cut verb and a noun that ends with an e. Alternatively, both words represent the same thing. Similarly, the singular form is claede. The latter is a synonym of klaid. In both words, the same word can be spelled in the same way. While the term cloth is a noun, it can be an adjective. It can be used to describe a material or an item. For example, a man of the cloth is a member of the clergy. A nudist is a person who wears no clothes. A fashionista wears trendy clothing and makes fashionable statements. The term cloth has a number of definitions. It is not a word, but a piece of fabric. It can be a cloth, fabric, or any other type of material. The word cloth is commonly used in English, while textiles are more common. The word is also used in French, German, and Scots. For example, a fabric can be a dress, a robe, or a sarong. And a sarong is a sarong. It is often a robe.
Sunday 3 November 2019 - 05:27 How Iran Changed U.S. Strategic Assets into Liabilities and Altered the World Balance of Power By Mohamad Shaaf Story Code : 825337 This progression occurred because the US situated multiple strategic interests in the area effectively disabling itself; the US is now unable to mount a military response to actions by Iran. The recent reversal has had an impact on the world balance of power confirming another failure of the neocons’ doctrine of Full-Spectrum Dominance, and validates emergence of a new multi-polar world. A Brief History of US Hostility against Iran: Since the IRI took over in 1979 the US has been involved in overt and covert hostility against that government. In 1977, President Carter started a campaign of human rights, which led to releasing of political prisoners by the Shah and his SAVAK. It was followed by a massive popular uprising against the Shah who was told by Washington to leave Iran, resulting in the creation of the Islamic Republic. On November 4, 1979, militant Iranian students seized the U.S. embassy in Tehran. Iran’s leader, Khomeini, refused all appeals to release the hostages, even after the UN Security Council demanded an end to the crisis. In response President Carter ordered freezing Iranian assets and banned Iranian oil imports. The IRI kept 52 captives in the American Embassy for 444 days, releasing them on President Reagan’s Inauguration. In September 1980, the US gave the green light and weapons in support of Iraq’s invasion and war against Iran; weapons were also sold to Iran indirectly through Iran Contra and Israel. According to the American Senate Banking Committee, the administrations of Presidents Reagan and George H. W. Bush authorized the sale to Iraq of poisonous chemicals and deadly biological viruses, such as anthrax and bubonic plague, to be used against Iran. On July 3, 1988 a US warship shot down an Iranian passenger plane, killing all 290 people to force Iran to accept the UN-brokered ceasefire that was accepted in August 1988. The number of casualties of the Iran-Iraq war was enormous but numbers are uncertain. Estimates of total casualties ranged from 1M to 2M, with Iran suffering the most losses. In 1989, when the USSR collapsed and fear of communism declined, Islamic Iran lost its value as a counterforce against communism. As a consequence, pressures on Iran that started under G.H.W. Bush and continued under Clinton showed a steady increase; after 9-11 the threat of a new and higher level of military invasion of Iran began, using the threat “all options are on the table” including nuclear, started in 2001 during the administration of G. W. Bush, as confirmed by General Clark. The policy continued during the Obama and Trump administrations. The Joint Comprehensive Plan of Action (JCPOA), called the Iran Nuclear Deal, that was agreed upon by Obama in 2015, did not remove the agreed upon sanctions and the withdrawal from that agreement by Trump resulted in more sanctions being added. The value of IRI as an anti-communist state declined further, as reflected by Trump insulting the Supreme Leader, which had never before happened.  Major Signs of a more Assertive Iran: Starting in 2012 the Iranian military sent advisors and later troops to Syria with support from Russian air cover to stop the US trained-Saudi financed terrorists’ aggression against the elected government of Syria. The operation was successful in that it showed the possibility that Obama’s doctrine of terrorists’ proxy war could be defeated. It was a very important event that made the US reconsider mercenary wars in the name of fighting terrorism. On December 5, 2011 Iran’s cyber warfare unit seized a US drone and safely landed it; they later reported that it was successfully copied. Then Iran started its own domestic mass production and improvement of drones for precision and range, and relatively inexpensively, $15,000 as compared to $220M for the US version. In November 2016, Iran acquired Russian S-300s, then copied and placed them into mass production with improvements that were more advanced than US Patriot missiles which were unable to defend Saudi’s oil refinery. In June 2019 Iran shot down a $220M US surveillance drone over its territory while intentionally avoiding hitting another aircraft with a crew. Then, Trump ordered a military strike against Iran radar and missile sites then reversed the decision, and thanked Iran for not shooting down the aircraft with a crew. Even more importantly, Iranian sources reported that the Trump administration proposed a deal to Iran of providing three self-chosen empty targets in Iran and allow US military hit those targets as a face-saving action. Iran responded that it will shootdown any US attempted strike. On July 4, 2019 the UK, a US ally, seized a supertanker off Gibraltar carrying Iranian oil. Iran responded by seizing a British tanker, (Video) then Iran offered to swap seized oil tankers, the UK accepted that proposal and it was executed. Later Iran claimed it could sink a U.S. Navy Aircraft Carrier. Most recently the US moved its MECOM base out of Qatar since it was considered a “sitting duck.” Iran refers to CENTCOM as a “terrorist” entity in reaction to the US calling IRGC a terrorist group. Conclusions: The IRI evolved from a defenseless nation in 1988 to its current defensive strength using a massive number of home-made S-300s and drones as well as home-made offensive missiles and drones. Meanwhile, Iran is surrounded by US military bases with large numbers of troops and assets, including all types of weapons, ships, and fighter planes; that have been effectively converted into high-cost targets, and defenseless liabilities for the US. This is confirmed by a lack of US response to Iran for recent actions: Iran shooting down a US drone, becoming a Yemen ally, hitting Saudi’s oil facility, and the US moving out of Qatar; four examples of the ever-changing balance of power in the Middle East. Although, the US still remains the driving power in governance of the world, that power is waning rapidly.
Table 2  Prevention and control strategies of diseases of comfort (A) Diseases of comfortGlobal chronic disease epidemic of heart diseases, cancers, respiratory diseases, mental disorders, diabetes, musculoskeletal disorders, etc (B) InterventionsEducation (health literacy), legislation, participative democracy, intersectoral action, community involvement, healthy technology, built environment, recreational choices (C) Continuous civilisationsolutionComfort choices are healthy choices for all
kids encyclopedia robot Varnamtown, North Carolina facts for kids Kids Encyclopedia Facts Quick facts for kids Varnamtown, North Carolina Coordinates: 33°56′39″N 78°13′52″W / 33.94417°N 78.23111°W / 33.94417; -78.23111Coordinates: 33°56′39″N 78°13′52″W / 33.94417°N 78.23111°W / 33.94417; -78.23111 Country United States State North Carolina County Brunswick  • Total 0.97 sq mi (2.51 km2)  • Land 0.90 sq mi (2.32 km2)  • Water 0.07 sq mi (0.19 km2) 26 ft (8 m)  • Total 541  • Estimate   • Density 665.18/sq mi (256.80/km2) Time zone UTC-5 (Eastern (EST))  • Summer (DST) UTC-4 (EDT) FIPS code 37-69795 GNIS feature ID 1008273 Varnamtown is a town in Brunswick County, North Carolina, United States situated on the banks of the Lockwood Folly River. The population was 541 at the 2010 census. It is part of the Myrtle Beach metropolitan area. Varnamtown was incorporated as a town in 1988. Varnamtown is located in southern Brunswick County at 33°56′39″N 78°13′52″W / 33.94417°N 78.23111°W / 33.94417; -78.23111 (33.944172, -78.231012). It is bordered to the east by the tidal Lockwood Folly River. The town of Holden Beach is 2.5 miles (4.0 km) to the southwest. According to the United States Census Bureau, Varnamtown has a total area of 0.97 square miles (2.5 km2). 0.89 square miles (2.3 km2) of it is land and 0.08 square miles (0.2 km2) of it (6.31%) is water. Historical population Census Pop. 1990 404 2000 481 19.1% 2010 541 12.5% 2019 (est.) 596 10.2% U.S. Decennial Census As of the census of 2000, there were 481 people, 203 households, and 155 families residing in the town. The population density was 480.2 people per square mile (185.7/km2). There were 235 housing units at an average density of 234.6 per square mile (90.7/km2). The racial makeup of the town was 99.17% White, 0.42% Native American, 0.21% Asian, and 0.21% from two or more races. Hispanic or Latino of any race were 0.62% of the population. There were 203 households, out of which 27.1% had children under the age of 18 living with them, 70.0% were married couples living together, 3.9% had a female householder with no husband present, and 23.2% were non-families. 20.2% of all households were made up of individuals, and 8.9% had someone living alone who was 65 years of age or older. The average household size was 2.37 and the average family size was 2.72. In the town, the population was spread out, with 19.5% under the age of 18, 5.6% from 18 to 24, 28.5% from 25 to 44, 29.5% from 45 to 64, and 16.8% who were 65 years of age or older. The median age was 42 years. For every 100 females, there were 102.1 males. For every 100 females age 18 and over, there were 98.5 males. The median income for a household in the town was $33,750, and the median income for a family was $35,357. Males had a median income of $29,375 versus $25,694 for females. The per capita income for the town was $18,394. About 9.8% of families and 11.4% of the population were below the poverty line, including 16.5% of those under age 18 and 17.5% of those age 65 or over. kids search engine Varnamtown, North Carolina Facts for Kids. Kiddle Encyclopedia.
How tourism create employment opportunities to the local people? How can tourism help create employment opportunities at local level? How does tourism create employment? How do local people get employment due to tourism? The local people can get involved in making new restaurants and hotel for the stay for the tourists. This is one of major employment opportunity due to tourism in the country. The restaurants can employ some more people from the local area for cooking and maintenance. What type of job can tourism create for the locals? Here are the top 10 careers in Tourism & Hospitality. • 2) Hotel Manager. … • 3) Spa Manager. … • 4) Tour Operator. … • 5) Event & Conference Organiser. … • 6) Tour Guide. … • 7) Executive Chef. … • 8) Sommelier. THIS IS INTERESTING:  What were the essential principles of Theodore Roosevelt's foreign policy and how did he apply them to specific situations? How does tourism increase income and employment opportunity in our country? What employment opportunities means? job opportunity in British English (dʒɒb ˌɒpəˈtjuːnɪtɪ) noun. business. an opportunity of employment. Our aim is to provide more job opportunities for unemployed people. How can employment opportunities be generated in the tourism and information and technology Centre? What opportunities develop with development of tourism? The following opportunities (employment opportunities) are developed with development of tourism: (1) Restaurants (2) Shops (3) Transportation (4) Entertainment (5) Resorts/Lodges (6) Medical Services (7) Trading (8) Banking, etc. How does sport tourism increase employment?
How do metals interact with DNA? Since a couple of decades, metal-containing drugs have been successfully used to fight against certain types of cancer. The lack of knowledge about the underlying molecular mechanisms slows down the search for new and more efficient chemotherapeutic agents. An international team of scientists, led by Leticia González from the University of Vienna and Jacinto Sá from the Uppsala University, have developed a protocol that is able to detect how metal-based drugs interact with DNA. The teams of Leticia González from the Faculty of Chemistry of the University of Vienna and Jacinto Sá from Uppsala University have developed a protocol that is able to detect with high precision how, where, and why a drug interacts with the biomolecules of an organism. "In a first step, using high-energy X-ray radiation from the Swiss Light Source third-generation-synchrotron, the favorite binding location of the drug inside the cell is determined", González explains. In a second step, advanced theoretical simulations, partially done on the supercomputer "Vienna Scientific Cluster", rationalize the preference of the potential medicament for that particular location. Publication in "Journal of Physical Chemistry Letters" "Direct Determination of Metal Complexes Interaction with DNA by Atomic Telemetry and Multiscale Molecular Dynamics." Joanna Czapla-Masztafiak, Juan J. Nogueira, Ewelina Lipiec, Wojciech M. Kwiatek, Bayden R. Wood, Glen B. Deacon, Yves Kayser, Daniel L. A. Fernandes, Mariia V. Pavliuk, Jakub Szlachetko, Leticia González, and Jacinto Sá The Journal of Physical Chemistry Letters 2017, 8, 805-811. DOI: 10.1021/acs.jpclett.7b00070 Wissenschaftlicher Kontakt Univ.-Prof. Dr. Leticia Gonzalez Institut für Theoretische Chemie Universität Wien 1090 - Wien, Währinger Straße 17 +43-1-4277-527 50 +43-664-602 77-527 50 Stephan Brodicky Pressebüro der Universität Wien Universität Wien 1010 - Wien, Universitätsring 1 +43-1-4277-175 41 +43-664-60277-175 41
Relational Path to Regenerative Education The landscapes of knowledge and learning have shifted hugely in recent years, with the development of technology, digital media, and more importantly, the enlivened human consciousness of our connections with each other, and our relations with the planet. Yet, practices of public education largely remain fixed to a model of a century’s duration, unresponsive to the emerging conditions and perilous in terms of preparation for the future. If regenerative practices in education are imperative, what is the most promising direction for transformation? As we have been deeply immersed in the exploration of regenerative education, we were invited to Humanity Rising Global Solutions Summit on 14th June to discuss the conceptual foundation for educational transformation, and how relational practices such as deep listening and dialogue might contribute to systemic change. Through this dialogue, we illustrated the potentials of a relational vision for regenerative education. Favoured by this vision is the thriving of innovation, co-inquiry, inclusion and collaboration for the global good. Learning to be fully human only happens relationally. (by Scherto Gill) For education to enable us to become more fully human, as conceived by Freire, it can only happen relationally. This can mean a number of things: First, learning must be a relational phenomenon where students and teachers collaborate in dialogue and co-inquiry, including exploring what it means to be and become more fully human together. As this is a relational phenomenon (in Freire’s words, our ontological vocation), it is underpinned by values such as curiosity, mutual concern, love, caring, and empathy. These values can only be lived in a relationally generative environment which in turn enriches the relational processes at the core of such learning. Second, to align the aim of education with nurturing students to become more fully human affirms humans as spiritual beings by rejecting the objectification of human beings as ‘things’ to be known and acted upon, such as being moulded, tested, and measured. This means to evaluate learning, it can only be done in a congenial way, not testing, or grading. Relational evaluation of education is one way to acknowledge students’ spirituality, and to support their holistic human development. Third, for education to enable students (and teachers) to become more fully human, schools and other educational establishments are to be constructed as learning communities. Freire proposes that this require a consciousness through which students can become agents of curiosity, investigators, subjects in an ongoing relational process of quest for the revelation of the reality. A learning community is a place where relationships are not defined by the roles people play, or positions they occupy, instead, the relational flow throughout learning is characterised by co-intention to learn, co-investigation to self-transcend, co-creation of knowledge, and co-action for social transformation.
Procedures Performed Meniscus Tears Meniscus Tears Specialist What is a meniscus? A meniscus is a C-shaped soft disc in the knee that acts as a cushion between your thigh (femur) and shin bone (tibia). There are two menisci in each knee that work as shock absorbers to minimize stress and strain on the knee cartilage. They also serve to improve the stability of the knee. How do I know if I’ve torn my meniscus? A torn meniscus is one of the most common orthopedic knee injuries. Meniscus tears happen during sports or because of age-related wear and tear. The signs and symptoms include: • A popping sensation • Swelling and stiffness • Pain when rotating or twisting • Locking of the knee How is a meniscus tear treated? At the initial appointment, your doctor at Star Orthopedics and Sports Medicine will complete a physical examination and orders imaging tests to understand the site and extent of the injury better. The recommended treatment depends upon your age, activity level, and type and location of the tear. If your tear is small and located at the outer edge of the meniscus, your doctor prescribes the RICE regimen. It involves resting your knee, using ice and compression to prevent swelling and blood loss, and elevating the knee. The doctor also prescribes some pain and anti-inflammatory medication. Many times, the pain and stiffness disappear, and you may not need surgery at all. If your symptoms persist, your doctor at Star Orthopedics and Sports Medicine may suggest arthroscopic surgery. He inserts a miniature camera through a small incision that allows a clear view of the torn meniscus. He then trims or repairs the tear through another small incision and applies a protective dressing. What happens after the surgery? Your doctor at Star Orthopedics and Sports Medicine prescribes the necessary medications and gives you specific instructions to follow at home, including wearing a brace and using crutches to avoid putting added weight on the knee. The doctor also insists you follow the RICE regimen for a few days after surgery to help minimize the discomfort and speed up the healing process. You will then come for a follow-up appointment in 10-14 days. The doctors at Star Orthopedic and Sports Medicine prescribe physical therapy during the weeks following surgery. Physical therapy will wean off the crutches and help you regain control and strength of your leg muscles. Call to schedule an appointment today or book online so that you can return to your favorite sports activity as soon as possible. 5550 Warren Parkway Suite 200 Frisco, TX 149 SH 121 Suite 115 Coppell, TX Copyright Star Orthopedics 2021.
Smoking and Blindness: Do Blind People Smoke More, and Does Smoking Cause Blindness? The link between smoking and blindness is one of many reasons we should encourage as many people to quit as possible. Firstly, smoking can lead to blindness, and secondly, blind people are actually more likely to smoke than fully-sighted people. Breaking this link should be a priority. Smoking damages your lungs, harms your heart and causes cancer almost everywhere in your body, so it shouldn’t come as a surprise that it isn’t good for your eyes either. However, while most people know that smoking causes lung cancer and heart disease, far fewer know that smoking also causes vision loss, through age-related macular degeneration, cataracts and other issues. The link between smoking and blindness goes in both directions, too, with blind people being more likely to smoke than fully-sighted people. Are Blind People More Likely to Smoke? Smoking Rates Among the Visually-Impaired Although there aren’t many studies that look at smoking rates among blind people, the evidence we do have suggests that blind people are more likely to smoke than fully-sighted people. A study conducted on adults in Massachusetts looked at smoking rates among various groups of people with disabilities, including orthopedic, emotional or sensory disabilities, and disabilities related to chronic conditions. While only around 20 % of people without a disability smoked, 25.6 % of people with a disability were current smokers, and around 23 % of those with a sensory disability were. Although sensory disability isn’t limited to blind people (deaf people, for instance, are also included), this is a strong indication that people with impaired vision are more likely to smoke than the general population. However, the link between blindness and smoking isn’t as strong as the link with other disabilities. Why Blind People Shouldn’t Smoke Blind people shouldn’t smoke for the same reasons anybody else shouldn’t smoke. Smoking is the leading preventable cause of death in the U.S., and is responsible for 90 % of all lung cancer deaths, 80 % of deaths from chronic obstructive pulmonary disease (COPD) and a substantial number of deaths related to cardiovascular disease. These conditions are just as likely to affect blind people as sighted people, so these are all compelling reasons to try to quit if you’re a blind smoker. However, there is an additional issue for blind smokers in that these and other smoking-related conditions can make day-to-day life much more challenging. For people already struggling with a sensory disability, the additional challenges imposed by smoking-related diseases can make maintaining your ordinary lifestyle impossible without assistance. This is yet another reason that smoking and blindness are a bad mix. Does Smoking Cause Blindness? Smoking, Macular Degeneration and Cataracts While smoking rates are higher in blind people and the consequences of smoking-related health conditions are likely to be more severe in the visually-impaired, there is more to the link between smoking and blindness than this. Although many smokers aren’t aware of the risks, smoking can also lead to vision loss. Age-related macular degeneration (AMD) can lead to blindness, and is characterized by issues with the macula, which is the part of the eye’s retina responsible for the center of your field of vision. If you have macular degeneration, you’ll experience blurred or otherwise distorted vision in the middle of your field of view. This makes it incredibly difficult to engage in activities such as reading, watching TV or driving, as well as many others. Smokers are about twice as likely to develop AMD compared to non-smokers. Cataracts are another visual problem closely linked to smoking that can lead to blindness. This is when the lens of the eye becomes cloudy, which is common in elderly people whether they smoke or not. However, if you do smoke, your odds of developing cataracts are two to three times as high as a non-smokers’. Increasing Awareness of the Risks and Promoting Quitting Smoking Among Blind People Many smokers are unaware of the risks smoking poses to their vision, and increasing awareness of these risks is a major priority for public health. However, the best thing we can do to help reduce the impact of the link between smoking and blindness is to encourage more people to quit smoking, whether they’re blind or not. For people with visual impairments, focusing on the additional restrictions posed by smoking-related illnesses and the possibility of worsening vision will help to drive home the key points. For people without such impairments, increasing their knowledge of how smoking affects the risks of conditions like AMD, as well as the multitude of other health problems caused by smoking, provides ample motivation for making a change. Successfully quitting means taking advantage of the quitting aids available, including medications like Chantix, nicotine replacement therapies, behavioral counseling and alternative nicotine products like snus and e-cigarettes. Smokers should be encouraged to use whichever of these approaches appeals to them, as long as they make an attempt to stop smoking. It might not be an easy road, but the benefits of travelling it are huge.
The Donner Business Where did the wagon train party fall short? Back when I was in high school, a group of us loved to go winter camping out in the middle of nowhere. It was calm and peaceful and beautiful. One of the guys was Karl—and maybe it’s better that I didn’t know his background, for Karl’s direct ancestors were named Donner. Yes, that Donner. The group that got stuck in the Sierra Nevada in the winter of 1846-47. They ran out of food, so they turned to cannibalism. Of 87 folks in the Donner Party, 41 died. It may be the most infamous wagon train disaster in American pioneer history. We know of some of the issues that led to the debacle. The party got started a bit late and then was slow on the trail. They took a cutoff that was supposed to save time and mileage—but it had never really been tested and ended up costing the group weeks. They went into the mountains well after experts recommended and got caught in terrible snowstorms that prevented any movement. And it stopped relief efforts for weeks. Some years after those high school camping trips, I ran into Karl again. He was a human resources consultant, and one of his presentations was “Modern Lessons of the Donner Party.” It was—and is—a fascinating look at the incident through today’s business lens. The Pioneer Memorial at Donner Memorial State Park stands at the Donner Party encampment site, honoring the California Trail pioneers and the tragic emigrant party. The base of the memorial is 22 feet high, the height of the accumulated snow in Donner Pass that winter. Courtesy The Jon B. Lovelace Collection of California Photographs in Carol M. Highsmith’s America Project, Library of Congress Among the issues Karl raised: 1. Lack of strong leadership Karl’s direct ancestor, George Donner, was one of the oldest members of the train at age 60. He was solid, careful, popular, but not terribly dynamic. And when things began to go wrong, George wasn’t forceful enough to keep people in line. The other de facto leader was James Reed. He was strong, assertive, outgoing—and disliked by most of the travelers. In October 1846, he killed a teamster on the trail, probably in self-defense, and Reed was banished from the party. (He later led relief efforts). If the strengths of each man had been combined in one person, that might have created the leader the group needed. However, Donner and Reed agreed on one point: to take the Hastings Cutoff, the alleged shortcut to the mountains. They both ignored warnings from several sources that claimed it was untried. That decision, by itself, probably resulted in the terrible situation. 2. Conflict resolution and team-building and poorly handled diversity Even before the Donner Party hit the mountains, there was division in the ranks. Socio-economic status, ethnicity, etc., drove people apart. A fair amount of it was based on blood: families stuck together, sometimes isolating themselves from others. Things only got worse when the heavy snows hit in the high country. By that time, it was too late to resolve conflicts or build teams. It was every family for itself. A joint effort at survival might have spared lives. 3. Poor interpersonal communication skills Some folks were too loud and abrasive when it came to expressing their feelings—James Reed being a perfect example. Others just kept quiet, and let issues build up to a breaking point (including dissent about the Hastings Cutoff). They didn’t know how to talk to one another, so frequently they didn’t talk to one another at all. And there was nobody to mediate, to bring the various sides together (another aspect of conflict resolution). Karl had other points and a few slides, but that hits some of the high points. The bottom line: the group called the Donner Party was unable to work together toward a common goal. Dozens died. Others suffered from frostbite, PTSD and more for the rest of their lives. Worst of all, they were tagged as cannibals, a designation nobody wanted. In case you wondered, when Karl got hungry on the winter camping expeditions, he went for a candy bar. Whew…  George Donner and James Reed’s decision to rely on Lansford Hastings’s 1845 Emigrants’ Guide to Oregon and California and his supposed “cutoff” to shorten the route to Nevada through Utah’s Wasatch Mountains and the Great Salt Lake Desert led to a 125-mile boondoggle and 31 extra days on the trail to California. True West Archives Related Posts • William-Eddy-and-Mary-Ann-Graves-by-Illustrator-Andy-Thomas   The Donner-Reed Party remains the most famous wagon train in the history of the… • There’s no business like show business, if you tell me it’s so. Traveling through the… • A half-scale saddle that advertised Buffalo Bill’s Wild West act of a monkey riding a…
If the Pope Called for a Christmas Ceasefire in Afghanistan, Could “Ceasefire!” Enter Mainstream Debate? Since the US invaded Afghanistan in late 2001, the demand for ceasefire has never been able to maintain a strong foothold in mainstream public and media discourse. This is particularly striking now that the war has clearly entered its zombie, autopilot phase. Western leaders have largely given up trying to explain or justify why Western troops are still in Afghanistan, and why they are still killing and being killed. Why are we there? What do we realistically hope to accomplish through further killing and dying? Who knows? Who cares? We’re there today because we were there yesterday. We’ll be there tomorrow because we were there today. A plausible explanation for why the demand for ceasefire in Afghanistan is not widely raised on the Western powers is precisely because it is the big Western powers who are choosing to continue the war. If Israel were doing in Afghanistan what the US is doing in Afghanistan, many people, institutions and governments around the world would be saying, “Ceasefire!” But because it’s the US running the show, many people, institutions and governments shrug their shoulders. It’s the US – what can you do? But if people around the world were raising the demand, people in the US would hear it, and they would start raising the demand too. Afghans are raising the demand, but it’s hard for people in the US to hear what Afghans are saying, if their voices aren’t echoed by prominent voices in the West. What could drive the demand for ceasefire into mainstream public discourse in the West, and enable it to stay there? What if Pope Benedict XVI called on Western leaders to announce an offensive ceasefire for Christmas? Might that move the demand for ceasefire into mainstream Western public discourse? In early December 1914, Pope Benedict XV called for a “Christmas Truce” in the First World War. Leaders on all sides were forced to respond to the Pope’s call. No formal truce was agreed, but across the trenches of the Western Front many soldiers on all sides observed the Christmas Truce the Pope had called for. Many people don’t know this important history. Most people who know about it probably saw the Christmas movie Joyeaux Noël or heard the song by John McCutcheon, Christmas in the Trenches. It’s wonderful that this movie and song exist to educate people about the Christmas Truce of 1914. But both left out an important part of the story, which is the Pope’s call that preceded the Christmas Truce. This is not to detract at all from the bravery, initiative and moral clarity of the soldiers who brought about the Christmas Truce. But a key part of knowing history is to understand how decisive acts were not merely spontaneous but were spurred by intentional acts of agitation. Rosa Parks was not just some random woman who was too tired to give up her seat on the bus. She was secretary of the Montgomery chapter of the NAACP, and had been chosen by her NAACP colleagues to act as the catalyst of a moral confrontation. She later wrote, “People always say that I didn’t give up my seat because I was tired, but that isn’t true … the only tired I was, was tired of giving in.” The Christmas Truce of 1914 was spurred by the Pope’s moral agitation. And that sort of moral agitation is just the sort of thing that moral leaders are supposed to do. Today the war in Afghanistan continues killing Americans and Afghans for no reason. If Pope Benedict XVI – the current Pope – called on Western leaders to announce an offensive ceasefire in Afghanistan for the Christmas holiday, mainstream media would report it and Western leaders would have to respond. If we could stop the war for one day, it would set an important precedent, making it easier to achieve a lasting ceasefire and an end to the war. Pope Benedict XVI has recently inaugurated the use of a Twitter account. The Pope already has a million followers on Twitter. What if people Tweeted the Pope, urging him to call on Western leaders to announce an offensive ceasefire for Christmas? The Pope is obviously the most prominent and influential Western religious leader – someone whose actions other religious leaders pay attention to – and the historical precedent of his predecessor’s call for a ceasefire in 1914 creates a specific and compelling context for his action. If Pope Benedict calls for a ceasefire in Afghanistan, other Western leaders will join his call, and Western governments with troops in Afghanistan will have to respond. Upon becoming Pope in 2005, Benedict said: Treading in his footsteps“: That’s exactly the leadership that is needed now. Urge the Pope to call for a Christmas ceasefire in Afghanistan.
What is Hypervisor and what types of hypervisors are there //What is Hypervisor and what types of hypervisors are there What is Hypervisor and what types of hypervisors are there What is Hypervisor If you know what a private cloud is and you know the infrastructure of it, you’ve probably heard about hypervisor. It is the part of the private cloud that manages the virtual machines, i.e. it is the part (program) that enables multiple operating systems to share the same hardware. Each operating system could use all the hardware (processor, memory) if no other operating system is on. That is the maximum hardware available to one operating system in the cloud. Nevertheless, the hypervisor is what controls and allocates what portion of hardware resources each operating system should get, in order every one o them to get what they need and not to disrupt each other. Virtualization is changing the mindset from physical to logical. What virtualization means is creating more logical IT resources, called virtual systems, within one physical system. That’s called system virtualization. It most commonly uses the hypervisor for managing the resources for every virtual system. The hypervisor is a software that can virtualize the hardware resources. Virtualization, changing the mindset from physical to logical. Image Source: www.ibm.com There are two types of hypervisors: how type 1 and type 2 hypervisors differ Image Source: www.ibm.com Type 1 hypervisors: 1. VMware ESX and ESXi These hypervisors offer advanced features and scalability, but require licensing, so the costs are higher. There are some lower-cost bundles that VMware offers and they can make hypervisor technology more affordable for small infrastructures. VMware is the leader in the Type-1 hypervisors. Their vSphere/ESXi product is available in a free edition and 5 commercial editions. 2. Microsoft Hyper-V The Microsoft hypervisor, Hyper-V doesn’t offer many of the advanced features that VMware’s products provide. However,  with XenServer and vSphere, Hyper-V is one of the top 3 Type-1 hypervisors. It was first released with Windows Server, but now Hyper-V has been greatly enhanced with Windows Server 2012 Hyper-V. Hyper-V is available in both a free edition (with no GUI and no virtualization rights) and 4 commercial editions – Foundations (OEM only), Essentials, Standard, and Datacenter. Hyper-V 3. Citrix XenServer It began as an open source project. The core hypervisor technology is free, but like VMware’s free ESXi, it has almost no advanced features. Xen is a type-1 bare-metal hypervisor. Just as Red Hat Enterprise Virtualization uses KVM, Citrix uses Xen in the commercial XenServer. Today, the Xen open source projects and community are at Xen.org. Today, XenServer is a commercial type-1 hypervisor solution from Citrix, offered in 4 editions. Confusingly, Citrix has also branded their other proprietary solutions like XenApp and XenDesktop with the Xen name. 4. Oracle VM The Oracle hypervisor is based on the open source Xen. However, if you need hypervisor support and product updates, it will cost you. Oracle VM lacks many of the advanced features found in other bare-metal virtualization hypervisors. Type 2 hypervisor 1. VMware Workstation/Fusion/Player VMware Player is a free virtualization hypervisor. It is intended to run only one virtual machine (VM) and does not allow creating VMs. VMware Workstation is a more robust hypervisor with some advanced features, such as record-and-replay and VM snapshot support. VMware Workstation has three major use cases: • for running multiple different operating systems or versions of one OS on one desktop, • for developers that need sandbox environments and snapshots, or • for labs and demonstration purposes. 2. VMware Server VMware Server is a free, hosted virtualization hypervisor that’s very similar to the VMware Workstation. VMware has halted development on Server since 2009 3. Microsoft Virtual PC This is the latest Microsoft’s version of this hypervisor technology, Windows Virtual PC and runs only on Windows 7 and supports only Windows operating systems running on it. 4. Oracle VM VirtualBox VirtualBox hypervisor technology provides reasonable performance and features if you want to virtualize on a budget. Despite being a free, hosted product with a very small footprint, VirtualBox shares many features with VMware vSphere and Microsoft Hyper-V. 5. Red Hat Enterprise Virtualization Red Hat’s Kernel-based Virtual Machine (KVM) has qualities of both a hosted and a bare-metal virtualization hypervisor. It can turn the Linux kernel itself into a hypervisor so the VMs have direct access to the physical hardware. This is a virtualization infrastructure for the Linux kernel. It supports native virtualization on processors with hardware virtualization extensions. The open-source KVM (or Kernel-Based Virtual Machine) is a Linux-based type-1 hypervisor that can be added to most Linux operating systems including Ubuntu, Debian, SUSE, and Red Hat Enterprise Linux, but also Solaris, and Windows. We use KVM in VapourApps Private Cloud: • Virtualization engine – OpenStack on KVM • Predefined virtual servers based on Debian • Orchestration and management web dashboard, a customized Horizon dashboard. The owner of the tenant or the IT administrator, can manage his virtual servers, users, groups and monitor the status of the used application from a single dashboard. Download and try VapourApps 1.0 Beta Download VapourApps By |2016-10-26T13:54:11+00:00May 13th, 2016|Virtualization|Comments Off on What is Hypervisor and what types of hypervisors are there About the Author:
The impact of multinational corporations, global trade and extreme weather in West Africa From VCSEwiki Jump to navigation Jump to search Agriculture is the most common source of income in the developing countries and especially in West Africa. Sadly it's also very fragile system. It's the most weather-dependent of all human activities and in this region it's highly threatened by climate change (major droughts) and destruction and degradation of the natural resource base (desertification, decreasing soil fertility and water availability). Unfortunately these are not the only problems for west african farmers. The prices of their crops cannot compete with the highly subsidized european prices which means they can't access foreign markets but on the other hand the local governments are forced to open their markets to the cheap foreign goods which is preventing the local economies from growing. And for the multinational corporation farmers from these regions serve as a source of cheap labor where they can keep low wages. Environmental problems In this region over last few years we could witness a lot of extreme weather events. Especially major droughts causing huge famines and deaths Climate has a strong influence on agricultural production.The impact is particularly strong in developing countries in the tropics that in many cases are exposed to high variability in climate, and where poverty increases the risk and the impact of natural disasters. In Sahel and other West African regions double so because the rain-fed crop production is the main source of food and income. The artisanal farmers lack the resources to influence the crop environment(no irrigation, mechanization or fertilizers). [1] In 2009 irregular rains in Sahel region have led to lack of pasture, water and poor harvest. In some areas there was no harvest at all. This and high food prices has let to the most recent famine that endangered almost 10 million people. There was another food crisis in 2008 caused by similar factors. [2] One of the biggest problems of west african agriculture is the degradation of natural resource base. The agricultural land fertility is decreasing because of the land overuse, inapropriate use of pesticides, erosion and lack of water. The Sahara desert is threatening the Sahel region with desertification. The farmers are pushed on the new land destroying the trees and bushes which serve as a natural barrier to the sand. Without this green-belt the land is slowly being overrun by the desert. Multinational corporations The main goal of the MNCs is to maximize their profit. Many of them are participating in various development programs and are investing big amounts of money into them. But this doesn't match with their main goal- the profit. They have to keep this because they have the responsibility towards their shareholders. Their shareholders are expecting their share to grow as much as possible so they have better income. And if some MNC invests so much in development aid the cost of its production is growing and it looses profit. The MNCs are not motivated in foreign aid because it contradicts to their main goal. In reality this means that the farmers receive just a minimal wage or buying price for their crops. The MNCs also tend to enter in short term contracts with farmers so they have no future possibility to improve their income because the MNC would not enter the contract again if they would ask for more money.[3] As an example we can take the cocoa production in west Africa. The Ivory coast and Ghana are the biggest exporters of cocoa in the world(especially Ivory Coast). This cocoa is exported into the developed countries for very low prices and then turned into expensive chocolate confection or industrial chocolate. The west african farmers have a minimal share on the profit. In 2001 Nestlé corporation was even accused of buying cocoa harvested by enslaved children. The children were taken from their families and forced to work in terrible conditions. Nestlé expressed its concerns but sad that they have no evidence that the cocoa is derived from slave labor. [4]Of course MNCs also provide development aid. The can subscribe to the Corporate social responsibility (CSR) which is a from of corporate self-regulation aimed at better working conditions. Or they can join forces with various NGOs and development organizations. For example Microsoft and Google help to boost employment rates among young people in 12 west african countries. The only problem is that this aid programs will never be in the center of MNCs interests. Global trade The international trade generates an incredible wealth. In economic theory this trade is beneficial for both sides, but this only works when the rules are the same for everybody. Sadly this is not true because the rules controlling trade heavily favor the rich nations that set the rules. Make Trade Fair movement states that, „developed countries limit and control share of the world market by charging high taxes on imported goods. As a result, many developing countries can only afford to export raw materials, which give far lower returns than finished products“[5].For example, the developed world buys cheap cocoa from west africa and produces chocolate which is much more expensive. And simultaneously the developed world is forcing the third world countries to open their markets to their exports.[6] Developed countries subsidize their agricultural production, driving down the price, this protects their farmers but the farmers from developing world can't compete with the subsidized prices .This has made many poor farmers even poorer. The developed countries tell the poor world to stop subsidizing their farmers, but they continue to spend billions of dollars subsidizing its own farmers[7]. Thanks to all these factors the developing countries serve as reservoirs of cheap labor and raw materials. As an example of the impacts of global trade we can take fishing in West Africa. Fishing was alway crucial source of livelihood for the people from the west-african coast. But since 1979, the Eu has been brokering the rights for fishing along this coast. This means that large foreign vessels are depleting the local fish stocks causing unemployment, migration and hunger, especially in Senegal which also suffers from illegal chinese fishing. This behavior contradicts the UN Treaty on the Seas which states that „government fishing agreements with foreign companies should be targeted at surplus stocks only“.[8] Priorities in future development The most important point is to renew the soil fertility. According to WEHABs Framework for action on agriculture this can be achieved by simple use of natural resources.“ Mainly nitrogen from the air with leguminous tree fallows and phosphorus from small indigenous rock phosphate deposits in artisanal ways“[9]. One of the benefits is that there are just minimal economical costs. No transportation is needed because the trees grow in the same fields as crops but in the dry season. Farmers in Malawi where not threatened by drought (causing hunger) because the tree fallows have increased the water holding capacity of the soil. To scale up this strategy across the while region remains the main chalange. „ The main responses needed are transmission of knowledge, supply systems for tree seeds and political will.This will provide the food security for the local people which is the base for the future development, which after this point will be much more easier.“ [10] The next steps: • Improvement of the crop varieties and improvement of water management, which will reduce the threat of harvest destruction by the climate change. • Diversification toward high value products. This will ensure better profits to the farmers Investments to the rural infrastructure, marketing, and information to enable better management and higher efficiency (by enabling farmers to take up improved technologies). • "Build capacity in planning and implementation of interventions at national, community and local levels".[11] • Reduction of the impact of negative MNCs behavior on the farmers through the government regulation and various NGOs activities (like fair trade label, which ensures that the producer received appropriate wage) • Ensure the fair rules in global trade that do not favor the stronger players but are the same for everybody. 9. Framework for Action on Agriculture (p.9)fckLR 10. Framework for Action on Agriculture (p.9)fckLR 11. Framework for Action on Agriculture
The Covid pandemic could end next year, experts say — here's what that looks like, and how the U.S. could get there By the end of next year, the Covid pandemic could be over. But that doesn't mean the coronavirus will disappear. In a blog post on Tuesday, Bill Gates laid out one seemingly likely scenario: "At some point next year, Covid-19 will become an endemic disease in most places." If Covid becomes an endemic illness — a disease of relatively low severity that constantly circulates throughout certain parts of the world — the sickness' pandemic phase could come to a close in 2022, the Microsoft co-founder and billionaire health philanthropist wrote. Medical experts, including White House chief medical advisor Dr. Anthony Fauci, agree that Covid may never completely vanish. "It's very unlikely that we're ever going to be able to get rid of Covid," Dr. Timothy Brewer, a professor of epidemiology at the UCLA Fielding School of Public Health, tells CNBC Make It. The thought of coping with Covid forever might sound daunting, but living with an endemic virus is very different than the world's past year-and-a-half of pandemic life — and the transition won't happen overnight. Here's how the pandemic could finally end next year, and what experts say that'll look like: What the 'end of the pandemic' really means The first step is getting enough people vaccinated against Covid to downgrade the disease's pandemic status. In the U.S., only 64% of people five and older are fully vaccinated as of Thursday, according to data from the Centers for Disease Control and Prevention. More vaccinations will help decrease the amount of severe cases, hospitalizations and deaths, signaling the beginning of Covid's transition to endemic, says Aubree Gordon, an infectious disease epidemiologist and associate professor at the School of Public Health at the University of Michigan. For an example of an endemic virus, look at influenza. The flu constantly circulates in the background, rising and falling seasonally each year. People get vaccinated regularly against it, helping them build up multiple layers of immunity over many years. Brewer says Covid will likely fall into a similar pattern: "Like most respiratory viruses, it's probably going to be worse during cold months and less so during warm." Gordon agrees, noting that the layers of immunity will probably help make endemic Covid cases even less severe than today's hospitalizations and deaths. What living with Covid could look like Living with Covid will require a shift in mindset, Brewer says: "We have to stop acting like if we do everything right, we're going to make this virus completely go away." Rather, he says, people should try to "minimize the health and economic consequences as much as possible, and get on with our lives." In his blog post, Gates agreed. The risk of Covid will hopefully become so low that "you won't need to factor it into your decision-making as much," he wrote. "It won't be primary when deciding whether to work from the office or let your kids go to their soccer game or watch a movie in a theater." During the colder parts of the year, some now-familiar prevention measures could remain widespread — like wearing masks in public indoor settings and staying home when you're sick to prevent spread, Brewer says. There's a reason the playbook sounds familiar. "We don't necessarily have to come up with new interventions [to prevent Covid]," Brewer says. "It's just that we've got to do a better job continuing to do the things we know that work." Outbreaks could still emerge in local communities, but the emergence of new antiviral Covid drugs — which aren't yet approved by the U.S. Food and Drug Administration — could help treat people and prevent the disease from massively spreading again, Gates wrote. Covid boosters designed to target new variants could also become commonplace, since viruses that continually circulate often mutate into new strains, Gates noted. It's another familiar idea: Each year's flu vaccine is already designed for that season's dominant strains. How omicron and other variants factor into the timeline Omicron could present a curveball. At a media briefing Wednesday, World Health Organization director general Tedros Adhanom Ghebreyesus said omicron's many mutations and ability to spread "could have a major impact on the course of the pandemic." But Brewer says the emergence of new variants isn't particularly surprising, and shouldn't affect the world's ability to shift Covid from pandemic to endemic. Much remains unknown about omicron, including whether it causes severe illness and how much protection the vaccines and boosters provide. Early data indicates that it may be more transmissible than previous variants, but cause less severe infections and be defeated by booster shots. A variant that manages to escape vaccine-induced immunity and causes severe infection would spell out significantly more trouble, Gordon says. Whether or not this type of variant emerges is "the open question," she says. "I think it's definitely possible." Don't miss: With omicron out there, here's how to decide if you should attend that holiday party Source: Read Full Article click fraud detection
You are viewing an archived copy of this website captured Wed Apr 11 11:07:29 AEST 2012 Thomas Bock's painintg of Mathinna Mathinna (1835–52), south-west Aborigine, originally named Mary, was born on Flinders Island in 1835, the daughter of Towterer (Romeo), chief of the Lowreenne people of south-west Tasmania, and Wongerneep (Evelyne). The Franklins on their visit to Wybalenna in 1838 were impressed with her intelligence and appealing manner, and in 1839 she was sent to Hobart to live at Government House. The Franklins named her Mathinna and educated her with their daughter until their recall to England in 1843. After a year at the Queen's Orphan School, Mathinna returned to Wybalenna, moving with the other Aborigines to Oyster Cove in 1847. She continued her education at the Orphan School and in 1851 she returned to Oyster Cove. Mathinna resorted to heavy drinking that contributed to her death by drowning. Further reading: W Denison, Varieties of vice-regal life, London, 1870; H Felton, The Lowreenne people and Mathinna, [Hobart], 1984; N Plomley (ed), Weep in silence, Hobart, 1987. Heather Felton
Behind the Lyrics - Led Zeppelin Welcome to "Behind the Lyrics" with Elise Chandler. Each week, I find a song that I feel is understated both musically and lyrically, and I analyze it through several critical lenses. This week, we are looking at Led Zeppelin's "Gallows Pole". I love this song because of the musicality behind it, but also, the narrative storytelling. The whole time it is leading you to the climax of the story, and yet, it still shocks you by the end. As the song progresses, we learn about the narrator's certain predicament. He is to be hanged for reasons unknown, but those close to the narrator are doing everything in their power to rescue him from this cruel fate. In the beginning, the music is calm and bluesy. There is no hurry yet for help to arrive, but he sees his friends approaching and calls to the hangman: "Hangman, hangman hold it a little while." Unfortunately, the friends have failed to find anything to bribe the hangman because they are "too damn poor". All throughout this sad exchange, the music has begun to pick up in pace to reflect the narrator's loss of time and the increase in stress. In the next stanza, the narrator is now boldly, loudly begging the hangman to "hold it awhile" for now he sees his brother riding to assist him. To add to the stressful feelings of the narrator, a mandolin joins in the music as it continues to grow in pace. This makes listeners unknowingly lean in to hear the next piece to this storyline. The brother has brought plenty of money, but the hangman is still not happy...leading to the next stanza. In the next stanza, we learn of the narrator's sister (all while the music is increasing in speed and complexity). What does the narrator's sister bring to bribe the hangman? The narrator begs of his sister: "Sister, I implore you, take him by the hand Take him to some shady bower Save me from the wrath of this man Please take him" He asks his own sister to risk her reputation for him. To sleep with a man she does not even know all to save him. Unfortunately, the sister does what he asks, leading to our final stanza and the climax of the story. In the final stanza, when the narrator asks if he is free to ride away and be free. The hangman instead taunts the narrator by saying: "Oh, yes, you got a fine sister She warmed my blood from cold She brought my blood to boiling hot To keep you from the gallows pole, pole, pole, pole, yeah Your brother brought me silver Your sister warmed my soul But now I laugh and pull so hard And see you swinging on the gallows pole, yeah But now I laugh and pull so hard" And the song ends with a chilling, repeating, deadpan laughter of the hangman in the fast-paced ending. Many listeners end this song with an extreme dislike for the hangman, and I agree. After all the sacrifices those near the narrator made, he simply used them and still killed the narrator. However, I ask us to look at this a bit deeper. First, the hangman never promises anywhere in the song that if he is bribed enough he will let the man go. This may simply be the final fantasies born of a desperate man. The narrator is the one who led those near him to believe that only through their sacrifices he could be safe. Additionally, the narrator seems to have no qualms about asking extreme favors from any of those close to him (again not certain it will even work). He begs and pleads for his friends to donate money when they quite honestly remind him they have none. He whines and questions his brother, and his brother delivers, but at what cost to him? Finally, he tells his sister to give up her chastity to protect him from the gallows pole, and she complies knowing well that in the time period the "gallows pole" was used, this could have ended her respectability and options in life. He does all of this only to find none of these bribes work. So, is the hangman really that evil of a guy, or is he the final true act of justice turning the tables on a bad man? It is unfortunate that innocents (or who we believe to be innocents) have been swindled in this act of justice, but what is a better ending for a man who uses others than to be used and still not succeed? Until next time. 21 views0 comments Recent Posts See All
Software Programs Is So Famous, But Why? Software application, computer system software, or computer system software packages are programs or procedures for a details computer system or element of the system. Software application of different kinds is created for various customers having different objectives. Numerous groups commonly used for them are education and learning as well as training software, organization and audit software, clinical software application, network management software application, hobby and entertainment software and productivity software. They are offered in different kinds and also are written to run on different operating systems. They can be located as stand-alone programs or elements. Computer software application include instructions, sustain details as well as user guidebooks. They can also come with various other products such as diagnostic devices, benchmarking utilities and recommendation material. Significant producers of computer software programs offer extended service warranty strategies. In many cases, the supplier gives support for at the very least one year after the day of purchase. The directions included in software programs give thorough instructions on how the program ought to be used. As an example, a direction to multiply is just one of the directions while other directions describe exactly how to do estimations. Directions for one feature generally need various guidelines for another function. A few of these features are increase, separate and multiply. Instructions for various other features have the exact same directions but the specifics may differ. Computer software programs are separated right into two categories, specifically desktop computer software program and also ingrained applications. Desktop computer software application is developed to operate on a personal computer that uses the very same system software that a personal computer usages. Installed applications (also called application software) are developed to work on a mobile gadget that is attached to the computer system by means of a USB or Bluetooth wire. Examples of ingrained applications are cellular telephones, handheld computers and electronic electronic cameras. Desktop computer software program as well as ingrained software can be utilized with each other for creating applications that operate on a selection of computer systems. On the other hand, smart phones such as cell phones, handheld devices and also automobiles can only be made use of with mobile software application. Computer software programs are made use of in organization, education and learning and amusement. The content in service application software programs may differ from bookkeeping, clinical and money to manufacturing, transport, human resources administration, sales, circulation as well as infotech. Service application software programs may be utilized to take care of stock, items as well as services on the retail and wholesale market, supply monitoring, budgeting as well as personnel management. Some examples of business software programs are Intuit Quick Books, Quicken Premier and also Microsoft Cash. Computer operating systems supply customers the capability to perform computer system program directions. The computer system os regulates the execution of instruction by the computer, software as well as motorists. Example of operating systems consist of Windows, Linux, UNIX, Macintosh OS and also SunOS. Users implement instructions in the form of commands saved in software data accessed by a command line interface (CLI). As an example, Windows supplies the Windows Web server, a layer in addition to Microsoft Windows that allows the software program to communicate with the os, and Linux on the computer system customer’s computer system connects with a Linux OS via a setup data. trucking software programs System software is computer program software that offers users accessibility to integrated features of a computer system, such as the operating system, memory, disk drive, printer, Ethernet cable, video card, hard disk, sound card, cordless network adapter, CD/DVD drive, as well as Access provider. It additionally provides security and accessibility control. Examples of system software consist of Windows Information Defense, Windows XP Solution Pack 2, Windows View Service Pack 2, and also MacAfee VirusScan 2021. Platform software application refers to software on other devices such as servers as well as electronic indications. It lets the individual control the web server or electronic indication. Examples of system software program include Citrix Netware, cPanel SSL, FastStone Free Version, MyPCBackup Pro, NetIQ Home Web Server, Pareto Reasoning Internet Safety And Security, PresteXoft Net Security, Sun Staroffice 9 Expert, Uconnect Safety for the Computer, and Sybase Open Database Administration. Some computer software program consists of a collection of source codes. Source code (additionally called “resource files”) are written in a programs language (as an example, C++) and are read as well as performed by a computer throughout implementation. Since resource code is generally saved within a program as well as is read multiple times by the computer, it can cause an efficiency slowdown. To prevent efficiency problems, programs written making use of complimentary software program have source code that are assembled into the original machine language, making it possible to perform only the initial program and also its parts. Software application are a collection of instructions that tell an electronic device how to perform a certain function. These software programs are often utilized by computer applications in a computer system. As an example, if you intend to play video game, you would certainly initially require to download video game software to your computer system. This is opposed to equipment where the device is already constructed as well as just performs the feature when it is made use of. So, what software programs are best to make use of? To contrast 2 software programs, the first thing that you ought to do is make a checklist of all the tasks that you desire the tool to carry out. Maybe arranging your email, surfing the internet, publishing documents, calendar events, running applications, recording sound and also video, or almost anything else. Then, you will certainly have a list of software application that satisfy these requirements. In contrast to the checklist that you made previously, you should now see which one can do the task better than the various other. In this situation, it is equipment that is the weak point compared to software application. Let us currently proceed to the next contrast. This time around, let us use a monitoring system as opposed to a software application engineering design. If you are implementing a software engineering layout, then your focus should be on the technical details. Nevertheless, if you are implementing a monitoring system, after that you ought to pay more attention to the non-technical information such as the architecture of the device, management strategy, training, as well as quality assurance. freight broker programs When comparing software application and monitoring systems, one intriguing comparison you need to consider is whether the two can be flawlessly integrated. Some software programs that can be incorporated with an administration system consist of bookkeeping software program, client relationship management, circulation management, and supply management. If these are included in the system, after that all you have to do is configure the software programs to do their jobs instantly when required. Similarly, with the administration system, you will have to configure it to do estimations automatically. Leave a Comment
Fear and Trust Share on facebook Share on google Share on twitter Share on linkedin Antoine du Pluvinel was one of the earliest dressage trainers in seventeenth century France. Pluvinel is perhaps most well known for his kind, humane methods for  training horses. Unlike his Italian teacher Pignatelli, who often used harsh methods to gain obedience from the horse, Pluvinel used praise, careful use of aids, and softer bits to get the horse to work with him. His theories include that the horse must take pleasure in work, due to gentle, understanding riding, and that such a horse will move much more gracefully if he enjoys being ridden. This humane approach is equally applicable to horses who work in equine-facilitated therapy settings. I believe that the horse is always given a choice about whether to do client work. This ensures that the horse has enough emotional energy to work with the human, avoiding burn-out. By respecting the autonomy of the horse to be supportive with the human client, a relationship of trust is built between the horse and the humans they encounter. The same is true of humans – that if fear is used to coerce human beings in the short term, then resentment and passive aggression will usually be triggered even if those emotions lie dormant for fear of reprisals if they were expressed. In the equine work, usually the horses show the people that it is OK to acknowledge difficult emotions that may have been suppressed for quite some time. If the human trusts the horse and the facilitator and also their own self, then the client can start to overcome long-standing fears and difficulties by knowing their own true values and feelings. Much is written in the management world about authentic leadership. Horses, and trusting partnerships with horses, show us how to do it.
Living with Agoraphobia Living with Agoraphobia Agoraphobia is a condition in which a person avoids going to any number of ordinary places because they fear they will have a panic attack. Seemingly harmless public places such as supermarkets, churches, schools, shopping malls, or public transportation all hold the threat of causing a panic attack for an agoraphobic. The fear arises because there is not always an easy place to exit quickly from these locations should a panic attack occur. Basically, an agoraphobic bears the constant burden of panic. agoraphobia symptoms The word goes back to the ancient Greeks, where agoraphobia meant, “fear of the marketplace.” These days, that definition has expanded to include any location that is outside of someone’s “safe” zone. A safe zone is not necessarily limited just to one’s house, as many believe — that is an extreme case — but even places where someone used to enjoy visiting can become off limits because agoraphobics carry with them the experiences of shame, frustration, and the anticipatory worry of having a panic attack. “Safe” Zones A safe zone can be a specific geographic distance from one’s home, or can be specific locations where an agoraphobic feels protected from having a panic attack. Therefore, an agoraphobic reasons that if he stays within his safe zone, he will be able to prevent having a panic attack and the sometimes terrifying thoughts and fears that accompany it. Agoraphobia treatment closely follows the treatment for panic disorders. A panic attack is an acute case of anxiety. It usually only lasts about 10 minutes or so, but the person experiencing it can feel like they are dying during that short time. A panic disorder is when a person consistently experiences panic attacks, with no control over them. Methods used to help someone overcome both agoraphobia and panic attacks are two-fold: • First, one must learn how to respond to panic attacks in ways that calm them down, such as slowing their breathing, or practicing anticipating an activity or thought that might accelerate into a panic attack. • Second, as one progresses and gets better at those skills, an agoraphobic can begin practicing them in more and more “challenging” locations, until they have regained all the territory that they previously gave up to panic. This kind of treatment is usually called exposure treatment, and it’s considered the most effective treatment available for panic and agoraphobia. Reeling in Agoraphobia But how does a case of anxiety balloon into an agoraphobic state, where a brief panic attack can lead to a situation where a person is paralyzed and simply cannot travel to everyday locations? Much of it has to do with a person’s lack of self-esteem and self-worth. Panic attacks occur when a person has internalized so many negative emotions related to his life that he has conditioned himself to become used to having a poor sense of self-esteem. When this is challenged and he is not ready to stand up to it, panic ensues. Managing panic requires building up a sense that he is, in fact, worthwhile and deserves to be where ever he is, through the practice of replacing negative emotions with positive ones. In doing this, he reduces his anxieties, which reduces the possibility of having a panic attack. When he is secure enough to believe that he can control his panic attacks, the person may then be able to attack his agoraphobia by slowly venturing out of his safe zone. The more times he does this successfully, the more the agoraphobia will lessen or even possibly disappear. Leave a Reply
Burn Calories Through Swimming And Achieve A Fit Body People who want to lose weight will often run several miles every day to help them burn calories. However, swimming is a more effective exercise when it comes to losing weight. Not only does it help you lose weight; it can also strengthen and tone some of your muscles. Swimming is almost the same as jogging, walking, and running. It is an exercise that allows the heart to pump faster than normal. The faster pumping action of the heart requires more energy for the muscles of the heart. The body will try to mobilize fat reserves and burn these as fuel. This fat-derived energy fuels the heart muscles and the other muscles of the body. This is why aerobic exercises are good for people who want to lose weight. There is another aspect of swimming that makes it a more efficient fat-burner than running or jogging. When you swim, you are propelling yourself against the water. Water resists this forward movement of the body. The muscles of the arms, legs, and the core will have to work harder to overcome this resistance. A good example is doing the breaststroke or the butterfly stroke. One can only rely on the strength of the core and leg muscles when it comes to doing the breaststroke. Synchronizing the movements of the upper limbs during a butterfly stroke also requires more energy for the muscles. The backstroke relies on the strength of the quads, the abs, and the back muscles. In other words, swimming makes you work your muscle groups more. The more muscle groups that work, the more energy that they need. The greater the energy requirement, the more calories that the body burns. If you swim breaststroke for half an hour, you will burn about 367 calories. If you swim freestyle, you’ll lose 404 calories in the same time frame. Running at an average of 6 MPH for about 30 minutes will only burn 300 calories. Brisk walking for the same amount of time will only burn 100 calories. There are also studies that show swimming for an hour every other day can lead to a reduction in body fat in as short as 3 months. Not only does swimming help in weight loss, it can also boost cardiovascular endurance and improve flexibility. Swimming is also useful in losing belly fat. Butterfly kicks can target the obliques, while flutter kicks target the lower abs. This can lead to a slimmer figure around the waist and hips. Swimming is also beneficial for people with joint problems of the feet, knees, and hips. If you want to lose weight through swimming, it is best to do it in a vigorous manner. Swimming freestyle for an hour can burn 800 calories. Swim every other day and you can lose about 3 to 4 pounds every month. If you cannot adhere to vigorous swimming, you can always swim at a moderate pace for half an hour. This will help you burn 250 calories. It will help you shed more than a pound every month. Swimming is great for people who want to lose weight. It is also a low-impact exercise, yet provides you with both cardio, strength, and flexibility benefits.
By IQT News posted 28 Jan 2021 ( Two recent breakthroughs in quantum computing have generated significant excitement in the field. By using quantum computers to solve problems that classical computers could not, researchers in the United States and China have separately ushered in the era of “quantum advantage.” Yet as momentous as the demonstration of quantum advantage may be, it is the availability of more capable quantum machines that will ultimately have greater impact. Access to these machines will foster a cohort of “quantum natives” capable of solving real-world problems with quantum computers. Quantum computers are highly specialized machines currently not suited for life outside research laboratories, so public access to these machines currently occurs via the cloud—online access over existing internet infrastructure. The availability of early quantum computing resources will not need to be mediated by purchase of specialized equipment, creating a real opportunity for broad-based access to rather exotic technology. Clearly, access to cloud-based quantum computing will require digital access considered ubiquitous in modern society. But virtual schooling, driven by the COVID-19 pandemic, has laid bare socioeconomic divides in technology and internet resources—resources not nearly as universal as often imagined. Quantum computing serves as one more reminder that universal digital infrastructure is absolutely vital for the education of today, the workforce of tomorrow, and participation in the technology development of the future. Current public access to certain quantum computing resources puts us in a strong initial position. The classical computing industry has long maintained a beneficent relationship with higher education, contributing resources that range from student fellowships to in-kind hardware grants to free software licenses. Commercial players in quantum computing must ensure similar avenues for access for both educational and research purposes. The National Q-12 Education Partnership, a public-private effort headed by the National Science Foundation and the White House Office for Science and Technology Policy, commits to bringing quantum education to precollege students. These sorts of initiatives will bring together industry, academia, and government to expand the quantum ecosystem, within which vibrant cycles of research and development will drive progress in quantum computing. NOTE: This article by Joan A. Hoffmann, a principal physicist within the Research and Exploratory Development Department at the Johns Hopkins University Applied Physics Laboratory for the Brookings Institution, a nonprofit organization devoted to rigorous, independent, in-depth public policy research. Subscribe to Our Email Newsletter
When signing a contract, one cannot predict whether certain circumstances will arise or not. No one expected the occurrence of COVID-19, yet it had a devastating effect on the global economy, leading to widespread unemployment. Force majeure is a common clause within contracts that accounts for "acts of God" - the events and circumstances that are beyond your control. It is a way for the parties involved temporarily to be excused from contractual obligation, if or when such an event takes place, and either or both parties are not able to uphold their end of the agreement. The contract in question can be suspended for a certain period of time stipulated in the contract. Once this determined time period has lapsed, the parties involved may decide to terminate the contract. Force Majeure: Meaning and Events A force majeure clause can be written to be as specific or broad as desired; however, there are a few events that are generally considered to fall under force majeure. These include but are not limited to: • War • Riots • Fire • Floods • Hurricanes • Strikes • Explosions • Lightning • Earthquake A Force Majeure Event: The Requirements in South Africa There are multiple requirements that have to be met before an event can be constituted as a force majeure event. Every event that occurs must be analysed to ensure they meet these requirements: • The event in question must take place after the contract has been created and signed. • The event must, under all circumstances, be unavoidable; thus, making the terms agreed upon impossible to fulfil. • If the event in question was foreseeable, then force majeure may not be applicable. The Implementation of Force Majeure If the event in question meets all of the requirements needed to be considered a force majeure event, the contractual obligations will be resolved in a certain order. This order consists of: • The contractual obligation that is impossible to perform will be extinguished and neither of the parties will be expected to adhere to the contract. • It must be decided whether performing the obligation is objectively or absolutely impossible. If the obligation is objectively impossible it could be because one of the parties cannot physically perform the task anymore or cannot be expected to perform the task. • A time period in which the force majeure is applicable will be decided upon. Once this time period comes to an end, and if the parties involved are able to perform their obligations, the contract will be reinstated. Depending on the circumstances, a force majeure clause can be a lot more complex or comprehensive and will require the specialist assistance of an attorney to ensure that it is drafted properly.
A fortress city The construction of the fortifications of Sabbioneta, ordered by Vespasiano Gonzaga, began during the second half of the 16th century. The intent of the future duke was to provide the capital of his fief with a modern defensive system, consisting of bastions and embankments able to withstand the artillery attacks. An extended wall in the shape of an irregular hexagon was therefore designed, about six to seven metres high compared to the ground level, composed of an external brick lining supported by buttresses and by a mass of earth behind it and backfill, sloping down towards the inside and surrounded on the outside by a large moat. Six pentagonal bastions (San Nicola, San Giovanni, San Giorgio, Sant'Elmo, San Francesco, Santa Marta) are planned at the corners, connected by straight lines. The walls also include the pre-existing castle of medieval origin and its moat, along the perimeter of the circuit in the stretch between the bastions of San Francesco and Santa Maria.  The layout of the fortifications is finally completed with the opening of two doors in the shape of triumphal arches, to the south-east Porta Imperiale and north-west Porta Vittoria) of the walls. In addition to the walls, the defensive system was progressively improved even after the death of Vespasian through a series of complementary works, with ravelins, lunettes and a road sheltered by embankments, which together form a second star-shaped wall outside the hexagon of the walls. Present structure Present structure of the Sabbioneta Walls 1. Porta Vittoria 2. Porta Imperiale 3. Resti del castello 4. Baluardo San Nicola 5. Baluardo Santa Maria 6. Baluardo San Francesco 7. Baluardo Sant’Elmo 8. Baluardo San Giorgio 9. Baluardo San Giovanni 10. Fossato 11. Percorso al piede delle mura 12. Fortificazioni demolite Monumental buildings 1. Chiesa dell’Incoronata 2. Palazzo Ducale 3. Teatro all’Antica 4. Chiesa dell’Assunta 5. Chiesa di San Rocco 6. Sinagoga 7. Palazzo Giardino 8. Galleria degli Antichi 9. Palazzo Forti 10. Chiesa della Madonna del Carmine After the eighteenth century the walls lost their military function and were gradually abandoned, undergoing changes of use, alterations and partial demolition. Nonetheless, the fortifications built by Vespasiano survive today almost in their entirety and constitute a cornerstone of the UNESCO World Heritage Site of Mantua and Sabbioneta., added in 2008. Thanks to their excellent conservation, the walls of Sabbioneta also offer an extraordinary testimony to the military architecture of the late Renaissance, whose principles are expressed in the treatises of the time. By comparison and because of their geographical proximity, the fortifications of Sabbioneta are closely related not only to the defensive works realized in the nearby Gonzaga fiefdoms, but more generally to the other walled cities of the Po Valley.
The Strategist IMF: Demographic Catastrophe Undermines the World's Economy 03/11/2016 - 16:38 Mankind is shaken by the consequences of demographic change. The most significant of them are rapid population growth in some developing countries and changes in the proportion of adolescents and young people in other countries, as well as the increase in life expectancy and aging of the population all over the world. Above that, there is urbanization and international migration. All of them create intractable problems, compromising economic growth, fiscal sustainability, environmental quality, safety, and welfare of the population. Yet, none of them is insurmountable. To solve them, we need early decisive joint action of public and private sector developers. These include reform of the pension policy, development of a global immigration policy, provision of contraceptives to many millions of women and further increase of levels of survival of children and treatment of chronic diseases. The world's population is growing At the beginning of 2016, the world population was 7.4 billion people, and it is projected to increase by another 83 million in the current year, which reflects the difference between the 140 million births and 57 million dead. UNFPA (United Nations Population Fund) has made average projections built on the assumption that fertility dynamics will change in accordance with the trends and characteristics of past periods. According to them, the world's population will exceed 8 billion people in 2024, 9 billion people – in 2038, and 10 billion people - in 2056. Ninety-nine percent of the projected population growth in the next four decades will come from countries classified as less developed - countries in Africa, Asia (except Japan), Latin America and the Caribbean, Melanesia, Micronesia and Polynesia. Rapid population growth poses serious challenges. These include the need to cover the employment of large numbers of people and ensure that they have the human capital (quality of education, training and health), allowing carrying on productive activity. To maintain higher employment, the world also need to create physical capital and infrastructure; otherwise suffering of millions of people, political, social and economic instability and conflicts will become more frequent. Widening differences between countries can also be an obstacle to international cooperation, and halt and even nullify the process of globalization, which is able to bring a significant improvement in living standards around the world. In addition, rapid population growth, as a rule, brings consequences for ecosystems and natural resources, endangering the food, energy and water security, leading to a reduction in the quality of local and global environment and deteriorating prospects for reducing harmful impacts and adaptation. Where people live Currently more than half the world's population lives in cities, compared with 30 percent in 1950. This share is projected to reach two-thirds by 2050. Population in Africa is urbanized the least. Only 40 percent of people live in the local cities, which is twice less than in Latin America and the Caribbean - the most urbanized developing region. It is predicted that 50 percent of Asia's population will live in cities in the next few years. The experts also expect steady growth of world population until 2050 inclusive, especially in Africa and Asia. The population of other regions will grow slowly, if anything. The number of megacities (cities with populations of more than 10 million people) has increased from 4 in 1975 to 29 currently. The metropolitan population of 471 million people makes 12 percent of the world's urban population and 6 percent of the total world population. The United Nations has recently introduced the concept of "Metacity" - a city with 20 million or more inhabitants. Eight cities had the "meta" status in 2015. Tokyo tops the list with 38 million people living there - more than the population of Canada. Delhi’s 26-million population (second in the list) is more than the population of Australia. There is active discussion about the consequences of the population’s territorial distribution. Some focus on the economic benefits associated with the concentration of population in urban areas, such as large pools of labor and large-scale markets for goods and services. Critics, on the other hand, argue about the impact that densely populated cities have on the soil, air and water resources. Urban residents’ disproportionate consumption of fossil fuels and the associated increase in greenhouse gas emissions lead to the fact that more than 1 billion people in the world live in extremely poor urban slums. Population’s dynamics Despite the rising numbers, population growth in recent years has begun to slow. Currently, world population growth is 1.08 percent per year, which means a doubling of the population every 64 year. This increase is below the high of 2.06 per cent in 1965-1970, or doubling every 34 years. The highest increase of 2.44 percent (doubling every 28 years) takes place in Africa. Europe on the other hand, make just 0.04 percent – this is the lowest growth (doubling period - 173 years). The total increase in population declines, and is projected to keep the tendency in the world as a whole and in each geographic region in particular. It is predicted that the world's overall population growth will drop by half in the period from today until 2050. The number of worldwide deaths per 1,000 people per year has steadily declined from 19.2 a year in 1950-1955 to 7.8 today. This decrease is explained by factors such as creation and widespread use of vaccines and other achievements in medicine. Among them, for example, are introduction of antibiotics and oral rehydration; improving diet; public health measures, such as improving sanitation, increasing the safety of drinking water and the use of bed nets treated with insecticide; broader education (especially of mothers) and improvement of health system and other infrastructure. This is relevant to an elongation of worldwide life expectancy by 24 year – from 47 years in 1950-1955 to 71 years at the present time. Given that an average newborn lived out until about the age of 30 for most of human history, this lengthening is a truly remarkable human achievement, yet to express itself fully. According to forecasts, the global life expectancy will increased to 78 years by 2050-2055 years. Life expectancy varies greatly depending on the region: from a minimum at 61 in Africa, up to a maximum of 80 years in North America. It is predicted that this almost twenty years-gap will narrow in the coming years. Reduced fertility is another important aspect of the demographic situation in the world. In 1950, an average woman gave birth to 5 children; today it is 2.5 children. Fertility rates vary widely by region, from 1.6 in Europe and 4.6 in Africa. The difference between countries is even more significant. They constitute 7.6 in Niger, 6.4 in Somalia, 6.1 in Mali and Chad, 6.0 in Angola, but 1.2 in Singapore and 1.3 in Bosnia and Herzegovina, Moldova, Portugal, South Korea, Greece and Spain. About half the world's population lives in countries where fertility rates are below the long-term replacement rate, equal to about 2.1 children per woman. In developing countries, increasing child survival is one of the underlying drivers of lowering fertility. It is related to the realization that achievement of the desired family size requires less childbirths. In addition, the desired fertility decreases with development of education and higher incomes. Reduced fertility, in turn, contributes to child survival level due to improvement of maternal health, and possibility to allocate more family’s resources to each child. Fertility is also being reduced due to access to contraceptives. International migration In addition to birth and death, another channel of the population size changes is movement of people across borders. Only 3.3 percent of the world's population, that is, 244 million people, do not live in countries where they were born. Europe and North America account for 15 percent of the world's population. Nevertheless, these regions host more than half of international migrants in the world. Nearly 20 percent of them live in the US, followed by Germany and the Russian Federation, each of which accounts for 5 percent. The largest numbers of immigrants came from India (16 million), Mexico (12 million), Russia (11 million) and China (10 million). International migrants are mostly working-age persons with equal distribution between men and women. One of the largest inter-continental flows of mass migrations in modern history took place in 2015 (the exodus of more than 1 million Syrians in Europe). Yet, the world still face serious economic and institutional barriers to immigration, as well as rigid social and political resistance in many advanced economies. At the same time, migration has a significant positive potential, not only for people who leave their country, but also for other people in the countries of origin and destination. However, the realization of this potential depends on various factors, including measures to facilitate integration of migrants into the local economy. Many countries left by migrants oppose migration since it deprives them of key personnel, such as doctors, engineers and teachers. However, an important compensating factor are remittances: it is estimated that migrants sent 441 billion dollars to developing countries in 2015. This is three times more than the amount of official development assistance, and is about two-thirds of foreign direct investment in developing countries. The remittances significantly alleviate poverty and contribute to socio-economic development resulting in accumulation of human and physical capital. Age distribution Probably the most important global demographic shift is a change in the population’s age structure. There are three clearly projected changes: reduced rate of youth dependency (ratio of children under 15 years to economically active population aged 15 to 64 years); changes in the number of adolescents and young adults (aged 15-24); increase in the proportion of older people (aged 60 and older, or 65 years and older). All these changes are associated with long-term trends in the number of births and deaths. For example, reduction in mortality in the initial phases of the demographic transition process disproportionately affected infants and children. This, in turn, led to the emergence of "baby boomers", existing before the reduced fertility. As "baby-boomers" grow older, the age wave affects the population pyramid: from its founding (infants and children) to medium sections (15-24 years and 25-59 years) and peaks (60 years and older and 80 years and older). Similar changes in the age structure are linked to the baby boom, similar to that happened in many countries after World War II. Since needs and abilities of people vary greatly throughout the life cycle, effects of changing age structures can be significant. Children consume a larger volume of production than they produce; they require many resources for food, clothing, housing, medical care and education and, as a rule, do not work. Adults, on the other hand, usually contribute more than they consume - as labor activities and their savings, which contributes to the accumulation of capital. The net contribution of older people tend to be somewhere in the middle. Upon reaching old age, people tend to work less and either save less or spend their savings to finance consumption in retirement. Demographic dividend Changes in the age structure can promote economic growth, creating possibility of the so-called demographic dividend - increase in per capita income due to a decrease in fertility. This reduces the burden of youth dependency, increases proportion of people employed and those who save money, and allows to reallocate resources from children education to building of plants, creation of infrastructure, investment in education and research and development activities. The decline in fertility also tend to relieve women of child-bearing and child-rearing, further increasing the labor supply. Similarly, savings rates generally grow with increase in survival of adults and in relation to the expected longer periods of retirement. Especially it is true in those countries where the labor activity of people over 60-65 years is constrained by policies and institutions. The demographic dividend is an opportunity to ensure the rapid income growth and poverty reduction. Policies and programs aimed at reducing infant and child mortality can serve as a catalyst for it. Income growth and poverty reduction can additionally be sped up by adoption of measures that reduce fertility, such as expansion of access to primary and reproductive health care, and girls' education. However, the demographic dividend do not emerges automatically. Its preparation depends on the key aspects of economic and legal conditions, such as good governance, macroeconomic management, trade policy and infrastructure. Above that, there should be labor and financial market efficiency, as well as high level of public and private investment in health, education and training. In recent decades, different countries, primarily the "East Asian Tigers" (Hong Kong SAR, Korea, Singapore and Taiwan Province of China) have been enjoining the demographic dividends. In the 1960s and 1970s, the countries dramatically reduced fertility and, taking advantage of the breathing room in the economy, reached astounding success through deliberate action in education and health policy, sustainable macro-economic management and prudent cooperation with the region and the world. In these countries, more than 2 percentage points of the annual growth of per capita income (about one-third of the total annual growth) is oblinged to the decline in fertility and the related sharp increase in the share of the working-age population between 1965 and 2000. Countries of sub-Saharan Africa are at the other end of the spectrum. From the development point of view, the situation there is much worse since they were unable to avoid the heavy burden of youth dependency and rapid population growth. High dependency ratios typical for many African countries indicate that lower fertility can greatly encourage greater economic growth. In South Asia, where fertility rates have declined significantly, the demographic dividend is a matter of a short-term perspective, and their production is heavily dependent on investment in human capital and job creation.
What Sports Improve Posture and Back Health What is the relationship between back pain and the practice of sports? Can sport activities help treat or prevent spinal problems? Or when, rather, it becomes necessary to do targeted gymnastics as part of an exercise to be defined, however, not sporting, but therapeutic?  Can back pain be caused by sports? In most cases, lower back pain appears because of postural causes, i.e. incorrect positions maintained over time, for example due to the type of work. It can be said that lower back pain is the result of a sedentary lifestyle. Exercise is usually the therapeutic weapon for removing the cause of back pain.  Physical activity is a good way to prevent lower back pain, but contrary to popular belief, it is not enough to do any exercise or say ‘I’m going to swim’, ‘I’m going to play football’, ‘I’m going to the gym’ to get rid of back pain. Traditionally though, these activities are listed as the best suited for the back health: swimming, yoga, cycling, and gymnastics.  But is there a sport that more than another can be considered useful for the good of the column? Controversially, there is no sport ‘good for the back’. Exercise helps to maintain a healthy spine if it acts:  Sedentary activity and abnormal postures, in fact, cause progressive contractures of these muscles, therefore, the more they are relaxed, the better they are off and the better they can withstand the stresses that daily life gives to the lower lumbar segment. If there is pain, however, medical evaluation of the problem and targeted therapeutic other intervention than sports is required. Can sport hurt a healthy cervical spine? Any type of sporting activity, whether practiced at a competitive or amateur level, affects the spine, even swimming, which has always been recommended as a safeguard for the spine. Sport in general, however, from children to the elderly, is good for health. There are countless articles in the literature that document the effectiveness of sports, such us the research by Thomas E. Dreisinger, PhD, called Exercise in the Management of Chronic Back Pain. Performed with caution, it promotes the harmonious development of the muscular and skeletal system, the health of the cardiovascular system and the well-being of the whole body. You need to make sure though that you act according to the fundamental criterion of compatibility with the age and general conditions.  That said, beyond the common expectations, there are many sports, both team and individual, such as football, skiing, basketball, cycling, which, despite having a greater incidence of risks on other parts of the body, can still damage the healthy spine. This can happen due to the incidence in the practice of continuous microtraumas (e.g. competitive swimming), sudden movements (basketball actions), incorrect postures (bicycle), direct traumas (such as falling on skis).
BOOM AND BUST, 1921-1933 Essay Contents Looking Beyond Traditional Interpretations Prohibition as a Hallmark of the Period The Stock-Market Crash as a Hallmark of the Period Coping with the Great Depression I. Looking Beyond Traditional Interpretations Many textbooks treat the Great Depression as a single entity, spanning the years from 1929 through American entry into the Second World War in 1941; they then divide the years of Franklin Delano Roosevelt in half, distinguishing the domestic era of the New Deal (1933-1940) from the era of the Second World War (1939-1945). I propose instead to break the Depression in two, using Roosevelt's election as the dividing point, treating the years of boom and bust (1921-1933) and the Roosevelt years (1933-1945) as distinct periods. This approach seems to comport better with history as the American people experienced it. They saw the period from 1921 through 1929 as an organic whole (the "Roaring Twenties") and they saw the slide into the Great Depression from 1929 through 1933 as a grim, ironic coda to that period. The transition to the Roosevelt years marked an extraordinary change in the American people's basic thinking about government and the economy, and an equally remarkable change in morale from fear and despair to hope and confidence. It seems only fitting to make these points explicit in our periodization -- to enable students to understand the past the way those who lived through it did when that understanding makes good historical sense. The conventional understanding sees the period of boom and bust (also known as the Roaring Twenties) as a time when the American people went on a great spree, dismissing the problems of the nation and the world, and then began the slow, agonizing process of paying for the spree. This view is still valid, though containing as much caricature as accuracy. The traditional view minimizes the period's bleak side because it does not pay attention to groups that, for a wide range of reasons, did not get to go to the party: Even developments and cultural phenomena often cited by textbooks as reasons to celebrate this period -- such as the flourishing of American literature, the rise of motion pictures and radio, and the individual achievements of Charles Lindbergh, Mary Pickford, and Babe Ruth -- had their bleak, pessimistic side: Teachers can draw many useful analogies between the 1920s and the 1980s, a period that many older students will remember without prompting. Issues of the use of governmental power to regulate individual morality, of the place of immigrants in American life, of women's rights and the rights of racial and ethnic minorities are all as lively and controversial today as they were then. Moreover, issues of the extent to which government should monitor and regulate the nation's economy and of the dangers of leaving large sectors of the economy in the "invisible hands" of market forces are also as significant now as they were then. Students -- and most other Americans -- associate this period with two great phenomena that capture the imagination: Prohibition and the stock-market crash of 1929. Each is a valuable window into the central themes and characteristics of the period. II. Prohibition as a Hallmark of the Period Prohibition plays a key role in the Roaring Twenties and the early years of the Depression. We tend to forget that Prohibition was not simply a project of intolerant "blue-noses." Rather, it was, at the same time, the quintessential Progressive social measure and the culmination of a social reform movement that had labored for the goal for decades (since the days of Andrew Jackson). To prohibit the sale or manufacture of liquor was an attempt to use law and governmental power on an unprecedented scale to modify individual behavior. Advocates of Prohibition sought to justify the policy on a variety of grounds -- including efficiency, productivity, family values, and honesty in government and politics. Prohibitionists maintained, for example, that corrupt politicians held sway in the bars and saloons of the nation's cities, exchanging favors for votes, with impressionable and befuddled immigrants as their raw material and liquor as an effective lubricant of the process; and that drunkenness threatened the stability and happiness of the family and the productivity of the American worker. The Eighteenth Amendment was adopted in 1919 and took effect in 1920, as did the Volstead Act, the enforcement legislation under which federal authorities operated. Historians disagree how effectively Prohibition was or could have been enforced once it went into effect. For every cask of beer or liquor axed into kindling or spilled down sewers, perhaps two or three found their way to eager customers. At the same time, critics of Prohibition enforcement focused on what they deemed widespread, even blatant violations of civil liberties and individual rights. Prohibition received general lip-service in public -- and was defied or ignored in private. Violators of the Amendment and its enforcement legislation became heroes to the general public. Lawyers, judges, and scholars fretted that the gulf between theory and practice symbolized by Prohibition threatened the rule of law. Federal courts were inundated with thousands of cases growing out of the enforcement of Prohibition, including some, such as the wiretapping case Olmstead v. United States (1928), that were to have profound effects on such constitutional issues as the right of privacy. At the beginning of the 1920s, Senator Morris Sheppard (Democrat-Florida) proclaimed, "There is as much chance of repealing the Eighteenth Amendment as there is for a hummingbird to fly to the planet Mars with the Washington Monument tied to its tail." By 1929, however, a countermovement for repeal was gathering strength, spurred by changing political conditions. These included the growing shift of the nation's population to the cities, where Prohibition had always been unpopular; general recognition that enforcement of Prohibition had become a ghastly failure; the evils of the speakeasy (and of the Amendment's creation of a nation of lawbreakers); and the Great Depression's highlighting of the severe economic impact of Prohibition. By the 1932 Presidential election, it appeared likely that a nationwide repeal movement could succeed, especially after the Democratic Party endorsed repeal in its national platform. Indeed, many historians maintain that the Democratic promise to work for repeal of the Eighteenth Amendment was the cornerstone of Franklin D. Roosevelt's electoral landslide in 1932, rather than his pledge of "a new deal for the American people" to respond to the Depression. And the Democrats followed through on their pledge: In 1933, in ear-record time for a constitutional amendment, the adoption of the Twenty-first Amendment, repealing the Eighteenth, ended the "noble experiment" of Prohibition. III. The Stock-Market Crash as a Hallmark of the Period The stock-market crash of 1929 and the Great Depression that it touched off have become paradigms that have shaped all later generations' fears about economic downturns. Critics of the American economy as presently constituted trundle out the lessons of the 1929 crash whenever they perceive an analogy between it and modern economic crises. For example, opponents of deregulation of the savings and loan industry gleefully drew analogies between the S&Ls' catastrophic failure in the late 1980s and the 192 9 crash that destroyed many American banks; opponents of computerized "programmed trading" made the obvious connection after the 1987 crash. In many ways, these connections make good sense. The 1929 crash was not a sudden lightning bolt that destabilized a healthy economic system. Rather, it was a natural outgrowth of economic trends and business practices that took a new and unstable system and made it ever more shaky until it collapsed of its own weight. The 1920s were the great era of sweeping public faith in the self-regulated American economy. At the same time, the 1920s were the era that produced the great event that swept that faith into the wastebasket for half a century. We need not rehash here the evils of buying stocks on margin, by which millions of Americans became speculators -- they built up vast personal indebtedness in the conviction that they could turn around, sell their stocks to even more greedy and gullible people, and thus recoup their paper investments. There were no government regulations restricting banks or other financial institutions from speculating on the market, and thus bankers and financiers went as mad as everybody else. Economists pleaded in vain with lawmakers and executive-branch officials to do something to restrain the orgy of speculation. And yet, in a development just as important as speculation fever, the indifference of business and government to the plight of labor and the growing mismatch between production and consumption that that plight helped to exacerbate had something to do with the Crash. For it was all but impossible for the growing labor force, whose incomes were only creeping upward while corporate profits were spiraling ever faster into the air, to use their purchasing power to acquire the consumer goods they were busily producing. The same phenomenon was affecting the middle class as well, albeit to a lesser extent. Modern historians argue that this growing gap between what was being produced and what was being consumed helped make the Great Depression as sudden, severe, and durable as it turned out to be. IV. Coping with the Great Depression As the nation slid from the dizzy heights of the summer of 1929 into the Great Depression, an economic slump that was not only national but international in scope, the American people tried desperately to understand what had gone wrong. The lesson taught by the crash and the Great Depression was that the glorious dream of a self-regulating economy, free of government intervention and supervision, was moonshine. The businessman, so often lauded as the hero of the 1920s, became the scapegoat of the 1930s. As financial and industrial titans such as John Hay Whitney and the Swedish "Match King," Ivar Kreuger, either went bankrupt or went to jail or committed suicide, a newly cynical populace jeered the fall of those whom they had worshipped. Americans also cast about for ways to solve the range of problems posed by the Depression. But another problem now confronted the nation: When the unemployment rate goes as high as 15 percent or higher, when tens of millions of workers have no jobs and upwards of one-third of the population suffers from want that they had no part in bringing on themselves, what, if anything, should government do about such conditions? It was this political problem, and not the mere existence of the Depression as an economic fact, that destroyed the administration of Republican President Herbert Hoover and filled many Americans with doubt and fear about the nation's future. In 1928, when he triumphantly defeated Al Smith, Hoover seemed profoundly different from his two Republican predecessors, Warren G. Harding and Calvin Coolidge. Hoover had an international reputation as an engineer, a creative organizer of vast relief programs, and an administrator. If any President seemed qualified, even tailor-made, to address a great economic crisis, Hoover was. Yet Hoover made two fatal mistakes: (i) he assumed that government need only join hands with the business community and permit them to carry the ball in reinvigorating the economy; and (ii) he believed that, while government could use its power to encourage recovery, it could not and should not apply that power directly, lest it risk bringing a dictatorship in its wake. These assumptions, whether valid or invalid as a matter of economic reality, were a recipe for political suicide. Realizing these new truths, economists and legal theorists busily got to work proposing ways that government could use its power to prevent a similar economic catastrophe in future and hoping that a future President would draw on their ideas. If Hoover was to be cast aside in 1932, who and what would take his place? The question facing the American people confronted other nations in this period; many nations, newly dubious of the virtues of political democracy, discarded it as a luxury that a depression-stricken people could no longer afford. At the same time that Hoover was preparing to turn over the Presidency to his successor, Adolf Hitler became Chancellor of Germany; other European and Asian nations either were moving in the direction of totalitarian dictatorships (Italy, Japan), convulsing in civil war (Spain), or desperately and unavailingly trying to repel foreign invasions (China). Even in the United States, rumors abounded of would-be dictators seeking drastic change. On January 20, 1933, as she rode in the inauguration parade of her husband, First Lady-to-be Eleanor Roosevelt noted the expectant silence of the crowds lining the parade route. It frightened her, she confessed to her friends. And, though he did not show it, it frightened Franklin D. Roosevelt as well.
Beekeeping tools Beekeeping tools As with any specialist, the beekeeper has his own tools, his own special equipment. Perhaps the most necessary and indispensable tool of the beekeeper is a beekeeping chisel. Fig. 20. Beekeeping chisel. Without it, you can not separate the housing from the housing, raise the ceiling of the hive, move the honeycombs apart, or remove the frame from the nest. With chisels, waxen growths and propolis are scraped off the frames, and the walls, the bottom and the folds of the hive are cleaned. It serves the beekeeper the same way as a trowel to a builder or a brush artist. Without a trowel, you can not build a house, but without a brush you can not create a picture on the canvas. And it’s just as simple as the device. Steel L-shaped plate with expanded and pointed ends. That’s all. And without it, like without hands. And the hive has nothing to approach. An experienced beekeeper owns it masterfully. Beekeeping tools Fig. 21. The Dymard. Just serves faithfully the beekeeper and the smoke – an iron cylinder with a cone-shaped lid and furs for blowing smoke. They put in it smoldering materials that give a lot of smoke: wood rotten, dung, a piece of sackcloth wrapped with a tube, moistened with automotive oil. This car refueling is effective for several hours, and the rotten fires are burned quite quickly. Put healthy wood in the smoke. Smoke from it is not enough, and it is very hot, it burns bees. The smoker allows you to inject smoke anywhere in the nest to drive away and tame the bees. He is called the right hand of the beekeeper. Often during the examination of the nest, it is necessary to remove frames from it with honey, brood and bees sitting on them. Leaning them to the hive is not always convenient and, most importantly, unsafe. Foreign bee-scouts will immediately detect these honeycombs, and bees can be found on the apiary, which then becomes very difficult to get rid of. This family can be completely ransacked. To prevent and avoid all of this, the removed frames are temporarily placed in a closing portable box. It usually includes 6-10 frames. They are suspended just like in the hive, on the folds. A long handle is attached to the side walls of the box. It is convenient to carry frames with empty honeycombs and a wax from the pantry to the apiary to put them in the hives. A portable box is made of plywood. When the bees remove the queens, there are many in the apiary. Beekeeping tools Fig. 22. Cell for the uterus. Valuable queens, which are then thought to be used in their household, are stored in a reticulated uterine cell that resembles a matchbox and is almost the same in size. There are two ways out: one is locked by an iron flap, the other by a wooden pier, in which a recess is drilled, where the food for the uterus is put. Within a few days the uterus can live in this iron castle until it is released by the beekeeper or the bees themselves, when he lets them do so. The queens are retained either to replace the old ones with young ones, or to give them to new families when they increase the apiary. They will also be needed for the organization of twin-family families, when they prepare additional bees’ reserves for honey. So a small cell is very necessary for beekeepers and for large apiaries. If there is an apiary, then there must be honey. After all, that’s why the bees are driven to be with honey. And how to take it from the combs, so as not to destroy them and again to return them to the nests? For this, too, there are tools – a knife and a honey extractor. An apiary knife is not the same as a regular dining room. At the handle it is bent almost at right angles. This is done for the convenience of unpacking the honeycomb plane: after all, honey bees are stored with closed wax plates. A knife is sharpened on both sides. The end is sharpened so that it is possible to open honey cells in the depressions and hollows of the honeycomb. The knife is heated in hot water. This makes it easier to print. It is necessary to have two knives. While one cools, the other heats up. This speeds up the work. In practice, often used more advanced knives – steam and electric. Large industrial beekeeping farms use automatic copying machines. The honey extractor is designed to extract honey from honeycombs. The principle of its operation is based on centrifugal force. Sometimes it is called centrifugal. The honeycomb is placed honeycombs, they rotate, honey from the cells splashes out, sprays on the tank wall and flows down to the bottom. Through the tap it is poured into the dishes. We know of the 2- and 4-frame honey extractors and electric 20- and 50-frame ones. These large medobonkami are used in large beekeeping farms, where honey is pumped out in tons. For the school apiary, a 2-frame honey extractor is also suitable. It is trouble-free in work and can serve for many years. As you can see, the beekeeper has technical means with which he is able to perform any necessary operation. You can buy them in special beekeeping stores. They exist in almost every city and district. Beekeeping tools
1. Then six days before the Passover, Jesus went to Bethania, where Lazarus had died, whom Jesus raised up. 2. And they made a dinner for him there. And Martha was ministering. And truly, Lazarus was one of those who were sitting at table with him. 3. And then Mary took twelve ounces of pure spikenard ointment, very precious, and she anointed the feet of Jesus, and she wiped his feet with her hair. And the house was filled with the fragrance of the ointment. 4. Then one of his disciples, Judas Iscariot, who was soon to betray him, said, 5. “Why was this ointment not sold for three hundred denarii and given to the needy?” 6. Now he said this, not out of concern for the needy, but because he was a thief and, since he held the purse, he used to carry what was put into it. 7. But Jesus said: “Permit her, so that she may keep it against the day of my burial. 8. For the poor, you have with you always. But me, you do always not have.” 9. Now a great multitude of the Jews knew that he was in that place, and so they came, not so much because of Jesus, but so that they might see Lazarus, whom he had raised from the dead. 10. And the leaders of the priests planned to put Lazarus to death also. 11. For many of the Jews, because of him, were going away and were believing in Jesus. 12. Then, on the next day, the great crowd that had come to the feast day, when they had heard that Jesus was coming to Jerusalem, 13. took branches of palm trees, and they went ahead to meet him. And they were crying out: “Hosanna! Blessed is he who arrives in the name of the Lord, the king of Israel!” 14. And Jesus found a small donkey, and he sat upon it, just as it is written: 15. “Do not be afraid, daughter of Zion. Behold, your king arrives, sitting on the colt of a donkey.” 16. At first, his disciples did not realize these things. But when Jesus was glorified, then they remembered that these things were written about him, and that these things happened to him. 17. And so the crowd that had been with him, when he called Lazarus from the tomb and raised him from the dead, offered testimony. 18. Because of this, too, the crowd went out to meet him. For they heard that he had accomplished this sign. 19. Therefore, the Pharisees said among themselves: “Do you see that we are accomplishing nothing? Behold, the entire world has gone after him.” 20. Now there were certain Gentiles among those who went up so that they might worship on the feast day. 21. Therefore, these approached Philip, who was from Bethsaida of Galilee, and they petitioned him, saying: “Sir, we want to see Jesus.” 22. Philip went and told Andrew. Next, Andrew and Philip told Jesus. 23. But Jesus answered them by saying: “The hour arrives when the Son of man shall be glorified. 24. Amen, amen, I say to you, unless the grain of wheat falls to the ground and dies, 25. it remains alone. But if it dies, it yields much fruit. Whoever loves his life, will lose it. And whoever hates his life in this world, preserves it unto eternal life. 26. If anyone serves me, let him follow me. And where I am, there too my minister shall be. If anyone has served me, my Father will honor him. 27. Now my soul is troubled. And what should I say? Father, save me from this hour? But it is for this reason that I came to this hour. 28. Father, glorify your name!” And then a voice came from heaven, “I have glorified it, and I will glorify it again.” 29. Therefore, the crowd, which was standing near and had heard it, said that it was like thunder. Others were saying, “An Angel was speaking with him.” 30. Jesus responded and said: “This voice came, not for my sake, but for your sakes. 31. Now is the judgment of the world. Now will the prince of this world be cast out. 32. And when I have been lifted up from the earth, I will draw all things to myself.” 33. (Now he said this, signifying what kind of death he would die.) 34. The crowd answered him: “We have heard, from the law, that the Christ remains forever. And so how can you say, ‘The Son of man must be lifted up?’ Who is this Son of man?” 35. Therefore, Jesus said to them: “For a brief time, the Light is among you. Walk while you have the Light, so that the darkness may not overtake you. But whoever walks in darkness does not know where is he going. 36. While you have the Light, believe in the Light, so that you may be sons of the Light.” Jesus spoke these things, and then he went away and hid himself from them. 37. And although he had done such great signs in their presence, they did not believe in him, 38. so that the word of the prophet Isaiah might be fulfilled, which says: “Lord, who has believed in our hearing? And to whom has the arm of the Lord been revealed?” 39. Because of this, they were not able to believe, for Isaiah said again: 40. “He has blinded their eyes, and hardened their heart, so that they may not see with their eyes, and understand with their heart, and be converted: and then I would heal them.” 41. These things Isaiah said, when he saw his glory and was speaking about him. 42. Yet truly, many of the leaders also believed in him. But because of the Pharisees, they did not confess him, so that they would not be cast out of the synagogue. 43. For they loved the glory of men more than the glory of God. 44. But Jesus cried out and said: “Whoever believes in me, does not believe in me, but in him who sent me. 45. And whoever sees me, sees him who sent me. 46. I have arrived as a light to the world, so that all who believe in me might not remain in darkness. 47. And if anyone has heard my words and not kept them, I do not judge him. For I did not come so that I may judge the world, but so that I may save the world. 48. Whoever despises me and does not accept my words has one who judges him. The word that I have spoken, the same shall judge him on the last day. 49. For I am not speaking from myself, but from the Father who sent me. He gave a commandment to me as to what I should say and how I should speak. 50. And I know that his commandment is eternal life. Therefore, the things that I speak, just as the Father has said to me, so also do I speak.” “Nunca vá se deitar sem antes examinar a sua consciência sobre o dia que passou. Enderece todos os seus pensamentos a Deus, consagre-lhe todo o seu ser e também todos os seus irmãos. Ofereça à glória de Deus o repouso que você vai iniciar e não esqueça do seu Anjo da Guarda que está sempre com você.” São Padre Pio de Pietrelcina
Childhood brain tumours linked to parental solvent use Children born to parents who work with paints, glues and other industrial solvents are more likely to develop brain tumours, researchers in Western Australia have found. Brain cancer is the leading cause of cancer death in children under 10 years, according to the Cancer Council, and more than 115 new cases are diagnosed each year. For the first time, scientists have compared the occupations of 306 parents whose children were diagnosed with brain tumours against 950 couples whose offspring do not have cancer. They found the children of men who worked with chlorinated and petroleum-based solvents, such as those found in degreasers and cleaning chemicals, were at a higher risk of developing brain tumours. The five-year study, led by University of Western Australia epidemiologist Dr Susan Peters, was part of a larger nationwide investigation into environmental and genetic risk factors run by the Telethon Institute for Child Health Research. Dr Peters said her work showed that solvents containing chemicals called aromatic hydrocarbons posed the greatest risk. Paint thinners, adhesives and lacquers. Children born to men who worked with toluene or xylene—used in paint thinners, adhesives and lacquers—in the year before conception were four times as likely to develop a brain tumour, according to the study, published in the British Journal of Cancer. Men working with benzene in the year before conception were twice as likely to have a child who developed a brain tumour. Previous research has suggested a link between industrial solvents and childhood brain tumours, but the results were inconclusive and did not pinpoint problem chemicals. The new research also showed that women working with chlorinated solvents, such as trichloroethylene, at any time before the child’s birth, increased their risk of having their baby develop brain cancer. The team interviewed parents with children aged up to 15 years who had been diagnosed with brain cancer between 2005 and 2010. Dr Peters cautioned that while the numbers appear high, childhood tumours are relatively rare and more research was needed on a global scale. “It is the first study that has investigated the association between exposure to the different types of solvents and the risk of childhood brain tumours,” Dr Peters says. “What we found was mainly in males, so if the father had exposure to solvents in the year before conception, we saw that there was an increased risk of childhood brain tumours.” Dr Peters says fewer women work in occupations that expose them to the chemicals so there was less maternal exposure. Science Network Western Australia, 6 December 2014 ; ;
Energy and Brexit: What will change? The UK has become dependent on the energy imported from Ireland, France, The Netherlands and Norway, along with other members of the EU to a lesser extent. This could create a large problem, but it all depends on the deal we achieve post-Brexit. In this article, we’ll explain what changes are due to happen, and what aspects will stay the same. Oil and gas markets are worldwide and aren’t controlled by the EU. While they have a part in it, it’s just because their countries take part in the trades- not because they can influence rules. Short-term there won’t be any noticeable change, and supply is safe- there’s virtually no risk of shortages. However, the country’s long-term view will change due to the EU Internal Energy Market (IEM). What is the IEM and why is it important? The IEM is a mutual agreement for tariff-free energy between EU countries. According to the official EUR-Lex website, it sets out to achieve two things: ·         It seeks to introduce common rules for the generation, transmission, distribution and supply of electricity. ·         It also lays down universal service obligations and consumer rights, and clarifies competition requirements. After Brexit, the UK won’t be able to have a say in any of these rules, but may be able to change their own rules for the distribution of energy. This depends entirely on the deal we achieve upon leaving, as there is a chance we’ll have to continue with the EU regulations if we’d like to take part in the trading group. A close relationship with the IEM is high on the list of priorities for the UK Government in the Brexit negotiations, as this would allow the country to retain access to the benefits included in it, namely the increased security of supply, market coupling, cross-border balancing and capacity market integration. If we’d like to continue prospering, this does need to be achieved. How will it affect coal? Coal plants in the UK are required to follow the EU Industrial Emissions Directive (IED), a set of rules designed to keep emissions as low as possible. These rules require a lot of money to make sure the facilities are up to scratch, and so 6 of the 7 coal plants open in the UK have decided not to make this change. As only one would stay open, the government has made the decision to remove coal from the fuel mix entirely by 2025. How will it affect gas? As Norway, a non-member, provides 38% of the UK’s gas, it is predicted that the UK may not need a large change in policy to operate in a similar way as it does now. However, Oxford Energy have said in a recent report that “post-Brexit, EU-26 would be slightly more dependent on foreign gas than the former EU-28 but both the UK and Ireland would be much worse off. From being hardly foreign dependent at all, the UK and Ireland would become respectively 42 and 97 per cent dependent on foreign gas.” (report available here: The country is in a close relationship with the EU currently, and “no deal” could mean tariffs on gas, but we’ll have to see how it pans out. Nonetheless, we are certain almost 40% of our gas is safe and tariff-free. How will it affect nuclear energy? Euratom is an organisation in the EU that regulates the nuclear industry across Europe, safeguarding the transport of nuclear materials, disposing of waste and carrying out research. The UK has already made it clear that it would like to withdraw from the European Atomic Energy Community (Euratom) and stop following the associated treaty (the Euratom Treaty) as part of the Article 50 withdrawal process. While this may seem like it’s thrown a lot of safety concerns up in the air, the Government has made clear withdrawal from Euratom will not affect our country’s nuclear security. A UK Nuclear Safeguards Bill was created in October 2017, highlighting how this will be achieved (through altering the Energy Act 2013.) The final agreement between the UK and Euratom after Brexit will, however, have big repercussions for the country, as it is (unlike countries such as Germany) committed to atomic energy for the long-term. Overall, if the country can handle the change, it won’t affect much. Will the EU continue to invest in our projects? Any funding given to us by the European Investment Bank (EIB), owned by the 28 member-states of the EU, isn’t guaranteed to continue. In 2015, the EIB provided £5.6bn of funding for us to start or maintain a wide variety of projects, including infrastructure, social housing and renewable energy. They have invested over €13bn overall into UK energy projects since 2010. To continue to receive this funding, we will most likely have to follow the EU State Aid rules. If not, we would likely need to comply with WTO subsidy rules, quite similar in stature. The draft EU Withdrawal Treaty has stated that this funding will go on for projects approved by the EIB for investment before the 29th March 2019, but after that, the UK will not be able to receive the funding available for members of the EU. However, if the UK comes up with a project that agrees with the EU’s outlook, such as a drive towards renewable energy, or a pipeline that will benefit both the UK and the EU, it can still receive funding. There are a lot of uncertainties behind Brexit. We don’t know for sure what will exactly happen to our energy market, but there’s a quite large chance that not much will change. Looking for the cheapest energy provider? While Brexit is looming, and we aren’t absolutely certain what the results will be, it’s a shame that people are already overpaying for their energy before anything has changed! We compare over 20 energy providers to get the cheapest deal for you, so you can be sure that you’re with the best option for your business type, area and size. See who your cheapest provider is.
What is the intent of Literacy? At Cranfield Church of England Academy and Little Cranes Pre-School, we believe that Literacy is essential to participating fully as a member of society. Our Literacy curriculum is ambitious, coherently planned and sequenced and will teach our pupils to write and speak fluently so that they can communicate their ideas and emotions to others. Through their reading and listening we ensure that others can communicate effectively with them. Our curriculum encourages our children to become enthusiastic and engaged. Our cross-curricular approach, whereby Literacy learning is embedded within our creative curriculum, enables children to make meaningful links with their learning and offers rich and varied learning opportunities. We teach children how important their reading, writing, speaking and listening skills are by “enjoying achieving and learning”, in meaningful and inspiring contexts. How is Literacy implemented in our school?  We ensure quality-first teaching and opportunities in Literacy by: What is the intent of reading? At Cranfield Church of England Academy, we strive to ensure all our pupils become readers for life; enjoying literature in all its forms, developing fluency, vocabulary, comprehension and the ability to access other areas of the curriculum. We are determined that every pupil will learn to read, regardless of their background, needs or abilities. How is reading implemented in our school? At Cranfield Church of England Academy, we aim to help children to develop a love of reading. We believe it unlocks all other areas of learning enabling all pupils to take a full and constructively critical part in society empowering them aesthetically, socially, spiritually and morally.  Teachers at Cranfield Church of England Academy will: How do we assess reading in our school? Assessment takes place by: How do we engage parents and celebrate reading? How can I support my child's reading? The below resources will be of use in supporting your child's reading development at home. Allow your child to access Nessy four times a week: Allow your child to access Phonics Play: Username: Jan21 Password: hope What is the intent of writing? At Cranfield Church of England Academy, it is our intent to support every child to become a writer by equipping them with the technical skills required and igniting their desire to write confidently and fluently so that they communicate their ideas, opinions and emotions to others effectively. How is writing implemented in our school? We explore and develop children’s writing, speaking and listening skills across all elements of their learning, not just in their daily Literacy lesson. Our curriculum topics and themes enrich our Literacy teaching and provide creativity which ensures our pupils are engaged in their learning all day, every day. To enable all pupils to do this, teachers will develop pupils’ competence in the two dimensions of writing: transcription; spelling and handwriting, and composition; articulating ideas and structuring them.    Teachers at Cranfield Church of England Academy will: How do we assess writing in our school? Assessment takes place by: These lists are available to view by clicking here. How do we engage parents and celebrate writing? Where can I get further information? Should you require any additional information or have any questions, please do not hesitate to do any of the following: Spoken Language What is the intent of Spoken Language? At Cranfield Church of England Academy we strive to ensure that our children are given the skills to express, through spoken language, their own ideas confidently in an articulate manner in order to share their thoughts, opinions and ideas. How is Spoken Language Implemented in our School? Spoken language is central to the Cranfield Curriculum and is developed from the Early Years Foundation Stage, throughout our school and across the curriculum. We nurture children’s speaking and listening skills through a variety of approaches. Our classrooms are rich in talk, from effective questioning to constructive peer discussions and teachers use talk skilfully to develop and encourage critical thinking. There is a clear understanding in school of how talk aids teaching, analysis and higher order metacognition. All staff in our school model the use of higher level vocabulary within their speech and expanding children’s vocabulary is a key focus from EYFS. Subject specific vocabulary is embedded across the curriculum, through teacher modelling, in context. Contextual learning helps children to understand new words and supports them in including them in their work. This model is reflected in shared reading sessions, where children are given the chance to explore unfamiliar vocabulary and expand their knowledge of words. We model the correct grammar in speech and encourage children to reflect this in their use of spoken language. Children are encouraged to speak clearly and articulately developing fluency as confidence grows. Children are given the chance to orally rehearse ideas for writing regularly. Talk for learning is embedded in teacher pedagogy and allows children to develop the skills of maintaining attention and participating actively in collaborative conversations. Children are encouraged to explore ideas verbally, give well structured descriptions, explanations and narratives for different purposes. They are encouraged to articulate and justify answers, opinions and arguments. Children are taught to be active listeners –listening and responding appropriately to adults and peers alike. They are presented with opportunities to extend knowledge and understanding through developing questioning skills. In the EYFS staff provide communication friendly spaces  to encourage talk and provocations to stimulate talk including in the outdoor classroom. Drama is used across all subjects to explore and engage children in their learning. This gives children the opportunity to develop the skills needed to create collaborative and individual presentations, performances, role play, improvisation and debate. Children have regular opportunities to participate in performances such as Christmas and Easter plays, Year 4 leavers play, school assemblies and Arts festival presentations. Extra curricular activities, such as Drama Llama allow children to develop their skills further. Children have benefited from the use of Now Press Play  an educational resources that bring the curriculum to life through sound, story and movement, using wireless headphones. For those children requiring support with speaking and listening skills the school uses a variety of interventions including Lift off to Language for children in EYFS, Nuffield Early Language Intervention Project for Reception children and Time to Talk intervention. In addition, we employ a Speech and Language therapist to work with children requiring specialist support. These sessions are followed up by 2 highly trained Teaching Assistants who deliver the programmes set out by the Speech Therapist. How do we Assess Spoken Language? How do we engage parents and celebrate spoken language? How can I support my child's spoken language? Below are some general tips to try while talking to your child that will help with their language development:  The I Can website has a number of ideas and games which you can use to support your child. Click here to view our Literacy Policy
SpaceX launches two rockets in a span of three days Falcon Heavy rockets during a demo presentation. (Official SpaceX Photos/Flickr Creative Commons) The company SpaceX recently launched a rocket on March 30, but the launch did not go as planned when the $6 million nose cone, fell back to Earth, plummeting into the ocean at high velocity. During the liftoff of the rocket at Vandenberg Air Force Base in California, there were no initial disturbances or problems, and the primary mission of launching 10 communications and satellites into orbit was successful. The rocket’s nose cone functions as a shield for the satellites when it launches. Once the rocket launches into space, the nose cone breaks into two pieces, launches the satellites then falls away back to Earth, usually landing in the ocean. The nose cone was meant to be caught as it fell and salvaged for reuse, but the boat sent to catch the cone, called “Mr. Steven,” missed its mark. SpaceX and founder Elon Musk, who spent $6 million on the nose cone alone, desperately want to recover it rather than forget about the rocket. “(If) you had $6 million in cash on a pallet flying through the air, and it’s going to smash into the ocean, would you try to recover it? Yes. Yes, you would,” Musk said. SpaceX has been trying to salvage the portions of the 43-foot-long nose cone. It had hoped that the landing of the nose cone would be much softer so that it could be reused, but water damages the infrastructure of the nose cone when it lands. Although a nose cone has never been recovered or reused, Musk is ready to make adjustments and run more tests. He hopes that the adjustments to the nose cone, will make performance much better. Shortly after his announcement, another rocket was launched on April 2, a previously flown Falcon 9, to deliver supplies to the International Space Station. Is relying on a previously flown rocket a good idea? SpaceX forwent the usual landing process of the Falcon 9 in order to collect more data on the rocket during its landing into the ocean. Reusing a rocket may prove advantageous, as further tests can be done on the rocket to ensure stability and longer re-runs. SpaceX is efficiently making use of the tools they already have. The reuse of such technology may prove beneficial, as it could make sending greater amounts of necessary items to the International Space Station cheaper. As SpaceX redevelops its technologies, it will continue to work “through its inventory of recovered Falcon 9 rockets.” This will allow them to test procedures over and over again until they get it right. Reusing the rocket will save SpaceX money. Although they may spend money to make improvements on the rocket, their idea of launching Falcon 9 again allows it to save money on rocket design. Instead, it can use the money to better develop their rocket over time, leading to more cost-effective measures. The improvements that SpaceX will make will surely allow it to assist the International Space Station to a greater degree. One of the important changes SpaceX must make is to use solid-fuel engines. However, this would be harder to control, which is why they are generally not used. Although this is the case, it is necessary for SpaceX to come up with a cheaper alternative, in addition to reusing models, to ensure that it gets the best possible results. Anusha Kumar is a contributor for The Daily Campus. She can be reached via email at Leave a Reply
Menu Keys On-Going Mini-Series Bible Studies Codes & Descriptions Class Codes [a] = summary lessons [b] = exegetical analysis [c] = topical doctrinal studies What is a Mini-Series? Scripture References Bible Options Revelation 4:1-6 by Robert Dean Series:Revelation (2004) Duration:46 mins 54 secs Rapture; Evil; Throne of Justice There are many people who go through life and face many different kinds of problems and adversity. Sometimes they are faced again and again with personal injustices. Beyond that, as we watch the evening news we are acquainted with vast amounts of injustice, suffering, war, famine and disease throughout the world. Often people question and wonder how God can allow these things to take place. Is there no justice in God? It appears that the unjust and the unrighteous seem to go on and one without any justice, without any retribution. Where is God? This view is often reflected by the psalmist who says, "O Lord, how long will the righteous suffer and the wicked prosper?" Revelation gives us God's final answer on that question. Revelation 4:1 NASB "After these things I looked, and behold, a door {standing} open in heaven, and the first voice which I had heard, like {the sound} of a trumpet speaking with me, said, 'Come up here, and I will show you what must take place after these things.'" This introduces us to the next section of the book which extends from chapter four through the end of the book of Revelation. Here we see the beginning of God's revelation to John of the final judgments in human history, and that these final judgments are written on a scroll which is sealed with seven seals. And it can only be opened by one who is uniquely qualified. The opening of the scroll brings with it the final series of judgments on human history and on planet earth, judgments which will end up destroying the usurp of Satan and establishing Jesus Christ as the rightful ruler and King on planet earth. In chapters four and five we see the presentation of that scroll. Chapter four presents us the scene in heaven. It is important for us to understand as we come to the end of human history, and as God reveals it to us, He doesn't start with human events. He doesn't start with what is happening within human history, he starts with God. He starts with this vision of God upon His throne in heaven. It is a picture of the supreme judge of all the earth sitting upon His judicial throne about enact His justice on human history and planet earth. Chapter four pictures that throne and what is going on around the throne, and it is a picture designed to focus our attention upon the majesty, the holiness and the righteousness of God as the ultimate judge of all the earth. Chapter five then focuses on this scroll that appears. It is not mentioned until 5:1 and then the question comes as to who is qualified to open it, who is qualified to break the seals. That focuses our attention on the Lord Jesus Christ, for only the Lamb of God who has purchased us, who has paid the redemption price, is qualified be the judge, to bring that judgment into human history, to bring final judgment on the human race and to establish His kingdom. So in chapter four we see the presentation of the throne of God and in chapter five the presentation of the one who is qualified to open the scroll. In 4:1 we see that John is brought into heaven through some form of vision or prophetic transformation. He is brought into the very throne room of God, into the heaven of heavens. There he sees and describes for us what is going on in the heavenly during the end times. This period that we are coming into is a period that is first described back in Revelation 1:19 where the Lord Jesus Christ commissions John to write the things "which you have seen" (Chapter one), the things which are (Chapters two and three), and the things that will take place after this (Chapters four onwards). Some time subsequent to the Rapture there will be a period on the earth known as the Tribulation. It begins with the signing of a peace treaty between the Antichrist (the prince who is to come in Daniel 9) and the nation Israel. Sometime in this intervening period there is the judgment seat of Christ that takes place. At the end of the Tribulation period there is the marriage of the Lamb and the bride of Christ, the present church age believers. The Second Coming culminates in another judgment, the judgment of the Tribulation believers and unbelievers, and this inaugurates in the Millennial reign of Jesus Christ. This ends with another judgment, the great white throne judgment, and then the present heavens and earth destroyed and new heavens and new earth are established. After the great white throne judgment all unbelievers are consigned to the lake of fire, along with all fallen angels. In Revelation 4:1 the door open in heaven is often understood to be the symbol of what happens at the Rapture. The church is taken to heaven as John is taken to heaven. He hears the voice like a trumpet and the shout that occurs at the Rapture: 'Come up here, and I will show you what must take place after these things.' Then in verse 2 he says: "Immediately I was in the Spirit…" Because of the construction here the normal use of EN [e)n] plus the dative in the Greek, which usually means "by means of the Spirit," doesn't mean that. Because it is conjoined with the to be verb it is the idea of location and it is the same phrase used in chapter one when he talks about being in the Spirit on the isle of Patmos. It is not the filling by means of the Spirit, this is a revelatory state. "…and behold, a throne was standing in heaven, and One sitting on the throne." This is a picture of a majestic throne in heaven. Whenever the throne is mentioned throughout the book of Revelation the emphasis is on God the Father, not the Son. The Father's throne is the throne of judgment in Revelation, where He enacts His judicial decrees and brings justice to a culmination. The way it is designed is that God focuses us not on what is going on on earth primarily, but that what will happen on earth is the outworking of God's justice as He is finally bringing together in human history a judgment of evil and injustice and sin. That is what the book of Revelation describes. There are numerous people who have problems with the whole idea of evil. They stumble over this, and sometimes we stumble over it as Christians because we go through situations where somebody betrays us, or we are abused, or we lose a job, or we lose a loved one, or we go through a war and we lose a limb. We are aware of all the suffering in history and we wonder how in the world can a loving, just God allow all of this horror, evil, and suffering to take place. Many people become entrapped by this particular question. So we have to be able to address this particular question, not only in our own soul but also in terms of other people, especially unbelievers, who may address this. Often the question is asked: How can a loving God allow war, child abuse, the death of innocents, famine, the holocaust, Joseph Stalin's mass murder of millions? Whenever we ask this question we have to stop and think through the character of God, and that is what Revelation does; it starts with God's character. This is what is emphasized when we look at Him upon His throne in chapter four. Our attention starts with the character of God, who He is, before we look at what He is going to do. The underlying question as we will hear it is, if God is truly a loving God and absolute good, how can He allow evil? Sometimes the question is put: If the Christian God is omnipotent, just and loving, and evil exists, either God is loving but is neither just nor powerful enough to stop it, or He is powerful enough to stop it but He is not loving or just. We are often challenged with, how can you explain evil in the world? There are only three possible answers to the existence of evil in the world. The first answer is that evil is random, normal, and is uncontrolled and there is no God. This is the position that comes out of evolutionary thought, secular humanism, postmodernism; all these systems buy into some form of Darwinism, there's really no God out there is atheism, we just have these events and suffering on earth and it is all just random and out of control. So we respond to the challenge: So you believe in Darwinism, in the survival of the fittest? Well how do you get survival? There has to be the threat of death, extinction and suffering to get survival, you have to survive something. So from the very beginning you have evil, suffering and death as part of your system! Right? In Darwinism you can't call it evil because without it there is no evolution. They can't call suffering and death evil because without suffering and death there is no survival of the fittest, without the survival of the fittest there is no progression, without progression there is no evolution. So for them, suffering and death and struggle is necessary and normal for the process. They can't call it evil within their system. The second position is that evil really doesn't exist. Not too many people hold this position today, but there are people down through history who have. That was part of Platonism, part of Mary Baker Eddy's position in Christian Science—ultimate reality is out here in the realm of the ideal and what we experience on earth is not really real. That played it out in Gnosticism in the ancient world, in elements of the New Age movement, mind science cults, and various derivatives of that. The Christian position is that evil exists but it is not normal, not random, and not uncontrolled; that there is a higher good, that God is allowing evil to exist for a long period of time in order to accomplish His ends. From this we see that evil either originated from God or His creatures. Scripture teaches that it originated with His creatures. He created the angels first and then man, He gave them free will or volition, and Lucifer is the one who chose to disobey God, bringing sin and evil into the angelic realm, and then in humanity it was Adam's decision  to disobey God, brining sin into the human race. So evil came into creation, according to Christianity, through the abuse of freedom and responsibility. Therefore it is not normal, it is abnormal. The unintended consequence of that disobedience brought about all of this evil and suffering. Satan really wanted to do good, he just wanted to be like God; but it brought all kinds of calamity. Adam wanted to be like God, so he ate that fruit. So all of the death and suffering and disease is the unintended consequence of that disobedience. God allows evil and suffering to go on as long as He allows His creatures to exercise free will and to choose sin. In other words, to stop sin and evil God has to stop free will, to stop human responsibility and shut it all down. So as long as God continues to give His creatures the freedom to be disobedient there will be evil and injustice and suffering in human history. However, what the Bible teaches is that they don't get away Scott free. We may not see the justice, the retribution, in time but it will be judged. It began with the cross when Jesus Christ paid the penalty for sin, known as redemption. 1 Peter 1:18 NASB "knowing that you were not redeemed with perishable things like silver or gold from your futile way of life inherited from your forefathers, but with precious blood, as of a lamb unblemished and spotless, {the blood} of Christ." The second issue is the resolution of God's character because to be a just God, God has to have the penalty paid. This happened on the cross, 1 John 2:2 where the word "propitiation" relates to the satisfaction of divine justice. So on the one hand in the manward direction Christ paid the penalty for sin, and in the Godward direction the justice of God is satisfied by the payment of the Lamb. Romans 3:24 NASB "being justified as a gift by His grace through the redemption which is in Christ Jesus, whom God displayed publicly as a propitiation in His blood through faith. {This was} to demonstrate His righteousness…" What the Bible is portraying here is that for God to enact His justice and to ultimately defeat and judge sin and evil, it started at the cross where God demonstrated His righteousness, and justice and righteousness are satisfied by the death of Christ on the cross, it is the redemption price of the death of the Lamb that pays the price. The Lamb had to come as a human being in order to be a creature who would pass the same tests that the creature Lucifer failed and the creature Adam failed. He would then be able to die for the whole human race because He was incarnate as a human being, and therefore that would qualify Him to go to the cross where he would pay the redemption price, satisfying the justice of God, and then God would ultimately bring Him back to the earth now that He was qualified to bring judgment and justice on this whole evil situation. That is the setup for Revelation 4 & 5, because we are in the throne of God, we are before the bar of the Supreme Court of heaven, and we are going to see His righteousness and His justice now displayed, and there is no one in all of creation qualified to open the seals to end the problem of sin injustice, suffering and evil, other than the Lamb of God who is qualified because he has redeemed us by His death. That is why we see the creatures in heaven, the angels, the four living beasts, the 24 elders, bowing down and singing praise to the Lamb, because as we see in Revelation chapter five it is the Lamb who is worthy to take the scroll, open its seals, because He was slain and has redeemed us to God, and He is going to make us kings and priests to God and we shall reign on the earth. This is the conclusion to the whole problem of sin and evil.